Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data sharing method based on decentralized identity and proxy re-encryption

A technology for proxy re-encryption and data sharing, applied in the field of data sharing methods, can solve problems such as unfavorable system scalability, loss of interests of data holders, and inability of data visitors to set data access rights.

Pending Publication Date: 2021-05-28
奥科塞尔控股公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] However, based on the existing data sharing methods at this stage, there are still some obvious deficiencies.
First of all, the whole process is still inseparable from a trusted third-party organization to participate in data sharing as a supervisor. Compared with the centralized data sharing system, these methods are only weakly centralized and cannot achieve real decentralization. Centralization; secondly, in order to ensure data security, it is often necessary to encrypt the data before sharing the data. The encryption method of the existing scheme usually chooses to use the symmetric key for encryption, the encryption key and the decryption key of the symmetric encryption For the same key, this type of scheme must upload the symmetric key to the network when data is shared. However, there is a risk of the symmetric key being stolen during network transmission, which will undoubtedly increase the malicious theft of shared data by others. possibility, thus indirectly causing losses to the interests of data holders; thirdly, the access control link lacks fine-grainedness, and it is impossible to set specific data access permissions for different data visitors according to specific situations in different scenarios, which is not conducive to Scalability to subsequent systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing method based on decentralized identity and proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0035] figure 1 A data sharing method based on decentralized identity and proxy re-encryption is shown, including the following steps:

[0036] Step 1. Upload data: The data owner randomly generates a secret key A, which is a symmetric key, encrypts the original data R with the secret key A to obtain encrypted data D, and pushes the encrypted data D to the data storage center for storage , the data storage center can be centralized storage, decentralized storage or blockchain storage; then, the data owner encrypts the key A with his own DID public key, generates encrypted ciphertext C1 and generates claim-1, claim-1 Including data storage information and encrypted ciphertext C1, where the data storage information includes but not limited to the following information: file storage location, file hash and file size, and then store clai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data sharing method based on decentralized identity and proxy re-encryption. The method comprises the following steps: a data owner randomly generates a secret key A, encrypts original data R by using the secret key A to obtain encrypted data D, and pushes the encrypted data D to a data storage center for storage; then, the data owner encrypts the secret key A by using the own DID public key, generates an encrypted ciphertext C1, generates claim-1, and stores the claim-1; the data user sends a data use request to the data owner, the data owner authorizes the data user, and claim-2 authorization information is generated; the data user requests data specified by the corresponding claim from the access controller, and after it is confirmed that the data user has the access permission to the data, the data user obtains the original data R through decryption. According to the method, the absolute control right of the user on the data is strictly protected while the data is shared, and the data privacy of the user is ensured to the greatest extent.

Description

technical field [0001] The invention relates to a data sharing method, which belongs to the technical field of data sharing in networks, in particular to a data sharing method based on decentralized identity and proxy re-encryption. Background technique [0002] Data sharing allows different entities to read and use other people's data. The degree of data sharing can reflect the information development level of a country or a region. The higher the degree of data sharing in a region, the higher the level of information development in the region. [0003] As the cost of acquiring customers on the Internet is getting higher and higher, many small businesses and merchants tend to provide their own services by obtaining user identity access information interfaces provided by BAT and others through alliance identities. If things go on like this, due to the huge scale of user data of Internet giants, according to the Matthew effect, data monopoly will occur. [0004] Identity m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/64
Inventor 徐明星刘雄钟秋
Owner 奥科塞尔控股公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products