CN106503994B - Block chain private data access control method based on attribute encryption - Google Patents

Block chain private data access control method based on attribute encryption Download PDF

Info

Publication number
CN106503994B
CN106503994B CN201610948544.XA CN201610948544A CN106503994B CN 106503994 B CN106503994 B CN 106503994B CN 201610948544 A CN201610948544 A CN 201610948544A CN 106503994 B CN106503994 B CN 106503994B
Authority
CN
China
Prior art keywords
attribute
transaction
user
ciphertext
policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610948544.XA
Other languages
Chinese (zh)
Other versions
CN106503994A (en
Inventor
高军涛
王誉晓
李雪莲
王笠燕
王丹妮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201610948544.XA priority Critical patent/CN106503994B/en
Publication of CN106503994A publication Critical patent/CN106503994A/en
Application granted granted Critical
Publication of CN106503994B publication Critical patent/CN106503994B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Abstract

The invention discloses a block chain private data access control method based on attribute encryption, which mainly solves the privacy disclosure problem caused by the prior art that only the true identity of a user in a block chain is protected anonymously and transaction private information is not protected by encryption, and comprises the following implementation steps: 1. initializing a system; 2. registering a user to acquire attribute information; 3. the authority center distributes a user private key according to the user attribute information; 4. the transaction party encrypts the transaction privacy data and uploads the transaction privacy data to the blockchain; 5. the bookkeeper verifies the transaction information and executes the transaction; 6. the authorization supervision center uses the authorization private key to decrypt and view the transaction ciphertext. According to the invention, the transaction privacy information is encrypted, so that the data privacy leakage is avoided, and the method can be used for privacy protection of the virtual asset transaction data in the block chain.

Description

Block chain private data access control method based on attribute encryption
Technical Field
The invention belongs to the technical field of passwords, and particularly relates to a private data access control method which can be applied to authorized supervision centers of different levels in a block chain and users to effectively access encrypted transaction data in the block chain.
Background
The blockchain is essentially a decentralized database, like a shared book, that records all bitcoin transaction information. As a bottom layer technology of the bitcoin, the block chain has the characteristics of decentralization, openness, anonymity, non-tampering and the like. In a traditional public blockchain, data such as account information and transaction content of a user are public, any user can participate in accounting and viewing transaction data, and the privacy of the user is protected only in a pseudo-anonymous mode. This, while increasing the confidence of the user that the data is truly authentic, for the financial industry, complete disclosure of the data involves a great deal of commercial confidentiality and interest, and thus it is necessary to use encryption techniques to protect the privacy of the data, while at the same time ensuring that regulatory centers such as governments and banks can view the contents of the transaction to prevent the conduct of illegal transactions in the blockchain. This requires flexible access control policies to enable control of access rights for different users. Moreover, as the number of users in the block chain increases dramatically, a large amount of transaction information will be generated, which causes inconvenience in supervision, and therefore supervision centers of different levels need to be set to supervise the progress of transactions in the block chain hierarchically.
In 2005, Sahai and Waters proposed the concept of attribute encryption ABE, ABE is divided into ciphertext policy attribute encryption CP-ABE and key policy attribute encryption KP-ABE, in CP-ABE, ciphertext is related to access policy, key is related to user attribute, and user can decrypt ciphertext only if user attribute satisfies the access control policy of ciphertext, CP-ABE has flexible access control policy, well solves the access control problem of many-to-many communication, but it does not consider the relationship between attributes, and is not suitable for the case where there is a higher authority covering lower authority between different levels of authorized user authorities, so 2009 Jin L i et al proposed the concept of hierarchical attribute encryption HABE, which layered attributes in attribute set according to the correlation between attributes, thus having the property that upper attributes cover lower attributes, but based on basic ABE, it lacks fine-grained access control.
The university of sienna electronic technology disclosed a hierarchical attribute encryption scheme in the patent "a hierarchical attribute encryption scheme" filed by the university of sienna electronic technology (publication No. 105406967a, application No. 201510908416.8, application date: 2016, 03, 16). According to the scheme, corresponding lines of a layered access structure are embedded into each attribute of the layers during encryption, so that the combination of layering and access control is realized. The method has the disadvantages that the attributes are layered only according to the importance of the attributes, the consideration on the correlation among the attributes is not detailed enough, and the method is not suitable for the condition that fine-grained layered access control needs to be carried out on user authorities at all levels in a future block chain.
Disclosure of Invention
The invention aims to provide a block chain private data access control method based on attribute encryption to strengthen the protection of private data in a block chain and ensure that authorized supervision centers and users in different levels can effectively access the private data in the block chain.
The technical scheme of the invention is thatThe user applies for registration to the system, and obtains an identification ID and a user attribute set S which are uniquely corresponding to the user identification informationu(ii) a The authority center CA distributes a private key SK for the user according to the user attribute information; when a trading party A carries out a trade with a trading party B, sensitive information to be traded is encrypted by using a hierarchical attribute encryption technology so as to ensure that the trading party B and each level of authorization supervision centers can decrypt a ciphertext; other unauthorized users in the block chain do not have the right to view the encrypted transaction information, but can verify the validity of the transaction through the verification information attached behind the transaction ciphertext, and the implementation steps comprise the following steps:
(1) initialization:
(1a) input System safety parameters 1λGenerating a first group of multiplication cycles G of order prime p0A second multiplication loop group G1And a finite field ZpRandomly selecting a first multiplication cycle group G0G, defining a bilinear mapping e0×G0→G1
(1b) From a finite field ZpSelecting N elements as system attributes to form a system attribute set S, dividing the attributes in the S into N trees according to the correlation among the attributes, and setting the depth of the ith tree as liDefinition l ═ max { li}i∈[1,n]Representing the maximum depth of n trees, i ∈ [1, n];
(1c) Randomly selecting a first vector U ═ U (U)θ)1≤θ≤lAnd a second vector U '═ U'θ′)1≤θ′≤nWherein u isθPublic parameter, u, corresponding to the theta-th level of the representation attribute treeθ∈G0,u′θ′Denotes a public parameter, u ', corresponding to the # attribute tree'θ′∈G0(ii) a Definition of
Figure BDA0001139974070000021
Is a finite field ZpA set of elements of interp in
Figure BDA0001139974070000022
Two random numbers α with different sizes are selectedAnd β, calculating public parameters Y ═ e (g, g)αGenerating a system parameter PK and a master private key MK:
PK=(G0,g,gβ,Y,U,U′),
MK=(α,β);
(2) identity registration:
(2a) the user applies for registration to the system, and obtains the ID and user attribute set S corresponding to the real ID informationuAnd submitting the data to an authority center CA, wherein the user comprises a common user and a supervision center, the attribute authority acquired by the supervision center is higher than the attribute authority of the common user in the jurisdiction range of the user,
Figure BDA0001139974070000031
(2b) authority center CA verifies user' S ID and user attribute set SuIf the correctness is correct, the step (3) is executed, otherwise, the registration is terminated;
(3) key distribution:
(3a) authority center CA for user attribute set SuThe jth attribute of (1)jCalculating its attribute private key djPrivate key parameter DjAnd privilege parameter set D'j
(3b) The authority center CA calculates the private key SK of the user:
Figure BDA0001139974070000032
wherein D ═ g(α+r)/βIs part of the user's private key SK;
(3c) the authority center CA sends the private key SK of the user to the user through a secure channel for secret storage;
(4) encrypting transaction privacy data:
(4a) the trading party A formulates an access control strategy P and constructs an access control structure (M, rho) through a linear secret sharing system L SSS, wherein M is a generator matrix of c rows and d columns, rho is a mapping for mapping elements in a set {1,2,..,. d } to attributes in a ciphertext strategy attribute set L, and the ciphertext strategy attribute set L is a set of all attributes in the access control strategy P;
(4b) selecting a random secret value
Figure BDA0001139974070000035
Generating d secret shares s of a secret value s}∈[1,d]Wherein s isIs the first secret share of the secret value s, ∈ [1, d];
(4c) For the jth attribute a in the ciphertext policy attribute set Lj′Calculating its attribute ciphertext Cj′And policy parameter C'j′
(4d) The transaction party A inputs transaction plaintext information m to be encrypted, and generates a ciphertext E:
Figure BDA0001139974070000033
wherein the content of the first and second substances,
Figure BDA0001139974070000034
is a partial cipher text containing transaction plaintext information m, C ═ gβsIs a partial ciphertext containing a secret value s;
(5) uploading transaction data:
(5a) the transaction party A signs the ciphertext E and the additional verification information M' through a secure signature algorithm Sig, and generates a primary signature file sigmaASending the data to a transaction party B;
(5b) the transaction part B receives the preliminary signature document sigmaADecrypting the ciphertext E, checking the transaction information to be correct, and then signing the primary signature document sigmaASigning is carried out to generate a final signature file sigmaBAnd broadcast to the blockchain;
(6) executing the transaction:
(6a) the system selects the bookkeeper F with the fastest bookkeeping best in a period of time;
(6b) the bookkeeper F broadcasts a data block containing all transaction information in the period of time in a blockchain, each node in the blockchain can verify the transaction information in the data block, and if the transaction information is real and valid, the block is added into the blockchain;
(6c) the bookkeeper F uses an addition homomorphic algorithm to change the account balance of the transaction parties A and B;
(7) and accessing the ciphertext:
(7a) before looking up the specific content of a certain transaction information, a user or a supervision center firstly verifies the attribute set S of the user or the supervision centeruWhether the access control policy P is satisfied:
if not, the decryption operation cannot be executed correctly;
if yes, selecting an authorization set S 'meeting the access control policy P'uAnd (7b) executing the step (7b),
Figure BDA0001139974070000041
(7b) at grant set S'uSelects the attribute a of the ciphertext strategy capable of being coveredj′User attribute of (a)jWherein a isj∈Su
(7c) Calculating user attribute ajDecryption authority value d'jAnd bilinear pairs
Figure BDA0001139974070000042
(7d) And decrypting the ciphertext E of the transaction information in the block chain to obtain transaction plaintext information m.
Compared with the prior art, the invention has the following advantages:
firstly, the transaction privacy data in the block chain is encrypted by using an encryption technology, so that the problem of privacy disclosure caused by disclosure of all data in the traditional public block chain is solved, and privacy protection of transaction sensitive information in the block chain is realized;
secondly, the invention combines the hierarchical attribute encryption technology with the linear secret sharing system L SSS, thus realizing fine-grained hierarchical access control to the transaction ciphertext in the block chain, and the transaction party can make the monitoring center to which the transaction party belongs have the authority to access the transaction ciphertext as long as the transaction party adds own authority into the access control strategy, thereby avoiding the situation that the transaction party intentionally does not make the monitoring center look over when using the access control strategy to encrypt the transaction information.
Drawings
FIG. 1 is a general flow chart of an implementation of the present invention;
FIG. 2 is a sub-flow diagram of encrypting transaction privacy data in accordance with the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Referring to fig. 1, the implementation steps of the present invention are as follows.
And step 1, initializing.
Input System safety parameters 1λGenerating a first group of multiplication cycles G of order prime p0A second multiplication loop group G1And a finite field ZpRandomly selecting a first multiplication cycle group G0G, defining a bilinear mapping e0×G0→G1
From a finite field ZpSelecting N elements as system attributes to form a system attribute set S, dividing the attributes in the S into N trees according to the correlation among the attributes, and setting the depth of the ith tree as liDefinition l ═ max { li}i∈[1,n]Representing the maximum depth of n trees, i ∈ [1, n];
Randomly selecting a first vector U ═ U (U)θ)1≤θ≤lAnd a second vector U '═ U'θ′)1≤θ′≤nWherein u isθPublic parameter, u, corresponding to the theta-th level of the representation attribute treeθ∈G0,u′θ′Denotes a public parameter, u ', corresponding to the # attribute tree'θ′∈G0(ii) a Definition of
Figure BDA0001139974070000051
Is a finite field ZpA set of elements of interp in
Figure BDA0001139974070000052
Two random numbers α with different sizes are selectedAnd β, calculating public parameters Y ═ e (g, g)αGenerating a system parameter PK and a master private key MK:
PK=(G0,g,gβ,Y,U,U′),
MK=(α,β)。
and 2, identity registration.
The user applies for registration to the system, and obtains the ID and user attribute set S corresponding to the real ID information of the useruAnd submitted to an authority centre CA, wherein
Figure BDA0001139974070000053
The users comprise common users and supervision centers at all levels, and the attribute authority acquired by the supervision centers is higher than that of the common users in the jurisdiction range of the supervision centers;
authority center CA verifies user' S ID and user attribute set SuIf so, executing the step 3, otherwise, terminating the registration.
And 3, distributing the key.
(3a) Set of user attributes SuJ-th user attribute of (1)jIs located in the ith attribute tree, has the depth h and the path Rj=(aj0,aj1...,ajk,...,ajh) Wherein, k ∈ [0, h],ajkIs the user attribute ajPath R ofjCorresponding attributes of the k-th layer, the authoritative central CA selecting random numbers for combating collusion attacks
Figure BDA0001139974070000054
For user attribute ajSelecting an attribute random number rj∈ZpAnd calculates its attribute private key djPrivate key parameter DjAnd privilege parameter set D'j
Figure BDA0001139974070000055
Figure BDA0001139974070000056
Figure BDA0001139974070000061
Wherein u'iRepresenting the public parameter, u, corresponding to the ith attribute treekIs a public parameter of the k-th level of the attribute tree,
Figure BDA0001139974070000062
are the h +1 th to l-th layers of the attribute treeiA public parameter of the layer;
(3b) the authority center CA calculates the private key SK of the user:
Figure BDA0001139974070000063
wherein D ═ g(α+r)/βIs part of the private key SK of the user.
(3c) The authority center CA sends the private key SK of the user to the user through a secure channel for storage.
And 4, encrypting the transaction privacy data.
Referring to fig. 2, the steps are as follows:
(4a) the trading party A formulates an access control strategy P, and an access control structure (M, rho) is constructed through a linear secret sharing system L SSS, wherein M is a generating matrix of c rows and d columns, rho is a mapping for mapping elements in a set {1,2,..,. d } to attributes in a ciphertext strategy attribute set L, and the ciphertext strategy attribute set L is a set of all attributes in the access control strategy P;
(4b) selecting a random secret value
Figure BDA0001139974070000064
From a finite field ZpC-1 random numbers v2,...,vcConstructing a random vector v ═ (s, v)2,...,vc)TGenerating d secret shares s of a secret value s}∈[1,d]
s=M·v,
Wherein M isIs the first row of the generator matrix M, ∈ [1, d],sIs with the policy attribute aj′A first secret share of the corresponding secret value s;
(4c) let the jth' policy attribute a in the ciphertext policy attribute set Lj′The attribute tree is positioned in the ith 'attribute tree, the depth of the attribute tree is h', and the path of the attribute tree is Rj′=(aj′0,aj′1,...,aj′k′,...,aj′h′) Wherein, k '∈ [0, h'],aj′k′Is a policy attribute aj′Path R ofj′Corresponding attribute of the k' th layer in (1), for policy attribute aj′Selecting its corresponding secret share s according to the mapping ρAnd calculating its attribute ciphertext Cj′And policy parameter C'j′
Figure BDA0001139974070000065
Figure BDA0001139974070000066
Wherein u'i′Representing the public parameter, u, corresponding to the ith' attribute treek′Is the public parameter of the k' layer of the attribute tree;
(4d) the transaction party A inputs transaction plaintext information m to be encrypted, and generates a ciphertext E:
Figure BDA0001139974070000067
wherein the content of the first and second substances,
Figure BDA0001139974070000071
is a partial cipher text containing transaction plaintext information m, C ═ gβsIs a partial cipher text containing a secret value s.
And 5, uploading transaction data.
(5a) The transaction party A signs the ciphertext E and the additional verification information M' through a secure signature algorithm Sig:
Figure BDA0001139974070000072
wherein σAIs the primary signature file signed by the transaction party A, the additional verification information M' contains the amount of the bitcoin and the source information sAIs the private signature key of the transaction party A, | | | represents the cascade operation, IDAIs the identity of the transaction party a;
(5b) the transaction part A signs the preliminary signature file sigmaASending to a transaction party B, which receives the preliminary signature document sigmaAThen, the ciphertext E is decrypted, and after checking that the transaction information is correct, the transaction party B runs a signature algorithm Sig to sign the primary signature file sigmaASigning is carried out to generate a final signature file sigmaB
Figure BDA0001139974070000073
Wherein s isBIs the private signature key, ID, of party BBIs the identity of party B;
(5c) the transaction part B will finally sign the document sigmaBBroadcast to the blockchain.
And 6, executing the transaction.
The system selects the bookkeeper F with the fastest bookkeeping best in a period of time;
the bookkeeper F broadcasts a data block containing all transaction information in the period of time in a blockchain, each node in the blockchain can verify the transaction information in the data block, and if the transaction information is real and valid, the block is added into the blockchain;
the biller F uses an additive homomorphic algorithm to alter the balance of both parties a and B of the transaction.
And 7, accessing the ciphertext.
(7a) Before looking up the specific content of a certain transaction information, a user or a supervision center firstly verifies the attribute set S of the user or the supervision centeruWhether the access control policy P is satisfied:
if not, the decryption operation cannot be executed correctly;
if yes, selecting an authorization set S 'meeting the access control policy P'uWherein
Figure BDA0001139974070000074
(7b) At grant set S'uThe coverable strategy attribute a meeting the following 3 conditions is selectedj′User attribute of (a)j
User attributes ajIn the ith attribute tree, the policy attribute aj′In the i 'th attribute tree, i ═ i' is satisfied;
user attributes ajDepth h and policy attribute a ofj′Satisfies the following conditions: h is less than or equal to h';
user attributes ajPath R ofj=(aj0,aj1,...,ajk,...,ajh) With policy attribute aj′Path R ofj′=(aj′0,aj′1,...,aj′k′,...,aj′h′) Satisfies the following conditions: when k is k', ajk=aj′k′Where k ∈ [0, h],k′∈[0,h′];
(7c) For overlay policy attribute aj′User attribute of (a)jCalculating its decryption permission value d'jAnd bilinear pairs
Figure BDA0001139974070000081
Figure BDA0001139974070000082
Figure BDA0001139974070000083
Wherein d isjIs the private key of the attribute that,
Figure BDA0001139974070000084
is a set of rights parameters D'jElement (2) representing user attribute ajAuthority parameter of aj′,h+1,aj′,h+2,...,aj′h′Is the ciphertext policy Attribute aj′Path R ofj′Corresponding attributes of the h +1 th to h' th layers, Cj′Is a policy attribute aj′Attribute ciphertext of (D)jIs a policy attribute aj′Private key parameter of, C'j′Is a policy attribute aj′Of the policy parameter u'i′Representing the public parameter, u, corresponding to the ith' attribute treek′Is a public parameter of the k' th layer of the attribute tree, aj′k′Is a policy attribute aj′Path R ofj′Corresponding attribute of the kth ' layer in, k ' ∈ [0, h '];
(7d) Decrypting the ciphertext E of the transaction information in the block chain to obtain decrypted transaction plaintext information m:
Figure BDA0001139974070000085
wherein the content of the first and second substances,
Figure BDA0001139974070000086
is a partial cipher text containing transaction plaintext information m, C is a partial cipher text containing a secret value s, D is a partial key in a user private key SK, and lambdaIs a set { lambda}∈IOf the first parameter, λ∈ZpSet { λ }}∈IIs a parameter set obtained according to the reconstruction property of L SSS scheme, I {: ρ () ∈ S'uρ () represents the policy attribute a mapped to the ciphertext policy attribute set L with a mapping ρj′,sIs with the policy attribute aj′A first secret share of the corresponding secret value s.
Through the steps, the layered ciphertext strategy attribute encryption technology is combined with the linear secret sharing system L SSS, and the layered ciphertext strategy attribute encryption technology is applied to the transaction process of the block chain, so that encryption protection and layered access control on transaction sensitive information in the block chain are realized.

Claims (9)

1. A block chain private data access control method based on attribute encryption comprises the following steps:
(1) initialization:
(1a) input System safety parameters 1λGenerating a first group of multiplication cycles G of order prime p0A second multiplication loop group G1And a finite field ZpRandomly selecting a first multiplication cycle group G0G, defining a bilinear mapping e0×G0→G1
(1b) From a finite field ZpSelecting N elements as system attributes to form a system attribute set S, dividing the attributes in the S into N trees according to the correlation among the attributes, and setting the depth of the ith tree as liDefinition l ═ max { li}i∈[1,n]Representing the maximum depth of n trees, i ∈ [1, n];
(1c) Randomly selecting a first vector U ═ U (U)θ)1≤θ≤lAnd a second vector U '═ U'θ′)1≤θ′≤nWherein u isθPublic parameter, u, corresponding to the theta-th level of the representation attribute treeθ∈G0,u′θ′Denotes a public parameter, u ', corresponding to the # attribute tree'θ′∈G0(ii) a Definition of
Figure FDA0002518366290000011
Is a finite field ZpA set of elements of interp in
Figure FDA0002518366290000012
Two random numbers α and β with different sizes are selected, and public parameters Y ═ e (g, g) are calculatedαGenerating a system parameter PK and a master private key MK:
PK=(G0,g,gβ,Y,U,U′),
MK=(α,β);
(2) identity registration:
(2a) the user applies for registration to the system, and obtains the ID and user attribute set S corresponding to the real ID informationuAnd submitting the data to an authority center CA, wherein the user comprises a common user and a supervision center, the attribute authority acquired by the supervision center is higher than the attribute authority of the common user in the jurisdiction range of the user,
Figure FDA0002518366290000013
(2b) authority center CA verifies user' S ID and user attribute set SuIf the correctness is correct, the step (3) is executed, otherwise, the registration is terminated;
(3) key distribution:
(3a) authority center CA for user attribute set SuThe jth attribute of (1)jCalculating its attribute private key djPrivate key parameter DjAnd privilege parameter set D'j
(3b) The authority center CA calculates the private key SK of the user:
Figure FDA0002518366290000021
wherein D ═ g(α+r)/βIs a partial key in the user's private key SK, r is a random number to resist collusion attacks,
Figure FDA0002518366290000022
(3c) the authority center CA sends the private key SK of the user to the user through a secure channel for secret storage;
(4) encrypting transaction privacy data:
(4a) the trading party A formulates an access control strategy P and constructs an access control structure (M, rho) through a linear secret sharing system L SSS, wherein M is a generator matrix of c rows and d columns, rho is a mapping for mapping elements in a set {1,2,..,. d } to attributes in a ciphertext strategy attribute set L, and the ciphertext strategy attribute set L is a set of all attributes in the access control strategy P;
(4b) selecting a random secret value
Figure FDA0002518366290000023
Generating d secret shares s of a secret value s}∈[1,d]Wherein s isIs the first secret share of the secret value s, ∈ [1, d];
(4c) For the jth attribute a in the ciphertext policy attribute set Lj′Calculating its attribute ciphertext Cj′And policy parameter C'j′
(4d) The transaction party A inputs transaction plaintext information m to be encrypted, and generates a ciphertext E:
Figure FDA0002518366290000024
wherein the content of the first and second substances,
Figure FDA0002518366290000025
is a partial cipher text containing transaction plaintext information m, C ═ gβsIs a partial ciphertext containing a secret value s;
(5) uploading transaction data:
(5a) the transaction party A signs the ciphertext E and the additional verification information M' through a secure signature algorithm Sig, and generates a primary signature file sigmaASending the data to a transaction party B;
(5b) the transaction part B receives the preliminary signature document sigmaADecrypting the ciphertext E, checking the transaction information to be correct, and then signing the primary signature document sigmaASigning is carried out to generate a final signature file sigmaBAnd broadcast to the blockchain;
(6) executing the transaction:
(6a) the system selects the bookkeeper F with the fastest bookkeeping best in a period of time;
(6b) the bookkeeper F broadcasts a data block containing all transaction information in the period of time in a blockchain, each node in the blockchain can verify the transaction information in the data block, and if the transaction information is real and valid, the block is added into the blockchain;
(6c) the bookkeeper F uses an addition homomorphic algorithm to change the account balance of the transaction parties A and B;
(7) and accessing the ciphertext:
(7a) before looking up the specific content of a certain transaction information, a user or a supervision center firstly verifies the attribute set S of the user or the supervision centeruWhether the access control policy P is satisfied:
if not, the decryption operation cannot be executed correctly;
if yes, selecting an authorization set S 'meeting the access control policy P'uAnd (7b) executing the step (7b),
Figure FDA0002518366290000031
(7b) at grant set S'uSelects the attribute a of the ciphertext strategy capable of being coveredj′User attribute of (a)jWherein a isj∈Su
(7c) Calculating user attribute ajDecryption authority value d'jAnd bilinear pairs
Figure FDA0002518366290000032
(7d) And decrypting the ciphertext E of the transaction information in the block chain to obtain transaction plaintext information m.
2. Method according to claim 1, characterized in that in step (3a) an attribute private key d is calculatedjPrivate key parameter DjAnd attribute privilege parameter set D'jCalculated according to the following formula:
Figure FDA0002518366290000033
Figure FDA0002518366290000034
Figure FDA0002518366290000035
where G is the first multiplication cycle group G0Generating element ofR is a random number for combating collusion attack,
Figure FDA0002518366290000036
u′ia public parameter indicating the correspondence of the ith attribute tree, and h is a user attribute ajDepth, u, in the attribute treekIs a public parameter of the k-th level of the attribute tree, ajkIs the user attribute ajPath R ofj=(aj0,aj1...,ajk,...,ajh) Corresponding property of the kth layer, k ∈ [0, h],rjIs an attribute random number, rj∈Zp
Figure FDA0002518366290000037
Are the h +1 th to l-th layers of the attribute treeiDisclosed parameters of the layer.
3. Method according to claim 1, characterized in that d secret shares { s) of the secret value s are calculated in step (4b)}∈[1,d]Calculated according to the following formula:
s=M·v,
wherein s isIs with the policy attribute aj′A first secret share, M, of the corresponding secret value sIs the first row of the generator matrix M, ∈ [1, d]Random vector v ═ s, v2,...,vc)TS is a randomly selected secret value, v2,...,vcIs from a finite field ZpC-1 random numbers selected randomly.
4. The method of claim 1, wherein the attribute ciphertext C is calculated in step (4C)j′And policy parameter C'j′Calculated according to the following formula:
Figure FDA0002518366290000041
Figure FDA0002518366290000042
wherein u'i′Denotes the disclosure parameter corresponding to the i 'th attribute tree, h' is the policy attribute aj′Depth, u, in the attribute treek′Is a public parameter of the k' th layer of the attribute tree, aj′k′Is a policy attribute aj′Path R ofj′=(aj′0,aj′1,…,aj′k′,...,aj′h′) Corresponding attribute of the kth ' layer in, k ' ∈ [0, h ']G is the first multiplication cycle group G0Is generated fromIs with the policy attribute aj′A corresponding first secret share of the secret value s, ∈ [1, d]。
5. The method according to claim 1, wherein the transaction part a in step (5a) signs the ciphertext E and the additional verification information M' by using a secure signature algorithm Sig according to the following formula:
Figure FDA0002518366290000043
wherein σAIs the primary signature file signed by the transaction party A, the additional verification information M' contains the amount of the bitcoin and the source information sAIs the private signature key of the transaction party A, | | | represents the cascade operation, IDAIs the identity of the transaction party a.
6. Method according to claim 1, characterized in that in step (5b) the preliminary signature file σ is signedAAnd performing signature according to the following formula:
Figure FDA0002518366290000044
wherein σBIs the final signature file, s, generated by the transaction part BBIs the private signature key, ID, of party BAIs the identity, ID, of the transaction part ABIs an identity tag of a transaction part BAnd i | represents a cascade operation.
7. The method of claim 1, wherein step (7b) is at grant set S'uTo select the overridable policy attribute aj′User attribute of (a)jThe following conditions are simultaneously satisfied:
user attributes ajIn the ith attribute tree, the policy attribute aj′In the i' th attribute tree, the following conditions are satisfied between the two attribute trees: i ═ i';
user attributes ajDepth h and policy attribute a ofj′Satisfies the following conditions: h is less than or equal to h';
user attributes ajPath R ofj=(aj0,aj1,…,ajk,…,ajh) With policy attribute aj′Path R ofj′=(aj′0,aj′1,…,aj′k′,...,aj′h′) Satisfies the following conditions: when k is k', ajk=aj′k′Where k ∈ [0, h],k′∈[0,h′]。
8. Method according to claim 1, characterized in that in step (7c) a decryption rights value d 'is calculated'jAnd bilinear pair AjCalculated according to the following formula:
Figure FDA0002518366290000051
Figure FDA0002518366290000052
wherein d isjIs the private key of the attribute that,
Figure FDA0002518366290000053
is a set of rights parameters D'jElement (2) representing user attribute ajAuthority parameter of aj′,h+1,aj′,h+2,...,aj′h′Is the ciphertext policy Attribute aj′Path R ofj′=(aj′0,aj′1,…,aj′k′,...,aj′h′) Respective attributes of the h +1 th to h' th layers, rjIs a random number, rj∈Zp,Cj′Is a policy attribute aj′Attribute ciphertext of (D)jIs a policy attribute aj′Private key parameter of, C'j′Is a policy attribute aj′Policy parameter of (1), sIs with the policy attribute aj′A first secret share of the corresponding secret value s.
9. The method of claim 1, wherein the decryption of the ciphertext E of the transaction message in the blockchain in step (7d) is performed according to the following formula:
Figure FDA0002518366290000054
wherein m is the decrypted clear text information of the transaction,
Figure FDA0002518366290000055
is a partial cipher text containing transaction plaintext information m, C is a partial cipher text containing a secret value s, D is a partial key in a user private key SK, and lambdaIs a set { lambda}∈IOf the first parameter, λ∈ZpSet { λ }}∈IIs a parameter set obtained according to the reconstruction property of L SSS scheme, I {: ρ () ∈ S'uρ () represents the policy attribute a mapped to the ciphertext policy attribute set L with a mapping ρj′
CN201610948544.XA 2016-11-02 2016-11-02 Block chain private data access control method based on attribute encryption Active CN106503994B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610948544.XA CN106503994B (en) 2016-11-02 2016-11-02 Block chain private data access control method based on attribute encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610948544.XA CN106503994B (en) 2016-11-02 2016-11-02 Block chain private data access control method based on attribute encryption

Publications (2)

Publication Number Publication Date
CN106503994A CN106503994A (en) 2017-03-15
CN106503994B true CN106503994B (en) 2020-07-28

Family

ID=58322104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610948544.XA Active CN106503994B (en) 2016-11-02 2016-11-02 Block chain private data access control method based on attribute encryption

Country Status (1)

Country Link
CN (1) CN106503994B (en)

Families Citing this family (101)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107085807B (en) * 2017-04-19 2021-06-08 迅鳐成都科技有限公司 Data asset transaction method based on block chain
CN107135209B (en) * 2017-04-21 2019-07-16 天津理工大学 A kind of data sharing method based on block chain
CN107240056A (en) * 2017-05-08 2017-10-10 暨南大学 A kind of love and marriage register method based on block chain technology
CN106992990A (en) * 2017-05-19 2017-07-28 北京牛链科技有限公司 Data sharing method and system and block catenary system and computing device
CN107451485B (en) * 2017-06-02 2020-03-13 创新先进技术有限公司 Data processing method and device based on block chain
CN107294963B (en) * 2017-06-14 2019-09-06 广东工业大学 A kind of safe encryption method and device of the data based on alliance's block chain
CN107248994B (en) * 2017-06-26 2020-08-14 联动优势科技有限公司 Information sending method, processing method and device
CN107358424B (en) * 2017-06-26 2020-09-29 中国人民银行数字货币研究所 Transaction method and device based on digital currency
CN107148037A (en) * 2017-07-18 2017-09-08 宇龙计算机通信科技(深圳)有限公司 A kind of system of selection, terminal and the server of the small base station of terminated
US10476879B2 (en) * 2017-07-26 2019-11-12 International Business Machines Corporation Blockchain authentication via hard/soft token verification
GB201712493D0 (en) * 2017-08-03 2017-09-20 Nchain Holdings Ltd Computer-Implemented system and method
US10404455B2 (en) * 2017-09-01 2019-09-03 Accenture Global Solutions Limited Multiple-phase rewritable blockchain
CN107483198B (en) * 2017-09-25 2019-11-12 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN107481146A (en) * 2017-10-13 2017-12-15 深圳市招股科技有限公司 One kind is based on the safe and efficient financial trade method of block chain
CN107911216B (en) * 2017-10-26 2020-07-14 矩阵元技术(深圳)有限公司 Block chain transaction privacy protection method and system
CN107682364B (en) * 2017-11-03 2019-12-03 杭州秘猿科技有限公司 A kind of license chain privacy method of commerce
CN108063754B (en) * 2017-11-10 2020-11-13 西安电子科技大学 Attribute-based encryption method for anonymized data of wearable health monitoring equipment
CN108171494A (en) 2017-11-23 2018-06-15 阿里巴巴集团控股有限公司 A kind of data processing method and device
CN108418689B (en) * 2017-11-30 2020-07-10 矩阵元技术(深圳)有限公司 Zero-knowledge proof method and medium suitable for block chain privacy protection
CN108123936B (en) * 2017-12-13 2021-04-13 北京科技大学 Access control method and system based on block chain technology
CN108269398A (en) * 2017-12-27 2018-07-10 深圳市元征软件开发有限公司 A kind of recording method of highway traffic data and mobile unit
CN108304478A (en) * 2017-12-28 2018-07-20 深圳市轱辘车联数据技术有限公司 A kind of data processing method and server
CN108364223B (en) 2017-12-29 2021-01-26 创新先进技术有限公司 Data auditing method and device
CN108335106A (en) * 2018-01-24 2018-07-27 深圳壹账通智能科技有限公司 The more account books of Zero Knowledge based on block chain exchange transfer account method, device and storage medium
CN108320143B (en) * 2018-02-05 2022-03-11 中国地质大学(武汉) Method for protecting cipher currency private key
CN108462568B (en) * 2018-02-11 2021-08-06 西安电子科技大学 Block chain-based secure file storage and sharing method and cloud storage system
CN108289129B (en) * 2018-02-26 2020-10-23 深圳智乾区块链科技有限公司 Block chain ecological environment creating method and system and computer readable storage medium
GB201817506D0 (en) * 2018-03-02 2018-12-12 Nchain Holdings Ltd Computer implemented method and system
US10951626B2 (en) 2018-03-06 2021-03-16 Americorp Investments Llc Blockchain-based commercial inventory systems and methods
CN117610062A (en) * 2018-03-06 2024-02-27 阿梅里科普投资有限责任公司 Systems, methods, and media for generating customized views of blockchain storage data
US11700265B2 (en) 2018-03-06 2023-07-11 Americorp Investments Llc Customized view of restricted information recorded into a blockchain
GB201803706D0 (en) * 2018-03-08 2018-04-25 Nchain Holdings Ltd Computer-implemented system and method
CN108537498A (en) * 2018-03-15 2018-09-14 上海卓辰信息科技有限公司 Interorganizational project management method, system, equipment and medium based on block chain
GB201805633D0 (en) * 2018-04-05 2018-05-23 Nchain Holdings Ltd Computer implemented method and system
CN108712380B (en) * 2018-04-12 2021-01-19 三维通信股份有限公司 Policy-based hybrid identity authentication method
CN108632480A (en) * 2018-04-19 2018-10-09 北京阿尔山金融科技有限公司 Charging method based on block chain and device
CN108614974B (en) * 2018-04-24 2021-06-01 南京邮电大学 Express information privacy protection system based on block chain and protection method thereof
CN108898475B (en) * 2018-05-08 2021-04-06 众安信息技术服务有限公司 Attribute encryption-based alliance block chain credit implementation method and system
CN108632292B (en) * 2018-05-16 2020-11-17 苏宁易购集团股份有限公司 Data sharing method and system based on alliance chain
CN108768988B (en) * 2018-05-17 2021-01-05 深圳前海微众银行股份有限公司 Block chain access control method, block chain access control equipment and computer readable storage medium
CN108805585B (en) * 2018-05-28 2022-07-05 广州中科易德科技有限公司 Distributed commodity data storage system based on block chain, circulation and tracing method
CN108875407A (en) * 2018-06-12 2018-11-23 东方银谷(北京)投资管理有限公司 For the sensitive information processing method and processing device of financial business, client, data framework
CN110661610B (en) * 2018-06-29 2020-11-03 创新先进技术有限公司 Input acquisition method and device of secure multi-party computing protocol
WO2020010490A1 (en) * 2018-07-09 2020-01-16 彭英均 Method for arbitration-less resolution of accuracy and validity of transaction data recorded in blockchain
GB201811773D0 (en) * 2018-07-19 2018-09-05 Nchain Holdings Ltd Computer-implemented system and method
CN109274481B (en) * 2018-08-01 2020-03-27 中国科学院数据与通信保护研究教育中心 Data traceable method of block chain
CN109241055A (en) * 2018-08-09 2019-01-18 上海常仁信息科技有限公司 A kind of block chain data-storage system
CN109325370A (en) * 2018-08-09 2019-02-12 上海常仁信息科技有限公司 A kind of block chain access robot node device
CN109271769A (en) * 2018-08-24 2019-01-25 广东博云公共平台网络科技有限公司 A kind of Subscriber Management System and user management method
WO2020037654A1 (en) * 2018-08-24 2020-02-27 区链通网络有限公司 Blockchain data protection method, device and system, and computer-readable storage medium
CN109145647A (en) * 2018-09-05 2019-01-04 武汉笑脸科技有限公司 A kind of trusted identity verifying system and method based on block chain
CN109214160A (en) * 2018-09-14 2019-01-15 温州科技职业学院 A kind of computer network authentication system and method, computer program
CN109447634A (en) * 2018-10-09 2019-03-08 北京网录科技有限公司 A kind of code key update method and block chain account management method using this method of locking an account
CN109493042A (en) * 2018-10-24 2019-03-19 南京邮电大学 A kind of intelligent contract possessing access control function is credible to deposit card method and system
CN109559117B (en) * 2018-11-14 2022-05-20 北京科技大学 Block linkage contract privacy protection method and system based on attribute-based encryption
US11316668B2 (en) 2018-11-16 2022-04-26 Safetech Bv Methods and systems for cryptographic private key management for secure multiparty storage and transfer of information
CN109598149B (en) * 2018-11-20 2020-04-07 阿里巴巴集团控股有限公司 Service processing method and device
CN109711184B (en) * 2018-12-28 2020-11-10 国网电子商务有限公司 Block chain data access control method and device based on attribute encryption
CN109687958A (en) * 2018-12-28 2019-04-26 全链通有限公司 A kind of design of art work certificate and verification method based on fidelity block chain
CN109979550B (en) * 2019-02-14 2021-06-01 中国科学院信息工程研究所 Block chain medical data management method and system based on distributed attribute signature
SG11201908556UA (en) 2019-03-04 2019-10-30 Alibaba Group Holding Ltd Methods and devices for providing transaction data to blockchain system for processing
CN110458554B (en) * 2019-03-31 2022-03-22 西安电子科技大学 Identity-based data rapid transaction method on block chain
CN110414961A (en) * 2019-06-21 2019-11-05 深圳壹账通智能科技有限公司 Prevent transfer account method, device, equipment and the storage medium of the track transactions side of producing
CN110266687B (en) * 2019-06-21 2021-08-17 杭州云象网络技术有限公司 Method for designing Internet of things security agent data sharing module by adopting block chain technology
CN110647756B (en) * 2019-08-05 2023-06-27 广东工业大学 Online examination management system based on blockchain and CP-ABE and application method thereof
CN110740033B (en) * 2019-08-19 2022-07-19 杭州云象网络技术有限公司 Block chain multi-party data sharing method based on secret sharing technology
CN110599163B (en) * 2019-08-20 2023-03-24 江苏大学 Transaction record outsourcing method facing block chain transaction supervision
CN110493347B (en) * 2019-08-26 2020-07-14 重庆邮电大学 Block chain-based data access control method and system in large-scale cloud storage
CN111030821B (en) * 2019-08-27 2022-07-12 杭州云象网络技术有限公司 Encryption method of alliance chain based on bilinear mapping technology
CN110719176A (en) * 2019-10-22 2020-01-21 黑龙江工业学院 Logistics privacy protection method and system based on block chain and readable storage medium
WO2021081803A1 (en) * 2019-10-30 2021-05-06 深圳市网心科技有限公司 Blockchain system, supervision method, system, device, and computer storage medium
CN111079170B (en) * 2019-11-04 2021-11-23 湖南源科创新科技有限公司 Control method and control device of solid state disk
CN111046427A (en) * 2019-12-13 2020-04-21 北京启迪区块链科技发展有限公司 Block chain-based data access control method, device, equipment and medium
CN111130757B (en) * 2019-12-31 2020-12-25 华中科技大学 Multi-cloud CP-ABE access control method based on block chain
CN111314369A (en) * 2020-02-27 2020-06-19 苏州市星际云通区块链科技有限公司 Resource sharing block chain network
CN111371561B (en) * 2020-02-27 2023-07-11 华信咨询设计研究院有限公司 Alliance block chain data access control method based on CP-ABE algorithm
CN111008201B (en) * 2020-03-09 2020-06-26 支付宝(杭州)信息技术有限公司 Method and apparatus for parallel modification and reading of state trees
CN111625869B (en) * 2020-04-23 2022-02-25 腾讯科技(深圳)有限公司 Data processing method and data processing device
CN111614678B (en) * 2020-05-22 2022-07-29 中国联合网络通信集团有限公司 Anti-disclosure method, anti-disclosure device and encryption device
CN111681002B (en) * 2020-06-10 2023-05-02 浙江工商大学 Fair data transaction method and system based on blockchain
CN111709053B (en) * 2020-06-11 2024-04-05 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
CN111859444B (en) * 2020-06-12 2022-03-01 中国科学院信息工程研究所 Block chain data supervision method and system based on attribute encryption
CN111901302B (en) * 2020-06-28 2022-02-25 石家庄铁道大学 Medical information attribute encryption access control method based on block chain
CN111986755B (en) * 2020-08-24 2023-05-19 中国人民解放军战略支援部队信息工程大学 Data sharing system based on blockchain and attribute-based encryption
CN112039880B (en) * 2020-08-30 2021-07-30 河南大学 Block chain distributed outsourcing-based dual-policy access control method
CN112165472B (en) * 2020-09-22 2022-09-27 郑州轻工业大学 Internet of things data security sharing method based on privacy protection
CN112152778B (en) * 2020-09-22 2022-03-15 腾讯科技(深圳)有限公司 Node management method and device and electronic equipment
CN112365945B (en) * 2020-10-27 2024-03-26 扬州大学 Electronic medical record fine granularity access control and ciphertext searchable method based on blockchain
CN112532588B (en) * 2020-11-06 2023-01-31 北京工业大学 Policy hidden type data access control method based on block chain
CN112989378A (en) * 2021-03-12 2021-06-18 北京航空航天大学 File trusted intermediate storage architecture based on attribute encryption
CN113127926B (en) * 2021-03-12 2024-01-16 西安电子科技大学 Method, system, storage medium and computer for analyzing statistical correlation of privacy data
CN113127927B (en) * 2021-04-27 2022-03-18 泰山学院 Attribute reconstruction encryption method and system for license chain data sharing and supervision
CN113393238B (en) * 2021-06-16 2023-04-14 福建师范大学 Intelligent contract model for protecting privacy and implementation method thereof
CN113489733B (en) * 2021-07-13 2022-07-29 郑州轻工业大学 Content center network privacy protection method based on block chain
CN113572790B (en) * 2021-09-18 2022-01-25 深圳时空云科技有限公司 Distributed processing method and device for private information
CN114640468B (en) * 2022-03-16 2024-01-26 安顺职业技术学院 Block chain privacy protection method based on online offline attribute encryption
CN114528601B (en) * 2022-04-25 2022-09-30 中国工商银行股份有限公司 Access method and device based on block chain data, processor and electronic equipment
CN114978744A (en) * 2022-06-08 2022-08-30 廖鼎 Security and protection information transmission method and system based on block chain
CN116052832B (en) * 2023-04-03 2023-06-30 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) Tamper-proof transmission method based on medical information
CN116260662B (en) * 2023-05-15 2023-07-18 成都信息工程大学 Tracing storage method, tracing storage system and tracing system
CN116720839B (en) * 2023-08-07 2023-10-17 成都创一博通科技有限公司 Financial information management method based on blockchain technology and supervision system thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8635464B2 (en) * 2010-12-03 2014-01-21 Yacov Yacobi Attribute-based access-controlled data-storage system
CN105406967B (en) * 2015-12-10 2018-10-19 西安电子科技大学 A kind of hierarchical attribute encipherment scheme
CN105915333B (en) * 2016-03-15 2019-08-23 南京邮电大学 A kind of efficient key distribution method based on encryption attribute
CN105933345B (en) * 2016-06-28 2019-10-18 电子科技大学 It is a kind of that outsourcing attribute base encryption method can verify that based on linear privacy sharing

Also Published As

Publication number Publication date
CN106503994A (en) 2017-03-15

Similar Documents

Publication Publication Date Title
CN106503994B (en) Block chain private data access control method based on attribute encryption
CN112019591B (en) Cloud data sharing method based on block chain
Ruj et al. Privacy preserving access control with authentication for securing data in clouds
CN103618728B (en) A kind of encryption attribute method at more mechanism centers
CN107508667B (en) Ciphertext policy ABE base encryption method and its device of the fix duty without key escrow can be disclosed
CN109559124A (en) A kind of cloud data safety sharing method based on block chain
CN106059763B (en) The properties base multi-mechanism hierarchical Ciphertext policy weight encryption method of cloud environment
CN111859444B (en) Block chain data supervision method and system based on attribute encryption
CN104901942A (en) Distributed access control method for attribute-based encryption
Zhang et al. Multiauthority access control with anonymous authentication for personal health record
Wang et al. A regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption in bitcoin system
CN110086615B (en) Media confusion distributed multi-authority ciphertext policy attribute-based encryption method
CN108551435B (en) Verifiable encryption group signature method with anonymity
Liang et al. Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage
CN115296817B (en) Data access control method based on block chain technology and attribute encryption
CN111953483B (en) Multi-authority access control method based on criterion
CN106612169A (en) Safe data sharing method in cloud environment
CN107276766A (en) A kind of many authorization attribute encipher-decipher methods
CN106487792A (en) A kind of power marketing cloud storage encryption method and system
Kroll et al. Secure protocols for accountable warrant execution
CN114143094A (en) Multi-authorization attribute-based verifiable encryption method based on block chain
Oberko et al. A survey on attribute-based signatures
CN109039599A (en) Support the attribute base encipher-decipher method and encrypting and deciphering system of blind Key Issuance
Zhang et al. Secure and privacy-preserving attribute-based sharing framework in vehicles ad hoc networks
CN114866289B (en) Privacy credit data security protection method based on alliance chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant