Check patentability & draft patents in minutes with Patsnap Eureka AI!

Block chain storage encryption method based on attribute encryption

A technology of attribute encryption and encryption method, which is applied in special data processing applications, instruments, electrical digital data processing, etc., can solve the problems of user cost system energy consumption increase, system does not support user transactions, and the number of fault-tolerant nodes is small, etc., to achieve detailed Granular access control, secure sharing, and high throughput effects

Pending Publication Date: 2020-10-02
XIDIAN UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Most of the existing technical solutions are the working mode of the workload mechanism of the public chain in the blockchain. When the data is transmitted on the public chain, there will be situations where it cannot be updated in time, and the time of a transaction is much longer than that of the alliance chain mode.
Moreover, as the number of users increases, user costs and energy consumption of the entire system will increase, and eventually the system may not support users to continue transactions
At the same time, a single TA is used in attribute encryption to manage user attributes in the public domain. Considering the fact that the TA has access to all encrypted files, this scheme may cause a single point of failure, and at the same time may cause key escrow issues
[0008] Among the existing public chain consensus algorithms, such as the consensus algorithm based on proof of work (POW), it relies on a large amount of waste of resources and a high incentive mechanism, and only realizes the synchronization of 10,000-level full-node data, and there are efficiency problems
The Byzantine Fault Tolerant Algorithm (BFT) based on message passing used in the existing alliance chain is more efficient than POW, but it can only achieve fault tolerance between nodes with an order of magnitude of hundreds, and has the disadvantage of a small number of fault tolerant nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain storage encryption method based on attribute encryption
  • Block chain storage encryption method based on attribute encryption
  • Block chain storage encryption method based on attribute encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] The present invention provides a storage encryption method on the block chain based on attribute encryption, specifically as figure 1 shown, including the following steps:

[0052] Step 1. External users request access to data on the chain;

[0053] Step 2. Check whether the external user meets the access conditions through the medical record identifier and medical record object set by the attribute encryption algorithm;

[0054] Step 3. If it does not match, deny access; if it does, use the consensus algorithm SCA to achieve the purpose of accessing the data on the chain.

[0055] Further, as figure 2 As shown, in step 3, the process of executing the consensus algorithm SCA is:

[0056] Step 3.1. Determine whether a consensus is reached; if so, return to the master node and wait for user requests; otherwise, execute step 3.2;

[0057] Step 3.2, execute the practical Byzantine fault tolerance algorithm;

[0058] Step 3.3. Continue to judge whether a consensus is r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a blockchain storage encryption method based on attribute encryption, and belongs to the technical field of data encryption. The method comprises the steps that 1, an external user requests to access data on a chain; 2, checking whether an external user meets an access condition or not through a medical record identifier and a medical record object set by an attribute encryption algorithm; 3, if not, refusing access; if yes, the purpose of accessing the data on the chain is achieved through a consensus algorithm SCA. According to the method, a blockchain technology is combined with attribute encryption to protect data-doctor-patient data of a patient on a chain, so that safe sharing of electronic medical records is realized; the blockchain has natural advantages forprivacy protection, the consensus mechanism in the chain is optimized by combining cryptography, computer networks, asynchronous Byzantine fault tolerance and other technologies, and an alliance chainwith low delay and certain throughput is designed and realized.

Description

technical field [0001] The invention belongs to the technical field of data encryption, and in particular relates to an attribute encryption-based storage encryption method on a block chain. Background technique [0002] Today, the importance of patient medical data is self-evident. However, the medical data of different hospitals cannot be shared, which to some extent leads to the lag of medical treatment. Therefore, people realize the sharing of medical data through the sharing of electronic medical records, but there are problems such as security and privacy protection in the sharing of electronic medical records to a certain extent, so encrypting data can solve the above problems to a certain extent. [0003] Due to its high redundancy, distributed storage, inability to tamper with and the ability to manage multi-signature complex permissions, the blockchain has great advantages in protecting patient privacy information. The blockchain can greatly simplify record keepin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/27G06F21/60G06F21/62G16H10/60
CPCG06F16/27G06F21/602G06F21/6245G16H10/60
Inventor 王子龙丁晗
Owner XIDIAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More