CN106503994A - Block chain private data access control method based on encryption attribute - Google Patents
Block chain private data access control method based on encryption attribute Download PDFInfo
- Publication number
- CN106503994A CN106503994A CN201610948544.XA CN201610948544A CN106503994A CN 106503994 A CN106503994 A CN 106503994A CN 201610948544 A CN201610948544 A CN 201610948544A CN 106503994 A CN106503994 A CN 106503994A
- Authority
- CN
- China
- Prior art keywords
- attribute
- prime
- ciphertext
- policy
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
Abstract
The invention discloses a kind of block chain private data access control method based on encryption attribute; mainly solving prior art only carries out anonymous protection to the true identity of user in block chain; the privacy leakage problem that protects and cause is not encrypted to privacy information of concluding the business, implementation step is:1. system initialization;2. user's registration obtains attribute information;3. authoritative center is according to customer attribute information dispatch user private key;4. counterparty encrypts transaction private data and is uploaded to block chain;5. bookkeeper is verified to Transaction Information and is executed transaction;6. authorize supervision center to check transaction ciphertext using mandate private key decryption.The present invention passes through to be encrypted transaction privacy information, it is to avoid data-privacy leakage, can be used for the secret protection to fictitious assets transaction data in block chain.
Description
Technical field
The invention belongs to art of cryptography, and in particular to a kind of private data access control method, block is can be applicable to
In chain, different stage mandate supervision center and user are effectively accessed to the encrypting transactions data in block chain.
Background technology
Block chain is substantially the data base of a decentration, just as a shared account book, records all of bit coin
Transaction Information.Used as the Floor layer Technology of bit coin, block chain has decentration, opening, anonymity and the spy such as can not distort
Point.In traditional publicly-owned block chain, the data such as accounts information and transaction content of user are all disclosed, and any user may be used
To participate in book keeping operation and check transaction data, the mode only by " pseudo- anonymous " protects privacy of user.Although this increased user
The confidence true and reliable to data, but for financial industry, the full disclosure of data is related to a large amount of trade secrets and profit
Benefit, it is therefore necessary to protect data-privacy using encryption technology, while ensure supervision center such as government and bank's energy again
Transaction content is enough checked, to prevent the carrying out of contraband in block chain.This is accomplished by flexible access control policy to realize
Control to different user access rights.And with customer volume sharp increase in block chain, it will substantial amounts of Transaction Information is produced, from
And causing supervision inconvenience, it is therefore desirable to the supervision center for setting different stage supervises the carrying out that concludes the business in block chain to be layered.
Sahai and Waters in 2005 proposes the concept of encryption attribute ABE, and ABE point is encrypted CP- for ciphertext policy ABE
ABE and key policy attribute encryption KP-ABE.In CP-ABE, ciphertext is related to access strategy, and key is related to user property,
When the attribute of only user meets the access control policy of ciphertext, user just can be with decrypting ciphertext.CP-ABE has flexible visit
Ask control strategy, solve the problems, such as the access control of many-many communication well, but it does not account for mutual between attribute
Relation, is not suitable between different stage authorized user's authority the presence of the situation that higher level's authority covers subordinate right.Then 2009
Year Jin Li etc. propose the concept that hierarchical attribute encrypts HABE, the program according to the dependency between attribute to community set in
Attribute be layered, cover the property of lower property so as to be provided with upper strata attribute, but the program be based on basic ABE, lack
Weary fine-grained access control.
Patent " a kind of hierarchical attribute encipherment scheme " (publication number that Xian Electronics Science and Technology University applies at which:
105406967A, application number:201510908416.8, the applying date:On 03 16th, 2016) in disclose a kind of hierarchical attribute and add
Close scheme.The program encryption when for layering each attribute the corresponding row of the access structure of layering is embedded in into, from
And realize that layering and access control combine.The weak point that the method is present is which to be layered only for the importance of attribute,
For the consideration of dependency between attribute is not detailed enough, it is not suitable for needing to carry out carefully user rights at different levels in following block chain
The situation of granularity hierarchical access control.
Content of the invention
Present invention aims to above-mentioned existing deficiency, proposes a kind of block chain privacy number based on encryption attribute
According to access control method, to strengthen the protection to private data in block chain, at the same ensure different stage mandate supervision center and
User can be effectively accessed to the private data in block chain.
The technical scheme is that, application for registration is proposed from user to system, obtain with user identity information only
One corresponding identity ID and user attributes set Su;Authoritative center CA distributes private key according to user attributes information for which
SK;Counterparty A is carried out to the sensitive information that will be concluded the business using hierarchical attribute encryption technology when being traded with counterparty B
Encryption, to ensure that counterparty B and mandate supervision center at different levels can decrypting ciphertexts;In block chain, other unauthorized users do not have
Authority checks the Transaction Information of encryption, but the effectiveness of the checking information checking transaction that can pass through to add behind transaction ciphertext,
Implementation step includes as follows:
(1) initialize:
(1a) input system security parameter 1λ, generate first multiplication loop group G of the rank for prime number p0, the second multiplication loop group
G1With finite field Zp, randomly choose the first multiplication loop group G0Generation unit g, define bilinear map e:G0×G0→G1;
(1b) from finite field ZpMiddle choose N number of element as system property, constitute system property set S, according to attribute it
Between dependency by the Attribute transposition in S to n tree in, if i-th tree depth be li, define l=max { li}i∈[1,n]Represent
The depth capacity of n tree, i ∈ [1, n];
(1c) primary vector U=(u are randomly choosedθ)1≤θ≤lWith secondary vector U '=(u 'θ′)1≤θ′≤n, wherein, uθRepresent category
Property tree the corresponding open parameter of θ layers, uθ∈G0, u 'θ′Represent the corresponding open parameter of the θ ' attribute tree, u 'θ′∈G0;Fixed
JusticeFor finite field ZpIn coprime with the p element set,Middle selection two random number α and β of different sizes, calculate open
Parameter Y=e (g, g)α, generate systematic parameter PK and main private key MK:
PK=(G0,g,gβ, Y, U, U '),
MK=(α, β);
(2) identity registration:
(2a) user proposes application for registration to system, obtains identity ID corresponding with its true identity information and makes
User community set Su, and authoritative center CA is submitted to, wherein user includes that domestic consumer and supervision center, supervision center are obtained
Property rights of the property rights for taking higher than domestic consumer in its compass of competency,
(2b) authoritative center CA verifies the identity ID and user attributes set S of useruCorrectness, if just
Really, execution step (3), otherwise, terminate registration;
(3) key distribution:
(3a) authoritative center CA is to user attributes set SuIn j-th attribute aj, calculate its attribute private key dj, private key ginseng
Number DjWith rights parameters set D 'j;
(3b) authoritative center CA calculates the private key SK of the user:
Wherein, D=g(α+r)/βBe the user private key SK in part of key;
(3c) the private key SK of the user is sent to the secret preservation of the user by safe lane by authoritative center CA;
(4) encryption transaction private data:
(4a) counterparty A formulates access control policy P, and constructs access control knot by linear On Secret Sharing Schemes LSSS
Structure (M, ρ), wherein M are the generator matrixes of c rows d row, and ρ is that the element in set { 1,2 ..., δ ..., d } is mapped to ciphertext
The mapping of attribute in policy attribute collection L, ciphertext policy ABE collection L are the set of all properties in access control policy P;
(4b) random secret value is selectedGenerate d secret shadow { s of secret value sδ}δ∈[1,d], wherein, sδIt is secret
The δ secret shadow of close value s, δ ∈ [1, d];
(4c) for the individual attribute a of jth ' in ciphertext policy ABE collection Lj′, calculate its attribute ciphertext Cj′And policing parameter
C′j′;
(4d) counterparty A is input into transaction cleartext information m to be encrypted, and generates ciphertext E:
Wherein,Be comprising transaction cleartext information m part ciphertext, C=gβsIt is that the part comprising secret value s is close
Text;
(5) transaction data is uploaded:
(5a) counterparty A is signed to ciphertext E and additional identification information M ' by security signature algorithm Sig, will be generated
Preliminary signature file σAIssue counterparty B;
(5b) counterparty B receives preliminary signature file σA, ciphertext E therein is decrypted, after checking that Transaction Information is correct,
To preliminary signature file σASigned, generated final signature file σB, and broadcast to block chain;
(6) transaction is executed:
(6a) system selects the most best soon bookkeeper F of book keeping operation within a period of time;
(6b) data block comprising All Activity information in this period is broadcasted in block chain by bookkeeper F, block
In chain, each node can be verified to the Transaction Information in the data block, if Transaction Information is authentic and valid, just will
The block is added in block chain;
(6c) bookkeeper F is changed to the account balance of both parties A and B using additive homomorphism algorithm;
(7) ciphertext is accessed:
(7a) user or supervision center first verify that the property set of oneself before the particular content for checking certain Transaction Information
Close SuWhether access control policy P is met:
If being unsatisfactory for, decryption oprerations cannot be correctly executed;
If meeting, the sets of authorizations S ' for meeting access control policy P is selectedu, execution step (7b), wherein,
(7b) in sets of authorizations S 'uIn select and can cover ciphertext policy ABE aj′User attributes aj, wherein aj∈Su;
(7c) user attributes a is calculatedjDecrypted rights value d 'jAnd Bilinear map
(7d) the ciphertext E decryption to Transaction Information in block chain, obtains the cleartext information m that concludes the business.
The present invention compared with prior art, with advantages below:
First, the present invention is solved traditional due to being encrypted to the transaction private data in block chain using encryption technology
In publicly-owned block chain, all data disclose the privacy leakage problem that brings, it is achieved that the privacy to transaction sensitive information in block chain
Protection;
Second, the present invention is realized due to being combined with linear On Secret Sharing Schemes LSSS using hierarchical attribute encryption technology
Fine granularity hierarchical access control to ciphertext of concluding the business in block chain, as long as counterparty adds oneself in access control policy
Authority, so that it may so that the supervision center belonging to which has the authority for accessing the transaction ciphertext, using so as to avoid counterparty
The situation for deliberately not allowing supervision center to be checked during access control policy encrypted transaction message occurs.
Description of the drawings
Fig. 1 be the present invention realize general flow chart;
Fig. 2 is the sub-process figure of encryption transaction private data in the present invention.
Specific embodiment
The present invention will be further described below in conjunction with the accompanying drawings.
Referring to the drawings 1, the present invention realizes that step is as follows.
Step 1, initialization.
Input system security parameter 1λ, generate first multiplication loop group G of the rank for prime number p0, the second multiplication loop group G1With
Finite field Zp, randomly choose the first multiplication loop group G0Generation unit g, define bilinear map e:G0×G0→G1;
From finite field ZpMiddle choose N number of element as system property, constitute system property set S, according between attribute
During Attribute transposition in S to n is set by dependency, if the depth of i-th tree is li, define l=max { li}i∈[1,n]Represent n
The depth capacity of tree, i ∈ [1, n];
Random selection primary vector U=(uθ)1≤θ≤lWith secondary vector U '=(u 'θ′)1≤θ′≤n, wherein, uθRepresent attribute tree
The corresponding open parameter of θ layers, uθ∈G0, u 'θ′Represent the corresponding open parameter of the θ ' attribute tree, u 'θ′∈G0;Definition
For finite field ZpIn coprime with the p element set,Middle selection two random number α and β of different sizes, calculate open parameter
Y=e (g, g)α, generate systematic parameter PK and main private key MK:
PK=(G0,g,gβ, Y, U, U '),
MK=(α, β).
Step 2, identity registration.
User proposes application for registration to system, obtains identity ID corresponding with user true identity information and makes
User community set Su, and authoritative center CA is submitted to, whereinUser is included in domestic consumer and supervision at different levels
The heart, property rights of the property rights that supervision center is obtained higher than domestic consumer in its compass of competency;
Authoritative center CA verifies the identity ID and user attributes set S of useruCorrectness, if correctly, hold
Row step 3, otherwise, terminates registration.
Step 3, key are distributed.
(3a) user attributes set S is setuIn j-th user attributes ajI-th attribute tree is located at, its depth is h, its
Path is Rj=(aj0,aj1...,ajk,...,ajh), wherein, k ∈ [0, h], ajkIt is user attributes ajPath RjMiddle kth layer
Respective attributes, authoritative center CA selected for resisting the random number of collusion attackFor user attributes aj, select
Attribute random number rj∈Zp, and calculate its attribute private key dj, private key parameter DjWith rights parameters set D 'j:
Wherein, u 'iThe corresponding open parameter of i-th attribute tree of expression, ukIt is the open parameter of attribute tree kth layer,It is attribute tree h+1 layers to liThe open parameter of layer;
(3b) authoritative center CA calculates the private key SK of the user:
Wherein, D=g(α+r)/βBe the user private key SK in part of key.
(3c) the private key SK of the user is sent to the user by safe lane and is preserved by authoritative center CA.
Step 4, encryption transaction private data.
Referring to the drawings 2, this step is as follows:
(4a) counterparty A formulates access control policy P, constructs access control structure by linear On Secret Sharing Schemes LSSS
(M, ρ), wherein M are the generator matrixes of c rows d row, and ρ is that the element in set { 1,2 ..., δ ..., d } is mapped to ciphertext plan
The mapping of attribute in slightly property set L, ciphertext policy ABE collection L is the set of all properties in access control policy P;
(4b) random secret value is selectedFrom finite field ZpC-1 random number v of middle random selection2,...,vc, construction
Random vector v=(s, v2,...,vc)T, generate d secret shadow { s of secret value sδ}δ∈[1,d]:
sδ=MδV,
Wherein, MδIt is the δ rows of generator matrix M, δ ∈ [1, d], sδIt is and policy attribute aj′The δ of corresponding secret value s
Individual secret shadow;
(4c) the individual policy attribute a of jth ' in ciphertext policy ABE collection L is setj′The i-th ' attribute tree is located at, its depth is h ',
Its path is Rj′=(aj′0,aj′1,...,aj′k′,...,aj′h′), wherein, k ' ∈ [0, h '], aj′k′It is policy attribute aj′Road
Footpath Rj′The respective attributes of middle kth ' layer, for policy attribute aj′, its corresponding secret shadow s is selected according to mapping ρδ, and calculate
Its attribute ciphertext Cj′With policing parameter C 'j′:
Wherein, u 'i′The corresponding open parameter of the i-th ' attribute tree of expression, uk′It is the open parameter of attribute tree kth ' layer;
(4d) counterparty A is input into transaction cleartext information m to be encrypted, and generates ciphertext E:
Wherein,Be comprising transaction cleartext information m part ciphertext, C=gβsIt is that the part comprising secret value s is close
Text.
Step 5, uploads transaction data.
(5a) counterparty A is signed to ciphertext E and additional identification information M ' by security signature algorithm Sig:
Wherein, σAIt is the preliminary signature file after counterparty A signatures, additional identification information M ' contains the amount of money of bit coin
Quantity and source-information, sAIt is the signature private key of counterparty A, | | represent cascaded operational, IDAIt is the identity of counterparty A;
(5b) counterparty A is by preliminary signature file σACounterparty B is issued, counterparty B receives preliminary signature file σAAfterwards, right
Ciphertext E decryption therein, after checking that Transaction Information is correct, counterparty B runs signature algorithm Sig to preliminary signature file σA
Signed, generated final signature file σB:
Wherein, sBIt is the signature private key of counterparty B, IDBIt is the identity of counterparty B;
(5c) counterparty B is by final signature file σBBroadcast to block chain.
Step 6, executes transaction.
System selects the most best soon bookkeeper F of book keeping operation within a period of time;
Data block comprising All Activity information in this period is broadcasted in block chain by bookkeeper F, in block chain
Each node can be verified to the Transaction Information in the data block, if Transaction Information is authentic and valid, just by the area
Block is added in block chain;
Bookkeeper F is changed to the remaining sum of both parties A and B using additive homomorphism algorithm.
Step 7, accesses ciphertext.
(7a) user or supervision center first verify that the property set of oneself before the particular content for checking certain Transaction Information
Close SuWhether access control policy P is met:
If being unsatisfactory for, decryption oprerations cannot be correctly executed;
If meeting, the sets of authorizations S ' for meeting access control policy P is selectedu, wherein
(7b) in sets of authorizations S 'uIn select while meeting the energy overlay strategy attribute a of following 3 conditionsj′User
Attribute aj:
User attributes ajIn i-th attribute tree, policy attribute aj′In the i-th ' attribute tree, the two meets i=i ';
User attributes ajDepth h and policy attribute aj′Depth h ' between meet:h≤h′;
User attributes ajPath Rj=(aj0,aj1,...,ajk,...,ajh) and policy attribute aj′Path Rj′=
(aj′0,aj′1,...,aj′k′,...,aj′h′) between meet:As k=k ', ajk=aj′k′, wherein k ∈ [0, h], k ' ∈ [0,
h′];
(7c) for overlay strategy attribute aj′User attributes aj, calculate its decrypted rights value d 'jAnd Bilinear map
Wherein, djIt is attribute private key,It is rights parameters set D 'jIn element, represent user attributes
ajRights parameters, aj′,h+1,aj′,h+2,...,aj′h′It is ciphertext policy ABE aj′Path Rj′In h+1 layers to the h ' layers
Respective attributes, Cj′It is policy attribute aj′Attribute ciphertext, DjIt is policy attribute aj′Private key parameter, C 'j′It is policy attribute aj′'s
Policing parameter, u 'i′The corresponding open parameter of the i-th ' attribute tree of expression, uk′It is the open parameter of attribute tree kth ' layer, aj′k′It is
Policy attribute aj′Path Rj′The respective attributes of middle kth ' layer, k ' ∈ [0, h '];
(7d) ciphertext E of Transaction Information in block chain is decrypted, the transaction cleartext information m after being decrypted:
Wherein,It is the part ciphertext comprising transaction cleartext information m, C is the part ciphertext comprising secret value s, and D is to use
Part of key in person private key SK, λδFor gathering { λδ}δ∈IIn the δ parameter, λδ∈Zp, gather { λδ}δ∈IIt is according to LSSS schemes
The parameter sets that obtain of reconstruction nature, I={ δ:ρ(δ)∈S′u, ρ (δ) expression maps ρ and δ is mapped to Ciphertext policy category
Policy attribute a in property collection Lj′, sδIt is and policy attribute aj′The δ secret shadow of corresponding secret value s.
By above step, the ciphertext policy ABE encryption technology of layering is tied with linear On Secret Sharing Schemes LSSS phases
Close, and be applied in the process of exchange of block chain, it is achieved thereby that to the encipherment protection of transaction sensitive information in block chain and point
Layer access control.
Claims (9)
1. a kind of block chain private data access control method based on encryption attribute, comprises the steps:
(1) initialize:
(1a) input system security parameter 1λ, generate first multiplication loop group G of the rank for prime number p0, the second multiplication loop group G1With
Finite field Zp, randomly choose the first multiplication loop group G0Generation unit g, define bilinear map e:G0×G0→G1;
(1b) from finite field ZpMiddle choose N number of element as system property, constitute system property set S, according to the phase between attribute
During Attribute transposition in S to n is set by closing property, if the depth of i-th tree is li, define l=max { li}i∈[1,n]Represent n tree
Depth capacity, i ∈ [1, n];
(1c) primary vector U=(u are randomly choosedθ)1≤θ≤lWith secondary vector U '=(u 'θ′)1≤θ′≤n, wherein, uθRepresent attribute tree
The corresponding open parameter of θ layers, uθ∈G0, u 'θ′Represent the corresponding open parameter of the θ ' attribute tree, u 'θ′∈G0;Definition
For finite field ZpIn coprime with the p element set,Middle selection two random number α and β of different sizes, calculate open parameter
Y=e (g, g)α, generate systematic parameter PK and main private key MK:
PK=(G0,g,gβ, Y, U, U '),
MK=(α, β);
(2) identity registration:
(2a) user proposes application for registration to system, obtains identity ID corresponding with its true identity information and user
Community set Su, and authoritative center CA is submitted to, wherein user includes that domestic consumer and supervision center, supervision center are obtained
Property rights of the property rights higher than domestic consumer in its compass of competency,
(2b) authoritative center CA verifies the identity ID and user attributes set S of useruCorrectness, if correctly, execute
Step (3), otherwise, terminates registration;
(3) key distribution:
(3a) authoritative center CA is to user attributes set SuIn j-th attribute aj, calculate its attribute private key dj, private key parameter DjWith
Rights parameters set D 'j;
(3b) authoritative center CA calculates the private key SK of the user:
Wherein, D=g(α+r)/βBe the user private key SK in part of key;
(3c) the private key SK of the user is sent to the secret preservation of the user by safe lane by authoritative center CA;
(4) encryption transaction private data:
(4a) counterparty A formulates access control policy P, and constructs access control structure by linear On Secret Sharing Schemes LSSS
(M, ρ), wherein M are the generator matrixes of c rows d row, and ρ is that the element in set { 1,2 ..., δ ..., d } is mapped to Ciphertext policy
The mapping of attribute in property set L, ciphertext policy ABE collection L are the set of all properties in access control policy P;
(4b) random secret value is selectedGenerate d secret shadow { s of secret value sδ}δ∈[1,d], wherein, sδIt is secret value s
The δ secret shadow, δ ∈ [1, d];
(4c) for the individual attribute a of jth ' in ciphertext policy ABE collection Lj′, calculate its attribute ciphertext Cj′With policing parameter C 'j;
(4d) counterparty A is input into transaction cleartext information m to be encrypted, and generates ciphertext E:
Wherein,Be comprising transaction cleartext information m part ciphertext, C=gβsIt is the part ciphertext comprising secret value s;
(5) transaction data is uploaded:
(5a) counterparty A is signed to ciphertext E and additional identification information M ' by security signature algorithm Sig, first by generated
Step signature file σAIssue counterparty B;
(5b) counterparty B receives preliminary signature file σA, ciphertext E therein is decrypted, after checking that Transaction Information is correct, to first
Step signature file σASigned, generated final signature file σB, and broadcast to block chain;
(6) transaction is executed:
(6a) system selects the most best soon bookkeeper F of book keeping operation within a period of time;
(6b) data block comprising All Activity information in this period is broadcasted in block chain by bookkeeper F, in block chain
Each node can be verified to the Transaction Information in the data block, if Transaction Information is authentic and valid, just by the area
Block is added in block chain;
(6c) bookkeeper F is changed to the account balance of both parties A and B using additive homomorphism algorithm;
(7) ciphertext is accessed:
(7a) user or supervision center first verify that the community set S of oneself before the particular content for checking certain Transaction Informationu
Whether access control policy P is met:
If being unsatisfactory for, decryption oprerations cannot be correctly executed;
If meeting, the sets of authorizations S ' for meeting access control policy P is selectedu, execution step (7b), wherein,
(7b) in sets of authorizations S 'uIn select and can cover ciphertext policy ABE aj′User attributes aj, wherein aj∈Su;
(7c) user attributes a is calculatedjDecrypted rights value d 'jAnd Bilinear map
(7d) the ciphertext E decryption to Transaction Information in block chain, obtains the cleartext information m that concludes the business.
2. method according to claim 1, it is characterised in that computation attribute private key d in step (3a)j, private key parameter DjWith
Property rights parameter sets D 'j, calculate according to equation below:
Wherein, g is the first multiplication loop group G0Generation unit, r is the random number for resisting collusion attack,u′iRepresent
The corresponding open parameter of i-th attribute tree, h is user attributes ajDepth in attribute tree, ukIt is the public affairs of attribute tree kth layer
Open parameter, ajkIt is user attributes ajPath Rj=(aj0,aj1…,ajk,…,ajh) in kth layer respective attributes, k ∈ [0,
H], rjIt is attribute random number, rj∈Zp,It is attribute tree h+1 layers to liThe open parameter of layer.
3. method according to claim 1, it is characterised in that calculate d secret shadow of secret value s in step (4b)
{sδ}δ∈[1,d], calculate according to equation below:
sδ=MδV,
Wherein, sδIt is and policy attribute aj′The δ secret shadow of corresponding secret value s, MδIt is the δ rows of generator matrix M, δ ∈
[1, d], random vector v=(s, v2,…,vc)T, s is randomly selected secret value, v2,…,vcIt is from finite field ZpIn select at random
The c-1 random number that selects.
4. method according to claim 1, it is characterised in that computation attribute ciphertext C in step (4c)j′And policing parameter
C′j′, calculate according to equation below:
Wherein, u 'i′The corresponding open parameter of the i-th ' attribute tree of expression, h ' is policy attribute aj′Depth in attribute tree, uk′
It is the open parameter of attribute tree kth ' layer, aj′k′It is policy attribute aj′Path Rj′=(aj′0,aj′1,…,aj′k′,...,aj′h′)
The respective attributes of middle kth ' layer, k ' ∈ [0, h '], g are the first multiplication loop group G0Generation unit, sδIt is and policy attribute aj′Right
The δ secret shadow of secret value s that answers, δ ∈ [1, d].
5. method according to claim 1, it is characterised in that the counterparty A in step (5a) passes through security signature algorithm
Sig signs to ciphertext E and additional identification information M ', carries out according to equation below:
Wherein, σAIt is the preliminary signature file after counterparty A signatures, additional identification information M ' contains the dollar amount of bit coin
And source-information, sAIt is the signature private key of counterparty A, | | represent cascaded operational, IDAIt is the identity of counterparty A.
6. method according to claim 1, it is characterised in that to preliminary signature file σ in step (5b)ASigned, pressed
Carry out according to equation below:
Wherein, σBBe counterparty B generate final signature file, sBIt is the signature private key of counterparty B, IDAIt is the body of counterparty A
Part mark, IDBIt is the identity of counterparty B, | | represent cascaded operational.
7. method according to claim 1, it is characterised in that in sets of authorizations S in step (7b)u' in select and can cover plan
Slightly attribute aj′User attributes aj, following condition need to be met simultaneously:#
User attributes ajIn i-th attribute tree, policy attribute aj′In the i-th ' attribute tree, meet therebetween:I=
i′;
User attributes ajDepth h and policy attribute aj′Depth h ' between meet:h≤h′;
User attributes ajPath Rj=(aj0,aj1,…,ajk,…,ajh) and policy attribute aj′Path Rj′=(aj′0,
aj′1,…,aj′k′,...,aj′h′) between meet:As k=k ', ajk=aj′k′, wherein k ∈ [0, h], k ' ∈ [0, h '].
8. method according to claim 1, it is characterised in that calculate decrypted rights value d ' in step (7c)jAnd Bilinear map
Ajδ, it is calculated as follows:
Wherein, djIt is attribute private key,It is rights parameters set D 'jIn element, represent user attributes aj's
Rights parameters, aj′,h+1,aj′,h+2,...,aj′h′It is ciphertext policy ABE aj′Path Rj′=(aj′0,aj′1,…,aj′k′,...,
aj′h′) in h+1 layers to the h ' layers respective attributes, rjIt is random number, rj∈Zp, Cj′It is policy attribute aj′Attribute ciphertext, Dj
It is policy attribute aj′Private key parameter, C 'j′It is policy attribute aj′Policing parameter, sδIt is and policy attribute aj′Corresponding secret
The δ secret shadow of value s.
9. method according to claim 1, it is characterised in that ciphertext E in step (7d) to Transaction Information in block chain
Decryption, is calculated as follows:
Wherein, m is the transaction cleartext information after decryption,It is the part ciphertext comprising transaction cleartext information m, C is comprising secret value
The part ciphertext of s, D is the part of key in user private key SK, λδFor gathering { λδ}δ∈IIn the δ parameter, λδ∈Zp, set
{λδ}δ∈IIt is the parameter sets obtained according to the reconstruction nature of LSSS schemes, I={ δ:ρ(δ)∈S′u, ρ (δ) is represented with mapping ρ
δ is mapped to the policy attribute a in ciphertext policy ABE collection Lj′.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610948544.XA CN106503994B (en) | 2016-11-02 | 2016-11-02 | Block chain private data access control method based on attribute encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610948544.XA CN106503994B (en) | 2016-11-02 | 2016-11-02 | Block chain private data access control method based on attribute encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106503994A true CN106503994A (en) | 2017-03-15 |
CN106503994B CN106503994B (en) | 2020-07-28 |
Family
ID=58322104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610948544.XA Active CN106503994B (en) | 2016-11-02 | 2016-11-02 | Block chain private data access control method based on attribute encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106503994B (en) |
Cited By (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106992990A (en) * | 2017-05-19 | 2017-07-28 | 北京牛链科技有限公司 | Data sharing method and system and block catenary system and computing device |
CN107085807A (en) * | 2017-04-19 | 2017-08-22 | 迅鳐成都科技有限公司 | A kind of data assets method of commerce based on block chain |
CN107135209A (en) * | 2017-04-21 | 2017-09-05 | 天津理工大学 | A kind of data sharing method based on block chain |
CN107148037A (en) * | 2017-07-18 | 2017-09-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of system of selection, terminal and the server of the small base station of terminated |
CN107240056A (en) * | 2017-05-08 | 2017-10-10 | 暨南大学 | A kind of love and marriage register method based on block chain technology |
CN107248994A (en) * | 2017-06-26 | 2017-10-13 | 联动优势科技有限公司 | A kind of method for sending information, processing method and processing device |
CN107294963A (en) * | 2017-06-14 | 2017-10-24 | 广东工业大学 | A kind of safe encryption method and device of the data based on alliance's block chain |
CN107358424A (en) * | 2017-06-26 | 2017-11-17 | 中国人民银行数字货币研究所 | A kind of method of commerce and device based on digital cash |
CN107451485A (en) * | 2017-06-02 | 2017-12-08 | 阿里巴巴集团控股有限公司 | A kind of data processing method and equipment based on block chain |
CN107481146A (en) * | 2017-10-13 | 2017-12-15 | 深圳市招股科技有限公司 | One kind is based on the safe and efficient financial trade method of block chain |
CN107483198A (en) * | 2017-09-25 | 2017-12-15 | 中国科学院信息工程研究所 | A kind of block catenary system supervised and method |
CN107682364A (en) * | 2017-11-03 | 2018-02-09 | 杭州秘猿科技有限公司 | One kind license chain privacy method of commerce |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN108063754A (en) * | 2017-11-10 | 2018-05-22 | 西安电子科技大学 | Towards the attribute base encryption method of wearable health monitoring equipment anonymization data |
CN108123936A (en) * | 2017-12-13 | 2018-06-05 | 北京科技大学 | A kind of access control method and system based on block chain technology |
CN108171494A (en) * | 2017-11-23 | 2018-06-15 | 阿里巴巴集团控股有限公司 | A kind of data processing method and device |
CN108269398A (en) * | 2017-12-27 | 2018-07-10 | 深圳市元征软件开发有限公司 | A kind of recording method of highway traffic data and mobile unit |
CN108289129A (en) * | 2018-02-26 | 2018-07-17 | 深圳智乾区块链科技有限公司 | Block chain ecological environment creation method, system and computer readable storage medium |
CN108304478A (en) * | 2017-12-28 | 2018-07-20 | 深圳市轱辘车联数据技术有限公司 | A kind of data processing method and server |
CN108320143A (en) * | 2018-02-05 | 2018-07-24 | 中国地质大学(武汉) | A kind of guard method of password currency private key |
CN108335106A (en) * | 2018-01-24 | 2018-07-27 | 深圳壹账通智能科技有限公司 | The more account books of Zero Knowledge based on block chain exchange transfer account method, device and storage medium |
CN108364223A (en) * | 2017-12-29 | 2018-08-03 | 阿里巴巴集团控股有限公司 | A kind of method and device of Data Audit |
CN108418689A (en) * | 2017-11-30 | 2018-08-17 | 矩阵元技术(深圳)有限公司 | A kind of the zero-knowledge proof method and medium of suitable block chain secret protection |
CN108462568A (en) * | 2018-02-11 | 2018-08-28 | 西安电子科技大学 | A kind of secure file storage and sharing method based on block chain |
CN108537498A (en) * | 2018-03-15 | 2018-09-14 | 上海卓辰信息科技有限公司 | Interorganizational project management method, system, equipment and medium based on block chain |
CN108614974A (en) * | 2018-04-24 | 2018-10-02 | 南京邮电大学 | It is a kind of based on the express delivery information privacy protection system of block chain and its guard method |
CN108632292A (en) * | 2018-05-16 | 2018-10-09 | 苏宁易购集团股份有限公司 | Data sharing method based on alliance's chain and system |
CN108632480A (en) * | 2018-04-19 | 2018-10-09 | 北京阿尔山金融科技有限公司 | Charging method based on block chain and device |
CN108712380A (en) * | 2018-04-12 | 2018-10-26 | 三维通信股份有限公司 | A kind of mixing identity identifying method based on strategy |
CN108768988A (en) * | 2018-05-17 | 2018-11-06 | 深圳前海微众银行股份有限公司 | Block chain access control method, equipment and computer readable storage medium |
CN108805585A (en) * | 2018-05-28 | 2018-11-13 | 广州中国科学院软件应用技术研究所 | Distributed commodity data storage system, circulation and source tracing method based on block chain |
CN108875407A (en) * | 2018-06-12 | 2018-11-23 | 东方银谷(北京)投资管理有限公司 | For the sensitive information processing method and processing device of financial business, client, data framework |
CN108898475A (en) * | 2018-05-08 | 2018-11-27 | 众安信息技术服务有限公司 | Alliance's block chain based on encryption attribute realizes credit methods and system |
CN109145647A (en) * | 2018-09-05 | 2019-01-04 | 武汉笑脸科技有限公司 | A kind of trusted identity verifying system and method based on block chain |
CN109214160A (en) * | 2018-09-14 | 2019-01-15 | 温州科技职业学院 | A kind of computer network authentication system and method, computer program |
CN109241055A (en) * | 2018-08-09 | 2019-01-18 | 上海常仁信息科技有限公司 | A kind of block chain data-storage system |
CN109274481A (en) * | 2018-08-01 | 2019-01-25 | 中国科学院数据与通信保护研究教育中心 | A kind of traceable method of data of block chain |
CN109271769A (en) * | 2018-08-24 | 2019-01-25 | 广东博云公共平台网络科技有限公司 | A kind of Subscriber Management System and user management method |
CN109325370A (en) * | 2018-08-09 | 2019-02-12 | 上海常仁信息科技有限公司 | A kind of block chain access robot node device |
CN109447634A (en) * | 2018-10-09 | 2019-03-08 | 北京网录科技有限公司 | A kind of code key update method and block chain account management method using this method of locking an account |
CN109493042A (en) * | 2018-10-24 | 2019-03-19 | 南京邮电大学 | A kind of intelligent contract possessing access control function is credible to deposit card method and system |
CN109559117A (en) * | 2018-11-14 | 2019-04-02 | 北京科技大学 | Block chain contract method for secret protection and system based on the encryption of attribute base |
CN109583885A (en) * | 2017-09-01 | 2019-04-05 | 埃森哲环球解决方案有限公司 | Bout controls rewritable block chain |
CN109598149A (en) * | 2018-11-20 | 2019-04-09 | 阿里巴巴集团控股有限公司 | The method and apparatus of business processing |
CN109687958A (en) * | 2018-12-28 | 2019-04-26 | 全链通有限公司 | A kind of design of art work certificate and verification method based on fidelity block chain |
CN109711184A (en) * | 2018-12-28 | 2019-05-03 | 国网电子商务有限公司 | Block chain data access control method and device based on attribute encryption |
CN109979550A (en) * | 2019-02-14 | 2019-07-05 | 中国科学院信息工程研究所 | A kind of block chain medical data management method and system based on distributed nature signature |
CN110266687A (en) * | 2019-06-21 | 2019-09-20 | 杭州云象网络技术有限公司 | A kind of Internet of Things TSM Security Agent data sharing modularity using block chain technology |
CN110414961A (en) * | 2019-06-21 | 2019-11-05 | 深圳壹账通智能科技有限公司 | Prevent transfer account method, device, equipment and the storage medium of the track transactions side of producing |
CN110458554A (en) * | 2019-03-31 | 2019-11-15 | 西安电子科技大学 | The data fast transaction method of identity-based on block chain |
CN110493347A (en) * | 2019-08-26 | 2019-11-22 | 重庆邮电大学 | Data access control method and system in large-scale cloud storage based on block chain |
CN110599163A (en) * | 2019-08-20 | 2019-12-20 | 江苏大学 | Transaction record outsourcing method facing block chain transaction supervision |
CN110647756A (en) * | 2019-08-05 | 2020-01-03 | 广东工业大学 | Online examination management system based on block chain and CP-ABE and application method thereof |
WO2019101232A3 (en) * | 2019-03-04 | 2020-01-09 | Alibaba Group Holding Limited | Methods and devices for providing transaction data to blockchain system for processing |
WO2020010490A1 (en) * | 2018-07-09 | 2020-01-16 | 彭英均 | Method for arbitration-less resolution of accuracy and validity of transaction data recorded in blockchain |
CN110719176A (en) * | 2019-10-22 | 2020-01-21 | 黑龙江工业学院 | Logistics privacy protection method and system based on block chain and readable storage medium |
CN110740033A (en) * | 2019-08-19 | 2020-01-31 | 杭州云象网络技术有限公司 | block chain multi-party data sharing method based on secret sharing technology |
WO2020037654A1 (en) * | 2018-08-24 | 2020-02-27 | 区链通网络有限公司 | Blockchain data protection method, device and system, and computer-readable storage medium |
CN110915183A (en) * | 2017-07-26 | 2020-03-24 | 国际商业机器公司 | Block chain authentication via hard/soft token validation |
CN110999211A (en) * | 2017-08-03 | 2020-04-10 | 区块链控股有限公司 | System and method for communicating, storing and processing data provided by entities over a blockchain network |
CN111008201A (en) * | 2020-03-09 | 2020-04-14 | 支付宝(杭州)信息技术有限公司 | Method and apparatus for parallel modification and reading of state trees |
CN111030821A (en) * | 2019-08-27 | 2020-04-17 | 杭州云象网络技术有限公司 | Alliance chain encryption method based on bilinear mapping technology |
CN111046427A (en) * | 2019-12-13 | 2020-04-21 | 北京启迪区块链科技发展有限公司 | Block chain-based data access control method, device, equipment and medium |
CN111079170A (en) * | 2019-11-04 | 2020-04-28 | 湖南源科创新科技有限公司 | Control method and control device of solid state disk |
CN111130757A (en) * | 2019-12-31 | 2020-05-08 | 华中科技大学 | Multi-cloud CP-ABE access control method based on block chain |
CN111314369A (en) * | 2020-02-27 | 2020-06-19 | 苏州市星际云通区块链科技有限公司 | Resource sharing block chain network |
CN111371561A (en) * | 2020-02-27 | 2020-07-03 | 华信咨询设计研究院有限公司 | Alliance block chain data access control method based on CP-ABE algorithm |
CN111614678A (en) * | 2020-05-22 | 2020-09-01 | 中国联合网络通信集团有限公司 | Anti-disclosure method, anti-disclosure device and encryption device |
CN111625869A (en) * | 2020-04-23 | 2020-09-04 | 腾讯科技(深圳)有限公司 | Data processing method and data processing device |
CN111681002A (en) * | 2020-06-10 | 2020-09-18 | 浙江工商大学 | Fair data transaction method and system based on block chain |
CN111709053A (en) * | 2020-06-11 | 2020-09-25 | 中国工商银行股份有限公司 | Operation method and operation device based on loose coupling transaction network |
CN111819817A (en) * | 2018-03-08 | 2020-10-23 | 区块链控股有限公司 | Method and system for block chain implementation for bilinear mapping accumulator-based authorization |
CN111819815A (en) * | 2018-03-02 | 2020-10-23 | 区块链控股有限公司 | Computer-implemented method and system for transferring control of digital assets |
CN111859444A (en) * | 2020-06-12 | 2020-10-30 | 中国科学院信息工程研究所 | Block chain data supervision method and system based on attribute encryption |
CN111901302A (en) * | 2020-06-28 | 2020-11-06 | 石家庄铁道大学 | Medical information attribute encryption access control method based on block chain |
CN111954999A (en) * | 2018-03-06 | 2020-11-17 | 阿梅里科普投资有限责任公司 | Customized views of restricted information recorded into blockchains |
CN111986755A (en) * | 2020-08-24 | 2020-11-24 | 中国人民解放军战略支援部队信息工程大学 | Data sharing system based on block chain and attribute-based encryption |
CN112039880A (en) * | 2020-08-30 | 2020-12-04 | 河南大学 | Block chain distributed outsourcing-based dual-policy access control method |
CN112152778A (en) * | 2020-09-22 | 2020-12-29 | 腾讯科技(深圳)有限公司 | Node management method and device and electronic equipment |
CN112165472A (en) * | 2020-09-22 | 2021-01-01 | 郑州轻工业大学 | Internet of things data security sharing method based on privacy protection |
CN112204920A (en) * | 2018-04-05 | 2021-01-08 | 区块链控股有限公司 | Computer-implemented method and system for transferring access to digital assets |
CN112365945A (en) * | 2020-10-27 | 2021-02-12 | 扬州大学 | Block chain-based electronic medical record fine-grained access control and ciphertext searchable method |
TWI719435B (en) * | 2018-06-29 | 2021-02-21 | 開曼群島商創新先進技術有限公司 | Input obtaining method and device for safe multi-party calculation agreement |
CN112438035A (en) * | 2018-07-19 | 2021-03-02 | 区块链控股有限公司 | Computer-implemented system and method for controlling processing steps of a distributed system |
CN112532588A (en) * | 2020-11-06 | 2021-03-19 | 北京工业大学 | Policy hidden type data access control method based on block chain |
WO2021081803A1 (en) * | 2019-10-30 | 2021-05-06 | 深圳市网心科技有限公司 | Blockchain system, supervision method, system, device, and computer storage medium |
CN112989378A (en) * | 2021-03-12 | 2021-06-18 | 北京航空航天大学 | File trusted intermediate storage architecture based on attribute encryption |
CN113127926A (en) * | 2021-03-12 | 2021-07-16 | 西安电子科技大学 | Method, system, storage medium and computer for analyzing statistical relevance of private data |
CN113127927A (en) * | 2021-04-27 | 2021-07-16 | 泰山学院 | Attribute reconstruction encryption method and system for license chain data sharing and supervision |
CN113393238A (en) * | 2021-06-16 | 2021-09-14 | 福建师范大学 | Intelligent contract model for protecting privacy and implementation method thereof |
CN113489733A (en) * | 2021-07-13 | 2021-10-08 | 郑州轻工业大学 | Block chain-based content center network privacy protection method |
CN113572790A (en) * | 2021-09-18 | 2021-10-29 | 深圳时空云科技有限公司 | Distributed processing method and device for private information |
US11316668B2 (en) | 2018-11-16 | 2022-04-26 | Safetech Bv | Methods and systems for cryptographic private key management for secure multiparty storage and transfer of information |
CN114528601A (en) * | 2022-04-25 | 2022-05-24 | 中国工商银行股份有限公司 | Access method and device based on block chain data, processor and electronic equipment |
CN114640468A (en) * | 2022-03-16 | 2022-06-17 | 安顺职业技术学院 | Block chain privacy protection method based on online and offline attribute encryption |
CN114978744A (en) * | 2022-06-08 | 2022-08-30 | 廖鼎 | Security and protection information transmission method and system based on block chain |
CN116052832A (en) * | 2023-04-03 | 2023-05-02 | 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) | Tamper-proof transmission method based on medical information |
CN116260662A (en) * | 2023-05-15 | 2023-06-13 | 成都信息工程大学 | Tracing storage method, tracing storage system and tracing system |
US11689539B2 (en) | 2018-03-06 | 2023-06-27 | Americorp Investments Llc | Blockchain-based commercial inventory systems and methods |
US11700265B2 (en) | 2018-03-06 | 2023-07-11 | Americorp Investments Llc | Customized view of restricted information recorded into a blockchain |
CN116720839A (en) * | 2023-08-07 | 2023-09-08 | 成都创一博通科技有限公司 | Financial information management method based on blockchain technology and supervision system thereof |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120144210A1 (en) * | 2010-12-03 | 2012-06-07 | Yacov Yacobi | Attribute-based access-controlled data-storage system |
CN105406967A (en) * | 2015-12-10 | 2016-03-16 | 西安电子科技大学 | Hierarchical attribute encryption method |
CN105915333A (en) * | 2016-03-15 | 2016-08-31 | 南京邮电大学 | High-efficiency secret key distribution method based on attribute encryption |
CN105933345A (en) * | 2016-06-28 | 2016-09-07 | 电子科技大学 | Verifiable outsourcing attribute-based encryption method based on linear secret sharing |
-
2016
- 2016-11-02 CN CN201610948544.XA patent/CN106503994B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120144210A1 (en) * | 2010-12-03 | 2012-06-07 | Yacov Yacobi | Attribute-based access-controlled data-storage system |
CN105406967A (en) * | 2015-12-10 | 2016-03-16 | 西安电子科技大学 | Hierarchical attribute encryption method |
CN105915333A (en) * | 2016-03-15 | 2016-08-31 | 南京邮电大学 | High-efficiency secret key distribution method based on attribute encryption |
CN105933345A (en) * | 2016-06-28 | 2016-09-07 | 电子科技大学 | Verifiable outsourcing attribute-based encryption method based on linear secret sharing |
Cited By (153)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107085807A (en) * | 2017-04-19 | 2017-08-22 | 迅鳐成都科技有限公司 | A kind of data assets method of commerce based on block chain |
CN107135209B (en) * | 2017-04-21 | 2019-07-16 | 天津理工大学 | A kind of data sharing method based on block chain |
CN107135209A (en) * | 2017-04-21 | 2017-09-05 | 天津理工大学 | A kind of data sharing method based on block chain |
CN107240056A (en) * | 2017-05-08 | 2017-10-10 | 暨南大学 | A kind of love and marriage register method based on block chain technology |
CN106992990A (en) * | 2017-05-19 | 2017-07-28 | 北京牛链科技有限公司 | Data sharing method and system and block catenary system and computing device |
CN107451485A (en) * | 2017-06-02 | 2017-12-08 | 阿里巴巴集团控股有限公司 | A kind of data processing method and equipment based on block chain |
CN107294963A (en) * | 2017-06-14 | 2017-10-24 | 广东工业大学 | A kind of safe encryption method and device of the data based on alliance's block chain |
CN107294963B (en) * | 2017-06-14 | 2019-09-06 | 广东工业大学 | A kind of safe encryption method and device of the data based on alliance's block chain |
CN107358424A (en) * | 2017-06-26 | 2017-11-17 | 中国人民银行数字货币研究所 | A kind of method of commerce and device based on digital cash |
CN107358424B (en) * | 2017-06-26 | 2020-09-29 | 中国人民银行数字货币研究所 | Transaction method and device based on digital currency |
CN107248994A (en) * | 2017-06-26 | 2017-10-13 | 联动优势科技有限公司 | A kind of method for sending information, processing method and processing device |
CN107148037A (en) * | 2017-07-18 | 2017-09-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of system of selection, terminal and the server of the small base station of terminated |
CN110915183A (en) * | 2017-07-26 | 2020-03-24 | 国际商业机器公司 | Block chain authentication via hard/soft token validation |
CN110915183B (en) * | 2017-07-26 | 2022-03-22 | 国际商业机器公司 | Block chain authentication via hard/soft token validation |
CN110999211A (en) * | 2017-08-03 | 2020-04-10 | 区块链控股有限公司 | System and method for communicating, storing and processing data provided by entities over a blockchain network |
CN109583885A (en) * | 2017-09-01 | 2019-04-05 | 埃森哲环球解决方案有限公司 | Bout controls rewritable block chain |
CN109583885B (en) * | 2017-09-01 | 2023-03-17 | 埃森哲环球解决方案有限公司 | Round control of rewritable block chains |
CN107483198A (en) * | 2017-09-25 | 2017-12-15 | 中国科学院信息工程研究所 | A kind of block catenary system supervised and method |
CN107481146A (en) * | 2017-10-13 | 2017-12-15 | 深圳市招股科技有限公司 | One kind is based on the safe and efficient financial trade method of block chain |
CN107911216B (en) * | 2017-10-26 | 2020-07-14 | 矩阵元技术(深圳)有限公司 | Block chain transaction privacy protection method and system |
WO2019080933A1 (en) * | 2017-10-26 | 2019-05-02 | 云图有限公司 | Block chain transaction privacy protection method and system |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN107682364B (en) * | 2017-11-03 | 2019-12-03 | 杭州秘猿科技有限公司 | A kind of license chain privacy method of commerce |
CN107682364A (en) * | 2017-11-03 | 2018-02-09 | 杭州秘猿科技有限公司 | One kind license chain privacy method of commerce |
CN108063754B (en) * | 2017-11-10 | 2020-11-13 | 西安电子科技大学 | Attribute-based encryption method for anonymized data of wearable health monitoring equipment |
CN108063754A (en) * | 2017-11-10 | 2018-05-22 | 西安电子科技大学 | Towards the attribute base encryption method of wearable health monitoring equipment anonymization data |
US11108786B2 (en) | 2017-11-23 | 2021-08-31 | Advanced New Technologies Co., Ltd. | Data processing method and apparatus |
US10931684B2 (en) | 2017-11-23 | 2021-02-23 | Advanced New Technologies Co., Ltd. | Data processing method and apparatus |
CN108171494A (en) * | 2017-11-23 | 2018-06-15 | 阿里巴巴集团控股有限公司 | A kind of data processing method and device |
WO2019100864A1 (en) * | 2017-11-23 | 2019-05-31 | 阿里巴巴集团控股有限公司 | Data processing method and apparatus |
TWI684892B (en) * | 2017-11-23 | 2020-02-11 | 香港商阿里巴巴集團服務有限公司 | Data processing method and device |
CN108418689A (en) * | 2017-11-30 | 2018-08-17 | 矩阵元技术(深圳)有限公司 | A kind of the zero-knowledge proof method and medium of suitable block chain secret protection |
CN108123936B (en) * | 2017-12-13 | 2021-04-13 | 北京科技大学 | Access control method and system based on block chain technology |
CN108123936A (en) * | 2017-12-13 | 2018-06-05 | 北京科技大学 | A kind of access control method and system based on block chain technology |
WO2019128028A1 (en) * | 2017-12-27 | 2019-07-04 | 深圳市元征软件开发有限公司 | Road traffic data recording method and vehicle-mounted device |
CN108269398A (en) * | 2017-12-27 | 2018-07-10 | 深圳市元征软件开发有限公司 | A kind of recording method of highway traffic data and mobile unit |
CN108304478A (en) * | 2017-12-28 | 2018-07-20 | 深圳市轱辘车联数据技术有限公司 | A kind of data processing method and server |
US11295381B2 (en) | 2017-12-29 | 2022-04-05 | Advanced New Technologies Co., Ltd. | Data auditing method and device |
CN108364223B (en) * | 2017-12-29 | 2021-01-26 | 创新先进技术有限公司 | Data auditing method and device |
CN108364223A (en) * | 2017-12-29 | 2018-08-03 | 阿里巴巴集团控股有限公司 | A kind of method and device of Data Audit |
CN108335106A (en) * | 2018-01-24 | 2018-07-27 | 深圳壹账通智能科技有限公司 | The more account books of Zero Knowledge based on block chain exchange transfer account method, device and storage medium |
CN108320143A (en) * | 2018-02-05 | 2018-07-24 | 中国地质大学(武汉) | A kind of guard method of password currency private key |
CN108320143B (en) * | 2018-02-05 | 2022-03-11 | 中国地质大学(武汉) | Method for protecting cipher currency private key |
CN108462568A (en) * | 2018-02-11 | 2018-08-28 | 西安电子科技大学 | A kind of secure file storage and sharing method based on block chain |
CN108289129A (en) * | 2018-02-26 | 2018-07-17 | 深圳智乾区块链科技有限公司 | Block chain ecological environment creation method, system and computer readable storage medium |
CN111819815A (en) * | 2018-03-02 | 2020-10-23 | 区块链控股有限公司 | Computer-implemented method and system for transferring control of digital assets |
US11706228B2 (en) | 2018-03-06 | 2023-07-18 | Americorp Investments Llc | Customized view of restricted information recorded into a blockchain |
US11689539B2 (en) | 2018-03-06 | 2023-06-27 | Americorp Investments Llc | Blockchain-based commercial inventory systems and methods |
CN111954999A (en) * | 2018-03-06 | 2020-11-17 | 阿梅里科普投资有限责任公司 | Customized views of restricted information recorded into blockchains |
US11700265B2 (en) | 2018-03-06 | 2023-07-11 | Americorp Investments Llc | Customized view of restricted information recorded into a blockchain |
CN111819817A (en) * | 2018-03-08 | 2020-10-23 | 区块链控股有限公司 | Method and system for block chain implementation for bilinear mapping accumulator-based authorization |
CN108537498A (en) * | 2018-03-15 | 2018-09-14 | 上海卓辰信息科技有限公司 | Interorganizational project management method, system, equipment and medium based on block chain |
CN112204920A (en) * | 2018-04-05 | 2021-01-08 | 区块链控股有限公司 | Computer-implemented method and system for transferring access to digital assets |
CN108712380A (en) * | 2018-04-12 | 2018-10-26 | 三维通信股份有限公司 | A kind of mixing identity identifying method based on strategy |
CN108632480A (en) * | 2018-04-19 | 2018-10-09 | 北京阿尔山金融科技有限公司 | Charging method based on block chain and device |
CN108614974A (en) * | 2018-04-24 | 2018-10-02 | 南京邮电大学 | It is a kind of based on the express delivery information privacy protection system of block chain and its guard method |
CN108614974B (en) * | 2018-04-24 | 2021-06-01 | 南京邮电大学 | Express information privacy protection system based on block chain and protection method thereof |
CN108898475A (en) * | 2018-05-08 | 2018-11-27 | 众安信息技术服务有限公司 | Alliance's block chain based on encryption attribute realizes credit methods and system |
CN108632292B (en) * | 2018-05-16 | 2020-11-17 | 苏宁易购集团股份有限公司 | Data sharing method and system based on alliance chain |
CN108632292A (en) * | 2018-05-16 | 2018-10-09 | 苏宁易购集团股份有限公司 | Data sharing method based on alliance's chain and system |
CN108768988B (en) * | 2018-05-17 | 2021-01-05 | 深圳前海微众银行股份有限公司 | Block chain access control method, block chain access control equipment and computer readable storage medium |
CN108768988A (en) * | 2018-05-17 | 2018-11-06 | 深圳前海微众银行股份有限公司 | Block chain access control method, equipment and computer readable storage medium |
CN108805585B (en) * | 2018-05-28 | 2022-07-05 | 广州中科易德科技有限公司 | Distributed commodity data storage system based on block chain, circulation and tracing method |
CN108805585A (en) * | 2018-05-28 | 2018-11-13 | 广州中国科学院软件应用技术研究所 | Distributed commodity data storage system, circulation and source tracing method based on block chain |
CN108875407A (en) * | 2018-06-12 | 2018-11-23 | 东方银谷(北京)投资管理有限公司 | For the sensitive information processing method and processing device of financial business, client, data framework |
TWI719435B (en) * | 2018-06-29 | 2021-02-21 | 開曼群島商創新先進技術有限公司 | Input obtaining method and device for safe multi-party calculation agreement |
WO2020010490A1 (en) * | 2018-07-09 | 2020-01-16 | 彭英均 | Method for arbitration-less resolution of accuracy and validity of transaction data recorded in blockchain |
CN112438035A (en) * | 2018-07-19 | 2021-03-02 | 区块链控股有限公司 | Computer-implemented system and method for controlling processing steps of a distributed system |
CN109274481A (en) * | 2018-08-01 | 2019-01-25 | 中国科学院数据与通信保护研究教育中心 | A kind of traceable method of data of block chain |
CN109274481B (en) * | 2018-08-01 | 2020-03-27 | 中国科学院数据与通信保护研究教育中心 | Data traceable method of block chain |
CN109241055A (en) * | 2018-08-09 | 2019-01-18 | 上海常仁信息科技有限公司 | A kind of block chain data-storage system |
CN109325370A (en) * | 2018-08-09 | 2019-02-12 | 上海常仁信息科技有限公司 | A kind of block chain access robot node device |
WO2020037654A1 (en) * | 2018-08-24 | 2020-02-27 | 区链通网络有限公司 | Blockchain data protection method, device and system, and computer-readable storage medium |
CN109271769A (en) * | 2018-08-24 | 2019-01-25 | 广东博云公共平台网络科技有限公司 | A kind of Subscriber Management System and user management method |
CN109145647A (en) * | 2018-09-05 | 2019-01-04 | 武汉笑脸科技有限公司 | A kind of trusted identity verifying system and method based on block chain |
CN109214160A (en) * | 2018-09-14 | 2019-01-15 | 温州科技职业学院 | A kind of computer network authentication system and method, computer program |
CN109447634A (en) * | 2018-10-09 | 2019-03-08 | 北京网录科技有限公司 | A kind of code key update method and block chain account management method using this method of locking an account |
CN109493042A (en) * | 2018-10-24 | 2019-03-19 | 南京邮电大学 | A kind of intelligent contract possessing access control function is credible to deposit card method and system |
CN109559117B (en) * | 2018-11-14 | 2022-05-20 | 北京科技大学 | Block linkage contract privacy protection method and system based on attribute-based encryption |
CN109559117A (en) * | 2018-11-14 | 2019-04-02 | 北京科技大学 | Block chain contract method for secret protection and system based on the encryption of attribute base |
US11316668B2 (en) | 2018-11-16 | 2022-04-26 | Safetech Bv | Methods and systems for cryptographic private key management for secure multiparty storage and transfer of information |
CN109598149A (en) * | 2018-11-20 | 2019-04-09 | 阿里巴巴集团控股有限公司 | The method and apparatus of business processing |
CN109598149B (en) * | 2018-11-20 | 2020-04-07 | 阿里巴巴集团控股有限公司 | Service processing method and device |
CN109711184A (en) * | 2018-12-28 | 2019-05-03 | 国网电子商务有限公司 | Block chain data access control method and device based on attribute encryption |
CN109687958A (en) * | 2018-12-28 | 2019-04-26 | 全链通有限公司 | A kind of design of art work certificate and verification method based on fidelity block chain |
CN109711184B (en) * | 2018-12-28 | 2020-11-10 | 国网电子商务有限公司 | Block chain data access control method and device based on attribute encryption |
CN109979550B (en) * | 2019-02-14 | 2021-06-01 | 中国科学院信息工程研究所 | Block chain medical data management method and system based on distributed attribute signature |
CN109979550A (en) * | 2019-02-14 | 2019-07-05 | 中国科学院信息工程研究所 | A kind of block chain medical data management method and system based on distributed nature signature |
US11341493B2 (en) | 2019-03-04 | 2022-05-24 | Advanced New Technologies Co., Ltd. | Methods and devices for providing transaction data to blockchain system for processing |
US10867299B2 (en) | 2019-03-04 | 2020-12-15 | Advanced New Technologies Co., Ltd. | Methods and devices for providing transaction data to blockchain system for processing |
WO2019101232A3 (en) * | 2019-03-04 | 2020-01-09 | Alibaba Group Holding Limited | Methods and devices for providing transaction data to blockchain system for processing |
CN110458554A (en) * | 2019-03-31 | 2019-11-15 | 西安电子科技大学 | The data fast transaction method of identity-based on block chain |
CN110458554B (en) * | 2019-03-31 | 2022-03-22 | 西安电子科技大学 | Identity-based data rapid transaction method on block chain |
CN110266687B (en) * | 2019-06-21 | 2021-08-17 | 杭州云象网络技术有限公司 | Method for designing Internet of things security agent data sharing module by adopting block chain technology |
WO2020253108A1 (en) * | 2019-06-21 | 2020-12-24 | 深圳壹账通智能科技有限公司 | Information hiding method, apparatus, device, and storage medium |
CN110266687A (en) * | 2019-06-21 | 2019-09-20 | 杭州云象网络技术有限公司 | A kind of Internet of Things TSM Security Agent data sharing modularity using block chain technology |
CN110414961A (en) * | 2019-06-21 | 2019-11-05 | 深圳壹账通智能科技有限公司 | Prevent transfer account method, device, equipment and the storage medium of the track transactions side of producing |
CN110647756A (en) * | 2019-08-05 | 2020-01-03 | 广东工业大学 | Online examination management system based on block chain and CP-ABE and application method thereof |
CN110647756B (en) * | 2019-08-05 | 2023-06-27 | 广东工业大学 | Online examination management system based on blockchain and CP-ABE and application method thereof |
CN110740033A (en) * | 2019-08-19 | 2020-01-31 | 杭州云象网络技术有限公司 | block chain multi-party data sharing method based on secret sharing technology |
CN110599163A (en) * | 2019-08-20 | 2019-12-20 | 江苏大学 | Transaction record outsourcing method facing block chain transaction supervision |
CN110493347B (en) * | 2019-08-26 | 2020-07-14 | 重庆邮电大学 | Block chain-based data access control method and system in large-scale cloud storage |
CN110493347A (en) * | 2019-08-26 | 2019-11-22 | 重庆邮电大学 | Data access control method and system in large-scale cloud storage based on block chain |
CN111030821A (en) * | 2019-08-27 | 2020-04-17 | 杭州云象网络技术有限公司 | Alliance chain encryption method based on bilinear mapping technology |
CN110719176A (en) * | 2019-10-22 | 2020-01-21 | 黑龙江工业学院 | Logistics privacy protection method and system based on block chain and readable storage medium |
WO2021081803A1 (en) * | 2019-10-30 | 2021-05-06 | 深圳市网心科技有限公司 | Blockchain system, supervision method, system, device, and computer storage medium |
CN111079170B (en) * | 2019-11-04 | 2021-11-23 | 湖南源科创新科技有限公司 | Control method and control device of solid state disk |
CN111079170A (en) * | 2019-11-04 | 2020-04-28 | 湖南源科创新科技有限公司 | Control method and control device of solid state disk |
CN111046427A (en) * | 2019-12-13 | 2020-04-21 | 北京启迪区块链科技发展有限公司 | Block chain-based data access control method, device, equipment and medium |
CN111130757B (en) * | 2019-12-31 | 2020-12-25 | 华中科技大学 | Multi-cloud CP-ABE access control method based on block chain |
CN111130757A (en) * | 2019-12-31 | 2020-05-08 | 华中科技大学 | Multi-cloud CP-ABE access control method based on block chain |
CN111371561A (en) * | 2020-02-27 | 2020-07-03 | 华信咨询设计研究院有限公司 | Alliance block chain data access control method based on CP-ABE algorithm |
CN111314369A (en) * | 2020-02-27 | 2020-06-19 | 苏州市星际云通区块链科技有限公司 | Resource sharing block chain network |
CN111371561B (en) * | 2020-02-27 | 2023-07-11 | 华信咨询设计研究院有限公司 | Alliance block chain data access control method based on CP-ABE algorithm |
CN111008201A (en) * | 2020-03-09 | 2020-04-14 | 支付宝(杭州)信息技术有限公司 | Method and apparatus for parallel modification and reading of state trees |
CN111625869A (en) * | 2020-04-23 | 2020-09-04 | 腾讯科技(深圳)有限公司 | Data processing method and data processing device |
CN111614678A (en) * | 2020-05-22 | 2020-09-01 | 中国联合网络通信集团有限公司 | Anti-disclosure method, anti-disclosure device and encryption device |
CN111681002B (en) * | 2020-06-10 | 2023-05-02 | 浙江工商大学 | Fair data transaction method and system based on blockchain |
CN111681002A (en) * | 2020-06-10 | 2020-09-18 | 浙江工商大学 | Fair data transaction method and system based on block chain |
CN111709053B (en) * | 2020-06-11 | 2024-04-05 | 中国工商银行股份有限公司 | Operation method and operation device based on loose coupling transaction network |
CN111709053A (en) * | 2020-06-11 | 2020-09-25 | 中国工商银行股份有限公司 | Operation method and operation device based on loose coupling transaction network |
CN111859444B (en) * | 2020-06-12 | 2022-03-01 | 中国科学院信息工程研究所 | Block chain data supervision method and system based on attribute encryption |
CN111859444A (en) * | 2020-06-12 | 2020-10-30 | 中国科学院信息工程研究所 | Block chain data supervision method and system based on attribute encryption |
CN111901302A (en) * | 2020-06-28 | 2020-11-06 | 石家庄铁道大学 | Medical information attribute encryption access control method based on block chain |
CN111986755B (en) * | 2020-08-24 | 2023-05-19 | 中国人民解放军战略支援部队信息工程大学 | Data sharing system based on blockchain and attribute-based encryption |
CN111986755A (en) * | 2020-08-24 | 2020-11-24 | 中国人民解放军战略支援部队信息工程大学 | Data sharing system based on block chain and attribute-based encryption |
CN112039880A (en) * | 2020-08-30 | 2020-12-04 | 河南大学 | Block chain distributed outsourcing-based dual-policy access control method |
CN112165472A (en) * | 2020-09-22 | 2021-01-01 | 郑州轻工业大学 | Internet of things data security sharing method based on privacy protection |
CN112152778A (en) * | 2020-09-22 | 2020-12-29 | 腾讯科技(深圳)有限公司 | Node management method and device and electronic equipment |
CN112165472B (en) * | 2020-09-22 | 2022-09-27 | 郑州轻工业大学 | Internet of things data security sharing method based on privacy protection |
CN112152778B (en) * | 2020-09-22 | 2022-03-15 | 腾讯科技(深圳)有限公司 | Node management method and device and electronic equipment |
CN112365945B (en) * | 2020-10-27 | 2024-03-26 | 扬州大学 | Electronic medical record fine granularity access control and ciphertext searchable method based on blockchain |
CN112365945A (en) * | 2020-10-27 | 2021-02-12 | 扬州大学 | Block chain-based electronic medical record fine-grained access control and ciphertext searchable method |
CN112532588A (en) * | 2020-11-06 | 2021-03-19 | 北京工业大学 | Policy hidden type data access control method based on block chain |
CN112532588B (en) * | 2020-11-06 | 2023-01-31 | 北京工业大学 | Policy hidden type data access control method based on block chain |
CN112989378A (en) * | 2021-03-12 | 2021-06-18 | 北京航空航天大学 | File trusted intermediate storage architecture based on attribute encryption |
CN113127926B (en) * | 2021-03-12 | 2024-01-16 | 西安电子科技大学 | Method, system, storage medium and computer for analyzing statistical correlation of privacy data |
CN113127926A (en) * | 2021-03-12 | 2021-07-16 | 西安电子科技大学 | Method, system, storage medium and computer for analyzing statistical relevance of private data |
CN113127927B (en) * | 2021-04-27 | 2022-03-18 | 泰山学院 | Attribute reconstruction encryption method and system for license chain data sharing and supervision |
CN113127927A (en) * | 2021-04-27 | 2021-07-16 | 泰山学院 | Attribute reconstruction encryption method and system for license chain data sharing and supervision |
CN113393238A (en) * | 2021-06-16 | 2021-09-14 | 福建师范大学 | Intelligent contract model for protecting privacy and implementation method thereof |
CN113489733A (en) * | 2021-07-13 | 2021-10-08 | 郑州轻工业大学 | Block chain-based content center network privacy protection method |
CN113572790A (en) * | 2021-09-18 | 2021-10-29 | 深圳时空云科技有限公司 | Distributed processing method and device for private information |
CN114640468A (en) * | 2022-03-16 | 2022-06-17 | 安顺职业技术学院 | Block chain privacy protection method based on online and offline attribute encryption |
CN114640468B (en) * | 2022-03-16 | 2024-01-26 | 安顺职业技术学院 | Block chain privacy protection method based on online offline attribute encryption |
CN114528601A (en) * | 2022-04-25 | 2022-05-24 | 中国工商银行股份有限公司 | Access method and device based on block chain data, processor and electronic equipment |
CN114528601B (en) * | 2022-04-25 | 2022-09-30 | 中国工商银行股份有限公司 | Access method and device based on block chain data, processor and electronic equipment |
CN114978744A (en) * | 2022-06-08 | 2022-08-30 | 廖鼎 | Security and protection information transmission method and system based on block chain |
CN116052832A (en) * | 2023-04-03 | 2023-05-02 | 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) | Tamper-proof transmission method based on medical information |
CN116260662A (en) * | 2023-05-15 | 2023-06-13 | 成都信息工程大学 | Tracing storage method, tracing storage system and tracing system |
CN116260662B (en) * | 2023-05-15 | 2023-07-18 | 成都信息工程大学 | Tracing storage method, tracing storage system and tracing system |
CN116720839B (en) * | 2023-08-07 | 2023-10-17 | 成都创一博通科技有限公司 | Financial information management method based on blockchain technology and supervision system thereof |
CN116720839A (en) * | 2023-08-07 | 2023-09-08 | 成都创一博通科技有限公司 | Financial information management method based on blockchain technology and supervision system thereof |
Also Published As
Publication number | Publication date |
---|---|
CN106503994B (en) | 2020-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106503994A (en) | Block chain private data access control method based on encryption attribute | |
CN107483198B (en) | A kind of block catenary system supervised and method | |
Li et al. | A blockchain privacy protection scheme based on ring signature | |
CN113595971B (en) | Block chain-based distributed data security sharing method, system and computer readable medium | |
CN103401839B (en) | A kind of many authorization center encryption method based on attribute protection | |
CN103856477B (en) | A kind of credible accounting system and corresponding authentication method and equipment | |
CN103647644B (en) | Attribute-based encryption method for achieving hierarchical certification authority | |
CN107508667B (en) | Ciphertext policy ABE base encryption method and its device of the fix duty without key escrow can be disclosed | |
CN106911470A (en) | A kind of bit coin transaction privacy Enhancement Method | |
US9021572B2 (en) | Anonymous access to a service by means of aggregated certificates | |
CN109040045A (en) | A kind of cloud storage access control method based on the encryption of ciphertext policy ABE base | |
CN104168108B (en) | It is a kind of to reveal the traceable attribute base mixed encryption method of key | |
US6708893B2 (en) | Multiple-use smart card with security features and method | |
CN110011781A (en) | A kind of homomorphic cryptography method encrypting and support zero-knowledge proof for transaction amount | |
CN107819753A (en) | Not exclusively anonymous block chain transaction system and method | |
CN105721158A (en) | Cloud safety privacy and integrity protection method and cloud safety privacy and integrity protection system | |
CN109862046A (en) | Anonymous methods can be traced in a kind of alliance's chain | |
Wang et al. | A regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption in bitcoin system | |
CN106487506A (en) | A kind of many mechanisms KP ABE method supporting pre-encrypt and outsourcing deciphering | |
CN106059763A (en) | Attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under cloud environment | |
CN107294718A (en) | Voidable key strategy is based on encryption attribute method in a kind of master pattern | |
CN107276766A (en) | A kind of many authorization attribute encipher-decipher methods | |
CN110086615A (en) | A kind of more authorized party's ciphertext policy ABE base encryption methods of distribution that medium is obscured | |
CN113347008B (en) | Loan information storage method adopting addition homomorphic encryption | |
CN106487792A (en) | A kind of power marketing cloud storage encryption method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |