Anti-leakage method, anti-leakage device, and encryption device
An anti-leakage and confidential information technology, applied in the blockchain field, can solve the problems of inability to trace the leaker, announcement of leakage of confidential information, and low cost of leaking, so as to improve security and reliability, ensure security, and reduce leaks. effect of risk
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] An embodiment of the present application provides a leak prevention method, which can be applied to a leak prevention device, and the device can be placed in a second member node. figure 1 It is a flow chart of the anti-leakage method in this embodiment, including:
[0033] Step 110: Obtain the confidential information published by the first member node from the blockchain network.
[0034]Among them, the secret information is the information obtained by the first member node encrypting the plaintext information according to the attribute public key, the attribute public key is the secret key generated by the first member node according to the system public key and N attribute features in the attribute set, and the attribute set Including the second attribute feature, N is a positive integer greater than or equal to 1. For example, when N is equal to 3, the attribute set will include attribute characteristics of three member nodes, and all three member nodes have the r...
Embodiment 2
[0051] The embodiment of the present application provides an anti-leakage method, which can be applied to an encryption device in a blockchain network, and the device can be placed in a first member node. figure 2 It is a flow chart of the anti-leakage method in this embodiment, including:
[0052] Step 210: Generate an attribute public key according to the system public key and the N attribute features in the attribute set.
[0053] The attribute set includes the second attribute feature of the second member node, and N is a positive integer greater than or equal to 1.
[0054] It should be noted that the attribute set can also include the attribute private keys of other multiple member nodes. If the first member node wants multiple member nodes to view the confidential information released by it, when generating the attribute public key, it will It can put the attribute characteristics of its desired member nodes into the attribute collection. For example, if the first me...
Embodiment 3
[0063] image 3 This is a schematic structural diagram of an anti-leakage device provided in an embodiment of the present application. For the specific implementation of the device, reference may be made to the relevant description of the first embodiment, and repeated details will not be repeated. It should be noted that the specific implementation of the device in this embodiment is not limited to the above embodiments, and other unexplained embodiments are also within the protection scope of the device.
[0064] like image 3 As shown in the figure, the anti-leakage device specifically includes: an obtaining module 301 is used to obtain the confidential information issued by the first member node from the blockchain network, wherein the confidential information is that the first member node encrypts the plaintext information according to the attribute public key The obtained information, the attribute public key is the secret key generated by the first member node accordin...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


