检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:赵创业 王辉鹏 李波 何明东 钟国新 吴梓宏 ZHAO Chuangye;WANG Huipeng;LI Bo;HE Mingdong;ZHONG Guoxin;WU Zihong(Information Center of Guangdong Power Grid Co.,Ltd,Guangdong GuangZhou 510000;Guangzhou Power Supply Bureau of Guangdong Power Grid Co.,Ltd,Guangdong GuangZhou 510000)
机构地区:[1]广东电网有限责任公司信息中心,广东广州510000 [2]广东电网有限责任公司广州供电局,广东广州510000
出 处:《长江信息通信》2025年第2期152-154,共3页Changjiang Information & Communications
摘 要:随着互联网的普及,网络隐私数据的安全问题日益凸显,由于现有的加密算法非常复杂,导致加密和解密过程需要消耗大量的资源,这种复杂性虽然提高了安全性,但也降低了处理速度。因此,提出基于区块链技术的网络隐私数据加密共享方法。通过构建数据采集机制,采集用户共享请求数据,基于区块链技术计算共享用户的信任度,并授予用户访问权限。引入双哈希链时间锁定加密策略对数据进行加密处理,设计隐私数据加密共享控制流程,实现网络隐私数据的加密共享。实验结果表明,该方法的实际性能优越,且数据的加密和解密效率较高,能够满足用户对网络隐私数据安全共享的需求。With the popularization of the Internet,the security problem of network privacy data is increasingly prominent.Because the existing encryption algorithms are very complex,the encryption anddecryption process needs to consume a lot of resources.Although this complexity improves the security,it also reduces the processing speed.Therefore,a network privacy data encryption and sharing method based on blockchain technology is proposed.By constructing a data collection mechanism,collecting user sharing request data,calculating the trustworthiness of shared users based on blockchain technology,and granting users access permissions.Introduce a dual hash chain time locked encryption strategy to encrypt data,design a privacy data encryption and sharing control process,and achieve encryption and sharing of network privacy data.The experimental results show that the actual performance of this method is superior,and the efficiency of data encryption and decryption is high,which can meet the needs of users for secure sharing of network privacy data.
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.90