A blockchain-based distributed data security sharing method, system and computer-readable medium

A distributed data and blockchain technology, applied in the field of data security, can solve the problems of low integration of blockchain and potential security risks, achieve accountability, improve generation efficiency, and achieve a high degree of decentralization Effect

Active Publication Date: 2022-05-17
YUNNAN UNIVERSITY OF FINANCE AND ECONOMICS +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to solve the problems caused by the centralized key center, Gao et al. hide user attributes through homomorphic encryption, and send Proof to the authority for authentication through smart contracts, so as to obtain the master key, and the user generates a private key. key, which realizes distributed key calculation and attribute storage, but its master key is still kept by a centralized organization, which has potential security risks; Zheng Lianghan et al. designed a hierarchical CP-ABE algorithm, which makes all The authority can distribute private keys honestly and in parallel, but its essence is still a multi-centralized authority, which is not well integrated with the blockchain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based distributed data security sharing method, system and computer-readable medium
  • A blockchain-based distributed data security sharing method, system and computer-readable medium
  • A blockchain-based distributed data security sharing method, system and computer-readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0072] This application is based on a blockchain-based distributed data security sharing system, including six participants:

[0073] The data owner DO (Data Owner), through the system encryption algorithm, encrypts the shared data plaintext into the shared data ciphertext, stores the shared data ciphertext in the interstellar file system, and records the ciphertext digital summary of the shared data ciphertext in the master On the chain PC, the master key cip...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain-based distributed data security sharing method, system and computer-readable medium: output system master key pair and user key pair; encryption; system master key is packaged and uploaded to the block chain ; The master key agent storage node generates the conversion key; the conversion key calculation node generates a new capsule; the data user obtains the master key ciphertext from the blockchain, and obtains the system master key; obtains the attribute private key; The user obtains the shared data ciphertext, enters the attribute private key, and obtains the plaintext through the decryption algorithm. The distributed data security sharing method, system and computer-readable medium based on the block chain of the present invention realize the key encapsulation of the master key by using the distributed proxy key encapsulation mechanism, and solve the security of the master key in the block chain network The problem of distribution and management improves the efficiency of private key generation, and solves the problems of safe distribution and management of the master key in the blockchain network existing in the prior art.

Description

technical field [0001] The invention belongs to the technical field of data security, and relates to a blockchain-based distributed data security sharing method, system and computer-readable medium. Background technique [0002] At present, with the rapid development of information technology, data has become a strategic resource that cannot be separated from the development of all walks of life. However, with the opening and sharing of data, more and more information leakage incidents make the security and privacy of sensitive data a problem that all walks of life must face. An effective way to solve sensitive data security and privacy security is to encrypt data before sharing, but the traditional ciphertext sharing method requires a lot of communication overhead and computing cost. Therefore, using the ciphertext-policy attribute-based encryption (CP-ABE) algorithm, which has the advantages of "one-to-many encryption" and fine-grained access control, can effectively solv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/32
CPCH04L63/062H04L9/083H04L9/3247H04L9/3239H04L9/50
Inventor 余益民陈韬伟张晓东高建段正泰宋智明宋俊蓉兰琨孔庆雯冯艳翟登张翼
Owner YUNNAN UNIVERSITY OF FINANCE AND ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products