Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Collaborative fine-grained access control method based on block chain

An access control and blockchain technology, applied in the blockchain field, can solve problems such as privacy leakage of users and resource managers

Active Publication Date: 2020-05-12
CHONGQING UNIV OF POSTS & TELECOMM
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this scheme, TP becomes the bottleneck of the system and manages the identity information of all users and resource managers. Once there is a problem with TP, both users and resource managers face the risk of privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collaborative fine-grained access control method based on block chain
  • Collaborative fine-grained access control method based on block chain
  • Collaborative fine-grained access control method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will be described in detail in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the invention.

[0071] This embodiment provides a blockchain-based collaborative fine-grained access control method, using the blockchain-based self-organizing identity management technology to solve the limitations of relying on trusted centers for attribute certificate management and key distribution in traditional KP-ABE Combining non-central cryptography technology and multi-authority KP-ABE technology, it realizes key generation and data access coordinated by multiple resource managers, and finally realizes a fine-grained access control method based on blockchain coordination. For specifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a collaborative fine-grained access control method based on a block chain. According to the invention, identities and attribute certificates of entities in a system are managedby utilizing a blockchain-based identity management technology, so the method does not depend on TP; each entity in the system can manage own identity and attribute certificate in a self-organizing manner; the overall safety of the system is improved; in addition, technologies such as zero knowledge proof and ring signature are utilized, so it is ensured that identity privacy of the user cannot be leaked in the transaction process; under the condition that a trusted center does not exist, the system master key is generated by negotiation of all resource managers in the system, an attribute cryptographic mechanism of a multi-attribute authoritative key strategy under the condition of not depending on credible authority is solved, cooperative key generation and resource access based on a block chain are realized, and the security of each entity in the system is greatly improved.

Description

technical field [0001] The present invention relates to the technical field of blockchain, in particular to a collaborative fine-grained access control method based on blockchain. Background technique [0002] Key-Policy Attribute based Encryption (KP-ABE) technology can be applied to paid video sites, log encryption and other scenarios. Authorize according to the types of resources that users can access, and generate user keys. The access policy is specified in the user's key and the attribute set is specified in the ciphertext. Users can only decrypt data when the properties in the ciphertext satisfy the access policy specified in the key. In some existing schemes, the access control policy is represented by an access tree. When a user requests a private key, the resource manager determines the attribute combination that can be decrypted by the user terminal, and distributes the corresponding attribute private key to the user. However, this solution has the problem of a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06H04L9/08
CPCH04L9/0643H04L9/0825H04L9/085H04L9/0861H04L9/0869H04L9/0894H04L63/0442H04L63/0823H04L63/0876H04L63/10
Inventor 肖敏马仲岳黄艳
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products