CN115860741A - Block chain data encryption verification method, device and system - Google Patents
Block chain data encryption verification method, device and system Download PDFInfo
- Publication number
- CN115860741A CN115860741A CN202211638780.3A CN202211638780A CN115860741A CN 115860741 A CN115860741 A CN 115860741A CN 202211638780 A CN202211638780 A CN 202211638780A CN 115860741 A CN115860741 A CN 115860741A
- Authority
- CN
- China
- Prior art keywords
- transaction
- blockchain
- attribute
- node
- blockchain network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 96
- 238000000034 method Methods 0.000 title claims abstract description 66
- 239000003999 initiator Substances 0.000 claims abstract description 122
- 238000012545 processing Methods 0.000 claims abstract description 106
- 238000004364 calculation method Methods 0.000 claims abstract description 67
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 34
- 230000001502 supplementing effect Effects 0.000 claims abstract description 13
- 238000004590 computer program Methods 0.000 claims description 24
- 238000003860 storage Methods 0.000 claims description 13
- 238000009826 distribution Methods 0.000 claims description 6
- 241000282693 Cercopithecidae Species 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 23
- 230000006870 function Effects 0.000 description 15
- 238000004891 communication Methods 0.000 description 14
- 238000004458 analytical method Methods 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 239000000872 buffer Substances 0.000 description 4
- 239000000306 component Substances 0.000 description 3
- 239000008358 core component Substances 0.000 description 3
- 238000013507 mapping Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the application provides a block chain data encryption verification method, a device and a system, which relate to the field of block chains, and the method comprises the following steps: generating a key containing the attribute collection and distributing the key to a blockchain wallet of a corresponding transaction related party node in a blockchain network; performing data encryption on the transaction generation amount according to a preset attribute-based encryption algorithm, a preset access authority and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for uplink; receiving signature transaction returned by the block chain network and performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, and sending the transaction information to the block chain network for common identification and posting; according to the method and the system, the block chain transaction initiator can encrypt the sensitive data efficiently, the transaction related party can decrypt the sensitive data efficiently, and the transaction verifier can verify the validity of the ciphertext data efficiently.
Description
Technical Field
The present application relates to the field of blockchain, and in particular, to a method, an apparatus, and a system for verifying blockchain data encryption.
Background
One of the characteristics of the block chain technology is that the account book is held by multiple parties, and the data is public and transparent. The blockchain data are completely public and transparent, and can not be accepted in some financial systems related to business sensitive information, and the conventional key encapsulation method generally used by the blockchain system at present can only solve the problem that related parties can see the data and can not meet the requirement that part of parties needing to verify transactions can verify in a ciphertext state.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a block chain data encryption verification method, a block chain data encryption verification device and a block chain data encryption verification system, so that a block chain transaction initiator can efficiently encrypt sensitive data, a transaction related party can efficiently decrypt the sensitive data, and a transaction verifier can efficiently verify the validity of ciphertext data.
In order to solve at least one of the above problems, the present application provides the following technical solutions:
in a first aspect, the present application provides a method for verifying block chain data encryption, including:
generating a key containing the attribute collection and distributing the key to the blockchain wallets of the corresponding transaction related party nodes in the blockchain network;
carrying out data encryption on the transaction generation amount according to a preset attribute-based encryption algorithm, a preset access right and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for uplink so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction information;
and receiving signature transaction returned by the blockchain network, performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, sending the transaction information to the blockchain network for common identification and entry so as to enable a blockchain wallet of a transaction related party node in the blockchain network to acquire the transaction information from the blockchain network, performing attribute-based decryption processing on a transaction occurrence amount in the transaction information through the secret key containing the attribute collection, determining the corresponding transaction occurrence amount and a transaction initiator identity and informing a user side when the attribute-based decryption processing is successful, and synchronizing the transaction state to the blockchain network to be invalid when the attribute-based decryption processing is failed.
Further, the data encryption of the transaction occurrence amount according to the preset attribute-based encryption algorithm, the preset access right and the secret key to obtain an encrypted ciphertext includes:
constructing an access tree of a transaction occurrence decryption key, wherein leaf nodes of the access tree are attributes, each attribute corresponds to a finite field random number, an upper node performs Lagrange interpolation on an attribute value of a lower node to obtain a polynomial, the value of the polynomial at x =0 is a secret value of the upper node, the right lower upper node is up to a root node, and the secret value of the root node is a key required for decrypting the access data;
and performing data encryption on the transaction generation amount according to the secret key, the access structure corresponding to the preset access authority, the attribute set of the transaction generation amount and the secret value set to obtain an encrypted ciphertext.
Further, the sending the transaction information after the blind calculation processing to the blockchain network for uplink includes:
performing a calculation of commitments and related parameters for the transaction occurrence;
and carrying out blind calculation and wallet secret key signature on the calculation result to obtain transaction information subjected to blind calculation processing, and sending the transaction information to the block chain network for uplink.
Further, after the sending the transaction information to the blockchain network consensus accounting, the method further includes:
receiving a random challenge sent by a transaction verification node in a block chain network, wherein the random challenge is initiated by a transaction generation amount commitment aiming at the transaction information monkey after the transaction verification node performs identity verification on the transaction initiator node;
and calculating a relevant certificate according to the type of the random challenge, the corresponding commitment and the specific parameter of the random challenge, and returning the relevant certificate to the transaction verification node.
In a second aspect, the present application provides a method for verifying block chain data encryption, including:
receiving a key containing an attribute set sent by a blockchain wallet of a corresponding transaction initiator node in a blockchain network;
acquiring transaction information from the blockchain network, and performing attribute-based decryption processing on a transaction occurrence amount in the transaction information through the secret key containing the attribute collection, wherein the transaction information is obtained by performing data encryption on the transaction occurrence amount through a blockchain wallet of a transaction initiator node in the blockchain network according to a preset attribute-based encryption algorithm, a preset access right and the secret key, and the transaction information is subjected to encrypted ciphertext completion through the blockchain network according to a real transaction signature corresponding to a preset group private key;
and when the attribute-based decryption processing is successful, determining the corresponding transaction generation amount and the transaction initiator identity and informing the user side, and when the attribute-based decryption processing is failed, synchronizing the state of the transaction to the blockchain network to be invalid.
Further, the attribute-based decryption processing of the transaction occurrence amount in the transaction information by the key containing the attribute collection includes:
analyzing the access structure tree of the transaction information through the key containing the attribute collection;
and performing attribute-based decryption on the leaf nodes of the access structure tree, and determining the transaction occurrence amount in the transaction information.
In a third aspect, the present application provides a device for verifying block chain data encryption, including:
the key distribution module is used for generating keys containing the attribute collection and distributing the keys to the blockchain wallets of the corresponding transaction related party nodes in the blockchain network;
the generation amount encryption module is used for carrying out data encryption on the transaction generation amount according to a preset attribute base encryption algorithm, a preset access authority and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for chaining, so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction;
and the transaction information uplink module is used for receiving the signature transaction returned by the blockchain network and performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, sending the transaction information to the blockchain network for common identification and account entry so as to enable a blockchain wallet of a transaction related party node in the blockchain network to obtain transaction information from the blockchain network, performing attribute-based decryption processing on the transaction occurrence amount in the transaction information through the secret key containing the attribute collection, determining the corresponding transaction occurrence amount and the transaction initiator identity and informing a user end when the attribute-based decryption processing is successful, and synchronizing the transaction state to the blockchain network to be invalid when the attribute-based decryption processing is failed.
Further, the generation amount encryption module comprises:
an access tree construction unit, configured to construct an access tree of a transaction generation amount decryption key, where leaf nodes of the access tree are attributes, each attribute corresponds to a finite field random number, an upper node performs lagrangian interpolation on an attribute value of a lower node to obtain a polynomial, a value of the polynomial at x =0 is a secret value of the upper node, the right lower upper node is up to a root node, and a secret value of the root node is a key required for decrypting the access data;
and the data encryption unit is used for carrying out data encryption on the transaction occurrence amount according to the secret key, the access structure corresponding to the preset access authority, the attribute set of the transaction occurrence amount and the secret value set to obtain an encrypted ciphertext.
Further, the transaction information uplink module comprises:
the amount of occurrence calculation unit is used for calculating commitment and related parameters of the transaction amount of occurrence;
and the blinded calculation unit is used for carrying out blinded calculation and wallet secret key signature on the calculation result to obtain transaction information subjected to blinded calculation processing, and sending the transaction information to the block chain network for uplink.
Further, still include:
the system comprises a challenge receiving unit, a random challenge receiving unit and a random challenge sending unit, wherein the random challenge is sent by a transaction verification node in a block chain network, and the random challenge is sent by the transaction verification node aiming at a transaction generation amount commitment of the transaction information monkey after the transaction verification node performs identity verification on the transaction initiator node;
and the challenge verification unit is used for calculating a relevant certificate according to the type of the random challenge, the corresponding commitment and the specific parameter of the random challenge and returning the relevant certificate to the transaction verification node.
In a fourth aspect, the present application provides a device for verifying encryption of blockchain data, including:
the key acquisition module is used for receiving a key containing an attribute collection sent by a blockchain wallet of a corresponding transaction initiator node in a blockchain network;
the generation amount decryption module is used for acquiring transaction information from the blockchain network and performing attribute-based decryption processing on the transaction generation amount in the transaction information through the secret key containing the attribute collection, wherein the transaction information is obtained by performing data encryption on the transaction generation amount through a blockchain wallet of a transaction initiator node in the blockchain network according to a preset attribute-based encryption algorithm, a preset access right and the secret key, and the transaction information is subjected to encrypted ciphertext completion through the blockchain network according to a real transaction signature corresponding to a preset group private key;
and the feedback synchronization module is used for determining the corresponding transaction generation amount and the transaction initiator identity and informing the user side when the attribute-based decryption processing is successful, and synchronizing the state of the transaction to the blockchain network to be invalid when the attribute-based decryption processing is failed.
Further, the generation amount decryption module comprises:
the access tree analysis unit is used for carrying out access structure tree analysis on the transaction information through the secret key containing the attribute collection;
and the data decryption unit is used for carrying out attribute-based decryption on the leaf nodes of the access structure tree and determining the transaction occurrence amount in the transaction information.
In a fifth aspect, the present application provides a blockchain data encryption verification system, including a blockchain wallet of a transaction initiator node, a blockchain wallet of a transaction related party node, and a transaction verification node in a blockchain network;
the blockchain wallet of the transaction initiator node comprises:
the key distribution module is used for generating keys containing the attribute collection and distributing the keys to the blockchain wallets of the corresponding transaction related party nodes in the blockchain network;
the generation amount encryption module is used for carrying out data encryption on the transaction generation amount according to a preset attribute base encryption algorithm, a preset access authority and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for chaining, so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction;
the transaction information uplink module is used for receiving the signature transaction returned by the blockchain network and performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, and sending the transaction information to the blockchain network for common identification and account entry;
the blockchain wallet of the transaction-related party node comprises:
the key acquisition module is used for receiving a key containing an attribute collection sent by a blockchain wallet of a corresponding transaction initiator node in a blockchain network;
the generation amount decryption module is used for acquiring the transaction information from the blockchain network and performing attribute-based decryption processing on the transaction generation amount in the transaction information through the secret key containing the attribute collection;
and the feedback synchronization module is used for determining the corresponding transaction generation amount and the transaction initiator identity and informing the user side when the attribute-based decryption processing is successful, and synchronizing the state of the transaction to the blockchain network to be invalid when the attribute-based decryption processing is failed.
In a sixth aspect, the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the block chain data encryption verification method when executing the program.
In a seventh aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the steps of the block chain data encryption verification method.
In an eighth aspect, the present application provides a computer program product comprising a computer program/instructions which, when executed by a processor, implement the steps of the blockchain data encryption verification method.
According to the technical scheme, the block chain data encryption verification method, the block chain data encryption verification device and the block chain data encryption verification system are characterized in that the transaction initiator executes attribute-based encryption on transaction occurrence amount (transaction sensitive information), and calculates the transaction occurrence amount and the commitment of related parameters, so that the block chain transaction initiator can efficiently encrypt sensitive data, transaction related parties can efficiently decrypt the sensitive data, and the transaction verifier can efficiently verify the validity of ciphertext data.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following descriptions are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart illustrating a method for verifying encryption of blockchain data according to an embodiment of the present disclosure;
fig. 2 is a second flowchart illustrating a block chain data encryption verification method according to an embodiment of the present application;
fig. 3 is a third schematic flowchart illustrating a method for verifying encryption of blockchain data according to an embodiment of the present invention;
FIG. 4 is a fourth flowchart illustrating a method for verifying encryption of blockchain data according to an embodiment of the present invention;
FIG. 5 is a fifth flowchart illustrating a method for verifying encryption of blockchain data according to an embodiment of the present invention;
FIG. 6 is a sixth flowchart illustrating a method for verifying encryption of blockchain data according to an embodiment of the present application;
FIG. 7 is a block diagram of a block chain data encryption verification apparatus according to an embodiment of the present application;
fig. 8 is a second block chain data encryption verification apparatus according to an embodiment of the present application;
fig. 9 is a third block diagram of a device for verifying encryption of blockchain data according to an embodiment of the present invention;
FIG. 10 is a fourth block diagram of a device for verifying encryption of blockchain data according to an embodiment of the present invention;
FIG. 11 is a fifth block chain data encryption verification apparatus according to an embodiment of the present application;
FIG. 12 is a sixth block diagram of a device for verifying encryption of blockchain data according to an embodiment of the present invention;
FIG. 13 is a block diagram of a blockchain data encryption verification system according to an embodiment of the present application;
FIG. 14 is a block chain network topology in one embodiment of the present application;
FIG. 15 is a block diagram of a transaction initiator blockchain wallet function in accordance with one embodiment of the present application;
FIG. 16 is a block link point functional block diagram according to an embodiment of the present application;
FIG. 17 is a diagram illustrating attribute mapping in an embodiment of the present application;
FIG. 18 is a diagram illustrating an access structure in an embodiment of the present application;
FIG. 19 is a diagram illustrating a mapping relationship in an embodiment of the present application;
FIG. 20 is a block diagram illustrating transaction information in accordance with an embodiment of the present application;
fig. 21 is a schematic structural diagram of an electronic device in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
According to the technical scheme, the data acquisition, storage, use, processing and the like meet relevant regulations of national laws and regulations.
In view of the problems in the prior art, the application provides a method, a device and a system for verifying block chain data encryption, and a transaction initiator performs attribute-based encryption on a transaction occurrence amount (transaction sensitive information) and calculates the transaction occurrence amount and the commitment of related parameters, so that the block chain transaction initiator can efficiently encrypt sensitive data, a transaction related party can efficiently decrypt the sensitive data, and a transaction verifier can efficiently verify the validity of ciphertext data.
In order to enable a blockchain transaction initiator to encrypt sensitive data efficiently, a transaction related party to decrypt sensitive data efficiently, and a transaction verifier to verify validity of ciphertext data efficiently, the present application provides an embodiment of a blockchain data encryption verification method, which is applied to a blockchain wallet of a transaction initiator node in a blockchain network, and is shown in fig. 1, where the blockchain data encryption verification method specifically includes the following contents:
step T101: a key comprising a collection of attributes is generated and distributed to a blockchain wallet of a corresponding transaction-related party node in a blockchain network.
Optionally, the transaction initiator blockchain wallet generates a key containing an attribute set for each transaction-related party, and distributes the key to each transaction-related party blockchain wallet. The transaction related party has to hold the secret of the specific attribute to calculate the key of the corresponding data, and then the transaction generation amount encrypted by the attribute base can be decrypted later.
For example, bilinear group G of prime number p order is selected 0 The generator is g, and alpha, beta epsilon Z is randomly selected p Then the common parameter is PK = { G = { 0 ,g,h=g β ,f=g 1/β ,e(g,g) α The master key is MSK = (beta, g) α )。
Generating a random number r epsilon Z according to the user attribute set S p A finite field random number corresponding to each attribute, the set of attributes being denoted as r j ∈Z p } j∈S The calculation method of the attribute private key comprises the following steps:
the attribute private key is distributed to the corresponding transaction-related party blockchain wallet.
Step T102: and carrying out data encryption on the transaction generation amount according to a preset attribute-based encryption algorithm, a preset access right and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for uplink so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction.
Optionally, the transaction initiator blockchain wallet defines an appropriate access structure for a specific transaction, and specifies that a plurality of transaction related parties can decrypt the access structure. If the transaction is intended to be revealed to all transaction related parties, the access structure is OR (attribute 1, attribute 2), if the transaction is intended to be revealed only to transaction related party 1, the access structure is AND (attribute 1, attribute 2), although other access structures may be specified.
Optionally, in the present application, the transaction initiator blockchain wallet encrypts the transaction occurrence amount using an attribute-based encryption algorithm, so that the ciphertext and the key are associated with the attribute set and the access structure.
For example, an access tree of a transaction occurrence decryption key is constructed, leaf nodes of the access tree are attributes, each attribute corresponds to a finite field random number, an upper node performs lagrangian interpolation on an attribute value of a lower node to obtain a polynomial, the value of the polynomial at x =0 is a secret value of the upper node, the right lower upper part is up to a root node, and the secret value of the root node is a key s required for decrypting the access data.
Secret value set of attribute set Y related with secret s and transaction occurrence amountCarrying out encryption calculation on the transaction occurrence amount M to obtain a ciphertext:
optionally, the transaction initiator blockchain wallet performs commitment and calculation of related parameters for the transaction occurrence amount, and can be subsequently used for scope certification, sum certification or product relationship. The range certificate may be a general range certificate or a more mature protocol in the industry such as Bulletprofs; the addition proves that an encryption algorithm with addition homomorphism is used in the money amount encryption, the requirement of a common transfer scene can be met, and the money amount is hidden; the product relation proves that the encryption algorithm with the homomorphism is used, the requirements of special consumption scenes can be met, and other related transaction information except the amount of money is hidden.
Specifically, the transaction initiator blockchain wallet performs blinding calculation and signing by using a wallet key on the transaction information, and sends the blinded information to the blockchain node. Blind calculation firstly selects a blind factor r, takes RSA blind signature as an example, and calculates m' obtained by blinding a message m as follows:
m′=m·r e modn
step T103: receiving signature transaction returned by the blockchain network, performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, sending the transaction information to the blockchain network for common identification and account entry so as to enable a blockchain wallet of a transaction related party node in the blockchain network to obtain the transaction information from the blockchain network, performing attribute-based decryption processing on transaction occurrence amount in the transaction information through the secret key containing the attribute collection, determining the corresponding transaction occurrence amount and the transaction initiator identity and informing a user side when the attribute-based decryption processing is successful, and synchronizing the transaction state to the blockchain network to be invalid when the attribute-based decryption processing is failed.
Optionally, the transaction initiator blockchain wallet performs de-blinding calculation on the signature transaction to obtain a real transaction signature. Signature message de-blinding is calculated as follows:
s=m′ d ·r -1 =m d modn
optionally, the transaction initiator blockchain wallet disclosed by the application replenishes the transaction information and then issues the transaction information to the blockchain network, and a data structure of the transaction comprises a unique transaction serial number Nonce, a receiver address, a transaction occurrence amount encrypted through an attribute base, a transaction occurrence amount commitment and related parameters, and a transaction blind signature.
In an embodiment of the present application, the transaction verifier blob link point loads the certificate associated with the public key of each group of blobs in the blob in the network. The block chain nodes of the transaction verifier verify transaction signatures by using the group public key set, and whether the transactions are issued by the block chain nodes in the network is judged, namely the transactions signed by any group private key on the block chain are approved, and the identity of a transaction initiator is ensured to be legal by using the group private key and the group public key. And verifying the range certification, the addition relation certification and the product relation certification of the chain link points of the transaction verification block to judge that the parameters in the transaction meet the constraint conditions required by the service. Range certification can be either general range certification or the more mature protocol in the industry of Bulletprofs et al; the addition proves that an encryption algorithm with addition homomorphism is used in the money amount encryption, the requirement of a common transfer scene can be met, and the money amount is hidden; the product relation proves that the requirements of special consumption scenes can be met by using an encryption algorithm with full homomorphism, and other associated transaction information except the amount of money is hidden.
As can be seen from the above description, the block chain data encryption verification method provided in the embodiment of the present application can execute attribute-based encryption on a transaction occurrence amount (transaction sensitive information) by a transaction initiator, and the transaction initiator calculates the transaction occurrence amount and commitments of related parameters, so that the block chain transaction initiator can efficiently encrypt sensitive data, the transaction related party can efficiently decrypt sensitive data, and the transaction verifier can efficiently verify the validity of ciphertext data.
In an embodiment of the block chain data encryption verification method of the present application, referring to fig. 2, the following may be further included:
step T201: and constructing an access tree of the transaction occurrence decryption key, wherein leaf nodes of the access tree are attributes, each attribute corresponds to a finite field random number, an upper node performs Lagrange interpolation on the attribute value of a lower node to obtain a polynomial, the value of the polynomial in x =0 is the secret value of the upper node, the right lower upper node is up to a root node, and the secret value of the root node is the key required for decrypting the access data.
Step T202: and performing data encryption on the transaction generation amount according to the secret key, the access structure corresponding to the preset access authority, the attribute set of the transaction generation amount and the secret value set to obtain an encrypted ciphertext.
Optionally, the transaction initiator blockchain wallet defines an appropriate access structure for a specific transaction, and specifies that a plurality of transaction related parties can decrypt the access structure. If the transaction is intended to be revealed to all transaction related parties, the access structure is OR (attribute 1, attribute 2), if the transaction is intended to be revealed only to transaction related party 1, the access structure is AND (attribute 1, attribute 2), although other access structures may be specified.
Optionally, the transaction initiator blockchain wallet encrypts the transaction occurrence amount by using an attribute-based encryption algorithm, so that the ciphertext and the key are associated with the attribute set and the access structure.
For example, an access tree of a transaction occurrence decryption key is constructed, leaf nodes of the access tree are attributes, each attribute corresponds to a finite field random number, an upper node performs lagrangian interpolation on an attribute value of a lower node to obtain a polynomial, the value of the polynomial at x =0 is a secret value of the upper node, the right lower upper part is up to a root node, and the secret value of the root node is a key s required for decrypting the access data.
Secret value set of attribute set Y related with secret s and transaction occurrence amountCarrying out encryption calculation on the transaction occurrence amount M to obtain a ciphertext:
in an embodiment of the block chain data encryption verification method of the present application, referring to fig. 3, the following may be further included:
step T301: performing a calculation of commitments and related parameters for the transaction occurrence.
Step T302: and carrying out blind calculation and wallet secret key signature on the calculation result to obtain transaction information subjected to blind calculation processing, and sending the transaction information to the block chain network for uplink.
Optionally, the transaction initiator blockchain wallet performs commitment and calculation of relevant parameters on the transaction occurrence amount, and can be subsequently used for range certification, sum certification or product relationship. Range certification can be either general range certification or the more mature protocol in the industry of Bulletprofs et al; the addition proves that an encryption algorithm with addition homomorphism is used in the money amount encryption, the requirement of a common transfer scene can be met, and the money amount is hidden; the product relation proves that the encryption algorithm with the homomorphism is used, the requirements of special consumption scenes can be met, and other related transaction information except the amount of money is hidden.
Specifically, the transaction initiator blockchain wallet performs blinding calculation and signing by using a wallet key on the transaction information, and sends the blinded information to the blockchain node. Blind calculation firstly selects a blind factor r, and blind calculation of a message m to obtain m' is as follows by taking RSA blind signature as an example:
m′=m·r e modn
in an embodiment of the block chain data encryption verification method of the present application, referring to fig. 4, the following may be further included:
step T401: and receiving a random challenge sent by a transaction verification node in a block chain network, wherein the random challenge is initiated by a transaction generation amount commitment aiming at the transaction information monkey after the transaction verification node performs identity verification on the transaction initiator node.
Step T402: and calculating relevant certification according to the type of the random challenge, the corresponding commitment and the random challenge specific parameter and returning the certification to the transaction verification node.
Optionally, the transaction initiator blockchain wallet determines that one or more types of range certificates, sum relationship certificates and product relationship certificates related to the transaction occurrence amount are calculated according to the challenge type, calculates the related certificate by combining commitment and random challenge specific parameters, and returns the related certificate to the transaction verifier blockchain node.
In order to enable a blockchain transaction initiator to encrypt sensitive data efficiently, a transaction related party to decrypt sensitive data efficiently, and a transaction verifier to verify validity of ciphertext data efficiently, the present application provides an embodiment of a blockchain data encryption verification method, which is applied to a blockchain wallet of a transaction related party node in a blockchain network, and with reference to fig. 5, the blockchain data encryption verification method specifically includes the following contents:
step T501: a key containing a set of attributes sent by a blockchain wallet of a corresponding transaction initiator node in a blockchain network is received.
Optionally, the blockchain wallet of the transaction related party is responsible for periodically pulling anonymous transactions from the blockchain, and filtering out the transactions whose addresses of the receiving parties are own transactions.
Step T502: and acquiring transaction information from the blockchain network, and performing attribute-based decryption processing on the transaction occurrence amount in the transaction information through the secret key containing the attribute collection, wherein the transaction information is obtained by performing data encryption on the transaction occurrence amount through a blockchain wallet of a transaction initiator node in the blockchain network according to a preset attribute-based encryption algorithm, a preset access right and the secret key, and the transaction information is subjected to encrypted ciphertext completion through the blockchain network according to a real transaction signature corresponding to a preset group private key.
Optionally, the block chain wallet of the transaction related party loads the key SK containing the attribute set obtained from each transaction initiator, and performs decryption calculation of attribute-based encryption on the encrypted transaction occurrence amount.
For example, the transaction-related party blockchain wallet parses out the access structure in the encrypted result CT, and performs leaf node decryption. Assuming z is the leaf node to be decrypted, i = att (z), if i ∈ S is satisfied, the blockchain wallet has no right to decrypt the transaction, and if i ∈ S is satisfied, the following calculation of the middle value of the leaf node z is performed
i is the sequence number of the attribute node z in the parent node in the access structure, S x ' is the set of attributes associated with i that the blockchain wallet possesses,Is a lagrangian interpolation coefficient, if the attribute node in the access structure also has a corresponding attribute in the blockchain wallet, the following lagrangian interpolation calculation can be performed to obtain a parent node x intermediate value F of the node set z x Otherwise, decryption cannot be performed.
The intermediate value F of the root node R can be obtained from bottom to top R Finally decrypt the root node R intermediate valueClear text M of transaction amount
Step T503: and when the attribute-based decryption processing is successful, determining the corresponding transaction generation amount and the transaction initiator identity and informing the user side, and when the attribute-based decryption processing is failed, synchronizing the state of the transaction to the blockchain network to be invalid.
As can be seen from the above description, the block chain data encryption verification method provided in the embodiment of the present application can perform attribute-based encryption on the transaction occurrence amount (transaction sensitive information) by the transaction initiator, and the transaction initiator calculates the transaction occurrence amount and the commitment of the relevant parameters, so that the block chain transaction initiator can efficiently encrypt the sensitive data, the transaction relevant party can efficiently decrypt the sensitive data, and the transaction verification party can efficiently verify the validity of the ciphertext data.
In an embodiment of the block chain data encryption verification method of the present application, referring to fig. 6, the following may be further included:
step T601: and performing access structure tree analysis on the transaction information through the key containing the attribute collection.
Step T602: and carrying out attribute-based decryption on the leaf nodes of the access structure tree, and determining the transaction occurrence amount in the transaction information.
Optionally, the block chain wallet of the transaction related party loads the key SK containing the attribute set obtained from each transaction initiator, and performs decryption calculation of attribute-based encryption on the encrypted transaction occurrence amount.
For example, the transaction-related party blockchain wallet parses out the access structure in the encrypted result CT, and performs leaf node decryption. Assuming z is the leaf node to be decrypted, i = att (z), if i ∈ S is satisfied, the blockchain wallet has no right to decrypt the transaction, and if i ∈ S is satisfied, the following calculation of the middle value of the leaf node z is performed
i is the sequence number of the attribute node z in the parent node in the access structure, S x ' is a set of i-related attributes owned by the blockchain wallet,Is the Lagrange interpolation coefficient, if the attribute node in the access structure also has a corresponding attribute in the blockchain wallet, the following Lagrange interpolation calculation can be performed to obtain the intermediate value F of the parent node x of the node set z x Otherwise, decryption cannot be performed.
The intermediate value F of the root node R can be obtained from bottom to top R Finally, the intermediate value of the decryption root node R obtains the transaction generation amount plaintext M
In order to enable a blockchain transaction initiator to encrypt sensitive data efficiently, a transaction related party to decrypt sensitive data efficiently, and a transaction verifier to verify validity of ciphertext data efficiently, the present application provides an embodiment of a blockchain data encryption verification apparatus for implementing all or part of contents of the blockchain data encryption verification method, and with reference to fig. 7, the blockchain data encryption verification apparatus specifically includes the following contents:
and the key distribution module T11 is used for generating a key containing the attribute collection and distributing the key to the blockchain wallet of the corresponding transaction related party node in the blockchain network.
And the generation amount encryption module T12 is used for carrying out data encryption on the transaction generation amount according to a preset attribute-based encryption algorithm, a preset access authority and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for uplink so as to enable the block chain network to carry out blind signature on the transaction according to a preset group private key and return the transaction.
And the transaction information uplink module T13 is used for receiving the signature transaction returned by the blockchain network and performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, sending the transaction information to the blockchain network for common identification and account entry so as to enable a blockchain wallet of a transaction related party node in the blockchain network to obtain the transaction information from the blockchain network, performing attribute-based decryption processing on the transaction occurrence amount in the transaction information through the secret key containing the attribute set, determining the corresponding transaction occurrence amount and the transaction initiator identity and informing a user end when the attribute-based decryption processing is successful, and synchronizing the transaction state to the blockchain network to be invalid when the attribute-based decryption processing is failed.
As can be seen from the above description, the device for verifying block chain data encryption provided in the embodiment of the present application can perform attribute-based encryption on a transaction occurrence amount (transaction sensitive information) by a transaction initiator, and the transaction initiator calculates the transaction occurrence amount and commitments of related parameters, so that the block chain transaction initiator can efficiently encrypt sensitive data, the transaction related party can efficiently decrypt sensitive data, and the transaction verifier can efficiently verify the validity of ciphertext data.
In an embodiment of the device for verifying block chain data encryption of the present application, referring to fig. 8, the generation encryption module T12 includes:
and an access tree construction unit T121, configured to construct an access tree of a transaction generation amount decryption key, where leaf nodes of the access tree are attributes, each attribute corresponds to a finite field random number, an upper node performs lagrange interpolation on an attribute value of a lower node to obtain a polynomial, a value of the polynomial at x =0 is a secret value of the upper node, a value from the bottom right to the top right is up to a root node, and a secret value of the root node is a key required to decrypt the access data.
And the data encryption unit T122 is used for carrying out data encryption on the transaction occurrence amount according to the secret key, the access structure corresponding to the preset access authority, the attribute set of the transaction occurrence amount and the secret value set to obtain an encrypted ciphertext.
In an embodiment of the device for verifying encryption of blockchain data according to the present invention, referring to fig. 9, the uplink transaction information module T13 includes:
and the generation amount calculation unit T131 is used for performing the calculation of the commitment and the related parameters on the transaction generation amount.
And the blinded calculation unit T132 is used for performing blinded calculation and wallet key signature on the calculation result to obtain transaction information subjected to blinded calculation processing, and sending the transaction information to the block chain network for uplink.
In an embodiment of the device for verifying block chain data encryption, referring to fig. 10, the following contents are further included:
the challenge receiving unit T141 is configured to receive a random challenge sent by a transaction verification node in a blockchain network, where the random challenge is initiated by a transaction generation amount commitment for the transaction information monkey after the transaction verification node performs identity verification on the transaction initiator node.
And the challenge verification unit T142 is used for calculating a relevant certificate according to the type of the random challenge, the corresponding commitment and the random challenge specific parameter and returning the relevant certificate to the transaction verification node.
In order to enable a blockchain transaction initiator to encrypt sensitive data efficiently, a transaction related party to decrypt sensitive data efficiently, and a transaction verifier to verify validity of ciphertext data efficiently, the present application provides an embodiment of a blockchain data encryption verification apparatus for implementing all or part of contents of the blockchain data encryption verification method, where, referring to fig. 11, the blockchain data encryption verification apparatus specifically includes the following contents:
the key obtaining module T21 is configured to receive a key that includes the attribute set and is sent by a blockchain wallet of a corresponding transaction initiator node in the blockchain network.
And the generation amount decryption module T22 is configured to acquire transaction information from the blockchain network, and perform attribute-based decryption processing on the transaction generation amount in the transaction information through the secret key containing the attribute collection, where the transaction information is obtained by performing data encryption on the transaction generation amount through a blockchain wallet of a transaction initiator node in the blockchain network according to a preset attribute-based encryption algorithm, a preset access right and the secret key, and the transaction information is further subjected to encrypted ciphertext completion through the blockchain network according to a real transaction signature corresponding to a preset group private key.
And the feedback synchronization module T23 is configured to determine a corresponding transaction occurrence amount and a transaction initiator identity and notify the user side when the attribute-based decryption processing is successful, and synchronize the state of the transaction to the blockchain network to be invalid when the attribute-based decryption processing is failed.
As can be seen from the above description, the device for verifying block chain data encryption provided in the embodiment of the present application can perform attribute-based encryption on a transaction occurrence amount (transaction sensitive information) by a transaction initiator, and the transaction initiator calculates the transaction occurrence amount and commitments of related parameters, so that the block chain transaction initiator can efficiently encrypt sensitive data, the transaction related party can efficiently decrypt sensitive data, and the transaction verifier can efficiently verify the validity of ciphertext data.
In an embodiment of the device for verifying block chain data encryption, referring to fig. 12, the generation amount decryption module T22 includes:
and the access tree analysis unit T221 is configured to perform access structure tree analysis on the transaction information through the key containing the attribute collection.
And the data decryption unit T222 is configured to perform attribute-based decryption on leaf nodes of the access structure tree, and determine a transaction occurrence amount in the transaction information.
To further illustrate the present solution, the present application further provides a specific application example of a blockchain data encryption verification system that implements the blockchain data encryption verification method by using the above-mentioned blockchain data encryption verification apparatus, see fig. 13, and specifically includes a blockchain wallet T10 of a transaction initiator node, a blockchain wallet T20 of a transaction related party node, and a transaction verification node T30 in a blockchain network.
The blockchain wallet T10 of the transaction initiator node comprises:
and the key distribution module T11 is used for generating a key containing the attribute collection and distributing the key to the blockchain wallet of the corresponding transaction related party node in the blockchain network.
And the generation amount encryption module T12 is used for carrying out data encryption on the transaction generation amount according to a preset attribute-based encryption algorithm, a preset access authority and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to the block chain network for chaining, so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction.
And the transaction information uplink module T13 is used for receiving the signature transaction returned by the blockchain network and performing de-blinding treatment to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, and sending the transaction information to the blockchain network for common identification and account entry.
The blockchain money T20 package of the transaction related party node comprises:
the key obtaining module T21 is configured to receive a key that includes the attribute set and is sent by a blockchain wallet of a corresponding transaction initiator node in the blockchain network.
And the generation amount decryption module T22 is used for acquiring the transaction information from the blockchain network and performing attribute-based decryption processing on the transaction generation amount in the transaction information through the secret key containing the attribute collection.
And the feedback synchronization module T23 is configured to determine a corresponding transaction occurrence amount and a transaction initiator identity and notify the user side when the attribute-based decryption processing is successful, and synchronize the state of the transaction to the blockchain network to be invalid when the attribute-based decryption processing is failed.
To further illustrate this aspect, in one embodiment of the present application, the blockchain point servers are interconnected, the blockchain wallets are interconnected, and the blockchain point servers and the blockchain wallets are interconnected in a many-to-many relationship.
Referring to fig. 14, the blockchain wallet 11 is software that performs operations such as attribute-based encryption on transaction occurrence amount, calculating commitment of transaction occurrence amount and related parameters, and performing blind signature on transaction information, and is jointly developed by each participant of building blockchain nodes and distributed to users for installation and use. The blockchain wallet is directly installed on a user's personal terminal, such as a personal cell phone, a notebook computer, etc. The blockchain wallet function module design is shown in figure 15.
The blockchain endpoint server 12 records operations such as transactions on the blockchain, blind signature execution in cooperation with the blockchain wallet, verification of transaction commitments, and the like, and ensures the validity of packaged transactions. And the blockchain node server is built and managed by all the participants built by the blockchain platform. The block link point functional module design is shown in fig. 16.
The blockchain core component layer transaction data encryption, decryption and verification protocol participants can be divided into three parties: the system comprises a transaction initiator, a transaction verifier and a transaction related party, wherein the transaction initiator and the transaction related party are common users provided with blockchain wallets, and the transaction verifier is a supervising agency user provided with blockchain nodes. When the blockchain wallet issues a transaction to a blockchain, the processing steps of interactive calculation are completed according to the requirements of encryption, decryption and verification protocols of transaction data of a blockchain core component layer of the patent on the blockchain wallet of a transaction initiator, the blockchain wallet of a transaction related party and the blockchain link points. The processing steps of each participant in the blockchain core component layer data transaction encryption, decryption and authentication protocol are as follows.
Steps S201 to S209 are the processing flow of the transaction initiator blockchain wallet issuing the encrypted transaction to the blockchain:
step S201: the transaction initiator blockchain wallet generates a key containing a set of attributes for each transaction-related party and distributes the key to each transaction-related party blockchain wallet. The transaction related party has to hold the secret of the specific attribute to calculate the key of the corresponding data, and then the transaction generation amount encrypted by the attribute base can be decrypted later. As shown in fig. 17, each transaction-related party has one or more different attributes.
Selecting a bilinear group G of order p of prime numbers 0 The generator is g, and alpha, beta epsilon Z are randomly selected p Then the common parameter is PK = { G = { 0 ,g,h=g β ,f=g 1/β ,e(g,g) α Is MSK = (beta, g) α )。
Generating a random number r epsilon Z according to the user attribute set S p A finite field random number corresponding to each attribute, the set of attributes being denoted as r j ∈Z p } j∈S The calculation method of the attribute private key is as follows
The attribute private key is distributed to the corresponding transaction-related party blockchain wallet.
Step S202: the transaction initiator blockchain wallet defines an appropriate access structure for a particular transaction in which multiple transaction related parties are specified to be able to decrypt. If the transaction is intended to be revealed to all transaction related parties, the access structure is OR (attribute 1, attribute 2), if the transaction is intended to be revealed only to transaction related party 1, the access structure is AND (attribute 1, attribute 2), although other access structures may be specified.
Step S203: the transaction initiator blockchain wallet encrypts the transaction occurrence using an attribute-based encryption algorithm, associating the ciphertext and the key with the attribute set and the access structure. The method and the device for encrypting the transaction occurrence amount on the blockchain are used for encrypting the transaction occurrence amount on the blockchain by using the attribute base for the first time, so that only a transaction related party with the corresponding attribute can decrypt the amount. Finally, in S209, a data structure of the blockchain transaction is proposed, and the common transaction occurrence amount field is updated to be the transaction occurrence amount encrypted with the attribute base of the access structure.
And constructing an access tree of the transaction generation amount decryption key, wherein leaf nodes of the access tree are all attributes, each attribute corresponds to a finite field random number, an upper node performs Lagrange interpolation on the attribute value of a lower node to obtain a polynomial, the value of the polynomial at x =0 is the secret value of the upper node, the right lower upper part is up to a root node, and the secret value of the root node is a key s required for decrypting the access data. Taking the root node secret value OF 5 as an example, a schematic diagram OF a 2OF3 (AND (attribute 1, attribute 2), OR (attribute 3, attribute 4), attribute 5) access structure is constructed as shown in fig. 18.
Secret value set of attribute set Y related with secret s and transaction occurrence amountCarrying out encryption calculation on the transaction occurrence amount M to obtain a ciphertext
Step S204: the transaction initiator blockchain wallet performs commitment and calculation of relevant parameters for the transaction occurrence, which can then be used for scope attestation, sum attestation, or product relationships. Range certification can be either general range certification or the more mature protocol in the industry of Bulletprofs et al; the addition proves that an encryption algorithm with addition homomorphism is used in the money amount encryption, the requirement of a common transfer scene can be met, and the money amount is hidden; the product relation proves that the encryption algorithm with the homomorphism is used, the requirements of special consumption scenes can be met, and other related transaction information except the amount of money is hidden. The transaction generation amount on the blockchain is promised by using the method, so that the transaction generation amount and the account balance can be verified to accord with the business rules before and after updating even if the transaction verification party does not know the specific value. Finally, in S209, a new field of the data structure of the transaction is provided: transaction occurrence amount commitments and related parameters.
Step S205: and the block chain wallet of the transaction initiator performs blind calculation and signature by using a wallet key on the transaction information, and sends the blind information to the block chain node. Blind calculation blind factor r is selected first, and blind calculation of message m' using RSA blind signature as an example is as follows
m′=m·r e modn
Step S206: and the block chain link point verifies whether the identity of the block chain wallet in the transaction is legal, if the identity of the block chain wallet initiating the transaction is legal, S207 is executed, and if not, the processing is ended.
Step S207: and the blockchain node selects a corresponding registered group private key according to the identity of the blockchain wallet, performs blind signature on the transaction, and returns the signed transaction to the blockchain wallet of the transaction initiator. The method comprises the steps that a blocking S205 and a de-blocking S208 are used for processing on a transaction initiator blockchain wallet side, and a group private key and a group public key S207 are used on the blockchain node side, so that the blockchain node can verify that the identity of the transaction initiator is a legal user in a certain group, but the blockchain node cannot track which blockchain wallet the identity of the specific transaction initiator is, and transaction anonymity and unlinkability are ensured. Finally, a data structure of the transaction is proposed in S209, and the common signature field is updated to be a transaction blind signature. A schematic diagram of a mapping relationship between a block chain wallet on a block chain node side to a group public key and a group private key is shown in fig. 19.
The group private key is stored in a block chain node side in an encrypted mode, and the group public key can be stored in a public mode.
The private key (n, d) is computed for the message m' blind signature as follows:
m′ d =(m·r e ) d modn
step S208: and the transaction initiator blockchain wallet performs de-blinding calculation on the signature transaction to obtain a real transaction signature. Signature message de-blinding is calculated as follows:
s=m′ d ·r -1 =m d modn
step S209: the transaction initiator blockchain wallet completes the transaction information and then issues the transaction information to the blockchain network, and the data structure of the transaction comprises a unique transaction serial number Nonce, a receiver address, a transaction occurrence amount encrypted by an attribute base, a transaction occurrence amount commitment and related parameters, and a transaction blind signature, as shown in fig. 20.
Steps S210 to S216 are a processing procedure for verifying the validity of the encrypted data by the link points of the transaction verifier block:
step S210: and loading the certificate related to the public key of each group of the block chain in the network by the block chain link point of the transaction verifier.
Step S211: the block chain nodes of the transaction verifier verify transaction signatures by using the group public key set, and whether the transactions are issued by the block chain nodes in the network is judged, namely the transactions signed by any group private key on the block chain are approved, and the identity of a transaction initiator is ensured to be legal by using the group private key and the group public key. If the signature is signed and issued by the block chain node in the network, S212 is executed, otherwise, the processing is finished. The method comprises the steps that a blocking S205 and a de-blocking S208 are used for processing on a transaction initiator blockchain wallet side, and a group private key and a group public key S207 are used on the blockchain node side, so that the blockchain node can verify that the identity of the transaction initiator is a legal user in a certain group, but the blockchain node cannot track which blockchain wallet the identity of the specific transaction initiator is, and transaction anonymity and unlinkability are ensured. Finally, a data structure of the transaction is proposed in S209, and the common signature field is updated to be a transaction blind signature.
The public key (n, e) is signed by the message s as follows
Step S212: and verifying transaction occurrence amount commitment in the transaction, and initiating a random challenge with a specific type and specific parameters to a transaction initiator blockchain wallet.
Step S213: the transaction initiator blockchain wallet determines that one or more types of range certificates, sum relation certificates and product relation certificates related to transaction occurrence amount are calculated according to the challenge types, calculates related certificates by combining commitments and random challenge specific parameters and returns the related certificates to the transaction verifier blockchain node. The transaction generation amount on the blockchain is promised by using the method, so that the transaction generation amount and the account balance can be verified to accord with the business rules before and after updating even if the transaction verification party does not know the specific value. Finally, in S209, a new field of the data structure of the transaction is provided: transaction occurrence amount commitments and related parameters.
Step S214: and verifying the range certification, the addition relation certification and the product relation certification of the chain link points of the transaction verification block to judge that the parameters in the transaction meet the constraint conditions required by the service. The range certificate may be a general range certificate or a more mature protocol in the industry such as Bulletprofs; the addition proves that an encryption algorithm with addition homomorphism is used in the money amount encryption, the requirement of a common transfer scene can be met, and the money amount is hidden; the product relation proves that the encryption algorithm with the homomorphism is used, the requirements of special consumption scenes can be met, and other related transaction information except the amount of money is hidden. If the certification passes through the execution of S216, otherwise, S215 is executed.
Step S215: and the transaction state is updated to be invalid by the transaction verification block link point, and the processing is finished.
Step S216: and the block chain link points of the transaction verification party consider the transaction to be effective, and the transaction consensus is completed.
Steps S217 to S221 are processing flows of the transaction-related party decrypting data:
step S217: the transaction related party blockchain wallet is responsible for regularly pulling anonymous transactions from the blockchain, and filtering out the addresses of the receiving parties is own transactions.
Step S218: the transaction-related party blockchain wallet loads a key SK containing an attribute set obtained from each transaction initiator, and performs decryption calculation of attribute-based encryption on the encrypted transaction occurrence amount. The method and the device have the advantages that attribute-based encryption is provided for transaction occurrence amount on the block chain for the first time, so that only transaction related parties with corresponding attributes can decrypt the amount. Finally, in S209, a data structure of the blockchain transaction is proposed, and the common transaction occurrence amount field is updated to be the transaction occurrence amount encrypted with the attribute base of the access structure.
And the transaction related party blockchain wallet analyzes the access structure in the encryption result CT and executes leaf node decryption. Assuming z is the leaf node to be decrypted, i = att (z), if i e S is satisfied, the blockchain wallet has no right to decrypt the transaction, and if i e S is satisfied, the following calculation of the median value of the leaf node z is performed:
i is the sequence number of the attribute node z in the parent node in the access structure, S x ' is a set of i-related attributes owned by the blockchain wallet,Is a lagrangian interpolation coefficient, if the attribute node in the access structure also has a corresponding attribute in the blockchain wallet, the following lagrangian interpolation calculation can be performed to obtain a parent node x intermediate value F of the node set z x Otherwise, decryption cannot be performed.
The intermediate value F of the root node R can be obtained from bottom to top R And finally, the intermediate value of the decryption root node R obtains the transaction occurrence amount plaintext M.
Step S219: the transaction-related party blockchain wallet determines whether one of the local keys containing the attribute set is capable of decrypting the transaction amount. If the decryption of a certain key is successful, S220 is executed, and if the decryption of all keys is failed, S221 is executed.
Step S220: and the transaction related party blockchain wallet determines the transaction amount and the identity of the transaction initiator, updates the balance of the wallet and informs the user.
Step S221: and the block chain wallet of the transaction related party considers that the transaction is invalid, and requests the block chain node to update the transaction state to be invalid.
As can be seen from the above, the present application can achieve at least the following technical effects:
1. the transaction initiator performs attribute-based encryption on the transaction occurrence amount (transaction sensitive information), and only the transaction related party can decrypt the transaction occurrence amount because only the transaction related party holds the attribute key matched with the transaction access structure, so that the transaction initiator completes financial checking.
2. The transaction initiator calculates the transaction amount and the commitment of the relevant parameters, and the blockchain records the commitment of each transaction sensitive information and the relevant parameters. The transaction verifying party can initiate a challenge to the transaction initiator and perform verification of the range commitment, the summing relationship commitment and the product relationship commitment, thereby ensuring that the transaction parameters meet a specific calculation rule.
3. And the transaction initiator block chain wallet interacts with the block chain nodes to complete blind signature on the transaction information, the blind signature uses the group private key registered on the block chain, and the transaction is issued to the block chain after signature. The transaction verifier can verify the blind signature according to the group public key registered to the blockchain, so that the real identity of the transaction initiator is hidden while the transaction is confirmed to be effective, and the transaction room has unlinkability on a wallet level.
In order to enable a blockchain transaction initiator to encrypt sensitive data efficiently, a transaction related party to decrypt sensitive data efficiently, and a transaction verifier to verify validity of ciphertext data efficiently, the application provides an embodiment of an electronic device for implementing all or part of contents in the blockchain data encryption verification method, where the electronic device specifically includes the following contents:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the communication interface is used for realizing information transmission between the block chain data encryption verification device and relevant equipment such as a core service system, a user terminal, a relevant database and the like; the logic controller may be a desktop computer, a tablet computer, a mobile terminal, and the like, but the embodiment is not limited thereto. In this embodiment, the logic controller may refer to the embodiments of the method for verifying encryption of blockchain data and the embodiments of the device for verifying encryption of blockchain data in the embodiments, and the contents thereof are incorporated herein, and repeated descriptions thereof are omitted.
It is understood that the user terminal may include a smart phone, a tablet electronic device, a network set-top box, a portable computer, a desktop computer, a Personal Digital Assistant (PDA), a vehicle-mounted device, a smart wearable device, and the like. Wherein, intelligence wearing equipment can include intelligent glasses, intelligent wrist-watch, intelligent bracelet etc..
In practical applications, part of the block chain data encryption verification method may be performed on the electronic device side as described above, or all operations may be performed in the client device. The selection may be specifically performed according to the processing capability of the client device, the limitation of the user usage scenario, and the like. This is not a limitation of the present application. The client device may further include a processor if all operations are performed in the client device.
The client device may have a communication module (i.e., a communication unit), and may be communicatively connected to a remote server to implement data transmission with the server. The server may include a server on the task scheduling center side, and in other implementation scenarios, the server may also include a server on an intermediate platform, for example, a server on a third-party server platform that is communicatively linked to the task scheduling center server. The server may include a single computer device, or may include a server cluster formed by a plurality of servers, or a server structure of a distributed apparatus.
Fig. 21 is a schematic block diagram of a system configuration of an electronic device 9600 according to the embodiment of the present application. As shown in fig. 21, the electronic device 9600 can include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. Notably, this fig. 21 is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the function of the blockchain data encryption verification method may be integrated into the cpu 9100. The central processor 9100 may be configured to control as follows:
step T101: a key comprising a collection of attributes is generated and distributed to a blockchain wallet of a corresponding transaction-related party node in a blockchain network.
Step T102: and carrying out data encryption on the transaction generation amount according to a preset attribute-based encryption algorithm, a preset access right and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for uplink so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction.
Step T103: receiving signature transaction returned by the blockchain network, performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, sending the transaction information to the blockchain network for common identification and account entry so as to enable a blockchain wallet of a transaction related party node in the blockchain network to obtain the transaction information from the blockchain network, performing attribute-based decryption processing on transaction occurrence amount in the transaction information through the secret key containing the attribute collection, determining the corresponding transaction occurrence amount and the transaction initiator identity and informing a user side when the attribute-based decryption processing is successful, and synchronizing the transaction state to the blockchain network to be invalid when the attribute-based decryption processing is failed.
As can be seen from the above description, in the electronic device provided in the embodiment of the present application, the transaction initiator performs attribute-based encryption on the transaction occurrence amount (transaction sensitive information), and calculates the transaction occurrence amount and the commitment of the relevant parameter, so that the blockchain transaction initiator can efficiently encrypt the sensitive data, the transaction relevant party can efficiently decrypt the sensitive data, and the transaction verifier can efficiently verify the validity of the ciphertext data.
In another embodiment, the blockchain data encryption verification apparatus may be configured separately from the central processor 9100, for example, the blockchain data encryption verification apparatus may be configured as a chip connected to the central processor 9100, and the functions of the blockchain data encryption verification method may be implemented by the control of the central processor.
As shown in fig. 21, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 also does not necessarily include all of the components shown in fig. 21; in addition, the electronic device 9600 may further include components not shown in fig. 21, which can be referred to in the related art.
As shown in fig. 21, the central processor 9100, which is sometimes referred to as a controller or operational control, can include a microprocessor or other processor device and/or logic device, the central processor 9100 receives input and controls the operation of various components of the electronic device 9600.
The memory 9140 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 9100 can execute the program stored in the memory 9140 to realize information storage or processing, or the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. Power supply 9170 is used to provide power to electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, an LCD display, but is not limited thereto.
The memory 9140 may be a solid-state memory, e.g., read Only Memory (ROM), random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 9140 could also be some other type of device. Memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage part 9142, the application/function storage part 9142 being used to store application programs and function programs or a flow for executing the operation of the electronic device 9600 by the central processing unit 9100.
The memory 9140 can also include a data store 9143, the data store 9143 being used to store data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers for the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, contact book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. The communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and receive audio input from the microphone 9132 to implement general telecommunications functions. The audio processor 9130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100, thereby enabling recording locally through the microphone 9132 and enabling locally stored sounds to be played through the speaker 9131.
An embodiment of the present application further provides a computer-readable storage medium capable of implementing all the steps in the blockchain data encryption verification method whose execution subject is the server or the client in the above embodiments, where the computer-readable storage medium stores thereon a computer program, and when the computer program is executed by a processor, the computer program implements all the steps in the blockchain data encryption verification method whose execution subject is the server or the client in the above embodiments, for example, when the processor executes the computer program, the processor implements the following steps:
step T101: a key comprising a collection of attributes is generated and distributed to a blockchain wallet of a corresponding transaction-related party node in a blockchain network.
Step T102: and carrying out data encryption on the transaction generation amount according to a preset attribute-based encryption algorithm, a preset access right and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for uplink so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction.
Step T103: and receiving signature transaction returned by the blockchain network, performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, sending the transaction information to the blockchain network for common identification and entry so as to enable a blockchain wallet of a transaction related party node in the blockchain network to acquire the transaction information from the blockchain network, performing attribute-based decryption processing on a transaction occurrence amount in the transaction information through the secret key containing the attribute collection, determining the corresponding transaction occurrence amount and a transaction initiator identity and informing a user side when the attribute-based decryption processing is successful, and synchronizing the transaction state to the blockchain network to be invalid when the attribute-based decryption processing is failed.
As can be seen from the above description, in the computer-readable storage medium provided in this embodiment of the present application, the transaction initiator performs attribute-based encryption on the transaction occurrence amount (transaction sensitive information), and calculates the transaction occurrence amount and the commitment of the relevant parameter, so that the blockchain transaction initiator can efficiently encrypt the sensitive data, the transaction relevant party can efficiently decrypt the sensitive data, and the transaction verifier can efficiently verify the validity of the ciphertext data.
Embodiments of the present application further provide a computer program product capable of implementing all steps in the blockchain data encryption verification method in which the execution subject is a server or a client in the above embodiments, and when being executed by a processor, the computer program/instruction implements the steps of the blockchain data encryption verification method, for example, the computer program/instruction implements the following steps:
step T101: keys containing the attribute collection are generated and distributed to the blockchain wallets of the corresponding transaction-related party nodes in the blockchain network.
Step T102: and carrying out data encryption on the transaction generation amount according to a preset attribute-based encryption algorithm, a preset access right and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for uplink so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction.
Step T103: receiving signature transaction returned by the blockchain network, performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, sending the transaction information to the blockchain network for common identification and account entry so as to enable a blockchain wallet of a transaction related party node in the blockchain network to obtain the transaction information from the blockchain network, performing attribute-based decryption processing on transaction occurrence amount in the transaction information through the secret key containing the attribute collection, determining the corresponding transaction occurrence amount and the transaction initiator identity and informing a user side when the attribute-based decryption processing is successful, and synchronizing the transaction state to the blockchain network to be invalid when the attribute-based decryption processing is failed.
As can be seen from the above description, in the computer program product provided in the embodiment of the present application, by performing attribute-based encryption on a transaction occurrence amount (transaction sensitive information) by a transaction initiator, the transaction initiator calculates the transaction occurrence amount and a commitment of a relevant parameter, so that a blockchain transaction initiator can efficiently encrypt sensitive data, a transaction relevant party can efficiently decrypt the sensitive data, and a transaction verifier can efficiently verify the validity of ciphertext data.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (12)
1. A blockchain data encryption verification method applied to a blockchain wallet of a transaction initiator node in a blockchain network, the method comprising:
generating a key containing the attribute collection and distributing the key to the blockchain wallets of the corresponding transaction related party nodes in the blockchain network;
carrying out data encryption on the transaction generation amount according to a preset attribute-based encryption algorithm, a preset access right and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for uplink so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction information;
receiving signature transaction returned by the blockchain network, performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, sending the transaction information to the blockchain network for common identification and account entry so as to enable a blockchain wallet of a transaction related party node in the blockchain network to obtain the transaction information from the blockchain network, performing attribute-based decryption processing on transaction occurrence amount in the transaction information through the secret key containing the attribute collection, determining the corresponding transaction occurrence amount and the transaction initiator identity and informing a user side when the attribute-based decryption processing is successful, and synchronizing the transaction state to the blockchain network to be invalid when the attribute-based decryption processing is failed.
2. The method for verifying data encryption of a block chain according to claim 1, wherein the data encryption of the transaction occurrence amount according to a preset attribute-based encryption algorithm, a preset access right and the secret key to obtain an encrypted ciphertext comprises:
constructing an access tree of a transaction occurrence decryption key, wherein leaf nodes of the access tree are attributes, each attribute corresponds to a finite field random number, an upper node performs Lagrange interpolation on an attribute value of a lower node to obtain a polynomial, the value of the polynomial at x =0 is a secret value of the upper node, the right lower upper node is up to a root node, and the secret value of the root node is a key required for decrypting the access data;
and performing data encryption on the transaction generation amount according to the secret key, the access structure corresponding to the preset access authority, the attribute set of the transaction generation amount and the secret value set to obtain an encrypted ciphertext.
3. The method of claim 1, wherein the sending the transaction information after the blinded calculation process to a blockchain network for uplink comprises:
performing a calculation of commitments and related parameters for the transaction occurrence;
and carrying out blind calculation and wallet secret key signature on the calculation result to obtain transaction information subjected to blind calculation processing, and sending the transaction information to the block chain network for uplink.
4. The blockchain data encryption verification method according to claim 1, further comprising, after the sending the transaction information to the blockchain network consensus account, the step of:
receiving a random challenge sent by a transaction verification node in a blockchain network, wherein the random challenge is initiated by the transaction verification node aiming at a transaction generation amount commitment of the transaction information monkey after the transaction verification node performs identity verification on the transaction initiator node;
and calculating relevant certification according to the type of the random challenge, the corresponding commitment and the random challenge specific parameter and returning the certification to the transaction verification node.
5. A blockchain data encryption verification method is applied to a blockchain wallet of a transaction related party node in a blockchain network, and comprises the following steps:
receiving a key containing an attribute set sent by a blockchain wallet of a corresponding transaction initiator node in a blockchain network;
acquiring transaction information from the blockchain network, and performing attribute-based decryption processing on a transaction occurrence amount in the transaction information through the secret key containing the attribute collection, wherein the transaction information is obtained by performing data encryption on the transaction occurrence amount through a blockchain wallet of a transaction initiator node in the blockchain network according to a preset attribute-based encryption algorithm, a preset access right and the secret key, and the transaction information is subjected to encrypted ciphertext completion through the blockchain network according to a real transaction signature corresponding to a preset group private key;
and when the attribute-based decryption processing is successful, determining the corresponding transaction generation amount and the transaction initiator identity and informing the user side, and when the attribute-based decryption processing is failed, synchronizing the state of the transaction to the blockchain network to be invalid.
6. The blockchain data encryption verification method according to claim 5, wherein the attribute-based decryption processing of the transaction occurrence amount in the transaction information by the key containing the attribute set includes:
analyzing the access structure tree of the transaction information through the secret key containing the attribute collection;
and performing attribute-based decryption on the leaf nodes of the access structure tree, and determining the transaction occurrence amount in the transaction information.
7. A blockchain data encryption verification device is applied to a blockchain wallet of a transaction initiator node in a blockchain network, and comprises the following components:
the key distribution module is used for generating keys containing the attribute collection and distributing the keys to the blockchain wallets of the corresponding transaction related party nodes in the blockchain network;
the generation amount encryption module is used for carrying out data encryption on the transaction generation amount according to a preset attribute base encryption algorithm, a preset access authority and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for chaining, so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction;
and the transaction information uplink module is used for receiving the signature transaction returned by the blockchain network and performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, sending the transaction information to the blockchain network for common identification and account entry so as to enable a blockchain wallet of a transaction related party node in the blockchain network to obtain transaction information from the blockchain network, performing attribute-based decryption processing on the transaction occurrence amount in the transaction information through the secret key containing the attribute collection, determining the corresponding transaction occurrence amount and the transaction initiator identity and informing a user end when the attribute-based decryption processing is successful, and synchronizing the transaction state to the blockchain network to be invalid when the attribute-based decryption processing is failed.
8. A blockchain data encryption verification device is characterized in that a blockchain wallet applied to a transaction related party node in a blockchain network comprises:
the key acquisition module is used for receiving a key containing an attribute collection sent by a blockchain wallet of a corresponding transaction initiator node in a blockchain network;
the generation amount decryption module is used for acquiring transaction information from the blockchain network and performing attribute-based decryption processing on the transaction generation amount in the transaction information through the secret key containing the attribute collection, wherein the transaction information is obtained by performing data encryption on the transaction generation amount through a blockchain wallet of a transaction initiator node in the blockchain network according to a preset attribute-based encryption algorithm, a preset access right and the secret key, and the transaction information is subjected to encrypted ciphertext completion through the blockchain network according to a real transaction signature corresponding to a preset group private key;
and the feedback synchronization module is used for determining the corresponding transaction occurrence amount and the transaction initiator identity and informing the user side when the attribute-based decryption processing is successful, and synchronizing the state of the transaction to the blockchain network to be invalid when the attribute-based decryption processing is failed.
9. A system for encryption verification of blockchain data, comprising: a blockchain wallet of a transaction initiator node, a blockchain wallet of a transaction related party node and a transaction verification node in a blockchain network;
the blockchain wallet of the transaction initiator node comprises:
the key distribution module is used for generating a key containing the attribute collection and distributing the key to the blockchain purse of the corresponding transaction related party node in the blockchain network;
the generation amount encryption module is used for carrying out data encryption on the transaction generation amount according to a preset attribute base encryption algorithm, a preset access authority and the secret key to obtain an encrypted ciphertext, and sending the transaction information subjected to blind calculation processing to a block chain network for chaining, so that the block chain network carries out blind signature on the transaction according to a preset group private key and returns the transaction;
the transaction information uplink module is used for receiving the signature transaction returned by the blockchain network and performing de-blinding processing to obtain a corresponding real transaction signature, supplementing the transaction information according to the real transaction signature and the encrypted ciphertext, and sending the transaction information to the blockchain network for common identification and account entry;
the blockchain wallet of the transaction-related party node comprises:
the key acquisition module is used for receiving a key containing an attribute collection sent by a blockchain wallet of a corresponding transaction initiator node in a blockchain network;
the generation amount decryption module is used for acquiring the transaction information from the blockchain network and performing attribute-based decryption processing on the transaction generation amount in the transaction information through the secret key containing the attribute collection;
and the feedback synchronization module is used for determining the corresponding transaction generation amount and the transaction initiator identity and informing the user side when the attribute-based decryption processing is successful, and synchronizing the state of the transaction to the blockchain network to be invalid when the attribute-based decryption processing is failed.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the block chain data encryption verification method according to any one of claims 1 to 6 when executing the program.
11. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for encryption verification of blockchain data according to any one of claims 1 to 6.
12. A computer program product comprising computer program/instructions for implementing the steps of the method for encryption verification of blockchain data according to any one of claims 1 to 6 when executed by a processor.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202211638780.3A CN115860741A (en) | 2022-12-20 | 2022-12-20 | Block chain data encryption verification method, device and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202211638780.3A CN115860741A (en) | 2022-12-20 | 2022-12-20 | Block chain data encryption verification method, device and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN115860741A true CN115860741A (en) | 2023-03-28 |
Family
ID=85674365
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202211638780.3A Pending CN115860741A (en) | 2022-12-20 | 2022-12-20 | Block chain data encryption verification method, device and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115860741A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN117040766A (en) * | 2023-10-08 | 2023-11-10 | 腾讯科技(深圳)有限公司 | Block chain-based data processing method, device, equipment and readable storage medium |
-
2022
- 2022-12-20 CN CN202211638780.3A patent/CN115860741A/en active Pending
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN117040766A (en) * | 2023-10-08 | 2023-11-10 | 腾讯科技(深圳)有限公司 | Block chain-based data processing method, device, equipment and readable storage medium |
| CN117040766B (en) * | 2023-10-08 | 2024-01-30 | 腾讯科技(深圳)有限公司 | Block chain-based data processing method, device, equipment and readable storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108564353B (en) | Payment system and method based on block chain | |
| US20240187393A1 (en) | Network resource access control methods and systems using transactional artifacts | |
| CN109729041B (en) | Method and device for issuing and acquiring encrypted content | |
| CN114270780B (en) | Gateway agnostic tokenization | |
| CN114362993B (en) | Block chain assisted Internet of vehicles security authentication method | |
| CN113393225B (en) | Digital currency encryption payment method and system | |
| CN113743939A (en) | Identity authentication method, device and system based on block chain | |
| US20210241270A1 (en) | System and method of blockchain transaction verification | |
| CN111429138A (en) | Blockchain node data security interaction method and first interaction node | |
| CN110599342B (en) | Block chain-based identity information authorization method and device | |
| CN111767569A (en) | Blockchain access authorization method and node | |
| CN114785556B (en) | Encryption communication method, device, computer equipment and storage medium | |
| CN116090009A (en) | Data processing method, device, electronic equipment and readable storage medium | |
| CN111010283B (en) | Method and apparatus for generating information | |
| CN102694818B (en) | The online distribution method of online private key and system | |
| CN115860741A (en) | Block chain data encryption verification method, device and system | |
| CN111709053B (en) | Operation method and operation device based on loose coupling transaction network | |
| CN111552950B (en) | Software authorization method and device and computer readable storage medium | |
| CN114553445A (en) | Equipment method, device, electronic equipment and readable storage medium | |
| CN115375312B (en) | Digital wallet data recording method and data verification method for electronic payment | |
| CN113051623B (en) | Data processing method and device and electronic equipment | |
| CN111355584A (en) | Method and apparatus for generating blockchain multi-signatures | |
| CN112837063A (en) | Block chain-based electronic receipt storage method and device | |
| US20250028846A1 (en) | Storing portions of data across multiple machines | |
| CN116667998A (en) | Block chain verification method, device and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |