Decryption outsourcing method and system supporting strategy hiding based on block chain
A blockchain and policy technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as single point of failure, excessive power, etc., to avoid user privacy leakage defects, ensure fairness and credibility, The effect of reducing the computational overhead of data decryption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0031] (3) Divide the attributes in the access policy into two parts: the attribute name and the attribute value, make the attribute name public, and embed the more sensitive attribute value into the ciphertext.
[0032] calculate
[0033] Among them, g is the parameter in PK, α, a, β, g 1 is the parameter in MK; e(g,g 1 ) is the mapping group of elements in group G G T The bilinear pairing operation in , Calculate the hash value to prevent Tampered and used to verify the converted ciphertext.
[0034] Step 4: The data owner deploys the smart contract, generates a storage transaction, and stores the plaintext hash value, key ciphertext, and explicitly stored attribute name matrix and mapping function tuple sent to the blockchain;
[0035] The data owner computes a digest of the plaintext of the data , the storage address of the data ciphertext , data ciphertext digest , key ciphertext and access policy common summary of
[0036] Step 402: After the stora...
Embodiment 2
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


