Block chain privacy data access control method based on attribute encryption

A technology for access control and privacy data, applied in the field of cryptography, can solve the problem of not being detailed enough to consider attribute correlation, and achieve the effect of privacy protection

Active Publication Date: 2017-03-15
XIDIAN UNIV
View PDF4 Cites 158 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that it is only layered for the importance of attributes, and the consideration of the correlation between attributes is not detailed enough. It is not suitable for fine-grained hierarchical access to user permissions at all levels in the future blockchain. controlled situation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain privacy data access control method based on attribute encryption
  • Block chain privacy data access control method based on attribute encryption
  • Block chain privacy data access control method based on attribute encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described below in conjunction with the accompanying drawings.

[0049] Refer to attached figure 1 , the realization steps of the present invention are as follows.

[0050] Step 1, initialization.

[0051] Enter system security parameters 1 λ , generating the first multiplicative cyclic group G of prime number p 0 , the second multiplicative cyclic group G 1 and the finite field Z p , randomly select the first multiplicative cyclic group G 0 The generator g of , defines a bilinear map e:G 0 ×G 0 →G 1 ;

[0052] From the finite field Z p Select N elements as system attributes to form a system attribute set S, divide the attributes in S into n trees according to the correlation between attributes, and set the depth of the i-th tree as l i , define l=max{l i} i∈[1,n] Represents the maximum depth of n trees, i∈[1,n];

[0053] Randomly select the first vector U=(u θ ) 1≤θ≤l and the second vector U'=(u' θ′ ) 1≤θ′≤n , whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain privacy data access control method based on attribute encryption, which mainly solves a problem in the prior art that the real identity of a user in the block chain is anonymously protected but the and transaction privacy information is not encrypted so as to cause privacy leakage. The method comprises the steps that 1. a system is initialized; 1, a user registers to obtain attribute information; 3, an authoritative center, according to the user attribute information, distributes a user private key; 4 a transaction party encrypts transaction privacy data and uploads the transaction privacy data to a block chain; 5, an accountant verifies the transaction information and performs the transaction; 6, a supervisory center is authorized to use the authorized private key to decrypt and check the transaction ciphertext. The method encrypts the transaction privacy information, avoids the leakage of data privacy and can be used for privacy protection of the virtual asset transaction data in the block chain.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and in particular relates to a private data access control method, which can be applied to different levels of authorized supervision centers and users in the block chain to effectively access encrypted transaction data in the block chain. Background technique [0002] The blockchain is essentially a decentralized database, like a shared ledger, which records all bitcoin transaction information. As the underlying technology of Bitcoin, blockchain has the characteristics of decentralization, openness, anonymity and immutability. In the traditional public blockchain, data such as user account information and transaction content are public, and any user can participate in bookkeeping and view transaction data, and only protect user privacy through "pseudo-anonymity". Although this increases users' confidence in the authenticity and reliability of the data, for the financial industry, the compl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38H04L9/08G06F21/62
CPCG06F21/6218G06Q20/382H04L9/0866H04L9/088
Inventor 高军涛王誉晓李雪莲王笠燕王丹妮
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products