Blockchain data access authority control method based on proxy re-encryption

A proxy re-encryption and permission control technology, applied in the blockchain field, can solve the problems that hinder the flexibility and security of data access permission control, cannot achieve data-level permission control, and cannot dynamically adjust private data set access members, etc. To achieve the effect of ensuring safety, reliability and traceability

Active Publication Date: 2020-05-22
CETHIK GRP
View PDF15 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For a more fine-grained data-level privacy protection mechanism, Fabric introduces private data sets, which allow the creation of private data sets based on policies to define which members in the channel can access data, but cannot dynamically adjust the access members of private data sets, so still Unable to control permissions at the data level
This greatly hinders the flexibility and security of data access control on the blockchain

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain data access authority control method based on proxy re-encryption
  • Blockchain data access authority control method based on proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] The objects involved in the method for controlling access rights of blockchain data based on proxy re-encryption in this embodiment are as follows: figure 1 As shown, the participants include: the key generation center, the blockchain and the nodes of the blockchain.

[0088] The overall process of the blockchain data access control method based on proxy re-encryption provided is as follows figure 2 As shown, it specifically includes the following steps:

[0089] (1) Establish a key generation center (KGC) in the blockchain network to generate and distribute public and private keys and symmetric keys.

[0090] Key parameter setting: completed by the key generation center. Algorithm input parameters L, L are security parameters (key length), output system parameters params based on elliptic bilinear mapping, params={type,q,h,r,exp2,exp1,sign1,sign0}, randomly select all Establish G in the system 1 For an element g of the group, calculate the bilinear mapping paring(g,g)=z, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a blockchain data access authority control method based on proxy re-encryption, and aims at the authorization sharing access type. The method comprises the steps: encrypting plaintext information through employing a symmetric secret key to generate a content ciphertext, and encrypting the symmetric secret key through employing an own public key to generate a secret key ciphertext; uploading the content ciphertext and the key ciphertext to a block chain; obtaining a public key of the authorized node on the block chain according to an access authorization application initiated by the authorization node, and generating an authorization key according to the own private key and the public key of the authorized node; uploading the authorization key to the block chain, wherein the authorization key is used for the block chain to perform proxy re-encryption calculation in combination with the key ciphertext to generate a proxy re-encryption key; and the proxy re-encryption key is used for the authorized node to analyze by using the own private key to obtain a symmetric key, and the symmetric key is used for the authorized node to decrypt the content ciphertext to obtain the plaintext information. According to the method, the data of different security levels is classified so that fine-grained permission access control of the data level is realized on the block chain.

Description

Technical field [0001] This application belongs to the field of blockchain technology, and specifically relates to a method for controlling access rights of blockchain data based on proxy re-encryption. Background technique [0002] Blockchain is a decentralized distributed ledger with security features such as unalterable, unforgeable, and fully traceable. In the same blockchain, the data is completely open to each node, so any node can view the data on all blocks. How to prevent the abuse of data on the blockchain, protect node privacy data, and improve access control has become increasingly urgent and important. [0003] Currently, the blockchain is mainly divided into a consortium chain (Fabric) and a public chain. Fabric realizes coarse-grained data isolation at the organization level by adding organizations to different channels. Organizations in the same channel can access any information on the channel. For a more fine-grained data-level privacy protection mechanism, Fa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6272G06F21/602
Inventor 娄琪何成东俞兴华郑嘉波
Owner CETHIK GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products