Supervisable data flow privacy protection method
The invention discloses a supervisible data flow privacy protection method, and the method comprises the steps: an initialization stage: building a central committee, and enabling a user to register in a block chain and the central committee; in the request negotiation stage, the user and the centra...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention discloses a supervisible data flow privacy protection method, and the method comprises the steps: an initialization stage: building a central committee, and enabling a user to register in a block chain and the central committee; in the request negotiation stage, the user and the central committee negotiate service parameters; in the proxy service stage, a user generates data fragments and a conversion key and sends the data fragments and the conversion key to the central committee, threshold proxy re-encryption service is carried out, a result is broadcasted on a block chain, and the user decrypts data after receiving own information; in the supervision stage, the central committee organizes a supervision mechanism to form a consensus, and votes to decide whether to decrypt or not. According to the method, a link relationship between a data sender and a data receiver is split by adopting a ring signature and block chain broadcast mode, so that privacy protection is realized; a threshold proxy re |
---|