This is a demo service running based on a server with 3.5GHz Intel Xeon CPU (Ice Lake).
Decryption policy as follows: decryption is only allowed after a certain period of time; otherwise, it will be considered illegal decryption.
Encryption
Decryption
Accountability of Decryption
Every decryption event is meticulously logged. This includes key information such as ID, SN, protocol time (the specified decryption time within the ciphertext), decrypt time (the actual time the decryption request was received), validity, along with the signature and proof. Here, when decrypt time exceeds protocol time, the decryption is Valid, otherwise it is Invalid.
The table will only display the latest 20 log entries.
ID | SN | Protocol Time | Decrypt Time | Validity | Signature |
---|
We aim to guarantee data security and accountability in decryption operations. With a focus on transparency and a clear audit trail, our system offers a powerful solution for secure decryption while alerting against any suspicious decryption activities.