CN106503994B - Block chain private data access control method based on attribute encryption - Google Patents
Block chain private data access control method based on attribute encryption Download PDFInfo
- Publication number
- CN106503994B CN106503994B CN201610948544.XA CN201610948544A CN106503994B CN 106503994 B CN106503994 B CN 106503994B CN 201610948544 A CN201610948544 A CN 201610948544A CN 106503994 B CN106503994 B CN 106503994B
- Authority
- CN
- China
- Prior art keywords
- attribute
- transaction
- user
- ciphertext
- policy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
Abstract
The invention discloses a block chain private data access control method based on attribute encryption, which mainly solves the privacy disclosure problem caused by the prior art that only the true identity of a user in a block chain is protected anonymously and transaction private information is not protected by encryption, and comprises the following implementation steps: 1. initializing a system; 2. registering a user to acquire attribute information; 3. the authority center distributes a user private key according to the user attribute information; 4. the transaction party encrypts the transaction privacy data and uploads the transaction privacy data to the blockchain; 5. the bookkeeper verifies the transaction information and executes the transaction; 6. the authorization supervision center uses the authorization private key to decrypt and view the transaction ciphertext. According to the invention, the transaction privacy information is encrypted, so that the data privacy leakage is avoided, and the method can be used for privacy protection of the virtual asset transaction data in the block chain.
Description
Technical Field
The invention belongs to the technical field of passwords, and particularly relates to a private data access control method which can be applied to authorized supervision centers of different levels in a block chain and users to effectively access encrypted transaction data in the block chain.
Background
The blockchain is essentially a decentralized database, like a shared book, that records all bitcoin transaction information. As a bottom layer technology of the bitcoin, the block chain has the characteristics of decentralization, openness, anonymity, non-tampering and the like. In a traditional public blockchain, data such as account information and transaction content of a user are public, any user can participate in accounting and viewing transaction data, and the privacy of the user is protected only in a pseudo-anonymous mode. This, while increasing the confidence of the user that the data is truly authentic, for the financial industry, complete disclosure of the data involves a great deal of commercial confidentiality and interest, and thus it is necessary to use encryption techniques to protect the privacy of the data, while at the same time ensuring that regulatory centers such as governments and banks can view the contents of the transaction to prevent the conduct of illegal transactions in the blockchain. This requires flexible access control policies to enable control of access rights for different users. Moreover, as the number of users in the block chain increases dramatically, a large amount of transaction information will be generated, which causes inconvenience in supervision, and therefore supervision centers of different levels need to be set to supervise the progress of transactions in the block chain hierarchically.
In 2005, Sahai and Waters proposed the concept of attribute encryption ABE, ABE is divided into ciphertext policy attribute encryption CP-ABE and key policy attribute encryption KP-ABE, in CP-ABE, ciphertext is related to access policy, key is related to user attribute, and user can decrypt ciphertext only if user attribute satisfies the access control policy of ciphertext, CP-ABE has flexible access control policy, well solves the access control problem of many-to-many communication, but it does not consider the relationship between attributes, and is not suitable for the case where there is a higher authority covering lower authority between different levels of authorized user authorities, so 2009 Jin L i et al proposed the concept of hierarchical attribute encryption HABE, which layered attributes in attribute set according to the correlation between attributes, thus having the property that upper attributes cover lower attributes, but based on basic ABE, it lacks fine-grained access control.
The university of sienna electronic technology disclosed a hierarchical attribute encryption scheme in the patent "a hierarchical attribute encryption scheme" filed by the university of sienna electronic technology (publication No. 105406967a, application No. 201510908416.8, application date: 2016, 03, 16). According to the scheme, corresponding lines of a layered access structure are embedded into each attribute of the layers during encryption, so that the combination of layering and access control is realized. The method has the disadvantages that the attributes are layered only according to the importance of the attributes, the consideration on the correlation among the attributes is not detailed enough, and the method is not suitable for the condition that fine-grained layered access control needs to be carried out on user authorities at all levels in a future block chain.
Disclosure of Invention
The invention aims to provide a block chain private data access control method based on attribute encryption to strengthen the protection of private data in a block chain and ensure that authorized supervision centers and users in different levels can effectively access the private data in the block chain.
The technical scheme of the invention is thatThe user applies for registration to the system, and obtains an identification ID and a user attribute set S which are uniquely corresponding to the user identification informationu(ii) a The authority center CA distributes a private key SK for the user according to the user attribute information; when a trading party A carries out a trade with a trading party B, sensitive information to be traded is encrypted by using a hierarchical attribute encryption technology so as to ensure that the trading party B and each level of authorization supervision centers can decrypt a ciphertext; other unauthorized users in the block chain do not have the right to view the encrypted transaction information, but can verify the validity of the transaction through the verification information attached behind the transaction ciphertext, and the implementation steps comprise the following steps:
(1) initialization:
(1a) input System safety parameters 1λGenerating a first group of multiplication cycles G of order prime p0A second multiplication loop group G1And a finite field ZpRandomly selecting a first multiplication cycle group G0G, defining a bilinear mapping e0×G0→G1;
(1b) From a finite field ZpSelecting N elements as system attributes to form a system attribute set S, dividing the attributes in the S into N trees according to the correlation among the attributes, and setting the depth of the ith tree as liDefinition l ═ max { li}i∈[1,n]Representing the maximum depth of n trees, i ∈ [1, n];
(1c) Randomly selecting a first vector U ═ U (U)θ)1≤θ≤lAnd a second vector U '═ U'θ′)1≤θ′≤nWherein u isθPublic parameter, u, corresponding to the theta-th level of the representation attribute treeθ∈G0,u′θ′Denotes a public parameter, u ', corresponding to the # attribute tree'θ′∈G0(ii) a Definition ofIs a finite field ZpA set of elements of interp inTwo random numbers α with different sizes are selectedAnd β, calculating public parameters Y ═ e (g, g)αGenerating a system parameter PK and a master private key MK:
PK=(G0,g,gβ,Y,U,U′),
MK=(α,β);
(2) identity registration:
(2a) the user applies for registration to the system, and obtains the ID and user attribute set S corresponding to the real ID informationuAnd submitting the data to an authority center CA, wherein the user comprises a common user and a supervision center, the attribute authority acquired by the supervision center is higher than the attribute authority of the common user in the jurisdiction range of the user,
(2b) authority center CA verifies user' S ID and user attribute set SuIf the correctness is correct, the step (3) is executed, otherwise, the registration is terminated;
(3) key distribution:
(3a) authority center CA for user attribute set SuThe jth attribute of (1)jCalculating its attribute private key djPrivate key parameter DjAnd privilege parameter set D'j;
(3b) The authority center CA calculates the private key SK of the user:
wherein D ═ g(α+r)/βIs part of the user's private key SK;
(3c) the authority center CA sends the private key SK of the user to the user through a secure channel for secret storage;
(4) encrypting transaction privacy data:
(4a) the trading party A formulates an access control strategy P and constructs an access control structure (M, rho) through a linear secret sharing system L SSS, wherein M is a generator matrix of c rows and d columns, rho is a mapping for mapping elements in a set {1,2,..,. d } to attributes in a ciphertext strategy attribute set L, and the ciphertext strategy attribute set L is a set of all attributes in the access control strategy P;
(4b) selecting a random secret valueGenerating d secret shares s of a secret value s}∈[1,d]Wherein s isIs the first secret share of the secret value s, ∈ [1, d];
(4c) For the jth attribute a in the ciphertext policy attribute set Lj′Calculating its attribute ciphertext Cj′And policy parameter C'j′;
(4d) The transaction party A inputs transaction plaintext information m to be encrypted, and generates a ciphertext E:
wherein the content of the first and second substances,is a partial cipher text containing transaction plaintext information m, C ═ gβsIs a partial ciphertext containing a secret value s;
(5) uploading transaction data:
(5a) the transaction party A signs the ciphertext E and the additional verification information M' through a secure signature algorithm Sig, and generates a primary signature file sigmaASending the data to a transaction party B;
(5b) the transaction part B receives the preliminary signature document sigmaADecrypting the ciphertext E, checking the transaction information to be correct, and then signing the primary signature document sigmaASigning is carried out to generate a final signature file sigmaBAnd broadcast to the blockchain;
(6) executing the transaction:
(6a) the system selects the bookkeeper F with the fastest bookkeeping best in a period of time;
(6b) the bookkeeper F broadcasts a data block containing all transaction information in the period of time in a blockchain, each node in the blockchain can verify the transaction information in the data block, and if the transaction information is real and valid, the block is added into the blockchain;
(6c) the bookkeeper F uses an addition homomorphic algorithm to change the account balance of the transaction parties A and B;
(7) and accessing the ciphertext:
(7a) before looking up the specific content of a certain transaction information, a user or a supervision center firstly verifies the attribute set S of the user or the supervision centeruWhether the access control policy P is satisfied:
if not, the decryption operation cannot be executed correctly;
if yes, selecting an authorization set S 'meeting the access control policy P'uAnd (7b) executing the step (7b),
(7b) at grant set S'uSelects the attribute a of the ciphertext strategy capable of being coveredj′User attribute of (a)jWherein a isj∈Su;
(7d) And decrypting the ciphertext E of the transaction information in the block chain to obtain transaction plaintext information m.
Compared with the prior art, the invention has the following advantages:
firstly, the transaction privacy data in the block chain is encrypted by using an encryption technology, so that the problem of privacy disclosure caused by disclosure of all data in the traditional public block chain is solved, and privacy protection of transaction sensitive information in the block chain is realized;
secondly, the invention combines the hierarchical attribute encryption technology with the linear secret sharing system L SSS, thus realizing fine-grained hierarchical access control to the transaction ciphertext in the block chain, and the transaction party can make the monitoring center to which the transaction party belongs have the authority to access the transaction ciphertext as long as the transaction party adds own authority into the access control strategy, thereby avoiding the situation that the transaction party intentionally does not make the monitoring center look over when using the access control strategy to encrypt the transaction information.
Drawings
FIG. 1 is a general flow chart of an implementation of the present invention;
FIG. 2 is a sub-flow diagram of encrypting transaction privacy data in accordance with the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1, the implementation steps of the present invention are as follows.
And step 1, initializing.
Input System safety parameters 1λGenerating a first group of multiplication cycles G of order prime p0A second multiplication loop group G1And a finite field ZpRandomly selecting a first multiplication cycle group G0G, defining a bilinear mapping e0×G0→G1;
From a finite field ZpSelecting N elements as system attributes to form a system attribute set S, dividing the attributes in the S into N trees according to the correlation among the attributes, and setting the depth of the ith tree as liDefinition l ═ max { li}i∈[1,n]Representing the maximum depth of n trees, i ∈ [1, n];
Randomly selecting a first vector U ═ U (U)θ)1≤θ≤lAnd a second vector U '═ U'θ′)1≤θ′≤nWherein u isθPublic parameter, u, corresponding to the theta-th level of the representation attribute treeθ∈G0,u′θ′Denotes a public parameter, u ', corresponding to the # attribute tree'θ′∈G0(ii) a Definition ofIs a finite field ZpA set of elements of interp inTwo random numbers α with different sizes are selectedAnd β, calculating public parameters Y ═ e (g, g)αGenerating a system parameter PK and a master private key MK:
PK=(G0,g,gβ,Y,U,U′),
MK=(α,β)。
and 2, identity registration.
The user applies for registration to the system, and obtains the ID and user attribute set S corresponding to the real ID information of the useruAnd submitted to an authority centre CA, whereinThe users comprise common users and supervision centers at all levels, and the attribute authority acquired by the supervision centers is higher than that of the common users in the jurisdiction range of the supervision centers;
authority center CA verifies user' S ID and user attribute set SuIf so, executing the step 3, otherwise, terminating the registration.
And 3, distributing the key.
(3a) Set of user attributes SuJ-th user attribute of (1)jIs located in the ith attribute tree, has the depth h and the path Rj=(aj0,aj1...,ajk,...,ajh) Wherein, k ∈ [0, h],ajkIs the user attribute ajPath R ofjCorresponding attributes of the k-th layer, the authoritative central CA selecting random numbers for combating collusion attacksFor user attribute ajSelecting an attribute random number rj∈ZpAnd calculates its attribute private key djPrivate key parameter DjAnd privilege parameter set D'j:
Wherein u'iRepresenting the public parameter, u, corresponding to the ith attribute treekIs a public parameter of the k-th level of the attribute tree,are the h +1 th to l-th layers of the attribute treeiA public parameter of the layer;
(3b) the authority center CA calculates the private key SK of the user:
wherein D ═ g(α+r)/βIs part of the private key SK of the user.
(3c) The authority center CA sends the private key SK of the user to the user through a secure channel for storage.
And 4, encrypting the transaction privacy data.
Referring to fig. 2, the steps are as follows:
(4a) the trading party A formulates an access control strategy P, and an access control structure (M, rho) is constructed through a linear secret sharing system L SSS, wherein M is a generating matrix of c rows and d columns, rho is a mapping for mapping elements in a set {1,2,..,. d } to attributes in a ciphertext strategy attribute set L, and the ciphertext strategy attribute set L is a set of all attributes in the access control strategy P;
(4b) selecting a random secret valueFrom a finite field ZpC-1 random numbers v2,...,vcConstructing a random vector v ═ (s, v)2,...,vc)TGenerating d secret shares s of a secret value s}∈[1,d]:
s=M·v,
Wherein M isIs the first row of the generator matrix M, ∈ [1, d],sIs with the policy attribute aj′A first secret share of the corresponding secret value s;
(4c) let the jth' policy attribute a in the ciphertext policy attribute set Lj′The attribute tree is positioned in the ith 'attribute tree, the depth of the attribute tree is h', and the path of the attribute tree is Rj′=(aj′0,aj′1,...,aj′k′,...,aj′h′) Wherein, k '∈ [0, h'],aj′k′Is a policy attribute aj′Path R ofj′Corresponding attribute of the k' th layer in (1), for policy attribute aj′Selecting its corresponding secret share s according to the mapping ρAnd calculating its attribute ciphertext Cj′And policy parameter C'j′:
Wherein u'i′Representing the public parameter, u, corresponding to the ith' attribute treek′Is the public parameter of the k' layer of the attribute tree;
(4d) the transaction party A inputs transaction plaintext information m to be encrypted, and generates a ciphertext E:
wherein the content of the first and second substances,is a partial cipher text containing transaction plaintext information m, C ═ gβsIs a partial cipher text containing a secret value s.
And 5, uploading transaction data.
(5a) The transaction party A signs the ciphertext E and the additional verification information M' through a secure signature algorithm Sig:
wherein σAIs the primary signature file signed by the transaction party A, the additional verification information M' contains the amount of the bitcoin and the source information sAIs the private signature key of the transaction party A, | | | represents the cascade operation, IDAIs the identity of the transaction party a;
(5b) the transaction part A signs the preliminary signature file sigmaASending to a transaction party B, which receives the preliminary signature document sigmaAThen, the ciphertext E is decrypted, and after checking that the transaction information is correct, the transaction party B runs a signature algorithm Sig to sign the primary signature file sigmaASigning is carried out to generate a final signature file sigmaB:
Wherein s isBIs the private signature key, ID, of party BBIs the identity of party B;
(5c) the transaction part B will finally sign the document sigmaBBroadcast to the blockchain.
And 6, executing the transaction.
The system selects the bookkeeper F with the fastest bookkeeping best in a period of time;
the bookkeeper F broadcasts a data block containing all transaction information in the period of time in a blockchain, each node in the blockchain can verify the transaction information in the data block, and if the transaction information is real and valid, the block is added into the blockchain;
the biller F uses an additive homomorphic algorithm to alter the balance of both parties a and B of the transaction.
And 7, accessing the ciphertext.
(7a) Before looking up the specific content of a certain transaction information, a user or a supervision center firstly verifies the attribute set S of the user or the supervision centeruWhether the access control policy P is satisfied:
if not, the decryption operation cannot be executed correctly;
(7b) At grant set S'uThe coverable strategy attribute a meeting the following 3 conditions is selectedj′User attribute of (a)j:
User attributes ajIn the ith attribute tree, the policy attribute aj′In the i 'th attribute tree, i ═ i' is satisfied;
user attributes ajDepth h and policy attribute a ofj′Satisfies the following conditions: h is less than or equal to h';
user attributes ajPath R ofj=(aj0,aj1,...,ajk,...,ajh) With policy attribute aj′Path R ofj′=(aj′0,aj′1,...,aj′k′,...,aj′h′) Satisfies the following conditions: when k is k', ajk=aj′k′Where k ∈ [0, h],k′∈[0,h′];
(7c) For overlay policy attribute aj′User attribute of (a)jCalculating its decryption permission value d'jAnd bilinear pairs
Wherein d isjIs the private key of the attribute that,is a set of rights parameters D'jElement (2) representing user attribute ajAuthority parameter of aj′,h+1,aj′,h+2,...,aj′h′Is the ciphertext policy Attribute aj′Path R ofj′Corresponding attributes of the h +1 th to h' th layers, Cj′Is a policy attribute aj′Attribute ciphertext of (D)jIs a policy attribute aj′Private key parameter of, C'j′Is a policy attribute aj′Of the policy parameter u'i′Representing the public parameter, u, corresponding to the ith' attribute treek′Is a public parameter of the k' th layer of the attribute tree, aj′k′Is a policy attribute aj′Path R ofj′Corresponding attribute of the kth ' layer in, k ' ∈ [0, h '];
(7d) Decrypting the ciphertext E of the transaction information in the block chain to obtain decrypted transaction plaintext information m:
wherein the content of the first and second substances,is a partial cipher text containing transaction plaintext information m, C is a partial cipher text containing a secret value s, D is a partial key in a user private key SK, and lambdaIs a set { lambda}∈IOf the first parameter, λ∈ZpSet { λ }}∈IIs a parameter set obtained according to the reconstruction property of L SSS scheme, I {: ρ () ∈ S'uρ () represents the policy attribute a mapped to the ciphertext policy attribute set L with a mapping ρj′,sIs with the policy attribute aj′A first secret share of the corresponding secret value s.
Through the steps, the layered ciphertext strategy attribute encryption technology is combined with the linear secret sharing system L SSS, and the layered ciphertext strategy attribute encryption technology is applied to the transaction process of the block chain, so that encryption protection and layered access control on transaction sensitive information in the block chain are realized.
Claims (9)
1. A block chain private data access control method based on attribute encryption comprises the following steps:
(1) initialization:
(1a) input System safety parameters 1λGenerating a first group of multiplication cycles G of order prime p0A second multiplication loop group G1And a finite field ZpRandomly selecting a first multiplication cycle group G0G, defining a bilinear mapping e0×G0→G1;
(1b) From a finite field ZpSelecting N elements as system attributes to form a system attribute set S, dividing the attributes in the S into N trees according to the correlation among the attributes, and setting the depth of the ith tree as liDefinition l ═ max { li}i∈[1,n]Representing the maximum depth of n trees, i ∈ [1, n];
(1c) Randomly selecting a first vector U ═ U (U)θ)1≤θ≤lAnd a second vector U '═ U'θ′)1≤θ′≤nWherein u isθPublic parameter, u, corresponding to the theta-th level of the representation attribute treeθ∈G0,u′θ′Denotes a public parameter, u ', corresponding to the # attribute tree'θ′∈G0(ii) a Definition ofIs a finite field ZpA set of elements of interp inTwo random numbers α and β with different sizes are selected, and public parameters Y ═ e (g, g) are calculatedαGenerating a system parameter PK and a master private key MK:
PK=(G0,g,gβ,Y,U,U′),
MK=(α,β);
(2) identity registration:
(2a) the user applies for registration to the system, and obtains the ID and user attribute set S corresponding to the real ID informationuAnd submitting the data to an authority center CA, wherein the user comprises a common user and a supervision center, the attribute authority acquired by the supervision center is higher than the attribute authority of the common user in the jurisdiction range of the user,
(2b) authority center CA verifies user' S ID and user attribute set SuIf the correctness is correct, the step (3) is executed, otherwise, the registration is terminated;
(3) key distribution:
(3a) authority center CA for user attribute set SuThe jth attribute of (1)jCalculating its attribute private key djPrivate key parameter DjAnd privilege parameter set D'j;
(3b) The authority center CA calculates the private key SK of the user:
wherein D ═ g(α+r)/βIs a partial key in the user's private key SK, r is a random number to resist collusion attacks,
(3c) the authority center CA sends the private key SK of the user to the user through a secure channel for secret storage;
(4) encrypting transaction privacy data:
(4a) the trading party A formulates an access control strategy P and constructs an access control structure (M, rho) through a linear secret sharing system L SSS, wherein M is a generator matrix of c rows and d columns, rho is a mapping for mapping elements in a set {1,2,..,. d } to attributes in a ciphertext strategy attribute set L, and the ciphertext strategy attribute set L is a set of all attributes in the access control strategy P;
(4b) selecting a random secret valueGenerating d secret shares s of a secret value s}∈[1,d]Wherein s isIs the first secret share of the secret value s, ∈ [1, d];
(4c) For the jth attribute a in the ciphertext policy attribute set Lj′Calculating its attribute ciphertext Cj′And policy parameter C'j′;
(4d) The transaction party A inputs transaction plaintext information m to be encrypted, and generates a ciphertext E:
wherein the content of the first and second substances,is a partial cipher text containing transaction plaintext information m, C ═ gβsIs a partial ciphertext containing a secret value s;
(5) uploading transaction data:
(5a) the transaction party A signs the ciphertext E and the additional verification information M' through a secure signature algorithm Sig, and generates a primary signature file sigmaASending the data to a transaction party B;
(5b) the transaction part B receives the preliminary signature document sigmaADecrypting the ciphertext E, checking the transaction information to be correct, and then signing the primary signature document sigmaASigning is carried out to generate a final signature file sigmaBAnd broadcast to the blockchain;
(6) executing the transaction:
(6a) the system selects the bookkeeper F with the fastest bookkeeping best in a period of time;
(6b) the bookkeeper F broadcasts a data block containing all transaction information in the period of time in a blockchain, each node in the blockchain can verify the transaction information in the data block, and if the transaction information is real and valid, the block is added into the blockchain;
(6c) the bookkeeper F uses an addition homomorphic algorithm to change the account balance of the transaction parties A and B;
(7) and accessing the ciphertext:
(7a) before looking up the specific content of a certain transaction information, a user or a supervision center firstly verifies the attribute set S of the user or the supervision centeruWhether the access control policy P is satisfied:
if not, the decryption operation cannot be executed correctly;
if yes, selecting an authorization set S 'meeting the access control policy P'uAnd (7b) executing the step (7b),
(7b) at grant set S'uSelects the attribute a of the ciphertext strategy capable of being coveredj′User attribute of (a)jWherein a isj∈Su;
(7d) And decrypting the ciphertext E of the transaction information in the block chain to obtain transaction plaintext information m.
2. Method according to claim 1, characterized in that in step (3a) an attribute private key d is calculatedjPrivate key parameter DjAnd attribute privilege parameter set D'jCalculated according to the following formula:
where G is the first multiplication cycle group G0Generating element ofR is a random number for combating collusion attack,u′ia public parameter indicating the correspondence of the ith attribute tree, and h is a user attribute ajDepth, u, in the attribute treekIs a public parameter of the k-th level of the attribute tree, ajkIs the user attribute ajPath R ofj=(aj0,aj1...,ajk,...,ajh) Corresponding property of the kth layer, k ∈ [0, h],rjIs an attribute random number, rj∈Zp,Are the h +1 th to l-th layers of the attribute treeiDisclosed parameters of the layer.
3. Method according to claim 1, characterized in that d secret shares { s) of the secret value s are calculated in step (4b)}∈[1,d]Calculated according to the following formula:
s=M·v,
wherein s isIs with the policy attribute aj′A first secret share, M, of the corresponding secret value sIs the first row of the generator matrix M, ∈ [1, d]Random vector v ═ s, v2,...,vc)TS is a randomly selected secret value, v2,...,vcIs from a finite field ZpC-1 random numbers selected randomly.
4. The method of claim 1, wherein the attribute ciphertext C is calculated in step (4C)j′And policy parameter C'j′Calculated according to the following formula:
wherein u'i′Denotes the disclosure parameter corresponding to the i 'th attribute tree, h' is the policy attribute aj′Depth, u, in the attribute treek′Is a public parameter of the k' th layer of the attribute tree, aj′k′Is a policy attribute aj′Path R ofj′=(aj′0,aj′1,…,aj′k′,...,aj′h′) Corresponding attribute of the kth ' layer in, k ' ∈ [0, h ']G is the first multiplication cycle group G0Is generated fromIs with the policy attribute aj′A corresponding first secret share of the secret value s, ∈ [1, d]。
5. The method according to claim 1, wherein the transaction part a in step (5a) signs the ciphertext E and the additional verification information M' by using a secure signature algorithm Sig according to the following formula:
wherein σAIs the primary signature file signed by the transaction party A, the additional verification information M' contains the amount of the bitcoin and the source information sAIs the private signature key of the transaction party A, | | | represents the cascade operation, IDAIs the identity of the transaction party a.
6. Method according to claim 1, characterized in that in step (5b) the preliminary signature file σ is signedAAnd performing signature according to the following formula:
wherein σBIs the final signature file, s, generated by the transaction part BBIs the private signature key, ID, of party BAIs the identity, ID, of the transaction part ABIs an identity tag of a transaction part BAnd i | represents a cascade operation.
7. The method of claim 1, wherein step (7b) is at grant set S'uTo select the overridable policy attribute aj′User attribute of (a)jThe following conditions are simultaneously satisfied:
user attributes ajIn the ith attribute tree, the policy attribute aj′In the i' th attribute tree, the following conditions are satisfied between the two attribute trees: i ═ i';
user attributes ajDepth h and policy attribute a ofj′Satisfies the following conditions: h is less than or equal to h';
user attributes ajPath R ofj=(aj0,aj1,…,ajk,…,ajh) With policy attribute aj′Path R ofj′=(aj′0,aj′1,…,aj′k′,...,aj′h′) Satisfies the following conditions: when k is k', ajk=aj′k′Where k ∈ [0, h],k′∈[0,h′]。
8. Method according to claim 1, characterized in that in step (7c) a decryption rights value d 'is calculated'jAnd bilinear pair AjCalculated according to the following formula:
wherein d isjIs the private key of the attribute that,is a set of rights parameters D'jElement (2) representing user attribute ajAuthority parameter of aj′,h+1,aj′,h+2,...,aj′h′Is the ciphertext policy Attribute aj′Path R ofj′=(aj′0,aj′1,…,aj′k′,...,aj′h′) Respective attributes of the h +1 th to h' th layers, rjIs a random number, rj∈Zp,Cj′Is a policy attribute aj′Attribute ciphertext of (D)jIs a policy attribute aj′Private key parameter of, C'j′Is a policy attribute aj′Policy parameter of (1), sIs with the policy attribute aj′A first secret share of the corresponding secret value s.
9. The method of claim 1, wherein the decryption of the ciphertext E of the transaction message in the blockchain in step (7d) is performed according to the following formula:
wherein m is the decrypted clear text information of the transaction,is a partial cipher text containing transaction plaintext information m, C is a partial cipher text containing a secret value s, D is a partial key in a user private key SK, and lambdaIs a set { lambda}∈IOf the first parameter, λ∈ZpSet { λ }}∈IIs a parameter set obtained according to the reconstruction property of L SSS scheme, I {: ρ () ∈ S'uρ () represents the policy attribute a mapped to the ciphertext policy attribute set L with a mapping ρj′。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610948544.XA CN106503994B (en) | 2016-11-02 | 2016-11-02 | Block chain private data access control method based on attribute encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610948544.XA CN106503994B (en) | 2016-11-02 | 2016-11-02 | Block chain private data access control method based on attribute encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106503994A CN106503994A (en) | 2017-03-15 |
CN106503994B true CN106503994B (en) | 2020-07-28 |
Family
ID=58322104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610948544.XA Active CN106503994B (en) | 2016-11-02 | 2016-11-02 | Block chain private data access control method based on attribute encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106503994B (en) |
Families Citing this family (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107085807B (en) * | 2017-04-19 | 2021-06-08 | 迅鳐成都科技有限公司 | Data asset transaction method based on block chain |
CN107135209B (en) * | 2017-04-21 | 2019-07-16 | 天津理工大学 | A kind of data sharing method based on block chain |
CN107240056A (en) * | 2017-05-08 | 2017-10-10 | 暨南大学 | A kind of love and marriage register method based on block chain technology |
CN106992990A (en) * | 2017-05-19 | 2017-07-28 | 北京牛链科技有限公司 | Data sharing method and system and block catenary system and computing device |
CN107451485B (en) * | 2017-06-02 | 2020-03-13 | 创新先进技术有限公司 | Data processing method and device based on block chain |
CN107294963B (en) * | 2017-06-14 | 2019-09-06 | 广东工业大学 | A kind of safe encryption method and device of the data based on alliance's block chain |
CN107248994B (en) * | 2017-06-26 | 2020-08-14 | 联动优势科技有限公司 | Information sending method, processing method and device |
CN107358424B (en) * | 2017-06-26 | 2020-09-29 | 中国人民银行数字货币研究所 | Transaction method and device based on digital currency |
CN107148037A (en) * | 2017-07-18 | 2017-09-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of system of selection, terminal and the server of the small base station of terminated |
US10476879B2 (en) * | 2017-07-26 | 2019-11-12 | International Business Machines Corporation | Blockchain authentication via hard/soft token verification |
GB201712493D0 (en) * | 2017-08-03 | 2017-09-20 | Nchain Holdings Ltd | Computer-Implemented system and method |
US10404455B2 (en) * | 2017-09-01 | 2019-09-03 | Accenture Global Solutions Limited | Multiple-phase rewritable blockchain |
CN107483198B (en) * | 2017-09-25 | 2019-11-12 | 中国科学院信息工程研究所 | A kind of block catenary system supervised and method |
CN107481146A (en) * | 2017-10-13 | 2017-12-15 | 深圳市招股科技有限公司 | One kind is based on the safe and efficient financial trade method of block chain |
CN107911216B (en) * | 2017-10-26 | 2020-07-14 | 矩阵元技术(深圳)有限公司 | Block chain transaction privacy protection method and system |
CN107682364B (en) * | 2017-11-03 | 2019-12-03 | 杭州秘猿科技有限公司 | A kind of license chain privacy method of commerce |
CN108063754B (en) * | 2017-11-10 | 2020-11-13 | 西安电子科技大学 | Attribute-based encryption method for anonymized data of wearable health monitoring equipment |
CN108171494A (en) | 2017-11-23 | 2018-06-15 | 阿里巴巴集团控股有限公司 | A kind of data processing method and device |
CN108418689B (en) * | 2017-11-30 | 2020-07-10 | 矩阵元技术(深圳)有限公司 | Zero-knowledge proof method and medium suitable for block chain privacy protection |
CN108123936B (en) * | 2017-12-13 | 2021-04-13 | 北京科技大学 | Access control method and system based on block chain technology |
CN108269398A (en) * | 2017-12-27 | 2018-07-10 | 深圳市元征软件开发有限公司 | A kind of recording method of highway traffic data and mobile unit |
CN108304478A (en) * | 2017-12-28 | 2018-07-20 | 深圳市轱辘车联数据技术有限公司 | A kind of data processing method and server |
CN108364223B (en) | 2017-12-29 | 2021-01-26 | 创新先进技术有限公司 | Data auditing method and device |
CN108335106A (en) * | 2018-01-24 | 2018-07-27 | 深圳壹账通智能科技有限公司 | The more account books of Zero Knowledge based on block chain exchange transfer account method, device and storage medium |
CN108320143B (en) * | 2018-02-05 | 2022-03-11 | 中国地质大学(武汉) | Method for protecting cipher currency private key |
CN108462568B (en) * | 2018-02-11 | 2021-08-06 | 西安电子科技大学 | Block chain-based secure file storage and sharing method and cloud storage system |
CN108289129B (en) * | 2018-02-26 | 2020-10-23 | 深圳智乾区块链科技有限公司 | Block chain ecological environment creating method and system and computer readable storage medium |
GB201817506D0 (en) * | 2018-03-02 | 2018-12-12 | Nchain Holdings Ltd | Computer implemented method and system |
US10951626B2 (en) | 2018-03-06 | 2021-03-16 | Americorp Investments Llc | Blockchain-based commercial inventory systems and methods |
CN117610062A (en) * | 2018-03-06 | 2024-02-27 | 阿梅里科普投资有限责任公司 | Systems, methods, and media for generating customized views of blockchain storage data |
US11700265B2 (en) | 2018-03-06 | 2023-07-11 | Americorp Investments Llc | Customized view of restricted information recorded into a blockchain |
GB201803706D0 (en) * | 2018-03-08 | 2018-04-25 | Nchain Holdings Ltd | Computer-implemented system and method |
CN108537498A (en) * | 2018-03-15 | 2018-09-14 | 上海卓辰信息科技有限公司 | Interorganizational project management method, system, equipment and medium based on block chain |
GB201805633D0 (en) * | 2018-04-05 | 2018-05-23 | Nchain Holdings Ltd | Computer implemented method and system |
CN108712380B (en) * | 2018-04-12 | 2021-01-19 | 三维通信股份有限公司 | Policy-based hybrid identity authentication method |
CN108632480A (en) * | 2018-04-19 | 2018-10-09 | 北京阿尔山金融科技有限公司 | Charging method based on block chain and device |
CN108614974B (en) * | 2018-04-24 | 2021-06-01 | 南京邮电大学 | Express information privacy protection system based on block chain and protection method thereof |
CN108898475B (en) * | 2018-05-08 | 2021-04-06 | 众安信息技术服务有限公司 | Attribute encryption-based alliance block chain credit implementation method and system |
CN108632292B (en) * | 2018-05-16 | 2020-11-17 | 苏宁易购集团股份有限公司 | Data sharing method and system based on alliance chain |
CN108768988B (en) * | 2018-05-17 | 2021-01-05 | 深圳前海微众银行股份有限公司 | Block chain access control method, block chain access control equipment and computer readable storage medium |
CN108805585B (en) * | 2018-05-28 | 2022-07-05 | 广州中科易德科技有限公司 | Distributed commodity data storage system based on block chain, circulation and tracing method |
CN108875407A (en) * | 2018-06-12 | 2018-11-23 | 东方银谷(北京)投资管理有限公司 | For the sensitive information processing method and processing device of financial business, client, data framework |
CN110661610B (en) * | 2018-06-29 | 2020-11-03 | 创新先进技术有限公司 | Input acquisition method and device of secure multi-party computing protocol |
WO2020010490A1 (en) * | 2018-07-09 | 2020-01-16 | 彭英均 | Method for arbitration-less resolution of accuracy and validity of transaction data recorded in blockchain |
GB201811773D0 (en) * | 2018-07-19 | 2018-09-05 | Nchain Holdings Ltd | Computer-implemented system and method |
CN109274481B (en) * | 2018-08-01 | 2020-03-27 | 中国科学院数据与通信保护研究教育中心 | Data traceable method of block chain |
CN109241055A (en) * | 2018-08-09 | 2019-01-18 | 上海常仁信息科技有限公司 | A kind of block chain data-storage system |
CN109325370A (en) * | 2018-08-09 | 2019-02-12 | 上海常仁信息科技有限公司 | A kind of block chain access robot node device |
CN109271769A (en) * | 2018-08-24 | 2019-01-25 | 广东博云公共平台网络科技有限公司 | A kind of Subscriber Management System and user management method |
WO2020037654A1 (en) * | 2018-08-24 | 2020-02-27 | 区链通网络有限公司 | Blockchain data protection method, device and system, and computer-readable storage medium |
CN109145647A (en) * | 2018-09-05 | 2019-01-04 | 武汉笑脸科技有限公司 | A kind of trusted identity verifying system and method based on block chain |
CN109214160A (en) * | 2018-09-14 | 2019-01-15 | 温州科技职业学院 | A kind of computer network authentication system and method, computer program |
CN109447634A (en) * | 2018-10-09 | 2019-03-08 | 北京网录科技有限公司 | A kind of code key update method and block chain account management method using this method of locking an account |
CN109493042A (en) * | 2018-10-24 | 2019-03-19 | 南京邮电大学 | A kind of intelligent contract possessing access control function is credible to deposit card method and system |
CN109559117B (en) * | 2018-11-14 | 2022-05-20 | 北京科技大学 | Block linkage contract privacy protection method and system based on attribute-based encryption |
US11316668B2 (en) | 2018-11-16 | 2022-04-26 | Safetech Bv | Methods and systems for cryptographic private key management for secure multiparty storage and transfer of information |
CN109598149B (en) * | 2018-11-20 | 2020-04-07 | 阿里巴巴集团控股有限公司 | Service processing method and device |
CN109711184B (en) * | 2018-12-28 | 2020-11-10 | 国网电子商务有限公司 | Block chain data access control method and device based on attribute encryption |
CN109687958A (en) * | 2018-12-28 | 2019-04-26 | 全链通有限公司 | A kind of design of art work certificate and verification method based on fidelity block chain |
CN109979550B (en) * | 2019-02-14 | 2021-06-01 | 中国科学院信息工程研究所 | Block chain medical data management method and system based on distributed attribute signature |
SG11201908556UA (en) | 2019-03-04 | 2019-10-30 | Alibaba Group Holding Ltd | Methods and devices for providing transaction data to blockchain system for processing |
CN110458554B (en) * | 2019-03-31 | 2022-03-22 | 西安电子科技大学 | Identity-based data rapid transaction method on block chain |
CN110414961A (en) * | 2019-06-21 | 2019-11-05 | 深圳壹账通智能科技有限公司 | Prevent transfer account method, device, equipment and the storage medium of the track transactions side of producing |
CN110266687B (en) * | 2019-06-21 | 2021-08-17 | 杭州云象网络技术有限公司 | Method for designing Internet of things security agent data sharing module by adopting block chain technology |
CN110647756B (en) * | 2019-08-05 | 2023-06-27 | 广东工业大学 | Online examination management system based on blockchain and CP-ABE and application method thereof |
CN110740033B (en) * | 2019-08-19 | 2022-07-19 | 杭州云象网络技术有限公司 | Block chain multi-party data sharing method based on secret sharing technology |
CN110599163B (en) * | 2019-08-20 | 2023-03-24 | 江苏大学 | Transaction record outsourcing method facing block chain transaction supervision |
CN110493347B (en) * | 2019-08-26 | 2020-07-14 | 重庆邮电大学 | Block chain-based data access control method and system in large-scale cloud storage |
CN111030821B (en) * | 2019-08-27 | 2022-07-12 | 杭州云象网络技术有限公司 | Encryption method of alliance chain based on bilinear mapping technology |
CN110719176A (en) * | 2019-10-22 | 2020-01-21 | 黑龙江工业学院 | Logistics privacy protection method and system based on block chain and readable storage medium |
WO2021081803A1 (en) * | 2019-10-30 | 2021-05-06 | 深圳市网心科技有限公司 | Blockchain system, supervision method, system, device, and computer storage medium |
CN111079170B (en) * | 2019-11-04 | 2021-11-23 | 湖南源科创新科技有限公司 | Control method and control device of solid state disk |
CN111046427A (en) * | 2019-12-13 | 2020-04-21 | 北京启迪区块链科技发展有限公司 | Block chain-based data access control method, device, equipment and medium |
CN111130757B (en) * | 2019-12-31 | 2020-12-25 | 华中科技大学 | Multi-cloud CP-ABE access control method based on block chain |
CN111314369A (en) * | 2020-02-27 | 2020-06-19 | 苏州市星际云通区块链科技有限公司 | Resource sharing block chain network |
CN111371561B (en) * | 2020-02-27 | 2023-07-11 | 华信咨询设计研究院有限公司 | Alliance block chain data access control method based on CP-ABE algorithm |
CN111008201B (en) * | 2020-03-09 | 2020-06-26 | 支付宝(杭州)信息技术有限公司 | Method and apparatus for parallel modification and reading of state trees |
CN111625869B (en) * | 2020-04-23 | 2022-02-25 | 腾讯科技(深圳)有限公司 | Data processing method and data processing device |
CN111614678B (en) * | 2020-05-22 | 2022-07-29 | 中国联合网络通信集团有限公司 | Anti-disclosure method, anti-disclosure device and encryption device |
CN111681002B (en) * | 2020-06-10 | 2023-05-02 | 浙江工商大学 | Fair data transaction method and system based on blockchain |
CN111709053B (en) * | 2020-06-11 | 2024-04-05 | 中国工商银行股份有限公司 | Operation method and operation device based on loose coupling transaction network |
CN111859444B (en) * | 2020-06-12 | 2022-03-01 | 中国科学院信息工程研究所 | Block chain data supervision method and system based on attribute encryption |
CN111901302B (en) * | 2020-06-28 | 2022-02-25 | 石家庄铁道大学 | Medical information attribute encryption access control method based on block chain |
CN111986755B (en) * | 2020-08-24 | 2023-05-19 | 中国人民解放军战略支援部队信息工程大学 | Data sharing system based on blockchain and attribute-based encryption |
CN112039880B (en) * | 2020-08-30 | 2021-07-30 | 河南大学 | Block chain distributed outsourcing-based dual-policy access control method |
CN112165472B (en) * | 2020-09-22 | 2022-09-27 | 郑州轻工业大学 | Internet of things data security sharing method based on privacy protection |
CN112152778B (en) * | 2020-09-22 | 2022-03-15 | 腾讯科技(深圳)有限公司 | Node management method and device and electronic equipment |
CN112365945B (en) * | 2020-10-27 | 2024-03-26 | 扬州大学 | Electronic medical record fine granularity access control and ciphertext searchable method based on blockchain |
CN112532588B (en) * | 2020-11-06 | 2023-01-31 | 北京工业大学 | Policy hidden type data access control method based on block chain |
CN112989378A (en) * | 2021-03-12 | 2021-06-18 | 北京航空航天大学 | File trusted intermediate storage architecture based on attribute encryption |
CN113127926B (en) * | 2021-03-12 | 2024-01-16 | 西安电子科技大学 | Method, system, storage medium and computer for analyzing statistical correlation of privacy data |
CN113127927B (en) * | 2021-04-27 | 2022-03-18 | 泰山学院 | Attribute reconstruction encryption method and system for license chain data sharing and supervision |
CN113393238B (en) * | 2021-06-16 | 2023-04-14 | 福建师范大学 | Intelligent contract model for protecting privacy and implementation method thereof |
CN113489733B (en) * | 2021-07-13 | 2022-07-29 | 郑州轻工业大学 | Content center network privacy protection method based on block chain |
CN113572790B (en) * | 2021-09-18 | 2022-01-25 | 深圳时空云科技有限公司 | Distributed processing method and device for private information |
CN114640468B (en) * | 2022-03-16 | 2024-01-26 | 安顺职业技术学院 | Block chain privacy protection method based on online offline attribute encryption |
CN114528601B (en) * | 2022-04-25 | 2022-09-30 | 中国工商银行股份有限公司 | Access method and device based on block chain data, processor and electronic equipment |
CN114978744A (en) * | 2022-06-08 | 2022-08-30 | 廖鼎 | Security and protection information transmission method and system based on block chain |
CN116052832B (en) * | 2023-04-03 | 2023-06-30 | 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) | Tamper-proof transmission method based on medical information |
CN116260662B (en) * | 2023-05-15 | 2023-07-18 | 成都信息工程大学 | Tracing storage method, tracing storage system and tracing system |
CN116720839B (en) * | 2023-08-07 | 2023-10-17 | 成都创一博通科技有限公司 | Financial information management method based on blockchain technology and supervision system thereof |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8635464B2 (en) * | 2010-12-03 | 2014-01-21 | Yacov Yacobi | Attribute-based access-controlled data-storage system |
CN105406967B (en) * | 2015-12-10 | 2018-10-19 | 西安电子科技大学 | A kind of hierarchical attribute encipherment scheme |
CN105915333B (en) * | 2016-03-15 | 2019-08-23 | 南京邮电大学 | A kind of efficient key distribution method based on encryption attribute |
CN105933345B (en) * | 2016-06-28 | 2019-10-18 | 电子科技大学 | It is a kind of that outsourcing attribute base encryption method can verify that based on linear privacy sharing |
-
2016
- 2016-11-02 CN CN201610948544.XA patent/CN106503994B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN106503994A (en) | 2017-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106503994B (en) | Block chain private data access control method based on attribute encryption | |
CN112019591B (en) | Cloud data sharing method based on block chain | |
Ruj et al. | Privacy preserving access control with authentication for securing data in clouds | |
CN103618728B (en) | A kind of encryption attribute method at more mechanism centers | |
CN107508667B (en) | Ciphertext policy ABE base encryption method and its device of the fix duty without key escrow can be disclosed | |
CN109559124A (en) | A kind of cloud data safety sharing method based on block chain | |
CN106059763B (en) | The properties base multi-mechanism hierarchical Ciphertext policy weight encryption method of cloud environment | |
CN111859444B (en) | Block chain data supervision method and system based on attribute encryption | |
CN104901942A (en) | Distributed access control method for attribute-based encryption | |
Zhang et al. | Multiauthority access control with anonymous authentication for personal health record | |
Wang et al. | A regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption in bitcoin system | |
CN110086615B (en) | Media confusion distributed multi-authority ciphertext policy attribute-based encryption method | |
CN108551435B (en) | Verifiable encryption group signature method with anonymity | |
Liang et al. | Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage | |
CN115296817B (en) | Data access control method based on block chain technology and attribute encryption | |
CN111953483B (en) | Multi-authority access control method based on criterion | |
CN106612169A (en) | Safe data sharing method in cloud environment | |
CN107276766A (en) | A kind of many authorization attribute encipher-decipher methods | |
CN106487792A (en) | A kind of power marketing cloud storage encryption method and system | |
Kroll et al. | Secure protocols for accountable warrant execution | |
CN114143094A (en) | Multi-authorization attribute-based verifiable encryption method based on block chain | |
Oberko et al. | A survey on attribute-based signatures | |
CN109039599A (en) | Support the attribute base encipher-decipher method and encrypting and deciphering system of blind Key Issuance | |
Zhang et al. | Secure and privacy-preserving attribute-based sharing framework in vehicles ad hoc networks | |
CN114866289B (en) | Privacy credit data security protection method based on alliance chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |