Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed data security sharing method and system based on block chain, and computer readable medium

A distributed data and blockchain technology, applied in the field of data security, can solve the problems of low integration of blockchain and potential security risks, achieve accountability, improve generation efficiency, and achieve a high degree of decentralization Effect

Active Publication Date: 2021-11-02
YUNNAN UNIVERSITY OF FINANCE AND ECONOMICS +1
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve the problems caused by the centralized key center, Gao et al. hide user attributes through homomorphic encryption, and send Proof to the authority for authentication through smart contracts, so as to obtain the master key, and the user generates a private key. key, which realizes distributed key calculation and attribute storage, but its master key is still kept by a centralized organization, which has potential security risks; Zheng Lianghan et al. designed a hierarchical CP-ABE algorithm, which makes all The authority can distribute private keys honestly and in parallel, but its essence is still a multi-centralized authority, which is not well integrated with the blockchain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed data security sharing method and system based on block chain, and computer readable medium
  • Distributed data security sharing method and system based on block chain, and computer readable medium
  • Distributed data security sharing method and system based on block chain, and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0073] This application is based on a blockchain-based distributed data security sharing system, including six participants:

[0074] The data owner DO (Data Owner), through the system encryption algorithm, encrypts the shared data plaintext into the shared data ciphertext, stores the shared data ciphertext in the interstellar file system, and records the ciphertext digital summary of the shared data ciphertext in the master On the blockchain PC, the master ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed data security sharing method and system based on a block chain, and a computer readable medium. The method comprises the following steps: outputting a system master key pair and a user key pair; performing encryption; packaging and then uploading the system master key to the block chain; generating a conversion key by the master key agency storage node; converting the key calculation node to generate a new capsule; obtaining the master key ciphertext from the block chain by the data user and obtaining the system master key; obtaining an attribute private key; and obtaining the shared data ciphertext by the data user, inputting the attribute private key, and obtaining the plaintext through a decryption algorithm. According to the distributed data security sharing method and system based on the block chain, and the computer readable medium, key encapsulation of the master key is realized by using a distributed proxy key encapsulation mechanism, the problem of secure distribution and management of the master key in a block chain network is solved, the generation efficiency of the private key is improved, and the problems of safe distribution and management of the master key in the block chain network and the like in the prior art are solved.

Description

technical field [0001] The invention belongs to the technical field of data security, and relates to a blockchain-based distributed data security sharing method, system and computer-readable medium. Background technique [0002] At present, with the rapid development of information technology, data has become a strategic resource that cannot be separated from the development of all walks of life. However, with the opening and sharing of data, more and more information leakage incidents make the security and privacy of sensitive data a problem that all walks of life must face. An effective way to solve sensitive data security and privacy security is to encrypt data before sharing, but the traditional ciphertext sharing method requires a lot of communication overhead and computing cost. Therefore, using the ciphertext-policy attribute-based encryption (CP-ABE) algorithm, which has the advantages of "one-to-many encryption" and fine-grained access control, can effectively solv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L63/062H04L9/083H04L9/3247H04L9/3239H04L9/50
Inventor 余益民陈韬伟张晓东高建段正泰宋智明宋俊蓉兰琨孔庆雯冯燕翟登张翼
Owner YUNNAN UNIVERSITY OF FINANCE AND ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products