Unlock instant, AI-driven research and patent intelligence for your innovation.

A privacy-preserving encrypted data sharing method based on blockchain

A technology for encrypting data and blockchain, applied in the field of cryptography and information security, it can solve the problem of inability to guarantee the privacy of data users' query, and achieve the effect of protecting privacy.

Active Publication Date: 2022-02-01
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] In view of the problems of the above research, the purpose of the present invention is to provide a privacy-protective encrypted data sharing method based on blockchain, which solves the problem that the blockchain in the prior art cannot guarantee that the query privacy of data users will not be leaked. Under the premise, the problem of obtaining the data you need

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy-preserving encrypted data sharing method based on blockchain
  • A privacy-preserving encrypted data sharing method based on blockchain
  • A privacy-preserving encrypted data sharing method based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0053] 1. Preparatory stage, that is, system initialization:

[0054] This stage is for various key generation stages, and the key generation center (AA) generates keys for all parties, such as figure 1 The label in ①.

[0055] (1) According to the given security parameter λ, AA calculates the public key and private key based on attribute encryption, where g is the generator of the group G whose order is a prime number p, is a bilinear mapping function, λ represents the size of the group G, n is the total number of attributes, and the parameter {β 1 , β 2 ,…β n , y} is from Z p * = independently selected n+1 real numbers in {1, 2, 3, ...p}, Z p * A collection of positive integers from 1 to p.

[0056] AA authentication generates the corresponding attribute key for the user according to the user's attribute w Assuming that the attrib...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy-protective encrypted data sharing method based on a block chain, which belongs to the technical field of cryptography and information security, and solves the problem that the block chain in the prior art is likely to cause privacy leakage. The present invention constructs two block chains, one alliance chain and one public chain, and realizes encrypted data sharing with privacy protection based on these two block chains. The specific contents include: system initialization, publishing shared data, data retrieval and data recovery. The invention is used to realize encrypted data sharing and privacy protection.

Description

technical field [0001] A privacy-protective encrypted data sharing method based on blockchain is used to realize encrypted data sharing while protecting the privacy of data users, and belongs to the field of cryptography and information security technology. Background technique [0002] The technical terms are explained below: [0003] 1. Secure Hash Function [0004] A secure hash function is a map of hash functions, which can be expressed as h: {0, 1} * → {0, 1} n . where {0, 1} * Represents a set of bit strings of any length, {0, 1} n Represents a set of n-bit strings of length, message x ∈ {0, 1} * The image h(x) is called the hash value of x. [0005] 2. Hash collision (Hash Collusion) [0006] If hash input x 1 ≠ x 2 , but the output value h(x 1 ) = h(x 2 ), this situation is called a "hash collision", which means that the hash inputs are not the same, but the two output values ​​are the same. [0007] 3. Decisional Modified Bilinear Diffie-Hellman (MBDH) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/62
CPCH04L63/045H04L63/06G06F21/6227H04L9/50
Inventor 王艳平张小松牛伟纳张钶旋张洪彬彭钰杰
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA