Patent
Block chain privacy data access control method based on attribute encryption
Reads0
Chats0
TLDR
Li et al. as mentioned in this paper proposed a block chain privacy data access control method based on attribute encryption, which mainly solves a problem in the prior art that the real identity of a user in the block chain is anonymously protected but the and transaction privacy information is not encrypted so as to cause privacy leakage.Abstract:
The invention discloses a block chain privacy data access control method based on attribute encryption, which mainly solves a problem in the prior art that the real identity of a user in the block chain is anonymously protected but the and transaction privacy information is not encrypted so as to cause privacy leakage. The method comprises the steps that 1. a system is initialized; 1, a user registers to obtain attribute information; 3, an authoritative center, according to the user attribute information, distributes a user private key; 4 a transaction party encrypts transaction privacy data and uploads the transaction privacy data to a block chain; 5, an accountant verifies the transaction information and performs the transaction; 6, a supervisory center is authorized to use the authorized private key to decrypt and check the transaction ciphertext. The method encrypts the transaction privacy information, avoids the leakage of data privacy and can be used for privacy protection of the virtual asset transaction data in the block chain.read more
Citations
More filters
Patent
Method and system for privacy protection of block chain transaction
TL;DR: In this article, the authors proposed a method and system for privacy protection of block chain transaction, where a transaction group is established between nodes of a block chain system, a user establishes an account at a node, and the node generates public and private key information of the account and then joining of a group is carried out; a transaction request node encrypts transaction information by using a broadcast encryption algorithm, carries out group signature processing on the encrypted transaction information, and then broadcasts the transaction information after broadcast encryption and group signatures processing.
Patent
Data sharing method and system, blockchain system, and computing equipment
TL;DR: In this article, a data sharing method and system, a blockchain system, and computing equipment are described, and the advantages that costs and resource input can be greatly reduced, and global sharing control for the data can be achieved.
Patent
Method for storing and sharing secure files based on blockchain
TL;DR: Wang et al. as mentioned in this paper proposed a method for storing and sharing secure files based on a blockchain, and uses the blockchain technology to realize secure storage and sharing of files, where a user encrypts and uploads the files to obtain a file pointer, and acquires the partial file as the excitation after the accounting node writesthe information such as the formulated access policy and the pointer into a blockchain account.
Patent
Supervisory blockchain system and method
Zhang Rui,Yuting Xiao,Ma Hui +2 more
TL;DR: In this paper, a supervisory blockchain system and method is proposed, which consists of a certificate authority, a key distribution center (KDC), a supervision department and a common node, wherein the CA performs identity authentication for the common node to generate registration information about the node, and the registration information is opened to a blockchain network and waits to be written into a blockchain to complete the registration of the node.
Patent
Zero knowledge proving method suitable for protecting privacy of block chain, and medium
TL;DR: In this article, a zero-knowledge proving method for protecting the privacy of a block chain, and a medium was proposed, which can be combined with a smart contract, and aiming at a zero knowledge certificate designed by a specific algebraic structure of a transaction.
References
More filters
Patent
Attribute-based access-controlled data-storage system
TL;DR: The current application is directed to computationally efficient attribute-based access control that can be used to secure access to stored information in a variety of different types of computational systems.
Patent
Hierarchical attribute encryption method
Li Xuejun,Zhao Pei,Li Hui +2 more
TL;DR: In this article, the authors proposed a hierarchical attribute encryption method, which comprises a first step of inputting an attribute set U firstly, and then selecting a mixed order bilinear composite group and obtaining a public parameter PK and a master secret key (MSK) according to the mixed order composite group, wherein attributes are in different hierarchies; a second step of inputs the public parameter (PK), a message (M) and an improved access structure (MV, rho), and a ciphertext (CT), wherein the function rho represents a map from lines
Patent
Verifiable outsourcing attribute-based encryption method based on linear secret sharing
TL;DR: In this article, a verifiable outsourcing attribute-based encryption method based on linear secret sharing is proposed. But the method does not support the direct canceling of a user, and combines a proxy re-encryption technology with an outsourcing decryption technology.
Patent
High-efficiency secret key distribution method based on attribute encryption
TL;DR: In this paper, a high-efficiency secret key distribution method based on attribute encryption is proposed, where the life cycle of the system is divided into a plurality of time fragments, and in case of attribute cancelation or secret key leakage, forward and backward security of a system can be ensured through updating the private keys of valid users.