CN108768990A - It is a kind of that encryption method can search for based on block chain - Google Patents

It is a kind of that encryption method can search for based on block chain Download PDF

Info

Publication number
CN108768990A
CN108768990A CN201810478227.5A CN201810478227A CN108768990A CN 108768990 A CN108768990 A CN 108768990A CN 201810478227 A CN201810478227 A CN 201810478227A CN 108768990 A CN108768990 A CN 108768990A
Authority
CN
China
Prior art keywords
block chain
user
information
search
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810478227.5A
Other languages
Chinese (zh)
Inventor
陈仲寅
杨柏林
杜文涛
潘涛
林晗怡
韩嵩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Gongshang University
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN201810478227.5A priority Critical patent/CN108768990A/en
Publication of CN108768990A publication Critical patent/CN108768990A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Encryption method can search for based on block chain the invention discloses a kind of.The present invention includes the following steps:1)After user is signed by each side, block chain is written into after encryption of suggesting plans in information;2)When user need to extract one's own data record, keyword is inputted first, and keyword enters block chain query after user terminal is encrypted;3)The encrypted ciphertext of keyword searched in encrypted ciphertext in block chain after relevant information, ciphertext is returned into user;4)The ciphertext for returning to user decrypted obtains original plaintext.The present invention realizes the application that can search for being encrypted in block chain based on block chain, and the certification to user identity is realized in whole process, ensure that the legitimacy of write-in information and the protection to private data.

Description

It is a kind of that encryption method can search for based on block chain
Technical field
The present invention relates to block chain technology and can search for encryption technology field, more particularly, to searching for privacy can be protected Rope encryption method.
Background technology
Traditional searching method is inquired in plaintext, while the inquiry of user is also to be inquired with plaintext version, this is just There is great security risks.The information of unencryption can easily be obtained by malicious user and incredible third party, Yong Huyin Private is faced with great threat.In order to solve problem above, encrypted concept is can search for be suggested.Traditional can search for encrypting and will use Family information storage scans for after inquiring the information content encryption in content and database in server, can solve tradition again Security risk in searching in plain text, but still remain the hidden danger that information loses or is maliciously tampered.
Invention content
In order to make up for the deficiencies of the prior art, encryption method can search for based on block chain the present invention provides a kind of.
The technical solution adopted by the present invention is:
It is a kind of that encryption method can search for based on block chain based on block chain, include the following steps:
Step 1)User will include the information such as personal information, transaction record, transaction purpose, transaction related side and transaction property, warp Each side signs and is uploaded to system after encrypting.
Step 2)Set of keywords in cleartext information is submitted to system by user after hashing operation.
Step 3)System encrypts the plaintext keyword after Hash after the legitimacy of verification user identity, forms mapping Table and step 1)In encryption information write-in block chain in.
Step 4)The keyword of search is wanted in miner's input, and keyword submits to system after Hash, and system is by submission Inquiry work is carried out after information encryption, absence from work without reason is transmitted to user.
Step 5)System compares the ciphertext in the ciphertext of keyword and block chain, by qualified record information Return to user.
Step 6)The ciphertext that system returns is decrypted user terminal, and user obtains the cleartext information to be searched for.
Present invention employs block chain to be searched for information stores and processs, information is after each side's encrypted signature It is uploaded to block chain, ensure that the authenticity of upload information, ensure that information can not tamper.Block chain is written in information Before, system carries out the legitimacy that verification ensures user identity to user information by chaotic maps, ensure that write-in data Legitimacy.Mapping table in block chain contains keyword and the identity characteristic of user, realizes the unforgeable of mapping table And protect the individual privacy of user.
Preferably, the block chain is super account book Hyperledger.It is programmable that above-mentioned setting may make that the present invention has Function.
Preferably, step 1)In, block chain first signs to the information that the user uploads through each side, determines that information is effectively true Block chain is written again afterwards.
Preferably, step 1)In, user carries out authentication first before encryption, to determine the legitimacy of user identity.
Preferably, step 3)In, interior per portion write area block chain has the mapping table of its own.
Preferably, step 3)In, each mapping table includes information of the cryptographic Hash of information with the cryptographic Hash after encrypted, Mapping table realizes the mapping to the two.
Preferably, step 5)In, system compares after encrypting the cryptographic Hash of keyword with mapping table, if there is identical Scrambled record is the information to be searched, otherwise carries out next processing.
Preferably, step 6)In, if the information not met, return value is sky.
Compared with prior art, the present invention advantage is:The present invention has the advantages that search efficiency is high, meanwhile, again Realize the protection of private data.Invention removes third parties, to ensure that the transparency and confidence level of operation.The present invention Safeguarded that there is stronger robustness by block chain.In addition to this, the present invention protects privacy and the guarantee of user identity Storage information will not be maliciously tampered.
Specific implementation mode
User will include the information each side label such as personal information, transaction record, transaction purpose, transaction related side and transaction property Encryption hair submits to system after name.At the same time user terminal generates a antistop list about the cleartext information, in the table Information submits to system after Hash operation with together with encrypted plaintext.System is a series of to using chaotic maps to pass through first The legitimacy of user identity is verified in operation.If user identity, which does not conform to rule, interrupts ablation process, otherwise system will be used The Hash table that family is submitted forms cryptographic Hash by encryption and obtains mapping table with its secret value, and the mapping table and user are submitted Encrypted ciphertext block chain is written together.
When search, user inputs keyword to system, which submits to system after Hash, and system is passed through and encryption The cryptographic Hash is encrypted in the identical step of process, and according to the mapping table in encrypted information inquiry block chain.If There is same ciphertext in table, then the corresponding plaintext of the mapping table is otherwise the plaintext to be searched continues to compare. At the end of comparison, if not searching related clear data, return value sets sky, otherwise, returns to the ciphertext of relevant information, which exists User terminal is decrypted and obtains corresponding plaintext.
The present invention realizes the certification to user identity in user identity confidentiality, and write-in information is signed through each side, The legitimacy of this two promise write-in information.Block chain is written after cleartext information is encrypted, ensure that the privacy of data, together When realize data can not tamper.The present invention is realized can search for encrypted function to information, only in user identity The writable block chain of information ability legal and after each side signs.For illegally inquiring user, due to can not be close by what is inquired Text is decrypted, therefore there is no the risks of information leakage.

Claims (5)

1. a kind of can search for encryption method based on block chain, it is characterised in that this approach includes the following steps:
The first step, user will include that personal information, transaction record, transaction purpose, transaction related side and transaction property are signed through each side It is uploaded to system after name and encryption;
Set of keywords in cleartext information is submitted to system by second step, user after hashing operation;
Third walks, and system encrypts the plaintext keyword after Hash after the legitimacy of verification user identity, forms mapping table It is written in block chain with the encryption information in the first step;
The keyword of search is wanted in 4th step, miner's input, and keyword submits to system after Hash, and system is by the information of submission Inquiry work is carried out after encryption;
5th step, system compare the ciphertext in the ciphertext of keyword and block chain, and qualified record information is returned Back to absence from work without reason, absence from work without reason is transmitted to user;
The ciphertext that system returns is decrypted for 6th step, user terminal, and user obtains the cleartext information to be searched for.
2. according to claim 1 can search for encryption method based on block chain, it is characterised in that:In the first step, block The information that chain first uploads the user through each side's signature, determine that information is effectively true after block chain is written again.
3. according to claim 2 can search for encryption method based on block chain, it is characterised in that:The block chain is Super account book Hyperledger.
4. according to claim 1 can search for encryption method based on block chain, it is characterised in that:In the first step, adding Authentication is carried out first before close, to determine the legitimacy of user identity.
5. according to claim 1 can search for encryption method based on block chain, it is characterised in that:In third step, encryption Work includes the personal information of user, and then ensures the privacy of identities of user.
CN201810478227.5A 2018-05-18 2018-05-18 It is a kind of that encryption method can search for based on block chain Pending CN108768990A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810478227.5A CN108768990A (en) 2018-05-18 2018-05-18 It is a kind of that encryption method can search for based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810478227.5A CN108768990A (en) 2018-05-18 2018-05-18 It is a kind of that encryption method can search for based on block chain

Publications (1)

Publication Number Publication Date
CN108768990A true CN108768990A (en) 2018-11-06

Family

ID=64007224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810478227.5A Pending CN108768990A (en) 2018-05-18 2018-05-18 It is a kind of that encryption method can search for based on block chain

Country Status (1)

Country Link
CN (1) CN108768990A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109766342A (en) * 2018-12-28 2019-05-17 国云科技股份有限公司 A kind of data storage and querying method based on block chain
CN110032891A (en) * 2019-04-16 2019-07-19 中国电力科学研究院有限公司 A kind of smart grid distributed cryptograph search method and system model based on alliance's block chain
CN110166475A (en) * 2019-05-30 2019-08-23 智慧谷(厦门)物联科技有限公司 It is a kind of that encryption method symmetrically can search for based on block chain
CN111050317A (en) * 2019-12-07 2020-04-21 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain
CN111222167A (en) * 2020-04-23 2020-06-02 同方股份有限公司 Private data access method based on block chain and explicit authorization mechanism
CN111475828A (en) * 2020-05-14 2020-07-31 杭州烽顺科技信息服务有限公司 Encryption method and device, decryption method and device of block chain account book data
CN111797420A (en) * 2020-08-20 2020-10-20 北京阿尔山金融科技有限公司 Data authorization and evidence storage method and system based on block chain
CN111835500A (en) * 2020-07-08 2020-10-27 浙江工商大学 Searchable encryption data secure sharing method based on homomorphic encryption and block chain
CN112287379A (en) * 2020-12-24 2021-01-29 北京百度网讯科技有限公司 Service data using method, device, equipment, storage medium and program product
CN112418850A (en) * 2019-08-21 2021-02-26 中国移动通信有限公司研究院 Transaction method and device based on block chain and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110145594A1 (en) * 2009-12-16 2011-06-16 Electronics And Telecommunications Research Institute Method for performing searchable symmetric encryption
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110145594A1 (en) * 2009-12-16 2011-06-16 Electronics And Telecommunications Research Institute Method for performing searchable symmetric encryption
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王朗: "云存储中的密文排序检索技术研究", 《中国优秀硕士学位论文全文数据库(电子期刊) 信息科技辑》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109766342B (en) * 2018-12-28 2023-05-30 国云科技股份有限公司 Data storage and query method based on block chain
CN109766342A (en) * 2018-12-28 2019-05-17 国云科技股份有限公司 A kind of data storage and querying method based on block chain
CN110032891A (en) * 2019-04-16 2019-07-19 中国电力科学研究院有限公司 A kind of smart grid distributed cryptograph search method and system model based on alliance's block chain
CN110032891B (en) * 2019-04-16 2021-06-22 中国电力科学研究院有限公司 Intelligent power grid distributed ciphertext retrieval method and system model based on alliance block chain
CN110166475A (en) * 2019-05-30 2019-08-23 智慧谷(厦门)物联科技有限公司 It is a kind of that encryption method symmetrically can search for based on block chain
CN112418850A (en) * 2019-08-21 2021-02-26 中国移动通信有限公司研究院 Transaction method and device based on block chain and electronic equipment
CN111050317A (en) * 2019-12-07 2020-04-21 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain
CN111050317B (en) * 2019-12-07 2022-08-02 江西理工大学 Intelligent traffic data safety sharing method based on alliance block chain
CN111222167A (en) * 2020-04-23 2020-06-02 同方股份有限公司 Private data access method based on block chain and explicit authorization mechanism
CN111475828B (en) * 2020-05-14 2022-05-13 杭州烽顺科技信息服务有限公司 Encryption method and device, decryption method and device of block chain account book data
CN111475828A (en) * 2020-05-14 2020-07-31 杭州烽顺科技信息服务有限公司 Encryption method and device, decryption method and device of block chain account book data
CN111835500A (en) * 2020-07-08 2020-10-27 浙江工商大学 Searchable encryption data secure sharing method based on homomorphic encryption and block chain
CN111835500B (en) * 2020-07-08 2022-07-26 浙江工商大学 Searchable encryption data secure sharing method based on homomorphic encryption and block chain
CN111797420A (en) * 2020-08-20 2020-10-20 北京阿尔山金融科技有限公司 Data authorization and evidence storage method and system based on block chain
CN112287379A (en) * 2020-12-24 2021-01-29 北京百度网讯科技有限公司 Service data using method, device, equipment, storage medium and program product
CN112287379B (en) * 2020-12-24 2021-08-20 北京百度网讯科技有限公司 Service data using method, device, equipment, storage medium and program product

Similar Documents

Publication Publication Date Title
CN108768990A (en) It is a kind of that encryption method can search for based on block chain
CN106529327B (en) Mix the data access arrangement and method below cloud environment to encrypting database
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN201181472Y (en) Hardware key device and movable memory system
CN104579689B (en) A kind of soft cipher key system and implementation method
CN102710414B (en) Randomized document block encryption method
CN106534092A (en) Message-based and key-dependent privacy data encryption method
US10461924B2 (en) Format-preserving cipher
CN112380557B (en) Relational database encryption method and encrypted database query method
CN101465727B (en) Method for ensuring communication safety, network appliance, device and communication system
CN103955654A (en) USB (Universal Serial Bus) flash disk secure storage method based on virtual file system
CN104573549A (en) Credible method and system for protecting confidentiality of database
CN105117635A (en) Local data security protection system and method
CN106778292A (en) A kind of quick restoring method of Word encrypted documents
CN102135944A (en) Method for safe data storage in mobile communication equipment
CN102752112A (en) Authority control method and device based on signed message 1 (SM1)/SM2 algorithm
CN104252604B (en) Database based building block system type dynamic encryption method
US8755521B2 (en) Security method and system for media playback devices
CN111177747A (en) Block chain-based social network privacy data protection method
CN110492992A (en) A kind of data encryption and transmission method based on radio RF recognition technology
AU2019101343A4 (en) A computer system implemented method for generating a symmetric encryption key for encrypting and decrypting secure data
CN114430321B (en) DFA self-adaptive security-based black box traceable key attribute encryption method and device
CN114553557B (en) Key calling method, device, computer equipment and storage medium
CN1558580B (en) A network data safety protection method based on cryptography
IBRAHIM et al. A novel data encryption algorithm to ensure database security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181106

RJ01 Rejection of invention patent application after publication