In recent years,the total investment in the non-ferrous metal industry and the scale of the trading market continue to expand,which has accelerated the growth of the data volume of the entire life cycle of the mineral resource supply chain.Due to the sensitivity of my country’s mineral resource information and the protection of enterprises’ own interests,a lot of information in the mineral resource supply chain is not disclosed,and illegal incidents such as illegal mining and smuggling occur from time to time.This paper combines blockchain technology,attribute encryption algorithm based on ciphertext policy,Hyperledger Fabric(Hyperledger)federated chain technology and IPFS to build a secure data sharing and trusted traceability system for mineral resources,using the Interstellar File System to store massive unstructured data and encrypted information,and storing only the file addressing hash generated by the Interstellar File System on the blockchain The blockchain only stores the file addressing hash generated by the interstellar file system,which relieves the data storage pressure of the blockchain.At the same time,this paper also constructs a traceable and reversible multi-institution ciphertext policy-based attribute encryption(TR-MA-CPABE)scheme to meet the needs of private information protection and system dynamic fine-grained access control.The encryption algorithm adopts an access strategy in the form of a linear secret sharing matrix,which improves the operation speed of encryption and decryption;in the system model,two blockchains are constructed to store information of different confidentiality levels and types to achieve data classification and hierarchical protection;A central agency and multi-authority agency hierarchical authorization management disperse the computing and communication overhead of the system;this scheme realizes the precise tracking of malicious user identities through white-box tracking technology,and can be updated without updating keys or ciphertexts.Next revoke users and properties instantly.This scheme has indistinguishable security under the chosen access strategy and chosen plaintext attack(IND-SAP-CPA)in the standard model of cryptography.The experimental simulation proves that compared with other similar schemes,the computational complexity of this scheme is significantly reduced,and the storage space is slightly reduced.It is simple,efficient and safe. |