Private data distribution method based on proxy re-encryption

A technology for proxy re-encryption and private data, applied in the field of data processing in the blockchain, it can solve the problem that the public key encryption system cannot outsource the private data distribution business to a third party for operation.

Active Publication Date: 2020-06-19
丝链(常州)控股有限公司 +1
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is: in order to solve the problem that the traditional public key encryption system cannot outsource the private

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private data distribution method based on proxy re-encryption
  • Private data distribution method based on proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0086] The data owner establishes the structural content of the private data in the second request list, and the structural content includes a special identifier and description content;

[0087] Special identifiers are used to identify the structure properties of the structure content;

[0088] The description includes: the data format of the plaintext m, the encryption algorithm type of the plaintext m, and the ciphertext c A and public key pk A ;The structure content is expressed as the first byte array, and the structure properties of the structure content are:

[0089] In the first byte array, the first 2 bytes represent a special identifier, the data format of the plaintext m is represented as 2 bytes, the encryption algorithm type of the plaintext m is represented as 2 bytes, and the ciphertext c A Represented as the second byte array, the public key pk A represented as a third byte array;

[0090] The data owner performs a hash operation on the structure content to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a private data distribution method based on proxy re-encryption, and the method is characterized by comprising the following steps: a ciphertext cA and a unique identifier GA corresponding to a public key pkA are stored in a server; wherein the data owner has a public key pkA, a private key skA and a plaintext m, the first data receiver has a public key pkB and a private keyskB, and the first data receiver sends the public key pkB to the data owner; the data owner uses the private key skA and the public key pkB to create a re-encryption key rkA-> B; according to the private data distribution method based on proxy re-encryption, data is distributed between a data owner and a data receiver; the two parties do not need to be online at the same time, the two parties cancomplete the operation by means of the method, the server does not need to obtain private data content of the two parties in the related operation process, and safety requirements of the two partiesfor private data are guaranteed.

Description

technical field [0001] The invention relates to the technical field of data processing in blockchain, in particular to a private data distribution method based on proxy re-encryption. Background technique [0002] The traditional public key encryption system distributes the private data to the data receiver, which requires the data owner to complete the encryption operation on the private data, and then the data receiver decrypts the data. During the entire data distribution process, data operations can only be performed by both parties, and no third party is allowed to intervene, otherwise the data will be leaked to the third party. Therefore, the traditional public key encryption system cannot outsource the private data distribution business to a third party for operation. Contents of the invention [0003] The technical problem to be solved by the present invention is: in order to solve the problem that the traditional public key encryption system cannot outsource the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06H04L9/32H04L29/06H04L29/08
CPCH04L9/0825H04L9/0643H04L9/0894H04L9/3247H04L63/0442H04L67/56
Inventor 徐骏
Owner 丝链(常州)控股有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products