CN114785622B - Access control method, device and storage medium for multi-identification network - Google Patents
Access control method, device and storage medium for multi-identification network Download PDFInfo
- Publication number
- CN114785622B CN114785622B CN202210700564.0A CN202210700564A CN114785622B CN 114785622 B CN114785622 B CN 114785622B CN 202210700564 A CN202210700564 A CN 202210700564A CN 114785622 B CN114785622 B CN 114785622B
- Authority
- CN
- China
- Prior art keywords
- target
- global
- attribute set
- attribute
- private key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域technical field
本申请属于多标识网络领域,特别涉及一种多标识网络的访问控制方法、装置及存储介质。The present application belongs to the field of multi-identity networks, and in particular relates to an access control method, device and storage medium for a multi-identity network.
背景技术Background technique
多标识网络体系是2019年提出的一种新型网络体系,目的是打破传统网络互连协议(Internet Protocol,IP)网络顶级域名被单一组织所掌控的尴尬局面。多标识网络体系中可兼容多种网络寻址标识,包括但不限于身份标识、内容标识、地空标识、IP标识等。接入网络的用户必须在网络分组中嵌入由多标识系统(Multi-Identifier System,MIS)分发的身份标识,否则网络分组将不能被转发,也就是说身份标识是多标识网络(Multi-Identifier Network,MIN)的核心标识。The multi-identity network system is a new type of network system proposed in 2019. The purpose is to break the embarrassing situation that the top-level domain names of the traditional Internet Protocol (IP) network are controlled by a single organization. The multi-identity network system can be compatible with a variety of network addressing identities, including but not limited to identity identity, content identity, ground-air identity, and IP identity. Users accessing the network must embed the identity identifier distributed by the Multi-Identifier System (MIS) in the network packet, otherwise the network packet will not be forwarded, that is to say, the identity identifier is a Multi-Identifier Network (Multi-Identifier Network). , MIN) core identity.
多标识网络体系的内容传输过程中,内容块常以明文形式存储在网络节点中,这就会导致出现安全问题,所以网络节点中的内容应当缓存密文。在一对一的通信模式中,内容提供商可以选择使用传统的对称密钥对内容进行加密,保证数据的安全性和隐私性。但是在MIN场景中,如果使用传统加密方案,就会让不同用户请求同一内容块时的密文不同,这种情况下多标识路由器(Multi-Identifier Router,MIR)缓存功能失效,MIN高效的网络分发功能也将退化。In the content transmission process of the multi-identity network system, the content blocks are often stored in the network nodes in the form of plaintext, which will lead to security problems, so the content in the network nodes should be cached in ciphertext. In a one-to-one communication mode, content providers can choose to encrypt content using traditional symmetric keys to ensure data security and privacy. However, in the MIN scenario, if the traditional encryption scheme is used, the ciphertexts when different users request the same content block will be different. In this case, the Multi-Identifier Router (MIR) cache function is invalid, and the MIN efficient network The distribution function will also be degraded.
发明内容SUMMARY OF THE INVENTION
本申请提供了一种多标识网络的访问控制方法、装置及存储介质,通过引入时间周期这一参数参与密钥的生成与内容的加密,实现了用户撤销,同时实现了去中心化,避免了可能出现的单点故障。The present application provides an access control method, device and storage medium for a multi-identity network. By introducing the parameter of time period to participate in key generation and content encryption, user revocation is achieved, and decentralization is achieved, avoiding the need for possible single point of failure.
本申请第一方面提供了一种多标识网络的访问控制方法,包括:A first aspect of the present application provides an access control method for a multi-identity network, including:
若多标识系统节点接收到密钥生成请求,则所述多标识系统节点获取循环群所对应的群生成元以及全局属性集合,所述多标识系统节点为多标识系统网络中的任意一个节点;If the multi-ID system node receives the key generation request, the multi-ID system node obtains the group generator and the global attribute set corresponding to the cyclic group, and the multi-ID system node is any node in the multi-ID system network;
所述多标识系统节点根据所述群生成元以及所述全局属性集合确定全局公共参数以及主密钥;The multi-identity system node determines a global public parameter and a master key according to the group generator and the global attribute set;
所述多标识系统节点根据所述全局公共参数、目标用户所对应的全局唯一标识、所述主密钥、当前时间周期以及所述全局属性集合确定当前时间周期内所述目标用户所对应的属性集合私钥;The multi-identity system node determines the attribute corresponding to the target user in the current time period according to the global public parameter, the global unique identifier corresponding to the target user, the master key, the current time period and the global attribute set collection private key;
所述多标识系统节点根据所述全局公共参数、目标内容明文、所述目标内容明文所对应的访问结构以及所述当前时间周期确定所述目标内容明文所对应的目标密文;The multi-identity system node determines the target ciphertext corresponding to the target content plaintext according to the global public parameter, the target content plaintext, the access structure corresponding to the target content plaintext, and the current time period;
所述多标识系统节点将所述目标密文、所述属性集合私钥以及所述全局公共参数发送至所述目标用户所对应的终端设备,以使得所述终端设备根据所述属性集合私钥、目标属性集合以及所述全局公共参数对所述目标密文进行解密,得到解密结果,所述目标属性集合为所述目标用户所对应的属性集合。The multi-identity system node sends the target ciphertext, the attribute set private key, and the global public parameter to the terminal device corresponding to the target user, so that the terminal device according to the attribute set private key , the target attribute set, and the global public parameter to decrypt the target ciphertext to obtain a decryption result, where the target attribute set is the attribute set corresponding to the target user.
本申请第二方面提供了一种多标识网络的访问控制方法,包括:A second aspect of the present application provides an access control method for a multi-identity network, including:
终端设备发送密钥生成请求至多标识系统节点,以使得所述多标识系统节点获取循环群所对应的群生成元以及全局属性集合,并根据所述群生成元以及所述全局属性集合确定全局公共参数以及主密钥,且根据所述全局公共参数、目标用户所对应的全局唯一标识、所述主密钥、当前时间周期以及所述全局属性集合确定所述目标用户所对应的属性集合私钥,且根据所述全局公共参数、目标内容明文、所述目标内容明文所对应的访问结构以及所述当前时间周期确定所述目标内容明文所对应的目标密文,并返回所述目标密文、所述属性集合私钥以及所述全局公共参数;The terminal device sends a key generation request to the multi-identity system node, so that the multi-identity system node obtains the group generator and the global attribute set corresponding to the cyclic group, and determines the global public according to the group generator and the global attribute set parameters and a master key, and the attribute set private key corresponding to the target user is determined according to the global public parameter, the global unique identifier corresponding to the target user, the master key, the current time period, and the global attribute set , and determine the target ciphertext corresponding to the target content plaintext according to the global public parameters, the target content plaintext, the access structure corresponding to the target content plaintext, and the current time period, and return the target ciphertext, the attribute set private key and the global public parameter;
所述终端设备接收所述多标识系统节点发送的所述目标密文、所述属性集合私钥以及所述全局公共参数;receiving, by the terminal device, the target ciphertext, the attribute set private key, and the global public parameter sent by the multi-identity system node;
所述终端设备根据所述属性集合私钥以及所述全局公共参数对所述目标密文进行解密,以得到解密结果。The terminal device decrypts the target ciphertext according to the attribute set private key and the global public parameter to obtain a decryption result.
本申请第三方面提供了一种多标识系统节点,包括:A third aspect of the present application provides a multi-identity system node, including:
获取单元,用于在接收到密钥生成请求时,获取循环群所对应的群生成元以及全局属性集合,所述多标识系统节点为多标识系统网络中的任意一个节点;an acquisition unit, configured to acquire the group generator and the global attribute set corresponding to the cyclic group when receiving the key generation request, and the multi-identity system node is any node in the multi-identity system network;
第一确定单元,用于根据所述群生成元以及所述全局属性集合确定全局公共参数以及主密钥;a first determining unit, configured to determine a global public parameter and a master key according to the group generator and the global attribute set;
第二确定单元,用于根据所述全局公共参数、目标用户所对应的全局唯一标识、所述主密钥、当前时间周期以及所述全局属性集合确定当前时间周期内所述目标用户所对应的属性集合私钥;The second determining unit is configured to determine the corresponding target user in the current time period according to the global public parameter, the global unique identifier corresponding to the target user, the master key, the current time period and the global attribute set attribute collection private key;
第三确定单元,用于根据所述全局公共参数、目标内容明文、所述目标内容明文所对应的访问结构以及所述当前时间周期确定所述目标内容明文所对应的目标密文;a third determining unit, configured to determine the target ciphertext corresponding to the target content plaintext according to the global public parameter, the target content plaintext, the access structure corresponding to the target content plaintext, and the current time period;
发送单元,用于将所述目标密文、所述属性集合私钥以及所述全局公共参数发送至所述目标用户所对应的终端设备,以使得所述终端设备根据所述属性集合私钥、目标属性集合以及所述全局公共参数对所述目标密文进行解密,得到解密结果,所述目标属性集合为所述目标用户所对应的属性集合。A sending unit, configured to send the target ciphertext, the attribute set private key and the global public parameter to the terminal device corresponding to the target user, so that the terminal device can make the attribute set private key, The target attribute set and the global public parameter decrypt the target ciphertext to obtain a decryption result, where the target attribute set is the attribute set corresponding to the target user.
本申请第四方面提供了一种终端设备,包括:A fourth aspect of the present application provides a terminal device, including:
发送单元,用于发送密钥生成请求至多标识系统节点,以使得所述多标识系统节点获取循环群所对应的群生成元以及全局属性集合,并根据所述群生成元以及所述全局属性集合确定全局公共参数以及主密钥,且根据所述全局公共参数、目标用户所对应的全局唯一标识、所述主密钥、当前时间周期以及所述全局属性集合确定所述目标用户所对应的属性集合私钥,且根据所述全局公共参数、目标内容明文、所述目标内容明文所对应的访问结构以及所述当前时间周期确定所述目标内容明文所对应的目标密文,并返回所述目标密文、所述属性集合私钥以及所述全局公共参数;a sending unit, configured to send a key generation request to a multi-identity system node, so that the multi-identity system node obtains the group generator and the global attribute set corresponding to the cyclic group, and according to the group generator and the global attribute set Determine the global public parameter and the master key, and determine the attribute corresponding to the target user according to the global public parameter, the global unique identifier corresponding to the target user, the master key, the current time period and the global attribute set Collect private keys, and determine the target ciphertext corresponding to the target content plaintext according to the global public parameters, the target content plaintext, the access structure corresponding to the target content plaintext, and the current time period, and return the target ciphertext, the private key of the attribute set, and the global public parameter;
接收单元,用于接收所述多标识系统节点发送的所述目标密文、所述属性集合私钥以及所述全局公共参数;a receiving unit, configured to receive the target ciphertext, the attribute set private key and the global public parameter sent by the multi-identity system node;
解密单元,用于根据所述属性集合私钥以及所述全局公共参数对所述目标密文进行解密,以得到解密结果。A decryption unit, configured to decrypt the target ciphertext according to the attribute set private key and the global public parameter to obtain a decryption result.
本申请实施例第五方面提供了一种计算机设备,其包括至少一个连接的处理器、存储器和收发器,其中,所述存储器用于存储程序代码,所述处理器用于调用所述存储器中的程序代码来执行上述第一方面所述的多标识网络的访问控制方法的步骤。A fifth aspect of the embodiments of the present application provides a computer device, which includes at least one connected processor, a memory, and a transceiver, wherein the memory is used to store program codes, and the processor is used to call a program in the memory. The program code is used to execute the steps of the access control method for the multi-identity network described in the first aspect.
本申请实施例第六方面提供了一种计算机存储介质,其包括指令,当其在计算机上运行时,使得计算机执行上述第一方面所述的多标识网络的访问控制方法的步骤。A sixth aspect of the embodiments of the present application provides a computer storage medium, which includes instructions that, when executed on a computer, cause the computer to execute the steps of the access control method for a multi-identity network described in the first aspect above.
相对于相关技术,本申请提供的实施例中,通过引入时间周期这一参数参与密钥的生成与内容的加密,实现了用户撤销,同时将每个属性机构部署在MIS节点上,将原本的单属性机构拓展为多属性机构,实现了去中心化,避免了可能出现的单点故障。Compared with the related art, in the embodiment provided by this application, the parameter of the time period is introduced to participate in the generation of the key and the encryption of the content, so as to realize the user's revocation. At the same time, each attribute mechanism is deployed on the MIS node, and the original The single-attribute organization is expanded to a multi-attribute organization, which realizes decentralization and avoids possible single points of failure.
附图说明Description of drawings
图1为本申请实施例提供的多标识网络体系的网络架构图;1 is a network architecture diagram of a multi-identity network system provided by an embodiment of the present application;
图2为本申请实施例提供的MIR完整的转发流程示意图;2 is a schematic diagram of a complete MIR forwarding process provided in an embodiment of the present application;
图3为本申请实施例提供的密文策略属性加密的流程示意图;3 is a schematic flowchart of encryption of ciphertext policy attributes provided by an embodiment of the present application;
图4为本申请实施例提供的密钥策略属性加密的流程示意图;4 is a schematic flowchart of encryption of key policy attributes provided by an embodiment of the present application;
图5为本申请实施例提供的基于密文策略属性加密的应用场景示意图;5 is a schematic diagram of an application scenario of encryption based on a ciphertext policy attribute provided by an embodiment of the present application;
图6为本申请实施例提供的MIN缓存内容访问控制模型的示意图;6 is a schematic diagram of a MIN cache content access control model provided by an embodiment of the present application;
图7为本申请实施例提供的多标识网络的访问控制方法的一个流程示意图;7 is a schematic flowchart of an access control method for a multi-identity network provided by an embodiment of the present application;
图8为本申请实施例提供的多标识网络的访问控制方法的另一流程示意图;8 is another schematic flowchart of the access control method for a multi-identity network provided by an embodiment of the present application;
图9为本申请实施例提供的多标识网络的访问控制方法的另一流程示意图;9 is another schematic flowchart of the access control method for a multi-identity network provided by an embodiment of the present application;
图10为本申请实施例提供的多标识网络节点的虚拟结构示意图;10 is a schematic diagram of a virtual structure of a multi-identity network node provided by an embodiment of the present application;
图11为本申请实施例提供的终端设备的虚拟结构示意图;11 is a schematic diagram of a virtual structure of a terminal device provided by an embodiment of the application;
图12为本申请实施例提供的多标识网络节点的硬件结构示意图;12 is a schematic diagram of the hardware structure of a multi-identity network node provided by an embodiment of the present application;
图13为本申请实施例提供的终端设备的硬件结构示意图。FIG. 13 is a schematic diagram of a hardware structure of a terminal device provided by an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments.
请参阅图1,图1为本申请实施例提供的多标识网络体系的网络架构图,多标识网络体系将网络重新划分为两个相互支撑的组成部分:管理平面和数据平面,下面分别对管理平面和数据平面进行详细说明:Please refer to FIG. 1. FIG. 1 is a network architecture diagram of a multi-identity network system provided by an embodiment of the present application. The multi-identity network system re-divides the network into two mutually supporting components: a management plane and a data plane. The plane and data plane are explained in detail:
在管理平面中,以并行投票证明算法(Parallel Proof of Vote,PPoV)为核心搭建的联盟区块链,将网络空间细分为自顶向下层级化网络域,并且构建了一个去中心化的网络标识管理和解析系统,即MIS。MIS提供了多个参与方平等共管共治的能力,除了可以对网络标识进行管理和解析,还承担着用户身份管理以及提供可靠信任根等职责,想要接入多标识网络的新用户必须首先通过MIS进行标识注册,否则所发送的MIN网络分组将无法通过MIR的认证。In the management plane, the consortium blockchain built with the Parallel Proof of Vote (PPoV) algorithm as the core subdivides the network space into top-down hierarchical network domains, and builds a decentralized Network Identity Management and Resolution System, or MIS. MIS provides the ability for multiple participants to manage and co-govern on an equal footing. In addition to managing and parsing network identifiers, MIS also undertakes the responsibilities of user identity management and providing a reliable root of trust. New users who want to access a multi-identity network must first The identity registration is carried out through the MIS, otherwise the sent MIN network packet will not pass the authentication of the MIR.
在数据平面中,相互连接的MIR作为数据平面的核心,组成了一个支持多种网络标识和推拉两种通信语义的数据传输平面。MIR作为数据平面不可缺少的组成部分,承担着网络分组转发、内容缓存、用户身份认证、不同网络标识之间的互译等工作。In the data plane, the interconnected MIRs, as the core of the data plane, form a data transmission plane that supports multiple network identifiers and push-pull communication semantics. As an indispensable part of the data plane, MIR is responsible for network packet forwarding, content caching, user identity authentication, and mutual translation between different network identities.
在多标识网络中,为满足不同场景下的不同网络需求,设计了两种互为补充的通信语义,分别是推送式通信语义与拉取式通信语义,下面分别对推送式语义和拉取式语义进行详细说明:In the multi-identity network, in order to meet different network requirements in different scenarios, two complementary communication semantics are designed, namely push communication semantics and pull communication semantics. The semantics are explained in detail:
推送式通信语义是一种最为直观,且由发送方所主导的通信方式,这种通信语义可以很容易地实现网络中节点间点对点的通信。在MIN中,使用通用推式包来满足推送式通信语义的需求。与IP类似,通用推式包需要在网络分组中加入源标识与目的标识,其中,源标识用于告诉被通信节点网络分组的发出者的网络标识,多标识路由器根据从TLV结构中读出目的标识后将网络分组转发至下一跳路由器。在MIN的推送式通信语义中,路由转发是无状态的,这是因为MIR通过查询路由信息表(Forward Information Base,FIB)就可以转发通用推式包,既不需要保存网络分组的相关信息,也不需要对任何表项进行修改。Push communication semantics is the most intuitive and sender-dominated communication method. This communication semantics can easily realize point-to-point communication between nodes in the network. In MIN, a generic push package is used to meet the needs of push communication semantics. Similar to IP, the general push packet needs to add the source ID and destination ID to the network packet, where the source ID is used to tell the network ID of the sender of the network packet to the correspondent node, and the multi-ID router reads the destination from the TLV structure according to the After identification, the network packet is forwarded to the next hop router. In the push communication semantics of MIN, routing forwarding is stateless, because MIR can forward general push packets by querying the routing information table (Forward Information Base, FIB), without saving the relevant information of network packets, There is also no need to modify any table entries.
MIN中的拉取式通信语义是一种由数据接受者所驱动的通信模式,在拉取式通信语义中,MIN不再关注通信双方之间点对点的通信,而把通信过程中的内容作为重点。在现代互联网环境中,通信双方通常不是对等的,可以分为内容的请求者和内容的创造者,因此MIN将拉取式通信中的双方定义为内容的生产者与消费者。消费者向MIN网络中发送兴趣包,MIR会将该兴趣包转发到任意一个可以满足该请求的网络节点上,而不一定会被转发到内容的生产者节点上,能满足该兴趣包请求的节点,会将从网络节点的缓存空间中取出内容封装成数据包,按转发原路径将数据包送回消费者。这样的通信方式将内容、内容的生产者、内容的位置三者解耦,有助于减少网络总体流量。The pull-type communication semantics in MIN is a communication mode driven by the data receiver. In the pull-type communication semantics, MIN no longer pays attention to the point-to-point communication between the two communicating parties, but focuses on the content of the communication process. . In the modern Internet environment, the two communicating parties are usually not equal, and can be divided into content requesters and content creators. Therefore, MIN defines both parties in pull communication as content producers and consumers. The consumer sends an Interest packet to the MIN network, and the MIR will forward the Interest packet to any network node that can satisfy the request, but not necessarily to the content producer node, which can satisfy the Interest packet request. The node will encapsulate the content from the cache space of the network node into a data packet, and send the data packet back to the consumer according to the original forwarding path. This communication method decouples content, content producers, and content locations, helping to reduce overall network traffic.
针对推送和拉取两种通信语义的特点,多标识路由器设计了四种数据结构用于网络分组的高效转发:分别是内容仓库(Content Store,CS)、待定兴趣表(Pending InterestTable,PIT)、策略表(Strategy Table,ST)和转发信息表(Forward Information Base,FIB),下面分别进行说明:According to the characteristics of the two communication semantics of push and pull, the multi-identity router designs four data structures for efficient forwarding of network packets: Content Store (CS), Pending Interest Table (PIT), The Strategy Table (ST) and the Forward Information Base (FIB) are described below:
内容仓库这一数据结构服务于拉取式通信,当内容的生产者将内容数据包沿请求路径返回时,MIR可以根据算法决定是否将内容缓存在内容仓库中。通常内容仓库中存储的内容以数据包作为最小单位,也有少部分研究会在内容仓库中存储完整的内容数据。内容仓库的存在令消费者的请求在MIR上就可以得到满足,而不一定会将请求发送到生产者的服务器上。将内容缓存在MIR中,这样的设计方式解除了内容与位置之间的绑定关系,赋予了多标识网络高效分发内容的能力。The data structure of the content repository serves the pull-type communication. When the content producer returns the content data packet along the request path, MIR can decide whether to cache the content in the content repository according to the algorithm. Usually the content stored in the content warehouse takes data packets as the smallest unit, and a small number of studies store complete content data in the content warehouse. The existence of the content repository allows the consumer's request to be satisfied on the MIR without necessarily sending the request to the producer's server. The content is cached in the MIR, which removes the binding relationship between the content and the location, and gives the multi-identity network the ability to distribute content efficiently.
待定兴趣表这一数据结构服务于拉取式通信,其表项会记录兴趣包转入、转出逻辑接口(Logic Face)和目的标识,便于数据包按原路径返回。当有多个请求同一内容的兴趣包发送到MIR时,有且仅有第一个到达的兴趣包会被MIR转发至下一跳,而其余兴趣包只会将要记录的信息插入到该PIT条目中,这就是PIT的聚合功能。聚合功能可以显著减少对相同内容的重复请求,同时也赋予了多标识网络高效分发内容的能力。The data structure of the pending interest table serves the pull-type communication, and its entry records the inbound and outbound logic interface (Logic Face) and destination identifier of the interest packet, so that the data packet can be returned according to the original path. When multiple Interests requesting the same content are sent to the MIR, only the first arriving Interest will be forwarded to the next hop by the MIR, and the remaining Interests will only insert the information to be recorded into the PIT entry , this is the aggregation function of PIT. The aggregation function can significantly reduce repeated requests for the same content, while also giving the multi-identity network the ability to distribute content efficiently.
策略表可以单独为不同前缀的目的标识设置不同的路由方式。MIR的路由策略会影响兴趣包和通用推式包转发出口的选择,从而改变其的转发路径,这种方案可以提升多标识网络路由和转发的灵活性。同样的,策略表应用了最长前缀匹配器,用于MIR快速检索转发该网络分组所应用的路由策略。The policy table can independently set different routing modes for the destination identifiers of different prefixes. The routing strategy of MIR will affect the selection of interest packets and general push packet forwarding exits, thereby changing their forwarding paths. This scheme can improve the flexibility of multi-identity network routing and forwarding. Likewise, the longest prefix matcher is applied to the policy table for MIR to quickly retrieve and forward the routing policy applied to the network packet.
转发信息表。转发信息表同时服务于推送式和拉取式两种不同的通信语义。FIB用于管理兴趣包和通用推式包的转发路径,每一条FIB表项都会存储可以被转发的逻辑接口列表。对于每一个进入MIR的兴趣包和通用推式包,都会根据最长前缀匹配原则在FIB中查询对应的表项。Forwarding information sheet. The forwarding information table serves both push and pull communication semantics. FIB is used to manage the forwarding path of Interest packets and general push packets. Each FIB entry stores a list of logical interfaces that can be forwarded. For each interest packet and general push packet entering the MIR, the corresponding entry in the FIB will be queried according to the longest prefix matching principle.
请参阅图2,图2为本申请实施例提供的MIR完整的转发流程示意图,如图2所示,除了上述四个数据结构之外,MIR中还引入了包验证器和标识选择器。Please refer to FIG. 2 , which is a schematic diagram of a complete MIR forwarding process provided by an embodiment of the present application. As shown in FIG. 2 , in addition to the above four data structures, a packet validator and an identifier selector are also introduced into the MIR.
其中,包验证器是MIR接收到网络分组后,需要进入的第一个模块,包验证器会读取MIN网络分组中身份区的身份标识信息,当且仅当该身份标识能被MIR认可且验签通过时,才能进入转发的下一个流程。MIR采用协程池(Goroutine Pool)并行验签MIN网络分组。在保证了MIN网络安全的前提下,尽可能地提升了MIR的工作效率。而标识选择器通过读取标识将MIN网络分组识别为兴趣包、数据包或通用推式包,之后网络分组会进入到对应的转发流程。Among them, the packet verifier is the first module that MIR needs to enter after receiving the network packet. The packet verifier will read the identity information of the identity area in the MIN network packet, if and only if the identity can be recognized by MIR and Only after the verification is passed, the next process of forwarding can be entered. MIR uses the Goroutine Pool to verify the MIN network grouping in parallel. On the premise of ensuring the security of MIN network, the work efficiency of MIR is improved as much as possible. The identifier selector identifies the MIN network packet as an interest packet, a data packet or a general push packet by reading the identifier, and then the network packet will enter the corresponding forwarding process.
兴趣包的转发流程是相对来说最复杂的,首先要查看MIR的内容仓库中是否缓存有能满足该请求的内容存在,如果检索到了该内容,则从缓存空间取出并打包成数据包并按原路直接返回;如果不能在内容仓库中得到满足,则去查询PIT表,如果发现已经存在请求相同内容的兴趣包,则只会在该条目中插入应该返回的逻辑接口;如果在PIT中不能查到与该兴趣包标识对应的表项,则根据该兴趣包的信息,创建PIT表项插入表中,再去FIB中查询能转发该标识的下一跳MIR所对应的逻辑接口,最后将该兴趣包转发出去。如果FIB中查询不到则说明该MIR无法转发该兴趣包,沿兴趣包发送路径返回NACK或将其丢弃。The forwarding process of interest packets is relatively the most complicated. First, check whether there is content that can satisfy the request cached in the content warehouse of MIR. If the content is retrieved, it is taken out from the cache space and packaged into data packets and press Return directly to the original path; if it cannot be satisfied in the content warehouse, query the PIT table. If it is found that there is an interest packet requesting the same content, only the logical interface that should be returned will be inserted into the entry; if it cannot be found in the PIT Find the entry corresponding to the ID of the Interest packet, create a PIT entry and insert it into the table according to the information of the Interest packet, and then go to the FIB to query the logical interface corresponding to the next-hop MIR that can forward the ID, and finally The Interest packet is forwarded. If there is no query in the FIB, it means that the MIR cannot forward the Interest packet, and returns NACK along the sending path of the Interest packet or discards it.
而对于数据包来说,首先要根据标识名在PIT中查询一下对应的PIT表项,如果查询不到则说明转发过程出现了问题,将数据包丢弃;能查询到的话则根据PIT表项中的逻辑接口号,向该逻辑接口所对应的MIR转发该数据包。同时在转发前会根据内容缓存算法将数据包中的内容缓存在内容仓库中。For data packets, the corresponding PIT entry should be queried in the PIT first according to the identifier name. If it cannot be queried, it means that there is a problem in the forwarding process, and the data packet will be discarded; the logical interface number, and forward the data packet to the MIR corresponding to the logical interface. At the same time, before forwarding, the content in the data packet will be cached in the content warehouse according to the content caching algorithm.
MIN网络中的推送式语义传输是一种无状态的传输过程,因此通用推式包只需要查询MIR的FIB,将通用推式包转发至FIB表项中对应的逻辑接口即可;若没有在FIB查询到对应表项,说明MIR中没有转发该网络分组的规则,丢弃该通用推式包。The push semantic transmission in the MIN network is a stateless transmission process, so the general push packet only needs to query the FIB of the MIR and forward the general push packet to the corresponding logical interface in the FIB entry; The FIB finds the corresponding entry, indicating that there is no rule for forwarding the network packet in the MIR, and the general push packet is discarded.
多标识系统在内容传输过程中,内容块常以明文形式存储在各个多标识系统节点中,这就会导致出现安全问题,所以各个多标识系统节点中的内容应当缓存密文。在一对一的通信模式中,内容提供商可以选择使用传统的对称密钥对内容进行加密,保证数据的安全性和隐私性。但是在MIN场景中,如果使用传统加密方案,就会让不同用户请求同一内容块时的密文不同,这种情况下MIR缓存功能失效,MIN高效的网络分发功能也将退化。In the process of content transmission in the multi-ID system, content blocks are often stored in each multi-ID system node in plaintext, which will lead to security problems, so the content in each multi-ID system node should be cached in ciphertext. In a one-to-one communication mode, content providers can choose to encrypt content using traditional symmetric keys to ensure data security and privacy. However, in the MIN scenario, if the traditional encryption scheme is used, the ciphertexts when different users request the same content block will be different. In this case, the MIR caching function will fail, and the efficient network distribution function of MIN will also be degraded.
属性加密的方案中,一组属性列表可被认定为用户的身份标识,而且用户将拥有一组与属性列表一一对应的公钥集合,同时密文也将与代表访问结构的一组属性集合息息相关。只有用户的属性列表能符合密文的访问结构的要求时,明文才能被准确获取。属性加密所拥有的这种细粒度的访问控制能力,能应用在一对多的内容加解密场景中。In the attribute encryption scheme, a set of attribute lists can be regarded as the user's identity, and the user will have a set of public keys corresponding to the attribute list one-to-one, and the ciphertext will also be associated with a set of attribute sets representing the access structure. closely related. Only when the user's attribute list can meet the requirements of the ciphertext access structure, the plaintext can be obtained accurately. The fine-grained access control capability of attribute encryption can be applied to one-to-many content encryption and decryption scenarios.
目前属性加密可细分为两个不同的方向:(a)密文策略属性加密(Ciphertext-Policy Attribute-based Encryption, CP-ABE)在CP-ABE中密文CT与访问结构A之间相互关联、绑定,属性列表与密钥相互关联、绑定,只有属性集合达到访问结构的要求时,密文才允许被解密,如图3所示。(b)密钥策略属性加密(Key-Policy Attribute-basedEncryption,KP-ABE)。在KP-ABE中密文CT中内嵌属性列表,此时访问结构与密钥相互关联、绑定,当密文的属性列表达到访问结构A的要求时,密文才允许被解密,如图4所示。At present, attribute encryption can be subdivided into two different directions: (a) Ciphertext-Policy Attribute-based Encryption (CP-ABE). In CP-ABE, the ciphertext CT and the access structure A are correlated with each other. , binding, the attribute list and the key are interrelated and bound, only when the attribute set meets the requirements of the access structure, the ciphertext is allowed to be decrypted, as shown in Figure 3. (b) Key-Policy Attribute-based Encryption (KP-ABE). The attribute list is embedded in the ciphertext CT in KP-ABE. At this time, the access structure and the key are related and bound to each other. When the attribute list of the ciphertext meets the requirements of the access structure A, the ciphertext is allowed to be decrypted, as shown in Figure 4. shown.
以下三个模块作为CP-ABE方案的核心,共同组建了可供细粒度访问控制和内容隐私保护的系统模型:内容提供商(Content Provider,CP)、属性管理机构(AttributeAuthority,AA)以及消费者(Consumer)。其中属性管理机构被视为是完全可信任的机构,它首先会向内容提供商分发系统公钥,并根据消费者的属性列表分发属性私钥。内容提供商依据不同访问策略A将原始数据整合为密文,只有满足访问结构A的消费者才能将密文解密,例如,在图5中,内容提供商限制访问策略,则内容提供商的内容可以被Alice和Carol解密,但是不能被Bob解密,这是由他们的属性列表是否满足访问策略所决定的。The following three modules, as the core of the CP-ABE scheme, jointly form a system model for fine-grained access control and content privacy protection: Content Provider (CP), Attribute Authority (AA), and Consumer (Consumer). Among them, the attribute management agency is regarded as a fully trusted organization. It first distributes the public key of the system to the content provider, and distributes the private key of the attribute according to the consumer's attribute list. The content provider integrates the original data into ciphertext according to different access policies A, and only consumers who satisfy the access structure A can decrypt the ciphertext. For example, in Figure 5, the content provider restricts the access policy , the content provider's content can be decrypted by Alice and Carol, but not by Bob, which is determined by whether their attribute list satisfies the access policy.
MIN体系中的网内缓存可以解耦内容与内容提供者之间绑定的位置关系,显著提升网络的性能。但效率增加的同时,内容因为缓存于网络中到处可见的网络节点MIR中,这也就导致了内容提供者不能对被缓存的内容进行管理,在不做任何处理前,内容以明文形式保存在MIR中,任何用户只要知道了内容的标识,就可以请求到该内容,而不用经过任何的访问控制。内容的隐私性不能得到保证,网络的安全程度也大大降低。而传统的对称/非对称加密算法,在点对点的通信中能实现较好的隐私保护效果,但是在MIN拉取式语义传输的过程中,使用一对一的加密算法就不能使用缓存功能,这是一对一加密与一对多内容传输之间不可调和的矛盾。The in-network cache in the MIN system can decouple the binding location relationship between content and content providers, significantly improving network performance. However, while the efficiency increases, the content is cached in the network node MIR that can be seen everywhere in the network, which also causes the content provider to be unable to manage the cached content. Before doing any processing, the content is stored in plaintext in the form of In MIR, as long as any user knows the identity of the content, he can request the content without going through any access control. The privacy of the content cannot be guaranteed, and the security of the network is greatly reduced. The traditional symmetric/asymmetric encryption algorithm can achieve better privacy protection in point-to-point communication, but in the process of MIN pull-type semantic transmission, the one-to-one encryption algorithm cannot use the caching function. It is an irreconcilable contradiction between one-to-one encryption and one-to-many content transmission.
因此为了在MIN的拉取式语义传输中实现内容的隐私保护和细粒度的访问控制,本申请采用了CP-ABE作为系统的加密算法,可实现不同用户的细粒度访问控制,而且内容只需加密一次的特点保证MIR的缓存机制也能正常工作。本申请在T-CP-ABE的基础上加以改进,在算法中引入时间周期这一参数参与密钥的生成与内容的加密,实现了用户撤销。还应用MIR的缓存定时删除功能实现内容级别的撤销。而且结合MIS区块链,将每个属性机构部署在MIS节点上,将原本的单属性机构拓展为多属性机构,实现了去中心化,避免了可能出现的单点故障。因此本申请实施例提供的多标识网络的访问控制方法除了能实现细粒度的访问控制和缓存内容的隐私保护外,还拥有多属性机构、可撤销、可追踪的功能。Therefore, in order to realize the privacy protection and fine-grained access control of the content in the pull-type semantic transmission of MIN, this application adopts CP-ABE as the encryption algorithm of the system, which can realize the fine-grained access control of different users, and the content only needs to be The feature of encrypting once ensures that the caching mechanism of MIR can also work properly. The present application improves on the basis of T-CP-ABE, and introduces the parameter of time period into the algorithm to participate in the generation of the key and the encryption of the content, so as to realize the user's revocation. The content-level revocation is also implemented using MIR's cache timing deletion function. Moreover, combined with the MIS blockchain, each attribute organization is deployed on the MIS node, and the original single attribute organization is expanded into a multi attribute organization, which realizes decentralization and avoids possible single points of failure. Therefore, the access control method for a multi-identity network provided by the embodiments of the present application can not only implement fine-grained access control and privacy protection of cached content, but also have the functions of multi-attribute organization, revocation, and traceability.
请参阅图6,图6为本申请实施例提供的MIN缓存内容访问控制模型的示意图,在MIN缓存内容访问控制模型中,由以下几个实体组成:内容提供商(CP)、内容消费者(CC)、多标识路由器(MIR)、属性机构(AA)。Please refer to FIG. 6. FIG. 6 is a schematic diagram of a MIN cache content access control model provided by an embodiment of the present application. The MIN cache content access control model is composed of the following entities: a content provider (CP), a content consumer ( CC), Multi-Identity Router (MIR), Attribute Authority (AA).
内容提供商(Content Provider,CP):内容提供商会为不同的内容设置不同的访问策略,依照访问策略以及当前时间周期所对应的标识加密该内容。而且由于MIR自身的特性,在加密内容被封装到数据包中后,可以在其中设置内容的失效时间,与该时间周期保持对齐的话就可以保证之前的加密数据不会保存在网内缓存之中,也就不需要向MIR发起主动替换应该被重新加密的内容的请求。Content Provider (CP): The content provider will set different access policies for different content, and encrypt the content according to the access policy and the identifier corresponding to the current time period. Moreover, due to the characteristics of MIR itself, after the encrypted content is encapsulated into the data packet, the expiration time of the content can be set in it. If it is aligned with this time period, it can ensure that the previous encrypted data will not be stored in the network cache. , there is no need to initiate a request to the MIR to actively replace the content that should be re-encrypted.
内容消费者(Content Consumer,CC):每一个内容消费者都会拥有一个由MIS所分配的全局定义的身份标识UUID,这是用户加入多标识网络的基础,在此基础上内容消费者还会被赋予一系列的属性。内容消费者向多个属性机构申请属性私钥,使用私钥对从MIR或内容提供者中获取到的内容加以解密,当且仅当该消费者的属性能符合内容的访问结构的要求且私钥生成时的时间周期与密文被加密时的时间周期为同一周期时,内容消费者才能获取到明文,否则密文无法解密。Content Consumer (CC): Each content consumer will have a globally defined identity UUID assigned by MIS, which is the basis for users to join the multi-identity network. Assign a series of properties. Content consumers apply for attribute private keys from multiple attribute agencies, and use the private keys to decrypt the content obtained from MIR or content providers, if and only if the attributes of the consumer can meet the requirements of the content access structure and are private. The content consumer can obtain the plaintext only when the time period when the key is generated and the time period when the ciphertext is encrypted is the same period, otherwise the ciphertext cannot be decrypted.
多标识路由器(Multi-Identifier Router,MIR):多标识路由器具有转发、路由、缓存的功能。数据包中的内容对MIR来说是透明的,即使数据包的内容被加密存储,也不会影响MIR的缓存功能。在缓存时,内容提供商填入的freshness period字段会影响缓存存在的时间,在该时间范围外的内容会被剔出缓存空间。在本方案中,freshness period字段将被设置为本时间周期的截止时间,以保证MIR在本时间周期内不会缓存上一个时间周期加密的内容。Multi-Identifier Router (MIR): Multi-Identifier Router has the functions of forwarding, routing and caching. The content of the data packet is transparent to MIR, even if the content of the data packet is encrypted and stored, it will not affect the caching function of MIR. During caching, the freshness period field filled in by the content provider will affect the duration of the cache, and content outside this time range will be removed from the cache space. In this solution, the freshness period field will be set to the expiration time of this time period to ensure that the MIR will not cache the encrypted content of the previous time period within this time period.
属性授权机构(Attribute Authority,AA):在该访问控制模型中,存在多个属性授权机构,每个授权机构都会运行在MIS节点上,MIS上的AA在初始化阶段共享相同的全局公共参数与主密钥。虽然属性机构可以运行在链上保证数据统一,但是这里将属性机构设计为无须进行数据同步的方案,所有属性机构共同管理一片属性空间,当AA受到密钥生成请求后,同时会将生成密钥的日志发送到区块链上,所有节点都同步了该操作后,AA才会将产生的密钥发送给消费者,以保证每个属性授权操作可追溯。从消费者的角度来看可以认为每个AA都能提供相同质量的密钥生成服务,可将其视为一个整体。Attribute Authority (AA): In this access control model, there are multiple attribute authorities, each of which will run on the MIS node, and the AA on the MIS shares the same global public parameters with the main key. Although the attribute agency can run on the chain to ensure data unification, the attribute agency is designed as a scheme that does not require data synchronization. All attribute agencies jointly manage an attribute space. When AA receives a key generation request, it will generate a key at the same time. After all nodes have synchronized the operation, AA will send the generated key to the consumer to ensure that each attribute authorization operation can be traced back. From the consumer's point of view, each AA can be considered to provide the same quality of key generation service, which can be considered as a whole.
MIS:MIS作为多标识网络中的一部分,在本申请中也承担着相应的责任。每个AA都运行在MIS节点上,MIS区块链同样赋予了AA抗共谋的特性,MIS会将公共参数以及密钥授权的日志保存在区块链中,保证其不被篡改。并且MIS会为AA和CP提供同步的时间周期标识。MIS: MIS, as a part of the multi-identity network, also assumes corresponding responsibilities in this application. Each AA runs on the MIS node, and the MIS blockchain also endows the AA with anti-collusion features. MIS will save the public parameters and the log of key authorization in the blockchain to ensure that they will not be tampered with. And the MIS will provide a synchronized time period identification for the AA and the CP.
下面从多标识系统节点的角度对多标识网络的访问控制方法进行说明,该多标识系统节点可以为服务器,也可以为服务器中的服务单元,具体不做限定。The following describes an access control method for a multi-identity network from the perspective of a multi-identity system node. The multi-identity system node may be a server or a service unit in the server, which is not specifically limited.
请结合参阅图7,图7为本申请实施例提供的多标识网络的访问控制方法的流程示意图,包括:Please refer to FIG. 7 in conjunction. FIG. 7 is a schematic flowchart of an access control method for a multi-identity network provided by an embodiment of the present application, including:
701、若多标识系统节点接收到密钥生成请求,则多标识系统节点获取循环群所对应的群生成元以及全局属性集合。701. If the multi-identity system node receives the key generation request, the multi-identity system node acquires the group generator and the global attribute set corresponding to the cyclic group.
本实施例中,在多标识访问控制模型中,存在多个属性授权机构,每个授权机构都会运行在多标识系统MIS节点上,MIS节点上的AA在初始化阶段共享相同的全局公共参数与主密钥,若MIS节点接收到密钥生成请求之后,可以获取循环群所对应的群生成元以及全局属性集合,其中,群生成元为带曲线参数的群生成元,该曲线参数包括素数的个数以及每个素数的位数,全局属性集合为该MIS节点所对应的所有属性集合,该MIS节点为多标识系统网络中的任意一个节点,也就是说该MIS中包括多个MIS节点,各个MIS节点之间是可以相互通信的。多标识系统节点可以根据,可以得到椭圆曲线和双线性映射关系,椭圆曲线中的所有元素均为循环群上的点,另外属性集合可以由所有区块链节点共同协商确定。In this embodiment, in the multi-identity access control model, there are multiple attribute authorization agencies, each authorization agency will run on the multi-identity system MIS node, and the AA on the MIS node shares the same global public parameters and the main The key, if the MIS node receives the key generation request, it can obtain the group generator and the global attribute set corresponding to the cyclic group, where the group generator is a parameter with a curve The group generator of , the curve parameter Including the number of prime numbers and the number of digits of each prime number, the global attribute set is all attribute sets corresponding to the MIS node, and the MIS node is any node in the multi-identification system network, that is to say, the MIS includes multiple MIS nodes, each MIS node can communicate with each other. Multi-identity system nodes can be based on , the elliptic curve and bilinear mapping relationship can be obtained , all elements in the elliptic curve are cyclic groups In addition, the set of attributes can be determined by common negotiation of all blockchain nodes.
702、多标识系统节点根据群生成元以及全局属性集合确定全局公共参数以及主密钥。702. The multi-identity system node determines the global public parameter and the master key according to the group generator and the global attribute set.
本实施例中,多标识系统节点在获取循环群所对应的群生成元以及全局属性集合之后,可以根据群生成元以及全局属性集合确定全局公共参数以及主密钥,具体的,可以通过如下公式确定全局公共参数以及主密钥:In this embodiment, after acquiring the group generator and the global attribute set corresponding to the cyclic group, the multi-identity system node can determine the global public parameter and the master key according to the group generator and the global attribute set. Specifically, the following formula can be used. Determine the global public parameters and master key:
; ;
; ;
其中,为全局公共参数,,分别为互不相同的素数,分别为阶为N的循环群,为的双线性映射,为的生成元,为的第个子群,,为中的元素,,为正整数,,为全局属性集合,,为所述主密钥,为中的任意一个元素,为的第个子群。in, is a global public parameter, , are different prime numbers, respectively, are cyclic groups of order N, respectively. for The bilinear map of , for the generator of , for First subgroup, , for elements in , , is a positive integer, , is a collection of global properties, , is the master key, for any element of , for First subgroup.
需要说明的是,关于,选择一个哈希函数,被建模为随机预言模型,具体就是随机生成一个正整数,之后建立当前时间周期time与该正整数的映射。另外,多标识系统节点在生成全局公共参数之后,可以将该全局公共参数存储至MIS区块链中,同时通过加密通信隧道将MSK发送给其他MIS节点。It should be noted that about , choose a hash function , It is modeled as a random oracle model. Specifically, a positive integer is randomly generated, and then a mapping between the current time period time and the positive integer is established. In addition, after generating the global public parameter, the multi-identity system node can store the global public parameter in the MIS blockchain, and at the same time send the MSK to other MIS nodes through the encrypted communication tunnel.
703、多标识系统节点根据全局公共参数、目标用户所对应的全局唯一标识、主密钥、当前时间周期以及全局属性集合确定目标用户所对应的属性集合私钥。703. The multi-identity system node determines the private key of the attribute set corresponding to the target user according to the global public parameter, the global unique identifier corresponding to the target user, the master key, the current time period, and the global attribute set.
本实施例中,多标识系统节点根据全局公共参数、目标用户所对应的全局唯一标识、主密钥、当前时间周期以及全局属性集合确定目标用户所对应的属性集合私钥,具体的,可以通过如下公式确定当前时间周期内目标用户所对应的属性集合私钥:In this embodiment, the multi-identity system node determines the private key of the attribute set corresponding to the target user according to the global public parameter, the global unique identifier corresponding to the target user, the master key, the current time period, and the global attribute set. The following formula determines the private key of the attribute set corresponding to the target user in the current time period:
; ;
其中,为全局公共参数,为目标用户所对应的全局唯一标识,为所述目标属性集合,为主密钥,为当前时间周期,为当前时间周期内目标用户所对应的属性集合私钥, 定义如下:in, is a global public parameter, is the global unique identifier corresponding to the target user, is the set of target attributes, master key, is the current time period, is the private key of the attribute set corresponding to the target user in the current time period, Defined as follows:
; ;
其中,为的生成元,,为正整数,,为中的元素,为的第个子群,为阶为N的循环群,,,为哈希函数,,为中的第个子群,,为中的第个子群,,为目标属性集合,,、、、、、以及为属性私钥参数,为自定义的变量。in, for the generator of , , is a positive integer, , for elements in , for First subgroup, is a cyclic group of order N, , , is the hash function, , for in the subgroup, , for in the subgroup, , is the target attribute set, , , , , , ,as well as is the attribute private key parameter, for custom variables.
需要说明的是,多标识系统节点在确定当前时间周期内的目标用户所对应的属性集合私钥之后,若多标识系统节点确定或,则重新随机选择并重新计算。多标识系统节点在计算完成后可以将与目标用户的全局唯一标识的映射关系保存在MIS区块链中,而生成的密钥不会保存在区块链中。It should be noted that after the multi-identity system node determines the private key of the attribute set corresponding to the target user in the current time period, if the multi-identity system node determines or , then randomly select and recalculate. After the calculation of the multi-identity system node is completed, the Globally unique identifier with the target user The mapping relationship is stored in the MIS blockchain, and the generated key is not stored in the blockchain.
704、多标识系统节点根据全局公共参数、目标内容明文、目标内容明文所对应的访问结构以及当前时间周期确定目标内容明文所对应的目标密文。704. The multi-identity system node determines the target ciphertext corresponding to the target content plaintext according to the global public parameter, the target content plaintext, the access structure corresponding to the target content plaintext, and the current time period.
本实施例中,多标识系统节点根据全局公共参数、目标内容明文、目标内容明文所对应的访问结构以及当前时间周期确定目标内容明文所对应的目标密文,具体的,可以通过如下公式生成目标密文:In this embodiment, the multi-identity system node determines the target ciphertext corresponding to the target content plaintext according to the global public parameters, the target content plaintext, the access structure corresponding to the target content plaintext, and the current time period. Specifically, the target content can be generated by the following formula. Ciphertext:
; ;
其中,为目标密文,、、、以及为密文参数,为访问结构,所述访问结构为的二维矩阵,为所述访问结构中的第i行映射到属性的映射函数,为目标内容明文,为的双线性映射,为阶为N的所述循环群,,为正整数,为向量中的元素,,均为随机选择的正整数, 为的生成元,为中的任意一个元素,为的第个子群,,为随机指定的参数,且,为全局属性集合。in, is the target ciphertext, , , , as well as is the ciphertext parameter, is an access structure, the access structure is The two-dimensional matrix of , is the i-th row in the access structure map to property the mapping function, is the plaintext of the target content, for The bilinear map of , is the cyclic group of order N, , is a positive integer, as a vector elements in , , are randomly selected positive integers, for the generator of , for any element of , for First subgroup, , is a randomly assigned parameter, and , is a collection of global properties.
705、多标识系统节点将目标密文、属性集合私钥以及全局公共参数发送至目标用户所对应的终端设备。705. The multi-identity system node sends the target ciphertext, the private key of the attribute set, and the global public parameter to the terminal device corresponding to the target user.
本实施例中,多标识系统节点在将目标内容明文进行加密得到目标密文之后,可将目标密文、属性集合私钥以及全局公共参数发送至目标用户所对应的终端设备,以使得终端设备根据属性集合私钥、目标属性集合以及全局公共参数对目标密文进行解密,得到解密结果,目标属性集合为目标用户所对应的属性集合。In this embodiment, after encrypting the plaintext of the target content to obtain the target ciphertext, the multi-identity system node can send the target ciphertext, the private key of the attribute set and the global public parameter to the terminal device corresponding to the target user, so that the terminal device Decrypt the target ciphertext according to the private key of the attribute set, the target attribute set and the global public parameter to obtain a decryption result, and the target attribute set is the attribute set corresponding to the target user.
需要说明的是,多标识系统节点还可以对密钥所对应的消费者的UUID进行追溯,具体的,多标识系统节点验证目标属性密钥的完整性,目标属性密钥为泄露的密钥;若目标属性密钥的完整性验证通过,则多标识系统节点从目标属性密钥中确定属性私钥参数;并根据属性私钥参数确定泄露的密钥所对应的全局唯一标识。也即多标识系统节点在进行追踪时,首先校验待追踪的密钥的完整性,如果不完整的话,则输出,表示不能追溯到泄露密钥的用户,如果目标属性密钥完整,则首先在密钥中搜索属性密钥参数,并为赋值,之后在MIS区块链中与的映射表中查找,即可以得到泄露密钥的用户的UUID。多标识系统节点可以通过如下公式验证目标属性密钥的完整性:It should be noted that the multi-identity system node can also trace the UUID of the consumer corresponding to the key. Specifically, the multi-identity system node verifies the integrity of the target attribute key, and the target attribute key is a leaked key; If the integrity verification of the target attribute key is passed, the multi-identity system node determines the attribute private key parameter from the target attribute key ; and according to the attribute private key parameter Determine the globally unique identifier corresponding to the compromised key. That is to say, when the multi-identity system node is tracking, it first checks the integrity of the key to be tracked. If it is not complete, it will be output, indicating that it cannot be traced back to the user who leaked the key. If the target attribute key is complete, first Search property key parameter in key , and for assign , and later in the MIS blockchain and You can get the UUID of the user who leaked the key by looking it up in the mapping table. The multi-identity system node can verify the integrity of the target attribute key through the following formula:
,使得, , so that ,
其中,,为的生成元,,为正整数,,为的第个子群,为阶为N的所述循环群,,,为哈希函数,,为中的第个子群,,为中的第个子群,,,、、、、、以及为属性私钥参数,为自定义的变量,分别为阶为N的所述循环群,为的双线性映射,为的生成元,为的第个子群,为所述目标属性集合,为所述当前时间周期。in, , for the generator of , , is a positive integer, , for First subgroup, is the cyclic group of order N, ,, is the hash function, , for in the subgroup, , for in the subgroup, , , , , , , ,as well as is the attribute private key parameter, for custom variables, are the cyclic groups of order N, respectively, for The bilinear map of , for the generator of , for First subgroup, is the set of target attributes, is the current time period.
另外,多标识系统节点还可以通过多标识路由器的缓存过期功能,实现对上一时间周期缓存的删除,由此实现了内容和用户级别的撤销以及泄露密钥的追溯。In addition, the multi-identity system node can also delete the cache of the previous time period through the cache expiration function of the multi-identity router, thereby realizing the revocation of content and user levels and the traceability of leaked keys.
综上所述,可以看出,本申请提供的实施例中,通过引入时间周期这一参数参与密钥的生成与内容的加密,实现了用户撤销,同时将每个属性机构部署在MIS节点上,将原本的单属性机构拓展为多属性机构,实现了去中心化,避免了可能出现的单点故障。To sum up, it can be seen that in the embodiment provided by this application, the parameter of time period is introduced to participate in the generation of the key and the encryption of the content, thereby realizing the user revocation, and at the same time deploying each attribute mechanism on the MIS node , expanding the original single-attribute institution into a multi-attribute institution, realizing decentralization and avoiding possible single point of failure.
上面从多标识系统节点的角度对本申请实施例的多标识网络的访问控制方法的进行说明,下面从终端设备的角度进行说明。The access control method for the multi-identity network according to the embodiment of the present application is described above from the perspective of a multi-identity system node, and is described below from the perspective of a terminal device.
请参阅图8,图8为本申请实施例提供的多标识网络的访问控制方法的另一流程示意图,包括:Please refer to FIG. 8. FIG. 8 is another schematic flowchart of an access control method for a multi-identity network provided by an embodiment of the present application, including:
801、终端设备发送密钥生成请求至多标识系统节点。801. The terminal device sends a key generation request to a multi-identity system node.
本实施例中,终端设备为目标用户所对应的设备,终端设备可以发送密钥生成请求指多标识系统节点,以使得多标识系统节点获取循环群所对应的群生成元以及全局属性集合,并根据群生成元以及全局属性集合确定全局公共参数以及主密钥,且根据全局公共参数、目标用户所对应的全局唯一标识、主密钥、当前时间周期以及全局属性集合确定目标用户所对应的属性集合私钥,且根据全局公共参数、目标内容明文、目标内容明文所对应的访问结构以及当前时间周期确定所述目标内容明文所对应的目标密文,并返回目标密文、属性集合私钥以及全局公共参数。In this embodiment, the terminal device is the device corresponding to the target user, and the terminal device can send a key generation request to refer to the multi-identity system node, so that the multi-identity system node obtains the group generator and the global attribute set corresponding to the cyclic group, and Determine the global public parameter and the master key according to the group generator and the global attribute set, and determine the attribute corresponding to the target user according to the global public parameter, the global unique identifier corresponding to the target user, the master key, the current time period and the global attribute set Set the private key, and determine the target ciphertext corresponding to the target content plaintext according to the global public parameters, the target content plaintext, the access structure corresponding to the target content plaintext and the current time period, and return the target ciphertext, attribute set private key and Global public parameters.
需要说明的是,上述已经对多标识系统节点如何获取群生成元、全局属性集合,并如何根据群生成元以及全局属性集合确定全局公共参数以及主密钥、如何根据全局公共参数、目标用户所对应的全局唯一标识、主密钥、当前时间周期以及全局属性集合确定目标用户所对应的属性集合私钥以及如何根据全局公共参数、目标内容明文、目标内容明文所对应的访问结构以及当前时间周期确定所述目标内容明文所对应的目标密文进行详细说明,具体此处不在赘述。It should be noted that the above has described how the nodes of the multi-identification system obtain the group generator and the global attribute set, how to determine the global public parameters and master key according to the group generator and the global attribute set, how to determine the global public parameters and the master key according to the global public parameters, The corresponding global unique identifier, master key, current time period and global attribute set determine the attribute set private key corresponding to the target user and how to use the global public parameters, target content plaintext, the access structure corresponding to the target content plaintext and the current time period Determining the target ciphertext corresponding to the plaintext of the target content will be described in detail, and details will not be repeated here.
802、终端设备接收多标识系统节点发送的所述目标密文、属性集合私钥以及全局公共参数。802. The terminal device receives the target ciphertext, the private key of the attribute set, and the global public parameter sent by the multi-identity system node.
803、终端设备根据属性集合私钥以及全局公共参数对目标密文进行解密,以得到解密结果。803. The terminal device decrypts the target ciphertext according to the attribute set private key and the global public parameter to obtain a decryption result.
本实施例中,终端设备可以将目标密文重新划分为几个部分,记为,目标用户的属性集合私钥记为,首先判断目标用户所对应的目标属性集合是否符合目标密文目标密文的访问结构的要求,若不符合,则输出,若符合,则通过如下公式对目标密文进行解密,得到目标内容明文:In this embodiment, the terminal device can convert the target ciphertext re-divided into several parts, denoted as , the attribute set private key of the target user is recorded as , first determine whether the target attribute set corresponding to the target user conforms to the target ciphertext target ciphertext access structure If it does not meet the requirements, output it. If it does, decrypt the target ciphertext through the following formula to obtain the target content plaintext:
其中,为所述目标内容明文,为密文参数,,和为中间参数,通过如下公式确定和:in, for the target content in plaintext, is the ciphertext parameter, , and is an intermediate parameter, determined by the following formula and :
其中,为的双线性映射,为的生成元,为的第个子群,为阶为N的循环群,为中的任意一个元素,,,为正整数,为哈希函数,为所述目标属性集合中的第i个属性,和为与不同的密文参数,, ,,,为所述访问结构中的第i行,所述访问结构为的二维矩阵,为所述向量中的元素,,均为随机选择的正整数;in, for The bilinear map of , for the generator of , for First subgroup, is a cyclic group of order N, for any element of , , , is a positive integer, is the hash function, set of properties for the target The ith attribute in , and for and different ciphertext parameters, , , , , is the i-th row in the access structure, the access structure is The two-dimensional matrix of , for the vector elements in , , are randomly selected positive integers;
; ;
以及为属性私钥参数,为密文参数,为中的第个子群,,为中的第个子群。 as well as is the attribute private key parameter, is the ciphertext parameter , for in the subgroup, , for in the subgroup.
综上所述,可以看出,本申请提供的实施例中,通过引入时间周期这一参数参与密钥的生成与内容的加密,实现了用户撤销,同时将每个属性机构部署在MIS节点上,将原本的单属性机构拓展为多属性机构,实现了去中心化,避免了可能出现的单点故障,同时将包含时间周期的密钥与密文发送至终端设备,终端设备对密文进行解密,保证只有当前时间周期的密钥才可以对当前时间周期的密文进行解密,提高信息传输的安全性。To sum up, it can be seen that in the embodiment provided by this application, the parameter of time period is introduced to participate in the generation of the key and the encryption of the content, thereby realizing the user revocation, and at the same time deploying each attribute mechanism on the MIS node , expand the original single-attribute organization into a multi-attribute organization, realize decentralization, avoid possible single point of failure, and send the key and ciphertext containing the time period to the terminal device, and the terminal device will perform the ciphertext processing. Decryption ensures that only the key of the current time period can decrypt the ciphertext of the current time period, thereby improving the security of information transmission.
下面从多标识系统节点与终端设备交互的角度进行说明,请参阅图9,图9为本申请实施例提供的多标识网络的访问控制方法的另一流程示意图,包括:The following is an explanation from the perspective of the interaction between a multi-identity system node and a terminal device. Please refer to FIG. 9. FIG. 9 is another schematic flowchart of the access control method for a multi-identity network provided by an embodiment of the present application, including:
901、终端设备发送密钥生成请求至多标识系统节点。901. The terminal device sends a key generation request to a multi-identity system node.
902、多标识系统节点获取循环群所对应的群生成元以及全局属性集合。902. The multi-identity system node acquires the group generator and the global attribute set corresponding to the cyclic group.
903、多标识系统节点根据群生成元以及全局属性集合确定全局公共参数以及主密钥。903. The multi-identity system node determines the global public parameter and the master key according to the group generator and the global attribute set.
904、多标识系统节点根据全局公共参数、目标用户所对应的全局唯一标识、主密钥、当前时间周期以及全局属性集合确定目标用户所对应的属性集合私钥。904. The multi-identity system node determines the private key of the attribute set corresponding to the target user according to the global public parameter, the global unique identifier corresponding to the target user, the master key, the current time period, and the global attribute set.
905、多标识系统节点根据全局公共参数、目标内容明文、目标内容明文所对应的访问结构以及当前时间周期确定目标内容明文所对应的目标密文。905. The multi-identity system node determines the target ciphertext corresponding to the target content plaintext according to the global public parameter, the target content plaintext, the access structure corresponding to the target content plaintext, and the current time period.
906、多标识系统节点将目标密文、属性集合私钥以及全局公共参数发送至目标用户所对应的终端设备。906. The multi-identity system node sends the target ciphertext, the private key of the attribute set, and the global public parameter to the terminal device corresponding to the target user.
需要说明的是,步骤902至步骤906与图7中的步骤701至步骤705类似,上述图7中已经进行了详细说明,具体此处不在赘述。It should be noted that
907、终端设备根据属性集合私钥以及全局公共参数对目标密文进行解密,以得到解密结果。907. The terminal device decrypts the target ciphertext according to the attribute set private key and the global public parameter to obtain a decryption result.
需要说明的是,步骤907与图8中的步骤803类似,上述图8中已经进行了详细说明,具体此处不在赘述。It should be noted that
综上所述,可以看出,本申请提供的实施例中,通过引入时间周期这一参数参与密钥的生成与内容的加密,实现了用户撤销,同时将每个属性机构部署在MIS节点上,将原本的单属性机构拓展为多属性机构,实现了去中心化,避免了可能出现的单点故障,同时将包含时间周期的密钥与密文发送至终端设备,终端设备对密文进行解密,保证只有当前时间周期的密钥才可以对当前时间周期的密文进行解密,提高信息传输的安全性。To sum up, it can be seen that in the embodiment provided by this application, the parameter of time period is introduced to participate in the generation of the key and the encryption of the content, thereby realizing the user revocation, and at the same time deploying each attribute mechanism on the MIS node , expand the original single-attribute organization into a multi-attribute organization, realize decentralization, avoid possible single point of failure, and send the key and ciphertext containing the time period to the terminal device, and the terminal device will perform the ciphertext processing. Decryption ensures that only the key of the current time period can decrypt the ciphertext of the current time period, thereby improving the security of information transmission.
上面从多标识网络的控制方法的角度对本申请实施例进行说明,下面从多标识系统节点以及终端设备的角度对本申请实施例进行说明。The embodiments of the present application are described above from the perspective of a method for controlling a multi-identity network, and the embodiments of the present application are described below from the perspectives of a multi-identity system node and a terminal device.
请参阅图10,图10为本申请实施例提供的多标识系统节点的虚拟结构示意图,所述多标识系统节点1000包括:Please refer to FIG. 10. FIG. 10 is a schematic diagram of a virtual structure of a multi-identity system node provided by an embodiment of the present application. The
获取单元1001,用于在接收到密钥生成请求时,获取循环群所对应的群生成元以及全局属性集合,所述多标识系统节点为多标识系统网络中的任意一个节点;an obtaining
第一确定单元1002,用于根据所述群生成元以及所述全局属性集合确定全局公共参数以及主密钥;a first determining
第二确定单元1003,用于根据所述全局公共参数、目标用户所对应的全局唯一标识、所述主密钥、当前时间周期以及所述全局属性集合确定当前时间周期内所述目标用户所对应的属性集合私钥;The second determining
第三确定单元1004,用于根据所述全局公共参数、目标内容明文、所述目标内容明文所对应的访问结构以及所述当前时间周期确定所述目标内容明文所对应的目标密文;A third determining
发送单元1005,用于将所述目标密文、所述属性集合私钥以及所述全局公共参数发送至所述目标用户所对应的终端设备,以使得所述终端设备根据所述属性集合私钥、目标属性集合以及所述全局公共参数对所述目标密文进行解密,得到解密结果,所述目标属性集合为所述目标用户所对应的属性集合。The sending
一种可能的设计中,所述第一确定单元1002具体用于:In a possible design, the first determining
通过如下公式确定所述全局公共参数以及所述主密钥:The global public parameter and the master key are determined by the following formulas:
; ;
; ;
其中,为所述全局公共参数,,分别为互不相同的素数,分别为阶为N的所述循环群,为的双线性映射,为的生成元,为的第个子群,,,为正整数,,为所述全局属性集合,,为所述主密钥,为中的任意一个元素,为的第个子群。in, for the global public parameter, , are different prime numbers, respectively, are the cyclic groups of order N, respectively, for The bilinear map of , for the generator of , for First subgroup, , , is a positive integer, , is the set of global properties, , is the master key, for any element of , for First subgroup.
一种可能的设计中,第二确定单元1003具体用于:In a possible design, the second determining
通过如下公式确定所述属性集合私钥:The private key of the attribute set is determined by the following formula:
; ;
其中,为所述全局公共参数,为所述目标用户所对应的全局唯一标识,为所述目标属性集合,为所述主密钥,为所述当前时间周期,为所述当前时间周期内目标用户所对应的属性集合私钥, 定义如下:in, for the global public parameter, is the global unique identifier corresponding to the target user, is the set of target attributes, is the master key, for the current time period, is the private key of the attribute set corresponding to the target user in the current time period, Defined as follows:
; ;
其中,为的生成元,,为正整数,,为的第个子群,为阶为N的所述循环群,,,为哈希函数,,为中的第个子群,,为中的第个子群,,为所述目标属性集合,,、、、、、以及为属性私钥参数,为自定义的变量。in, for the generator of , , is a positive integer, , for First subgroup, is the cyclic group of order N, , , is the hash function, , for in the subgroup, , for in the subgroup, , is the set of target attributes, , , , , , ,as well as is the attribute private key parameter, for custom variables.
一种可能的设计中,所述第三确定单元1004具体用于:In a possible design, the third determining
通过如下公式生成所述目标密文:The target ciphertext is generated by the following formula:
; ;
其中,为所述目标密文,、、、以及为密文参数,为所述访问结构,所述访问结构为的二维矩阵,为所述访问结构中的第i行映射到属性的映射函数,为所述目标内容明文,为的双线性映射,为阶为N的所述循环群,,为正整数,为向量中的元素,,均为随机选择的正整数,为的生成元,为中的任意一个元素,为的第个子群,,为随机指定的参数,且,为全局属性集合。in, is the target ciphertext, , , , as well as is the ciphertext parameter, is the access structure, the access structure is The two-dimensional matrix of , is the i-th row in the access structure map to property the mapping function, for the target content in plaintext, for The bilinear map of , is the cyclic group of order N, , is a positive integer, as a vector elements in , , are randomly selected positive integers, for the generator of , for any element of , for First subgroup, , is a randomly assigned parameter, and , is a collection of global properties.
一种可能的设计中,所述多标识网络节点100还包括:In a possible design, the multi-identity network node 100 further includes:
追踪单元1006,所述追踪单元1006用于:
验证目标属性密钥的完整性,所述目标属性密钥为泄露的密钥;Verifying the integrity of the target attribute key, which is a leaked key;
若所述目标属性密钥的完整性验证通过,则从所述目标属性密钥中确定属性私钥参数;If the integrity verification of the target attribute key is passed, determine the attribute private key parameter from the target attribute key ;
根据所述属性私钥参数确定所述目标属性密钥所对应的全局唯一标识。According to the attribute private key parameter Determine the global unique identifier corresponding to the target attribute key.
一种可能的设计中,所述追踪单元1006具体用于:In a possible design, the
通过如下公式验证所述目标属性密钥的完整性:The integrity of the target attribute key is verified by the following formula:
,使得, , so that ,
其中,,为的生成元,,为正整数,,为的第个子群,为阶为N的所述循环群,,,为哈希函数,,为中的第个子群,,为中的第个子群,,,、、、、、以及为属性私钥参数,为自定义的变量,分别为阶为N的所述循环群,为的双线性映射,为的生成元,为的第个子群,为所述目标属性集合,为所述当前时间周期。in, , for the generator of , , is a positive integer, , for First subgroup, is the cyclic group of order N, ,, is the hash function, , for in the subgroup, , for in the subgroup, , , , , , , ,as well as is the attribute private key parameter, for custom variables, are the cyclic groups of order N, respectively, for The bilinear map of , for the generator of , for First subgroup, is the set of target attributes, is the current time period.
请参阅图11,图11为本申请实施例提供的终端设备的虚拟结构示意图,所述终端设备1100包括:Please refer to FIG. 11. FIG. 11 is a schematic diagram of a virtual structure of a terminal device provided by an embodiment of the present application. The
发送单元1101,用于发送密钥生成请求至多标识系统节点,以使得所述多标识系统节点获取循环群所对应的群生成元以及全局属性集合,并根据所述群生成元以及所述全局属性集合确定全局公共参数以及主密钥,且根据所述全局公共参数、目标用户所对应的全局唯一标识、所述主密钥、当前时间周期以及所述全局属性集合确定所述目标用户所对应的属性集合私钥,且根据所述全局公共参数、目标内容明文、所述目标内容明文所对应的访问结构以及所述当前时间周期确定所述目标内容明文所对应的目标密文,并返回所述目标密文、所述属性集合私钥以及所述全局公共参数;The sending
接收单元1102,用于接收所述多标识系统节点发送的所述目标密文、所述属性集合私钥以及所述全局公共参数;a
解密单元1103,用于根据所述属性集合私钥以及所述全局公共参数对所述目标密文进行解密,以得到解密结果。The
一种可能的设计中,所述解密单元1103具体用于:In a possible design, the
若所述属性集合符合所述目标访问结构的要求,则通过如下公式对所述目标密文进行解密,得到所述目标内容明文:If the attribute set meets the requirements of the target access structure, the target ciphertext is decrypted by the following formula to obtain the target content plaintext:
其中,为所述目标内容明文,为密文参数,,和为中间参数,通过如下公式确定和:in, for the target content in plaintext, is the ciphertext parameter, , and is an intermediate parameter, determined by the following formula and :
其中,为的双线性映射,为的生成元,为的第个子群,为阶为N的循环群,为中的任意一个元素,,,为正整数,为哈希函数,为所述目标属性集合中的第i个属性,和为与不同的密文参数,, ,,,为所述访问结构中的第i行,所述访问结构为的二维矩阵,为所述向量中的元素,,均为随机选择的正整数;in, for The bilinear map of , for the generator of , for First subgroup, is a cyclic group of order N, for any element of , , , is a positive integer, is the hash function, set of properties for the target The ith attribute in , and for and different ciphertext parameters, , , , , is the i-th row in the access structure, the access structure is The two-dimensional matrix of , for the vector elements in , , are randomly selected positive integers;
; ;
以及为属性私钥参数,为密文参数,为中的第个子群,,为中的第个子群。 as well as is the attribute private key parameter, is the ciphertext parameter , for in the subgroup, , for in the subgroup.
本申请实施例还提供了一种计算机设备。本申请实施例提供的多标识系统节点可以部署在该计算机设备上。图12示例性的提供了计算机设备的一种可能的架构图。如图12所示,该计算机设备1200可以包括处理器1201、存储器1202、通信接口1203和总线1204。在该计算机设备中,处理器1201的数量可以是一个或多个,图12仅示意了其中一个处理器1201。可选的,处理器1201可以是中央处理器(Central Processing Unit,CPU)。若计算机设备具有多个处理器1201,多个处理器1201的类型可以不同,或者可以相同。可选的,计算机设备的多个处理器还可以集成为多核处理器。The embodiments of the present application also provide a computer device. The multi-identity system node provided by the embodiment of the present application may be deployed on the computer device. FIG. 12 exemplarily provides a possible architectural diagram of a computer device. As shown in FIG. 12 , the
存储器1202存储计算机指令和数据,存储器1202可以存储实现本申请实施例提供的第一种多标识系统节点的功能所需的计算机指令和数据。存储器1202可以是以下存储介质的任一种或任一种组合:非易失性存储器(如只读存储器(Read-Only Memory,ROM)、固态硬盘(Solid State Disk,SSD)、硬盘(Hard Disk Drive,HDD)、光盘等、易失性存储器。The
通信接口1203可以是以下器件的任一种或任一种组合:网络接口(如以太网接口)、无线网卡等具有网络接入功能的器件。The
通信接口1203用于计算机设备与其他节点或者其他计算机设备进行数据通信。The
图12还示例性地绘制出总线1204。总线1204可以将处理器1201与存储器1202、通信接口1203连接。这样,通过总线1204,处理器1201可以访问存储器1202,还可以利用通信接口1203与其他节点或者其他计算机设备进行数据交互。FIG. 12 also exemplarily depicts
在本申请中,计算机设备执行存储器1202中的计算机指令,可以实现本申请实施例提供的第一种多标识系统节点的功能。例如,计算机设备执行存储器1202中的计算机指令,可以执行上述由多标识系统节点所执行的操作。In the present application, the computer device executes the computer instructions in the
接下来介绍本申请提供的另一种终端设备,如图13所示,终端设备1300包括:Next, another terminal device provided by this application is introduced. As shown in FIG. 13 , the
接收器1301、发射器1302、处理器1303和存储器1304 (其中终端设备1300中的处理器1303的数量可以一个或多个,图13中以一个处理器为例)。在本申请的一些实施例中,接收器1301、发射器1302、处理器1303和存储器1304可通过总线或其它方式连接,其中,图13中以通过总线连接为例。The
存储器1304可以包括只读存储器和随机存取存储器,并向处理器1303提供指令和数据。存储器1304的一部分还可以包括NVRAM。存储器1304存储有操作系统和操作指令、可执行模块或者数据结构,或者它们的子集,或者它们的扩展集,其中,操作指令可包括各种操作指令,用于实现各种操作。操作系统可包括各种系统程序,用于实现各种基础业务以及处理基于硬件的任务。
处理器1303控制终端设备的操作,处理器1303还可以称为CPU。具体的应用中,终端设备的各个组件通过总线系统耦合在一起,其中总线系统除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都称为总线系统。The
上述本申请实施例揭示的所述多标识网络的访问控制方法可以应用于处理器1303中,或者由处理器1303实现。处理器1303可以是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述图1所示的方法的各步骤可以通过处理器1303中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器1303可以是通用处理器、DSP、ASIC、FPGA或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器1304,处理器1303读取存储器1304中的信息,结合其硬件完成上述方法的步骤。The access control method for the multi-identity network disclosed in the above embodiments of the present application may be applied to the
本申请实施例中,处理器1303,用于执行前述的多标识网络的访问控制方法的实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。In this embodiment of the present application, the
本申请实施例还提供一种计算机可读介质,包含计算机执行指令,计算机执行指令能够使服务器执行上述实施例描述的多标识网络的访问控制方法,其实现原理和技术效果类似,此处不再赘述。Embodiments of the present application further provide a computer-readable medium, including computer-executable instructions, and the computer-executable instructions can enable a server to execute the access control method for a multi-identity network described in the foregoing embodiments. Repeat.
本领域普通技术人员可以理解:实现上述各方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成。前述的程序可以存储于一计算机可读取存储介质中。该程序在执行时,执行包括上述各方法实施例的步骤;而前述的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。Those of ordinary skill in the art can understand that all or part of the steps of implementing the above method embodiments may be completed by program instructions related to hardware. The aforementioned program can be stored in a computer-readable storage medium. When the program is executed, the steps including the above method embodiments are executed; and the foregoing storage medium includes: ROM, RAM, magnetic disk or optical disk and other media that can store program codes.
最后应说明的是:以上各实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述各实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present application, but not to limit them; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: The technical solutions described in the foregoing embodiments can still be modified, or some or all of the technical features thereof can be equivalently replaced; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the technical solutions of the embodiments of the present application. scope.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210700564.0A CN114785622B (en) | 2022-06-21 | 2022-06-21 | Access control method, device and storage medium for multi-identification network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210700564.0A CN114785622B (en) | 2022-06-21 | 2022-06-21 | Access control method, device and storage medium for multi-identification network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114785622A CN114785622A (en) | 2022-07-22 |
CN114785622B true CN114785622B (en) | 2022-09-30 |
Family
ID=82420622
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210700564.0A Active CN114785622B (en) | 2022-06-21 | 2022-06-21 | Access control method, device and storage medium for multi-identification network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114785622B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115801308B (en) * | 2022-09-16 | 2023-08-29 | 北京瑞莱智慧科技有限公司 | Data processing method, related device and storage medium |
CN115426308B (en) * | 2022-11-08 | 2023-04-11 | 北京大学深圳研究生院 | Link state routing method under multi-identification network |
CN116756780B (en) * | 2023-08-21 | 2024-01-30 | 北京邮电大学 | Alliance chain data access control method based on CP-ABE algorithm and related equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105592100A (en) * | 2016-01-26 | 2016-05-18 | 西安电子科技大学 | Government services cloud access control method based on attribute encryption |
CN105915333A (en) * | 2016-03-15 | 2016-08-31 | 南京邮电大学 | High-efficiency secret key distribution method based on attribute encryption |
CN109711184A (en) * | 2018-12-28 | 2019-05-03 | 国网电子商务有限公司 | Block chain data access control method and device based on attribute encryption |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9209974B1 (en) * | 2015-05-03 | 2015-12-08 | Zeutro, Llc | Functional encryption key management |
CN112291295A (en) * | 2020-08-11 | 2021-01-29 | 佛山赛思禅科技有限公司 | High-safety mobile office network based on multi-identification network system |
CN113098683B (en) * | 2021-03-17 | 2022-05-03 | 武汉理工大学 | An attribute-based data encryption method and system |
CN113194089B (en) * | 2021-04-28 | 2022-03-11 | 四川师范大学 | A Ciphertext Policy-Based Attribute-Based Encryption Method Supporting Attribute Revocation |
CN114372292B (en) * | 2021-09-08 | 2025-04-22 | 佛山赛思禅科技有限公司 | A method and system for improving the reliability of blockchain differential authorization deduplication system |
CN113949545A (en) * | 2021-09-30 | 2022-01-18 | 西安理工大学 | Dual access control method based on time and attribute in cloud computing |
CN114036539B (en) * | 2021-10-14 | 2025-01-24 | 国家电网有限公司 | Secure and auditable IoT data sharing system and method based on blockchain |
-
2022
- 2022-06-21 CN CN202210700564.0A patent/CN114785622B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105592100A (en) * | 2016-01-26 | 2016-05-18 | 西安电子科技大学 | Government services cloud access control method based on attribute encryption |
CN105915333A (en) * | 2016-03-15 | 2016-08-31 | 南京邮电大学 | High-efficiency secret key distribution method based on attribute encryption |
CN109711184A (en) * | 2018-12-28 | 2019-05-03 | 国网电子商务有限公司 | Block chain data access control method and device based on attribute encryption |
Non-Patent Citations (1)
Title |
---|
基于属性基加密的区块链隐私保护与访问控制方法;汪金苗等;《信息网络安全》;20200910(第09期);第1-5页 * |
Also Published As
Publication number | Publication date |
---|---|
CN114785622A (en) | 2022-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114785622B (en) | Access control method, device and storage medium for multi-identification network | |
JP5536362B2 (en) | Method for facilitating communication in a content-centric network | |
CN102422617B (en) | Secure fast table lookup for negotiation of protocols with bidirectional identifiers | |
US8006086B2 (en) | Revocation of cryptographic digital certificates | |
US8098823B2 (en) | Multi-key cryptographically generated address | |
Alzahrani | An information-centric networking based registry for decentralized identifiers and verifiable credentials | |
CN103095710B (en) | Broadcast enciphering transmission method based on identity in network centered by content | |
Yu et al. | Content protection in named data networking: Challenges and potential solutions | |
US20080013733A1 (en) | Key Management Messages For Secure Broadcast | |
JP2011515049A (en) | IP address delegation | |
CN114389835B (en) | IPv6 option explicit source address encryption security verification gateway and verification method | |
CN114172930B (en) | Large-scale Internet of things service domain isolated communication method and device, electronic equipment and storage medium | |
US20140115154A1 (en) | Linked Identifiers for Multiple Domains | |
Asokan et al. | Towards securing disruption-tolerant networking | |
Pallickara et al. | A framework for secure end-to-end delivery of messages in publish/subscribe systems | |
CN113973007B (en) | Time-controlled encrypted anonymous query method and system based on broadcast encryption and onion routing | |
CN106936833A (en) | A kind of content center network method for secret protection based on Hybrid Encryption and anonymous group | |
CN115567192A (en) | Method and system for realizing transparent encryption and decryption of multicast data by quantum key distribution | |
CN115883088B (en) | BGP route-based autonomous domain security parameter updating method | |
CN119788436A (en) | Data protection method, device and storage medium | |
Zhang et al. | Investigating the design space for name confidentiality in named data networking | |
Zhu et al. | An edge re‐encryption‐based access control mechanism in NDN | |
CN114615006A (en) | Edge layer data security protection method and system for power distribution Internet of things and storage medium | |
Wang et al. | T-IP: A self-trustworthy and secure Internet protocol | |
CN114095930B (en) | Method for handling violations of satellite network users combined with access authentication and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20250703 Address after: 528200 Guangdong Province, Nanhai District, Gucheng Street, Nanning West Road, Guangdong Xiaxi International Rubber and Plastics City Phase I, Building 2, Fourth Floor, A2-6, One (Residence Declaration) Patentee after: Foshan saisichen Technology Co.,Ltd. Country or region after: China Address before: 518000 Guangdong Province Shenzhen City Nanshan District Zoo Road Deyi Mingju (Phase I) Building 1 C-18B Patentee before: SHENZHEN CESTBON TECHNOLOGY Co.,Ltd. Country or region before: China Patentee before: Huzhou saisi'an Technology Co.,Ltd. |