A blockchain privacy protection method based on asymmetric encryption
An asymmetric encryption and privacy protection technology, applied in digital transmission systems, user identity/authority verification, secure communication devices, etc., can solve the problems of few third-party institutions and untrustworthiness, and achieve flexible user authorization data access mode Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] In order to describe the present invention more specifically, the technical solutions of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.
[0028] In this embodiment, an encryption module is established for each encryption process. The encryption module involves the user object user, the untrusted object server providing data operation services, and the data storage object blockchain, so as to realize the authorization management mechanism when the server accesses user data.
[0029] In this embodiment, when the data operation service is provided by an untrusted third-party organization, a highly flexible user-authorized data access mode is established, and the specific execution steps are as follows:
[0030] (1) Authorization operation creation and cancellation.
[0031] 1-1. Generate the corresponding public key and private key (PK_u, SK_u, PK_s, SK_s, PK_bc, SK_bc) for user, server and bloc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

