Unlock instant, AI-driven research and patent intelligence for your innovation.

Decryption outsourcing method and system supporting strategy hiding based on block chain

A blockchain and policy technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as single point of failure, excessive power, etc., to avoid user privacy leakage defects, ensure fairness and credibility, The effect of reducing the computational overhead of data decryption

Active Publication Date: 2022-06-21
SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN +2
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in most CP-ABE-based access control schemes, ciphertext and access policies are stored in centralized cloud servers. Although access control policies are formulated by data owners, access control to users is controlled by centralized cloud servers. Server execution, with flaws such as excess power and single point of failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption outsourcing method and system supporting strategy hiding based on block chain
  • Decryption outsourcing method and system supporting strategy hiding based on block chain
  • Decryption outsourcing method and system supporting strategy hiding based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] (3) Divide the attributes in the access policy into two parts: the attribute name and the attribute value, make the attribute name public, and embed the more sensitive attribute value into the ciphertext.

[0032] calculate

[0033] Among them, g is the parameter in PK, α, a, β, g 1 is the parameter in MK; e(g,g 1 ) is the mapping group of elements in group G G T The bilinear pairing operation in , Calculate the hash value to prevent Tampered and used to verify the converted ciphertext.

[0034] Step 4: The data owner deploys the smart contract, generates a storage transaction, and stores the plaintext hash value, key ciphertext, and explicitly stored attribute name matrix and mapping function tuple sent to the blockchain;

[0035] The data owner computes a digest of the plaintext of the data , the storage address of the data ciphertext , data ciphertext digest , key ciphertext and access policy common summary of

[0036] Step 402: After the stora...

Embodiment 2

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of data security, and provides a block chain-based decryption outsourcing method and system supporting policy hiding, attributes in an access policy are divided into attribute names and attribute values, and the more sensitive attribute values are embedded into a ciphertext to hide the access policy, so that the security of the access policy is improved. Therefore, the defect of user privacy leakage caused by explicit storage of the access strategy is avoided; realizing distributed fine-grained access control on the user by utilizing a block chain; a decryption process is divided into two layers, firstly, a third-party server converts a ciphertext, and a user can recover a plaintext message only by performing one power operation, so that the data decryption calculation overhead of the user can be effectively reduced; and the returned third-party outsourcing conversion result is automatically compared with the verification ciphertext stored in the block chain by using the smart contract, so that public verification of outsourcing calculation is realized, the correctness of the third-party outsourcing calculation result can be verified, and the fairness and credibility of verification operation are ensured.

Description

technical field [0001] The invention belongs to the technical field of data security, and in particular relates to a decryption outsourcing method and system based on a block chain that supports policy hiding. Background technique [0002] The data presents the characteristics of explosive growth and mass aggregation. The limited local storage space is difficult to store the increasing mass data. Many individuals and organizations choose to outsource and store data to cloud service providers with abundant storage and computing resources. [0003] The current outsourcing method has the following technical problems. On the one hand, because cloud service providers generally provide centralized storage, it is easy to have a single point of failure. On the other hand, after the unencrypted data is outsourced to the cloud service provider, the data The owner loses the right to manage and control the data, which may lead to security risks such as data leakage. [0004] Access con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/40H04L67/1097G06F16/27
CPCH04L9/083G06F16/27H04L67/1097H04L63/10
Inventor 徐淑奖钟金荣王连海张淑慧
Owner SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN