Node computing data encryption method
First Claim
Patent Images
1. A data encryption method, adapted to a node computing device in a cloud server system, and comprising:
- receiving a primary data;
determining a power of a finite field according to a basis of the primary data;
determining a dimension of an encrypted matrix according to the power of the finite field;
computing an encryption length, and sequentially obtaining a plurality of data segments matching the encryption length, from the primary data according to the encryption length; and
obtaining a plurality of encrypted segments by encrypting each of the plurality of extracted data segments respectively through the encrypted matrixwherein the basis of the primary data and the power of the finite field satisfy a first limitation condition, and the first limitation condition comprises;
2 k ≧
d, wherein k represents the power of the finite field, and d represents the basis of the primary data.
1 Assignment
0 Petitions
Accused Products
Abstract
A data encryption method, adapted to a node computing device in a cloud server system comprises following steps. A primary data is received. A dimension of an encrypted matrix is computed. An encryption length is computed, and data segments matching the encryption length are extracted from the primary data sequentially according to the encryption length. A plurality of encrypted segments is obtained by encrypting the extracted data segments respectively through the encrypted matrix.
-
Citations
7 Claims
-
1. A data encryption method, adapted to a node computing device in a cloud server system, and comprising:
-
receiving a primary data; determining a power of a finite field according to a basis of the primary data; determining a dimension of an encrypted matrix according to the power of the finite field; computing an encryption length, and sequentially obtaining a plurality of data segments matching the encryption length, from the primary data according to the encryption length; and obtaining a plurality of encrypted segments by encrypting each of the plurality of extracted data segments respectively through the encrypted matrix wherein the basis of the primary data and the power of the finite field satisfy a first limitation condition, and the first limitation condition comprises;
2 k ≧
d, wherein k represents the power of the finite field, and d represents the basis of the primary data. - View Dependent Claims (2, 3)
-
-
4. The data encryption method according to claimed 1, wherein the dimension of the encrypted matrix satisfies a second limitation condition, and the second limitation condition comprises:
-
n<
2k, and n≦
r;wherein the dimension of the encrypted matrix is n×
n, k represents the power of the finite field, and r represents a quantity of the data segments formed by segmenting the primary data.
-
-
5. The data encryption method according to claimed 1, wherein the step of computing the encryption length comprises:
computing the encryption length according to the power of the finite field. - View Dependent Claims (6, 7)
Specification