基于多层加密算法的网络数据传输安全共享方法

Ya-Tao Jing, Wenqian Zhang, Lin Ge, Nanfang Li, Xiyuan Shang, Yun Ye
{"title":"基于多层加密算法的网络数据传输安全共享方法","authors":"Ya-Tao Jing, Wenqian Zhang, Lin Ge, Nanfang Li, Xiyuan Shang, Yun Ye","doi":"10.1117/12.2639364","DOIUrl":null,"url":null,"abstract":"In network data transmission, the data to be encrypted is not always at the same level. The access structure is embedded in the ciphertext, resulting in excessive communication and computing overhead. Therefore, a secure sharing method of network data transmission is proposed based on multi-layer encryption algorithm. According to the relationship between users, type servers and service providers, the logical structure of data transmission is established, and the data sharing contract is called on the basis of secure communication. By designing the key synchronization mechanism, both sides of the transmission can use the same key for encryption and decryption to ensure the forward security of the data. The key distribution scheme is established based on multi-layer encryption algorithm. The ciphertext information of the next layer is directly embedded in the ciphertext of the previous layer, which realizes the jump transmission of ciphertext and ensures the security of data privacy. In the final stage, both the master node and the slave node will receive the confirmation information, and then check the signature of the confirmation information to complete the secure sharing of data transmission. The test results show that this method reduces the communication overhead and computing overhead, and improves the efficiency of encryption and decryption.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure sharing method of network data transmission based on multi-layer encryption algorithm\",\"authors\":\"Ya-Tao Jing, Wenqian Zhang, Lin Ge, Nanfang Li, Xiyuan Shang, Yun Ye\",\"doi\":\"10.1117/12.2639364\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In network data transmission, the data to be encrypted is not always at the same level. The access structure is embedded in the ciphertext, resulting in excessive communication and computing overhead. Therefore, a secure sharing method of network data transmission is proposed based on multi-layer encryption algorithm. According to the relationship between users, type servers and service providers, the logical structure of data transmission is established, and the data sharing contract is called on the basis of secure communication. By designing the key synchronization mechanism, both sides of the transmission can use the same key for encryption and decryption to ensure the forward security of the data. The key distribution scheme is established based on multi-layer encryption algorithm. The ciphertext information of the next layer is directly embedded in the ciphertext of the previous layer, which realizes the jump transmission of ciphertext and ensures the security of data privacy. In the final stage, both the master node and the slave node will receive the confirmation information, and then check the signature of the confirmation information to complete the secure sharing of data transmission. The test results show that this method reduces the communication overhead and computing overhead, and improves the efficiency of encryption and decryption.\",\"PeriodicalId\":336892,\"journal\":{\"name\":\"Neural Networks, Information and Communication Engineering\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Neural Networks, Information and Communication Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.2639364\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Neural Networks, Information and Communication Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2639364","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在网络数据传输中,需要加密的数据并不总是在同一层。访问结构嵌入在密文中,导致通信和计算开销过大。为此,提出了一种基于多层加密算法的网络数据传输安全共享方法。根据用户、类型服务器和服务提供商之间的关系,建立数据传输的逻辑结构,在安全通信的基础上调用数据共享契约。通过设计密钥同步机制,传输双方可以使用同一密钥进行加解密,保证数据的前向安全。建立了基于多层加密算法的密钥分配方案。下一层的密文信息直接嵌入到前一层的密文中,实现了密文的跳转传输,保证了数据隐私的安全性。在最后阶段,主节点和从节点都会收到确认信息,然后检查确认信息的签名,完成数据传输的安全共享。测试结果表明,该方法降低了通信开销和计算开销,提高了加解密效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Secure sharing method of network data transmission based on multi-layer encryption algorithm
In network data transmission, the data to be encrypted is not always at the same level. The access structure is embedded in the ciphertext, resulting in excessive communication and computing overhead. Therefore, a secure sharing method of network data transmission is proposed based on multi-layer encryption algorithm. According to the relationship between users, type servers and service providers, the logical structure of data transmission is established, and the data sharing contract is called on the basis of secure communication. By designing the key synchronization mechanism, both sides of the transmission can use the same key for encryption and decryption to ensure the forward security of the data. The key distribution scheme is established based on multi-layer encryption algorithm. The ciphertext information of the next layer is directly embedded in the ciphertext of the previous layer, which realizes the jump transmission of ciphertext and ensures the security of data privacy. In the final stage, both the master node and the slave node will receive the confirmation information, and then check the signature of the confirmation information to complete the secure sharing of data transmission. The test results show that this method reduces the communication overhead and computing overhead, and improves the efficiency of encryption and decryption.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Improve vulnerability prediction performance using self-attention mechanism and convolutional neural network Design of digital pulse-position modulation system based on minimum distance method Design of an externally adjustable oscillator circuit Research on non-intrusive video capture technology based on FPD-linkⅢ The communication process of digital binary pulse-position modulation with additive white Gaussian noise
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1