Unlock instant, AI-driven research and patent intelligence for your innovation.

Data sharing method based on trusted execution environment

A data sharing and execution environment technology, applied in digital transmission systems, secure communication devices, and key distribution, can solve problems such as security risks, third parties and authorizers denying authorization facts, and achieve the effect of eliminating intentional evil

Inactive Publication Date: 2021-03-19
TIANYI ELECTRONICS COMMERCE
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in the presence of malicious agents, there may be situations where the third party and the authorizer jointly deny the fact of authorization
In addition, the public re-encryption key used in traditional proxy re-encryption technology may also bring security risks. For example, under certain algorithms, the re-encryption key and the authorized person's private key can be combined to derive the authorizer's private key.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing method based on trusted execution environment
  • Data sharing method based on trusted execution environment
  • Data sharing method based on trusted execution environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] Such as Figure 1-3 As shown, the present invention provides a data sharing method based on a trusted execution environment, which includes four modules, namely an identity registration and key pair generation module, a proxy re-encryption module, a smart contract module, and a decryption module. The steps are as follows Shown:

[0023] S1, initialization, user registration and key pair generation, TEE security zone and smart contract initialization;

[0024] S2, release data, the sender encrypts the data M to be released to the public through TEE into ciphertext M1;

[0025] S3, synchronously on the chain, the data receiver subscribes to the data release, sends a data sharing request, the smart contract verifies the user's identity, synchronizes the accounting and binds the transmission public key;

[0026] S4, proxy re-encryption, the sender authorizes TEE to generate a re-encryption key and generate ciphertext M2, and synchronously upload to the chain;

[0027] S5...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data sharing method based on a trusted execution environment, and the method comprises four modules: an identity registration and key pair generation module, an agent re-encryption module, an intelligent contract module and a decryption module. According to the invention, a TEE-based proxy re-encryption data sharing scheme is used; because the data encryption algorithm ofthe TEE is public, auditable and fair, the whole process is public and transparent for a data sender and a data receiver; the key management step and the encryption step are hidden in the security area, so that the security and controllability of the key are ensured; data sharing is recorded by an intelligent contract in the whole process and is consensus by multiple parties of nodes on a chain,and repudiation of authorized use facts is avoided.

Description

technical field [0001] The invention relates to the technical field of trusted execution environment, in particular to a data sharing method based on trusted execution environment. Background technique [0002] The scheme based on encrypted data sharing is generally implemented by a trusted third-party cloud platform. The encryption method and metadata of the third-party cloud platform are not open to the outside world, and they are closed-source centralized implementations. Therefore, in the presence of malicious agents, there may be situations where the third party and the authorizer jointly deny the fact of authorization. In addition, the use of public re-encryption keys in traditional proxy re-encryption technology may also bring security risks. For example, under certain algorithms, the re-encryption key and the authorized person's private key can be combined to derive the authorizer's private key . Contents of the invention [0003] The technical problem to be solv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0861H04L9/083H04L67/1095H04L63/0428H04L63/0281H04L9/50
Inventor 史楠迪喻博汪昌帅贺伟严永峰
Owner TIANYI ELECTRONICS COMMERCE