Data sharing method based on trusted execution environment
A data sharing and execution environment technology, applied in digital transmission systems, secure communication devices, and key distribution, can solve problems such as security risks, third parties and authorizers denying authorization facts, and achieve the effect of eliminating intentional evil
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] Such as Figure 1-3 As shown, the present invention provides a data sharing method based on a trusted execution environment, which includes four modules, namely an identity registration and key pair generation module, a proxy re-encryption module, a smart contract module, and a decryption module. The steps are as follows Shown:
[0023] S1, initialization, user registration and key pair generation, TEE security zone and smart contract initialization;
[0024] S2, release data, the sender encrypts the data M to be released to the public through TEE into ciphertext M1;
[0025] S3, synchronously on the chain, the data receiver subscribes to the data release, sends a data sharing request, the smart contract verifies the user's identity, synchronizes the accounting and binds the transmission public key;
[0026] S4, proxy re-encryption, the sender authorizes TEE to generate a re-encryption key and generate ciphertext M2, and synchronously upload to the chain;
[0027] S5...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


