Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

CP-ABE access control scheme based on block chain

A CP-ABE, access control technology, applied in the field of access control based on attribute encryption, can solve problems such as hidden dangers, reduce workload, ensure openness and transparency, and solve the problem of single point of failure.

Pending Publication Date: 2020-04-28
INNER MONGOLIA UNIVERSITY
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing CP-ABE access control schemes under the multi-authorization center require a third party to establish trust issues between AAs, manage public security parameters, etc. The third party here needs to be completely trusted, but there are security risks in actual scenarios of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CP-ABE access control scheme based on block chain
  • CP-ABE access control scheme based on block chain
  • CP-ABE access control scheme based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0023] Such as figure 1 The shown architecture demonstrates the overall flow of the invention:

[0024] Step 1: The newly added attribute authority should initiate a registration request to the blockchain, send its subject, valid time and public key through the smart contract, and the certification center will issue an identity certificate after passing the certification.

[0025] Step 2: The data owner requests an encryption key from the AA in this domain, and the AA returns an encryption key after the request is passed;

[0026] Step 3: The data owner encrypts the data file with an encryption key. After encrypting the plaintext, the data owner selects an RSA key pair, encrypts the ciphertext again with the public key, and uploads the ciphertext to the cloud service provider. Publish the private key to the blockcha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain combined access control architecture based on attribute encryption. Aiming at attribute encryption based on a ciphertext strategy in a multi-authorization-center scene, the work of the authorization centers is executed by a block chain, a trust relationship between the attribute authorization centers is constructed by utilizing an intelligent contract, a key management mechanism is established, and attribute authorization, key management and attribute revocation are completed by the intelligent contract. According to the scheme, the access control process based on attribute encryption is public, transparent, more flexible and safer.

Description

technical field [0001] The invention relates to the field of access control based on block chains, in particular to access control based on attribute encryption. Background technique [0002] Access control can prevent illegal users from accessing data in the system, and is very suitable for application in cloud environments to protect user privacy. However, there are many problems in the traditional access control scheme. It requires that the party that implements the access control policy must be trusted, and it cannot be applied to a finer-grained and more flexible environment. The access control scheme based on Attribute-Based Encryption (ABE) can solve the above problems, and is considered to be an access control technology suitable for protecting data security in cloud storage environment. Attribute-based encryption is divided into two categories: Ciphertext Policy Attribute Based Encryption (CP-ABE) and Key Policy Attribute Based Encryption (KP-ABE). In the CP-ABE a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/60G06F21/64H04L29/06
CPCG06F21/602G06F21/6218G06F21/64H04L63/045H04L63/0478H04L63/06H04L63/08H04L63/10
Inventor 李茹侯文涵史锦山张江徽
Owner INNER MONGOLIA UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products