Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_1b7a5c546db0678dbd6f9594fc43f2d6 |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F7-582 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-12 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0631 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0625 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-08 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-72 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0643 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-002 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-78 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0662 |
classificationIPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F7-58 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-72 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-78 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G09C1-00 |
filingDate |
2018-03-14-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate |
2021-01-05-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_e38af03d106310846b5bf5bc360f6756 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_e7e129df8efa226649e42139a1585e65 |
publicationDate |
2021-01-05-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
US-10887080-B2 |
titleOfInvention |
Double-hashing operation mode for encryption |
abstract |
A method and computer-readable storage medium for a computer system to perform an encryption scheme is disclosed that is capable of encrypting big data that includes complex data, including image data, sensor data, and text data, and supporting both symmetric and asymmetric-key handling. The encryption scheme uses double hashing using two different consecutively-applied hash functions. With double hashing, the encryption scheme eliminates the threat of known cryptanalysis attacks and provides a highly secure ciphering scheme. Also, the ciphertext header generated in the encryption scheme enables efficient cloud data sharing. A user can share the encrypted data later by re-encrypting the seed and sharing a new ciphertext header without the need of re-encrypting the data or changing the secret or private key. Thus, the encrypted data stays as is in the cloud, and only the seed is encrypted and shared as needed. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11469881-B2 |
priorityDate |
2017-03-16-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |