-
公开(公告)号:US20240364502A1
公开(公告)日:2024-10-31
申请号:US18631621
申请日:2024-04-10
Inventor: Peng XU , Mengyang YU , Wei WANG , Yixin SU , Yubo ZHENG , Hai JIN
CPC classification number: H04L9/0819 , H04L9/0869 , H04L9/3236
Abstract: A method and system for encryption and assured deletion of information is provided, the method at least includes: sorting fields of the information into at least two sensitivity levels by sensitivity; generating encryption keys and key shards thereof based on predetermined thresholds, and creating mapping between targets and the key shards, based on the encryption keys for the sensitivity levels, encrypting the information fields of the corresponding sensitivity levels and deleting the original information and encryption keys; and in response to reception of a recover request, recovering the encryption keys based on the key shards and performing decryption, so as to recover the original information. The present disclosure aims at the problem that information is difficult to be safely stored and assuredly deleted, and realizes multi-party security key deletion of encrypted personal information.
-
2.
公开(公告)号:US20240362187A1
公开(公告)日:2024-10-31
申请号:US18631660
申请日:2024-04-10
Inventor: Peng XU , Shuning XU , Wei WANG , Runze XU , Tingting RAO , Hai JIN
CPC classification number: G06F16/162 , G06F21/60 , G06F2221/2143
Abstract: A method and system for overwriting-based deletion of information and verification of deletion is provided, wherein the method at least includes: receiving a deletion request and/or a random seed; performing fine-grained overwriting on the information by means of random overwriting; in response to an extraction request for a post-deletion state, making a master node in a source domain of the information broadcast the extraction request to at least one slave node; and sending the post-deletion state fed back by the slave node and a related state-verification parameter to a verifying terminal, so that the verifying terminal verifies an overwriting result based on a verifiable pseudo-random function. Thus, the present application can effectively prevent information recovery after being logically deleted, and efficaciously ensure verifiability as well as non-recoverability of deleted information, thereby assuring non-recoverable deletion and providing verifiability of deletion to information subjects.
-
公开(公告)号:US20220255739A1
公开(公告)日:2022-08-11
申请号:US17444224
申请日:2021-08-02
Inventor: Peng XU , Tianyang CHEN , Yubo ZHENG , Hai JIN , Wei WANG
Abstract: The present invention relates a method for ensuring search completeness of searchable public key encryption, applicable to a blockchain network formed by a plurality of computer nodes. The method at least comprises: the blockchain network receiving a keyword ciphertext and a corresponding file-identifier ciphertext generated by a transmitting end based on the public key encryption, and at least one miner storing the ciphertexts in a ciphertext table; the blockchain network receiving a search trapdoor Tw transmitted by a receiving end, generated according to a private key and a keyword w to be searched; the at least one miner in the blockchain network performing a secure search based on information of a state table and the search trapdoor Tw, and outputting a search result to the blockchain network; and the blockchain network feeding the search result back to the receiving end. The invention uses the blockchain technology to solve the long-standing search completeness problem in searchable public key encryption, and the proposed method has universality.
-
4.
公开(公告)号:US20240362251A1
公开(公告)日:2024-10-31
申请号:US18631790
申请日:2024-04-10
Inventor: Peng XU , Yinjia PI , Wei WANG , Shuning XU , Yubo ZHENG , Hai JIN
IPC: G06F16/27
CPC classification number: G06F16/27
Abstract: A method and system for automatic deletion of information based on time synchronization and trusted counting is provided, the method including: defining different data structures including configurations in a normalized manner; setting triggering conditions for automatic information deletion, including conditions for automatic deletion based on time synchronization and/or based on trusted counting; maintaining synchrony of the configurations across different domains; and after satisfying the triggering conditions, making an information source domain and/or an information propagation domain perform the automatic information deletion. Considering that existing data deletion mechanisms cannot delete information according to preset retention periods, the present application employs synchrony across system clocks to perform automatic deletion of authorization information under circulation after a certain time period, and further limits a circulation count for information of interest so as to ensure that the information and its copies are all deleted after reaching a preset maximum permittable circulation count.
-
公开(公告)号:US20220255744A1
公开(公告)日:2022-08-11
申请号:US17444613
申请日:2021-08-06
Inventor: Peng XU , Yubo ZHENG , Tianyang CHEN , Hai JIN , Wei WANG
IPC: H04L9/30 , H04L9/06 , G06F16/903
Abstract: The present invention relates to a method of time-delay encryption with keyword search and system using the same, at least comprising: based on a public key PK, generating searchable ciphertexts Cw and/or file ciphertexts for keywords w of at least one to-be-uploaded file by means of time-delay encryption and uploading the ciphertexts to a cloud server; sending at least one keyword search trapdoor Tw generated for one said to-be-searched keyword w based on a private key SK to the cloud server; and the cloud server, based on the keyword search trapdoor Tw performing keyword search on all the searchable ciphertexts Cw so as to obtain the corresponding searchable ciphertexts Cw, and determining the corresponding file ciphertexts based on the searched searchable ciphertexts Cw and feeding the corresponding file ciphertexts to a receiving end. The present invention increases the difficulty for attackers to launch keyword guessing attacks.
-
公开(公告)号:US20240330506A1
公开(公告)日:2024-10-03
申请号:US18603202
申请日:2024-03-12
CPC classification number: G06F21/6245 , H04L9/088 , H04L9/3247
Abstract: A method and system for deleting multi-copy personal data efficiently and securely is provided, wherein the personal data and its subject identifier are signed and uploaded to data domains and stored as personal data copies; the personal data copies along with its source and destination data are circulated among the data domains; the data domain receiving a deletion instruction transmits the deletion instruction to every relevant data domains based on the identifier of the personal data subject and the destination data and then performs deletion; and after completing the deletion, the data domain deposit its domain identifier and feedback data it receives into a log, and feed the log back to its superior data domain. And the system of the present disclosure includes a plurality of data domains that can perform the above operations, thereby realizing association-based storage, association-based deletion and verification of association-based deletion of multi-copy personal data.
-
公开(公告)号:US20240330505A1
公开(公告)日:2024-10-03
申请号:US18602957
申请日:2024-03-12
Inventor: Peng XU , Yixin SU , Wei WANG , Mengyang YU , Tianyang CHEN , Hai JIN
IPC: G06F21/62
CPC classification number: G06F21/6245 , G06F2221/2143
Abstract: A method and system for trusted third-party audit of personal-information deletion is provided, wherein the method includes: acquiring log data of an arbitrary source-domain personal-information deleting body in a network and of its associated-domain personal-information deleting bodies; normalizing the log data according to predetermined parsing rules and thereby generating normalized log data; and performing consistency-of-notification analysis and operation-compliance analysis on the normalized log data by means of association analysis. The present application is based on an audit analysis of log files to identify whether the information deletion process conforms to the multi-dimensional or multi-level audit judgment conditions and to perform forensics on abnormal deletion of personal information in a timely manner, so as to ensure that personal-information deletion can satisfy requirements of internal control, industrial standards, policies and regulations.
-
公开(公告)号:US20220103340A1
公开(公告)日:2022-03-31
申请号:US17172145
申请日:2021-02-10
Inventor: Peng XU , Tianyang CHEN , Yubo ZHENG , Hai JIN , Wei WANG
IPC: H04L9/06 , G06F16/2455 , H04L9/08
Abstract: The present invention relates to a method and a system for robust, searchable, symmetrical encryption, the method comprising: during initialization, having a retrieval server perform retrieval on stored ciphertext information according to a searchable ciphertext and retrieval trapdoor information (Cntupd, K, Locgrp) sent by a client, wherein, the retrieval server acquires a last received first ciphertext set Cnew from a ciphertext database CDB just before the present retrieval according to a retrieval key K and an encryption counter Cntupd sent by the client, acquiring a second ciphertext set Ccache in a retrieval request history from a cache ciphertext database GRP according to a cache ciphertext index Locgrp, and merging the first ciphertext set Cnew and the second ciphertext set Ccache to form a retrieval set , and sending it to the client for decryption. The present invention is able to improve retrieval performance of searchable symmetrical encryption algorithm with robust forward and backward secrecy and to make searchable symmetrical encryption algorithm more practical.
-
公开(公告)号:US20190207763A1
公开(公告)日:2019-07-04
申请号:US16169377
申请日:2018-10-24
Inventor: Hai JIN , Peng XU , Shuanghong HE , Deqing ZOU
Abstract: The present invention involves with a method of searchable public-key encryption, a system and server using the method.
-
-
-
-
-
-
-
-