Outsourcing data ownership checking and updating method based on alliance chain
A technology for outsourcing data and data owners, applied in the field of information security, to resist tampering attacks, avoid computing power consumption, and eliminate mutual distrust
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0041] The present invention will be further described below with reference to the drawings and embodiments.
[0042] This embodiment provides a scheme for checking and updating the ownership of outsourcing data based on the alliance chain. The scheme flow chart is as follows: figure 1 As shown, there are 4 types of stakeholders: data owners, service nodes, auditors, and block producers;
[0043] Implementation flowchart such as figure 2 As shown, including 7 algorithms:
[0044] initialization:
[0045] According to the security parameters, the data owner runs the initialization algorithm to select a secure hash function h:{0,1}*→G, a bilinear mapping e:G×G→G T , Two pseudo-random functions f 1 : And f 2 : A random number as the private key s random numbers α 1 ,α 2 ,...,α s ∈G, and calculate the public key pk=g corresponding to the private key sk sk ∈G, where G, G T Are all groups, q is the order of G, and g is a member of G, Is a cyclic group of order q.
[0046] Label generat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap