Multi-authorization attribute-based verifiable encryption method based on block chain

A technology of authorization attribute and encryption method, which is applied in the direction of digital transmission system, electrical components, transmission system, etc., can solve the problem that the correctness and integrity of cloud storage data cannot be guaranteed, and the correctness of multi-authorized organization keys cannot be verified, and the system Problems such as data security cannot be guaranteed, to achieve the effect of increasing difficulty and cost, solving heavy computing burden, and eliminating concerns about data credit

Inactive Publication Date: 2022-03-04
LANZHOU UNIVERSITY OF TECHNOLOGY
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the research on the attribute-based encryption cloud storage scheme, there are still several problems: (1) The single authorization center not only has a heavy computational burden, but also cannot guarantee the data security in the system due to the inability to resist collusion attacks; (2) The correctness of multi-authority keys cannot be verified at the same time. If there is a wrong private key, all agencies need to resend it; (3) The correctness and integrity of cloud storage data cannot be guaranteed, so a research on a The blockchain-based multi-authorization attribute-based verifiable encryption method is of great significance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-authorization attribute-based verifiable encryption method based on block chain
  • Multi-authorization attribute-based verifiable encryption method based on block chain
  • Multi-authorization attribute-based verifiable encryption method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Such as figure 1 As shown, the present invention is a blockchain-based multi-authorization attribute-based verifiable encryption method, which adopts attribute-based encryption and introduces a multi-authorization attribute center to ensure one-to-many fine-grained access control and verifiable transmission of data The wrong private key; the algorithm includes initialization phase, encryption phase, key generation phase, verification phase, and decryption phase, and its steps are:

[0019] The first is that the data owner uploads the encrypted data to the cloud using the system public key, and at the same time uploads the data ciphertext hash value and access policy to the blockchain;

[0020] Secondly, the cloud storage server is responsible for receiving the data ciphertext and saving it;

[0021] Then, the data user receives the attribute key distributed by the multi-attribute authorization center and can verify the correctness of the key;

[0022] Secondly, the bl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-authorization attribute-based verifiable encryption method based on a block chain, belongs to the technical field of block chain data privacy protection security, and is suitable for one-to-many data sharing and fine-grained access control. The method comprises the following steps: firstly, a data owner uploads encrypted data to a cloud end by using a system public key, and uploads a data ciphertext hash value and an access strategy to a block chain; and the cloud storage server is responsible for receiving and storing the ciphertext. Secondly, the data user receives the attribute key distributed by the multi-attribute authorization center and can verify the correctness of the key; and the block chain performs identity authentication on the data user, and returns an authentication result to the cloud server. And finally, only the legal user whose attribute private key accords with the access strategy can download the data from the cloud and verify whether the data is tampered or not.

Description

technical field [0001] The invention relates to the technical field of blockchain data privacy protection and security. Background technique [0002] With the rapid development of data sharing technology, more and more users store massive data in the cloud, saving local storage space and making it easier to share. However, cloud data leakage incidents occur frequently, and the issue of privacy protection is beginning to face a severe test. The emergence of attribute-based encryption technology provides a new idea for realizing one-to-many encrypted data sharing, which can be widely used in fine-grained access control of shared storage, and has the characteristics of high efficiency, data confidentiality, and collusion resistance. [0003] With the development of blockchain technology, the problems that data in cloud storage may be tampered and integrity cannot be guaranteed have also been better resolved. In recent years, some scholars have combined blockchain with attribu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/06H04L67/1097
CPCH04L63/0428H04L67/1097H04L67/06H04L63/08
Inventor 冯涛孔繁琪柳春岩方君丽马蓉杨璞
Owner LANZHOU UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products