Ya-Tao Jing, Wenqian Zhang, Lin Ge, Nanfang Li, Xiyuan Shang, Yun Ye
{"title":"基于多层加密算法的网络数据传输安全共享方法","authors":"Ya-Tao Jing, Wenqian Zhang, Lin Ge, Nanfang Li, Xiyuan Shang, Yun Ye","doi":"10.1117/12.2639364","DOIUrl":null,"url":null,"abstract":"In network data transmission, the data to be encrypted is not always at the same level. The access structure is embedded in the ciphertext, resulting in excessive communication and computing overhead. Therefore, a secure sharing method of network data transmission is proposed based on multi-layer encryption algorithm. According to the relationship between users, type servers and service providers, the logical structure of data transmission is established, and the data sharing contract is called on the basis of secure communication. By designing the key synchronization mechanism, both sides of the transmission can use the same key for encryption and decryption to ensure the forward security of the data. The key distribution scheme is established based on multi-layer encryption algorithm. The ciphertext information of the next layer is directly embedded in the ciphertext of the previous layer, which realizes the jump transmission of ciphertext and ensures the security of data privacy. In the final stage, both the master node and the slave node will receive the confirmation information, and then check the signature of the confirmation information to complete the secure sharing of data transmission. The test results show that this method reduces the communication overhead and computing overhead, and improves the efficiency of encryption and decryption.","PeriodicalId":336892,"journal":{"name":"Neural Networks, Information and Communication Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure sharing method of network data transmission based on multi-layer encryption algorithm\",\"authors\":\"Ya-Tao Jing, Wenqian Zhang, Lin Ge, Nanfang Li, Xiyuan Shang, Yun Ye\",\"doi\":\"10.1117/12.2639364\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In network data transmission, the data to be encrypted is not always at the same level. The access structure is embedded in the ciphertext, resulting in excessive communication and computing overhead. Therefore, a secure sharing method of network data transmission is proposed based on multi-layer encryption algorithm. According to the relationship between users, type servers and service providers, the logical structure of data transmission is established, and the data sharing contract is called on the basis of secure communication. By designing the key synchronization mechanism, both sides of the transmission can use the same key for encryption and decryption to ensure the forward security of the data. The key distribution scheme is established based on multi-layer encryption algorithm. The ciphertext information of the next layer is directly embedded in the ciphertext of the previous layer, which realizes the jump transmission of ciphertext and ensures the security of data privacy. In the final stage, both the master node and the slave node will receive the confirmation information, and then check the signature of the confirmation information to complete the secure sharing of data transmission. The test results show that this method reduces the communication overhead and computing overhead, and improves the efficiency of encryption and decryption.\",\"PeriodicalId\":336892,\"journal\":{\"name\":\"Neural Networks, Information and Communication Engineering\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Neural Networks, Information and Communication Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.2639364\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Neural Networks, Information and Communication Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2639364","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure sharing method of network data transmission based on multi-layer encryption algorithm
In network data transmission, the data to be encrypted is not always at the same level. The access structure is embedded in the ciphertext, resulting in excessive communication and computing overhead. Therefore, a secure sharing method of network data transmission is proposed based on multi-layer encryption algorithm. According to the relationship between users, type servers and service providers, the logical structure of data transmission is established, and the data sharing contract is called on the basis of secure communication. By designing the key synchronization mechanism, both sides of the transmission can use the same key for encryption and decryption to ensure the forward security of the data. The key distribution scheme is established based on multi-layer encryption algorithm. The ciphertext information of the next layer is directly embedded in the ciphertext of the previous layer, which realizes the jump transmission of ciphertext and ensures the security of data privacy. In the final stage, both the master node and the slave node will receive the confirmation information, and then check the signature of the confirmation information to complete the secure sharing of data transmission. The test results show that this method reduces the communication overhead and computing overhead, and improves the efficiency of encryption and decryption.