Data sharing method based on decentralized identity and proxy re-encryption
A technology for proxy re-encryption and data sharing, applied in the field of data sharing methods, can solve problems such as unfavorable system scalability, loss of interests of data holders, and inability of data visitors to set data access rights.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0035] figure 1 A data sharing method based on decentralized identity and proxy re-encryption is shown, including the following steps:
[0036] Step 1. Upload data: The data owner randomly generates a secret key A, which is a symmetric key, encrypts the original data R with the secret key A to obtain encrypted data D, and pushes the encrypted data D to the data storage center for storage , the data storage center can be centralized storage, decentralized storage or blockchain storage; then, the data owner encrypts the key A with his own DID public key, generates encrypted ciphertext C1 and generates claim-1, claim-1 Including data storage information and encrypted ciphertext C1, where the data storage information includes but not limited to the following information: file storage location, file hash and file size, and then store clai...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com