CN108650073B - A kind of secret protection price competing method based on block chain - Google Patents
A kind of secret protection price competing method based on block chain Download PDFInfo
- Publication number
- CN108650073B CN108650073B CN201810425981.2A CN201810425981A CN108650073B CN 108650073 B CN108650073 B CN 108650073B CN 201810425981 A CN201810425981 A CN 201810425981A CN 108650073 B CN108650073 B CN 108650073B
- Authority
- CN
- China
- Prior art keywords
- block chain
- service side
- user
- secret protection
- promise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0611—Request for offers or quotes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of secret protection price competing methods based on block chain.The present invention is the following steps are included: 1) mission bit stream is published in block chain by user;2) block chain provides the zone of reasonableness bidded, meanwhile, which is pushed to service side;3) service side is hidden and encrypts to quote data, then will promise to undertake and ciphertext is published in block chain, and whether in the reasonable scope block chain confirms the promise, then carries out size comparison to the corresponding ciphertext of the promise met in range, generates final result;4) public key and puppet ID are issued user by target service side in notice, service side;5) user to truly point encrypt, sign after be sent to middle target service side;6) service side verifies the identity of user, and obtains true address and verification information by decryption;Service side reaches true place and completes both sides' authentication by verification information, completes bid process.The present invention realizes the protection of private data.
Description
Technical field
The present invention relates to block chain technical fields, more particularly, to a kind of secret protection price competing method based on block chain.
Background technique
The problem of appearance very good solution of web teaching system platform resource is more, and user disperses improve transaction effect simultaneously
Rate enables the cost of buyer's least cost, obtains highest value.But existing web teaching system platform is by third
Side's maintenance, authenticity and reliability are completely dependent on the third-party institution, whether information disclose, operate whether it is transparent it is credible be people
Concern always.
Block chain is safeguarded as a distributed data base by all nodes jointly, well solves third party's degree of belief
Problem, still, the problem of block chain but causes privacy leakage there is the disclosure due to individual privacy data.Therefore, can
It is highly important for designing a kind of secret protection price competing method based on block chain.
Summary of the invention
In order to make up for the deficiencies of the prior art, the present invention provides a kind of secret protection price competing methods based on block chain.
The technical solution adopted by the present invention are as follows:
A kind of secret protection price competing method based on block chain, comprising the following steps:
1) user will include personal information, starting point, destination, the mission bit stream hair for being intended to provide region locating for server
Cloth is into block chain.
2) block chain provides the zone of reasonableness bidded according to heuritic approach, meanwhile, the mission bit stream is raw in new block
At when be pushed to service side.
3) service side hides its quote data using promise, and carries out bit encryption to quote data, then will promise to undertake and
Ciphertext is published in block chain, and whether in the reasonable scope block chain confirms the promise, then to the promise phase met in range
Corresponding ciphertext carries out size comparison, generates final result.
4) public key and puppet ID are issued user by block chain by target service side in block chain notice, the service side.
5) user true place is encrypted, sign after be sent to middle target service side.
6) target service side calculates data by chaotic maps to verify the identity of user in, and is obtained really by decryption
Address and verification information;Service side reaches true place and completes both sides' authentication by verification information, completes this task
Bid process.
The present invention stores and processs mission bit stream using block chain, and is added using promising to undertake to quote data
It is close, without opening the range judgement promised to undertake and can realized to quote data in block chain, protect quotation information privacy;This hair
It is bright that data are calculated by chaotic maps to verify the identity of user by middle target service side, and true address is obtained by decryption
And verification information;Service side reaches true place and completes both sides' authentication by verification information, completes bidding for this task
Process, the above-mentioned setting ensure that only certification both sides could obtain effective authentication information, effectively prevent the attack of opponent.
Preferably, block chain is ether mill block chain.The above-mentioned setting may make the present invention to have programmable functions.
Preferably, in step 1), block chain first confirms to whether the personal information of the user has been registered, when a
When people's information has been registered, mission bit stream is able to issue on block chain.
Preferably, in step 3), when final result is not unique, ether mill block chain will obtain the position of specific bidders
Confidence breath, using manhatton distance calculated minimum as final result.
Preferably, in step 4), after the bid process for completing this task, the final result bidded is announced on block chain.
It bids publicly after completing bid process in the present invention as a result, ensure that the publicity of information and the transparency of operation.
Preferably, in step 5), user is sent to middle target after carrying out ECC encryption, Schnorr signature to true place
Service side.The above-mentioned setting ensure that the authenticity and integrity of data.
It preferably, further include step 7), ether mill block chain encrypts quote data using homomorphic cryptography attribute, with
The form of ciphertext carries out mean analysis and fluction analysis to quote data.The above-mentioned setting can generate with reference to work following quotation
With.
It preferably, further include step 8), ether mill block chain is using reserved parameter to abnormal existing for the activity of bidding or event
Barrier carries out calculation processing.The above-mentioned setting can effectively ensure that the normal operation of bid price scheme.
Compared with prior art, the present invention has the advantages that:
The present invention has the advantages that web teaching system is high-efficient, meanwhile, and realize the protection of private data, present invention removal
Third party, to ensure that the transparency and confidence level of operation, and the present invention also has the analysis and statistics of quote data
The analysis result of function, generation bids with reference value to following, in addition, fault-tolerant ability of the invention is that the activity of bidding mentions
It has supplied to ensure, has increased robustness of the invention.
Specific embodiment
Mission bit stream is included personal information, starting point, terminal, the task letter for being intended to provide region locating for server by user
It ceases, be published in the block chain of ether mill, whether ether mill block chain is infused firstly the need of the personal information for confirming the user
Volume, after user information confirmation has been registered, mission bit stream is able to issue on the block chain of ether mill.
Ether mill block chain provides the zone of reasonableness bidded according to heuritic approach, meanwhile, the mission bit stream is in new area
Block is pushed to service side when generating, service side participate in oneself it is interested bid, service side hides its quote data using promise,
And bit encryption is carried out to quote data, then ciphertext and promise are published in the block chain of ether mill, ether mill block first-in-chain(FIC)
Whether in the reasonable scope first confirm the promise, carries out size comparison for meeting the corresponding ciphertext of the promise in range, produce
Raw final result, when final result is not unique, ether mill block chain will obtain the location information of specific bidders, and benefit
Use manhatton distance calculated minimum as final result, ether mill block chain and target service side in notifying.
Public key and puppet ID are issued user by ether mill block chain by middle target service side;User carries out true place
It is sent to winning bidder after ECC encryption and Schnorr signature, meanwhile, middle target service side calculates data by chaotic maps to test
The identity of user is demonstrate,proved, and true address and verification information are obtained by decryption.Side to be serviced reaches true place and passes through verifying letter
Breath completes both sides' authentication, just completes the bid process of this task.The final result bidded also will be in ether mill block chain
On announced.
Then, block chain in ether mill can encrypt quote data using homomorphic cryptography attribute, in the form of ciphertext pair
Quote data carries out the mean value of average polymerization and variance polymerization analysis quotation and the fluctuation size of quotation, can produce to following quotation
Raw reference role.Ether mill block chain also can be used reserved parameter and carry out calculation processing to exception existing for the activity of bidding or failure
To guarantee the normal operation of bid price scheme.Homomorphic cryptography attribute carries out calculating generated result with ciphertext form in the present invention
It is identical as generated result is re-encrypted with the same calculating of plaintext version progress.
The present invention calculate non-decrypting exposure to quote data and in plain text, has protected the privacy of data well.This
Invention requirement must be in the case where meeting certain number, and bidding can just be normally carried out, the setting that the present invention passes through reserved parameter
Number can be handled extremely, guarantee, which is bidded, to be gone on smoothly.
Claims (7)
1. a kind of secret protection price competing method based on block chain, need to meet certain number condition, it is characterised in that this method
The following steps are included:
1) user will be published to comprising personal information, starting point, destination, the mission bit stream for being intended to provide region locating for server
In block chain;
2) block chain provides the zone of reasonableness bidded according to heuritic approach, meanwhile, the mission bit stream is when new block generates
It is pushed to service side;
3) service side hides its quote data using promise, and carries out bit encryption to quote data, then will promise and ciphertext
It is published in block chain, whether in the reasonable scope block chain confirms the promise, then corresponding to the promise met in range
Ciphertext carry out size comparison, generate final result;The mode that the quote data carries out bit encryption uses homomorphic cryptography;
4) public key and puppet ID are issued user by block chain by target service side in block chain notice, the service side;
5) user true place is encrypted, sign after be sent to middle target service side;
6) target service side calculates data by chaotic maps to verify the identity of user in, and obtains true address by decryption
And verification information;Service side reaches true place and completes both sides' authentication by verification information, completes bidding for this task
Process;
When the number exception existing for the activity of bidding or failure, the block chain calculates the situation using reserved parameter
Processing.
2. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that: in step 1), area
Block chain is ether mill block chain.
3. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that: in step 1), area
Block chain first confirms that, when personal information is registered, mission bit stream is able to whether the personal information of the user is registered
It is issued on block chain.
4. the secret protection price competing method according to claim 2 based on block chain, it is characterised in that: in step 3), when
When final result is not unique, ether mill block chain calculates the location information of obtained bidders minimum using manhatton distance
Value is used as final result.
5. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that: complete in step 4)
After the bid process of this task, the final result bidded is announced on block chain.
6. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that: in step 5), use
Family is sent to middle target service side after carrying out ECC encryption, Schnorr signature to true place.
7. the secret protection price competing method according to claim 2 based on block chain, it is characterised in that: further include step
7), ether mill block chain carries out mean analysis and fluction analysis to quote data in the form of ciphertext, generates to following quotation
Reference role.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810425981.2A CN108650073B (en) | 2018-05-07 | 2018-05-07 | A kind of secret protection price competing method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810425981.2A CN108650073B (en) | 2018-05-07 | 2018-05-07 | A kind of secret protection price competing method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108650073A CN108650073A (en) | 2018-10-12 |
CN108650073B true CN108650073B (en) | 2019-03-29 |
Family
ID=63749222
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810425981.2A Active CN108650073B (en) | 2018-05-07 | 2018-05-07 | A kind of secret protection price competing method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108650073B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635956A (en) * | 2018-11-02 | 2019-04-16 | 广州裕申电子科技有限公司 | A kind of processing method and system of maintenance of equipment mission bit stream |
CN109635584B (en) * | 2018-11-23 | 2019-08-27 | 浙江工商大学 | A kind of data link privacy calculation method based on block chain |
CN109754322A (en) * | 2018-12-27 | 2019-05-14 | 石更箭数据科技(上海)有限公司 | A kind of data service system |
CN109697670B (en) * | 2018-12-29 | 2021-06-04 | 杭州趣链科技有限公司 | Public link information shielding method without influence on credibility |
CN109919748A (en) * | 2019-03-06 | 2019-06-21 | 中汇信息技术(上海)有限公司 | A kind of data processing method and system based on block chain |
CN110675265B (en) * | 2019-09-29 | 2022-07-08 | 四川师范大学 | Method for realizing block chain double-key hiding address protocol without temporary key leakage |
CN110830452A (en) * | 2019-10-22 | 2020-02-21 | 全链通有限公司 | Block chain-based electronic bidding method, device and storage medium |
CN110830232B (en) * | 2019-11-07 | 2022-07-08 | 北京静宁数据科技有限公司 | Hidden bidding method and system based on homomorphic encryption algorithm |
KR102330012B1 (en) * | 2019-11-07 | 2021-11-23 | 순천향대학교 산학협력단 | Authentication System and Method based on anonymous protocol in Permissioned Blockchain, Recording Medium for Performing the Method |
CN111428267A (en) * | 2020-03-24 | 2020-07-17 | 大唐七台河发电有限责任公司 | Distributed enterprise information management system and method based on information sharing mechanism |
CN113191863B (en) * | 2021-05-21 | 2023-06-23 | 中国联合网络通信集团有限公司 | Bid method, third party device, bid issuing party device and bid issuing party device |
CN115170237A (en) * | 2022-07-13 | 2022-10-11 | 深圳微言科技有限责任公司 | Inquiry system and method based on privacy protection |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105141425A (en) * | 2015-08-14 | 2015-12-09 | 重庆邮电大学 | Bidirectional authentication method capable of protecting identity based on chaotic mapping |
CN106897902A (en) * | 2017-02-21 | 2017-06-27 | 中链科技有限公司 | Service transacting method, system and trading server based on block chain technology |
CN107240009A (en) * | 2017-08-04 | 2017-10-10 | 北京中广掌视科技有限公司 | A kind of VR remote auction systems based on art work copyright authentication and transaction source tracing method |
CN107392743A (en) * | 2017-08-01 | 2017-11-24 | 安徽大学 | A kind of McAfee two way auctions method for secret protection and auction system |
CN107454114A (en) * | 2017-09-29 | 2017-12-08 | 深圳市轱辘车联数据技术有限公司 | A kind of auction bidding method, server and readable storage medium storing program for executing |
CN107483211A (en) * | 2017-08-10 | 2017-12-15 | 北方工业大学 | A kind of personalized k anonymities secret protection motivational techniques based on block chain |
CN107679976A (en) * | 2017-09-28 | 2018-02-09 | 电子科技大学 | A kind of auction system based on block chain |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107438002B (en) * | 2016-05-27 | 2022-02-11 | 索尼公司 | Block chain based system and electronic device and method in system |
CN107194587A (en) * | 2017-05-24 | 2017-09-22 | 暨南大学 | It is a kind of to be circulated based on block chain and the art work of expert system and identification register method |
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
CN107612934A (en) * | 2017-10-24 | 2018-01-19 | 济南浪潮高新科技投资发展有限公司 | A kind of block chain mobile terminal computing system and method based on Secret splitting |
CN107730384A (en) * | 2017-11-13 | 2018-02-23 | 深圳大学 | Art sales method and server, server end and system based on block chain |
-
2018
- 2018-05-07 CN CN201810425981.2A patent/CN108650073B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105141425A (en) * | 2015-08-14 | 2015-12-09 | 重庆邮电大学 | Bidirectional authentication method capable of protecting identity based on chaotic mapping |
CN106897902A (en) * | 2017-02-21 | 2017-06-27 | 中链科技有限公司 | Service transacting method, system and trading server based on block chain technology |
CN107392743A (en) * | 2017-08-01 | 2017-11-24 | 安徽大学 | A kind of McAfee two way auctions method for secret protection and auction system |
CN107240009A (en) * | 2017-08-04 | 2017-10-10 | 北京中广掌视科技有限公司 | A kind of VR remote auction systems based on art work copyright authentication and transaction source tracing method |
CN107483211A (en) * | 2017-08-10 | 2017-12-15 | 北方工业大学 | A kind of personalized k anonymities secret protection motivational techniques based on block chain |
CN107679976A (en) * | 2017-09-28 | 2018-02-09 | 电子科技大学 | A kind of auction system based on block chain |
CN107454114A (en) * | 2017-09-29 | 2017-12-08 | 深圳市轱辘车联数据技术有限公司 | A kind of auction bidding method, server and readable storage medium storing program for executing |
Non-Patent Citations (1)
Title |
---|
Blockchain based smart contract for bidding system;Yi-Hui Chen etc;《2018 IEEE International Conference on Applied System Invention》;20180417;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN108650073A (en) | 2018-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108650073B (en) | A kind of secret protection price competing method based on block chain | |
CN109347878B (en) | Decentralized data verification and data security transaction system and method | |
CN110458554B (en) | Identity-based data rapid transaction method on block chain | |
CN101170407B (en) | A method for securely generating secret key pair and transmitting public key or certificate application file | |
CN109889504B (en) | Decentralized data access right transaction method and system | |
CN106789041B (en) | A kind of credible block chain method of decentralization certificate | |
US7333615B1 (en) | Encryption between multiple devices | |
CN104463567B (en) | A kind of secure electronic transaction method and system | |
CN107657553A (en) | A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source | |
CN101452553B (en) | Trading method for protecting database copyright based on digital watermarking | |
CN108650077B (en) | Block chain based information transmission method, terminal, equipment and readable storage medium | |
CN106600252A (en) | Payment method and payment system based on block chain | |
CN103259788B (en) | For Formal Modeling and the verification method of security protocol | |
WO2020051710A1 (en) | System and process for managing digitized security tokens | |
CN110414193A (en) | A kind of safe encryption method and system of the close PDF document E-seal of state | |
CN103714455A (en) | Personal information protection method for C2C electronic trading platform | |
CN108769014B (en) | A method of PGP verification is carried out to Email based on block chain technology | |
CN107277000A (en) | A kind of electronic certificate method for managing security and system | |
CN113657978A (en) | Distributed energy auction method and system based on block chain and privacy protection | |
CN112801785A (en) | Fair data transaction method and device based on block chain intelligent contract | |
CN116545773A (en) | Method, medium and electronic equipment for processing privacy data | |
CN106375097A (en) | Proxy blind signature-based anti-scalping sensitive data transaction method | |
CN105631665A (en) | Security payment method based on PKI | |
CN116566619A (en) | Dynamic traceable privacy protection distributed threshold signature system and method | |
Alaraj | Fairness in physical products delivery protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |