CN106503994A - Block chain private data access control method based on encryption attribute - Google Patents

Block chain private data access control method based on encryption attribute Download PDF

Info

Publication number
CN106503994A
CN106503994A CN201610948544.XA CN201610948544A CN106503994A CN 106503994 A CN106503994 A CN 106503994A CN 201610948544 A CN201610948544 A CN 201610948544A CN 106503994 A CN106503994 A CN 106503994A
Authority
CN
China
Prior art keywords
attribute
prime
ciphertext
policy
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610948544.XA
Other languages
Chinese (zh)
Other versions
CN106503994B (en
Inventor
高军涛
王誉晓
李雪莲
王笠燕
王丹妮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201610948544.XA priority Critical patent/CN106503994B/en
Publication of CN106503994A publication Critical patent/CN106503994A/en
Application granted granted Critical
Publication of CN106503994B publication Critical patent/CN106503994B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Abstract

The invention discloses a kind of block chain private data access control method based on encryption attribute; mainly solving prior art only carries out anonymous protection to the true identity of user in block chain; the privacy leakage problem that protects and cause is not encrypted to privacy information of concluding the business, implementation step is:1. system initialization;2. user's registration obtains attribute information;3. authoritative center is according to customer attribute information dispatch user private key;4. counterparty encrypts transaction private data and is uploaded to block chain;5. bookkeeper is verified to Transaction Information and is executed transaction;6. authorize supervision center to check transaction ciphertext using mandate private key decryption.The present invention passes through to be encrypted transaction privacy information, it is to avoid data-privacy leakage, can be used for the secret protection to fictitious assets transaction data in block chain.

Description

Block chain private data access control method based on encryption attribute
Technical field
The invention belongs to art of cryptography, and in particular to a kind of private data access control method, block is can be applicable to In chain, different stage mandate supervision center and user are effectively accessed to the encrypting transactions data in block chain.
Background technology
Block chain is substantially the data base of a decentration, just as a shared account book, records all of bit coin Transaction Information.Used as the Floor layer Technology of bit coin, block chain has decentration, opening, anonymity and the spy such as can not distort Point.In traditional publicly-owned block chain, the data such as accounts information and transaction content of user are all disclosed, and any user may be used To participate in book keeping operation and check transaction data, the mode only by " pseudo- anonymous " protects privacy of user.Although this increased user The confidence true and reliable to data, but for financial industry, the full disclosure of data is related to a large amount of trade secrets and profit Benefit, it is therefore necessary to protect data-privacy using encryption technology, while ensure supervision center such as government and bank's energy again Transaction content is enough checked, to prevent the carrying out of contraband in block chain.This is accomplished by flexible access control policy to realize Control to different user access rights.And with customer volume sharp increase in block chain, it will substantial amounts of Transaction Information is produced, from And causing supervision inconvenience, it is therefore desirable to the supervision center for setting different stage supervises the carrying out that concludes the business in block chain to be layered.
Sahai and Waters in 2005 proposes the concept of encryption attribute ABE, and ABE point is encrypted CP- for ciphertext policy ABE ABE and key policy attribute encryption KP-ABE.In CP-ABE, ciphertext is related to access strategy, and key is related to user property, When the attribute of only user meets the access control policy of ciphertext, user just can be with decrypting ciphertext.CP-ABE has flexible visit Ask control strategy, solve the problems, such as the access control of many-many communication well, but it does not account for mutual between attribute Relation, is not suitable between different stage authorized user's authority the presence of the situation that higher level's authority covers subordinate right.Then 2009 Year Jin Li etc. propose the concept that hierarchical attribute encrypts HABE, the program according to the dependency between attribute to community set in Attribute be layered, cover the property of lower property so as to be provided with upper strata attribute, but the program be based on basic ABE, lack Weary fine-grained access control.
Patent " a kind of hierarchical attribute encipherment scheme " (publication number that Xian Electronics Science and Technology University applies at which: 105406967A, application number:201510908416.8, the applying date:On 03 16th, 2016) in disclose a kind of hierarchical attribute and add Close scheme.The program encryption when for layering each attribute the corresponding row of the access structure of layering is embedded in into, from And realize that layering and access control combine.The weak point that the method is present is which to be layered only for the importance of attribute, For the consideration of dependency between attribute is not detailed enough, it is not suitable for needing to carry out carefully user rights at different levels in following block chain The situation of granularity hierarchical access control.
Content of the invention
Present invention aims to above-mentioned existing deficiency, proposes a kind of block chain privacy number based on encryption attribute According to access control method, to strengthen the protection to private data in block chain, at the same ensure different stage mandate supervision center and User can be effectively accessed to the private data in block chain.
The technical scheme is that, application for registration is proposed from user to system, obtain with user identity information only One corresponding identity ID and user attributes set Su;Authoritative center CA distributes private key according to user attributes information for which SK;Counterparty A is carried out to the sensitive information that will be concluded the business using hierarchical attribute encryption technology when being traded with counterparty B Encryption, to ensure that counterparty B and mandate supervision center at different levels can decrypting ciphertexts;In block chain, other unauthorized users do not have Authority checks the Transaction Information of encryption, but the effectiveness of the checking information checking transaction that can pass through to add behind transaction ciphertext, Implementation step includes as follows:
(1) initialize:
(1a) input system security parameter 1λ, generate first multiplication loop group G of the rank for prime number p0, the second multiplication loop group G1With finite field Zp, randomly choose the first multiplication loop group G0Generation unit g, define bilinear map e:G0×G0→G1
(1b) from finite field ZpMiddle choose N number of element as system property, constitute system property set S, according to attribute it Between dependency by the Attribute transposition in S to n tree in, if i-th tree depth be li, define l=max { li}i∈[1,n]Represent The depth capacity of n tree, i ∈ [1, n];
(1c) primary vector U=(u are randomly choosedθ)1≤θ≤lWith secondary vector U '=(u 'θ′)1≤θ′≤n, wherein, uθRepresent category Property tree the corresponding open parameter of θ layers, uθ∈G0, u 'θ′Represent the corresponding open parameter of the θ ' attribute tree, u 'θ′∈G0;Fixed JusticeFor finite field ZpIn coprime with the p element set,Middle selection two random number α and β of different sizes, calculate open Parameter Y=e (g, g)α, generate systematic parameter PK and main private key MK:
PK=(G0,g,gβ, Y, U, U '),
MK=(α, β);
(2) identity registration:
(2a) user proposes application for registration to system, obtains identity ID corresponding with its true identity information and makes User community set Su, and authoritative center CA is submitted to, wherein user includes that domestic consumer and supervision center, supervision center are obtained Property rights of the property rights for taking higher than domestic consumer in its compass of competency,
(2b) authoritative center CA verifies the identity ID and user attributes set S of useruCorrectness, if just Really, execution step (3), otherwise, terminate registration;
(3) key distribution:
(3a) authoritative center CA is to user attributes set SuIn j-th attribute aj, calculate its attribute private key dj, private key ginseng Number DjWith rights parameters set D 'j
(3b) authoritative center CA calculates the private key SK of the user:
Wherein, D=g(α+r)/βBe the user private key SK in part of key;
(3c) the private key SK of the user is sent to the secret preservation of the user by safe lane by authoritative center CA;
(4) encryption transaction private data:
(4a) counterparty A formulates access control policy P, and constructs access control knot by linear On Secret Sharing Schemes LSSS Structure (M, ρ), wherein M are the generator matrixes of c rows d row, and ρ is that the element in set { 1,2 ..., δ ..., d } is mapped to ciphertext The mapping of attribute in policy attribute collection L, ciphertext policy ABE collection L are the set of all properties in access control policy P;
(4b) random secret value is selectedGenerate d secret shadow { s of secret value sδ}δ∈[1,d], wherein, sδIt is secret The δ secret shadow of close value s, δ ∈ [1, d];
(4c) for the individual attribute a of jth ' in ciphertext policy ABE collection Lj′, calculate its attribute ciphertext Cj′And policing parameter C′j′
(4d) counterparty A is input into transaction cleartext information m to be encrypted, and generates ciphertext E:
Wherein,Be comprising transaction cleartext information m part ciphertext, C=gβsIt is that the part comprising secret value s is close Text;
(5) transaction data is uploaded:
(5a) counterparty A is signed to ciphertext E and additional identification information M ' by security signature algorithm Sig, will be generated Preliminary signature file σAIssue counterparty B;
(5b) counterparty B receives preliminary signature file σA, ciphertext E therein is decrypted, after checking that Transaction Information is correct, To preliminary signature file σASigned, generated final signature file σB, and broadcast to block chain;
(6) transaction is executed:
(6a) system selects the most best soon bookkeeper F of book keeping operation within a period of time;
(6b) data block comprising All Activity information in this period is broadcasted in block chain by bookkeeper F, block In chain, each node can be verified to the Transaction Information in the data block, if Transaction Information is authentic and valid, just will The block is added in block chain;
(6c) bookkeeper F is changed to the account balance of both parties A and B using additive homomorphism algorithm;
(7) ciphertext is accessed:
(7a) user or supervision center first verify that the property set of oneself before the particular content for checking certain Transaction Information Close SuWhether access control policy P is met:
If being unsatisfactory for, decryption oprerations cannot be correctly executed;
If meeting, the sets of authorizations S ' for meeting access control policy P is selectedu, execution step (7b), wherein,
(7b) in sets of authorizations S 'uIn select and can cover ciphertext policy ABE aj′User attributes aj, wherein aj∈Su
(7c) user attributes a is calculatedjDecrypted rights value d 'jAnd Bilinear map
(7d) the ciphertext E decryption to Transaction Information in block chain, obtains the cleartext information m that concludes the business.
The present invention compared with prior art, with advantages below:
First, the present invention is solved traditional due to being encrypted to the transaction private data in block chain using encryption technology In publicly-owned block chain, all data disclose the privacy leakage problem that brings, it is achieved that the privacy to transaction sensitive information in block chain Protection;
Second, the present invention is realized due to being combined with linear On Secret Sharing Schemes LSSS using hierarchical attribute encryption technology Fine granularity hierarchical access control to ciphertext of concluding the business in block chain, as long as counterparty adds oneself in access control policy Authority, so that it may so that the supervision center belonging to which has the authority for accessing the transaction ciphertext, using so as to avoid counterparty The situation for deliberately not allowing supervision center to be checked during access control policy encrypted transaction message occurs.
Description of the drawings
Fig. 1 be the present invention realize general flow chart;
Fig. 2 is the sub-process figure of encryption transaction private data in the present invention.
Specific embodiment
The present invention will be further described below in conjunction with the accompanying drawings.
Referring to the drawings 1, the present invention realizes that step is as follows.
Step 1, initialization.
Input system security parameter 1λ, generate first multiplication loop group G of the rank for prime number p0, the second multiplication loop group G1With Finite field Zp, randomly choose the first multiplication loop group G0Generation unit g, define bilinear map e:G0×G0→G1
From finite field ZpMiddle choose N number of element as system property, constitute system property set S, according between attribute During Attribute transposition in S to n is set by dependency, if the depth of i-th tree is li, define l=max { li}i∈[1,n]Represent n The depth capacity of tree, i ∈ [1, n];
Random selection primary vector U=(uθ)1≤θ≤lWith secondary vector U '=(u 'θ′)1≤θ′≤n, wherein, uθRepresent attribute tree The corresponding open parameter of θ layers, uθ∈G0, u 'θ′Represent the corresponding open parameter of the θ ' attribute tree, u 'θ′∈G0;Definition For finite field ZpIn coprime with the p element set,Middle selection two random number α and β of different sizes, calculate open parameter Y=e (g, g)α, generate systematic parameter PK and main private key MK:
PK=(G0,g,gβ, Y, U, U '),
MK=(α, β).
Step 2, identity registration.
User proposes application for registration to system, obtains identity ID corresponding with user true identity information and makes User community set Su, and authoritative center CA is submitted to, whereinUser is included in domestic consumer and supervision at different levels The heart, property rights of the property rights that supervision center is obtained higher than domestic consumer in its compass of competency;
Authoritative center CA verifies the identity ID and user attributes set S of useruCorrectness, if correctly, hold Row step 3, otherwise, terminates registration.
Step 3, key are distributed.
(3a) user attributes set S is setuIn j-th user attributes ajI-th attribute tree is located at, its depth is h, its Path is Rj=(aj0,aj1...,ajk,...,ajh), wherein, k ∈ [0, h], ajkIt is user attributes ajPath RjMiddle kth layer Respective attributes, authoritative center CA selected for resisting the random number of collusion attackFor user attributes aj, select Attribute random number rj∈Zp, and calculate its attribute private key dj, private key parameter DjWith rights parameters set D 'j
Wherein, u 'iThe corresponding open parameter of i-th attribute tree of expression, ukIt is the open parameter of attribute tree kth layer,It is attribute tree h+1 layers to liThe open parameter of layer;
(3b) authoritative center CA calculates the private key SK of the user:
Wherein, D=g(α+r)/βBe the user private key SK in part of key.
(3c) the private key SK of the user is sent to the user by safe lane and is preserved by authoritative center CA.
Step 4, encryption transaction private data.
Referring to the drawings 2, this step is as follows:
(4a) counterparty A formulates access control policy P, constructs access control structure by linear On Secret Sharing Schemes LSSS (M, ρ), wherein M are the generator matrixes of c rows d row, and ρ is that the element in set { 1,2 ..., δ ..., d } is mapped to ciphertext plan The mapping of attribute in slightly property set L, ciphertext policy ABE collection L is the set of all properties in access control policy P;
(4b) random secret value is selectedFrom finite field ZpC-1 random number v of middle random selection2,...,vc, construction Random vector v=(s, v2,...,vc)T, generate d secret shadow { s of secret value sδ}δ∈[1,d]
sδ=MδV,
Wherein, MδIt is the δ rows of generator matrix M, δ ∈ [1, d], sδIt is and policy attribute aj′The δ of corresponding secret value s Individual secret shadow;
(4c) the individual policy attribute a of jth ' in ciphertext policy ABE collection L is setj′The i-th ' attribute tree is located at, its depth is h ', Its path is Rj′=(aj′0,aj′1,...,aj′k′,...,aj′h′), wherein, k ' ∈ [0, h '], aj′k′It is policy attribute aj′Road Footpath Rj′The respective attributes of middle kth ' layer, for policy attribute aj′, its corresponding secret shadow s is selected according to mapping ρδ, and calculate Its attribute ciphertext Cj′With policing parameter C 'j′
Wherein, u 'i′The corresponding open parameter of the i-th ' attribute tree of expression, uk′It is the open parameter of attribute tree kth ' layer;
(4d) counterparty A is input into transaction cleartext information m to be encrypted, and generates ciphertext E:
Wherein,Be comprising transaction cleartext information m part ciphertext, C=gβsIt is that the part comprising secret value s is close Text.
Step 5, uploads transaction data.
(5a) counterparty A is signed to ciphertext E and additional identification information M ' by security signature algorithm Sig:
Wherein, σAIt is the preliminary signature file after counterparty A signatures, additional identification information M ' contains the amount of money of bit coin Quantity and source-information, sAIt is the signature private key of counterparty A, | | represent cascaded operational, IDAIt is the identity of counterparty A;
(5b) counterparty A is by preliminary signature file σACounterparty B is issued, counterparty B receives preliminary signature file σAAfterwards, right Ciphertext E decryption therein, after checking that Transaction Information is correct, counterparty B runs signature algorithm Sig to preliminary signature file σA Signed, generated final signature file σB
Wherein, sBIt is the signature private key of counterparty B, IDBIt is the identity of counterparty B;
(5c) counterparty B is by final signature file σBBroadcast to block chain.
Step 6, executes transaction.
System selects the most best soon bookkeeper F of book keeping operation within a period of time;
Data block comprising All Activity information in this period is broadcasted in block chain by bookkeeper F, in block chain Each node can be verified to the Transaction Information in the data block, if Transaction Information is authentic and valid, just by the area Block is added in block chain;
Bookkeeper F is changed to the remaining sum of both parties A and B using additive homomorphism algorithm.
Step 7, accesses ciphertext.
(7a) user or supervision center first verify that the property set of oneself before the particular content for checking certain Transaction Information Close SuWhether access control policy P is met:
If being unsatisfactory for, decryption oprerations cannot be correctly executed;
If meeting, the sets of authorizations S ' for meeting access control policy P is selectedu, wherein
(7b) in sets of authorizations S 'uIn select while meeting the energy overlay strategy attribute a of following 3 conditionsj′User Attribute aj
User attributes ajIn i-th attribute tree, policy attribute aj′In the i-th ' attribute tree, the two meets i=i ';
User attributes ajDepth h and policy attribute aj′Depth h ' between meet:h≤h′;
User attributes ajPath Rj=(aj0,aj1,...,ajk,...,ajh) and policy attribute aj′Path Rj′= (aj′0,aj′1,...,aj′k′,...,aj′h′) between meet:As k=k ', ajk=aj′k′, wherein k ∈ [0, h], k ' ∈ [0, h′];
(7c) for overlay strategy attribute aj′User attributes aj, calculate its decrypted rights value d 'jAnd Bilinear map
Wherein, djIt is attribute private key,It is rights parameters set D 'jIn element, represent user attributes ajRights parameters, aj′,h+1,aj′,h+2,...,aj′h′It is ciphertext policy ABE aj′Path Rj′In h+1 layers to the h ' layers Respective attributes, Cj′It is policy attribute aj′Attribute ciphertext, DjIt is policy attribute aj′Private key parameter, C 'j′It is policy attribute aj′'s Policing parameter, u 'i′The corresponding open parameter of the i-th ' attribute tree of expression, uk′It is the open parameter of attribute tree kth ' layer, aj′k′It is Policy attribute aj′Path Rj′The respective attributes of middle kth ' layer, k ' ∈ [0, h '];
(7d) ciphertext E of Transaction Information in block chain is decrypted, the transaction cleartext information m after being decrypted:
Wherein,It is the part ciphertext comprising transaction cleartext information m, C is the part ciphertext comprising secret value s, and D is to use Part of key in person private key SK, λδFor gathering { λδ}δ∈IIn the δ parameter, λδ∈Zp, gather { λδ}δ∈IIt is according to LSSS schemes The parameter sets that obtain of reconstruction nature, I={ δ:ρ(δ)∈S′u, ρ (δ) expression maps ρ and δ is mapped to Ciphertext policy category Policy attribute a in property collection Lj′, sδIt is and policy attribute aj′The δ secret shadow of corresponding secret value s.
By above step, the ciphertext policy ABE encryption technology of layering is tied with linear On Secret Sharing Schemes LSSS phases Close, and be applied in the process of exchange of block chain, it is achieved thereby that to the encipherment protection of transaction sensitive information in block chain and point Layer access control.

Claims (9)

1. a kind of block chain private data access control method based on encryption attribute, comprises the steps:
(1) initialize:
(1a) input system security parameter 1λ, generate first multiplication loop group G of the rank for prime number p0, the second multiplication loop group G1With Finite field Zp, randomly choose the first multiplication loop group G0Generation unit g, define bilinear map e:G0×G0→G1
(1b) from finite field ZpMiddle choose N number of element as system property, constitute system property set S, according to the phase between attribute During Attribute transposition in S to n is set by closing property, if the depth of i-th tree is li, define l=max { li}i∈[1,n]Represent n tree Depth capacity, i ∈ [1, n];
(1c) primary vector U=(u are randomly choosedθ)1≤θ≤lWith secondary vector U '=(u 'θ′)1≤θ′≤n, wherein, uθRepresent attribute tree The corresponding open parameter of θ layers, uθ∈G0, u 'θ′Represent the corresponding open parameter of the θ ' attribute tree, u 'θ′∈G0;Definition For finite field ZpIn coprime with the p element set,Middle selection two random number α and β of different sizes, calculate open parameter Y=e (g, g)α, generate systematic parameter PK and main private key MK:
PK=(G0,g,gβ, Y, U, U '),
MK=(α, β);
(2) identity registration:
(2a) user proposes application for registration to system, obtains identity ID corresponding with its true identity information and user Community set Su, and authoritative center CA is submitted to, wherein user includes that domestic consumer and supervision center, supervision center are obtained Property rights of the property rights higher than domestic consumer in its compass of competency,
(2b) authoritative center CA verifies the identity ID and user attributes set S of useruCorrectness, if correctly, execute Step (3), otherwise, terminates registration;
(3) key distribution:
(3a) authoritative center CA is to user attributes set SuIn j-th attribute aj, calculate its attribute private key dj, private key parameter DjWith Rights parameters set D 'j
(3b) authoritative center CA calculates the private key SK of the user:
S K = ( D , { d j , D j , D j ′ } a j ∈ S u ) ,
Wherein, D=g(α+r)/βBe the user private key SK in part of key;
(3c) the private key SK of the user is sent to the secret preservation of the user by safe lane by authoritative center CA;
(4) encryption transaction private data:
(4a) counterparty A formulates access control policy P, and constructs access control structure by linear On Secret Sharing Schemes LSSS (M, ρ), wherein M are the generator matrixes of c rows d row, and ρ is that the element in set { 1,2 ..., δ ..., d } is mapped to Ciphertext policy The mapping of attribute in property set L, ciphertext policy ABE collection L are the set of all properties in access control policy P;
(4b) random secret value is selectedGenerate d secret shadow { s of secret value sδ}δ∈[1,d], wherein, sδIt is secret value s The δ secret shadow, δ ∈ [1, d];
(4c) for the individual attribute a of jth ' in ciphertext policy ABE collection Lj′, calculate its attribute ciphertext Cj′With policing parameter C 'j
(4d) counterparty A is input into transaction cleartext information m to be encrypted, and generates ciphertext E:
E = ( P , C ~ , C , { C j ′ , C j ′ ′ } a j ′ ∈ L ) ,
Wherein,Be comprising transaction cleartext information m part ciphertext, C=gβsIt is the part ciphertext comprising secret value s;
(5) transaction data is uploaded:
(5a) counterparty A is signed to ciphertext E and additional identification information M ' by security signature algorithm Sig, first by generated Step signature file σAIssue counterparty B;
(5b) counterparty B receives preliminary signature file σA, ciphertext E therein is decrypted, after checking that Transaction Information is correct, to first Step signature file σASigned, generated final signature file σB, and broadcast to block chain;
(6) transaction is executed:
(6a) system selects the most best soon bookkeeper F of book keeping operation within a period of time;
(6b) data block comprising All Activity information in this period is broadcasted in block chain by bookkeeper F, in block chain Each node can be verified to the Transaction Information in the data block, if Transaction Information is authentic and valid, just by the area Block is added in block chain;
(6c) bookkeeper F is changed to the account balance of both parties A and B using additive homomorphism algorithm;
(7) ciphertext is accessed:
(7a) user or supervision center first verify that the community set S of oneself before the particular content for checking certain Transaction Informationu Whether access control policy P is met:
If being unsatisfactory for, decryption oprerations cannot be correctly executed;
If meeting, the sets of authorizations S ' for meeting access control policy P is selectedu, execution step (7b), wherein,
(7b) in sets of authorizations S 'uIn select and can cover ciphertext policy ABE aj′User attributes aj, wherein aj∈Su
(7c) user attributes a is calculatedjDecrypted rights value d 'jAnd Bilinear map
(7d) the ciphertext E decryption to Transaction Information in block chain, obtains the cleartext information m that concludes the business.
2. method according to claim 1, it is characterised in that computation attribute private key d in step (3a)j, private key parameter DjWith Property rights parameter sets D 'j, calculate according to equation below:
d j = g r ( u i ′ Π k = 1 h u k a j k ) r j
D j = g r j
D j ′ = { u h + 1 r j , u h + 2 r j , ... , u l i r j } ,
Wherein, g is the first multiplication loop group G0Generation unit, r is the random number for resisting collusion attack,u′iRepresent The corresponding open parameter of i-th attribute tree, h is user attributes ajDepth in attribute tree, ukIt is the public affairs of attribute tree kth layer Open parameter, ajkIt is user attributes ajPath Rj=(aj0,aj1…,ajk,…,ajh) in kth layer respective attributes, k ∈ [0, H], rjIt is attribute random number, rj∈Zp,It is attribute tree h+1 layers to liThe open parameter of layer.
3. method according to claim 1, it is characterised in that calculate d secret shadow of secret value s in step (4b) {sδ}δ∈[1,d], calculate according to equation below:
sδ=MδV,
Wherein, sδIt is and policy attribute aj′The δ secret shadow of corresponding secret value s, MδIt is the δ rows of generator matrix M, δ ∈ [1, d], random vector v=(s, v2,…,vc)T, s is randomly selected secret value, v2,…,vcIt is from finite field ZpIn select at random The c-1 random number that selects.
4. method according to claim 1, it is characterised in that computation attribute ciphertext C in step (4c)j′And policing parameter C′j′, calculate according to equation below:
C j ′ = ( u i ′ ′ Π k ′ = 1 h ′ u k ′ a j ′ k ′ ) s δ
C j ′ ′ = g s δ ,
Wherein, u 'i′The corresponding open parameter of the i-th ' attribute tree of expression, h ' is policy attribute aj′Depth in attribute tree, uk′ It is the open parameter of attribute tree kth ' layer, aj′k′It is policy attribute aj′Path Rj′=(aj′0,aj′1,…,aj′k′,...,aj′h′) The respective attributes of middle kth ' layer, k ' ∈ [0, h '], g are the first multiplication loop group G0Generation unit, sδIt is and policy attribute aj′Right The δ secret shadow of secret value s that answers, δ ∈ [1, d].
5. method according to claim 1, it is characterised in that the counterparty A in step (5a) passes through security signature algorithm Sig signs to ciphertext E and additional identification information M ', carries out according to equation below:
σ A = Sig s A ( E | | M ′ ) | | ID A ,
Wherein, σAIt is the preliminary signature file after counterparty A signatures, additional identification information M ' contains the dollar amount of bit coin And source-information, sAIt is the signature private key of counterparty A, | | represent cascaded operational, IDAIt is the identity of counterparty A.
6. method according to claim 1, it is characterised in that to preliminary signature file σ in step (5b)ASigned, pressed Carry out according to equation below:
σ B = Sig s B ( σ A ) | | ID B | | ID A ,
Wherein, σBBe counterparty B generate final signature file, sBIt is the signature private key of counterparty B, IDAIt is the body of counterparty A Part mark, IDBIt is the identity of counterparty B, | | represent cascaded operational.
7. method according to claim 1, it is characterised in that in sets of authorizations S in step (7b)u' in select and can cover plan Slightly attribute aj′User attributes aj, following condition need to be met simultaneously:#
User attributes ajIn i-th attribute tree, policy attribute aj′In the i-th ' attribute tree, meet therebetween:I= i′;
User attributes ajDepth h and policy attribute aj′Depth h ' between meet:h≤h′;
User attributes ajPath Rj=(aj0,aj1,…,ajk,…,ajh) and policy attribute aj′Path Rj′=(aj′0, aj′1,…,aj′k′,...,aj′h′) between meet:As k=k ', ajk=aj′k′, wherein k ∈ [0, h], k ' ∈ [0, h '].
8. method according to claim 1, it is characterised in that calculate decrypted rights value d ' in step (7c)jAnd Bilinear map A, it is calculated as follows:
d j ′ = d j · ( u h + 1 r j ) a j ′ , h + 1 ( u h + 2 r j ) a j ′ , h + 2 ... ( u h ′ r j ) a j ′ h ′ = g r ( u i ′ Π k ′ = 1 h ′ u k ′ a j ′ k ′ ) r j
A j δ = e ( d j ′ , C j ′ ′ ) / e ( D j , C j ′ ) = e ( g , g ) rs δ ,
Wherein, djIt is attribute private key,It is rights parameters set D 'jIn element, represent user attributes aj's Rights parameters, aj′,h+1,aj′,h+2,...,aj′h′It is ciphertext policy ABE aj′Path Rj′=(aj′0,aj′1,…,aj′k′,..., aj′h′) in h+1 layers to the h ' layers respective attributes, rjIt is random number, rj∈Zp, Cj′It is policy attribute aj′Attribute ciphertext, Dj It is policy attribute aj′Private key parameter, C 'j′It is policy attribute aj′Policing parameter, sδIt is and policy attribute aj′Corresponding secret The δ secret shadow of value s.
9. method according to claim 1, it is characterised in that ciphertext E in step (7d) to Transaction Information in block chain Decryption, is calculated as follows:
m = C ~ e ( C , D ) · Π δ ∈ I A j δ λ δ ,
Wherein, m is the transaction cleartext information after decryption,It is the part ciphertext comprising transaction cleartext information m, C is comprising secret value The part ciphertext of s, D is the part of key in user private key SK, λδFor gathering { λδ}δ∈IIn the δ parameter, λδ∈Zp, set {λδ}δ∈IIt is the parameter sets obtained according to the reconstruction nature of LSSS schemes, I={ δ:ρ(δ)∈S′u, ρ (δ) is represented with mapping ρ δ is mapped to the policy attribute a in ciphertext policy ABE collection Lj′.
CN201610948544.XA 2016-11-02 2016-11-02 Block chain private data access control method based on attribute encryption Active CN106503994B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610948544.XA CN106503994B (en) 2016-11-02 2016-11-02 Block chain private data access control method based on attribute encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610948544.XA CN106503994B (en) 2016-11-02 2016-11-02 Block chain private data access control method based on attribute encryption

Publications (2)

Publication Number Publication Date
CN106503994A true CN106503994A (en) 2017-03-15
CN106503994B CN106503994B (en) 2020-07-28

Family

ID=58322104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610948544.XA Active CN106503994B (en) 2016-11-02 2016-11-02 Block chain private data access control method based on attribute encryption

Country Status (1)

Country Link
CN (1) CN106503994B (en)

Cited By (101)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106992990A (en) * 2017-05-19 2017-07-28 北京牛链科技有限公司 Data sharing method and system and block catenary system and computing device
CN107085807A (en) * 2017-04-19 2017-08-22 迅鳐成都科技有限公司 A kind of data assets method of commerce based on block chain
CN107135209A (en) * 2017-04-21 2017-09-05 天津理工大学 A kind of data sharing method based on block chain
CN107148037A (en) * 2017-07-18 2017-09-08 宇龙计算机通信科技(深圳)有限公司 A kind of system of selection, terminal and the server of the small base station of terminated
CN107240056A (en) * 2017-05-08 2017-10-10 暨南大学 A kind of love and marriage register method based on block chain technology
CN107248994A (en) * 2017-06-26 2017-10-13 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107294963A (en) * 2017-06-14 2017-10-24 广东工业大学 A kind of safe encryption method and device of the data based on alliance's block chain
CN107358424A (en) * 2017-06-26 2017-11-17 中国人民银行数字货币研究所 A kind of method of commerce and device based on digital cash
CN107451485A (en) * 2017-06-02 2017-12-08 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107481146A (en) * 2017-10-13 2017-12-15 深圳市招股科技有限公司 One kind is based on the safe and efficient financial trade method of block chain
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN107682364A (en) * 2017-11-03 2018-02-09 杭州秘猿科技有限公司 One kind license chain privacy method of commerce
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN108063754A (en) * 2017-11-10 2018-05-22 西安电子科技大学 Towards the attribute base encryption method of wearable health monitoring equipment anonymization data
CN108123936A (en) * 2017-12-13 2018-06-05 北京科技大学 A kind of access control method and system based on block chain technology
CN108171494A (en) * 2017-11-23 2018-06-15 阿里巴巴集团控股有限公司 A kind of data processing method and device
CN108269398A (en) * 2017-12-27 2018-07-10 深圳市元征软件开发有限公司 A kind of recording method of highway traffic data and mobile unit
CN108289129A (en) * 2018-02-26 2018-07-17 深圳智乾区块链科技有限公司 Block chain ecological environment creation method, system and computer readable storage medium
CN108304478A (en) * 2017-12-28 2018-07-20 深圳市轱辘车联数据技术有限公司 A kind of data processing method and server
CN108320143A (en) * 2018-02-05 2018-07-24 中国地质大学(武汉) A kind of guard method of password currency private key
CN108335106A (en) * 2018-01-24 2018-07-27 深圳壹账通智能科技有限公司 The more account books of Zero Knowledge based on block chain exchange transfer account method, device and storage medium
CN108364223A (en) * 2017-12-29 2018-08-03 阿里巴巴集团控股有限公司 A kind of method and device of Data Audit
CN108418689A (en) * 2017-11-30 2018-08-17 矩阵元技术(深圳)有限公司 A kind of the zero-knowledge proof method and medium of suitable block chain secret protection
CN108462568A (en) * 2018-02-11 2018-08-28 西安电子科技大学 A kind of secure file storage and sharing method based on block chain
CN108537498A (en) * 2018-03-15 2018-09-14 上海卓辰信息科技有限公司 Interorganizational project management method, system, equipment and medium based on block chain
CN108614974A (en) * 2018-04-24 2018-10-02 南京邮电大学 It is a kind of based on the express delivery information privacy protection system of block chain and its guard method
CN108632292A (en) * 2018-05-16 2018-10-09 苏宁易购集团股份有限公司 Data sharing method based on alliance's chain and system
CN108632480A (en) * 2018-04-19 2018-10-09 北京阿尔山金融科技有限公司 Charging method based on block chain and device
CN108712380A (en) * 2018-04-12 2018-10-26 三维通信股份有限公司 A kind of mixing identity identifying method based on strategy
CN108768988A (en) * 2018-05-17 2018-11-06 深圳前海微众银行股份有限公司 Block chain access control method, equipment and computer readable storage medium
CN108805585A (en) * 2018-05-28 2018-11-13 广州中国科学院软件应用技术研究所 Distributed commodity data storage system, circulation and source tracing method based on block chain
CN108875407A (en) * 2018-06-12 2018-11-23 东方银谷(北京)投资管理有限公司 For the sensitive information processing method and processing device of financial business, client, data framework
CN108898475A (en) * 2018-05-08 2018-11-27 众安信息技术服务有限公司 Alliance's block chain based on encryption attribute realizes credit methods and system
CN109145647A (en) * 2018-09-05 2019-01-04 武汉笑脸科技有限公司 A kind of trusted identity verifying system and method based on block chain
CN109214160A (en) * 2018-09-14 2019-01-15 温州科技职业学院 A kind of computer network authentication system and method, computer program
CN109241055A (en) * 2018-08-09 2019-01-18 上海常仁信息科技有限公司 A kind of block chain data-storage system
CN109274481A (en) * 2018-08-01 2019-01-25 中国科学院数据与通信保护研究教育中心 A kind of traceable method of data of block chain
CN109271769A (en) * 2018-08-24 2019-01-25 广东博云公共平台网络科技有限公司 A kind of Subscriber Management System and user management method
CN109325370A (en) * 2018-08-09 2019-02-12 上海常仁信息科技有限公司 A kind of block chain access robot node device
CN109447634A (en) * 2018-10-09 2019-03-08 北京网录科技有限公司 A kind of code key update method and block chain account management method using this method of locking an account
CN109493042A (en) * 2018-10-24 2019-03-19 南京邮电大学 A kind of intelligent contract possessing access control function is credible to deposit card method and system
CN109559117A (en) * 2018-11-14 2019-04-02 北京科技大学 Block chain contract method for secret protection and system based on the encryption of attribute base
CN109583885A (en) * 2017-09-01 2019-04-05 埃森哲环球解决方案有限公司 Bout controls rewritable block chain
CN109598149A (en) * 2018-11-20 2019-04-09 阿里巴巴集团控股有限公司 The method and apparatus of business processing
CN109687958A (en) * 2018-12-28 2019-04-26 全链通有限公司 A kind of design of art work certificate and verification method based on fidelity block chain
CN109711184A (en) * 2018-12-28 2019-05-03 国网电子商务有限公司 Block chain data access control method and device based on attribute encryption
CN109979550A (en) * 2019-02-14 2019-07-05 中国科学院信息工程研究所 A kind of block chain medical data management method and system based on distributed nature signature
CN110266687A (en) * 2019-06-21 2019-09-20 杭州云象网络技术有限公司 A kind of Internet of Things TSM Security Agent data sharing modularity using block chain technology
CN110414961A (en) * 2019-06-21 2019-11-05 深圳壹账通智能科技有限公司 Prevent transfer account method, device, equipment and the storage medium of the track transactions side of producing
CN110458554A (en) * 2019-03-31 2019-11-15 西安电子科技大学 The data fast transaction method of identity-based on block chain
CN110493347A (en) * 2019-08-26 2019-11-22 重庆邮电大学 Data access control method and system in large-scale cloud storage based on block chain
CN110599163A (en) * 2019-08-20 2019-12-20 江苏大学 Transaction record outsourcing method facing block chain transaction supervision
CN110647756A (en) * 2019-08-05 2020-01-03 广东工业大学 Online examination management system based on block chain and CP-ABE and application method thereof
WO2019101232A3 (en) * 2019-03-04 2020-01-09 Alibaba Group Holding Limited Methods and devices for providing transaction data to blockchain system for processing
WO2020010490A1 (en) * 2018-07-09 2020-01-16 彭英均 Method for arbitration-less resolution of accuracy and validity of transaction data recorded in blockchain
CN110719176A (en) * 2019-10-22 2020-01-21 黑龙江工业学院 Logistics privacy protection method and system based on block chain and readable storage medium
CN110740033A (en) * 2019-08-19 2020-01-31 杭州云象网络技术有限公司 block chain multi-party data sharing method based on secret sharing technology
WO2020037654A1 (en) * 2018-08-24 2020-02-27 区链通网络有限公司 Blockchain data protection method, device and system, and computer-readable storage medium
CN110915183A (en) * 2017-07-26 2020-03-24 国际商业机器公司 Block chain authentication via hard/soft token validation
CN110999211A (en) * 2017-08-03 2020-04-10 区块链控股有限公司 System and method for communicating, storing and processing data provided by entities over a blockchain network
CN111008201A (en) * 2020-03-09 2020-04-14 支付宝(杭州)信息技术有限公司 Method and apparatus for parallel modification and reading of state trees
CN111030821A (en) * 2019-08-27 2020-04-17 杭州云象网络技术有限公司 Alliance chain encryption method based on bilinear mapping technology
CN111046427A (en) * 2019-12-13 2020-04-21 北京启迪区块链科技发展有限公司 Block chain-based data access control method, device, equipment and medium
CN111079170A (en) * 2019-11-04 2020-04-28 湖南源科创新科技有限公司 Control method and control device of solid state disk
CN111130757A (en) * 2019-12-31 2020-05-08 华中科技大学 Multi-cloud CP-ABE access control method based on block chain
CN111314369A (en) * 2020-02-27 2020-06-19 苏州市星际云通区块链科技有限公司 Resource sharing block chain network
CN111371561A (en) * 2020-02-27 2020-07-03 华信咨询设计研究院有限公司 Alliance block chain data access control method based on CP-ABE algorithm
CN111614678A (en) * 2020-05-22 2020-09-01 中国联合网络通信集团有限公司 Anti-disclosure method, anti-disclosure device and encryption device
CN111625869A (en) * 2020-04-23 2020-09-04 腾讯科技(深圳)有限公司 Data processing method and data processing device
CN111681002A (en) * 2020-06-10 2020-09-18 浙江工商大学 Fair data transaction method and system based on block chain
CN111709053A (en) * 2020-06-11 2020-09-25 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
CN111819817A (en) * 2018-03-08 2020-10-23 区块链控股有限公司 Method and system for block chain implementation for bilinear mapping accumulator-based authorization
CN111819815A (en) * 2018-03-02 2020-10-23 区块链控股有限公司 Computer-implemented method and system for transferring control of digital assets
CN111859444A (en) * 2020-06-12 2020-10-30 中国科学院信息工程研究所 Block chain data supervision method and system based on attribute encryption
CN111901302A (en) * 2020-06-28 2020-11-06 石家庄铁道大学 Medical information attribute encryption access control method based on block chain
CN111954999A (en) * 2018-03-06 2020-11-17 阿梅里科普投资有限责任公司 Customized views of restricted information recorded into blockchains
CN111986755A (en) * 2020-08-24 2020-11-24 中国人民解放军战略支援部队信息工程大学 Data sharing system based on block chain and attribute-based encryption
CN112039880A (en) * 2020-08-30 2020-12-04 河南大学 Block chain distributed outsourcing-based dual-policy access control method
CN112152778A (en) * 2020-09-22 2020-12-29 腾讯科技(深圳)有限公司 Node management method and device and electronic equipment
CN112165472A (en) * 2020-09-22 2021-01-01 郑州轻工业大学 Internet of things data security sharing method based on privacy protection
CN112204920A (en) * 2018-04-05 2021-01-08 区块链控股有限公司 Computer-implemented method and system for transferring access to digital assets
CN112365945A (en) * 2020-10-27 2021-02-12 扬州大学 Block chain-based electronic medical record fine-grained access control and ciphertext searchable method
TWI719435B (en) * 2018-06-29 2021-02-21 開曼群島商創新先進技術有限公司 Input obtaining method and device for safe multi-party calculation agreement
CN112438035A (en) * 2018-07-19 2021-03-02 区块链控股有限公司 Computer-implemented system and method for controlling processing steps of a distributed system
CN112532588A (en) * 2020-11-06 2021-03-19 北京工业大学 Policy hidden type data access control method based on block chain
WO2021081803A1 (en) * 2019-10-30 2021-05-06 深圳市网心科技有限公司 Blockchain system, supervision method, system, device, and computer storage medium
CN112989378A (en) * 2021-03-12 2021-06-18 北京航空航天大学 File trusted intermediate storage architecture based on attribute encryption
CN113127926A (en) * 2021-03-12 2021-07-16 西安电子科技大学 Method, system, storage medium and computer for analyzing statistical relevance of private data
CN113127927A (en) * 2021-04-27 2021-07-16 泰山学院 Attribute reconstruction encryption method and system for license chain data sharing and supervision
CN113393238A (en) * 2021-06-16 2021-09-14 福建师范大学 Intelligent contract model for protecting privacy and implementation method thereof
CN113489733A (en) * 2021-07-13 2021-10-08 郑州轻工业大学 Block chain-based content center network privacy protection method
CN113572790A (en) * 2021-09-18 2021-10-29 深圳时空云科技有限公司 Distributed processing method and device for private information
US11316668B2 (en) 2018-11-16 2022-04-26 Safetech Bv Methods and systems for cryptographic private key management for secure multiparty storage and transfer of information
CN114528601A (en) * 2022-04-25 2022-05-24 中国工商银行股份有限公司 Access method and device based on block chain data, processor and electronic equipment
CN114640468A (en) * 2022-03-16 2022-06-17 安顺职业技术学院 Block chain privacy protection method based on online and offline attribute encryption
CN114978744A (en) * 2022-06-08 2022-08-30 廖鼎 Security and protection information transmission method and system based on block chain
CN116052832A (en) * 2023-04-03 2023-05-02 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) Tamper-proof transmission method based on medical information
CN116260662A (en) * 2023-05-15 2023-06-13 成都信息工程大学 Tracing storage method, tracing storage system and tracing system
US11689539B2 (en) 2018-03-06 2023-06-27 Americorp Investments Llc Blockchain-based commercial inventory systems and methods
US11700265B2 (en) 2018-03-06 2023-07-11 Americorp Investments Llc Customized view of restricted information recorded into a blockchain
CN116720839A (en) * 2023-08-07 2023-09-08 成都创一博通科技有限公司 Financial information management method based on blockchain technology and supervision system thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120144210A1 (en) * 2010-12-03 2012-06-07 Yacov Yacobi Attribute-based access-controlled data-storage system
CN105406967A (en) * 2015-12-10 2016-03-16 西安电子科技大学 Hierarchical attribute encryption method
CN105915333A (en) * 2016-03-15 2016-08-31 南京邮电大学 High-efficiency secret key distribution method based on attribute encryption
CN105933345A (en) * 2016-06-28 2016-09-07 电子科技大学 Verifiable outsourcing attribute-based encryption method based on linear secret sharing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120144210A1 (en) * 2010-12-03 2012-06-07 Yacov Yacobi Attribute-based access-controlled data-storage system
CN105406967A (en) * 2015-12-10 2016-03-16 西安电子科技大学 Hierarchical attribute encryption method
CN105915333A (en) * 2016-03-15 2016-08-31 南京邮电大学 High-efficiency secret key distribution method based on attribute encryption
CN105933345A (en) * 2016-06-28 2016-09-07 电子科技大学 Verifiable outsourcing attribute-based encryption method based on linear secret sharing

Cited By (153)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107085807A (en) * 2017-04-19 2017-08-22 迅鳐成都科技有限公司 A kind of data assets method of commerce based on block chain
CN107135209B (en) * 2017-04-21 2019-07-16 天津理工大学 A kind of data sharing method based on block chain
CN107135209A (en) * 2017-04-21 2017-09-05 天津理工大学 A kind of data sharing method based on block chain
CN107240056A (en) * 2017-05-08 2017-10-10 暨南大学 A kind of love and marriage register method based on block chain technology
CN106992990A (en) * 2017-05-19 2017-07-28 北京牛链科技有限公司 Data sharing method and system and block catenary system and computing device
CN107451485A (en) * 2017-06-02 2017-12-08 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107294963A (en) * 2017-06-14 2017-10-24 广东工业大学 A kind of safe encryption method and device of the data based on alliance's block chain
CN107294963B (en) * 2017-06-14 2019-09-06 广东工业大学 A kind of safe encryption method and device of the data based on alliance's block chain
CN107358424A (en) * 2017-06-26 2017-11-17 中国人民银行数字货币研究所 A kind of method of commerce and device based on digital cash
CN107358424B (en) * 2017-06-26 2020-09-29 中国人民银行数字货币研究所 Transaction method and device based on digital currency
CN107248994A (en) * 2017-06-26 2017-10-13 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107148037A (en) * 2017-07-18 2017-09-08 宇龙计算机通信科技(深圳)有限公司 A kind of system of selection, terminal and the server of the small base station of terminated
CN110915183A (en) * 2017-07-26 2020-03-24 国际商业机器公司 Block chain authentication via hard/soft token validation
CN110915183B (en) * 2017-07-26 2022-03-22 国际商业机器公司 Block chain authentication via hard/soft token validation
CN110999211A (en) * 2017-08-03 2020-04-10 区块链控股有限公司 System and method for communicating, storing and processing data provided by entities over a blockchain network
CN109583885A (en) * 2017-09-01 2019-04-05 埃森哲环球解决方案有限公司 Bout controls rewritable block chain
CN109583885B (en) * 2017-09-01 2023-03-17 埃森哲环球解决方案有限公司 Round control of rewritable block chains
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN107481146A (en) * 2017-10-13 2017-12-15 深圳市招股科技有限公司 One kind is based on the safe and efficient financial trade method of block chain
CN107911216B (en) * 2017-10-26 2020-07-14 矩阵元技术(深圳)有限公司 Block chain transaction privacy protection method and system
WO2019080933A1 (en) * 2017-10-26 2019-05-02 云图有限公司 Block chain transaction privacy protection method and system
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN107682364B (en) * 2017-11-03 2019-12-03 杭州秘猿科技有限公司 A kind of license chain privacy method of commerce
CN107682364A (en) * 2017-11-03 2018-02-09 杭州秘猿科技有限公司 One kind license chain privacy method of commerce
CN108063754B (en) * 2017-11-10 2020-11-13 西安电子科技大学 Attribute-based encryption method for anonymized data of wearable health monitoring equipment
CN108063754A (en) * 2017-11-10 2018-05-22 西安电子科技大学 Towards the attribute base encryption method of wearable health monitoring equipment anonymization data
US11108786B2 (en) 2017-11-23 2021-08-31 Advanced New Technologies Co., Ltd. Data processing method and apparatus
US10931684B2 (en) 2017-11-23 2021-02-23 Advanced New Technologies Co., Ltd. Data processing method and apparatus
CN108171494A (en) * 2017-11-23 2018-06-15 阿里巴巴集团控股有限公司 A kind of data processing method and device
WO2019100864A1 (en) * 2017-11-23 2019-05-31 阿里巴巴集团控股有限公司 Data processing method and apparatus
TWI684892B (en) * 2017-11-23 2020-02-11 香港商阿里巴巴集團服務有限公司 Data processing method and device
CN108418689A (en) * 2017-11-30 2018-08-17 矩阵元技术(深圳)有限公司 A kind of the zero-knowledge proof method and medium of suitable block chain secret protection
CN108123936B (en) * 2017-12-13 2021-04-13 北京科技大学 Access control method and system based on block chain technology
CN108123936A (en) * 2017-12-13 2018-06-05 北京科技大学 A kind of access control method and system based on block chain technology
WO2019128028A1 (en) * 2017-12-27 2019-07-04 深圳市元征软件开发有限公司 Road traffic data recording method and vehicle-mounted device
CN108269398A (en) * 2017-12-27 2018-07-10 深圳市元征软件开发有限公司 A kind of recording method of highway traffic data and mobile unit
CN108304478A (en) * 2017-12-28 2018-07-20 深圳市轱辘车联数据技术有限公司 A kind of data processing method and server
US11295381B2 (en) 2017-12-29 2022-04-05 Advanced New Technologies Co., Ltd. Data auditing method and device
CN108364223B (en) * 2017-12-29 2021-01-26 创新先进技术有限公司 Data auditing method and device
CN108364223A (en) * 2017-12-29 2018-08-03 阿里巴巴集团控股有限公司 A kind of method and device of Data Audit
CN108335106A (en) * 2018-01-24 2018-07-27 深圳壹账通智能科技有限公司 The more account books of Zero Knowledge based on block chain exchange transfer account method, device and storage medium
CN108320143A (en) * 2018-02-05 2018-07-24 中国地质大学(武汉) A kind of guard method of password currency private key
CN108320143B (en) * 2018-02-05 2022-03-11 中国地质大学(武汉) Method for protecting cipher currency private key
CN108462568A (en) * 2018-02-11 2018-08-28 西安电子科技大学 A kind of secure file storage and sharing method based on block chain
CN108289129A (en) * 2018-02-26 2018-07-17 深圳智乾区块链科技有限公司 Block chain ecological environment creation method, system and computer readable storage medium
CN111819815A (en) * 2018-03-02 2020-10-23 区块链控股有限公司 Computer-implemented method and system for transferring control of digital assets
US11706228B2 (en) 2018-03-06 2023-07-18 Americorp Investments Llc Customized view of restricted information recorded into a blockchain
US11689539B2 (en) 2018-03-06 2023-06-27 Americorp Investments Llc Blockchain-based commercial inventory systems and methods
CN111954999A (en) * 2018-03-06 2020-11-17 阿梅里科普投资有限责任公司 Customized views of restricted information recorded into blockchains
US11700265B2 (en) 2018-03-06 2023-07-11 Americorp Investments Llc Customized view of restricted information recorded into a blockchain
CN111819817A (en) * 2018-03-08 2020-10-23 区块链控股有限公司 Method and system for block chain implementation for bilinear mapping accumulator-based authorization
CN108537498A (en) * 2018-03-15 2018-09-14 上海卓辰信息科技有限公司 Interorganizational project management method, system, equipment and medium based on block chain
CN112204920A (en) * 2018-04-05 2021-01-08 区块链控股有限公司 Computer-implemented method and system for transferring access to digital assets
CN108712380A (en) * 2018-04-12 2018-10-26 三维通信股份有限公司 A kind of mixing identity identifying method based on strategy
CN108632480A (en) * 2018-04-19 2018-10-09 北京阿尔山金融科技有限公司 Charging method based on block chain and device
CN108614974A (en) * 2018-04-24 2018-10-02 南京邮电大学 It is a kind of based on the express delivery information privacy protection system of block chain and its guard method
CN108614974B (en) * 2018-04-24 2021-06-01 南京邮电大学 Express information privacy protection system based on block chain and protection method thereof
CN108898475A (en) * 2018-05-08 2018-11-27 众安信息技术服务有限公司 Alliance's block chain based on encryption attribute realizes credit methods and system
CN108632292B (en) * 2018-05-16 2020-11-17 苏宁易购集团股份有限公司 Data sharing method and system based on alliance chain
CN108632292A (en) * 2018-05-16 2018-10-09 苏宁易购集团股份有限公司 Data sharing method based on alliance's chain and system
CN108768988B (en) * 2018-05-17 2021-01-05 深圳前海微众银行股份有限公司 Block chain access control method, block chain access control equipment and computer readable storage medium
CN108768988A (en) * 2018-05-17 2018-11-06 深圳前海微众银行股份有限公司 Block chain access control method, equipment and computer readable storage medium
CN108805585B (en) * 2018-05-28 2022-07-05 广州中科易德科技有限公司 Distributed commodity data storage system based on block chain, circulation and tracing method
CN108805585A (en) * 2018-05-28 2018-11-13 广州中国科学院软件应用技术研究所 Distributed commodity data storage system, circulation and source tracing method based on block chain
CN108875407A (en) * 2018-06-12 2018-11-23 东方银谷(北京)投资管理有限公司 For the sensitive information processing method and processing device of financial business, client, data framework
TWI719435B (en) * 2018-06-29 2021-02-21 開曼群島商創新先進技術有限公司 Input obtaining method and device for safe multi-party calculation agreement
WO2020010490A1 (en) * 2018-07-09 2020-01-16 彭英均 Method for arbitration-less resolution of accuracy and validity of transaction data recorded in blockchain
CN112438035A (en) * 2018-07-19 2021-03-02 区块链控股有限公司 Computer-implemented system and method for controlling processing steps of a distributed system
CN109274481A (en) * 2018-08-01 2019-01-25 中国科学院数据与通信保护研究教育中心 A kind of traceable method of data of block chain
CN109274481B (en) * 2018-08-01 2020-03-27 中国科学院数据与通信保护研究教育中心 Data traceable method of block chain
CN109241055A (en) * 2018-08-09 2019-01-18 上海常仁信息科技有限公司 A kind of block chain data-storage system
CN109325370A (en) * 2018-08-09 2019-02-12 上海常仁信息科技有限公司 A kind of block chain access robot node device
WO2020037654A1 (en) * 2018-08-24 2020-02-27 区链通网络有限公司 Blockchain data protection method, device and system, and computer-readable storage medium
CN109271769A (en) * 2018-08-24 2019-01-25 广东博云公共平台网络科技有限公司 A kind of Subscriber Management System and user management method
CN109145647A (en) * 2018-09-05 2019-01-04 武汉笑脸科技有限公司 A kind of trusted identity verifying system and method based on block chain
CN109214160A (en) * 2018-09-14 2019-01-15 温州科技职业学院 A kind of computer network authentication system and method, computer program
CN109447634A (en) * 2018-10-09 2019-03-08 北京网录科技有限公司 A kind of code key update method and block chain account management method using this method of locking an account
CN109493042A (en) * 2018-10-24 2019-03-19 南京邮电大学 A kind of intelligent contract possessing access control function is credible to deposit card method and system
CN109559117B (en) * 2018-11-14 2022-05-20 北京科技大学 Block linkage contract privacy protection method and system based on attribute-based encryption
CN109559117A (en) * 2018-11-14 2019-04-02 北京科技大学 Block chain contract method for secret protection and system based on the encryption of attribute base
US11316668B2 (en) 2018-11-16 2022-04-26 Safetech Bv Methods and systems for cryptographic private key management for secure multiparty storage and transfer of information
CN109598149A (en) * 2018-11-20 2019-04-09 阿里巴巴集团控股有限公司 The method and apparatus of business processing
CN109598149B (en) * 2018-11-20 2020-04-07 阿里巴巴集团控股有限公司 Service processing method and device
CN109711184A (en) * 2018-12-28 2019-05-03 国网电子商务有限公司 Block chain data access control method and device based on attribute encryption
CN109687958A (en) * 2018-12-28 2019-04-26 全链通有限公司 A kind of design of art work certificate and verification method based on fidelity block chain
CN109711184B (en) * 2018-12-28 2020-11-10 国网电子商务有限公司 Block chain data access control method and device based on attribute encryption
CN109979550B (en) * 2019-02-14 2021-06-01 中国科学院信息工程研究所 Block chain medical data management method and system based on distributed attribute signature
CN109979550A (en) * 2019-02-14 2019-07-05 中国科学院信息工程研究所 A kind of block chain medical data management method and system based on distributed nature signature
US11341493B2 (en) 2019-03-04 2022-05-24 Advanced New Technologies Co., Ltd. Methods and devices for providing transaction data to blockchain system for processing
US10867299B2 (en) 2019-03-04 2020-12-15 Advanced New Technologies Co., Ltd. Methods and devices for providing transaction data to blockchain system for processing
WO2019101232A3 (en) * 2019-03-04 2020-01-09 Alibaba Group Holding Limited Methods and devices for providing transaction data to blockchain system for processing
CN110458554A (en) * 2019-03-31 2019-11-15 西安电子科技大学 The data fast transaction method of identity-based on block chain
CN110458554B (en) * 2019-03-31 2022-03-22 西安电子科技大学 Identity-based data rapid transaction method on block chain
CN110266687B (en) * 2019-06-21 2021-08-17 杭州云象网络技术有限公司 Method for designing Internet of things security agent data sharing module by adopting block chain technology
WO2020253108A1 (en) * 2019-06-21 2020-12-24 深圳壹账通智能科技有限公司 Information hiding method, apparatus, device, and storage medium
CN110266687A (en) * 2019-06-21 2019-09-20 杭州云象网络技术有限公司 A kind of Internet of Things TSM Security Agent data sharing modularity using block chain technology
CN110414961A (en) * 2019-06-21 2019-11-05 深圳壹账通智能科技有限公司 Prevent transfer account method, device, equipment and the storage medium of the track transactions side of producing
CN110647756A (en) * 2019-08-05 2020-01-03 广东工业大学 Online examination management system based on block chain and CP-ABE and application method thereof
CN110647756B (en) * 2019-08-05 2023-06-27 广东工业大学 Online examination management system based on blockchain and CP-ABE and application method thereof
CN110740033A (en) * 2019-08-19 2020-01-31 杭州云象网络技术有限公司 block chain multi-party data sharing method based on secret sharing technology
CN110599163A (en) * 2019-08-20 2019-12-20 江苏大学 Transaction record outsourcing method facing block chain transaction supervision
CN110493347B (en) * 2019-08-26 2020-07-14 重庆邮电大学 Block chain-based data access control method and system in large-scale cloud storage
CN110493347A (en) * 2019-08-26 2019-11-22 重庆邮电大学 Data access control method and system in large-scale cloud storage based on block chain
CN111030821A (en) * 2019-08-27 2020-04-17 杭州云象网络技术有限公司 Alliance chain encryption method based on bilinear mapping technology
CN110719176A (en) * 2019-10-22 2020-01-21 黑龙江工业学院 Logistics privacy protection method and system based on block chain and readable storage medium
WO2021081803A1 (en) * 2019-10-30 2021-05-06 深圳市网心科技有限公司 Blockchain system, supervision method, system, device, and computer storage medium
CN111079170B (en) * 2019-11-04 2021-11-23 湖南源科创新科技有限公司 Control method and control device of solid state disk
CN111079170A (en) * 2019-11-04 2020-04-28 湖南源科创新科技有限公司 Control method and control device of solid state disk
CN111046427A (en) * 2019-12-13 2020-04-21 北京启迪区块链科技发展有限公司 Block chain-based data access control method, device, equipment and medium
CN111130757B (en) * 2019-12-31 2020-12-25 华中科技大学 Multi-cloud CP-ABE access control method based on block chain
CN111130757A (en) * 2019-12-31 2020-05-08 华中科技大学 Multi-cloud CP-ABE access control method based on block chain
CN111371561A (en) * 2020-02-27 2020-07-03 华信咨询设计研究院有限公司 Alliance block chain data access control method based on CP-ABE algorithm
CN111314369A (en) * 2020-02-27 2020-06-19 苏州市星际云通区块链科技有限公司 Resource sharing block chain network
CN111371561B (en) * 2020-02-27 2023-07-11 华信咨询设计研究院有限公司 Alliance block chain data access control method based on CP-ABE algorithm
CN111008201A (en) * 2020-03-09 2020-04-14 支付宝(杭州)信息技术有限公司 Method and apparatus for parallel modification and reading of state trees
CN111625869A (en) * 2020-04-23 2020-09-04 腾讯科技(深圳)有限公司 Data processing method and data processing device
CN111614678A (en) * 2020-05-22 2020-09-01 中国联合网络通信集团有限公司 Anti-disclosure method, anti-disclosure device and encryption device
CN111681002B (en) * 2020-06-10 2023-05-02 浙江工商大学 Fair data transaction method and system based on blockchain
CN111681002A (en) * 2020-06-10 2020-09-18 浙江工商大学 Fair data transaction method and system based on block chain
CN111709053B (en) * 2020-06-11 2024-04-05 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
CN111709053A (en) * 2020-06-11 2020-09-25 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
CN111859444B (en) * 2020-06-12 2022-03-01 中国科学院信息工程研究所 Block chain data supervision method and system based on attribute encryption
CN111859444A (en) * 2020-06-12 2020-10-30 中国科学院信息工程研究所 Block chain data supervision method and system based on attribute encryption
CN111901302A (en) * 2020-06-28 2020-11-06 石家庄铁道大学 Medical information attribute encryption access control method based on block chain
CN111986755B (en) * 2020-08-24 2023-05-19 中国人民解放军战略支援部队信息工程大学 Data sharing system based on blockchain and attribute-based encryption
CN111986755A (en) * 2020-08-24 2020-11-24 中国人民解放军战略支援部队信息工程大学 Data sharing system based on block chain and attribute-based encryption
CN112039880A (en) * 2020-08-30 2020-12-04 河南大学 Block chain distributed outsourcing-based dual-policy access control method
CN112165472A (en) * 2020-09-22 2021-01-01 郑州轻工业大学 Internet of things data security sharing method based on privacy protection
CN112152778A (en) * 2020-09-22 2020-12-29 腾讯科技(深圳)有限公司 Node management method and device and electronic equipment
CN112165472B (en) * 2020-09-22 2022-09-27 郑州轻工业大学 Internet of things data security sharing method based on privacy protection
CN112152778B (en) * 2020-09-22 2022-03-15 腾讯科技(深圳)有限公司 Node management method and device and electronic equipment
CN112365945B (en) * 2020-10-27 2024-03-26 扬州大学 Electronic medical record fine granularity access control and ciphertext searchable method based on blockchain
CN112365945A (en) * 2020-10-27 2021-02-12 扬州大学 Block chain-based electronic medical record fine-grained access control and ciphertext searchable method
CN112532588A (en) * 2020-11-06 2021-03-19 北京工业大学 Policy hidden type data access control method based on block chain
CN112532588B (en) * 2020-11-06 2023-01-31 北京工业大学 Policy hidden type data access control method based on block chain
CN112989378A (en) * 2021-03-12 2021-06-18 北京航空航天大学 File trusted intermediate storage architecture based on attribute encryption
CN113127926B (en) * 2021-03-12 2024-01-16 西安电子科技大学 Method, system, storage medium and computer for analyzing statistical correlation of privacy data
CN113127926A (en) * 2021-03-12 2021-07-16 西安电子科技大学 Method, system, storage medium and computer for analyzing statistical relevance of private data
CN113127927B (en) * 2021-04-27 2022-03-18 泰山学院 Attribute reconstruction encryption method and system for license chain data sharing and supervision
CN113127927A (en) * 2021-04-27 2021-07-16 泰山学院 Attribute reconstruction encryption method and system for license chain data sharing and supervision
CN113393238A (en) * 2021-06-16 2021-09-14 福建师范大学 Intelligent contract model for protecting privacy and implementation method thereof
CN113489733A (en) * 2021-07-13 2021-10-08 郑州轻工业大学 Block chain-based content center network privacy protection method
CN113572790A (en) * 2021-09-18 2021-10-29 深圳时空云科技有限公司 Distributed processing method and device for private information
CN114640468A (en) * 2022-03-16 2022-06-17 安顺职业技术学院 Block chain privacy protection method based on online and offline attribute encryption
CN114640468B (en) * 2022-03-16 2024-01-26 安顺职业技术学院 Block chain privacy protection method based on online offline attribute encryption
CN114528601A (en) * 2022-04-25 2022-05-24 中国工商银行股份有限公司 Access method and device based on block chain data, processor and electronic equipment
CN114528601B (en) * 2022-04-25 2022-09-30 中国工商银行股份有限公司 Access method and device based on block chain data, processor and electronic equipment
CN114978744A (en) * 2022-06-08 2022-08-30 廖鼎 Security and protection information transmission method and system based on block chain
CN116052832A (en) * 2023-04-03 2023-05-02 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) Tamper-proof transmission method based on medical information
CN116260662A (en) * 2023-05-15 2023-06-13 成都信息工程大学 Tracing storage method, tracing storage system and tracing system
CN116260662B (en) * 2023-05-15 2023-07-18 成都信息工程大学 Tracing storage method, tracing storage system and tracing system
CN116720839B (en) * 2023-08-07 2023-10-17 成都创一博通科技有限公司 Financial information management method based on blockchain technology and supervision system thereof
CN116720839A (en) * 2023-08-07 2023-09-08 成都创一博通科技有限公司 Financial information management method based on blockchain technology and supervision system thereof

Also Published As

Publication number Publication date
CN106503994B (en) 2020-07-28

Similar Documents

Publication Publication Date Title
CN106503994A (en) Block chain private data access control method based on encryption attribute
CN107483198B (en) A kind of block catenary system supervised and method
Li et al. A blockchain privacy protection scheme based on ring signature
CN113595971B (en) Block chain-based distributed data security sharing method, system and computer readable medium
CN103401839B (en) A kind of many authorization center encryption method based on attribute protection
CN103856477B (en) A kind of credible accounting system and corresponding authentication method and equipment
CN103647644B (en) Attribute-based encryption method for achieving hierarchical certification authority
CN107508667B (en) Ciphertext policy ABE base encryption method and its device of the fix duty without key escrow can be disclosed
CN106911470A (en) A kind of bit coin transaction privacy Enhancement Method
US9021572B2 (en) Anonymous access to a service by means of aggregated certificates
CN109040045A (en) A kind of cloud storage access control method based on the encryption of ciphertext policy ABE base
CN104168108B (en) It is a kind of to reveal the traceable attribute base mixed encryption method of key
US6708893B2 (en) Multiple-use smart card with security features and method
CN110011781A (en) A kind of homomorphic cryptography method encrypting and support zero-knowledge proof for transaction amount
CN107819753A (en) Not exclusively anonymous block chain transaction system and method
CN105721158A (en) Cloud safety privacy and integrity protection method and cloud safety privacy and integrity protection system
CN109862046A (en) Anonymous methods can be traced in a kind of alliance's chain
Wang et al. A regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption in bitcoin system
CN106487506A (en) A kind of many mechanisms KP ABE method supporting pre-encrypt and outsourcing deciphering
CN106059763A (en) Attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under cloud environment
CN107294718A (en) Voidable key strategy is based on encryption attribute method in a kind of master pattern
CN107276766A (en) A kind of many authorization attribute encipher-decipher methods
CN110086615A (en) A kind of more authorized party's ciphertext policy ABE base encryption methods of distribution that medium is obscured
CN113347008B (en) Loan information storage method adopting addition homomorphic encryption
CN106487792A (en) A kind of power marketing cloud storage encryption method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant