A blockchain-based access control method that can hide policies and attributes

An access control and blockchain technology, applied in the field of access control based on blockchain-based hidden policies and attributes, can solve privacy threats, expose user identities, etc., and achieve the effect of enhancing robustness

Active Publication Date: 2022-06-21
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the transparency of the blockchain, storing access policies or user attributes directly on the blockchain will pose a huge threat to privacy, user attributes may expose the user's identity, and data access policies may disclose information about the data owner. or private information about data content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based access control method that can hide policies and attributes
  • A blockchain-based access control method that can hide policies and attributes
  • A blockchain-based access control method that can hide policies and attributes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The specific implementation process of the present invention will be further described below with reference to the accompanying drawings.

[0040] A blockchain-based access control method that can hide policies and attributes, comprising the following steps:

[0041] Step 1: Consortium blockchain initialization.

[0042] Specifically, it includes the following steps:

[0043] Step 1.1: Consortium formation.

[0044] Multiple organizations form alliances to jointly build blockchain networks. Any node that wants to join the blockchain network needs to apply for a certificate issued by its organization's CA. This certificate is associated with the node's public-private key pair (BPK, BSK), and the node can use the private key to sign the transactions it sends. .

[0045] Step 1.2: Generate joint public key.

[0046] The administrator of each organization selects at least two nodes within the organization as secondary nodes, which should have sufficient resources to pe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a block chain-based access control method that can hide policies and attributes, and belongs to the technical field of block chains. Initialize the alliance chain first. When the data owner wants to share a piece of data, first calculate the joint public key, then make this key encrypt the access policy specified for the data, and finally upload the encrypted data and the basic information of the data together with the encrypted access policy to the zone through the access control contract blockchain. If a data consumer is interested in a data consumer's data, it submits a request to the blockchain for access authorization. The control contract receives the data user's request and judges whether its attributes meet the access policy. The control contract uses the homomorphism of the encryption scheme to calculate the "difference" between the encrypted access policy and the data user attribute. Finally, auxiliary nodes from different organizations jointly decrypt the calculation results. This method helps to realize auditable and privacy-protected access control, and enhances the robustness of access control.

Description

technical field [0001] The invention relates to a block chain-based access control method that can hide policies and attributes, and belongs to the field of block chain technology. Background technique [0002] At present, the blockchain has expanded from the pure digital currency application to the Internet of Things, finance, medical care, insurance and other fields, and has huge development prospects. Blockchain can establish trust relationships between nodes that do not trust each other without the need for a trusted central server. Due to the characteristics of decentralization, immutability, common maintenance and transparency, blockchain technology is considered to be a promising solution to the centralization problem. Additionally, smart contracts running on the blockchain can help monitor access control procedures and enforce pre-specified policies. [0003] Attribute-based access control, which can provide fine-grained and flexible access control, has been widely...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/27G06F21/62
CPCG06F16/27G06F21/6218
Inventor 徐蕾吴楠楠祝烈煌盖珂珂蒋芃
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products