Unlock instant, AI-driven research and patent intelligence for your innovation.

A Blockchain Weak Center Password Authorization Method Using Attribute Password

An attribute cryptography and blockchain technology, applied in the construction of blockchain weak center cryptographic open authorization services, can solve problems such as single-point bottlenecks, and achieve the effects of reducing losses, facilitating use, and reducing costs

Active Publication Date: 2021-09-17
FUDAN UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And the multi-node structure also helps to solve the original CPABE single-point bottleneck problem, so that even if a certain number of nodes are breached, the security of the entire system can be guaranteed, and the most important master key will not be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Blockchain Weak Center Password Authorization Method Using Attribute Password
  • A Blockchain Weak Center Password Authorization Method Using Attribute Password
  • A Blockchain Weak Center Password Authorization Method Using Attribute Password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention is further described below through specific examples, so that those skilled in the art can better understand the technical and functional characteristics of the present invention, but the protection scope of the present invention is not limited to the following examples.

[0028]In this embodiment, the programming language is JavaScript, GoLang, html, and the browser is chrome.

[0029] The example proposes a total of 3 types of nodes, AA node - CA node - user node. The specific process is:

[0030] 1. Block chain initialization, the process is shown in figure 1 shown.

[0031] 1. The AA node uses DPOS voting to generate some initial public parameters and upload them to the chain, such as the master public key, the total number of AA n, and the voting threshold t: generally the total number of AA* +1; generate the corresponding CA nodes and divide the regions to facilitate future information exchange, and configure the CA node certificate appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of ciphers, and specifically relates to a block chain weak center cipher authorization method using attribute ciphers. The present invention first turns the original CPABE centralized key distribution organization into multiple CAs and multiple AA organizations, and becomes a multi-node cooperative calculation master key and user key distribution system, making its cryptographic system more suitable for the blockchain characteristics; the method of the present invention includes: block chain initialization, user registration, open authorized third party, user modification of password, user acquisition of additional prompt information set, system security protection, etc.; the present invention utilizes the security structure and block of attribute password The chain is weakly centralized and cannot be tampered with, providing a series of safe, reliable, reliable, and automated cryptographic services, reducing the cost of users storing traditional public-private key pairs and forgetting passwords, and reducing the loss of centralized databases due to various reasons Or the loss caused by leaking the user's account password data.

Description

technical field [0001] The invention belongs to the technical field of block chains, and in particular relates to a method for constructing a block chain weak center password open authorization service. Background technique [0002] Current website users usually use their personal information to register based on their trust in the website provider, and provide them with an account and password as credentials for future logins. However, website user password database information leaks happen from time to time. What's more, the database is placed on the cloud without backup, and the entire database is lost due to cloud failure, which has a great impact. The blockchain can combine elliptic curve public key cryptography and a series of password security guarantees to provide a reliable storage method, so that the user's account password can be safely stored on the blockchain without worrying about being lost or cracked. [0003] Since the birth of Bitcoin, it has also been rep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
Inventor 阚海斌陈泽宁刘百祥张亮张新鹏任艳丽
Owner FUDAN UNIV