Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Secret divulgence prevention method, secret divulgence prevention device and encryption device

An anti-leakage and confidential information technology, applied in the blockchain field, can solve the problems of untraceable leakers, low cost of leaking, and leaking of confidential information in announcements, so as to improve security and reliability, ensure security, and reduce leaks risk effect

Active Publication Date: 2020-09-01
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the present invention provides an anti-leakage method, an anti-leakage device, and an encryption device to solve the problem of leaking publicized confidential information in the prior art due to the low cost of leaking secrets in the blockchain network and the inability to track down the leaker. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret divulgence prevention method, secret divulgence prevention device and encryption device
  • Secret divulgence prevention method, secret divulgence prevention device and encryption device
  • Secret divulgence prevention method, secret divulgence prevention device and encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] An embodiment of the present application provides an anti-leakage method, which can be applied to an anti-leakage device, and the device can be placed in the second member node. figure 1 It is a flow chart of the anti-disclosure method in this embodiment, including:

[0033] Step 110, from the blockchain network, obtain the confidential information released by the first member node.

[0034]Among them, the confidential information is the information obtained by the first member node by encrypting the plaintext information according to the attribute public key, and the attribute public key is the secret key generated by the first member node according to the system public key and N attribute characteristics in the attribute set, and the attribute set Including the second attribute feature, N is a positive integer greater than or equal to 1. For example, when N is equal to 3, the attribute set includes the attribute characteristics of three member nodes, all of which hav...

Embodiment 2

[0051] An embodiment of the present application provides an anti-leakage method, which can be applied to an encryption device in a blockchain network, and the device can be placed in a first member node. figure 2 It is a flow chart of the anti-disclosure method in this embodiment, including:

[0052] Step 210, generate an attribute public key according to the system public key and N attribute characteristics in the attribute set.

[0053] Wherein, the attribute set includes the second attribute feature of the second member node, and N is a positive integer greater than or equal to 1.

[0054] It should be noted that the attribute set can also include the attribute private keys of other multiple member nodes. If the first member node wants multiple member nodes to be able to view the confidential information issued by it, then when generating the attribute public key, just You can put the attribute characteristics of the desired member nodes into the attribute set. For examp...

Embodiment 3

[0063] image 3 It is a schematic structural diagram of an anti-leakage device provided in the embodiment of the present application. For the specific implementation of the device, please refer to the relevant description of Embodiment 1, and the repetition will not be repeated. It is worth noting that the specific implementation of the device in this embodiment is not limited to the above embodiments, and other undescribed embodiments are also within the protection scope of the device.

[0064] Such as image 3 As shown, the anti-leakage device specifically includes: an acquisition module 301 used to acquire the confidential information released by the first member node from the blockchain network, wherein the confidential information is that the first member node encrypts the plaintext information according to the attribute public key The obtained information, the attribute public key is the secret key generated by the first member node according to the system public key an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-leakage method, an anti-leakage device and an encryption device. The method comprises the following steps: from block chain networks, obtaining confidential informationpublished by the first member node, wherein the confidential information is information obtained by encrypting plaintext information by the first member node according to an attribute public key, theattribute public key is a secret key generated by the first member node according to a system public key and N attribute features in an attribute set, the attribute set comprises a second attribute feature, and N is a positive integer greater than or equal to 1; and decrypting the confidential information according to the own second attribute private key to obtain first information, the first information comprising plaintext information and a watermark identifier. And meanwhile, a specific secret divulger is tracked through the watermark identifier, so that the secret divulging risk is reduced, the security of confidential information is ensured, and the security and reliability of the block chain network are improved.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to an anti-leakage method, an anti-leakage device, and an encryption device. Background technique [0002] The Attribute-Based Encryption (ABE) scheme is regarded as the most promising encryption primitive that supports fine-grained access. The biggest difference from the public key encryption scheme is that ABE implements one-to-many encryption and decryption. . The ABE scheme does not need to be like identity encryption. Each encryption must know the identity information of the receiver. In the ABE scheme, the identity is regarded as a series of attributes. Users are decryptable when the attributes they possess exceed a preset threshold described by the encryptors. However, this scheme based on preset thresholds is not universal, because it is impossible to express a universal and general situation semantically. There are two types of ABE: Key Policy Attribute Based Encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L2209/608H04L2209/42H04L2463/101H04L9/50
Inventor 田新雪肖征荣马书惠杨子文董慧
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products