CN108063666A - Data access method and system, key server and access terminal under cloud environment - Google Patents

Data access method and system, key server and access terminal under cloud environment Download PDF

Info

Publication number
CN108063666A
CN108063666A CN201810004715.2A CN201810004715A CN108063666A CN 108063666 A CN108063666 A CN 108063666A CN 201810004715 A CN201810004715 A CN 201810004715A CN 108063666 A CN108063666 A CN 108063666A
Authority
CN
China
Prior art keywords
key
ciphertext
visitor
decrypted
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810004715.2A
Other languages
Chinese (zh)
Inventor
赵远杰
颜雪薇
张璐
陈幼雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CEC CYBERSPACE GREAT WALL Co Ltd
Original Assignee
CEC CYBERSPACE GREAT WALL Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CEC CYBERSPACE GREAT WALL Co Ltd filed Critical CEC CYBERSPACE GREAT WALL Co Ltd
Priority to CN201810004715.2A priority Critical patent/CN108063666A/en
Publication of CN108063666A publication Critical patent/CN108063666A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the data access methods under a kind of cloud environment, using key server, comprise the following steps:Receive the access request for including visitor's attribute that the access terminal is sent;Public key generation and the visitor's attribute and the relevant intermediate key of public key of the visitor side of visitor's attribute and visitor side in the access request, the intermediate key can generate intermediate decryption ciphertext for ciphertext to be decrypted, so that acquisition is decrypted in plain text to the intermediate decryption ciphertext according to the private key of the visitor side in the terminal that accesses.The present invention also provides data access system, key server and the access terminals under a kind of cloud environment, can solve the problems, such as that Senior Administrator divulges a secret.

Description

Data access method and system, key server and access terminal under cloud environment
Technical field
The present invention relates to field of information security technology, data access method and system under more particularly to a kind of cloud environment, Key server and access terminal.
Background technology
With the rapid development of cloud computing, resource is locally stored in order to save in more and more personal and enterprises, can be him Sensitive data be stored in remote cloud server.In practical applications, typically at least there is following 2 points requirement:First, it protects Close property requirement requires nothing more than the user that satisfaction offer data person offers and checks;Second, the integrity demands of data, it is desirable that number It is complete according to remaining.
However, to a certain extent may be used in the prior art for for confidentiality requirement using the encrypted mode of attribute base To improve, but the problem of divulge a secret there are still Senior Administrator.
The content of the invention
To solve one of technical problem in the prior art, the present invention provides the data access side under a kind of cloud environment Method and system, server and access terminal, can solve the problems, such as that Senior Administrator divulges a secret.
The present invention provides the data access methods under a kind of cloud environment, using key server, comprise the following steps:
Receive the access request for including visitor's attribute that the access terminal is sent;
Public key generation and visitor's attribute and the institute of visitor's attribute and visitor side in the access request The relevant intermediate key of public key of visitor side is stated, the intermediate key can generate intermediate decryption for ciphertext to be decrypted Ciphertext so that it is described access terminal decryption ciphertext among described is decrypted according to the private key of the visitor side obtain it is bright Text.
Preferably, it is further comprising the steps of:
Decryption ciphertext among generation is decrypted in the ciphertext sent according to the intermediate key to the Cloud Server And it is sent to access terminal.
Preferably, it is further comprising the steps of:
The intermediate key is sent to Cloud Server so that the Cloud Server according to the intermediate key to described close Text is decrypted decryption ciphertext among generation and is sent to access terminal.
Preferably, it is further comprising the steps of:
Different random numbers is chosen for each visitor's attribute to calculate the intermediate key.
The present invention also provides the data access methods under a kind of cloud environment, apply and are accessing terminal, comprise the following steps:
The access request of visitor's attribute is included to key server transmission, so that the key server is according to institute State visitor's attribute in access request and the public key generation of visitor side and visitor's attribute and the public affairs of the visitor side The relevant intermediate key of key, the intermediate key can generate intermediate decryption ciphertext for the ciphertext to be decrypted;
Acquisition is decrypted in plain text to the intermediate decryption ciphertext according to the private key of the visitor side.
Preferably, it is further comprising the steps of:
It receives the Cloud Server or the key server and life is decrypted to the ciphertext according to the intermediate key Into among decryption ciphertext.
Preferably, it is further comprising the steps of:
The ciphertext is decrypted according to the intermediate key the intermediate decryption ciphertext of generation.
The present invention also provides a kind of key server, including:
Receiving module, for receiving the access request for including visitor's attribute that the access terminal is sent;
Intermediate key generation module, for the visitor's attribute and the public key of visitor side in the access request Generation and visitor's attribute and the relevant intermediate key of public key of the visitor side, the intermediate key are used to carry out ciphertext Intermediate decryption ciphertext can be generated by decrypting, so that described access terminal according to the private key of the visitor side to the intermediate decryption Acquisition is decrypted in plain text in ciphertext.
Preferably, further include:
Intermediate deciphering module, the ciphertext for being sent based on the intermediate key to the Cloud Server are decrypted Ciphertext is decrypted among generation and is sent to access terminal.
Preferably, further include:
Intermediate key sending module, for the intermediate key to be sent to Cloud Server, so that the Cloud Server root Decryption ciphertext among generation is decrypted to the ciphertext according to the intermediate key and is sent to access terminal.
Preferably, the intermediate key generation module, be additionally operable to for each visitor's attribute choose it is different with Machine number calculates the intermediate key.
The present invention also provides a kind of access terminal, including:
Access request sending module, for including the access request of visitor's attribute to key server transmission, with Make public key generation and the visitor of visitor attribute and visitor side of the key server in the access request Attribute and the relevant intermediate key of public key of the visitor side, the intermediate key can for the ciphertext to be decrypted Decryption ciphertext among generation
It is bright that acquisition is decrypted to the intermediate decryption ciphertext for the private key according to the visitor side in deciphering module Text.
Preferably, further include:
Centre decryption ciphertext receiving module, for receiving the Cloud Server or the key server according to the centre The ciphertext is decrypted the intermediate decryption ciphertext of generation in key.
Preferably, the deciphering module is additionally operable to that the ciphertext is decrypted in generation according to the intermediate key Between decrypt ciphertext.
The present invention also provides the data access system under a kind of cloud environment, including:Access terminal, key server and cloud clothes Business device, the Cloud Server are used to store ciphertext;The access terminal uses above-mentioned access terminal;The key server uses Above-mentioned key server.
The invention has the advantages that:
Data access method and system, server and access terminal under cloud environment provided by the invention, need in visitor When accessing the data of upload, what it is due to key server generation is intermediate key, intermediate key and visitor's attribute and access The public key of person side is related, and therefore, actually decryption properties ciphertext utilizes access again simultaneously when being decrypted according to intermediate key The public key encryption of person side, therefore, accessing terminal needs to decrypt again once using the private key of visitor side.Since key server generates Intermediate key and Cloud Server generation among decryption ciphertext be still that encrypted state (is still located in server-side data In encrypted state), therefore, the problem of divulging a secret there is no Senior Administrator.
Description of the drawings
Fig. 1 is the working timing figure of the data access method under the cloud environment that the embodiment of the present invention 1 provides;
Fig. 2 a are a kind of functional block diagram for key server that the embodiment of the present invention 2 provides;
Fig. 2 b are the functional block diagram for another key server that the embodiment of the present invention 2 provides;
Fig. 3 a are a kind of functional block diagram for access terminal that the embodiment of the present invention 3 provides;
Fig. 3 b are another functional block diagram for accessing terminal that the embodiment of the present invention 32 provides;
Fig. 4 is the functional block diagram of the data access system under the cloud environment that the embodiment of the present invention 4 provides.
Specific embodiment
For those skilled in the art is made to more fully understand technical scheme, the present invention is carried below in conjunction with the accompanying drawings Data access method and system, key server and access terminal under the cloud environment of confession are described in detail.
Embodiment 1
Data access method under cloud environment provided in an embodiment of the present invention is applied in data access system, which visits The system of asking includes:Terminal, key server and Cloud Server are accessed, encrypted file or data are stored in Cloud Server, is claimed For ciphertext, specifically, uploading terminal-pair file configuration allows accessed visitor's attribute, in this way, the access with the attribute Person can allow to access this document, actually it is, to paper formulation access strategy (M, p)
It is encrypted to form ciphertext (also referred to as attribute ciphertext), to ensure the security of this document.
The data access method under cloud environment provided in an embodiment of the present invention is described in detail with reference to Fig. 1, including following Step:
S1 accesses the access request for including visitor's attribute that terminal is sent to key server.
S2, key server, which receives, accesses the access request that terminal is sent.
S3, the public key generation of visitor attribute and visitor side of the key server in access request and visitor Attribute and the relevant intermediate key of the public key of visitor side, intermediate key can generate intermediate decryption for ciphertext to be decrypted Ciphertext.
Wherein, for so-called visitor side is with respect to uploader side, and the public key of the two and private key are different.
Wherein, intermediate key includes part relevant with visitor's attribute and the relevant part of public key with visitor side.
Intermediate key is sent to Cloud Server by S4, key server.
Ciphertext is decrypted according to intermediate key decryption ciphertext among generation in S5, Cloud Server.
Centre decryption ciphertext is sent to access terminal by S6, Cloud Server.
S7, access terminal decrypt ciphertext and acquisition are decrypted in plain text, that is, realize entirely between the private key pair according to visitor side Portion's decryption can obtain in plain text.
Data access method under cloud environment provided in this embodiment, when visitor needs to access the data uploaded, by What it is in key server generation is intermediate key, and intermediate key is related to the public key of visitor's attribute and visitor side, therefore, root Actually decryption properties ciphertext utilizes the public key encryption of visitor side again simultaneously when being decrypted according to intermediate key, therefore, it accesses Terminal needs to decrypt again once using the private key of visitor side.Due to the intermediate key and Cloud Server of key server generation Decryption ciphertext is still encrypted state (being still within encrypted state in server-side data) among generation, therefore, will not There are problems that Senior Administrator divulges a secret.
In addition, in the present embodiment, decryption ciphertext among acquisition is decrypted according to intermediate key in Cloud Server, this opposite visit It asks that terminal performs the step and compares, the calculation amount for accessing terminal is considerably reduced, so as to give full play to the excellent of Cloud Server Gesture.
Preferably, in the present embodiment, it is further comprising the steps of:For each visitor's attribute choose it is different with Machine number calculates the intermediate key, so as to successfully resisting the collusion attack of user.Citing illustrates:Assuming that visitor Attribute include:Mathematics, female and professor correspond to different random numbers for three attribute.
Need it is described herein be, in the present embodiment, although Cloud Server according to intermediate key to ciphertext carry out Decryption obtains intermediate decryption ciphertext, and still, the present invention is not limited thereto, in practical applications, can will be close with Cloud Server Text is sent to key server, and key server is decrypted to obtain intermediate decryption ciphertext and retransmit according to intermediate key to ciphertext To access terminal.
Embodiment 2
Fig. 2 a are a kind of functional block diagram for key server that the embodiment of the present invention 2 provides, and refer to Fig. 2 a, and the present invention is real Applying the key server 10 of example offer includes receiving module 101, intermediate key generation module 102, intermediate key sending module 103。
Wherein, receiving module 101 accesses the access request for including visitor's attribute of terminal transmission for reception
Intermediate key generation module 102 is for visitor's attribute in access request and the life of the public key of visitor side Into the relevant intermediate key of public key with visitor's attribute and the visitor side, intermediate key is used to that energy to be decrypted to ciphertext Decryption ciphertext among enough generations so that access terminal be decrypted according to decryption ciphertext between the private key pair of visitor side obtain it is bright Text.
Intermediate key sending module 103 is used to intermediate key being sent to Cloud Server, so that Cloud Server is according to centre Key is decrypted ciphertext decryption ciphertext among generation and is sent to access terminal.
Preferably, intermediate key generation module 102 is additionally operable to choose for each visitor's attribute different random It counts to calculate intermediate key.
Need it is described herein be, although intermediate key is sent by intermediate key sending module 103 in the present embodiment To Cloud Server, ciphertext is decrypted according to intermediate key decryption ciphertext among generation in Cloud Server.But the present invention is not This is confined to, as shown in Figure 2 b, key server 10 does not include intermediate key sending module 103, but decrypts mould including centre Block 104, intermediate deciphering module 104 are used to be decrypted among generation based on the ciphertext that intermediate key sends Cloud Server Decryption ciphertext is simultaneously sent to access terminal.
The related content of key server 10 provided in an embodiment of the present invention is referred under the cloud environment of the offer of embodiment 1 The related content of data access method.
Embodiment 3
Fig. 3 a are a kind of functional block diagram for access terminal that the embodiment of the present invention 3 provides, and refer to Fig. 3 a, and the present invention is implemented The access terminal 20 that example provides includes access request sending module 201, intermediate decryption ciphertext receiving module 202 and deciphering module 203。
Wherein, access request sending module 201 is used to ask to access of the transmission of key server 10 comprising visitor's attribute It asks, so that the public key generation of visitor attribute and visitor side of the key server 10 in access request belongs to visitor Property and visitor side the relevant intermediate key of public key, can to generate intermediate decryption close for ciphertext to be decrypted for intermediate key Text.
Centre decryption ciphertext receiving module 202 is used to receive Cloud Server 30 or key server 10 according to intermediate key pair The intermediate decryption ciphertext of generation is decrypted in ciphertext.
Acquisition is decrypted in plain text in decryption ciphertext between deciphering module 203 is used for the private key pair according to visitor side.
It should be noted that in the present embodiment, ciphertext receiving module 202 and deciphering module 203 are decrypted only by centre The decryption ciphertext among access terminal-pair is needed to be decrypted, and Cloud Server is passed through according to the process that intermediate key is decrypted Or key server 10 is completed, so as to greatly reduce the calculation amount for accessing terminal.Certainly, in practical applications, as schemed Shown in 3b, save intermediate decryption ciphertext receiving module 202, deciphering module 203 be additionally operable to according to intermediate key to the ciphertext into Decryption ciphertext among row decryption generation.
Embodiment 4
Fig. 4 is the functional block diagram of the data access system under the cloud environment that the embodiment of the present invention 4 provides, referring to Fig. 4, this Data access system under the cloud environment that inventive embodiments provide includes:Access terminal 20, key server 10 and Cloud Server 30, Cloud Server 30 is used to store ciphertext;Access the access terminal that terminal 20 is provided using above-described embodiment 3;Key server 10 key servers provided using above-described embodiment 2.
Data access system under cloud environment provided in an embodiment of the present invention, due to needing to access the number uploaded in visitor According to when, due to key server generation be intermediate key, intermediate key is related to the public key of visitor's attribute and visitor side, Therefore, actually decryption properties ciphertext utilizes the public key encryption of visitor side again simultaneously when being decrypted according to intermediate key, Therefore accessing terminal needs to decrypt again once using the private key of visitor side.Due to key server generation intermediate key and Decryption ciphertext is still encrypted state (being still within encrypted state in server-side data) among Cloud Server generation, because This, the problem of divulging a secret there is no Senior Administrator.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses Mode, however the present invention is not limited thereto.For those skilled in the art, the essence of the present invention is not being departed from In the case of refreshing and essence, various changes and modifications can be made therein, these variations and modifications are also considered as protection scope of the present invention.

Claims (15)

1. the data access method under a kind of cloud environment, using key server, which is characterized in that comprise the following steps:
Receive the access request for including visitor's attribute that the access terminal is sent;
Public key generation and visitor's attribute and the visit of visitor's attribute and visitor side in the access request The relevant intermediate key of public key of the person of asking side, can to generate intermediate decryption close for ciphertext to be decrypted for the intermediate key Text, so that acquisition is decrypted in plain text to the intermediate decryption ciphertext according to the private key of the visitor side in the terminal that accesses.
2. the data access method under cloud environment according to claim 1, which is characterized in that further comprising the steps of:
It is concurrent that decryption ciphertext among generation is decrypted in the ciphertext sent according to the intermediate key to the Cloud Server It send to access terminal.
3. the data access method under cloud environment according to claim 1, which is characterized in that further comprising the steps of:
The intermediate key is sent to Cloud Server so that the Cloud Server according to the intermediate key to the ciphertext into Ciphertext is decrypted among row decryption generation and is sent to access terminal.
4. the data access method under cloud environment according to claim 1, which is characterized in that further comprising the steps of:
Different random numbers is chosen for each visitor's attribute to calculate the intermediate key.
5. the data access method under a kind of cloud environment is applied and is accessing terminal, which is characterized in that comprises the following steps:
The access request of visitor's attribute is included to key server transmission, so that the key server is according to the visit Ask request in visitor's attribute and visitor side public key generation and visitor's attribute and the public key phase of the visitor side The intermediate key of pass, the intermediate key can generate intermediate decryption ciphertext for the ciphertext to be decrypted;
Acquisition is decrypted in plain text to the intermediate decryption ciphertext according to the private key of the visitor side.
6. the data access method under cloud environment according to claim 5, which is characterized in that further comprising the steps of:
It receives the Cloud Server or the key server and generation is decrypted to the ciphertext according to the intermediate key Centre decryption ciphertext.
7. the data access method under cloud environment according to claim 5, which is characterized in that further comprising the steps of:
The ciphertext is decrypted according to the intermediate key the intermediate decryption ciphertext of generation.
8. a kind of key server, which is characterized in that including:
Receiving module, for receiving the access request for including visitor's attribute that the access terminal is sent;
Intermediate key generation module generates for visitor's attribute in the access request and the public key of visitor side With visitor's attribute and the relevant intermediate key of public key of the visitor side, the intermediate key is used to that ciphertext to be decrypted Intermediate decryption ciphertext can be generated, so that described access terminal according to the private key of the visitor side to the intermediate decryption ciphertext Acquisition is decrypted in plain text.
9. key server according to claim 8, which is characterized in that further include:
Generation is decrypted in intermediate deciphering module, the ciphertext for being sent based on the intermediate key to the Cloud Server Centre decryption ciphertext is simultaneously sent to access terminal.
10. key server according to claim 8, which is characterized in that further include:
Intermediate key sending module, for the intermediate key to be sent to Cloud Server, so that the Cloud Server is according to institute Intermediate key is stated the ciphertext to be decrypted decryption ciphertext among generation and be sent to access terminal.
11. key server according to claim 8, which is characterized in that the intermediate key generation module is additionally operable to pin Different random numbers is chosen to each visitor's attribute to calculate the intermediate key.
12. a kind of access terminal, which is characterized in that including:
Access request sending module, for including the access request of visitor's attribute to key server transmission, so that institute State the public key generation of visitor attribute and visitor side of the key server in the access request and visitor's attribute With the relevant intermediate key of public key of the visitor side, the intermediate key is used to that the ciphertext to be decrypted and can generate Centre decryption ciphertext
Acquisition is decrypted in plain text to the intermediate decryption ciphertext for the private key according to the visitor side in deciphering module.
13. access terminal according to claim 12, which is characterized in that further include:
Centre decryption ciphertext receiving module, for receiving the Cloud Server or the key server according to the intermediate key The ciphertext is decrypted the intermediate decryption ciphertext of generation.
14. access terminal according to claim 12, which is characterized in that the deciphering module is additionally operable to according in described Between key the ciphertext is decrypted generation among decryption ciphertext.
15. a kind of data access system under cloud environment, which is characterized in that including:Access terminal, key server and cloud service Device, the Cloud Server are used to store ciphertext;The terminal that accesses is using the access end described in claim 12-14 any one End;The key server is using the key server described in claim 8-11 any one.
CN201810004715.2A 2018-01-03 2018-01-03 Data access method and system, key server and access terminal under cloud environment Pending CN108063666A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810004715.2A CN108063666A (en) 2018-01-03 2018-01-03 Data access method and system, key server and access terminal under cloud environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810004715.2A CN108063666A (en) 2018-01-03 2018-01-03 Data access method and system, key server and access terminal under cloud environment

Publications (1)

Publication Number Publication Date
CN108063666A true CN108063666A (en) 2018-05-22

Family

ID=62141057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810004715.2A Pending CN108063666A (en) 2018-01-03 2018-01-03 Data access method and system, key server and access terminal under cloud environment

Country Status (1)

Country Link
CN (1) CN108063666A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209357A (en) * 2016-07-06 2016-12-07 杨炳 A kind of ciphertext based on cloud computing platform accesses control system
WO2017061950A1 (en) * 2015-10-09 2017-04-13 Singapore Management University Data security system and method for operation thereof
CN106888213A (en) * 2017-03-14 2017-06-23 深圳大学 Cloud ciphertext access control method and system
CN107370595A (en) * 2017-06-06 2017-11-21 福建中经汇通有限责任公司 One kind is based on fine-grained ciphertext access control method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017061950A1 (en) * 2015-10-09 2017-04-13 Singapore Management University Data security system and method for operation thereof
CN106209357A (en) * 2016-07-06 2016-12-07 杨炳 A kind of ciphertext based on cloud computing platform accesses control system
CN106888213A (en) * 2017-03-14 2017-06-23 深圳大学 Cloud ciphertext access control method and system
CN107370595A (en) * 2017-06-06 2017-11-21 福建中经汇通有限责任公司 One kind is based on fine-grained ciphertext access control method

Similar Documents

Publication Publication Date Title
US11095629B2 (en) Retrieving access data for blockchain networks using highly available trusted execution environments
CN103763315B (en) A kind of trust data access control method being applied to mobile device cloud storage
KR20200126321A (en) How to securely execute smart contract actions in a trusted execution environment
CN104917741B (en) A kind of plain text document public network secure transmission system based on USBKEY
CN113691502B (en) Communication method, device, gateway server, client and storage medium
US11405365B2 (en) Method and apparatus for effecting a data-based activity
KR101982237B1 (en) Method and system for data sharing using attribute-based encryption in cloud computing
US11374910B2 (en) Method and apparatus for effecting a data-based activity
US11637817B2 (en) Method and apparatus for effecting a data-based activity
CN114500069A (en) Method and system for storing and sharing electronic contract
Hathaliya et al. A Smart contract-based secure data sharing scheme in Healthcare 5.0
CN114697113B (en) Multiparty privacy calculation method, device and system based on hardware accelerator card
Roy et al. A Hybrid Security Framework to Preserve Multilevel Security on Public Cloud Networks
US11424922B2 (en) Hashing schemes for cryptographic private key generation
CN108063666A (en) Data access method and system, key server and access terminal under cloud environment
WO2021029173A1 (en) Communication system
CN110572788B (en) Wireless sensor communication method and system based on asymmetric key pool and implicit certificate
CN108243198B (en) A kind of data distribution, retransmission method and device
CN112348674A (en) Block chain transaction data storage and acquisition method and device
CN112865968B (en) Data ciphertext hosting method and system, computer equipment and storage medium
CN113672980B (en) Inter-institution real-time privacy data query method, device and storage medium
CN116192384A (en) Secret key safety management method and device based on encryption database
CN118332595A (en) Intersection solving method, system and storage medium for privacy set based on homomorphic encryption
CN116055042A (en) Quantum key encryption method, device, equipment and storage medium
JP5278330B2 (en) Key exchange apparatus and key exchange method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180522