[go: up one dir, main page]

CN114969770A - Data encryption method, device, computer-readable storage medium and product - Google Patents

Data encryption method, device, computer-readable storage medium and product Download PDF

Info

Publication number
CN114969770A
CN114969770A CN202111284063.0A CN202111284063A CN114969770A CN 114969770 A CN114969770 A CN 114969770A CN 202111284063 A CN202111284063 A CN 202111284063A CN 114969770 A CN114969770 A CN 114969770A
Authority
CN
China
Prior art keywords
ciphertext
data
plaintext
random number
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111284063.0A
Other languages
Chinese (zh)
Other versions
CN114969770B (en
Inventor
姬艳鑫
孙中伟
张钧皓
曹雨晨
尹靖雯
刘鸿儒
张新
赵国梁
宋红花
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingdong Technology Information Technology Co Ltd
Original Assignee
Jingdong Technology Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingdong Technology Information Technology Co Ltd filed Critical Jingdong Technology Information Technology Co Ltd
Priority to CN202111284063.0A priority Critical patent/CN114969770B/en
Publication of CN114969770A publication Critical patent/CN114969770A/en
Application granted granted Critical
Publication of CN114969770B publication Critical patent/CN114969770B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Computational Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the disclosure provides a data encryption method, a device, a computer readable storage medium and a product, wherein the method comprises the following steps: acquiring a random number plaintext, wherein the random number plaintext is a random number generated together with an affine secret key; encrypting a random number according to the iterative affine secret key to obtain a random number ciphertext, and determining the random number ciphertext as a pseudo public key; and sending the pseudo public key to data receiving equipment, so that the data receiving equipment adopts the pseudo public key to perform data encryption operation on a plaintext to be calculated. Under the condition that the data sending equipment does not need to expose the iterative affine secret key, the data receiving equipment can still realize the conversion from the plaintext to the ciphertext, so that the data calculation at the ciphertext level can be realized on the basis of ensuring the data security. The data transmission process is high in safety, and therefore the method can be suitable for more application scenes.

Description

数据加密方法、设备、计算机可读存储介质及产品Data encryption method, device, computer-readable storage medium and product

技术领域technical field

本公开实施例涉及大数据领域,尤其涉及一种数据加密方法、设备、计算机可读存储介质及产品。Embodiments of the present disclosure relate to the field of big data, and in particular, to a data encryption method, device, computer-readable storage medium, and product.

背景技术Background technique

联邦学习通过使用同态加密技术,可以实现多方之间的加密数据联合建模,在保证参与各方数据安全的情况下,挖掘数据的价值。当前联邦学习中应用的同态加密技术主要是Paillier半同态加密技术,其可以支持密文加法与数乘同态,但Paillier加密算法在加解密与密文计算的过程中有大量的模幂运算,计算效率比较低。Federated learning can realize the joint modeling of encrypted data between multiple parties by using homomorphic encryption technology, and mine the value of data while ensuring the data security of all parties involved. The current homomorphic encryption technology used in federated learning is mainly Paillier semi-homomorphic encryption technology, which can support ciphertext addition and number multiplication homomorphism, but Paillier encryption algorithm has a large number of modular exponentiations in the process of encryption and decryption and ciphertext calculation. operation, the computational efficiency is relatively low.

为了提高加密计算的效率,现有技术中一般采用迭代仿射加密技术进行明文的加密操作。In order to improve the efficiency of encryption calculation, in the prior art, iterative affine encryption technology is generally used to encrypt the plaintext.

在实现本公开过程中,发明人发现现有技术中至少存在如下问题:由于迭代仿射加密技术是一种对称加密技术,一旦泄露加密秘钥,解密秘钥也必然会泄露,因此,安全性较低,且应用范围较小。In the process of realizing the present disclosure, the inventor found that there are at least the following problems in the prior art: since the iterative affine encryption technology is a symmetric encryption technology, once the encryption key is leaked, the decryption key will also be leaked. Therefore, the security low, and the scope of application is small.

发明内容SUMMARY OF THE INVENTION

本公开实施例提供一种数据加密方法、设备、计算机可读存储介质及产品,用以解决现有的迭代仿射加密技术安全性较低,适用性不高的技术问题。Embodiments of the present disclosure provide a data encryption method, device, computer-readable storage medium and product, which are used to solve the technical problems of low security and low applicability of the existing iterative affine encryption technology.

第一方面,本公开实施例提供一种数据加密方法,包括:In a first aspect, an embodiment of the present disclosure provides a data encryption method, including:

获取随机数明文,其中,所述随机数明文为与迭代仿射秘钥一同生成的随机数;obtaining a random number plaintext, wherein the random number plaintext is a random number generated together with an iterative affine key;

根据所述迭代仿射秘钥对随机数进行加密操作,获得随机数密文,将所述随机数密文确定为伪公钥;The random number is encrypted according to the iterative affine key to obtain a random number ciphertext, and the random number ciphertext is determined as a pseudo public key;

将所述伪公钥发送至数据接收设备,使得所述数据接收设备采用所述伪公钥对待计算明文进行数据加密操作。The pseudo public key is sent to the data receiving device, so that the data receiving device uses the pseudo public key to perform a data encryption operation on the plaintext to be calculated.

本实施例提供的数据加密方法,通过在产生迭代仿射秘钥的同时,生成随机数明文,采用该迭代仿射秘钥对随机数明文进行加密操作,获得伪公钥。将伪公钥发送至数据接收设备,从而数据接收设备能够采用该伪公钥对待计算明文进行数据加密。由于数据发送设备无需暴露迭代仿射秘钥的情况下,数据接收设备仍旧能够实现明文到密文的转换,从而能够在保证数据安全的基础上,实现密文级别的数据计算。数据传输过程安全性较高,因此适应性较强。The data encryption method provided by this embodiment generates a random number plaintext while generating an iterative affine key, and uses the iterative affine key to encrypt the random number plaintext to obtain a pseudo public key. The pseudo public key is sent to the data receiving device, so that the data receiving device can use the pseudo public key to encrypt the plaintext to be calculated. Since the data sending device does not need to expose the iterative affine key, the data receiving device can still realize the conversion from plaintext to ciphertext, so that data computation at the ciphertext level can be realized on the basis of ensuring data security. The security of the data transmission process is high, so the adaptability is strong.

第二方面,本公开实施例提供一种数据加密方法,包括:In a second aspect, an embodiment of the present disclosure provides a data encryption method, including:

获取数据发送设备发送的伪公钥,其中,所述伪公钥为所述数据发送设备采用迭代仿射加密的方式对与迭代仿射秘钥一同生成的随机数明文进行加密操作后获得的;Obtaining a pseudo public key sent by the data sending device, wherein the pseudo public key is obtained after the data sending device encrypts the random number plaintext generated together with the iterative affine secret key by means of iterative affine encryption;

根据所述伪公钥,对所述待计算明文进行加密操作,获得第二目标密文;performing an encryption operation on the plaintext to be calculated according to the pseudo public key to obtain a second target ciphertext;

将所述第二目标密文发送至所述数据发送设备,使得所述数据发送设备根据第一目标密文与所述第二目标密文进行密文计算操作,其中,所述密文计算包括加法计算以及数乘计算中的一项或多项,所述第一目标密文为所述数据发送设备采用所述随机数明文对待计算数据加密后获得的。Sending the second target ciphertext to the data sending device, so that the data sending device performs a ciphertext calculation operation according to the first target ciphertext and the second target ciphertext, wherein the ciphertext calculation includes: One or more of addition calculation and number multiplication calculation, the first target ciphertext is obtained by the data sending device after encrypting the data to be calculated by using the random number plaintext.

第三方面,本公开实施例提供一种数据发送设备,包括:In a third aspect, an embodiment of the present disclosure provides a data sending device, including:

获取模块,用于获取随机数明文,其中,所述随机数明文为与迭代仿射秘钥一同生成的随机数;an acquisition module, configured to acquire a random number plaintext, wherein the random number plaintext is a random number generated together with an iterative affine key;

加密模块,用于根据所述迭代仿射秘钥对随机数进行加密操作,获得随机数密文,将所述随机数密文确定为伪公钥;an encryption module, configured to perform an encryption operation on a random number according to the iterative affine secret key, obtain a random number ciphertext, and determine the random number ciphertext as a pseudo public key;

发送模块,用于将所述伪公钥发送至数据接收设备,使得所述数据接收设备采用所述伪公钥对待计算明文进行数据加密操作。A sending module, configured to send the pseudo public key to a data receiving device, so that the data receiving device uses the pseudo public key to perform a data encryption operation on the plaintext to be calculated.

第四方面,本公开实施例提供一种数据接收设备,包括:In a fourth aspect, an embodiment of the present disclosure provides a data receiving device, including:

伪公钥获取模块,用于获取数据发送设备发送的伪公钥,其中,所述伪公钥为所述数据发送设备采用迭代仿射加密的方式对与迭代仿射秘钥一同生成的随机数明文进行加密操作后获得的;A pseudo-public key acquisition module, configured to obtain a pseudo-public key sent by a data sending device, wherein the pseudo-public key is a random number generated by the data sending device using an iterative affine encryption method together with the iterative affine key The plaintext is obtained after encryption operation;

处理模块,用于根据所述伪公钥,对所述待计算明文进行加密操作,获得第二目标密文;a processing module, configured to perform an encryption operation on the plaintext to be calculated according to the pseudo public key to obtain a second target ciphertext;

传输模块,用于将所述第二目标密文发送至所述数据发送设备,使得所述数据发送设备根据第一目标密文与所述第二目标密文进行密文计算操作,其中,所述密文计算包括加法计算以及数乘计算中的一项或多项,所述第一目标密文为所述数据发送设备采用所述随机数明文对待计算数据加密后获得的。A transmission module, configured to send the second target ciphertext to the data sending device, so that the data sending device performs a ciphertext calculation operation according to the first target ciphertext and the second target ciphertext, wherein the The ciphertext calculation includes one or more of addition calculation and number multiplication calculation, and the first target ciphertext is obtained by the data sending device after encrypting the data to be calculated by using the random number plaintext.

第五方面,本公开实施例提供一种电子设备包括:存储器,处理器;In a fifth aspect, an embodiment of the present disclosure provides an electronic device including: a memory, and a processor;

存储器;用于存储所述处理器可执行指令的存储器;memory; memory for storing instructions executable by the processor;

其中,其中,所述处理器用于调用所述存储器中的程序指令执行如第一方面或第二方面所述的数据加密方法。Wherein, the processor is configured to invoke the program instructions in the memory to execute the data encryption method according to the first aspect or the second aspect.

第六方面,本公开实施例提供一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机执行指令,所述计算机执行指令被处理器执行时用于实现如第一方面或第二方面所述的数据加密方法。In a sixth aspect, embodiments of the present disclosure provide a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when the computer-executable instructions are executed by a processor, are used to implement the first aspect or the first The data encryption method described in the second aspect.

第七方面,本公开实施例提供一种计算机程序产品,包括计算机程序,所述计算机程序在被处理器执行时实现根据如第一方面或第二方面所述的数据加密方法。In a seventh aspect, an embodiment of the present disclosure provides a computer program product, including a computer program that, when executed by a processor, implements the data encryption method according to the first aspect or the second aspect.

本公开实施例提供的数据加密方法、设备、计算机可读存储介质及产品,通过在产生迭代仿射秘钥的同时,生成随机数明文,采用该迭代仿射秘钥对随机数明文进行加密操作,获得伪公钥。将伪公钥发送至数据接收设备,从而数据接收设备能够采用该伪公钥对待计算明文进行数据加密。由于数据发送设备无需暴露迭代仿射秘钥的情况下,数据接收设备仍旧能够实现明文到密文的转换,从而能够在保证数据安全的基础上,实现密文级别的数据计算。数据传输过程安全性较高,因此适应性较强。The data encryption method, device, computer-readable storage medium and product provided by the embodiments of the present disclosure generate a random number plaintext while generating an iterative affine key, and use the iterative affine key to encrypt the random number plaintext , to obtain the fake public key. The pseudo public key is sent to the data receiving device, so that the data receiving device can use the pseudo public key to encrypt the plaintext to be calculated. Since the data sending device does not need to expose the iterative affine key, the data receiving device can still realize the conversion from plaintext to ciphertext, so that data computation at the ciphertext level can be realized on the basis of ensuring data security. The security of the data transmission process is high, so the adaptability is strong.

附图说明Description of drawings

此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description serve to explain the principles of the disclosure.

图1为本公开基于的系统架构示意图;1 is a schematic diagram of a system architecture on which the present disclosure is based;

图2为本公开实施例一提供的数据加密方法的流程示意图;2 is a schematic flowchart of a data encryption method provided in Embodiment 1 of the present disclosure;

图3为本公开实施例提供的伪公钥生成的流程示意图;FIG. 3 is a schematic flowchart of generating a pseudo public key according to an embodiment of the present disclosure;

图4为本公开实施例二提供的数据加密方法的流程示意图;4 is a schematic flowchart of a data encryption method according to Embodiment 2 of the present disclosure;

图5为本公开实施例三提供的数据加密方法的流程示意图;5 is a schematic flowchart of a data encryption method provided in Embodiment 3 of the present disclosure;

图6为本公开实施例四提供的数据发送设备的结构示意图;6 is a schematic structural diagram of a data sending device according to Embodiment 4 of the present disclosure;

图7为本公开实施例五提供的数据接收设备的结构示意图;7 is a schematic structural diagram of a data receiving device according to Embodiment 5 of the present disclosure;

图8为本公开实施例六提供的电子设备的结构示意图。FIG. 8 is a schematic structural diagram of an electronic device according to Embodiment 6 of the present disclosure.

通过上述附图,已示出本公开明确的实施例,后文中将有更详细的描述。这些附图和文字描述并不是为了通过任何方式限制本公开构思的范围,而是通过参考特定实施例为本领域技术人员说明本公开的概念。The above-mentioned drawings have shown clear embodiments of the present disclosure, and will be described in more detail hereinafter. These drawings and written descriptions are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the disclosed concepts to those skilled in the art by referring to specific embodiments.

具体实施方式Detailed ways

这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as recited in the appended claims.

首先对本公开实施例所涉及的名词进行解释:First, the terms involved in the embodiments of the present disclosure are explained:

同态加密:在数据密文上进行运算的结果可以等同于明文上的加法或者乘法运算的一种加密技术。Homomorphic encryption: An encryption technique in which the result of an operation on the ciphertext of the data can be equivalent to the addition or multiplication operation on the plaintext.

半同态加密:基本含义等同于同态加密,但是只能支持加法同态或乘法同态其中一种运算。Semi-homomorphic encryption: The basic meaning is the same as that of homomorphic encryption, but only one of additive homomorphism or multiplication homomorphism can be supported.

数乘同态:乘法同态指乘数与被乘数都是密文,数乘同态指的是乘数与被乘数其中一个是密文,另一个是明文。Multiplication homomorphism: Multiplication homomorphism means that both the multiplier and the multiplicand are ciphertext, and the multiplication homomorphism means that one of the multiplier and the multiplicand is the ciphertext, and the other is the plaintext.

针对上述提及的现有的迭代仿射加密技术安全性较低,适用性不高的技术问题,本公开提供了一种数据加密方法、设备、计算机可读存储介质及产品。In view of the above-mentioned technical problems of low security and low applicability of the existing iterative affine encryption technology, the present disclosure provides a data encryption method, device, computer-readable storage medium and product.

需要说明的是,本公开提供数据加密方法、设备、计算机可读存储介质及产品可运用在各种多方数据安全传输的场景中。It should be noted that the present disclosure provides data encryption methods, devices, computer-readable storage media and products that can be used in various scenarios of multi-party data secure transmission.

现有的迭代仿射加密方法一般为对称加密。若想要实现密文层面的加密,就需要将迭代仿射密码同步给数据接收方,使得数据接收方能够采用该迭代仿射密码进行数据加密。但是,此时数据传输相当于明文传输。Existing iterative affine encryption methods are generally symmetric encryption. To achieve encryption at the ciphertext level, it is necessary to synchronize the iterative affine cipher to the data receiver, so that the data receiver can use the iterative affine cipher for data encryption. However, at this time, the data transmission is equivalent to plaintext transmission.

在解决上述技术问题的过程中,发明人通过研究发现,为了能够在保证数据安全的基础上,实现密文级别的数据计算,可以设计一个伪公钥,使得数据接收端能够采用该伪公钥进行数据的加密操作。具体地,在产生迭代仿射秘钥的同时,生成随机数明文,采用该迭代仿射秘钥对随机数明文进行加密操作,获得伪公钥。将伪公钥发送至数据接收设备,从而数据接收设备能够采用该伪公钥对待计算明文进行数据加密。从而数据发送设备在无需暴露迭代仿射秘钥的情况下,数据接收设备仍旧能够实现明文到密文的转换。In the process of solving the above technical problems, the inventor found through research that in order to realize data calculation at the ciphertext level on the basis of ensuring data security, a pseudo public key can be designed, so that the data receiving end can use the pseudo public key Perform data encryption operations. Specifically, while generating the iterative affine key, a random number plaintext is generated, and the random number plaintext is encrypted by using the iterative affine key to obtain a pseudo public key. The pseudo public key is sent to the data receiving device, so that the data receiving device can use the pseudo public key to encrypt the plaintext to be calculated. Therefore, the data receiving device can still realize the conversion from plaintext to ciphertext without exposing the iterative affine key.

下面以具体地实施例对本公开的技术方案以及本公开的技术方案如何解决上述技术问题进行详细说明。下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例中不再赘述。下面将结合附图,对本公开的实施例进行描述。The technical solutions of the present disclosure and how the technical solutions of the present disclosure solve the above-mentioned technical problems will be described in detail below with specific examples. The following specific embodiments may be combined with each other, and the same or similar concepts or processes may not be repeated in some embodiments. The embodiments of the present disclosure will be described below with reference to the accompanying drawings.

图1为本公开基于的系统架构示意图,如图1所示,本公开基于的系统架构至少包括:数据发送设备1以及数据接收设备2,其中,数据发送设备1以及数据接收设备2均设置有数据加密装置,该数据加密装置可采用C/C++、Java、Shell或Python等语言编写。FIG. 1 is a schematic diagram of a system architecture on which the present disclosure is based. As shown in FIG. 1 , the system architecture on which the present disclosure is based at least includes: a data sending device 1 and a data receiving device 2, wherein the data sending device 1 and the data receiving device 2 are both provided with A data encryption device, the data encryption device can be written in languages such as C/C++, Java, Shell or Python.

图2为本公开实施例一提供的数据加密方法的流程示意图,如图2所示,该方法包括:FIG. 2 is a schematic flowchart of a data encryption method according to Embodiment 1 of the present disclosure. As shown in FIG. 2 , the method includes:

步骤201、获取随机数明文,其中,所述随机数明文为与迭代仿射秘钥一同生成的随机数。Step 201: Obtain a random number plaintext, where the random number plaintext is a random number generated together with an iterative affine key.

本实施例的执行主体为数据加密装置,该数据加密装置可耦合于数据发送设备中,该数据发送设备能够与数据接收设备通信连接,从而能够进行数据交互。The execution body of this embodiment is a data encryption device, and the data encryption device can be coupled to a data transmission device, and the data transmission device can be communicatively connected with a data reception device, thereby enabling data interaction.

在本实施方式中,为了能够在保证数据安全的基础上,实现密文级别的数据计算,可以设计一个伪公钥,使得数据接收端能够采用该伪公钥进行数据的加密操作。In this embodiment, in order to realize data calculation at the ciphertext level on the basis of ensuring data security, a pseudo public key can be designed, so that the data receiving end can use the pseudo public key to perform data encryption operations.

相比于普通的迭代仿射加密方法,具有伪公钥加密方法的秘钥数据结构中,会在秘钥生成时生成一个随机数,然后使用加密方法加密此随机数,作为加密伪公钥。可以通过秘钥的get_public_key()方法获取该伪公钥。为了实现伪公钥的生成,可以获取该随机数明文。Compared with the ordinary iterative affine encryption method, in the secret key data structure with the pseudo public key encryption method, a random number is generated when the secret key is generated, and then the random number is encrypted by the encryption method as the encrypted pseudo public key. The pseudo public key can be obtained through the get_public_key() method of the key. In order to realize the generation of the pseudo public key, the plaintext of the random number can be obtained.

步骤202、根据所述迭代仿射秘钥对随机数进行加密操作,获得随机数密文,将所述随机数密文确定为伪公钥。Step 202: Perform an encryption operation on a random number according to the iterative affine key to obtain a random number ciphertext, and determine the random number ciphertext as a pseudo public key.

在本实施方式中,在获取到随机数明文之后,能够对该随机数明文进行加密操作,生成与该随机数明文对应的随机数密文,将该随机数密文确定为伪公钥。In this embodiment, after the random number plaintext is obtained, an encryption operation can be performed on the random number plaintext to generate a random number ciphertext corresponding to the random number plaintext, and the random number ciphertext is determined as a pseudo public key.

具体地,可以采用该迭代仿射秘钥对随机数明文进行仿射加密操作,获得随机数密文。可选地,可以对该随机数明文进行一次仿射加密操作,也可以进行迭代仿射加密操作,本公开对此不做限制。Specifically, the iterative affine key can be used to perform an affine encryption operation on the random number plaintext to obtain the random number ciphertext. Optionally, an affine encryption operation may be performed on the plaintext of the random number, or an iterative affine encryption operation may be performed, which is not limited in the present disclosure.

步骤203、将所述伪公钥发送至数据接收设备,使得所述数据接收设备采用所述伪公钥对待计算明文进行数据加密操作。Step 203: Send the pseudo public key to the data receiving device, so that the data receiving device uses the pseudo public key to perform a data encryption operation on the plaintext to be calculated.

在本实施方式中,在根据随机数明文生成对应的伪公钥之后,可以将该伪公钥发送至数据接收设备。相应地,数据接收设备在获取到该伪公钥之后,能够采用该伪公钥对待计算明文进行数据加密操作。从而能够将待计算明文转换为密文,进而能够根据该密文与数据发送方通过迭代仿射加密后的密文进行密文同态加密操作,无需将迭代仿射过程中的迭代仿射秘钥发送给数据接收方,能够提高数据传输的安全性。In this embodiment, after the corresponding pseudo public key is generated according to the plaintext of the random number, the pseudo public key may be sent to the data receiving device. Correspondingly, after acquiring the pseudo public key, the data receiving device can use the pseudo public key to perform a data encryption operation on the plaintext to be calculated. In this way, the plaintext to be calculated can be converted into ciphertext, and then the ciphertext homomorphic encryption operation can be performed according to the ciphertext and the ciphertext encrypted by the data sender through iterative affine encryption, without secreting the iterative affine in the iterative affine process. The key is sent to the data receiver, which can improve the security of data transmission.

进一步地,在实施例一的基础上,步骤202具体包括:Further, on the basis of Embodiment 1, step 202 specifically includes:

根据所述迭代仿射秘钥,采用迭代仿射加密的方式对所述随机数明文进行加密操作,获得所述随机数密文。According to the iterative affine key, the random number plaintext is encrypted by adopting an iterative affine encryption method to obtain the random number ciphertext.

在本实施例中,具体可以采用迭代仿射秘钥对于迭代仿射秘钥同时生成的随机数明文进行迭代仿射加密操作,获得随机数明文。可以对其进行预设次数N的迭代仿射加密操作。In this embodiment, the iterative affine key may be used to perform an iterative affine encryption operation on the random number plaintext simultaneously generated by the iterative affine key to obtain the random number plaintext. Iterative affine encryption operations for a preset number of N can be performed on it.

可选地,任意一种具有同态加密的加密技术均可以通过上传方法实现伪公钥的生成以及使用,其中,具有同态加密的加密技术包括半同态加密以及全同态加密。Optionally, any encryption technology with homomorphic encryption can realize the generation and use of a pseudo public key by uploading, wherein the encryption technology with homomorphic encryption includes semi-homomorphic encryption and full homomorphic encryption.

进一步地,在实施例一的基础上,所述根据所述迭代仿射秘钥,采用迭代仿射加密的方式对所述随机数明文进行加密操作,获得所述随机数密文,包括:Further, on the basis of Embodiment 1, according to the iterative affine key, the random number plaintext is encrypted by means of iterative affine encryption to obtain the random number ciphertext, including:

对所述随机数明文中的浮点数进行小数点移位操作,获得与随机数明文对应的整数明文;Perform a decimal point shift operation on the floating point number in the random number plaintext to obtain an integer plaintext corresponding to the random number plaintext;

采用所述迭代仿射秘钥,对所述整数明文进行预设次数的迭代仿射加密操作,获得所述随机数密文。Using the iterative affine key, perform a preset number of iterative affine encryption operations on the integer plaintext to obtain the random number ciphertext.

在本实施例中,可以通过尺度变换将随机数明文中的浮点数转换成整数,获得与随机数明文对应的整数明文。此时浮点数被扩大了一定的数据位,但小数的精度已经被编码到整数域上,然后采用迭代仿射秘钥,经过预设次数的迭代仿射加密操作与模幂运算,即可得到最终的随机数密文。In this embodiment, the floating point number in the plaintext of the random number can be converted into an integer through scale transformation, so as to obtain the plaintext of the integer corresponding to the plaintext of the random number. At this time, the floating-point number is expanded by a certain number of data bits, but the precision of the decimal has been encoded into the integer field, and then the iterative affine key is used, and after a preset number of iterative affine encryption operations and modular exponentiation operations, the The final random number ciphertext.

图3为本公开实施例提供的伪公钥生成的流程示意图,如图3所示,首先需要获取随机数明文31,对该随机数明文31进行小数点移位操作,获得整数明文32,对该整数明文32进行N次的迭代仿射加密操作,获得随机数密文33。FIG. 3 is a schematic flowchart of a pseudo public key generation provided by an embodiment of the present disclosure. As shown in FIG. 3 , first, a random number plaintext 31 needs to be obtained, and a decimal point shift operation is performed on the random number plaintext 31 to obtain an integer plaintext 32 . The integer plaintext 32 performs N times of iterative affine encryption operations to obtain the random number ciphertext 33 .

本实施例提供的数据加密方法,通过在产生迭代仿射秘钥的同时,生成随机数明文,采用该迭代仿射秘钥对随机数明文进行加密操作,获得伪公钥。将伪公钥发送至数据接收设备,从而数据接收设备能够采用该伪公钥对待计算明文进行数据加密。由于数据发送设备无需暴露迭代仿射秘钥的情况下,数据接收设备仍旧能够实现明文到密文的转换,从而能够在保证数据安全的基础上,实现密文级别的数据计算。数据传输过程安全性较高,因此适应性较强。The data encryption method provided by this embodiment generates a random number plaintext while generating an iterative affine key, and uses the iterative affine key to encrypt the random number plaintext to obtain a pseudo public key. The pseudo public key is sent to the data receiving device, so that the data receiving device can use the pseudo public key to encrypt the plaintext to be calculated. Since the data sending device does not need to expose the iterative affine key, the data receiving device can still realize the conversion from plaintext to ciphertext, so that data computation at the ciphertext level can be realized on the basis of ensuring data security. The security of the data transmission process is high, so the adaptability is strong.

图4为本公开实施例二提供的数据加密方法的流程示意图,在实施例一的基础上,如图4所示,步骤201之后,还包括:FIG. 4 is a schematic flowchart of the data encryption method provided in Embodiment 2 of the present disclosure. On the basis of Embodiment 1, as shown in FIG. 4 , after step 201, the method further includes:

步骤401、获取待计算数据。Step 401: Acquire data to be calculated.

步骤402、将所述待计算数据与所述随机数明文相乘,获得预处理数据。Step 402: Multiply the data to be calculated by the plaintext of the random number to obtain preprocessed data.

步骤403、根据所述迭代仿射秘钥,采用迭代仿射加密的方式对所述预处理数据进行加密操作,获得第一目标密文。Step 403: According to the iterative affine key, perform an encryption operation on the preprocessed data by means of iterative affine encryption to obtain a first target ciphertext.

在本实施方式中,在数据发送设备进行数据传输时,可以根据随机数明文以及迭代仿射秘钥进行数据加密操作。具体地,首先可以获取待计算数据,将待计算数据与随机数明文相乘,获得预处理数据。根据迭代仿射秘钥,对该预处理数据进行迭代仿射加密操作,获得第一目标密文。In this embodiment, when the data transmission device performs data transmission, the data encryption operation can be performed according to the random number plaintext and the iterative affine key. Specifically, the data to be calculated can be obtained first, and the data to be calculated can be multiplied by the plaintext of the random number to obtain the preprocessed data. According to the iterative affine key, an iterative affine encryption operation is performed on the preprocessed data to obtain the first target ciphertext.

相应地,数据发送设备还可以对该第一目标密文进行解密操作。具体地,在获取到第一目标密文之后,可以进行迭代仿射的逆变换过程(即与加密过程运算步骤相同,但运算参数与加密过程反序,且解密参数为加密参数的逆),最后乘以随机数的逆,即可得到与第一目标密文对应的待计算数据。Correspondingly, the data sending device may also perform a decryption operation on the first target ciphertext. Specifically, after obtaining the first target ciphertext, an iterative affine inverse transformation process can be performed (that is, the operation steps of the encryption process are the same, but the operation parameters are reversed from the encryption process, and the decryption parameters are the inverse of the encryption parameters), Finally, multiply the inverse of the random number to obtain the data to be calculated corresponding to the first target ciphertext.

可选地,在获得预处理数据之后,还可以对预处理数据中的浮点数转换为整数。相应地,在对第一目标密文进行逆变换之后,还可以对逆变换的结果中的整数转换为浮点数,再乘以随机数的逆,获得与第一目标密文对应的待计算数据。Optionally, after the preprocessing data is obtained, the floating point numbers in the preprocessing data can also be converted into integers. Correspondingly, after performing the inverse transformation on the first target ciphertext, the integer in the result of the inverse transformation can also be converted into a floating point number, and then multiplied by the inverse of the random number to obtain the data to be calculated corresponding to the first target ciphertext. .

进一步地,在上述任一实施例的基础上,步骤203之后,还包括:Further, on the basis of any of the above embodiments, after step 203, it also includes:

获取数据接收设备发送的第二目标密文,所述第一目标密文与第二目标密文处于相同的密文域内,其中,所述第二目标密文为数据接收设备采用所述伪公钥对所述待计算明文进行数据加密操作后获得的;Obtain the second target ciphertext sent by the data receiving device, the first target ciphertext and the second target ciphertext are in the same ciphertext domain, wherein the second target ciphertext is the data receiving device using the pseudo public The key is obtained after performing a data encryption operation on the plaintext to be calculated;

根据所述第一目标密文与所述第二目标密文进行密文计算操作,获得计算结果,其中,所述密文计算包括加法计算以及数乘计算中的一项或多项。A ciphertext calculation operation is performed according to the first target ciphertext and the second target ciphertext to obtain a calculation result, wherein the ciphertext calculation includes one or more of addition calculation and number multiplication calculation.

在本实施例中,数据接收设备在获取到该伪公钥之后,能够采用伪公钥对需要进行数据传输的待计算明文进行数据加密操作,获得第二目标密文。相应地,还可以获取数据接收设备发送的第二目标密文,其中,该第二目标密文与第一目标密文处于相同的密文域内,从而二者能够进行密文级别的数据计算操作。因此,可以根据第一目标密文与第二目标密文进行密文计算操作,获得计算结果,其中,密文计算包括加法计算以及乘法计算中的一项或多项。In this embodiment, after acquiring the pseudo public key, the data receiving device can use the pseudo public key to perform a data encryption operation on the plaintext to be calculated for data transmission to obtain the second target ciphertext. Correspondingly, the second target ciphertext sent by the data receiving device can also be acquired, wherein the second target ciphertext and the first target ciphertext are in the same ciphertext domain, so that the two can perform ciphertext-level data computing operations. . Therefore, a ciphertext calculation operation can be performed according to the first target ciphertext and the second target ciphertext to obtain a calculation result, wherein the ciphertext calculation includes one or more of addition calculation and multiplication calculation.

本实施例提供的数据加密方法,通过在数据发送设备进行数据传输时,可以根据随机数明文以及迭代仿射秘钥进行数据加密操作,从而能够使得第一目标密文与第二目标密文处于同一密文域内,在保证数据安全的基础上,实现密文级别的数据计算。In the data encryption method provided by this embodiment, when the data transmission device performs data transmission, the data encryption operation can be performed according to the plaintext of the random number and the iterative affine key, so that the first target ciphertext and the second target ciphertext can be kept in the same position. In the same ciphertext field, on the basis of ensuring data security, ciphertext-level data calculation is realized.

图5为本公开实施例三提供的数据加密方法的流程示意图,如图5所示,该方法包括:FIG. 5 is a schematic flowchart of a data encryption method according to Embodiment 3 of the present disclosure. As shown in FIG. 5 , the method includes:

步骤501、获取数据发送设备发送的伪公钥,其中,所述伪公钥为所述数据发送设备采用迭代仿射加密的方式对与迭代仿射秘钥一同生成的随机数明文进行加密操作后获得的。Step 501: Obtain a pseudo public key sent by the data sending device, wherein the pseudo public key is obtained after the data sending device encrypts the random number plaintext generated together with the iterative affine secret key by means of iterative affine encryption. acquired.

步骤502、根据所述伪公钥,对所述待计算明文进行加密操作,获得第二目标密文。Step 502: Perform an encryption operation on the plaintext to be calculated according to the pseudo public key to obtain a second target ciphertext.

步骤503、根据所述数据发送设备发送的第一目标密文与所述第二目标密文进行密文计算操作,其中,所述密文计算包括加法计算以及数乘计算中的一项或多项,所述第一目标密文为所述数据发送设备采用所述随机数明文对待计算数据加密后获得的。Step 503: Perform a ciphertext calculation operation according to the first target ciphertext and the second target ciphertext sent by the data sending device, wherein the ciphertext calculation includes one or more of addition calculation and number multiplication calculation. item, the first target ciphertext is obtained by the data sending device after encrypting the data to be calculated by using the random number plaintext.

本实施例的执行主体为数据加密装置,该数据加密装置可耦合于数据接收设备中,该数据接收设备能够与数据发送设备通信连接。The execution body of this embodiment is a data encryption device, and the data encryption device can be coupled to a data receiving device, and the data receiving device can be connected in communication with the data sending device.

在本实施方式中,数据接收设备能够获取数据发送设备发送的伪公钥。其中,相比于普通的迭代仿射加密方法,具有伪公钥加密方法的秘钥数据结构中,会在秘钥生成时生成一个随机数明文。数据发送设备可以对该随机数明文进行迭代仿射加密操作,获得伪公钥,从而数据发送设备能够将该伪公钥发送至数据接收设备。数据接收设备在获取到该伪公钥之后,能够采用伪公钥对需要进行数据传输的待计算明文进行数据加密操作,获得第二目标密文,还可以根据所述数据发送设备发送的第一目标密文与第二目标密文进行密文计算操作,其中,该第二目标密文与第一目标密文处于相同的密文域内,从而二者能够进行密文级别的数据计算操作。密文计算包括加法计算以及数乘计算中的一项或多项。In this embodiment, the data receiving device can obtain the pseudo public key sent by the data transmitting device. Among them, compared with the common iterative affine encryption method, in the secret key data structure with the pseudo public key encryption method, a random number plaintext will be generated when the secret key is generated. The data sending device can perform an iterative affine encryption operation on the plaintext of the random number to obtain a pseudo public key, so that the data sending device can send the pseudo public key to the data receiving device. After acquiring the pseudo public key, the data receiving device can use the pseudo public key to perform data encryption operations on the plaintext to be calculated that needs to be transmitted to obtain the second target ciphertext. A ciphertext calculation operation is performed on the target ciphertext and the second target ciphertext, wherein the second target ciphertext and the first target ciphertext are in the same ciphertext domain, so that they can perform ciphertext-level data calculation operations. The ciphertext calculation includes one or more of addition calculation and number multiplication calculation.

进一步地,在实施例三的基础上,步骤502具体包括:Further, on the basis of Embodiment 3, step 502 specifically includes:

将所述待计算明文与所述伪公钥进行数乘操作,获得第二目标密文。A number multiplication operation is performed on the plaintext to be calculated and the pseudo public key to obtain a second target ciphertext.

在本实施例中,伪公钥加密操作具体可以分为隐形应用以及显性应用。其中,伪公钥加密的隐性应用即明文与密文的加法运算,在密文与明文进行加法运算时,待计算明文需要先与伪公钥cipher_scale做数乘运算,即可以将待计算明文转换为密文,然后待计算明文与第一目标密文的运算就转换成为了第一目标密文与第二目标密文的加法。In this embodiment, the pseudo-public key encryption operation can be specifically classified into stealth application and explicit application. Among them, the implicit application of pseudo-public key encryption is the addition of plaintext and ciphertext. When ciphertext and plaintext are added, the plaintext to be calculated needs to be multiplied with the pseudo-public key cipher_scale, that is, the plaintext to be calculated can be multiplied Converted to ciphertext, and then the operation of the plaintext to be calculated and the first target ciphertext is converted into the addition of the first target ciphertext and the second target ciphertext.

进一步地,在实施例三的基础上,步骤502具体包括:Further, on the basis of Embodiment 3, step 502 specifically includes:

对所述伪公钥进行赋值初始化操作,获得目标伪公钥,其中,所述目标伪公钥在赋值初始化之后具有预设的目标属性。Perform an assignment initialization operation on the pseudo public key to obtain a target pseudo public key, wherein the target pseudo public key has a preset target attribute after assignment initialization.

采用所述目标伪公钥对所述待计算明文进行加密操作,获得所述第二目标密文。The plaintext to be calculated is encrypted by using the target pseudo public key to obtain the second target ciphertext.

在本实施例中,伪公钥加密的显性应用即使用伪公钥cipher_scale直接进行待计算明文的加密,因为cipher_scale是一个特殊的密文,所以其也具有cipher_scale属性,在初始化过程中,可以直接将该参数设置为一个负数就可以与一般的密文区别开。因为加密过程都需要经过模幂运算,所以密文不可能是负数,基于此可以限制一般密文使用加密函数。此外,使用伪公钥加密生成的密文也必须要具有与该秘钥加密的其他密文相同的cipher_scale属性,所以,伪公钥加密过程中,需要将伪公钥密文自身作为密文的cipher_scale属性进行赋值初始化,获得目标伪公钥,其中,所述目标伪公钥在赋值初始化之后具有预设的目标属性。采用所述目标伪公钥对所述待计算明文进行加密操作,获得所述第二目标密文。能够使得伪公钥加密的第二目标密文与直接加密的密文具有一致性。In this embodiment, the explicit application of pseudo-public key encryption is to directly encrypt the plaintext to be calculated by using the pseudo-public key cipher_scale. Because cipher_scale is a special ciphertext, it also has the cipher_scale attribute. During the initialization process, you can Directly setting this parameter to a negative number can distinguish it from general ciphertext. Because the encryption process requires modular exponentiation, the ciphertext cannot be negative. Based on this, the general ciphertext can be restricted from using the encryption function. In addition, the ciphertext generated using pseudo-public key encryption must also have the same cipher_scale attribute as other ciphertexts encrypted by the secret key. Therefore, in the pseudo-public key encryption process, the pseudo-public key ciphertext itself needs to be used as the ciphertext The cipher_scale attribute is initialized by assignment to obtain a target pseudo-public key, wherein the target pseudo-public key has a preset target attribute after the assignment and initialization. The plaintext to be calculated is encrypted by using the target pseudo public key to obtain the second target ciphertext. The second target ciphertext encrypted by the pseudo-public key can be made consistent with the directly encrypted ciphertext.

进一步地,在实施例三的基础上,所述采用所述目标伪公钥对所述待计算明文进行加密操作,获得所述第二目标密文,包括:Further, on the basis of Embodiment 3, performing an encryption operation on the plaintext to be calculated by using the target pseudo-public key to obtain the second target ciphertext, including:

将所述目标伪公钥与所述待计算明文进行乘法操作,获得第二目标密文。A multiplication operation is performed on the target pseudo-public key and the to-be-computed plaintext to obtain a second target ciphertext.

具体地,可以对目标伪公钥与待计算明文进行乘法操作,获得第二目标密文。Specifically, a multiplication operation may be performed on the target pseudo-public key and the plaintext to be calculated to obtain the second target ciphertext.

本实施例提供的数据加密方法,通过在获取到该伪公钥之后,能够采用伪公钥对需要进行数据传输的待计算明文进行数据加密操作,获得第二目标密文,还可以将该第二目标密文发送至数据发送设备,从而数据发送设备无需暴露迭代仿射秘钥的情况下,数据接收设备仍旧能够实现明文到密文的转换,从而能够在保证数据安全的基础上,实现密文级别的数据计算。In the data encryption method provided by this embodiment, after obtaining the pseudo public key, the pseudo public key can be used to perform data encryption operation on the plaintext to be calculated that needs to be transmitted to obtain the second target ciphertext, and the second target ciphertext can also be obtained. The two-target ciphertext is sent to the data sending device, so that the data receiving device can still realize the conversion from plaintext to ciphertext without exposing the iterative affine key, so that encryption can be realized on the basis of ensuring data security. Text-level data calculations.

图6为本公开实施例四提供的数据发送设备的结构示意图,如图6所示,该数据发送设备包括:获取模块61、加密模块62以及发送模块63。其中,获取模块61,用于获取随机数明文,其中,所述随机数明文为与迭代仿射秘钥一同生成的随机数;加密模块62,用于根据所述迭代仿射秘钥对随机数进行加密操作,获得随机数密文,将所述随机数密文确定为伪公钥;发送模块63,用于将所述伪公钥发送至数据接收设备,使得所述数据接收设备采用所述伪公钥对待计算明文进行数据加密操作。FIG. 6 is a schematic structural diagram of a data sending device according to Embodiment 4 of the present disclosure. As shown in FIG. 6 , the data sending device includes an obtaining module 61 , an encryption module 62 and a sending module 63 . The obtaining module 61 is used to obtain the random number plaintext, wherein the random number plaintext is a random number generated together with the iterative affine key; the encryption module 62 is used to pair the random number according to the iterative affine key. Perform an encryption operation, obtain a random number ciphertext, and determine the random number ciphertext as a pseudo public key; the sending module 63 is used to send the pseudo public key to the data receiving device, so that the data receiving device adopts the The pseudo public key performs data encryption operations on the plaintext to be computed.

进一步地,在实施例四的基础上,所述加密模块用于:根据所述迭代仿射秘钥,采用迭代仿射加密的方式对所述随机数明文进行加密操作,获得所述随机数密文。Further, on the basis of Embodiment 4, the encryption module is configured to: perform an encryption operation on the plaintext of the random number by using an iterative affine encryption method according to the iterative affine key to obtain the random number secret key. arts.

进一步地,在实施例四的基础上,所述加密模块用于:对所述随机数明文中的浮点数进行小数点移位操作,获得与随机数明文对应的整数明文;采用所述迭代仿射秘钥,对所述整数明文进行预设次数的迭代仿射加密操作,获得所述随机数密文。Further, on the basis of Embodiment 4, the encryption module is used to: perform a decimal point shift operation on the floating point number in the plaintext of the random number to obtain an integer plaintext corresponding to the plaintext of the random number; adopt the iterative affine A secret key, which performs a preset number of iterative affine encryption operations on the integer plaintext to obtain the random number ciphertext.

进一步地,在上述任一实施例的基础上,所述装置还包括:待计算数据获取模块,用于获取待计算数据;计算模块,用于将所述待计算数据与所述随机数明文相乘,获得预处理数据;加密处理模块,用于根据所述迭代仿射秘钥,采用迭代仿射加密的方式对所述预处理数据进行加密操作,获得第一目标密文。Further, on the basis of any of the above-mentioned embodiments, the device further includes: a data acquisition module to be calculated, for acquiring the data to be calculated; a calculation module, for comparing the data to be calculated with the plaintext of the random number multiplication to obtain preprocessed data; an encryption processing module, configured to perform an encryption operation on the preprocessed data by means of iterative affine encryption according to the iterative affine key to obtain the first target ciphertext.

进一步地,在上述任一实施例的基础上,所述装置还包括:获取模块,用于获取数据接收设备发送的第二目标密文,所述第一目标密文与第二目标密文处于相同的密文域内,其中,所述第二目标密文为数据接收设备采用所述伪公钥对所述待计算明文进行数据加密操作后获得的;计算模块,还用于根据所述第一目标密文与所述第二目标密文进行密文计算操作,获得计算结果,其中,所述密文计算包括加法计算以及数乘计算中的一项或多项。Further, on the basis of any of the above-mentioned embodiments, the apparatus further includes: an acquisition module configured to acquire a second target ciphertext sent by the data receiving device, where the first target ciphertext and the second target ciphertext are in the same In the same ciphertext field, wherein, the second target ciphertext is obtained after the data receiving device uses the pseudo public key to perform data encryption on the plaintext to be calculated; A ciphertext calculation operation is performed on the target ciphertext and the second target ciphertext to obtain a calculation result, wherein the ciphertext calculation includes one or more of addition calculation and number multiplication calculation.

图7为本公开实施例五提供的数据接收设备的结构示意图,如图7所示,该数据接收设备包括:伪公钥获取模块71、处理模块72以及传输模块73。其中,伪公钥获取模块71,用于获取数据发送设备发送的伪公钥,其中,所述伪公钥为所述数据发送设备采用迭代仿射加密的方式对与迭代仿射秘钥一同生成的随机数明文进行加密操作后获得的;处理模块72,用于根据所述伪公钥,对所述待计算明文进行加密操作,获得第二目标密文;传输模块73,用于根据所述数据发送设备发送的第一目标密文与所述第二目标密文进行密文计算操作,其中,所述密文计算包括加法计算以及数乘计算中的一项或多项,所述第一目标密文为所述数据发送设备采用所述随机数明文对待计算数据加密后获得的。FIG. 7 is a schematic structural diagram of a data receiving device according to Embodiment 5 of the present disclosure. As shown in FIG. 7 , the data receiving device includes: a pseudo-public key acquisition module 71 , a processing module 72 , and a transmission module 73 . The pseudo public key acquisition module 71 is configured to obtain a pseudo public key sent by the data sending device, wherein the pseudo public key is generated by the data sending device using iterative affine encryption together with the iterative affine key The random number plaintext is obtained after encrypting the plaintext; the processing module 72 is used to encrypt the plaintext to be calculated according to the pseudo public key to obtain the second target ciphertext; the transmission module 73 is used to A ciphertext calculation operation is performed on the first target ciphertext sent by the data sending device and the second target ciphertext, wherein the ciphertext calculation includes one or more of addition calculation and number multiplication calculation. The target ciphertext is obtained by the data sending device after encrypting the data to be calculated by using the random number plaintext.

进一步地,在实施例五的基础上,所述处理模块用于:将所述待计算明文与所述伪公钥进行数乘操作,获得第二目标密文。Further, on the basis of Embodiment 5, the processing module is configured to: perform a digital multiplication operation on the plaintext to be calculated and the pseudo public key to obtain a second target ciphertext.

进一步地,在实施例五的基础上,所述处理模块用于:对所述伪公钥进行赋值初始化操作,获得目标伪公钥,其中,所述目标伪公钥在赋值初始化之后具有预设的目标属性;采用所述目标伪公钥对所述待计算明文进行加密操作,获得所述第二目标密文。Further, on the basis of Embodiment 5, the processing module is configured to: perform an assignment initialization operation on the pseudo public key to obtain a target pseudo public key, wherein the target pseudo public key has a preset value after assignment initialization. The target attribute; using the target pseudo public key to encrypt the plaintext to be calculated to obtain the second target ciphertext.

进一步地,在实施例五的基础上,所述处理模块用于:将所述目标伪公钥与所述待计算明文进行乘法操作,获得第二目标密文。Further, on the basis of Embodiment 5, the processing module is configured to: perform a multiplication operation on the target pseudo-public key and the plaintext to be calculated to obtain a second target ciphertext.

本公开又一实施例还提供了一种电子设备,包括:存储器,处理器;Another embodiment of the present disclosure also provides an electronic device, including: a memory, and a processor;

存储器;用于存储所述处理器可执行指令的存储器;memory; memory for storing instructions executable by the processor;

其中,其中,所述处理器用于调用所述存储器中的程序指令执行如上述任一实施例所述的数据加密方法。Wherein, the processor is configured to call program instructions in the memory to execute the data encryption method according to any one of the foregoing embodiments.

本公开又一实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机执行指令,所述计算机执行指令被处理器执行时用于实现如上述任一实施例所述的数据加密方法。Yet another embodiment of the present disclosure further provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and when executed by a processor, the computer-executable instructions are used to implement any of the foregoing embodiments the data encryption method.

本公开又一实施例还提供了一种计算机程序产品,包括计算机程序,所述计算机程序在被处理器执行时实现如上述任一实施例所述的数据加密方法。Yet another embodiment of the present disclosure further provides a computer program product, including a computer program that, when executed by a processor, implements the data encryption method according to any of the foregoing embodiments.

图8为本公开实施例六提供的电子设备的结构示意图,该设备可以是移动电话,计算机,数字广播终端,消息收发设备,平板设备,医疗设备,个人数字助理等。8 is a schematic structural diagram of an electronic device according to Embodiment 6 of the present disclosure. The device may be a mobile phone, a computer, a digital broadcasting terminal, a message sending and receiving device, a tablet device, a medical device, a personal digital assistant, and the like.

如图8所示,设备800可以包括以下一个或多个组件:处理组件802,存储器804,电源组件806,多媒体组件808,音频组件810,输入/输出(I/O)接口812,传感器组件814,以及通信组件816。As shown in FIG. 8, device 800 may include one or more of the following components: processing component 802, memory 804, power supply component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814 , and the communication component 816 .

处理组件802通常控制设备800的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件802可以包括一个或多个处理器820来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件802可以包括一个或多个模块,便于处理组件802和其他组件之间的交互。例如,处理组件802可以包括多媒体模块,以方便多媒体组件808和处理组件802之间的交互。The processing component 802 generally controls the overall operation of the device 800, such as operations associated with display, phone calls, data communications, camera operations, and recording operations. The processing component 802 can include one or more processors 820 to execute instructions to perform all or some of the steps of the methods described above. Additionally, processing component 802 may include one or more modules that facilitate interaction between processing component 802 and other components. For example, processing component 802 may include a multimedia module to facilitate interaction between multimedia component 808 and processing component 802.

存储器804被配置为存储各种类型的数据以支持在设备800的操作。这些数据的示例包括用于在设备800上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器804可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。Memory 804 is configured to store various types of data to support operation at device 800 . Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and the like. Memory 804 may be implemented by any type of volatile or nonvolatile storage device or combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Magnetic or Optical Disk.

电源组件806为设备800的各种组件提供电力。电源组件806可以包括电源管理系统,一个或多个电源,及其他与为设备800生成、管理和分配电力相关联的组件。Power supply assembly 806 provides power to various components of device 800 . Power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to device 800 .

多媒体组件808包括在所述设备800和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件808包括一个前置摄像头和/或后置摄像头。当设备800处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。Multimedia component 808 includes a screen that provides an output interface between the device 800 and the user. In some embodiments, the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touch, swipe, and gestures on the touch panel. The touch sensor may not only sense the boundaries of a touch or swipe action, but also detect the duration and pressure associated with the touch or swipe action. In some embodiments, the multimedia component 808 includes a front-facing camera and/or a rear-facing camera. When the device 800 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each of the front and rear cameras can be a fixed optical lens system or have focal length and optical zoom capability.

音频组件810被配置为输出和/或输入音频信号。例如,音频组件810包括一个麦克风(MIC),当设备800处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器804或经由通信组件816发送。在一些实施例中,音频组件810还包括一个扬声器,用于输出音频信号。Audio component 810 is configured to output and/or input audio signals. For example, audio component 810 includes a microphone (MIC) that is configured to receive external audio signals when device 800 is in operating modes, such as call mode, recording mode, and voice recognition mode. The received audio signal may be further stored in memory 804 or transmitted via communication component 816 . In some embodiments, audio component 810 also includes a speaker for outputting audio signals.

I/O接口812为处理组件802和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。The I/O interface 812 provides an interface between the processing component 802 and a peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to: home button, volume buttons, start button, and lock button.

传感器组件814包括一个或多个传感器,用于为设备800提供各个方面的状态评估。例如,传感器组件814可以检测到设备800的打开/关闭状态,组件的相对定位,例如所述组件为设备800的显示器和小键盘,传感器组件814还可以检测设备800或设备800一个组件的位置改变,用户与设备800接触的存在或不存在,设备800方位或加速/减速和设备800的温度变化。传感器组件814可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件814还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件814还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。Sensor assembly 814 includes one or more sensors for providing status assessments of various aspects of device 800 . For example, the sensor component 814 can detect the open/closed state of the device 800, the relative positioning of components, such as the display and keypad of the device 800, and the sensor component 814 can also detect a change in the position of the device 800 or a component of the device 800 , the presence or absence of user contact with the device 800 , the orientation or acceleration/deceleration of the device 800 and the temperature change of the device 800 . Sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact. Sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.

通信组件816被配置为便于设备800和其他设备之间有线或无线方式的通信。设备800可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件816经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件816还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。Communication component 816 is configured to facilitate wired or wireless communications between device 800 and other devices. Device 800 may access wireless networks based on communication standards, such as WiFi, 2G or 3G, or a combination thereof. In one exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 also includes a near field communication (NFC) module to facilitate short-range communication. For example, the NFC module may be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.

在示例性实施例中,设备800可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。In an exemplary embodiment, device 800 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor or other electronic component implementation is used to perform the above method.

在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器804,上述指令可由设备800的处理器820执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。In an exemplary embodiment, there is also provided a non-transitory computer-readable storage medium including instructions, such as memory 804 including instructions, executable by processor 820 of device 800 to perform the above method. For example, the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.

一种非临时性计算机可读存储介质,当该存储介质中的指令由终端设备的处理器执行时,使得终端设备能够执行上述终端设备的分屏处理方法。A non-transitory computer-readable storage medium, when an instruction in the storage medium is executed by a processor of a terminal device, enables the terminal device to execute the above-mentioned method for split-screen processing of the terminal device.

本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其它实施方案。本公开旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求书指出。Other embodiments of the present disclosure will readily occur to those skilled in the art upon consideration of the specification and practice of the invention disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of this disclosure that follow the general principles of this disclosure and include common general knowledge or techniques in the technical field not disclosed by this disclosure . The specification and examples are to be regarded as exemplary only, with the true scope and spirit of the disclosure being indicated by the following claims.

应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求书来限制。It is to be understood that the present disclosure is not limited to the precise structures described above and illustrated in the accompanying drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (14)

1.一种数据加密方法,其特征在于,包括:1. a data encryption method, is characterized in that, comprises: 获取随机数明文,其中,所述随机数明文为与迭代仿射秘钥一同生成的随机数;obtaining a random number plaintext, wherein the random number plaintext is a random number generated together with an iterative affine key; 根据所述迭代仿射秘钥对随机数进行加密操作,获得随机数密文,将所述随机数密文确定为伪公钥;The random number is encrypted according to the iterative affine key to obtain a random number ciphertext, and the random number ciphertext is determined as a pseudo public key; 将所述伪公钥发送至数据接收设备,使得所述数据接收设备采用所述伪公钥对待计算明文进行数据加密操作。The pseudo public key is sent to the data receiving device, so that the data receiving device uses the pseudo public key to perform a data encryption operation on the plaintext to be calculated. 2.根据权利要求1所述的方法,其特征在于,所述根据所述迭代仿射秘钥对随机数进行加密操作,获得随机数密文,包括:2. The method according to claim 1, wherein, performing an encryption operation on a random number according to the iterative affine key to obtain a random number ciphertext, comprising: 根据所述迭代仿射秘钥,采用迭代仿射加密的方式对所述随机数明文进行加密操作,获得所述随机数密文。According to the iterative affine key, the random number plaintext is encrypted by adopting an iterative affine encryption method to obtain the random number ciphertext. 3.根据权利要求2所述的方法,其特征在于,所述根据所述迭代仿射秘钥,采用迭代仿射加密的方式对所述随机数明文进行加密操作,获得所述随机数密文,包括:3. The method according to claim 2, wherein, according to the iterative affine secret key, the random number plaintext is encrypted by means of iterative affine encryption to obtain the random number ciphertext ,include: 对所述随机数明文中的浮点数进行小数点移位操作,获得与随机数明文对应的整数明文;Perform a decimal point shift operation on the floating point number in the random number plaintext to obtain an integer plaintext corresponding to the random number plaintext; 采用所述迭代仿射秘钥,对所述整数明文进行预设次数的迭代仿射加密操作,获得所述随机数密文。Using the iterative affine key, perform a preset number of iterative affine encryption operations on the integer plaintext to obtain the random number ciphertext. 4.根据权利要求1所述的方法,其特征在于,所述获取随机数明文之后,还包括:4. The method according to claim 1, wherein after obtaining the random number plaintext, further comprising: 获取待计算数据;Get the data to be calculated; 将所述待计算数据与所述随机数明文相乘,获得预处理数据;Multiplying the data to be calculated by the plaintext of the random number to obtain preprocessed data; 根据所述迭代仿射秘钥,采用迭代仿射加密的方式对所述预处理数据进行加密操作,获得第一目标密文。According to the iterative affine key, the preprocessing data is encrypted by means of iterative affine encryption to obtain the first target ciphertext. 5.根据权利要求4所述的方法,其特征在于,所述将所述伪公钥发送至数据接收设备之后,还包括:5. The method according to claim 4, wherein after the sending the pseudo public key to the data receiving device, the method further comprises: 获取数据接收设备发送的第二目标密文,所述第一目标密文与第二目标密文处于相同的密文域内,其中,所述第二目标密文为数据接收设备采用所述伪公钥对所述待计算明文进行数据加密操作后获得的;Obtain the second target ciphertext sent by the data receiving device, the first target ciphertext and the second target ciphertext are in the same ciphertext domain, wherein the second target ciphertext is the data receiving device using the pseudo public The key is obtained after performing a data encryption operation on the plaintext to be calculated; 根据所述第一目标密文与所述第二目标密文进行密文计算操作,获得计算结果,其中,所述密文计算包括加法计算以及数乘计算中的一项或多项。A ciphertext calculation operation is performed according to the first target ciphertext and the second target ciphertext to obtain a calculation result, wherein the ciphertext calculation includes one or more of addition calculation and number multiplication calculation. 6.一种数据加密方法,其特征在于,包括:6. a data encryption method, is characterized in that, comprises: 获取数据发送设备发送的伪公钥,其中,所述伪公钥为所述数据发送设备采用迭代仿射加密的方式对与迭代仿射秘钥一同生成的随机数明文进行加密操作后获得的;Obtaining a pseudo public key sent by the data sending device, wherein the pseudo public key is obtained after the data sending device encrypts the random number plaintext generated together with the iterative affine secret key by means of iterative affine encryption; 根据所述伪公钥,对所述待计算明文进行加密操作,获得第二目标密文;performing an encryption operation on the plaintext to be calculated according to the pseudo public key to obtain a second target ciphertext; 将所述第二目标密文发送至所述数据发送设备,使得所述数据发送设备根据第一目标密文与所述第二目标密文进行密文计算操作,其中,所述密文计算包括加法计算以及数乘计算中的一项或多项,所述第一目标密文为所述数据发送设备采用所述随机数明文对待计算数据加密后获得的。Sending the second target ciphertext to the data sending device, so that the data sending device performs a ciphertext calculation operation according to the first target ciphertext and the second target ciphertext, wherein the ciphertext calculation includes: One or more of addition calculation and number multiplication calculation, the first target ciphertext is obtained by the data sending device after encrypting the data to be calculated by using the random number plaintext. 7.根据权利要求6所述的方法,其特征在于,所述根据所述伪公钥,对所述待计算明文进行加密操作,获得第二目标密文,包括:7. The method according to claim 6, wherein the performing an encryption operation on the plaintext to be calculated according to the pseudo public key to obtain a second target ciphertext, comprising: 将所述待计算明文与所述伪公钥进行数乘操作,获得第二目标密文。A number multiplication operation is performed on the plaintext to be calculated and the pseudo public key to obtain a second target ciphertext. 8.根据权利要求6所述的方法,其特征在于,所述根据所述伪公钥,对所述待计算明文进行加密操作,获得第二目标密文,包括:8. The method according to claim 6, wherein the performing an encryption operation on the plaintext to be calculated according to the pseudo public key to obtain the second target ciphertext, comprising: 对所述伪公钥进行赋值初始化操作,获得目标伪公钥,其中,所述目标伪公钥在赋值初始化之后具有预设的目标属性;performing an assignment initialization operation on the pseudo public key to obtain a target pseudo public key, wherein the target pseudo public key has a preset target attribute after assignment initialization; 采用所述目标伪公钥对所述待计算明文进行加密操作,获得所述第二目标密文。The plaintext to be calculated is encrypted by using the target pseudo public key to obtain the second target ciphertext. 9.根据权利要求8所述的方法,其特征在于,所述采用所述目标伪公钥对所述待计算明文进行加密操作,获得所述第二目标密文,包括:9 . The method according to claim 8 , wherein, performing an encryption operation on the plaintext to be calculated by using the target pseudo-public key to obtain the second target ciphertext, comprising: 10 . 将所述目标伪公钥与所述待计算明文进行乘法操作,获得第二目标密文。A multiplication operation is performed on the target pseudo-public key and the to-be-computed plaintext to obtain a second target ciphertext. 10.一种数据发送设备,其特征在于,包括:10. A data transmission device, comprising: 获取模块,用于获取随机数明文,其中,所述随机数明文为与迭代仿射秘钥一同生成的随机数;an acquisition module, configured to acquire a random number plaintext, wherein the random number plaintext is a random number generated together with an iterative affine key; 加密模块,用于根据所述迭代仿射秘钥对随机数进行加密操作,获得随机数密文,将所述随机数密文确定为伪公钥;an encryption module, configured to perform an encryption operation on a random number according to the iterative affine secret key, obtain a random number ciphertext, and determine the random number ciphertext as a pseudo public key; 发送模块,用于将所述伪公钥发送至数据接收设备,使得所述数据接收设备采用所述伪公钥对待计算明文进行数据加密操作。A sending module, configured to send the pseudo public key to a data receiving device, so that the data receiving device uses the pseudo public key to perform a data encryption operation on the plaintext to be calculated. 11.一种数据接收设备,其特征在于,包括:11. A data receiving device, characterized in that, comprising: 伪公钥获取模块,用于获取数据发送设备发送的伪公钥,其中,所述伪公钥为所述数据发送设备采用迭代仿射加密的方式对与迭代仿射秘钥一同生成的随机数明文进行加密操作后获得的;A pseudo-public key acquisition module, configured to obtain a pseudo-public key sent by a data sending device, wherein the pseudo-public key is a random number generated by the data sending device using an iterative affine encryption method together with the iterative affine key The plaintext is obtained after encryption operation; 处理模块,用于根据所述伪公钥,对所述待计算明文进行加密操作,获得第二目标密文;a processing module, configured to perform an encryption operation on the plaintext to be calculated according to the pseudo public key to obtain a second target ciphertext; 传输模块,用于将所述第二目标密文发送至所述数据发送设备,使得所述数据发送设备根据第一目标密文与所述第二目标密文进行密文计算操作,其中,所述密文计算包括加法计算以及数乘计算中的一项或多项,所述第一目标密文为所述数据发送设备采用所述随机数明文对待计算数据加密后获得的。A transmission module, configured to send the second target ciphertext to the data sending device, so that the data sending device performs a ciphertext calculation operation according to the first target ciphertext and the second target ciphertext, wherein the The ciphertext calculation includes one or more of addition calculation and number multiplication calculation, and the first target ciphertext is obtained by the data sending device after encrypting the data to be calculated by using the random number plaintext. 12.一种电子设备,其特征在于,包括:存储器,处理器;12. An electronic device, comprising: a memory, a processor; 存储器;用于存储所述处理器可执行指令的存储器;memory; memory for storing instructions executable by the processor; 其中,其中,所述处理器用于调用所述存储器中的程序指令执行如权利要求1-5或6-9任一项所述的数据加密方法。Wherein, the processor is configured to call program instructions in the memory to execute the data encryption method according to any one of claims 1-5 or 6-9. 13.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机执行指令,所述计算机执行指令被处理器执行时用于实现如权利要求1-5或6-9任一项所述的数据加密方法。13. A computer-readable storage medium, characterized in that, computer-executable instructions are stored in the computer-readable storage medium, and when the computer-executable instructions are executed by a processor, are used to implement the method according to claim 1-5 or 6- 9. The data encryption method of any one. 14.一种计算机程序产品,其特征在于,包括计算机程序,所述计算机程序在被处理器执行时实现根据权利要求1-5或6-9任一项所述的数据加密方法。14. A computer program product, characterized by comprising a computer program that, when executed by a processor, implements the data encryption method according to any one of claims 1-5 or 6-9.
CN202111284063.0A 2021-11-01 2021-11-01 Data encryption method, device, computer readable storage medium and product Active CN114969770B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111284063.0A CN114969770B (en) 2021-11-01 2021-11-01 Data encryption method, device, computer readable storage medium and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111284063.0A CN114969770B (en) 2021-11-01 2021-11-01 Data encryption method, device, computer readable storage medium and product

Publications (2)

Publication Number Publication Date
CN114969770A true CN114969770A (en) 2022-08-30
CN114969770B CN114969770B (en) 2025-06-17

Family

ID=82974425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111284063.0A Active CN114969770B (en) 2021-11-01 2021-11-01 Data encryption method, device, computer readable storage medium and product

Country Status (1)

Country Link
CN (1) CN114969770B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001308845A (en) * 1999-04-28 2001-11-02 Fuji Soft Abc Inc Encryption / decryption method using multiple affine keys, authentication method, and devices using the same
JP2002091305A (en) * 2000-07-12 2002-03-27 Fuji Soft Abc Inc Random number generation device and encryption / decryption device using multiple affine keys, and digital data processing device and method and program using the same
US20050265546A1 (en) * 1999-04-28 2005-12-01 Shuichi Suzuki Encryption/decryption method and authentication method using multiple-affine key system
US20200177366A1 (en) * 2019-06-18 2020-06-04 Alibaba Group Holding Limited Homomorphic data encryption method and apparatus for implementing privacy protection
WO2020253234A1 (en) * 2019-06-18 2020-12-24 创新先进技术有限公司 Data homomorphic encryption and decryption method and apparatus for implementing privacy protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001308845A (en) * 1999-04-28 2001-11-02 Fuji Soft Abc Inc Encryption / decryption method using multiple affine keys, authentication method, and devices using the same
US20050265546A1 (en) * 1999-04-28 2005-12-01 Shuichi Suzuki Encryption/decryption method and authentication method using multiple-affine key system
JP2002091305A (en) * 2000-07-12 2002-03-27 Fuji Soft Abc Inc Random number generation device and encryption / decryption device using multiple affine keys, and digital data processing device and method and program using the same
US20200177366A1 (en) * 2019-06-18 2020-06-04 Alibaba Group Holding Limited Homomorphic data encryption method and apparatus for implementing privacy protection
WO2020253234A1 (en) * 2019-06-18 2020-12-24 创新先进技术有限公司 Data homomorphic encryption and decryption method and apparatus for implementing privacy protection

Also Published As

Publication number Publication date
CN114969770B (en) 2025-06-17

Similar Documents

Publication Publication Date Title
CN114301594B (en) Inadvertent transmission method, multi-party secure computing platform and device for inadvertent transmission
EP3001640A1 (en) Secure information exchange method and wearable device
WO2022043741A1 (en) Network training method and apparatus, person re-identification method and apparatus, storage medium, and computer program
CN105049213A (en) File signature method and device
CN110543481B (en) Data processing method and device, computer equipment and storage medium
CN104580401A (en) Connecting method and device
CN114885038B (en) Encryption protocol conversion method, result acquisition node and privacy calculation node
CN115967491B (en) Privacy intersection method, system and readable storage medium
CN113254956B (en) Data processing method and device for data processing
CN113343212A (en) Device registration method and apparatus, electronic device, and storage medium
CN109246110B (en) Data sharing method and device and computer readable storage medium
CN111369438A (en) Image processing method and device, electronic equipment and storage medium
CN113812103B (en) Management message frame transmission method, device and storage medium
CN113315844A (en) File encryption transmission method, device, equipment and computer readable storage medium
CN114884645B (en) Privacy calculation method and device and readable storage medium
CN116305206A (en) Secure multiparty computing method, device, electronic equipment and storage medium
CN115085912A (en) Ciphertext computing method and device for ciphertext computing
CN110750961A (en) File format conversion method and device, computer equipment and storage medium
CN105120452A (en) Information transmission method, device and system
CN114969770B (en) Data encryption method, device, computer readable storage medium and product
CN115617897B (en) Data type conversion method and multi-party secure computing system
CN114978489A (en) Protocol conversion method, system and device for protocol conversion
CN112671530B (en) Data processing method and device and data processing device
WO2017092126A1 (en) Information processing method and device
CN114760367B (en) Encryption protocol conversion method, first node and second node

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant