Unlock instant, AI-driven research and patent intelligence for your innovation.

A blockchain data access control method and device based on attribute encryption

A data access control and attribute encryption technology, applied in the blockchain field, can solve problems such as inability to guarantee data privacy, inability to guarantee data confidentiality, user identity information leakage, etc.

Active Publication Date: 2020-11-10
STATE GRID E COMMERCE CO LTD +3
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, blockchain-based access control schemes usually cannot guarantee the confidentiality of data. For example, for some sensitive information and information that needs to be kept secret, the data owner hopes that the data will be encrypted and stored in the blockchain, and only those with specific access rights Users can decrypt and access the data
[0004] However, under normal circumstances, for the identity-based public key encryption algorithm, the user's public key, private key and identity information correspond one-to-one. If the user's public key and private key are obtained by criminals, the user's identity can be cracked. information, resulting in the leakage of user identity information
[0005] Moreover, the applicant found through research that after the user has the key to access a certain data, the key cannot be revoked, so that after the user's identity changes, the data can still be accessed, so the privacy of the data cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain data access control method and device based on attribute encryption
  • A blockchain data access control method and device based on attribute encryption
  • A blockchain data access control method and device based on attribute encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0054] refer to figure 1 , which shows a schematic flowchart of an attribute encryption-based blockchain data access control method provided by an embodiment of the present invention. In this embodiment, the method includes:

[0055] S101: During system initialization, generate attribute-based encryption system parameters, system attribute sets, and time-based key management parameters;

[0056] In this embodiment, the system parameters encrypted based on att...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain data access method based on attribute encryption, which comprises the following steps: when a system is initialized, generating a system parameter based on attribute encryption, a system attribute set and a management parameter based on a time key; when the user registers with the system, the system sends a private key, a signature key, a verification key and an access time period of the user based on the user attribute set to the user; wherein the access time of the user is determined according to the user attribute; when new transaction information is generated, the transaction information is encrypted according to the system attribute set and the time key management parameters to generate a ciphertext, and the ciphertext is stored in the block; and responding to the access request of the user, and accessing the transaction information according to the attribute set of the user and the access time of the user. Therefore, the risk that the user identity information is leaked due to encryption of the user identity information in the prior art is solved, time key management is added, the access time of the user is limited, and automatic revocation of the key is achieved.

Description

technical field [0001] The present invention relates to the field of block chains, in particular to a block chain data access control method and device based on attribute encryption. Background technique [0002] At present, blockchain technology is booming, and blockchain technology has the characteristics of: decentralization, immutability, trustlessness, openness, autonomy, and anonymity. Based on the above characteristics, at present, blockchain technology is usually used to implement access control, that is, to prevent unauthorized access to any resources, so that the system can be used within a legal scope. [0003] However, blockchain-based access control schemes usually cannot guarantee the confidentiality of data. For example, for some sensitive information and information that needs to be kept secret, the data owner hopes that the data will be encrypted and stored in the blockchain, and only those with specific access rights Only the user can decrypt and access th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06Q20/38
Inventor 郭宝贤徐彧周自强李丽丽
Owner STATE GRID E COMMERCE CO LTD