Multi-authority attribute-based encryption method based on blockchain

An attribute-based encryption and blockchain technology, applied in user identity/authority verification and key distribution, can solve problems such as inability to dynamically and efficiently manage user attributes, not meeting forward or backward security, and difficulty in realizing user revocation. , to achieve the effect of realizing user attribute revocation, avoiding single point of failure, ensuring forward security and backward security

Active Publication Date: 2021-07-30
NANTONG UNIVERSITY
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these MA-ABE schemes have only been shown to be selectively safe
In practical applications, the user's attribute private key needs to be revoked, and the existing user revocation mechanism needs to increase a large amount of computing overhead, and it is di

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-authority attribute-based encryption method based on blockchain
  • Multi-authority attribute-based encryption method based on blockchain
  • Multi-authority attribute-based encryption method based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] see Figure 1 to Figure 5 , the technical solution provided by the present invention is that this embodiment provides a blockchain-based multi-authority attribute-based encryption method, such as figure 1 As shown, including: system global initialization, the system administrator enters a system security parameter λ, generates the system global public parameter GP, and records the GP into the genesis block, initializes the attribute authority, and all attribute authority is obtained from the genesis block Read GP, assuming that any attribute authority manages a set of attributes P, for each attribute i∈P, the attribute authority generates a pair of attribute public key and attribute private key Property private keys must be kept secret and attribute the public key recorded on the blockchain.

[0065] Described encryption method specifically comprises the following steps:

[0066] S30. To encrypt data, the encryptor first selects a symmetric key K for the data M...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-authority attribute-based encryption method based on a blockchain, which comprises the following steps of: globally initializing a system, generating a system general parameter (GP), and recording the GP into a genesis block; initializing attribute authority, wherein all the attribute authority generates a group of attribute public and private keys by using the GP; encrypting data, wherein an encryptor generates a data ciphertext and a key ciphertext by using symmetric encryption and attribute encryption algorithms; generating a user private key, wherein the attribute authority generates a group of attribute private keys for the user; decrypting the data, wherein the user decrypts the ciphertext by using the attribute private key to obtain shared data; and revoking the attribute, wherein due to user attribute revocation, an attribute set does not meet an access strategy, and a updated ciphertext address cannot be obtained. According to the invention, the blockchain is utilized to record the time sequence attribute state of the user, so that distributed distribution, storage and revocation of the attribute private key are realized, the key management efficiency of a distributed attribute-based encryption mechanism is improved, and the security of data sharing in a distributed environment is enhanced.

Description

technical field [0001] The invention relates to the field of attribute-based encryption and block chain technology, in particular to a multi-authoritative attribute-based encryption method based on block chain. Background technique [0002] With the development of Internet and cloud computing technology, more and more sensitive data are shared and stored in untrusted third-party servers, and its security issues have aroused great concern. The traditional public key encryption mechanism can only achieve coarse-grained access control, and its efficiency is low. Therefore, Sahai and Waters first proposed the concept of fuzzy identity-based encryption (Fuzzy Identity-Based Encryption, FIBE) in 2005 on the basis of identity-based encryption mechanism, and introduced the concept of attribute-based encryption mechanism (Attribute-Based Encryption, ABE ). Different from the traditional IBE mechanism, the identity of each user is described by a set of characteristic attributes. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0894H04L9/0869H04L9/3249H04L63/0435H04L9/50
Inventor 马海英孙国荣李金舟曹东杰黄双龙
Owner NANTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products