Block chain-based proxy re-encryption method and system, and storage medium

A proxy re-encryption and re-encryption technology, applied in the field of applied cryptography, can solve the problems of security risks, opacity, and non-public traceability, and achieve the effect of preventing security risks and eliminating dependencies.

Inactive Publication Date: 2020-08-14
上海朝夕网络技术有限公司
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the problem with the traditional proxy re-encryption technology is that the behavior of the proxy is opaque
The current proxy re-encryption system usually requires an honest third-party agent, and has the characteristics of agent centralization, opacity, and non-public traceability. Therefore, in the case of malicious agents, there may be situations where the agent and the authorizer jointly deny the authorization fact. Happening
In addition, the public re-encryption key used in traditional proxy re-encryption technology may also bring security risks. For example, under certain algorithms, the re-encryption key and the authorized person's private key can be combined to derive the authorizer's private key.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based proxy re-encryption method and system, and storage medium
  • Block chain-based proxy re-encryption method and system, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0038] A block chain-based proxy re-encryption method provided by the embodiment of the present invention, the realization principle is as follows figure 1 shown. In the process of proxy re-encryption, the following four types of roles are included: authorizer, cloud storage server, blockchain system and authorized party. The specific process is as figure 2 shown.

[0039] (1) System initia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain-based proxy re-encryption method and system, and a storage medium. The method comprises the following steps of respectively generating a public and private key pair of an authorizer and a public and private key pair of an authorized person, encrypting the data by using the public key of the authorizer, generating encrypted data and uploading the encrypted datato a cloud storage server, receiving an access request sent by the authorized person, the access request comprising a public key of the authorized person, and generating a re-encryption key by usingthe private key of the authorizer and the public key of the authorized person, sending the re-encryption key to an intelligent contract of a block chain, calling the intelligent contract to read the encrypted data from the cloud storage server, and re-encrypting the encrypted data by using the re-encryption key to generate re-encrypted data, and decrypting the re-encrypted data by using the private key of the authorized person. The agent can carry out distributed, transparent and verifiable agent re-encryption operation based on the block chain system.

Description

technical field [0001] The invention belongs to the technical field of applied cryptography, and more specifically relates to a blockchain-based proxy re-encryption method, system and storage medium. Background technique [0002] Proxy re-encryption technology belongs to cryptographic primitives, and is a key conversion protocol between ciphertexts. Generally speaking, in a proxy re-encryption system, the proxy (proxy) can convert the ciphertext originally encrypted to the delegator after obtaining the conversion key generated by the delegator (delegator) for the delegator (delegatee). For the authorized person's ciphertext, the authorized person only needs to use his own private key to decrypt the converted ciphertext. Proxy re-encryption can further ensure that although the proxy has the conversion key, the proxy still cannot obtain any information about the corresponding plaintext in the ciphertext. In reality, proxy re-encryption is widely used in many occasions, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0884H04L63/0442H04L63/0478H04L67/10H04L67/1097
Inventor 崔锦铭李汝佳汪晓明
Owner 上海朝夕网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products