CN114363014A - Block chain-based directional content sharing method and system - Google Patents

Block chain-based directional content sharing method and system Download PDF

Info

Publication number
CN114363014A
CN114363014A CN202111549897.XA CN202111549897A CN114363014A CN 114363014 A CN114363014 A CN 114363014A CN 202111549897 A CN202111549897 A CN 202111549897A CN 114363014 A CN114363014 A CN 114363014A
Authority
CN
China
Prior art keywords
shared content
content
encryption
hash value
ipfs network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111549897.XA
Other languages
Chinese (zh)
Inventor
孙圣力
郭雪纯
李青山
司华友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Boya Blockchain Research Institute Co ltd
Nanjing Guoxin Yunfu Technology Co ltd
Original Assignee
Nanjing Boya Blockchain Research Institute Co ltd
Nanjing Guoxin Yunfu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Boya Blockchain Research Institute Co ltd, Nanjing Guoxin Yunfu Technology Co ltd filed Critical Nanjing Boya Blockchain Research Institute Co ltd
Priority to CN202111549897.XA priority Critical patent/CN114363014A/en
Publication of CN114363014A publication Critical patent/CN114363014A/en
Withdrawn legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a block chain-based targeted content sharing method and system, wherein the targeted content sharing method comprises the following steps: publishing the shared content, including: performing hash operation on the shared content to generate a hash value of the shared content; storing the shared content into an IPFS network, wherein the storage address of the shared content in the IPFS network is associated with the hash value of the shared content; storing the hash value of the shared content as transaction data into the block chain, and sending the storage address of the transaction data in the block chain to a receiver user in a receiver user list; acquiring shared content, including: acquiring a hash value of the shared content stored in the blockchain based on a storage address of the transaction data in the blockchain; acquiring a storage address of the shared content in the IPFS network based on the hash value; and downloading the shared content from the IPFS network. The block chain-based directional content sharing method provided by the invention realizes directional sharing of shared content and ensures the non-tamper-ability and traceability of data.

Description

Block chain-based directional content sharing method and system
Technical Field
The invention relates to the field of content sharing, and particularly provides a block chain-based directional content sharing method and system.
Background
The traditional centralized content sharing strategy has the main problems that contents issued by users are maliciously modified and deleted, the rights and interests of the users are difficult to guarantee, and the users lack trust.
As blockchain technology evolves, many advantages of blockchain technology begin to emerge across various domain applications. Its decentralization, non-tampering, makes it possible for non-mutually trusted participants to maintain a trusted system.
For this reason, blockchain techniques have begun to be applied to content sharing. At present, a great number of technical problems to be solved urgently exist in a content sharing strategy based on a block chain, for example, targeted content sharing is difficult to achieve, and shared content issued by a publisher user is difficult to be directionally shared to a plurality of specific recipient users.
Disclosure of Invention
In order to solve the technical problem, the invention provides a block chain-based targeted content sharing method, which has the following specific technical scheme:
a targeted content sharing method based on a block chain comprises the following steps:
publishing the shared content, including:
performing a hash operation on the shared content to generate a hash value of the shared content;
storing shared content into an IPFS network, wherein the storage address of the shared content in the IPFS network is associated with the hash value of the shared content;
storing the hash value of the shared content into the block chain as transaction data, and sending the storage address of the transaction data in the block chain to a receiver user in a receiver user list;
acquiring shared content, including:
acquiring a hash value of the shared content stored in the blockchain based on a storage address of the transaction data in the blockchain;
acquiring a storage address of the shared content in the IPFS network based on the hash value;
and downloading the shared content from the IPFS network.
The block chain-based directional content sharing method provided by the invention realizes directional sharing of shared content and ensures the non-tamper-ability and traceability of data. In addition, in the invention, the shared content is stored in the IPFS network, only the hash value of the shared content is stored in the block chain, and the hash value of the shared content is associated with the storage address of the shared content in the IPFS network. Therefore, the corresponding shared content can be quickly acquired from the IPFS network through the hash value in the block chain.
Optionally, before storing the shared content in the IPFS network, the method further includes:
taking each piece of user data in the user list as a parameter, and generating a public key and a private key in pair by using an elliptic curve algorithm;
performing secondary encryption on the private key by adopting an encryption method of a CP-ABE encryption algorithm to generate an encryption key, and sending the encryption key to the receiver user in the receiver user list;
and encrypting the shared content by adopting the public key.
The elliptic curve encryption algorithm encrypts large files quickly, but is not suitable for application scenarios where files are shared to multiple users. The CP-ABE encryption algorithm is suitable for an application scenario in which a file is shared by a plurality of users, but the encryption speed of a large file is slow. The embodiment of the invention adopts a mixed encryption strategy, realizes the encryption of the private key of the user of the issuing party and the multi-user sharing while realizing the quick encryption of the shared content, thereby ensuring the privacy of the shared content.
In some embodiments, after downloading the shared content from the IPFS network, the method further comprises: decrypting the encrypted secret key by adopting a decryption method of a CP-ABE encryption algorithm to obtain a private key; and decrypting the shared content by adopting a private key.
With the arrangement, only the receiver user with the attribute meeting the encryption strategy can obtain the private key of the publisher user and decrypt the shared content.
In some embodiments, the second encrypting the private key using an encryption method in the CP-ABE encryption algorithm to generate an encryption key comprises: extracting the user attribute of the receiver user in the receiver user list, and converting the extracted user attribute into a character string required by a CP-ABE encryption algorithm, wherein the CP-ABE encryption algorithm takes the character string as an encryption strategy represented by an attribute set; the CP-ABE encryption algorithm secondarily encrypts the private key based on the encryption policy to generate an encryption key.
A specific encryption strategy for a CP-ABE encryption algorithm is provided to generate an encrypted private key that is associated with a private key of an issuer.
In some embodiments, the storage address of the shared content in the IPFS network is represented as: /ipfs/< shared content hash value >/< shared content file name >.
The hash value of the shared content is used as a part of the storage address of the shared content in the IPFS network, so that the direct association between the hash value of the shared content and the storage address of the shared content in the IPFS network is realized, and after the hash value of the shared content is acquired from the block chain, a receiver user can quickly acquire the corresponding shared content from the IPFS network.
In some embodiments, the blockchain is a federation chain.
The second aspect of the present invention provides a block chain-based targeted content sharing system, including a publisher terminal, a recipient terminal, an IPFS network, and a block chain, wherein:
the publisher terminal is used for publishing the sharing content, and comprises:
performing a hash operation on the shared content to generate a hash value of the shared content;
storing shared content into the IPFS network, wherein the storage address of the shared content in the IPFS network is associated with the hash value of the shared content;
storing the hash value of the shared content into the block chain as transaction data, and sending the storage address of the transaction data in the block chain to a receiver user in a receiver user list;
the receiver terminal is used for obtaining the shared content, and the method comprises the following steps:
acquiring a hash value of the shared content stored in the blockchain based on a storage address of the transaction data in the blockchain;
acquiring a storage address of the shared content in the IPFS network based on the hash value;
and downloading the shared content from the IPFS network.
Through the information interaction of the publisher terminal, the receiver terminal, the IPFS network and the block chain, the block chain-based targeted content sharing system provided by the invention realizes targeted sharing of shared content and ensures the non-tampering property and traceability of data. In addition, in the invention, the shared content is stored in the IPFS network, only the hash value of the shared content is stored in the block chain, and the hash value of the shared content is associated with the storage address of the shared content in the IPFS network. Therefore, the corresponding shared content can be quickly acquired from the IPFS network through the hash value in the block chain.
In some embodiments, before storing the shared content in the IPFS network, the method further includes: taking each piece of user data in the user list as a parameter, and generating a public key and a private key in pair by using an elliptic curve algorithm; performing secondary encryption on the private key by adopting an encryption method of a CP-ABE encryption algorithm to generate an encryption key, and sending the encryption key to the receiver user in the receiver user list; and encrypting the shared content by adopting the public key.
The elliptic curve encryption algorithm encrypts large files quickly, but is not suitable for application scenarios where files are shared to multiple users. The CP-ABE encryption algorithm is suitable for an application scenario in which a file is shared by a plurality of users, but the encryption speed of a large file is slow. The embodiment of the invention adopts a mixed encryption strategy, realizes the encryption of the private key of the user of the issuing party and the multi-user sharing while realizing the quick encryption of the shared content, thereby ensuring the privacy of the shared content.
In some embodiments, after the downloading the shared content from the IPFS network, the method further comprises: decrypting the encrypted secret key by adopting a decryption method of a CP-ABE encryption algorithm to obtain the private key; and decrypting the shared content by adopting the private key.
With the arrangement, only the receiver user with the attribute meeting the encryption strategy can obtain the private key of the publisher user and decrypt the shared content.
In some embodiments, the blockchain is embedded in the IPFS network.
By embedding the block chain in the IPFS network, data interaction between the block chain and the IPFS network is faster and more reliable.
Drawings
FIG. 1 is a schematic diagram of a data storage method according to the present invention;
FIG. 2 is a schematic diagram of a directional sharing process according to a first embodiment of the present invention;
fig. 3 is a block diagram illustrating a process of publishing shared content in a targeted sharing process according to a first embodiment of the present invention;
fig. 4 is a block diagram illustrating a flow of obtaining shared content in a targeted sharing process according to a first embodiment of the present invention;
FIG. 5 is a diagram illustrating a directional sharing process according to a second embodiment of the present invention;
fig. 6 is a block diagram illustrating a process of publishing shared content during a targeted sharing process according to a second embodiment of the present invention;
fig. 7 is a block diagram illustrating a process of obtaining shared content in a targeted sharing process according to a second embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
At present, a great number of technical problems to be solved urgently exist in a content sharing strategy based on a block chain, for example, targeted content sharing is difficult to achieve, and shared content issued by a publisher user is difficult to be directionally shared to a plurality of specific recipient users.
In view of this, the present invention provides a block chain-based targeted content sharing method and system, which implement targeted sharing of shared content and ensure data non-tamper-resistance and traceability. The block chain based targeted content sharing method and system of the present invention will be described in detail with reference to several embodiments.
Before this, a brief description will be given of several technical terms involved in the embodiments of the present invention:
IPFS network: the InterPlanetary File System, an InterPlanetary File System, is a distributed File System that seeks to connect the same File System of all computer devices. In some respects it is similar to the original Web target, but IPFS will eventually be more like a single bit stream swaps git object. IPFS combines the advantages of Git, BitTorrent, Kademlia, SFS, and the Web, providing an interface as simple as the HTTP Web.
Elliptic curve encryption algorithm: an Elliptic cut Cryptography, ECC for short, is an asymmetric encryption algorithm realized based on Elliptic Curve mathematical theory. ECC has the advantage over RSA that shorter keys can be used to achieve comparable or higher security than RSA. Elliptic curve encryption algorithms are well suited for the encryption of large files.
CP-ABE encryption algorithm: ciphertext policy attribute based encryption system means that a ciphertext corresponds to an access structure, a key corresponds to an attribute set, and decryption is performed if and only if attributes in the attribute set can satisfy the access structure. The design is closer to the actual application scene, and can simulate that each user obtains the key from the attribute mechanism according to the condition or attribute of the user, and then the encryptor formulates the access control to the message. The CP-ABE encryption algorithm is very suitable for the application scene of directionally sharing files to a plurality of users.
Example 1
As shown in fig. 1 to 4, the targeted content sharing method based on the block chain provided in this embodiment includes two main links of content publishing and content receiving, where:
the publishing of the content is performed by a publisher user (i.e., a user who publishes the shared content), which includes the steps of:
s101, performing hash operation on the shared content to generate a hash value of the shared content.
S102, storing shared content into an IPFS network, wherein the storage address of the shared content in the IPFS network is associated with the hash value of the shared content.
Optionally, the storage address of the shared content in the IPFS network is set to/IPFS/< shared content hash value >/< shared content file name >, that is, the hash value of the shared content is directly used as a part of the storage address of the shared content in the IPFS network, and thus, after the hash value of the shared content is obtained, the shared content can be quickly located in the IPFS network.
S103, storing the hash value of the shared content as transaction data into the block chain, and sending the address of the transaction data in the block chain to a receiver user in a receiver user list.
That is to say, only the user in the recipient user list receives the storage address of the transaction data stored in the blockchain, or only the user in the recipient user list can obtain the hash value of the shared content from the blockchain, and finally obtain the original data of the shared content from the IPFS network through the hash value, thereby realizing the directional sharing of the shared data.
Of course, both the publisher user and the recipient user sharing the content have registered as one data node of the blockchain before that.
Optionally, the blockchain is a public chain or a private chain.
Optionally, the intelligent contracts may be pre-arranged on the block chain, so as to ensure that the process of directionally sharing content according to the present invention can be executed more efficiently and automatically.
The method for acquiring the shared content is executed by the receiver user and comprises the following steps:
s201, acquiring a hash value of the shared content stored in the block chain based on a storage address of the transaction data in the block chain.
S202, acquiring the storage address of the shared content in the IPFS network based on the hash value.
S203, downloading the shared content from the IPFS network.
Therefore, the block chain-based targeted content sharing method provided by the embodiment realizes targeted sharing of shared content, and ensures the non-tamper-ability and traceability of data.
In addition, the shared content is stored in the IPFS network, only the hash value of the shared content is stored in the blockchain, and the hash value of the shared content is associated with the storage address of the shared content in the IPFS network. Therefore, on one hand, the storage of the large file data is realized, on the other hand, the corresponding shared content can be quickly acquired from the IPFS network through the hash value in the block chain, and the data is prevented from being tampered.
Example 2
The targeted content sharing method in embodiment 1 can implement targeted sharing and tamper resistance of the shared content, however, it is not suitable for targeted sharing of private data. The risk mainly comes from the fact that the hash value of the shared content may be leaked, for example, a recipient user (also referred to as an authorized user) in the recipient user list may send the received hash value of the shared content to a user (i.e., an unauthorized user) that is not included in the recipient user list. In addition, the data on the blockchain is public and transparent, and an unauthorized user can also actively check the blockchain information to obtain the hash value. Therefore, the unauthorized user can also obtain the corresponding shared content from the IPFS network.
In order to solve this problem, it is necessary to improve the targeted content sharing method in embodiment 1 to satisfy the requirement of sharing private content.
The improved strategy adopted by the embodiment is to introduce an encryption strategy into the targeted content sharing method. Specifically, as shown in fig. 5 to 6, the method for sharing targeted content based on a block chain provided in this embodiment includes two main links of content publishing and content receiving, where:
in this embodiment, the content publishing step includes the following steps:
s301, performing hash operation on the shared content to generate a hash value of the shared content.
S302, taking each piece of user data in the user list as a parameter, and generating a public key and a private key in pair by using an elliptic curve algorithm;
s303, carrying out secondary encryption on the private key by adopting an encryption method of a CP-ABE encryption algorithm to generate an encryption key, and sending the encryption key to the receiver user in the receiver user list.
Optionally, the step S303 is executed as follows:
the user attributes of the receiver users in the receiver user list are extracted, and the extracted user attributes are converted into character strings required by a CP-ABE encryption algorithm, for example, the extracted user attributes are converted into character strings required by the CP-ABE encryption algorithm according to semantic conversion.
The CP-ABE encryption algorithm takes the extracted string as an encryption policy expressed in an attribute set.
The CP-ABE encryption algorithm secondarily encrypts the private key generated in step S302 based on the encryption policy to generate an encryption key, for example, concatenates the private key with any number of attribute strings to generate a secret text, i.e., the encryption key.
After the encryption by the CP-ABE, the secret key of the publisher user is associated with the user attribute of the authorized receiver user, namely, only the receiver user with the user attribute meeting the encryption strategy can decrypt the secret key of the publisher user from the encryption secret key, and finally obtain the shared content.
The specific principle of the CP-ABE encryption algorithm and the encryption and decryption processes thereof are well known to those skilled in the art and will not be described in further detail herein.
S304, encrypting the shared content by adopting the public key.
That is, the public key generated in the elliptic curve encryption process in step S302 is used to encrypt the shared content.
S305, storing the encrypted shared content into an IPFS network, wherein the storage address of the shared content in the IPFS network is associated with the hash value of the shared content.
Optionally, the storage address of the shared content in the IPFS network is set to/IPFS/< shared content hash value >/< shared content file name >, that is, the hash value of the shared content is directly used as a part of the storage address of the shared content in the IPFS network, and thus, after the hash value of the shared content is obtained, the shared content can be quickly located in the IPFS network.
S306, storing the hash value of the shared content as transaction data into the block chain, and sending the address of the transaction data in the block chain to a receiver user in a receiver user list.
That is to say, only the user in the recipient user list receives the storage address of the transaction data stored in the blockchain, or only the user in the recipient user list can obtain the hash value of the shared content from the blockchain, and finally obtain the original data of the shared content from the IPFS network through the hash value, thereby realizing the directional sharing of the shared data.
Of course, both the publisher user and the recipient user sharing the content have registered as one data node of the blockchain before that.
Optionally, the block chain is a federation chain.
Optionally, the intelligent contracts may be pre-arranged on the block chain, so as to ensure that the process of directionally sharing content according to the present invention can be executed more efficiently and automatically.
As shown in fig. 7, in this embodiment, the obtaining of the shared content includes the following steps:
s401, based on the storage address of the transaction data in the block chain, obtaining a hash value of the shared content stored in the block chain.
S402, acquiring the storage address of the shared content in the IPFS network based on the hash value.
S403, downloading the shared content from the IPFS network.
S404, decrypting the encrypted secret key by adopting a decryption method of a CP-ABE encryption algorithm to obtain a private key.
As described above, in this step, the CP-ABE encryption algorithm needs to obtain the user attribute provided by the receiver user, and the CP-ABE encryption algorithm determines whether the user attribute of the current receiver user satisfies the encryption policy, if so, the original private key is decrypted from the encryption key, otherwise, the decryption cannot be performed.
S405, decrypting the shared content by using a private key.
The private key and the public key for encrypting the shared content are a key pair generated when the elliptic curve algorithm is used for encrypting the receiving party user list, so that the encrypted shared content can be decrypted through the private key.
Therefore, the embodiment of the invention realizes the encryption of the private key of the user of the issuing party and the multi-user sharing by adopting the mixed encryption strategy consisting of the elliptic encryption algorithm and the CP-ABE encryption algorithm while realizing the quick encryption of the shared content, thereby ensuring the privacy of the shared content. The elliptic encryption algorithm can implement rapid encryption on shared contents formed by large files, and the CP-ABE encryption algorithm implements encryption on private keys of users at issuing parties and multi-user sharing.
Example 3
The embodiment provides a targeted content sharing system based on a block chain, which comprises a publisher terminal, a receiver terminal, an IPFS network and the block chain, wherein:
the publisher terminal is used for publishing the sharing content, and comprises:
performing a hash operation on the shared content to generate a hash value of the shared content;
storing shared content into the IPFS network, wherein the storage address of the shared content in the IPFS network is associated with the hash value of the shared content;
and storing the hash value of the shared content as transaction data into the block chain, and sending the storage address of the transaction data in the block chain to a receiver user in a receiver user list.
The receiver terminal is used for obtaining the shared content, and comprises:
acquiring a hash value of the shared content stored in the blockchain based on a storage address of the transaction data in the blockchain;
acquiring a storage address of the shared content in the IPFS network based on the hash value;
and downloading the shared content from the IPFS network.
Through information interaction of the publisher terminal, the receiver terminal, the IPFS network and the block chain, the block chain-based targeted content sharing system provided by the embodiment realizes targeted sharing of shared content, and ensures non-tampering property and traceability of data
In addition, the shared content is stored in the IPFS network, only the hash value of the shared content is stored in the blockchain, and the hash value of the shared content is associated with the storage address of the shared content in the IPFS network. Therefore, the corresponding shared content can be quickly acquired from the IPFS network through the hash value in the block chain.
In order to implement the targeted sharing of the private data, optionally, in a link of issuing the shared content by the issuer terminal, before storing the shared content in the IPFS network, the method further includes: taking each piece of user data in the user list as a parameter, and generating a public key and a private key in pair by using an elliptic curve algorithm;
performing secondary encryption on the private key by adopting an encryption method of a CP-ABE encryption algorithm to generate an encryption key, and sending the encryption key to the receiver user in the receiver user list; and encrypting the shared content by adopting the public key.
In the step of acquiring the shared content by the receiver terminal, optionally, after downloading the shared content from the IPFS network, the method further includes: decrypting the encrypted secret key by adopting a decryption method of a CP-ABE encryption algorithm to obtain the private key; and decrypting the shared content by adopting the private key.
Optionally, the blockchain is embedded in the IPFS network.
Optionally, the blockchain is a federation chain, such as the Boyan plus chain (RegChain).
The invention has been described above with a certain degree of particularity. It will be understood by those of ordinary skill in the art that the description of the embodiments is merely exemplary and that all changes that come within the true spirit and scope of the invention are desired to be protected. The scope of the invention is defined by the appended claims rather than by the foregoing description of the embodiments.

Claims (10)

1. A targeted content sharing method based on a block chain is characterized by comprising the following steps:
publishing the shared content, including:
performing a hash operation on the shared content to generate a hash value of the shared content;
storing shared content into an IPFS network, wherein the storage address of the shared content in the IPFS network is associated with the hash value of the shared content;
storing the hash value of the shared content into the block chain as transaction data, and sending the storage address of the transaction data in the block chain to a receiver user in a receiver user list;
acquiring shared content, including:
acquiring a hash value of the shared content stored in the blockchain based on a storage address of the transaction data in the blockchain;
acquiring a storage address of the shared content in the IPFS network based on the hash value;
and downloading the shared content from the IPFS network.
2. The method of claim 1,
before the storing the shared content into the IPFS network, the method further includes:
taking each piece of user data in the user list as a parameter, and generating a public key and a private key in pair by using an elliptic curve algorithm;
performing secondary encryption on the private key by adopting an encryption method of a CP-ABE encryption algorithm to generate an encryption key, and sending the encryption key to the receiver user in the receiver user list;
and encrypting the shared content by adopting the public key.
3. The blockchain-based targeted content sharing method according to claim 2, further comprising, after the downloading of the shared content from the IPFS network:
decrypting the encrypted secret key by adopting a decryption method of a CP-ABE encryption algorithm to obtain the private key;
and decrypting the shared content by adopting the private key.
4. The method of claim 2, wherein the second encrypting the private key using an encryption method in the CP-ABE encryption algorithm to generate an encryption key comprises:
extracting the user attribute of the receiver user in the receiver user list, and converting the extracted user attribute into a character string required by a CP-ABE encryption algorithm, wherein the CP-ABE encryption algorithm takes the character string as an encryption strategy represented by an attribute set;
the CP-ABE encryption algorithm secondarily encrypts the private key based on the encryption policy to generate an encryption key.
5. The method of targeted content sharing according to claim 1, wherein the storage address of the shared content in the IPFS network is represented as: /ipfs/< shared content hash value >/< shared content file name >.
6. The method of targeted content sharing of claim 1, wherein the blockchain is a federation chain.
7. The oriented content sharing system based on the block chain is characterized by comprising a publisher terminal, a receiver terminal, an IPFS network and the block chain, wherein:
the publisher terminal is used for publishing the sharing content, and comprises:
performing a hash operation on the shared content to generate a hash value of the shared content;
storing shared content into the IPFS network, wherein the storage address of the shared content in the IPFS network is associated with the hash value of the shared content;
storing the hash value of the shared content into the block chain as transaction data, and sending the storage address of the transaction data in the block chain to a receiver user in a receiver user list;
the receiver terminal is used for obtaining the shared content, and the method comprises the following steps:
acquiring a hash value of the shared content stored in the blockchain based on a storage address of the transaction data in the blockchain;
acquiring a storage address of the shared content in the IPFS network based on the hash value;
and downloading the shared content from the IPFS network.
8. A targeted content sharing system as recited in claim 7, further comprising, prior to storing the shared content within the IPFS network:
taking each piece of user data in the user list as a parameter, and generating a public key and a private key in pair by using an elliptic curve algorithm;
performing secondary encryption on the private key by adopting an encryption method of a CP-ABE encryption algorithm (CP-ABE) to generate an encryption key, and sending the encryption key to a receiver user in the receiver user list;
and encrypting the shared content by adopting the public key.
9. The targeted content sharing system of claim 8, further comprising, after said downloading of said shared content from said IPFS network:
decrypting the encrypted secret key by adopting a decryption method of a CP-ABE encryption algorithm to obtain the private key;
and decrypting the shared content by adopting the private key.
10. The targeted content sharing system of claim 7, wherein the blockchain is embedded in the IPFS network.
CN202111549897.XA 2021-12-17 2021-12-17 Block chain-based directional content sharing method and system Withdrawn CN114363014A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111549897.XA CN114363014A (en) 2021-12-17 2021-12-17 Block chain-based directional content sharing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111549897.XA CN114363014A (en) 2021-12-17 2021-12-17 Block chain-based directional content sharing method and system

Publications (1)

Publication Number Publication Date
CN114363014A true CN114363014A (en) 2022-04-15

Family

ID=81099664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111549897.XA Withdrawn CN114363014A (en) 2021-12-17 2021-12-17 Block chain-based directional content sharing method and system

Country Status (1)

Country Link
CN (1) CN114363014A (en)

Similar Documents

Publication Publication Date Title
CN110881063B (en) Storage method, device, equipment and medium of private data
US7995750B2 (en) Privacy-preserving concatenation of strings
Gnatyuk et al. Secure hash function constructing for future communication systems and networks
CN108111540B (en) Hierarchical access control system and method supporting data sharing in cloud storage
WO2016136024A1 (en) Key replacement direction control system, and key replacement direction control method
CN104660590B (en) A kind of file encryption secure cloud storage scheme
Devi et al. A review on DES, AES and blowfish for image encryption & decryption
CN107070896B (en) Safe and efficient block chain network customized login method and safe reinforcement system
CN106941404A (en) Cryptographic key protection method and device
Mo et al. Two-party fine-grained assured deletion of outsourced data in cloud systems
CN105721156A (en) General Encoding Functions For Modular Exponentiation Encryption Schemes
Vegh et al. Enhancing security in cyber-physical systems through cryptographic and steganographic techniques
JP2001211154A (en) Secret key generating method, ciphering method, and cipher communication method
CN114363014A (en) Block chain-based directional content sharing method and system
Pushpa Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms
Kumar Advanced RSA cryptographic algorithm for improving data security
Pranav et al. An involution function-based symmetric stream cipher
US10997317B2 (en) Method for safeguarding the confidentiality of the sender&#39;s identification of messages transmitted through promiscuous channels
Karani et al. Secure File Storage Using Hybrid Cryptography
Singh et al. Cryptography and Steganography Techniques
Verma et al. An enhanced cryptographic system for fast and efficient data transmission
CN108718235A (en) A kind of stream encryption and decryption method
CN115664852B (en) Data management method and system based on block chain technology
Gola et al. SKT: a new approach for secure key transmission using MGPISXFS
Rath et al. A new approach to the data security using modern encryption standard

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20220415