[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109189727A - A kind of block chain ciphertext cloud storage sharing method based on property broker re-encryption - Google Patents

A kind of block chain ciphertext cloud storage sharing method based on property broker re-encryption Download PDF

Info

Publication number
CN109189727A
CN109189727A CN201811072783.9A CN201811072783A CN109189727A CN 109189727 A CN109189727 A CN 109189727A CN 201811072783 A CN201811072783 A CN 201811072783A CN 109189727 A CN109189727 A CN 109189727A
Authority
CN
China
Prior art keywords
information
node
ciphertext
encryption
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811072783.9A
Other languages
Chinese (zh)
Other versions
CN109189727B (en
Inventor
张小红
孙岚岚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Internet Service Co ltd
Jingchuang United Beijing Intellectual Property Service Co ltd
Original Assignee
Jiangxi University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi University of Science and Technology filed Critical Jiangxi University of Science and Technology
Priority to CN201811072783.9A priority Critical patent/CN109189727B/en
Publication of CN109189727A publication Critical patent/CN109189727A/en
Application granted granted Critical
Publication of CN109189727B publication Critical patent/CN109189727B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

A kind of block chain ciphertext cloud storage sharing method based on property broker re-encryption, the present invention is on the basis of proxy re-encryption and attribute base encryption technology, propose a kind of block chain ciphertext storage sharing concept of property broker re-encryption for supporting keyword retrieval, metadata ciphertext is separated into storage with prime information ciphertext by property broker re-encryption algorithm, the book keeping operation power of node is determined using the Pool verifying pond mechanism in block chain technology, it introduces information exchange contract to audit user identity, and tranaction costs is cleared automatically.Safety and experimental analysis show: present invention reduces encryptions, decryption duration, alleviate cloud storage high frequency access pressure.When attribute number is 100, consumption is 1.69s when the decryption again of system, and the execution efficiency of system improves 19.04%~49.68%.The present invention has stronger resistance against colluders, has a good application prospect in current internet of things field.

Description

A kind of block chain ciphertext cloud storage sharing method based on property broker re-encryption
Technical field
The invention belongs to the cryptological techniques and intelligence contract technology in block chain technical field, are related to solving cloud system The method of middle information security storage sharing problem.
Background technique
With cloud computing, the rapid development of Internet of Things (Internet Of Things, IOT) technology, cloud storage becomes A kind of most common network storage service.Currently, cloud storage shared system is centralization mostly, provided in third party cloud service Managing personal information with the help of quotient (Cloud Service Provider, CSP), but this method not only needs largely to lead to Believe expense, the calculating cost of great number, and open and clearization of Internet of Things faces the integrality, accuracy, confidentiality of information Seriously threaten.
In order to better ensure that information security and integrality, Hong et al. is from the angle for reducing information owner management complexity Degree sets out, and devises a kind of privacy sharing model of mixed cloud re-encryption based on encryption attribute, realizes highly efficient move State ciphertext access control.Seo et al. devises a kind of proxy re-encryption method based on attribute, by traditional proxy re-encryption with The encryption of attribute base combines, and so that information owner is authorized specified user and decrypts the close of re-encrypted according to the attribute of user Text.All of above research realizes that the secure interactive of information plays positive effect, but do not support to the confidentiality for guaranteeing information Keyword retrieval function causes certain obstruction for efficient information sharing.Shi et al. is proposed one kind and can be examined based on public key The property broker re-encryption model of rope keyword does not support the decryption of original cipher text and re-encryption ciphertext.Liang et al. with The property broker re-encryption model of the support keyword retrieval based on key strategy of its design is demonstrated under machine oracle model, But the calculating cost of the invention is larger.All researchs set forth above are to use centralized management mode, all users' Information concentrates in resource pool, is managed collectively using specific software to information pressure by third party CSP, CSP's is soft or hard Once part is likely to result in information loss, leakage or even service disruption failure or under attack.
The appearance of block chain (Blockchain, BC) technology for people provide a kind of decentralization, can not distort, can not It forges, the distribution management method of collective's maintenance.This acute hearing has been put forward for the first time one and can be used as in American foreign citizen of Japanese origin scholars in 2008 The block chain concept of public account book, it is the technologies phases such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm The new application mode of fusion.Block chain technology is verified using block linked data structure and storing data, is saved using distribution Point common recognition algorithm guarantees the safety of data transmission and access with more new data, the mode of combining cipher to generate, and by automatic Change the intelligent contract of scripted code composition to program the distributed basis framework and calculation paradigm completely new with one kind of operation data. It is a kind of shared opening for meeting the internet of things era, fair competition, the true fundamental characteristics such as complete, safe and reliable bit coin Floor layer Technology.
Summary of the invention
The present invention assuming that all information owners be all it is trusty, sharing request person be it is non-believable, i.e., it is shared to ask It can be proposed a kind of based on property broker weight with collusion, under the premise of the user information of unauthorized access unauthorized between the person of asking The block chain cloud storage sharing method of encryption, it has merged block chain technology and cryptological technique is a kind of shared with existing information The technology that system is mutually compatible with.Simulation result shows that the present invention has lower be calculated as than existing information storage technology of sharing Sheet and communication overhead, and user is more able to satisfy to the safety of information and the demand of confidentiality.
The present invention is achieved by the following technical solutions.
A kind of block chain ciphertext cloud storage sharing method based on property broker re-encryption of the present invention, by following step It is rapid:
(S01): before carrying out information storage, system formulates intelligent contract first, and is signed jointly by information user.
(S02): information owner Alan sends storage request, verifies the transmission that pond common recognition mechanism is chosen by Pool and leads section Masses node T of the point T into oneself clusternThe validity of verifying broadcasts information and user identity.
If 1) be temporarily stored in the log of oneself after effectively, extracting data by transmission leader node T;
If 2) invalid, " illegal user " is fed back.
(S03): masses node T of the transmission leader node T into all clustersnCopy Info and wait-for-response, in determination The node that at least cluster internal alreadys exceed half quantity has received after information again to information owner's Alan confirmation message It is received, it indicates that information is at this time after information owner Alan receives confirmation message and has been filed on state, T is again to TnHair Notice informs that the data mode has been filed on.In the process, information owner Alan need to submit information offer and it is customized with Machine character string obtains information sharing remuneration in order to user, and provides certain credit as guarantee fund, to avoid falseness, Phenomena such as plagiarism.
(S04): transmission node sends storage information to memory node, from being responsible for the leader node M of storage to oneself cluster Interior MiBroadcast storage request.After determining more than the completion storage of half node, to information owner's Alan feedback information, this is deposited Storage process terminates.
(S05): sharing request person Bill sends sharing request, before information sharing, storage leader node M in cluster to Masses' node M in oneself clusteriVerifying broadcasts user identity, determines whether it meets Cryptograph Sharing permission.
If 1) meet, from node M of the leader node M into oneself clusteriBroadcasting share request;
2) if it is not, then feeding back " illegal user ".
(S06): the keyword w provided according to sharing request person Bill, calculating will after metadata ciphertext CT in block chain It is converted into meeting the ciphertext CT of the Share Permissions of sharing request person Bill using proxy re-encryption technologyB
1) system generates corresponding search password TK according to public key PK, keyword w and obtains search result information and each information Corresponding quotation.
2) sharing request person Bill credit and user sharing information price are determined, if credit is more than or equal to information valence Lattice then enter ciphertext and convert the stage;Otherwise, " Sorry, your ticket has not enough value " is fed back.
(S07): transmission leader node T T into all clustersnNode Copy Info and wait-for-response.At least collect in determination After the internal node for alreading exceed half quantity of group has received information, to memory node confirmation message after indicate that at this time Information is in transmission state.
(S08): transmission node sends the metadata ciphertext obtained by keyword searching ciphertext to sharing request person Bill CT, and the storage location LC by obtaining information after decryption, thus in corresponding position download decryption prime information ciphertext CTA, obtain Information plaintext m.
(S09): system makees corresponding adjust and according to the data of feedback according to information exchange situation, to the credit of user Carry out credit clearing.
Steps are as follows for more specific realization of the invention:
The present invention is mainly around three roles: cloud storage, information owner, sharing request person are designed, and Fig. 1 is this hair Bright proposition block chain ciphertext storage system illustraton of model, Fig. 2 are that the present invention proposes block chain cipher-text information shared system illustraton of model, tool Body character design is as follows:
1) cloud storage: it is responsible for providing memory space, user can buy corresponding memory space to CSP, convenient for storage Record information.
2) information owner: all users possess the permission of record storage information in system, to information can encrypt and pre- Share Permissions are first set, and only sharing request person could decrypt under the premise of meeting shared information permission obtains key, to obtain The original plaintext message that the breath owner that wins the confidence shares, it is assumed that information owner is Alan.
3) sharing request person: user can initiate shared information request to information owner or local node in system, it is assumed that Sharing request person is Bill.Symbol used in the present invention is as shown in table 1:
1 denotational description of table
Step 1: creation contract.
1) contract founder converts binary system contract for the contract with user property aggregating characteristic using high-level language Code, is recorded in local network;
2) manager convenes all local users to sign contract;
3) after node confirmation signature, through ether mill deploying virtual machine in the block chain of ether mill;
4) contract address and call instruction are fed back into contract user
Step 2: election leadership's node, and verify the legitimacy of user identity.
It in the block catenary system of decentralization, is independent from each other between node, by knowing together, mechanism algorithm reaches " letter Appoint ", each node realizes the unification of internal system information under the premise of meeting self benefits.It is verified in the present invention according to Pool All nodes are divided into two classes: memory node, transmission node by the working principle of pond common recognition mechanism, and actual needs.Each section Point can be at three kinds of states: leader node, election contest node and masses' node.
1) before in the initial state, information owner sends storage request, all participation nodes are all masses' nodes.
2) before being not received by leader node order, all masses' nodes can select by way of democracy is voted Leader node is taken, who gets the most votes within the time of 150-300ms, and person's election contest node is chosen as leader node.
3) once campaigning for successfully, leader node can be according to all masses' nodes of tissue cluster internal of Raft agreement to system Internal newest Transaction Information is transmitted, is stored;Remaining node becomes masses' node again automatically, and the instruction for obeying leader node is complete At assigned work.
Step 3: information owner Alan submits information and provides certain guarantee gold and the shared report of user information to system Reward, node is after the validity of confirmation transaction, cluster internal node Copy Info, after most node completion tasks and to information Owner's Alan feedback information.
Step 4: the information that node is provided according to information owner Alan generates cipher-text information CTA, metadata Data → LC, W, IN }, ciphertext CT, and storage request is broadcasted in cluster internal, after the most nodes of determination have completed storage, to information category Main Alan feeds back storage result, and storage is completed.
The present invention realizes encryption, the decrypting process of information, wherein information is encrypted by property broker Re-encryption Technology Journey is as follows:
1) system initialization: Setup (λ, U) → (GP, MSK, PK)
Given system security parameter λ, system property set U, then constructing addition cyclic group G, g that order is p is the life of G Cheng Yuan, and exist and meet bilinear map e:G × G → GT, randomly select an integer and meet g1∈ G, and following target is set Hash hash function H1:(0,1)2k→Zp, H2:(0,1)2k→GT, H3:(0,1)*→ G, H4:(0,1)*→ G, H5:(0,1)k→Zp, H6:(0,1)*→ G randomly selects different integer α, a ∈ Zp, Z=e (g, g) randomly selects integer hx∈ZpIt calculatesWherein x ∈ U.
Wherein, GP indicates system common parameter, and MSK indicates that system master key, PK indicate system public key.
Key generation phase: KeyGen (GP, PK, MSK, SA)→(SKA,PKA)
Input common parameter GP, system master key MSK, information owner's Alan attribute setRandomly choose integer t∈Zp, and generate the corresponding private key SK of information owner AlanA、PKA
Similarly, the private key SK of sharing request person Bill is generatedB、PKB
2) re-encrypted private key generating algorithm: RekeyGen (GP, SKA,(M',ρ'),PKB)→rkA→B
Information owner Alan takes an integer θ ∈ Z at randomp, and calculate gθAccording to the attribute of sharing request person Bill Set SBIt constructs shared structure (M', ρ '), in conjunction with common parameter GP, the corresponding private key SK of information owner AlanA, sharing request person The private key PK of BillB, calculate re-encrypted private key rkA→B
rkA→B=(SA,rk1,rk2,rk3,rk4,Rx)(4)
Wherein M' is the matrix of a l' × n', and the row of matrix M' is mapped to attribute by function ρ '.Integer s is randomly selected, y2,...,yn∈ZpConstitute ZpOne column vectorIt calculatesWherein s indicates that information owner is total The secret enjoyed, Mi' the i-th row of homography M' vector, { εiIt is Mi'Live part, I={ i: ρ ' (i) ∈ SA,1≤i ≤ l'} indicates the attribute used in shared structure (M', ρ ').
3) information encrypts:
First step prime information encryption: input public key PKA, information owner inputs information plaintext m, and pre-set setting reads It lookes at, Share Permissions (M, ρ), calculates ciphertext CTA, and cipher-text information is stored in Cloud Server.
Second step metadata encryption: input system public key PK and pre-set reading, Share Permissions (M, ρ), member Data Data → { LC, w, IN }, wherein LC indicates storage location of the raw information ciphertext in cloud, and w is the keyword of information, IN is the project number of information, and raw information ciphertext decruption key k' exports ciphertext CT, and is stored in block chain.
Ciphertext re-encryption algorithm: ReEncrypt (rkA→B,CT,PKB, (M', ρ ')) and → CTB
Node first determines whether sharing request person Bill is system contract user, if so, random selection δ ∈ GTAnd it counts It calculates:
Then according to re-encrypted private key rkA→B, ciphertext CT calculates the important component φ of ciphertext, after final output re-encryption Ciphertext CTB
Wherein, ωi∈ZpAnd meet
Step 5: sharing request person Bill sends sharing request, and after confirming identity validity, node is according to sharing request person The keyword that Bill is provided generates index code, and search password.
Index generates and keyword retrieval:
Index generates: inputting common parameter GP, the keyword w of information m, node calculates keyword w in raw informationAIt is corresponding Message authentication code kw and re-encryption information ciphertext CTBMiddle wB' corresponding authentication code kw', generate index code ID, ID';
Keyword retrieval: according to the corresponding private key SK of input sharing request person BillB, keyword wBAnd its corresponding search Key kw' exports keyword wACorresponding search password TK.
Step 6: metadata ciphertext CT being obtained according to index code and search password, then determines sharing request person Bill credit The relationship of coin and user sharing information price uses proxy re-encryption under the premise of being more than or equal to user sharing information price Technology is converted into meeting Share Permissions (M', ρ ') the ciphertext CT of sharing request person BillB
Step 7: transmission node Copy Info in cluster, being in for confirmation message has transmitted shape after the response of most nodes State.
Step 8: sending the metadata ciphertext CT that retrieval obtains to sharing request person Bill, and by obtaining information after decryption Storage location LC, thus in corresponding position download decryption prime information ciphertext CTA, obtain information plaintext m.
Information decrypting process is divided into following two step:
1) proxy re-encryption decipherment algorithm: ReDecrypt (SKB,CTB)→CT
The attribute set S of system verification sharing request person BillBCiphertext CT after whether meeting re-encryptionBIn shared knot Structure (M', ρ '), if satisfied, private key SK can be used in sharing request person BillBDecrypt the solution encrypted by ciphertext policy ABE base Decryption method recovers the important component φ of ciphertext, obtains CT and recovers raw information ciphertext decruption key k', Data.If discontented Foot is fed back " illegal user ".
User obtains prime information storage location LC and decruption key k' according to metadata Data, to CTADecryption restoration is in plain text Information m.
2) prime information ciphertext is decrypted: Decrypt (CTA,k',GP)→m
In the present invention, decruption key k' is only grasped by block chain and information owner Alan, in the case where unauthorized, is only believed Ceasing owner Alan can be to the raw information ciphertext CT on cloud storageA, utilize formula
Decryption obtains original plaintext message m.
Step 9: according to the actual conditions of information exchange, the credit of user being adjusted correspondingly.
1) guarantee fund of sharing request person Bill interactive not successfully is returned first.
2) Successful Transaction user information expense is then settled accounts according to transaction performance.
The present invention reduces user to the complexity of information management to improve the information security in existing information interactive process The angle of degree is set out, and combines existing attribute base Encryption Algorithm and proxy re-encryption algorithm, has been merged block chain technology, has been mentioned The shared mould of block chain cipher-text information storage a kind of shared compatible with conventional information storage, while supporting keyword retrieval is gone out Type.By property broker Re-encryption Technology, make information sharing that there is more flexible Compliance control characteristic.When information, owner is offline When, node can still complete information exchange work according to intelligent contract rule, realize the uninterrupted shared of information.Keyword is made For metadata a part there are on block chain, be convenient for information retrieval, improve the efficiency of information sharing, save to a certain extent About communications cost alleviates the pressure of cloud storage high frequency access.
Metadata ciphertext is separated storage with prime information ciphertext by the present invention, and resistance against colluders have been better achieved, ensure that The safety of information;The intelligent contract of information exchange is devised on the basis of block chain technology so that information sharing both sides without Need central authority participation that can spontaneously be communicated according to presetting agreement, it is ensured that the safety of ciphertext conversion and letter The shared high efficiency of breath.When information owner is offline, node can still complete information exchange work according to contract rule, realize The uninterrupted of information is shared.Resistance against colluders, execution efficiency and in terms of have more advantage, be more suitable for current Internet of things field demand for development.
Detailed description of the invention
Fig. 1 is that the present invention proposes block chain ciphertext storage system illustraton of model.
Fig. 2 is that the present invention proposes block chain cipher-text information shared system illustraton of model.
Fig. 3 is that the present invention proposes property broker re-encryption process schematic.
Fig. 4 is information exchange both sides contract execution flow chart of the present invention.
Fig. 5 is influence comparison diagram of the attribute number of the present invention to the system encryption time.
Fig. 6 is influence comparison diagram of the attribute number of the present invention to system decryption time.
Fig. 7 is influence comparison diagram of the attribute number of the present invention to the system re-encryption time.
Fig. 8 is influence comparison diagram of the attribute number of the present invention to system weight decryption time.
Specific embodiment
Illustrate the present invention in order to more detailed, it below will the invention will be further described with specific example.
Embodiment 1.Contract user information interaction example procedure in the present invention.
1) information owner Alan send storage request, while submit information offer and customized random string in order to User obtains information sharing remuneration.
2) masses node T of the transmission leader node T into oneself cluster in clusternVerifying broadcasts information and user identity Validity.If being temporarily stored in the log of oneself after effectively, extracting data by transmission leader node T;If nothing Effect, then feed back " illegal user ".
3) all masses node Ts of the transmission leader node T into clusternCopy Info and wait-for-response are determining at least The node that cluster internal alreadys exceed half quantity received after information again to information owner Alan confirmation message It receives, indicates that information is at this time after user receives confirmation message and have been filed on state, T is again to TnIt sends out public notice and informs the number It is had been filed on according to state.In the process, information owner Alan need to submit information offer and customized random string so as to Information sharing remuneration is obtained in user, and provides certain credit as guarantee fund, phenomena such as to avoid false, plagiarism.
4) transmission node sends storage information to memory node, from being responsible for M of the node M of storage into oneself clusteriExtensively Broadcast storage request.After determining more than the completion storage of half node, metadata Data is stored according to the Share Permissions (M, ρ) of setting → { LC, w, IN } obtains ciphertext CT, and to information owner's Alan feedback information, this time stores work and completes.
5) sharing request person Bill sends sharing request and submits certain credit to system to guarantee the true of request Validity.Masses node M of the storage leader node M into oneself cluster before information sharing, in clusteriVerifying broadcasts user Identity, determines whether it meets Cryptograph Sharing permission (M, ρ).If meeting, from node M of the leader node M into oneself clusteri Broadcasting share request.If it is not, then feeding back " illegal user ".
6) sharing request person Bill credit and user sharing information price are further determined that, if credit is more than or equal to letter Price is ceased, then enters ciphertext and converts the stage, be converted into according with using proxy re-encryption technology by it after obtaining number metadata ciphertext CT Amount to Share Permissions (M', ρ ') the ciphertext CT for enjoying requestor BillB.Otherwise, " Sorry, your ticket has not enough value " is fed back.
7) leader node T T into all clusters is transmittednNode Copy Info and wait-for-response.It is determining at least cluster After the node that portion alreadys exceed half quantity has received information, to memory node confirmation message after indicate that information at this time In transmission state.
8) transmission node sends the metadata ciphertext CT obtained by keyword searching ciphertext to sharing request person Bill, and By obtaining the storage location LC of information after decryption, thus in corresponding position download decryption prime information ciphertext CTA, it is bright to obtain information Literary m.
9) system is according to information exchange as a result, carrying out credit clearing to information exchange two parties according to the data of feedback Credit make the update situation of change of corresponding adjustment and confirmation message.User guarantee fund interactive not successfully is returned first, Then according to transaction performance, customer interaction information expense is settled accounts.
Embodiment 2.Information exchange intelligence contract implementation procedure.
It has been designed into a large amount of user and information in the present invention, in order to be more convenient trading processing, has been drawn sequentially in time It is divided into following several stages: contract publication, publication transaction, authentication, Security Checking, settlement of transactions.It is specifically stated in conjunction with Fig. 4 It is as follows:
1) formulate contract: contract founder converts two for the contract with user property aggregating characteristic using high-level language System contract code, is recorded in local network, while all local users being convened to sign contract, is confirmed by node and is signed Afterwards, through ether mill deploying virtual machine in the block chain of ether mill, and to user feedback contract address and call instruction.
2) publication transaction: information owner Alan according to the Share Permissions (M, ρ) that pre-set store metadata Data → { LC, w, IN } obtains ciphertext CT, meanwhile, information owner Alan submit information quotation and customized random string in order to Family obtains information sharing remuneration, and in the process, information owner Alan also needs to provide certain credit to contract address and makees For guarantee fund, to avoid it is false, plagiarize phenomena such as.
3) authentication: in the authentication stage, system is according to the attribute set S of sharing request person BillBWith set in advance The permission set (M, ρ) set carries out permission match, and result is submitted to intelligent contract.Intelligent contract is according to public key PK, pass Keyword w generates corresponding search password TK and obtains search result information and the corresponding quotation of each information.
4) Security Checking: in the Security Checking stage, intelligent contract determines sharing request person Bill credit and user sharing Information price enters ciphertext and converts the stage if credit is more than or equal to information price;Otherwise, " Sorry, your ticket has not enough value " is fed back.
5) settlement of transactions: system is according to information exchange as a result, making corresponding adjustment and confirmation message to the credit of user Update situation of change, then according to the data of feedback carry out credit clearing.User interactive not successfully is returned first to guarantee Gold settles accounts customer interaction information expense then according to transaction performance.
Embodiment 3.Safety analysis of the invention.
A) Security Proof of information exchange:
The present invention is to carry out Security Proof based on q-parallel BDHE difficulty problem, and judge bilinearity difficulty Property problem, if it is assumed that setting up, i.e. the opponent under random oracle modelAdvantageIt ignores, i.e., explanation should Invention is selection plaintext secure (CPA, Chosen Plaintext Attack).
If 1 present invention of theorem solve the problems, such as the advantage of q-parallel BDHE be it is negligible, claim q- Parallel BDHE assumes in (G, GT) set up, which is CPA safety under random oracle model.
It proves to assume that there are an attackersIn CPA game, its advantageIt can not ignore, oppose Hand wins safe game.Then construct a game challengerIf there is attackerIt is broken through under security model with the advantage of ξ CPA, it is only necessary to prove challengerIt can be by attackerProbability of the ability can not ignoreSolve prejudgementing character q- The problem of parallel BDHE.
Initial phase: game challengerIt will will receive from attackerShare Permissions structure (the M of transmission**)。
System establishment stage: challengerRandomly choose value χ ' a ∈ Zp, calculate: e (g, g)α=e (g, g)χ′e(g,gα) And GP and PK are sent to attacker
Inquiry phase 1: private key extracts the stage: attackerBy to challengerSubmit property setChallengerWith Machine chooses τ ∈ ZpCalculate (i, SKi), and by SKAIt is sent to attacker
Re-encrypted private key extracts the stage: with a property set SiKey is carried out with a Share Permissions structure (M', ρ ') to mention It takes, it is first determined whether meeting (M', ρ '), if satisfied, can then obtain private key SKA, then calculate rkA→B=(S, rk1,rk2, rk3,rk4,Rx), otherwise, challengerIt arbitrarily selects one and feeds back to attacker
The challenge stage: attackerThe message m of two sections of equal lengths is sent at random0And m1To challengerChallengerWith Machine extracts a bits attributes b ∈ (0,1), utilizes (M**) to mbEncryption obtains ciphertext CT and is sent to
Inquiry phase 2: the operation of inquiry phase 1 is repeated.
The conjecture stage:A b' ∈ (0,1) is provided to guess the challenger in the challenge stageThe b=0 or b=of selection 1, if conjecture is correct, i.e. b'=b, then A wins this game.If attackerGuess result b' ≠ b, then guesses mistake.We Define challengerAdvantage:
When output is 0, i.e.,It cannot get any about mbAny information, cannot restore in plain text, therefore guess correct Probability beWhen output is 1, i.e.,It obtains any about mbRelated cipher-text information, and can restore in plain text, not by theorem 1 It is rare to go out to guess that the correct probability obtained is
Therefore, q-paralle BDHE conjecture in the present invention is accurate, i.e. the advantage of b'=b is
I.e. the present invention can achieve the purpose for challenging plaintext attack.
Resistance against colluders: the present invention uses property broker re-encryption algorithm (such as Fig. 1), user property collectionWith Shared structure (M, ρ) passes through A2It is verified, rk1、rk3、RxWith rk4Pass through δ ∈ GTAssociation, rk1、rk2And rk4Pass through θ ∈ ZpTightly It is close to be connected, rk4In θ ∈ ZpAnd to δ ∈ G under Share Permissions structure (M, ρ)TIt is encrypted, so working as rk1、rk2、rk3、RxValue Distorting its corresponding re-encryption ciphertext by attacker, also it is invalid, if(M, ρ) and rk4It is tampered, then can be with Pass through following formulaVerifying.
Due to the special tectonic of the system, transmission node and memory node are separated, refer to Pool verifying pond common recognition Mechanism, memory node are to be generated by way of democratic election, therefore ensure that the randomness for executing node with transmission node And the ambiguity of position.I.e. memory node neither knows next transmission node position, does not know about sharer's information more, node Randomness determines the difficulty that three gangs up, therefore memory node, transmission node, a possibility that ganging up between sharer three It is extremely low.
Embodiment 4.Efficiency analysis of the invention.
Communication overhead in the present invention mainly have communication between transmission node and memory node and node and system it Between communication composition.Efficiency in system for further evaluation, in conjunction with the property broker re-encryption safety based on code key strategy Cross-domain proxy re-encryption friend in the mobile social networking of shared Tiwari method, Luo Entao et al. has found that secret protection is ground Study carefully and the Seo method of the matching operation based on property broker re-encrypted constant number has done comparative experiments.
By system public key PK, the MSK length with following three kinds of methods, private key for user SK length and CT length are carried out pair Than the results are shown in Table 2.As seen from table, compared to Tiwari method, Luo method, system public key PK of the invention is with attribute The increase of number, length gradually increase, and private key for user SK length growth rate is therefore of the invention close also much larger than other three kinds of methods Key has higher anti-attack ability.Using the attribute of user as one of each private key for user SK foundation generated, while also can The enough more flexible control for realizing Share Permissions, converts shared structure for user property in ciphertext, carries out to ciphertext The more effective protection of orientation.
The comparison of 2 communication overhead of table
For in algorithm encryption, re-encryption, ciphertext decryption and re-encryption ciphertext decrypting process required for calculation amount, and It is compared with existing three kinds of typical methods, the results are shown in Table 3, wherein E is for describing group G, GTThe duration of power operation, And P indicates bilinear logarithm operation duration, n indicates attribute number.As shown in Table 3, the bilinearity in Seo method is accomplished that The "AND" relational operation between attribute is only supported with door access structure, and any Share Permissions formula of support of the invention, more It is flexible convenient.The present invention makes bilinearity logarithm required for reducing compared with Tiwari method, using multiplying is increased Operation, therefore operation cost of the invention will be much smaller than the operand of both the above method, so that having reached reduces computing cost Purpose.Compared to Luo method, algorithm complexity of the invention also be decreased significantly.
The comparison of 3 computing cost of table
The present invention efficiency in system for further evaluation, the present invention is to Seo method, Tiwari method, Luo method three Kind method has done comparative experiments, and four methods are to use Tate Bilinear Pairing to be wanted according to the experimental result of Chen et al. Reach the RSA security level of 1024bit, the Tate Bilinear Pairing operation of 512bit, and executes a Tate Bilinear Pairing The operation used time is 20.04ms, executes first power exponent arithmetic 5.31ms.Experimentation of the invention is the category held according to user Property number as variable, respectively to encryption, decryption, re-encryption, again decryption operation time carried out simulation comparison.
Fig. 5 explanation is incremented by with attribute number, and the calculating time of encryption is also increasing, in order to better ensure that the peace of information Quan Xing, invention increases the numbers of attributes match in ciphering process, therefore consumption is slightly above Seo when operation.Fig. 6 is prime information solution Close duration, the present invention have absolute advantage relative to Tiwari, Luo.The present invention is using block chain technology by different node point Data center's calculating task is carried on a shoulder pole, the calculation times of the Bilinear Pairing of trusted party are reduced, therefore on computing cost more It is advantageous.Fig. 7 is the situation of change for calculating the time in the re-encryption stage, and four kinds of methods are required to Share Permissions and match, in the present invention Information for holding 100 characteristic attributes, which encrypts, only needs 1.70s or so, and compared to Seo method, Tiwari method wants small very It is more.Fig. 8 shows with the increase of attribute number purpose solves confidential information again when consumption, with attribute number purpose increase, compared to other three kinds The growth rate of method, decryption duration of the invention is minimum.

Claims (1)

1. a kind of block chain ciphertext cloud storage sharing method based on property broker re-encryption, it is characterized in that as follows:
(S01): before carrying out information storage, system formulates intelligent contract first, and is signed jointly by information user;
(S02): information owner Alan sends storage request, verifies the transmission leader node T that pond common recognition mechanism is chosen by Pool Masses' node T into oneself clusternThe validity of verifying broadcasts information and user identity;
If 1) be temporarily stored in the log of oneself after effectively, extracting data by transmission leader node T;
If 2) invalid, " illegal user " is fed back;
(S03): masses node T of the transmission leader node T into all clustersnCopy Info and wait-for-response at least collect in determination The internal node for alreading exceed half quantity of group has connect to information owner's Alan confirmation message again after having received information It receives, indicates that information is at this time after information owner Alan receives confirmation message and have been filed on state, T is again to TnIt sends out public notice announcement Know that the data mode has been filed on;In the process, information owner Alan needs to submit information quotation and customized random character String obtains information sharing remuneration in order to user, and provides certain credit as guarantee fund, to avoid false, plagiarism is existing As;
(S04): transmission node sends storage information to memory node, from being responsible for M of the leader node M of storage into oneself clusteri Broadcast storage request;After determining more than the completion storage of half node, to information owner's Alan feedback information, this storing process Terminate;
(S05): sharing request person Bill sends sharing request, before information sharing, storage leader node M in cluster to oneself Masses' node M in clusteriVerifying broadcasts user identity, determines whether it meets Cryptograph Sharing permission;
If 1) meet, from node M of the leader node M into oneself clusteriBroadcasting share request;
2) if it is not, then feeding back " illegal user ";
(S06): the keyword w provided according to sharing request person Bill, calculating in block chain is made after metadata ciphertext CT It is converted into meeting the ciphertext CT of the Share Permissions of sharing request person Bill with proxy re-encryption technologyB
1) system generates corresponding search password TK acquisition search result information according to public key PK, keyword w and each information is corresponding Quotation;
2) sharing request person Bill credit and user sharing information price are determined, if credit is more than or equal to information price, The stage is converted into ciphertext;Otherwise, " Sorry, your ticket has not enough value " is fed back;
(S07): transmission leader node T T into all clustersnNode Copy Info and wait-for-response;Determining at least cluster internal Already exceed half quantity node received information after, to memory node confirmation message after indicate that at information at this time In transmission state;
(S08): transmission node sends the metadata ciphertext CT obtained by keyword searching ciphertext to sharing request person Bill, and By obtaining the storage location LC of information after decryption, thus in corresponding position download decryption prime information ciphertext CTA, it is bright to obtain information Literary m;
(S09): system is made corresponding adjustment to the credit of user and is carried out according to the data of feedback according to information exchange situation Credit clearing.
CN201811072783.9A 2018-09-14 2018-09-14 Block chain ciphertext cloud storage sharing method based on attribute proxy re-encryption Active CN109189727B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811072783.9A CN109189727B (en) 2018-09-14 2018-09-14 Block chain ciphertext cloud storage sharing method based on attribute proxy re-encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811072783.9A CN109189727B (en) 2018-09-14 2018-09-14 Block chain ciphertext cloud storage sharing method based on attribute proxy re-encryption

Publications (2)

Publication Number Publication Date
CN109189727A true CN109189727A (en) 2019-01-11
CN109189727B CN109189727B (en) 2021-07-23

Family

ID=64910913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811072783.9A Active CN109189727B (en) 2018-09-14 2018-09-14 Block chain ciphertext cloud storage sharing method based on attribute proxy re-encryption

Country Status (1)

Country Link
CN (1) CN109189727B (en)

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109842681A (en) * 2019-01-31 2019-06-04 广东绍林科技开发有限公司 A kind of data management system and method for taking into account centralization with distributed characteristic
CN109905464A (en) * 2019-01-29 2019-06-18 华东师范大学 A kind of distributed Sharing of remote sensing data system based on block chain
CN109933995A (en) * 2019-01-31 2019-06-25 广州中国科学院软件应用技术研究所 A kind of user's protecting sensitive data and system based on cloud service and block chain
CN109979550A (en) * 2019-02-14 2019-07-05 中国科学院信息工程研究所 A kind of block chain medical data management method and system based on distributed nature signature
CN109981690A (en) * 2019-04-29 2019-07-05 河南大学 A kind of anti-tamper timing data security transmission method based on block chain intelligence contract
CN110098919A (en) * 2019-04-26 2019-08-06 西安电子科技大学 The acquisition methods of data permission based on block chain
CN110266490A (en) * 2019-07-25 2019-09-20 西南石油大学 The keyword ciphertext generation method and device of cloud storage data
CN110266687A (en) * 2019-06-21 2019-09-20 杭州云象网络技术有限公司 A kind of Internet of Things TSM Security Agent data sharing modularity using block chain technology
CN110599147A (en) * 2019-09-17 2019-12-20 福州大学 Ciphertext retrieval fair payment method and system based on block chain
CN110610102A (en) * 2019-09-23 2019-12-24 郑州师范学院 Data access method, device and system
CN110635909A (en) * 2019-10-16 2019-12-31 淮北师范大学 Attribute-based collusion attack resistant proxy re-encryption method
CN110750541A (en) * 2019-10-18 2020-02-04 天津理工大学 Data storage indexing system and method based on block chain
CN111050317A (en) * 2019-12-07 2020-04-21 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain
CN111092958A (en) * 2019-12-27 2020-05-01 深圳市网心科技有限公司 Node access method, device, system and storage medium
CN111143471A (en) * 2019-12-27 2020-05-12 北京工业大学 Ciphertext retrieval method based on block chain
CN111310202A (en) * 2020-01-20 2020-06-19 腾讯科技(深圳)有限公司 Information processing method for block chain network, block chain node device and medium
CN111353165A (en) * 2020-01-16 2020-06-30 湖南智慧政务区块链科技有限公司 Block chain data supervision method, system, equipment and storage medium
CN111526197A (en) * 2020-04-24 2020-08-11 远光软件股份有限公司 Cloud data secure sharing method
CN111598695A (en) * 2020-05-18 2020-08-28 国网电子商务有限公司 Block chain data access method and device
CN111641641A (en) * 2020-05-29 2020-09-08 兰州理工大学 Block chain data sharing method based on searchable proxy re-encryption
CN111695128A (en) * 2020-06-15 2020-09-22 中国银行股份有限公司 Data processing method and device for block chain network for data asset allocation
CN111737710A (en) * 2020-06-03 2020-10-02 安徽科技学院 Block chain information storage method based on cryptography
CN111756645A (en) * 2020-06-30 2020-10-09 中国科学技术大学 Ad hoc network elastic transmission control method based on block chain security attribute
CN111784369A (en) * 2020-07-06 2020-10-16 广东工业大学 Competitive product detection method based on alliance block chain
CN111859444A (en) * 2020-06-12 2020-10-30 中国科学院信息工程研究所 Block chain data supervision method and system based on attribute encryption
CN111914272A (en) * 2020-07-13 2020-11-10 华中科技大学 Encryption retrieval method and system for origin data in mobile edge computing environment
CN112039880A (en) * 2020-08-30 2020-12-04 河南大学 Block chain distributed outsourcing-based dual-policy access control method
CN113051589A (en) * 2021-03-17 2021-06-29 重庆扬成大数据科技有限公司 Big data government affair analysis and processing safety application platform
CN113193953A (en) * 2021-04-16 2021-07-30 南通大学 Multi-authority attribute-based encryption method based on block chain
CN113259317A (en) * 2021-04-09 2021-08-13 淮阴工学院 Cloud storage data deduplication method based on identity agent re-encryption
CN113542317A (en) * 2020-04-14 2021-10-22 刘真 Method, equipment and storage medium for realizing file copy certification by using smart consensus
CN113556363A (en) * 2021-09-18 2021-10-26 中国人民解放军国防科技大学 Data sharing method and system based on decentralized and distributed proxy re-encryption
CN113810421A (en) * 2021-09-18 2021-12-17 上海万向区块链股份公司 Block chain-based PRE Internet of things data sharing method and system
CN114520747A (en) * 2022-04-21 2022-05-20 山东省计算中心(国家超级计算济南中心) Data security sharing system and method taking data as center
CN115114603A (en) * 2021-03-17 2022-09-27 中国移动通信集团福建有限公司 Base station equipment data management method and device and electronic equipment
CN115499193A (en) * 2022-09-14 2022-12-20 西南石油大学 Rural tourism passenger privacy protection system and method based on block chain
CN115714669A (en) * 2022-10-20 2023-02-24 云南师范大学 Private data cross-domain sharing method based on PURH-CP-ABE under block chain
CN116455596A (en) * 2023-02-16 2023-07-18 广东顺德电力设计院有限公司 Virtual power plant data security protection method based on consensus mechanism
CN117240452A (en) * 2023-09-19 2023-12-15 西藏威盾数据有限公司 Plateau data safe sharing method based on block chain

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107103252A (en) * 2017-04-27 2017-08-29 电子科技大学 Data access control method based on block chain
CN107171806A (en) * 2017-05-18 2017-09-15 北京航空航天大学 Mobile terminal network cryptographic key negotiation method based on block chain
CN107493340A (en) * 2017-08-23 2017-12-19 广州市易彩乐网络科技有限公司 Data distribution method of calibration in block chain network, apparatus and system
CN108063752A (en) * 2017-11-02 2018-05-22 暨南大学 A kind of credible genetic test and data sharing method based on block chain and proxy re-encryption technology
CN108259169A (en) * 2018-01-09 2018-07-06 北京大学深圳研究生院 A kind of file security sharing method and system based on block chain cloud storage
CN108418681A (en) * 2018-01-22 2018-08-17 南京邮电大学 A kind of searching ciphertext system and method based on attribute for supporting proxy re-encryption
CN108470276A (en) * 2018-03-12 2018-08-31 成都零光量子科技有限公司 A kind of block chain common recognition method using agency's book keeping operation
CN109816385A (en) * 2017-11-21 2019-05-28 维布络有限公司 The system and method that block chain transaction in distributed account book network is veritified

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107103252A (en) * 2017-04-27 2017-08-29 电子科技大学 Data access control method based on block chain
CN107171806A (en) * 2017-05-18 2017-09-15 北京航空航天大学 Mobile terminal network cryptographic key negotiation method based on block chain
CN107493340A (en) * 2017-08-23 2017-12-19 广州市易彩乐网络科技有限公司 Data distribution method of calibration in block chain network, apparatus and system
CN108063752A (en) * 2017-11-02 2018-05-22 暨南大学 A kind of credible genetic test and data sharing method based on block chain and proxy re-encryption technology
CN109816385A (en) * 2017-11-21 2019-05-28 维布络有限公司 The system and method that block chain transaction in distributed account book network is veritified
CN108259169A (en) * 2018-01-09 2018-07-06 北京大学深圳研究生院 A kind of file security sharing method and system based on block chain cloud storage
CN108418681A (en) * 2018-01-22 2018-08-17 南京邮电大学 A kind of searching ciphertext system and method based on attribute for supporting proxy re-encryption
CN108470276A (en) * 2018-03-12 2018-08-31 成都零光量子科技有限公司 A kind of block chain common recognition method using agency's book keeping operation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
董祥千等: ""一种高效安全的去中心化数据共享模型"", 《计算机学报》 *

Cited By (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109905464A (en) * 2019-01-29 2019-06-18 华东师范大学 A kind of distributed Sharing of remote sensing data system based on block chain
CN109905464B (en) * 2019-01-29 2021-08-20 华东师范大学 Distributed remote sensing data sharing system based on block chain
CN109842681B (en) * 2019-01-31 2021-06-29 广东绍林科技开发有限公司 Data management system and method giving consideration to both centralized and distributed characteristics
CN109933995A (en) * 2019-01-31 2019-06-25 广州中国科学院软件应用技术研究所 A kind of user's protecting sensitive data and system based on cloud service and block chain
CN109842681A (en) * 2019-01-31 2019-06-04 广东绍林科技开发有限公司 A kind of data management system and method for taking into account centralization with distributed characteristic
CN109933995B (en) * 2019-01-31 2023-04-07 广州中国科学院软件应用技术研究所 User sensitive data protection and system based on cloud service and block chain
CN109979550A (en) * 2019-02-14 2019-07-05 中国科学院信息工程研究所 A kind of block chain medical data management method and system based on distributed nature signature
CN109979550B (en) * 2019-02-14 2021-06-01 中国科学院信息工程研究所 Block chain medical data management method and system based on distributed attribute signature
CN110098919B (en) * 2019-04-26 2021-06-25 西安电子科技大学 Block chain-based data permission acquisition method
CN110098919A (en) * 2019-04-26 2019-08-06 西安电子科技大学 The acquisition methods of data permission based on block chain
CN109981690A (en) * 2019-04-29 2019-07-05 河南大学 A kind of anti-tamper timing data security transmission method based on block chain intelligence contract
CN110266687A (en) * 2019-06-21 2019-09-20 杭州云象网络技术有限公司 A kind of Internet of Things TSM Security Agent data sharing modularity using block chain technology
CN110266687B (en) * 2019-06-21 2021-08-17 杭州云象网络技术有限公司 Method for designing Internet of things security agent data sharing module by adopting block chain technology
CN110266490A (en) * 2019-07-25 2019-09-20 西南石油大学 The keyword ciphertext generation method and device of cloud storage data
CN110599147A (en) * 2019-09-17 2019-12-20 福州大学 Ciphertext retrieval fair payment method and system based on block chain
CN110610102A (en) * 2019-09-23 2019-12-24 郑州师范学院 Data access method, device and system
CN110610102B (en) * 2019-09-23 2021-06-25 郑州师范学院 Data access method, device and system
CN110635909A (en) * 2019-10-16 2019-12-31 淮北师范大学 Attribute-based collusion attack resistant proxy re-encryption method
CN110750541B (en) * 2019-10-18 2023-05-02 天津理工大学 Block chain-based data storage indexing system and method
CN110750541A (en) * 2019-10-18 2020-02-04 天津理工大学 Data storage indexing system and method based on block chain
CN111050317A (en) * 2019-12-07 2020-04-21 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain
CN111050317B (en) * 2019-12-07 2022-08-02 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain
CN111143471A (en) * 2019-12-27 2020-05-12 北京工业大学 Ciphertext retrieval method based on block chain
CN111143471B (en) * 2019-12-27 2023-09-01 北京工业大学 Ciphertext retrieval method based on blockchain
CN111092958A (en) * 2019-12-27 2020-05-01 深圳市网心科技有限公司 Node access method, device, system and storage medium
CN111092958B (en) * 2019-12-27 2022-10-21 深圳市迅雷网络技术有限公司 Node access method, device, system and storage medium
CN111353165A (en) * 2020-01-16 2020-06-30 湖南智慧政务区块链科技有限公司 Block chain data supervision method, system, equipment and storage medium
CN111310202A (en) * 2020-01-20 2020-06-19 腾讯科技(深圳)有限公司 Information processing method for block chain network, block chain node device and medium
CN113542317B (en) * 2020-04-14 2024-05-28 刘真 Method, equipment and storage medium for realizing file copy certification by intelligent consensus in use
CN113542317A (en) * 2020-04-14 2021-10-22 刘真 Method, equipment and storage medium for realizing file copy certification by using smart consensus
CN111526197B (en) * 2020-04-24 2023-05-09 远光软件股份有限公司 Cloud data secure sharing method
CN111526197A (en) * 2020-04-24 2020-08-11 远光软件股份有限公司 Cloud data secure sharing method
CN111598695A (en) * 2020-05-18 2020-08-28 国网电子商务有限公司 Block chain data access method and device
CN111641641B (en) * 2020-05-29 2021-07-30 兰州理工大学 Block chain data sharing method based on searchable proxy re-encryption
CN111641641A (en) * 2020-05-29 2020-09-08 兰州理工大学 Block chain data sharing method based on searchable proxy re-encryption
CN111737710A (en) * 2020-06-03 2020-10-02 安徽科技学院 Block chain information storage method based on cryptography
CN111859444B (en) * 2020-06-12 2022-03-01 中国科学院信息工程研究所 Block chain data supervision method and system based on attribute encryption
CN111859444A (en) * 2020-06-12 2020-10-30 中国科学院信息工程研究所 Block chain data supervision method and system based on attribute encryption
CN111695128A (en) * 2020-06-15 2020-09-22 中国银行股份有限公司 Data processing method and device for block chain network for data asset allocation
CN111695128B (en) * 2020-06-15 2023-11-21 中国银行股份有限公司 Data processing method and device for block chain network for data asset allocation
CN111756645A (en) * 2020-06-30 2020-10-09 中国科学技术大学 Ad hoc network elastic transmission control method based on block chain security attribute
CN111756645B (en) * 2020-06-30 2022-09-06 中国科学技术大学 Ad hoc network elastic transmission control method based on block chain security attribute
CN111784369A (en) * 2020-07-06 2020-10-16 广东工业大学 Competitive product detection method based on alliance block chain
CN111914272A (en) * 2020-07-13 2020-11-10 华中科技大学 Encryption retrieval method and system for origin data in mobile edge computing environment
CN111914272B (en) * 2020-07-13 2024-02-02 华中科技大学 Encryption retrieval method and system for origin data in mobile edge computing environment
CN112039880A (en) * 2020-08-30 2020-12-04 河南大学 Block chain distributed outsourcing-based dual-policy access control method
CN113051589A (en) * 2021-03-17 2021-06-29 重庆扬成大数据科技有限公司 Big data government affair analysis and processing safety application platform
CN115114603A (en) * 2021-03-17 2022-09-27 中国移动通信集团福建有限公司 Base station equipment data management method and device and electronic equipment
CN115114603B (en) * 2021-03-17 2024-06-11 中国移动通信集团福建有限公司 Base station equipment data management method and device and electronic equipment
CN113259317A (en) * 2021-04-09 2021-08-13 淮阴工学院 Cloud storage data deduplication method based on identity agent re-encryption
CN113259317B (en) * 2021-04-09 2023-05-30 淮阴工学院 Cloud storage data deduplication method based on identity agent unencrypted
CN113193953A (en) * 2021-04-16 2021-07-30 南通大学 Multi-authority attribute-based encryption method based on block chain
CN113556363B (en) * 2021-09-18 2021-12-17 中国人民解放军国防科技大学 Data sharing method and system based on decentralized and distributed proxy re-encryption
CN113810421A (en) * 2021-09-18 2021-12-17 上海万向区块链股份公司 Block chain-based PRE Internet of things data sharing method and system
CN113556363A (en) * 2021-09-18 2021-10-26 中国人民解放军国防科技大学 Data sharing method and system based on decentralized and distributed proxy re-encryption
CN114520747A (en) * 2022-04-21 2022-05-20 山东省计算中心(国家超级计算济南中心) Data security sharing system and method taking data as center
CN115499193A (en) * 2022-09-14 2022-12-20 西南石油大学 Rural tourism passenger privacy protection system and method based on block chain
CN115499193B (en) * 2022-09-14 2024-02-13 西南石油大学 Country travel passenger privacy protection system and method based on blockchain
CN115714669A (en) * 2022-10-20 2023-02-24 云南师范大学 Private data cross-domain sharing method based on PURH-CP-ABE under block chain
CN115714669B (en) * 2022-10-20 2024-02-06 云南师范大学 Private data cross-domain sharing method based on PURH-CP-ABE under blockchain
CN116455596A (en) * 2023-02-16 2023-07-18 广东顺德电力设计院有限公司 Virtual power plant data security protection method based on consensus mechanism
CN117240452A (en) * 2023-09-19 2023-12-15 西藏威盾数据有限公司 Plateau data safe sharing method based on block chain

Also Published As

Publication number Publication date
CN109189727B (en) 2021-07-23

Similar Documents

Publication Publication Date Title
CN109189727A (en) A kind of block chain ciphertext cloud storage sharing method based on property broker re-encryption
Li et al. A blockchain privacy protection scheme based on ring signature
Li et al. Blockchain for large-scale internet of things data storage and protection
Li et al. Attribute based encryption with privacy protection and accountability for CloudIoT
Zhao et al. Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems
Zuo et al. Fine-grained two-factor protection mechanism for data sharing in cloud storage
US11032068B2 (en) Leakage-deterring encryption for message communication
Ateniese et al. Match me if you can: matchmaking encryption and its applications
CN111212084B (en) Attribute encryption access control method facing edge calculation
CN110474893A (en) A kind of isomery is across the close state data safety sharing method of trust domain and system
CN108632032A (en) The safe multi-key word sequence searching system of no key escrow
Li et al. An extended multi-server-based user authentication and key agreement scheme with user anonymity
Au et al. Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat
Sun et al. Secure data sharing with flexible cross-domain authorization in autonomous vehicle systems
CN101331706A (en) Secure threshold decryption protocol computation
Moriyama et al. Leakage resilient eCK-secure key exchange protocol without random oracles
CN106059763A (en) Attribute-based multi-mechanism hierarchical ciphertext-policy weight encryption method under cloud environment
CN109379176B (en) Password leakage resistant authentication and key agreement method
Feng et al. Blockchain data privacy access control based on searchable attribute encryption
CN110933033A (en) Cross-domain access control method for multiple Internet of things domains in smart city environment
Wang et al. Attribute-based equality test over encrypted data without random oracles
CN101908961A (en) Multi-party secret handshaking method in short key environment
Backes et al. Using mobile device communication to strengthen e-voting protocols
Zhang et al. Distributed ciphertext-policy attribute-based encryption with enhanced collusion resilience and privacy preservation
CN110890961B (en) Novel safe and efficient multi-authorization attribute-based key negotiation protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20221227

Address after: Room 606-609, Compound Office Complex Building, No. 757, Dongfeng East Road, Yuexiu District, Guangzhou, Guangdong Province, 510699

Patentee after: China Southern Power Grid Internet Service Co.,Ltd.

Address before: Room 02A-084, Building C (Second Floor), No. 28, Xinxi Road, Haidian District, Beijing 100085

Patentee before: Jingchuang United (Beijing) Intellectual Property Service Co.,Ltd.

Effective date of registration: 20221227

Address after: Room 02A-084, Building C (Second Floor), No. 28, Xinxi Road, Haidian District, Beijing 100085

Patentee after: Jingchuang United (Beijing) Intellectual Property Service Co.,Ltd.

Address before: 341000 No. 86 Hongqi Avenue, Jiangxi, Ganzhou

Patentee before: Jiangxi University of Science and Technology

TR01 Transfer of patent right