Proxy re-encryption method and system for data sharing community

A technology of proxy re-encryption and data sharing, applied in the field of blockchain community applications, it can solve the problems of troublesome data sharers and lose the meaning of cloud data sharing, achieve high traceability, solve performance bottlenecks, and improve confidentiality.

Pending Publication Date: 2022-01-21
BEIHANG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the data owner downloads the ciphertext and decrypts it, then encrypts and shares it with the public key of the dat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy re-encryption method and system for data sharing community
  • Proxy re-encryption method and system for data sharing community
  • Proxy re-encryption method and system for data sharing community

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0056] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The following examples are intended to illustrate the invention, but not to limit the scope of the invention.

[0057] Example buy a

[0058] See figure 1 A proxy re-encryption method for data sharing community, the community data sharing, proxy re-encryption technology has been applied in two processes, namely data encryption and data decryption. The present embodiment relates to the application proxy re-encryption technology embodied in the community, data encryption and decryption specific steps are as follows:

[0059] Step 1: A sharer file using encrypted data files in the locally generated line AES symmetric key S sysKey Data encryption, the data encrypted ciphertext F sysEn , As shown in Equation (1):

[0060] Fly sysEn = E AESencryption (File, S sysKey )#(1)

[0061] Where E AESencryption AES is a symmetric encryption algorithm;

[0062] Step 2: The user public key pk data register as a shared community, will generat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a proxy re-encryption method for a data sharing community, the method comprises the following steps: a sharer A performs data encryption on a data file file by using an AES symmetric key SsysKey generated by an encryptor in a local offline manner, and an encrypted data ciphertext FsysEn is obtained; when a user registers the data sharing community, a corresponding public key pk'a and a corresponding private key sk'a are generated, the public key pka of a sharer is used for encrypting a symmetric key SsysKey, and the encrypted symmetric key is SsysKey AE; the data demander B sends a personal public key pkb of the data demander B to the sharer A, and the sharer generates a re-encryption key SreEnKey by using a personal private key ska of the sharer; the re-encryption key SreEnKey and the encrypted symmetric key SsysKeyAE are sent to a third-party semi-trusted agent to carry out agent re-encryption, and a re-encryption ciphertext SReEnCiphetext is obtained; the data demander B uses a personal private key skb of the data demander B to decrypt the re-encrypted ciphertext SReEnCiphetext to obtain an AES symmetric key of the encrypted data; and the data demander B decrypts the data ciphertext FsysEn by using the symmetric key SsysKey to obtain a final result data original text file.

Description

technical field [0001] The invention belongs to the technical field of blockchain community applications, and in particular relates to a proxy re-encryption method and system for data sharing communities. Background technique [0002] At present, data trading platforms generally have a low degree of data sharing, and users are not very willing to share data. This is because there is a lack of trust among users, and there is a lack of corresponding incentive mechanisms and economic interests. The blockchain has the characteristics of decentralization and non-tampering, which provide new solutions for solving social trust problems. For users who are not willing to share and community governance is not transparent, existing technologies include group governance voting governance mechanisms based on blockchain smart contracts, and incentive mechanisms for community data sharing based on evolutionary game theory and blockchain smart contract technology. Solved the problem of low...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F16/182H04L9/06
CPCG06F21/602G06F16/1834G06F21/604H04L9/0631
Inventor 胡凯张伯钧
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products