CN108768990A - It is a kind of that encryption method can search for based on block chain - Google Patents
It is a kind of that encryption method can search for based on block chain Download PDFInfo
- Publication number
- CN108768990A CN108768990A CN201810478227.5A CN201810478227A CN108768990A CN 108768990 A CN108768990 A CN 108768990A CN 201810478227 A CN201810478227 A CN 201810478227A CN 108768990 A CN108768990 A CN 108768990A
- Authority
- CN
- China
- Prior art keywords
- block chain
- user
- information
- search
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Encryption method can search for based on block chain the invention discloses a kind of.The present invention includes the following steps:1)After user is signed by each side, block chain is written into after encryption of suggesting plans in information;2)When user need to extract one's own data record, keyword is inputted first, and keyword enters block chain query after user terminal is encrypted;3)The encrypted ciphertext of keyword searched in encrypted ciphertext in block chain after relevant information, ciphertext is returned into user;4)The ciphertext for returning to user decrypted obtains original plaintext.The present invention realizes the application that can search for being encrypted in block chain based on block chain, and the certification to user identity is realized in whole process, ensure that the legitimacy of write-in information and the protection to private data.
Description
Technical field
The present invention relates to block chain technology and can search for encryption technology field, more particularly, to searching for privacy can be protected
Rope encryption method.
Background technology
Traditional searching method is inquired in plaintext, while the inquiry of user is also to be inquired with plaintext version, this is just
There is great security risks.The information of unencryption can easily be obtained by malicious user and incredible third party, Yong Huyin
Private is faced with great threat.In order to solve problem above, encrypted concept is can search for be suggested.Traditional can search for encrypting and will use
Family information storage scans for after inquiring the information content encryption in content and database in server, can solve tradition again
Security risk in searching in plain text, but still remain the hidden danger that information loses or is maliciously tampered.
Invention content
In order to make up for the deficiencies of the prior art, encryption method can search for based on block chain the present invention provides a kind of.
The technical solution adopted by the present invention is:
It is a kind of that encryption method can search for based on block chain based on block chain, include the following steps:
Step 1)User will include the information such as personal information, transaction record, transaction purpose, transaction related side and transaction property, warp
Each side signs and is uploaded to system after encrypting.
Step 2)Set of keywords in cleartext information is submitted to system by user after hashing operation.
Step 3)System encrypts the plaintext keyword after Hash after the legitimacy of verification user identity, forms mapping
Table and step 1)In encryption information write-in block chain in.
Step 4)The keyword of search is wanted in miner's input, and keyword submits to system after Hash, and system is by submission
Inquiry work is carried out after information encryption, absence from work without reason is transmitted to user.
Step 5)System compares the ciphertext in the ciphertext of keyword and block chain, by qualified record information
Return to user.
Step 6)The ciphertext that system returns is decrypted user terminal, and user obtains the cleartext information to be searched for.
Present invention employs block chain to be searched for information stores and processs, information is after each side's encrypted signature
It is uploaded to block chain, ensure that the authenticity of upload information, ensure that information can not tamper.Block chain is written in information
Before, system carries out the legitimacy that verification ensures user identity to user information by chaotic maps, ensure that write-in data
Legitimacy.Mapping table in block chain contains keyword and the identity characteristic of user, realizes the unforgeable of mapping table
And protect the individual privacy of user.
Preferably, the block chain is super account book Hyperledger.It is programmable that above-mentioned setting may make that the present invention has
Function.
Preferably, step 1)In, block chain first signs to the information that the user uploads through each side, determines that information is effectively true
Block chain is written again afterwards.
Preferably, step 1)In, user carries out authentication first before encryption, to determine the legitimacy of user identity.
Preferably, step 3)In, interior per portion write area block chain has the mapping table of its own.
Preferably, step 3)In, each mapping table includes information of the cryptographic Hash of information with the cryptographic Hash after encrypted,
Mapping table realizes the mapping to the two.
Preferably, step 5)In, system compares after encrypting the cryptographic Hash of keyword with mapping table, if there is identical
Scrambled record is the information to be searched, otherwise carries out next processing.
Preferably, step 6)In, if the information not met, return value is sky.
Compared with prior art, the present invention advantage is:The present invention has the advantages that search efficiency is high, meanwhile, again
Realize the protection of private data.Invention removes third parties, to ensure that the transparency and confidence level of operation.The present invention
Safeguarded that there is stronger robustness by block chain.In addition to this, the present invention protects privacy and the guarantee of user identity
Storage information will not be maliciously tampered.
Specific implementation mode
User will include the information each side label such as personal information, transaction record, transaction purpose, transaction related side and transaction property
Encryption hair submits to system after name.At the same time user terminal generates a antistop list about the cleartext information, in the table
Information submits to system after Hash operation with together with encrypted plaintext.System is a series of to using chaotic maps to pass through first
The legitimacy of user identity is verified in operation.If user identity, which does not conform to rule, interrupts ablation process, otherwise system will be used
The Hash table that family is submitted forms cryptographic Hash by encryption and obtains mapping table with its secret value, and the mapping table and user are submitted
Encrypted ciphertext block chain is written together.
When search, user inputs keyword to system, which submits to system after Hash, and system is passed through and encryption
The cryptographic Hash is encrypted in the identical step of process, and according to the mapping table in encrypted information inquiry block chain.If
There is same ciphertext in table, then the corresponding plaintext of the mapping table is otherwise the plaintext to be searched continues to compare.
At the end of comparison, if not searching related clear data, return value sets sky, otherwise, returns to the ciphertext of relevant information, which exists
User terminal is decrypted and obtains corresponding plaintext.
The present invention realizes the certification to user identity in user identity confidentiality, and write-in information is signed through each side,
The legitimacy of this two promise write-in information.Block chain is written after cleartext information is encrypted, ensure that the privacy of data, together
When realize data can not tamper.The present invention is realized can search for encrypted function to information, only in user identity
The writable block chain of information ability legal and after each side signs.For illegally inquiring user, due to can not be close by what is inquired
Text is decrypted, therefore there is no the risks of information leakage.
Claims (5)
1. a kind of can search for encryption method based on block chain, it is characterised in that this approach includes the following steps:
The first step, user will include that personal information, transaction record, transaction purpose, transaction related side and transaction property are signed through each side
It is uploaded to system after name and encryption;
Set of keywords in cleartext information is submitted to system by second step, user after hashing operation;
Third walks, and system encrypts the plaintext keyword after Hash after the legitimacy of verification user identity, forms mapping table
It is written in block chain with the encryption information in the first step;
The keyword of search is wanted in 4th step, miner's input, and keyword submits to system after Hash, and system is by the information of submission
Inquiry work is carried out after encryption;
5th step, system compare the ciphertext in the ciphertext of keyword and block chain, and qualified record information is returned
Back to absence from work without reason, absence from work without reason is transmitted to user;
The ciphertext that system returns is decrypted for 6th step, user terminal, and user obtains the cleartext information to be searched for.
2. according to claim 1 can search for encryption method based on block chain, it is characterised in that:In the first step, block
The information that chain first uploads the user through each side's signature, determine that information is effectively true after block chain is written again.
3. according to claim 2 can search for encryption method based on block chain, it is characterised in that:The block chain is
Super account book Hyperledger.
4. according to claim 1 can search for encryption method based on block chain, it is characterised in that:In the first step, adding
Authentication is carried out first before close, to determine the legitimacy of user identity.
5. according to claim 1 can search for encryption method based on block chain, it is characterised in that:In third step, encryption
Work includes the personal information of user, and then ensures the privacy of identities of user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810478227.5A CN108768990A (en) | 2018-05-18 | 2018-05-18 | It is a kind of that encryption method can search for based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810478227.5A CN108768990A (en) | 2018-05-18 | 2018-05-18 | It is a kind of that encryption method can search for based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108768990A true CN108768990A (en) | 2018-11-06 |
Family
ID=64007224
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810478227.5A Pending CN108768990A (en) | 2018-05-18 | 2018-05-18 | It is a kind of that encryption method can search for based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108768990A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109766342A (en) * | 2018-12-28 | 2019-05-17 | 国云科技股份有限公司 | A kind of data storage and querying method based on block chain |
CN110032891A (en) * | 2019-04-16 | 2019-07-19 | 中国电力科学研究院有限公司 | A kind of smart grid distributed cryptograph search method and system model based on alliance's block chain |
CN110166475A (en) * | 2019-05-30 | 2019-08-23 | 智慧谷(厦门)物联科技有限公司 | It is a kind of that encryption method symmetrically can search for based on block chain |
CN111050317A (en) * | 2019-12-07 | 2020-04-21 | 江西理工大学 | Intelligent traffic data safety sharing method based on alliance block chain |
CN111222167A (en) * | 2020-04-23 | 2020-06-02 | 同方股份有限公司 | Private data access method based on block chain and explicit authorization mechanism |
CN111475828A (en) * | 2020-05-14 | 2020-07-31 | 杭州烽顺科技信息服务有限公司 | Encryption method and device, decryption method and device of block chain account book data |
CN111797420A (en) * | 2020-08-20 | 2020-10-20 | 北京阿尔山金融科技有限公司 | Data authorization and evidence storage method and system based on block chain |
CN111835500A (en) * | 2020-07-08 | 2020-10-27 | 浙江工商大学 | Searchable encryption data secure sharing method based on homomorphic encryption and block chain |
CN112287379A (en) * | 2020-12-24 | 2021-01-29 | 北京百度网讯科技有限公司 | Service data using method, device, equipment, storage medium and program product |
CN112418850A (en) * | 2019-08-21 | 2021-02-26 | 中国移动通信有限公司研究院 | Transaction method and device based on block chain and electronic equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110145594A1 (en) * | 2009-12-16 | 2011-06-16 | Electronics And Telecommunications Research Institute | Method for performing searchable symmetric encryption |
CN107862215A (en) * | 2017-09-29 | 2018-03-30 | 阿里巴巴集团控股有限公司 | A kind of date storage method, data query method and device |
-
2018
- 2018-05-18 CN CN201810478227.5A patent/CN108768990A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110145594A1 (en) * | 2009-12-16 | 2011-06-16 | Electronics And Telecommunications Research Institute | Method for performing searchable symmetric encryption |
CN107862215A (en) * | 2017-09-29 | 2018-03-30 | 阿里巴巴集团控股有限公司 | A kind of date storage method, data query method and device |
Non-Patent Citations (1)
Title |
---|
王朗: "云存储中的密文排序检索技术研究", 《中国优秀硕士学位论文全文数据库(电子期刊) 信息科技辑》 * |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109766342B (en) * | 2018-12-28 | 2023-05-30 | 国云科技股份有限公司 | Data storage and query method based on block chain |
CN109766342A (en) * | 2018-12-28 | 2019-05-17 | 国云科技股份有限公司 | A kind of data storage and querying method based on block chain |
CN110032891A (en) * | 2019-04-16 | 2019-07-19 | 中国电力科学研究院有限公司 | A kind of smart grid distributed cryptograph search method and system model based on alliance's block chain |
CN110032891B (en) * | 2019-04-16 | 2021-06-22 | 中国电力科学研究院有限公司 | Intelligent power grid distributed ciphertext retrieval method and system model based on alliance block chain |
CN110166475A (en) * | 2019-05-30 | 2019-08-23 | 智慧谷(厦门)物联科技有限公司 | It is a kind of that encryption method symmetrically can search for based on block chain |
CN112418850A (en) * | 2019-08-21 | 2021-02-26 | 中国移动通信有限公司研究院 | Transaction method and device based on block chain and electronic equipment |
CN111050317A (en) * | 2019-12-07 | 2020-04-21 | 江西理工大学 | Intelligent traffic data safety sharing method based on alliance block chain |
CN111050317B (en) * | 2019-12-07 | 2022-08-02 | 江西理工大学 | Intelligent traffic data safety sharing method based on alliance block chain |
CN111222167A (en) * | 2020-04-23 | 2020-06-02 | 同方股份有限公司 | Private data access method based on block chain and explicit authorization mechanism |
CN111475828B (en) * | 2020-05-14 | 2022-05-13 | 杭州烽顺科技信息服务有限公司 | Encryption method and device, decryption method and device of block chain account book data |
CN111475828A (en) * | 2020-05-14 | 2020-07-31 | 杭州烽顺科技信息服务有限公司 | Encryption method and device, decryption method and device of block chain account book data |
CN111835500A (en) * | 2020-07-08 | 2020-10-27 | 浙江工商大学 | Searchable encryption data secure sharing method based on homomorphic encryption and block chain |
CN111835500B (en) * | 2020-07-08 | 2022-07-26 | 浙江工商大学 | Searchable encryption data secure sharing method based on homomorphic encryption and block chain |
CN111797420A (en) * | 2020-08-20 | 2020-10-20 | 北京阿尔山金融科技有限公司 | Data authorization and evidence storage method and system based on block chain |
CN112287379A (en) * | 2020-12-24 | 2021-01-29 | 北京百度网讯科技有限公司 | Service data using method, device, equipment, storage medium and program product |
CN112287379B (en) * | 2020-12-24 | 2021-08-20 | 北京百度网讯科技有限公司 | Service data using method, device, equipment, storage medium and program product |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108768990A (en) | It is a kind of that encryption method can search for based on block chain | |
CN106529327B (en) | Mix the data access arrangement and method below cloud environment to encrypting database | |
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
CN201181472Y (en) | Hardware key device and movable memory system | |
CN104579689B (en) | A kind of soft cipher key system and implementation method | |
CN102710414B (en) | Randomized document block encryption method | |
CN106534092A (en) | Message-based and key-dependent privacy data encryption method | |
US10461924B2 (en) | Format-preserving cipher | |
CN112380557B (en) | Relational database encryption method and encrypted database query method | |
CN101465727B (en) | Method for ensuring communication safety, network appliance, device and communication system | |
CN103955654A (en) | USB (Universal Serial Bus) flash disk secure storage method based on virtual file system | |
CN104573549A (en) | Credible method and system for protecting confidentiality of database | |
CN105117635A (en) | Local data security protection system and method | |
CN106778292A (en) | A kind of quick restoring method of Word encrypted documents | |
CN102135944A (en) | Method for safe data storage in mobile communication equipment | |
CN102752112A (en) | Authority control method and device based on signed message 1 (SM1)/SM2 algorithm | |
CN104252604B (en) | Database based building block system type dynamic encryption method | |
US8755521B2 (en) | Security method and system for media playback devices | |
CN111177747A (en) | Block chain-based social network privacy data protection method | |
CN110492992A (en) | A kind of data encryption and transmission method based on radio RF recognition technology | |
AU2019101343A4 (en) | A computer system implemented method for generating a symmetric encryption key for encrypting and decrypting secure data | |
CN114430321B (en) | DFA self-adaptive security-based black box traceable key attribute encryption method and device | |
CN114553557B (en) | Key calling method, device, computer equipment and storage medium | |
CN1558580B (en) | A network data safety protection method based on cryptography | |
IBRAHIM et al. | A novel data encryption algorithm to ensure database security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181106 |
|
RJ01 | Rejection of invention patent application after publication |