Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Proxy re-encryption method and system for data sharing community

A technology of proxy re-encryption and data sharing, applied in the field of blockchain community applications, it can solve the problems of troublesome data sharers and lose the meaning of cloud data sharing, achieve high traceability, solve performance bottlenecks, and improve confidentiality.

Pending Publication Date: 2022-01-21
BEIHANG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the data owner downloads the ciphertext and decrypts it, then encrypts and shares it with the public key of the data receiver, which undoubtedly brings a lot of trouble to the data sharer, and also loses the meaning of cloud data sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy re-encryption method and system for data sharing community
  • Proxy re-encryption method and system for data sharing community
  • Proxy re-encryption method and system for data sharing community

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0057] buy example one

[0058] see figure 1 , a proxy re-encryption method used in the data sharing community. In the data sharing community, the proxy re-encryption technology is applied in two processes, namely data encryption and data decryption. This embodiment involves the application of proxy re-encryption technology in the community. The specific steps of data encryption and decryption are as follows:

[0059] Step 1: Sharer A uses the AES symmetric key S generated by the encryptor to use the data file file offline locally sysKey Perform data encryption, and the encrypted data ciphertext F sysEn , as shown in formula (1):

[0060] f sysEn =E AESencryption (f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy re-encryption method for a data sharing community, the method comprises the following steps: a sharer A performs data encryption on a data file file by using an AES symmetric key SsysKey generated by an encryptor in a local offline manner, and an encrypted data ciphertext FsysEn is obtained; when a user registers the data sharing community, a corresponding public key pk'a and a corresponding private key sk'a are generated, the public key pka of a sharer is used for encrypting a symmetric key SsysKey, and the encrypted symmetric key is SsysKey AE; the data demander B sends a personal public key pkb of the data demander B to the sharer A, and the sharer generates a re-encryption key SreEnKey by using a personal private key ska of the sharer; the re-encryption key SreEnKey and the encrypted symmetric key SsysKeyAE are sent to a third-party semi-trusted agent to carry out agent re-encryption, and a re-encryption ciphertext SReEnCiphetext is obtained; the data demander B uses a personal private key skb of the data demander B to decrypt the re-encrypted ciphertext SReEnCiphetext to obtain an AES symmetric key of the encrypted data; and the data demander B decrypts the data ciphertext FsysEn by using the symmetric key SsysKey to obtain a final result data original text file.

Description

technical field [0001] The invention belongs to the technical field of blockchain community applications, and in particular relates to a proxy re-encryption method and system for data sharing communities. Background technique [0002] At present, data trading platforms generally have a low degree of data sharing, and users are not very willing to share data. This is because there is a lack of trust among users, and there is a lack of corresponding incentive mechanisms and economic interests. The blockchain has the characteristics of decentralization and non-tampering, which provide new solutions for solving social trust problems. For users who are not willing to share and community governance is not transparent, existing technologies include group governance voting governance mechanisms based on blockchain smart contracts, and incentive mechanisms for community data sharing based on evolutionary game theory and blockchain smart contract technology. Solved the problem of low...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F16/182H04L9/06
CPCG06F21/602G06F16/1834G06F21/604H04L9/0631
Inventor 胡凯张伯钧
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products