Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An attribute reconstruction encryption method and system for permission chain data sharing and supervision

A data sharing and encryption method technology, applied in the blockchain field, can solve the problems of data privacy protection and imperfect access control mechanism, and achieve the effects of flexible authorization, privacy protection and efficient supervision

Active Publication Date: 2022-03-18
TAISHAN UNIV
View PDF23 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, due to many factors such as data ownership, data leakage, and their own commercial interests, companies or organizations with a large amount of data are extremely cautious about opening their own internal data, especially core data, which leads to data privacy protection and data protection. The contradiction between efficient sharing is increasingly prominent
Obviously, the data security issue is still the difficulty and pain point restricting the wide application of permission chain technology. The reason lies in the imperfect data privacy protection and access control mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An attribute reconstruction encryption method and system for permission chain data sharing and supervision
  • An attribute reconstruction encryption method and system for permission chain data sharing and supervision
  • An attribute reconstruction encryption method and system for permission chain data sharing and supervision

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0043] figure 1 It is a schematic diagram of the application scenario of the permission chain data sharing and supervision of the present invention, such as figure 1As shown, the systems involved in this application scenario include: authoritative organization system 11, authoritative organization node 12, permission chain data sharing and supervision platform 13, organization end A node 14, organization end A system 15, organization end B node 16, organization end System B 17 , node X at the organization end 18 and system X at the organization end 19 . The authoritative organization node 12, the organization A node 14, the organization B node 16 and the organization X node 18 communicate and interact with the license chain data sharing and supervision platform 13 respectively through the corresponding l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of block chains, and discloses an attribute reconstruction encryption method and system for permission chain data sharing and supervision. Its characteristics include that the permission chain authoritative organization acts as a data supervision organization to build an attribute management infrastructure for managing the attributes of the entire chain; the access tree submitted by the data release organization is reconstructed into a standardized access tree under the attribute management infrastructure; The standardized standard access tree trans-encrypts the ciphertext submitted by the organization, and converts personalized encryption and access control into full-chain standardized encryption and access control. This application can protect the privacy and security of uplink data through the cryptographic algorithm and license chain technology based on attribute encryption, realize fine-grained and flexible authorization of data, and use the invented attribute reconstruction encryption method and system to realize efficient encryption of encrypted data Supervision.

Description

technical field [0001] The invention belongs to the technical field of block chains, and relates to an attribute reconstruction encryption method and system for permission chain data sharing and supervision. Background technique [0002] The permissioned chain is a type of blockchain that each node needs to be licensed by an authoritative organization. After the identity is verified, it is assigned specific system permissions to carry out specific businesses. Compared with public chains, permissioned chains are more suitable for application scenarios that require supervision, cross-organization sharing, and multi-party business collaboration. In the context of the era when blockchain technology has been included in the new infrastructure category by the country, the license chain can better empower industry applications and accelerate the process of blockchain technology landing. However, if the system data and operations are stored in plain text and are open and transparen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60G06Q40/04
CPCG06F21/6245G06F21/602G06Q40/04G06F2221/2107G06F2221/2141
Inventor 张国锋冯斌冯玲段西强张雷
Owner TAISHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products