scispace - formally typeset
Patent

Block chain privacy data access control method based on attribute encryption

Reads0
Chats0
TLDR
Li et al. as mentioned in this paper proposed a block chain privacy data access control method based on attribute encryption, which mainly solves a problem in the prior art that the real identity of a user in the block chain is anonymously protected but the and transaction privacy information is not encrypted so as to cause privacy leakage.
Abstract
The invention discloses a block chain privacy data access control method based on attribute encryption, which mainly solves a problem in the prior art that the real identity of a user in the block chain is anonymously protected but the and transaction privacy information is not encrypted so as to cause privacy leakage. The method comprises the steps that 1. a system is initialized; 1, a user registers to obtain attribute information; 3, an authoritative center, according to the user attribute information, distributes a user private key; 4 a transaction party encrypts transaction privacy data and uploads the transaction privacy data to a block chain; 5, an accountant verifies the transaction information and performs the transaction; 6, a supervisory center is authorized to use the authorized private key to decrypt and check the transaction ciphertext. The method encrypts the transaction privacy information, avoids the leakage of data privacy and can be used for privacy protection of the virtual asset transaction data in the block chain.

read more

Citations
More filters
Patent

Method and system for privacy protection of block chain transaction

TL;DR: In this article, the authors proposed a method and system for privacy protection of block chain transaction, where a transaction group is established between nodes of a block chain system, a user establishes an account at a node, and the node generates public and private key information of the account and then joining of a group is carried out; a transaction request node encrypts transaction information by using a broadcast encryption algorithm, carries out group signature processing on the encrypted transaction information, and then broadcasts the transaction information after broadcast encryption and group signatures processing.
Patent

Data sharing method and system, blockchain system, and computing equipment

TL;DR: In this article, a data sharing method and system, a blockchain system, and computing equipment are described, and the advantages that costs and resource input can be greatly reduced, and global sharing control for the data can be achieved.
Patent

Method for storing and sharing secure files based on blockchain

TL;DR: Wang et al. as mentioned in this paper proposed a method for storing and sharing secure files based on a blockchain, and uses the blockchain technology to realize secure storage and sharing of files, where a user encrypts and uploads the files to obtain a file pointer, and acquires the partial file as the excitation after the accounting node writesthe information such as the formulated access policy and the pointer into a blockchain account.
Patent

Supervisory blockchain system and method

TL;DR: In this paper, a supervisory blockchain system and method is proposed, which consists of a certificate authority, a key distribution center (KDC), a supervision department and a common node, wherein the CA performs identity authentication for the common node to generate registration information about the node, and the registration information is opened to a blockchain network and waits to be written into a blockchain to complete the registration of the node.
Patent

Zero knowledge proving method suitable for protecting privacy of block chain, and medium

TL;DR: In this article, a zero-knowledge proving method for protecting the privacy of a block chain, and a medium was proposed, which can be combined with a smart contract, and aiming at a zero knowledge certificate designed by a specific algebraic structure of a transaction.
References
More filters
Patent

Attribute-based access-controlled data-storage system

Yacov Yacobi
TL;DR: The current application is directed to computationally efficient attribute-based access control that can be used to secure access to stored information in a variety of different types of computational systems.
Patent

Hierarchical attribute encryption method

Li Xuejun, +2 more
TL;DR: In this article, the authors proposed a hierarchical attribute encryption method, which comprises a first step of inputting an attribute set U firstly, and then selecting a mixed order bilinear composite group and obtaining a public parameter PK and a master secret key (MSK) according to the mixed order composite group, wherein attributes are in different hierarchies; a second step of inputs the public parameter (PK), a message (M) and an improved access structure (MV, rho), and a ciphertext (CT), wherein the function rho represents a map from lines
Patent

Verifiable outsourcing attribute-based encryption method based on linear secret sharing

TL;DR: In this article, a verifiable outsourcing attribute-based encryption method based on linear secret sharing is proposed. But the method does not support the direct canceling of a user, and combines a proxy re-encryption technology with an outsourcing decryption technology.
Patent

High-efficiency secret key distribution method based on attribute encryption

TL;DR: In this paper, a high-efficiency secret key distribution method based on attribute encryption is proposed, where the life cycle of the system is divided into a plurality of time fragments, and in case of attribute cancelation or secret key leakage, forward and backward security of a system can be ensured through updating the private keys of valid users.