CN109064324A - Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain - Google Patents

Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain Download PDF

Info

Publication number
CN109064324A
CN109064324A CN201810618545.7A CN201810618545A CN109064324A CN 109064324 A CN109064324 A CN 109064324A CN 201810618545 A CN201810618545 A CN 201810618545A CN 109064324 A CN109064324 A CN 109064324A
Authority
CN
China
Prior art keywords
transaction information
transaction
chain
alliance
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810618545.7A
Other languages
Chinese (zh)
Inventor
刘倞坤
董国超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Financial Assets Exchange LLC
Original Assignee
Chongqing Financial Assets Exchange LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Financial Assets Exchange LLC filed Critical Chongqing Financial Assets Exchange LLC
Priority to CN201810618545.7A priority Critical patent/CN109064324A/en
Publication of CN109064324A publication Critical patent/CN109064324A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The present invention relates to a kind of method of commerce based on alliance's chain, electronic device and readable storage medium storing program for executing, this method comprises: receiving the Transaction Information that transaction initiator determines on alliance's chain;Apply obtaining encrypted public key from ca authentication center, cryptographic operation is carried out to Transaction Information using encrypted public key;Encrypted Transaction Information is back to transaction initiator;It receives transaction initiator and carries out the Transaction Information to circulate after transaction generation block on alliance's chain using encrypted Transaction Information;Extract the encrypted public key in the Transaction Information of circulation, and whether the encrypted public key extracted in preset ca authentication central authentication is that preset ca authentication center is provided, if, decrypted private key corresponding with the encrypted public key extracted then is obtained from preset ca authentication center, is decrypted using Transaction Information of the decrypted private key to circulation;The account book of alliance's chain is updated, based on the Transaction Information after decryption to successfully complete transaction.The present invention improves the safety traded in alliance's chain.

Description

Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
Technical field
The present invention relates to field of computer technology more particularly to a kind of method of commerce based on alliance's chain, electronic device and Readable storage medium storing program for executing.
Background technique
When being traded in the block chain of existing alliance's chain type, it can only realize to transacting customer end subscriber identity Certification, and do not handled accordingly for the Transaction Information of user, it may be by illicit interception so as to cause the Transaction Information of user And be tampered, and when trading submission, actually can not also whether Transaction Information be perceived in the block chain of alliance's chain type It is tampered, this brings great risk to the information security of block chain.
Summary of the invention
The purpose of the present invention is to provide a kind of method of commerce based on alliance's chain, electronic device and readable storage medium storing program for executing, It is intended to improve the safety traded in alliance's chain.
To achieve the above object, the present invention provides a kind of electronic device, and the electronic device includes memory, processor, It is stored with the transaction system based on alliance's chain that can be run on the processor on the memory, it is described based on alliance's chain Transaction system realizes following steps when being executed by the processor:
Receive the Transaction Information that transaction initiator determines on alliance's chain;
Apply obtaining encrypted public key from preset ca authentication center, the transaction determined is believed using the encrypted public key of acquisition Breath carries out cryptographic operation;
Encrypted Transaction Information is back to the transaction initiator;
It receives the transaction initiator and carries out transaction generation block on alliance's chain using encrypted Transaction Information The Transaction Information to circulate afterwards;
The encrypted public key in the Transaction Information of circulation is extracted, and is added what the preset ca authentication central authentication extracted Whether Migong key is that the preset ca authentication center is provided, if so, obtaining and extracting from the preset ca authentication center The corresponding decrypted private key of encrypted public key, be decrypted using Transaction Information of the decrypted private key to circulation;
The account book of alliance's chain is updated, based on the Transaction Information after decryption to successfully complete transaction.
Preferably, after described the step of receiving the Transaction Information that transaction initiator determines on alliance's chain, further includes:
From preset ca authentication center apply obtain public signature key, using acquisition public signature key to the Transaction Information into Row signature operation, and cryptographic operation is carried out to the Transaction Information after signature using the encrypted public key obtained;
It is described be decrypted using Transaction Information of the decrypted private key to circulation after, further includes:
Signature authentication is carried out to the public signature key of Transaction Information after decryption, if signature authentication passes through, after decryption Transaction Information updates the account book of alliance's chain, to successfully complete transaction.
Preferably, if not being the preset ca authentication in the encrypted public key that the preset ca authentication central authentication extracts Center is provided or is not passed through to the signature authentication of the public signature key of Transaction Information after decryption, then utilizes the transaction initiator Encrypted Transaction Information carries out the block of transaction generation labeled as invalid block, not to alliance's chain on alliance's chain Account book be updated.
Preferably, after described the step of receiving the Transaction Information that transaction initiator determines on alliance's chain, further includes:
Corresponding first cryptographic Hash is calculated using hashing algorithm to the Transaction Information, and the first cryptographic Hash of calculating is added Enter in the Transaction Information;
After the public signature key progress signature authentication of Transaction Information passes through after to decryption, further includes:
Corresponding second cryptographic Hash is calculated using hashing algorithm to the Transaction Information after decryption, by the second cryptographic Hash of calculating It is compared with the first cryptographic Hash in the Transaction Information;
If the second cryptographic Hash calculated is identical as the first cryptographic Hash in the Transaction Information, based on the transaction after decryption The account book of alliance's chain described in information update, to successfully complete transaction;
If the second cryptographic Hash calculated is different from the first cryptographic Hash in the Transaction Information, by the transaction initiator The block of transaction generation is carried out on alliance's chain using encrypted Transaction Information labeled as invalid block, not to described The account book of alliance's chain is updated.
In addition, to achieve the above object, it is described to be based on alliance the present invention also provides a kind of method of commerce based on alliance's chain The method of commerce of chain includes:
Receive the Transaction Information that transaction initiator determines on alliance's chain;
Apply obtaining encrypted public key from preset ca authentication center, the transaction determined is believed using the encrypted public key of acquisition Breath carries out cryptographic operation;
Encrypted Transaction Information is back to the transaction initiator;
It receives the transaction initiator and carries out transaction generation block on alliance's chain using encrypted Transaction Information The Transaction Information to circulate afterwards;
The encrypted public key in the Transaction Information of circulation is extracted, and is added what the preset ca authentication central authentication extracted Whether Migong key is that the preset ca authentication center is provided, if so, obtaining and extracting from the preset ca authentication center The corresponding decrypted private key of encrypted public key, be decrypted using Transaction Information of the decrypted private key to circulation;
The account book of alliance's chain is updated, based on the Transaction Information after decryption to successfully complete transaction.
Preferably, after described the step of receiving the Transaction Information that transaction initiator determines on alliance's chain, further includes:
From preset ca authentication center apply obtain public signature key, using acquisition public signature key to the Transaction Information into Row signature operation, and cryptographic operation is carried out to the Transaction Information after signature using the encrypted public key obtained;
It is described be decrypted using Transaction Information of the decrypted private key to circulation after, further includes:
Signature authentication is carried out to the public signature key of Transaction Information after decryption, if signature authentication passes through, after decryption Transaction Information updates the account book of alliance's chain, to successfully complete transaction.
Preferably, if not being the preset ca authentication in the encrypted public key that the preset ca authentication central authentication extracts Center is provided or is not passed through to the signature authentication of the public signature key of Transaction Information after decryption, then utilizes the transaction initiator Encrypted Transaction Information carries out the block of transaction generation labeled as invalid block, not to alliance's chain on alliance's chain Account book be updated.
Preferably, the Transaction Information includes the identity information, transaction content, service parameter of counterparty;The utilization obtains The public signature key taken carries out signature operation to the Transaction Information
Signature operation is carried out to the service parameter in the Transaction Information using the public signature key of acquisition;
It is described to include: to the Transaction Information progress cryptographic operation after signature using the encrypted public key obtained
Using the encrypted public key of acquisition, and using preset rivest, shamir, adelman to counterparty in the Transaction Information Identity information, transaction content carry out cryptographic operation.
Preferably, after described the step of receiving the Transaction Information that transaction initiator determines on alliance's chain, further includes:
Corresponding first cryptographic Hash is calculated using hashing algorithm to the Transaction Information, and the first cryptographic Hash of calculating is added Enter in the Transaction Information;
After the public signature key progress signature authentication of Transaction Information passes through after to decryption, further includes:
Corresponding second cryptographic Hash is calculated using hashing algorithm to the Transaction Information after decryption, by the second cryptographic Hash of calculating It is compared with the first cryptographic Hash in the Transaction Information;
If the second cryptographic Hash calculated is identical as the first cryptographic Hash in the Transaction Information, based on the transaction after decryption The account book of alliance's chain described in information update, to successfully complete transaction;
If the second cryptographic Hash calculated is different from the first cryptographic Hash in the Transaction Information, by the transaction initiator The block of transaction generation is carried out on alliance's chain using encrypted Transaction Information labeled as invalid block, not to described The account book of alliance's chain is updated.
Further, to achieve the above object, the present invention also provides a kind of computer readable storage medium, the computers Readable storage medium storing program for executing is stored with the transaction system based on alliance's chain, and the transaction system based on alliance's chain can be by least one It manages device to execute, so that at least one described processor is executed such as the step of the above-mentioned method of commerce based on alliance's chain.
Method of commerce based on alliance's chain, electronic device and readable storage medium storing program for executing proposed by the present invention, by from preset The encrypted public key of ca authentication center application encrypts the Transaction Information that initiator determines of trading on alliance's chain;Described in reception Transaction initiator is carried out transaction on alliance's chain using encrypted Transaction Information and generates the Transaction Information to circulate after block; Whether the encrypted public key in the Transaction Information of the preset ca authentication central authentication circulation is the granting of ca authentication center, if It is then decrypted private key corresponding with the encrypted public key extracted to be obtained from ca authentication center, using the decrypted private key to circulation Transaction Information is decrypted, and updates the account book of alliance's chain, to successfully complete transaction.It can all recognize from CA due to trading every time Encrypted public key and corresponding decrypted private key are dynamically applied in card center, and using encrypted public key encrypt to Transaction Information laggard Row transaction, even if the Transaction Information of user is by illicit interception, since Transaction Information is encrypted, Transaction Information will not be usurped Change, improves the safety traded in alliance's chain.
Detailed description of the invention
Fig. 1 is that the present invention is based on the running environment schematic diagrames of 10 preferred embodiment of transaction system of alliance's chain;
Fig. 2 is that the present invention is based on the flow diagrams of one embodiment of method of commerce of alliance's chain.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims Protection scope within.
The present invention provides a kind of transaction system based on alliance's chain.Referring to Fig. 1, being that the present invention is based on the transaction of alliance's chain The running environment schematic diagram of 10 preferred embodiment of system.
In the present embodiment, the transaction system 10 based on alliance's chain is installed and is run in electronic device 1.The electricity Sub-device 1 may include, but be not limited only to, memory 11, processor 12 and display 13.Fig. 1 is illustrated only with component 11-13 Electronic device 1, it should be understood that be not required for implementing all components shown, the implementation that can be substituted it is more or Less component.
The memory 11 is the readable computer storage medium of at least one type, and the memory 11 is in some implementations It can be the internal storage unit of the electronic device 1, such as the hard disk or memory of the electronic device 1 in example.The memory 11 are also possible to the External memory equipment of the electronic device 1 in further embodiments, such as are equipped on the electronic device 1 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, Flash card (Flash Card) etc..Further, the memory 11 can also both include the storage inside of the electronic device 1 Unit also includes External memory equipment.The memory 11 for store the application software for being installed on the electronic device 1 and respectively Class data, such as the program code etc. of the transaction system 10 based on alliance's chain.The memory 11 can be also used for temporarily Ground stores the data that has exported or will export.
The processor 12 can be in some embodiments a central processing unit (Central Processing Unit, CPU), microprocessor or other data processing chips, for running the program code stored in the memory 11 or processing number According to, such as execute the transaction system 10 etc. based on alliance's chain.
The display 13 can be light-emitting diode display, liquid crystal display, touch-control liquid crystal display in some embodiments And OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) touches device etc..The display 13 is used In being shown in the information handled in the electronic device 1 and for showing visual user interface, such as the body of counterparty Part information, transaction content, stateful transaction etc..The component 11-13 of the electronic device 1 is in communication with each other by system bus.
Transaction system 10 based on alliance's chain includes that at least one is stored in the computer-readable finger in the memory 11 It enables, which can be executed by the processor 12, to realize each embodiment of the application.
Wherein, above-mentioned to realize following steps when being executed based on the transaction system 10 of alliance's chain by the processor 12:
Step S1 receives the Transaction Information that transaction initiator determines on alliance's chain;
Step S2 applies for obtaining encrypted public key from preset ca authentication center, and encrypted public key using acquisition is to determining Transaction Information carry out cryptographic operation;
Encrypted Transaction Information is back to the transaction initiator by step S3;
Step S4 receives the transaction initiator using encrypted Transaction Information and carries out transaction life on alliance's chain At the Transaction Information to circulate after block;
Step S5 extracts the encrypted public key in the Transaction Information of circulation, and in the preset ca authentication central authentication Whether the encrypted public key of extraction is that the preset ca authentication center is provided, if so, obtaining from the preset ca authentication center Decrypted private key corresponding with the encrypted public key extracted is taken, is decrypted using Transaction Information of the decrypted private key to circulation;
Step S6 updates the account book of alliance's chain based on the Transaction Information after decryption, to successfully complete transaction.
It is true to the initiator that trades on alliance's chain by the encrypted public key applied from preset ca authentication center in the present embodiment The Transaction Information (identity information, transaction content, service parameter including both parties etc.) set encrypts, and needs to illustrate It is that this is encrypted as encrypting the identity information, transaction content of counterparty in the Transaction Information.The transaction is received to initiate The encrypted Transaction Information of Fang Liyong carries out transaction on alliance's chain and generates the Transaction Information to circulate after block;Described pre- If ca authentication central authentication circulation Transaction Information in encrypted public key whether be ca authentication center provide, if so, from CA Authentication center obtains the corresponding decrypted private key of encrypted public key with extraction, using the decrypted private key to the Transaction Information of circulation into Row decryption, and the account book of alliance's chain is updated, to successfully complete transaction.If being extracted in the preset ca authentication central authentication Encrypted public key be not that the preset ca authentication center is provided, then the transaction initiator is utilized into encrypted Transaction Information The block of transaction generation is carried out on alliance's chain labeled as invalid block, the account book of alliance's chain is not updated.
Further, in this embodiment can also apply obtaining public signature key from preset ca authentication center, acquisition is utilized Public signature key carries out signature operation to the Transaction Information, and (signature operation is carried out to the service parameter in the Transaction Information Signature), and cryptographic operation is carried out to the Transaction Information after signature using the encrypted public key obtained;Utilizing the decrypted private key pair After the Transaction Information of circulation is decrypted, signature authentication is carried out to the public signature key of Transaction Information after decryption, if signature authentication Pass through, then update the account book of alliance's chain based on the Transaction Information after decryption, to successfully complete transaction.If to trading after decryption The signature authentication of the public signature key of information does not pass through, then utilizes encrypted Transaction Information described the transaction initiator The block of transaction generation is carried out on alliance's chain labeled as invalid block, the account book of alliance's chain is not updated.
Specifically, in Transaction Information (identity information, transaction including counterparty involved in Transaction Information in the present embodiment Content, service parameter etc.) determine after, firstly, the Transaction Information determined is sent to by client corresponding on alliance's chain Peer node carries out endorsement processing, carries out signature operation in endorsement processing stage, is provided using ca authentication center Transaction Information Public signature key sign, the legitimacy for the transaction that expresses one's approval, while carrying out standard for the integrality for verifying transaction below It is standby.It should be noted that being signed only using the public signature key that CA is provided to the transaction in Transaction Information to Transaction Information Service parameter is signed.Wherein, the certificate of fair that CA is provided includes public and private key, and peer node can request a batch in batches every time Public key carries out subsequent cryptographic operation, and ca authentication center can authenticate whether some public and private key is provided by the center CA.
After each peer node is signed successfully, then, used by the encrypted public key that ca authentication center is provided preset non- Symmetric encipherment algorithm encrypts the message body of Transaction Information, wherein the message body of Transaction Information includes head (such as transaction letter The identity information etc. of counterparty involved in breath) and transaction message content (share of transferring accounts in such as money transfer transactions), it has encrypted Encrypted transaction message is returned to client by Cheng Hou, to guarantee the anonymity of Transaction Information, even if other people get the transaction Information, due to have passed through encryption, other people, which can not also perceive the transaction, is initiated by whom, ensure that Transaction Information in area The safe transmission of ciphertext is carried out inside block chain network.Wherein, in the present embodiment Encryption Algorithm using rivest, shamir, adelman, Rivest, shamir, adelman needs two keys: public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography It is a pair with private cipher key, if encrypted with public-key cryptography to data, could be only decrypted with corresponding private cipher key;Such as Fruit is encrypted with private cipher key pair data, then could only be decrypted with corresponding public-key cryptography.In the public affairs provided using CA After key encrypts the message body of Transaction Information, it can only be decrypted with private key corresponding with the encrypted public key, ensure that friendship The safety of easy information.Rivest, shamir, adelman in the present embodiment includes RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC (elliptic curve encryption algorithm) etc..
When trading each time in the present embodiment can from ca authentication center dynamic application signature key (such as public signature key) and Encryption key (such as encrypted public key), signs to Transaction Information using the signature key applied from ca authentication center, and from CA The encryption key of center application completes transaction flow in alliance's chain type block chain again after encrypting to Transaction Information.Due to The certificate of fair applied every time from ca authentication center is different, therefore, can guarantee the signature key in each process of exchange, adds Key be it is random different, guarantee the safety of the information in alliance's chain type block chain transmission process.Wherein, in one kind It, can be with a kind of with the close of additive homomorphism characteristic when being encrypted using encryption key to Transaction Information in optional embodiment Code formula encryption, another code key only passed through in the encryption key (for example, applying for encryption key pair from the center CA, that is, include Encrypted public key and encryption key encrypted when encryption using encrypted public key, then can only be decrypted with encryption key when decrypting) it decrypts Transaction Information therein is read, in this way, can guarantee that the Transaction Information of user illicit interception and will not be peeped, for example, only handing over Easy both sides can go to be decrypted from the center CA according to encrypted public key application to encryption key.Herein with Pederson Be illustrated for Commitment algorithm and ECC (elliptic curve), certainly, do not limit yet using other algorithms such as RSA, Diffie-Hellman algorithm etc..For example, define a1=trade share, the trade share after a1 '=code obfuscation, x1=is from CA The encryption key of center application, then encrypt formula are as follows: a1 '=g^a1*h^x1, wherein the elliptic curve cryptography formula being related to Are as follows: a1 '=a1G+x1H.
Transaction Information after signed and encryption is after the orderer node on alliance's chain generates block, circulation To peer node, needs that Transaction Information is decrypted at this time and signature authentication, process is as follows:
It takes out corresponding encrypted public key in Transaction Information and removes CA central authentication, whether verify the encrypted public key by the center CA It provides, if it is not, then transaction updates failure, entire block chain account book not will be updated, the block generated by orderer node It can be denoted as invalid block.If verifying the encrypted public key is provided by the center CA, further obtained from the center CA Decrypted private key corresponding with the encrypted public key, and Transaction Information is decrypted using the encrypted public key corresponding decrypted private key. After Transaction Information decryption, further, signature authentication is carried out to the Transaction Information after decryption, the Transaction Information pair after obtaining decryption The public signature key answered, and the public signature key is removed into CA center certification, corresponding signature private key is returned to, to test using the signature private key It demonstrate,proves the whether corresponding tissue of the transaction or mechanism signs.It can go to test by public signature key i.e. in the present embodiment Demonstrate,prove the legitimacy of transaction.
The present embodiment determines the initiator that trades on alliance's chain by the encrypted public key applied from preset ca authentication center Good Transaction Information is encrypted;It receives the transaction initiator and is carried out on alliance's chain using encrypted Transaction Information Transaction generates the Transaction Information to circulate after block;Encryption in the Transaction Information of the preset ca authentication central authentication circulation Whether public key is that ca authentication center is provided, if so, it is private to obtain decryption corresponding with the encrypted public key extracted from ca authentication center Key is decrypted using Transaction Information of the decrypted private key to circulation, and updates the account book of alliance's chain, to successfully complete Transaction.It all can dynamically apply for encrypted public key and corresponding decrypted private key from ca authentication center due to trading every time, and utilize and add Migong key is traded after encrypting to Transaction Information, though the Transaction Information of user by illicit interception, due to Transaction Information It is encrypted, therefore Transaction Information will not be tampered, and improve the safety traded in alliance's chain.
In an optional embodiment, on the basis of the embodiment of above-mentioned Fig. 1, the transaction system based on alliance's chain 10 by the processor 12 execute when, further include following steps:
Corresponding first cryptographic Hash is calculated using hashing algorithm to the Transaction Information, and the first cryptographic Hash of calculating is added Enter in the Transaction Information;
After the public signature key progress signature authentication of Transaction Information passes through after to decryption, further includes:
Corresponding second cryptographic Hash is calculated using hashing algorithm to the Transaction Information after decryption, by the second cryptographic Hash of calculating It is compared with the first cryptographic Hash in the Transaction Information;
If the second cryptographic Hash calculated is identical as the first cryptographic Hash in the Transaction Information, based on the transaction after decryption The account book of alliance's chain described in information update, to successfully complete transaction;
If the second cryptographic Hash calculated is different from the first cryptographic Hash in the Transaction Information, by the transaction initiator The block of transaction generation is carried out on alliance's chain using encrypted Transaction Information labeled as invalid block, not to described The account book of alliance's chain is updated.
The integrity verification that can be also traded by hashing algorithm in the present embodiment can be right after Transaction Information determines Transaction Information uses hashing algorithm, calculates corresponding hash value, and be added in the Transaction Information.Subsequent to the complete of Transaction Information In integrity verification, hashing algorithm can be used to Transaction Information, calculate corresponding hash value, compared additional in Transaction Information Hash sees whether to change, if changed, proves that Transaction Information is tampered in process of exchange, then entire block Chain account book not will be updated, and be represented as in vain by the block that orderer node on alliance's chain generates;If be proved to be successful, The entire account book of block chain updates, and block is expressed success, this time trades and successfully enters chain.
As shown in Fig. 2, Fig. 2 is the present invention is based on the flow diagram of one embodiment of method of commerce of alliance's chain, this is based on The method of commerce of alliance's chain the following steps are included:
Step S10 receives the Transaction Information that transaction initiator determines on alliance's chain;
Step S20 applies for obtaining encrypted public key from preset ca authentication center, and encrypted public key using acquisition is to determining Transaction Information carry out cryptographic operation;
Encrypted Transaction Information is back to the transaction initiator by step S30;
Step S40 is received the transaction initiator and is traded on alliance's chain using encrypted Transaction Information Generate the Transaction Information to circulate after block;
Step S50 extracts the encrypted public key in the Transaction Information of circulation, and in the preset ca authentication central authentication Whether the encrypted public key of extraction is that the preset ca authentication center is provided, if so, obtaining from the preset ca authentication center Decrypted private key corresponding with the encrypted public key extracted is taken, is decrypted using Transaction Information of the decrypted private key to circulation;
Step S60 updates the account book of alliance's chain based on the Transaction Information after decryption, to successfully complete transaction.
It is true to the initiator that trades on alliance's chain by the encrypted public key applied from preset ca authentication center in the present embodiment The Transaction Information (identity information, transaction content, service parameter including both parties etc.) set encrypts, and needs to illustrate It is that this is encrypted as encrypting the identity information, transaction content of counterparty in the Transaction Information.The transaction is received to initiate The encrypted Transaction Information of Fang Liyong carries out transaction on alliance's chain and generates the Transaction Information to circulate after block;Described pre- If ca authentication central authentication circulation Transaction Information in encrypted public key whether be ca authentication center provide, if so, from CA Authentication center obtains the corresponding decrypted private key of encrypted public key with extraction, using the decrypted private key to the Transaction Information of circulation into Row decryption, and the account book of alliance's chain is updated, to successfully complete transaction.If being extracted in the preset ca authentication central authentication Encrypted public key be not that the preset ca authentication center is provided, then the transaction initiator is utilized into encrypted Transaction Information The block of transaction generation is carried out on alliance's chain labeled as invalid block, the account book of alliance's chain is not updated.
Further, in this embodiment can also apply obtaining public signature key from preset ca authentication center, acquisition is utilized Public signature key carries out signature operation to the Transaction Information, and (signature operation is carried out to the service parameter in the Transaction Information Signature), and cryptographic operation is carried out to the Transaction Information after signature using the encrypted public key obtained;Utilizing the decrypted private key pair After the Transaction Information of circulation is decrypted, signature authentication is carried out to the public signature key of Transaction Information after decryption, if signature authentication Pass through, then update the account book of alliance's chain based on the Transaction Information after decryption, to successfully complete transaction.If to trading after decryption The signature authentication of the public signature key of information does not pass through, then utilizes encrypted Transaction Information described the transaction initiator The block of transaction generation is carried out on alliance's chain labeled as invalid block, the account book of alliance's chain is not updated.
Specifically, in Transaction Information (identity information, transaction including counterparty involved in Transaction Information in the present embodiment Content, service parameter etc.) determine after, firstly, the Transaction Information determined is sent to by client corresponding on alliance's chain Peer node carries out endorsement processing, carries out signature operation in endorsement processing stage, is provided using ca authentication center Transaction Information Public signature key sign, the legitimacy for the transaction that expresses one's approval, while carrying out standard for the integrality for verifying transaction below It is standby.It should be noted that being signed only using the public signature key that CA is provided to the transaction in Transaction Information to Transaction Information Service parameter is signed.Wherein, the certificate of fair that CA is provided includes public and private key, and peer node can request a batch in batches every time Public key carries out subsequent cryptographic operation, and ca authentication center can authenticate whether some public and private key is provided by the center CA.
After each peer node is signed successfully, then, used by the encrypted public key that ca authentication center is provided preset non- Symmetric encipherment algorithm encrypts the message body of Transaction Information, wherein the message body of Transaction Information includes head (such as transaction letter The identity information etc. of counterparty involved in breath) and transaction message content (share of transferring accounts in such as money transfer transactions), it has encrypted Encrypted transaction message is returned to client by Cheng Hou, to guarantee the anonymity of Transaction Information, even if other people get the transaction Information, due to have passed through encryption, other people, which can not also perceive the transaction, is initiated by whom, ensure that Transaction Information in area The safe transmission of ciphertext is carried out inside block chain network.Wherein, in the present embodiment Encryption Algorithm using rivest, shamir, adelman, Rivest, shamir, adelman needs two keys: public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography It is a pair with private cipher key, if encrypted with public-key cryptography to data, could be only decrypted with corresponding private cipher key;Such as Fruit is encrypted with private cipher key pair data, then could only be decrypted with corresponding public-key cryptography.In the public affairs provided using CA After key encrypts the message body of Transaction Information, it can only be decrypted with private key corresponding with the encrypted public key, ensure that friendship The safety of easy information.Rivest, shamir, adelman in the present embodiment includes RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC (elliptic curve encryption algorithm) etc..
When trading each time in the present embodiment can from ca authentication center dynamic application signature key (such as public signature key) and Encryption key (such as encrypted public key), signs to Transaction Information using the signature key applied from ca authentication center, and from CA The encryption key of center application completes transaction flow in alliance's chain type block chain again after encrypting to Transaction Information.Due to The certificate of fair applied every time from ca authentication center is different, therefore, can guarantee the signature key in each process of exchange, adds Key be it is random different, guarantee the safety of the information in alliance's chain type block chain transmission process.Wherein, in one kind It, can be with a kind of with the close of additive homomorphism characteristic when being encrypted using encryption key to Transaction Information in optional embodiment Code formula encryption, another code key only passed through in the encryption key (for example, applying for encryption key pair from the center CA, that is, include Encrypted public key and encryption key encrypted when encryption using encrypted public key, then can only be decrypted with encryption key when decrypting) it decrypts Transaction Information therein is read, in this way, can guarantee that the Transaction Information of user illicit interception and will not be peeped, for example, only handing over Easy both sides can go to be decrypted from the center CA according to encrypted public key application to encryption key.Herein with Pederson Be illustrated for Commitment algorithm and ECC (elliptic curve), certainly, do not limit yet using other algorithms such as RSA, Diffie-Hellman algorithm etc..For example, define a1=trade share, the trade share after a1 '=code obfuscation, x1=is from CA The encryption key of center application, then encrypt formula are as follows: a1 '=g^a1*h^x1, wherein the elliptic curve cryptography formula being related to Are as follows: a1 '=a1G+x1H.
Transaction Information after signed and encryption is after the orderer node on alliance's chain generates block, circulation To peer node, needs that Transaction Information is decrypted at this time and signature authentication, process is as follows:
It takes out corresponding encrypted public key in Transaction Information and removes CA central authentication, whether verify the encrypted public key by the center CA It provides, if it is not, then transaction updates failure, entire block chain account book not will be updated, the block generated by orderer node It can be denoted as invalid block.If verifying the encrypted public key is provided by the center CA, further obtained from the center CA Decrypted private key corresponding with the encrypted public key, and Transaction Information is decrypted using the encrypted public key corresponding decrypted private key. After Transaction Information decryption, further, signature authentication is carried out to the Transaction Information after decryption, the Transaction Information pair after obtaining decryption The public signature key answered, and the public signature key is removed into CA center certification, corresponding signature private key is returned to, to test using the signature private key It demonstrate,proves the whether corresponding tissue of the transaction or mechanism signs.It can go to test by public signature key i.e. in the present embodiment Demonstrate,prove the legitimacy of transaction.
The present embodiment determines the initiator that trades on alliance's chain by the encrypted public key applied from preset ca authentication center Good Transaction Information is encrypted;It receives the transaction initiator and is carried out on alliance's chain using encrypted Transaction Information Transaction generates the Transaction Information to circulate after block;Encryption in the Transaction Information of the preset ca authentication central authentication circulation Whether public key is that ca authentication center is provided, if so, it is private to obtain decryption corresponding with the encrypted public key extracted from ca authentication center Key is decrypted using Transaction Information of the decrypted private key to circulation, and updates the account book of alliance's chain, to successfully complete Transaction.It all can dynamically apply for encrypted public key and corresponding decrypted private key from ca authentication center due to trading every time, and utilize and add Migong key is traded after encrypting to Transaction Information, though the Transaction Information of user by illicit interception, due to Transaction Information It is encrypted, therefore Transaction Information will not be tampered, and improve the safety traded in alliance's chain.
In an optional embodiment, on the basis of the above embodiments, this method further includes following steps:
Corresponding first cryptographic Hash is calculated using hashing algorithm to the Transaction Information, and the first cryptographic Hash of calculating is added Enter in the Transaction Information;
After the public signature key progress signature authentication of Transaction Information passes through after to decryption, further includes:
Corresponding second cryptographic Hash is calculated using hashing algorithm to the Transaction Information after decryption, by the second cryptographic Hash of calculating It is compared with the first cryptographic Hash in the Transaction Information;
If the second cryptographic Hash calculated is identical as the first cryptographic Hash in the Transaction Information, based on the transaction after decryption The account book of alliance's chain described in information update, to successfully complete transaction;
If the second cryptographic Hash calculated is different from the first cryptographic Hash in the Transaction Information, by the transaction initiator The block of transaction generation is carried out on alliance's chain using encrypted Transaction Information labeled as invalid block, not to described The account book of alliance's chain is updated.
The integrity verification that can be also traded by hashing algorithm in the present embodiment can be right after Transaction Information determines Transaction Information uses hashing algorithm, calculates corresponding hash value, and be added in the Transaction Information.Subsequent to the complete of Transaction Information In integrity verification, hashing algorithm can be used to Transaction Information, calculate corresponding hash value, compared additional in Transaction Information Hash sees whether to change, if changed, proves that Transaction Information is tampered in process of exchange, then entire block Chain account book not will be updated, and be represented as in vain by the block that orderer node on alliance's chain generates;If be proved to be successful, The entire account book of block chain updates, and block is expressed success, this time trades and successfully enters chain.
In addition, the computer-readable recording medium storage has the present invention also provides a kind of computer readable storage medium Based on the transaction system of alliance's chain, the transaction system based on alliance's chain can be executed by least one processor, so that described At least one processor executes the step of method of commerce based on alliance's chain in such as above-described embodiment, should the friendship based on alliance's chain The specific implementation process such as step S10, S20, S30 of easy method are as described above, and details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to be realized by hardware, but very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
Preferred embodiments of the present invention have been described above with reference to the accompanying drawings, not thereby limiting the scope of the invention.On It is for illustration only to state serial number of the embodiment of the present invention, does not represent the advantages or disadvantages of the embodiments.It is patrolled in addition, though showing in flow charts Sequence is collected, but in some cases, it can be with the steps shown or described are performed in an order that is different from the one herein.
Without departing from the scope and spirit of the invention, there are many variations to implement the present invention by those skilled in the art, It can be used for another embodiment for example as the feature of one embodiment and obtain another embodiment.It is all to use technology of the invention Made any modifications, equivalent replacements, and improvements within design, should all be within interest field of the invention.

Claims (10)

1. a kind of electronic device, which is characterized in that the electronic device includes memory, processor, is stored on the memory There is the transaction system based on alliance's chain that can be run on the processor, the transaction system based on alliance's chain is by the place Reason device realizes following steps when executing:
Receive the Transaction Information that transaction initiator determines on alliance's chain;
From preset ca authentication center apply obtain encrypted public key, using acquisition encrypted public key to the Transaction Information determined into Row cryptographic operation;
Encrypted Transaction Information is back to the transaction initiator;
The transaction initiator is received to carry out flowing after transaction generates block on alliance's chain using encrypted Transaction Information The Transaction Information turned;
The encrypted public key in the Transaction Information of circulation is extracted, and public in the encryption that the preset ca authentication central authentication extracts Whether key is that the preset ca authentication center is provided, and is added if so, obtaining from the preset ca authentication center with what is extracted Key corresponding decrypted private key in Migong is decrypted using Transaction Information of the decrypted private key to circulation;
The account book of alliance's chain is updated, based on the Transaction Information after decryption to successfully complete transaction.
2. electronic device as described in claim 1, which is characterized in that the initiator that trades on reception alliance chain determines Transaction Information the step of after, further includes:
Apply obtaining public signature key from preset ca authentication center, the Transaction Information is signed using the public signature key of acquisition Name operation, and cryptographic operation is carried out to the Transaction Information after signature using the encrypted public key obtained;
It is described be decrypted using Transaction Information of the decrypted private key to circulation after, further includes:
Signature authentication is carried out to the public signature key of Transaction Information after decryption, if signature authentication passes through, based on the transaction after decryption The account book of alliance's chain described in information update, to successfully complete transaction.
3. electronic device as claimed in claim 2, which is characterized in that if extracted in the preset ca authentication central authentication Encrypted public key is not the preset ca authentication center granting or the signature authentication to the public signature key of Transaction Information after decryption Do not pass through, then the transaction initiator is carried out on alliance's chain to the block of transaction generation using encrypted Transaction Information Labeled as invalid block, the account book of alliance's chain is not updated.
4. electronic device as claimed in claim 2 or claim 3, which is characterized in that the initiator that trades on reception alliance chain is true After the step of Transaction Information set, further includes:
Corresponding first cryptographic Hash is calculated using hashing algorithm to the Transaction Information, and institute is added in the first cryptographic Hash of calculating It states in Transaction Information;
After the public signature key progress signature authentication of Transaction Information passes through after to decryption, further includes:
Corresponding second cryptographic Hash is calculated using hashing algorithm to the Transaction Information after decryption, by the second cryptographic Hash of calculating and institute The first cryptographic Hash stated in Transaction Information is compared;
If the second cryptographic Hash calculated is identical as the first cryptographic Hash in the Transaction Information, based on the Transaction Information after decryption The account book of alliance's chain is updated, to successfully complete transaction;
If the second cryptographic Hash calculated is different from the first cryptographic Hash in the Transaction Information, the transaction initiator is utilized Encrypted Transaction Information carries out the block of transaction generation labeled as invalid block, not to alliance's chain on alliance's chain Account book be updated.
5. a kind of method of commerce based on alliance's chain, which is characterized in that the method for commerce based on alliance's chain includes:
Receive the Transaction Information that transaction initiator determines on alliance's chain;
From preset ca authentication center apply obtain encrypted public key, using acquisition encrypted public key to the Transaction Information determined into Row cryptographic operation;
Encrypted Transaction Information is back to the transaction initiator;
The transaction initiator is received to carry out flowing after transaction generates block on alliance's chain using encrypted Transaction Information The Transaction Information turned;
The encrypted public key in the Transaction Information of circulation is extracted, and public in the encryption that the preset ca authentication central authentication extracts Whether key is that the preset ca authentication center is provided, and is added if so, obtaining from the preset ca authentication center with what is extracted Key corresponding decrypted private key in Migong is decrypted using Transaction Information of the decrypted private key to circulation;
The account book of alliance's chain is updated, based on the Transaction Information after decryption to successfully complete transaction.
6. the method for commerce as claimed in claim 5 based on alliance's chain, which is characterized in that trade on reception alliance chain After the step of Transaction Information that initiator determines, further includes:
Apply obtaining public signature key from preset ca authentication center, the Transaction Information is signed using the public signature key of acquisition Name operation, and cryptographic operation is carried out to the Transaction Information after signature using the encrypted public key obtained;
It is described be decrypted using Transaction Information of the decrypted private key to circulation after, further includes:
Signature authentication is carried out to the public signature key of Transaction Information after decryption, if signature authentication passes through, based on the transaction after decryption The account book of alliance's chain described in information update, to successfully complete transaction.
7. the method for commerce as claimed in claim 6 based on alliance's chain, which is characterized in that if in the preset ca authentication The encrypted public key that heart verifying is extracted is not the preset ca authentication center granting or public to the signature of Transaction Information after decryption The signature authentication of key does not pass through, then hands over the transaction initiator on alliance's chain using encrypted Transaction Information Block easily generated is labeled as invalid block, is not updated to the account book of alliance's chain.
8. the method for commerce based on alliance's chain as claimed in claims 6 or 7, which is characterized in that the Transaction Information includes handing over Identity information, transaction content, the service parameter of Yi Fang;It is described to be signed using the public signature key obtained to the Transaction Information Operation includes:
Signature operation is carried out to the service parameter in the Transaction Information using the public signature key of acquisition;
It is described to include: to the Transaction Information progress cryptographic operation after signature using the encrypted public key obtained
Using the encrypted public key of acquisition, and using preset rivest, shamir, adelman to the identity of counterparty in the Transaction Information Information, transaction content carry out cryptographic operation.
9. the method for commerce based on alliance's chain as claimed in claims 6 or 7, which is characterized in that on reception alliance chain After the step of Transaction Information that transaction initiator determines, further includes:
Corresponding first cryptographic Hash is calculated using hashing algorithm to the Transaction Information, and institute is added in the first cryptographic Hash of calculating It states in Transaction Information;
After the public signature key progress signature authentication of Transaction Information passes through after to decryption, further includes:
Corresponding second cryptographic Hash is calculated using hashing algorithm to the Transaction Information after decryption, by the second cryptographic Hash of calculating and institute The first cryptographic Hash stated in Transaction Information is compared;
If the second cryptographic Hash calculated is identical as the first cryptographic Hash in the Transaction Information, based on the Transaction Information after decryption The account book of alliance's chain is updated, to successfully complete transaction;
If the second cryptographic Hash calculated is different from the first cryptographic Hash in the Transaction Information, the transaction initiator is utilized Encrypted Transaction Information carries out the block of transaction generation labeled as invalid block, not to alliance's chain on alliance's chain Account book be updated.
10. a kind of computer readable storage medium, which is characterized in that be stored on the computer readable storage medium based on connection The transaction system of alliance's chain is realized when the transaction system based on alliance's chain is executed by processor as any in claim 5 to 9 The step of method of commerce based on alliance's chain described in item.
CN201810618545.7A 2018-06-15 2018-06-15 Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain Pending CN109064324A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810618545.7A CN109064324A (en) 2018-06-15 2018-06-15 Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810618545.7A CN109064324A (en) 2018-06-15 2018-06-15 Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain

Publications (1)

Publication Number Publication Date
CN109064324A true CN109064324A (en) 2018-12-21

Family

ID=64821007

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810618545.7A Pending CN109064324A (en) 2018-06-15 2018-06-15 Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain

Country Status (1)

Country Link
CN (1) CN109064324A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109754250A (en) * 2018-12-27 2019-05-14 石更箭数据科技(上海)有限公司 Data trade method and system, platform, storage medium
CN109815747A (en) * 2019-01-17 2019-05-28 重庆金融资产交易所有限责任公司 Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN109961276A (en) * 2019-02-27 2019-07-02 深圳市朗科科技股份有限公司 Digital cash wallet, method of commerce, transaction system and computer storage medium
CN110034917A (en) * 2019-04-11 2019-07-19 鸿秦(北京)科技有限公司 A kind of alliance's chain data processing method and device based on homomorphic encryption algorithm
CN110264350A (en) * 2019-05-10 2019-09-20 重庆金融资产交易所有限责任公司 Bookkeeping methods, device and the computer equipment for thering is endorsement to sign based on block chain
CN110458558A (en) * 2019-07-04 2019-11-15 重庆金融资产交易所有限责任公司 Data encryption method, device and computer equipment based on block chain
CN110768781A (en) * 2019-08-28 2020-02-07 如般量子科技有限公司 Public and private key issuing and issuing method and system based on alliance chain and resisting quantum computation
CN111343150A (en) * 2020-02-06 2020-06-26 深圳市网心科技有限公司 Transaction data transmission method and system based on block chain and related components
CN111400756A (en) * 2020-03-13 2020-07-10 杭州复杂美科技有限公司 Private data uplink method, device and storage medium
US10771241B2 (en) 2019-05-23 2020-09-08 Alibaba Group Holding Limited Time authentication method, apparatus and device in blockchain-type ledger
CN111709053A (en) * 2020-06-11 2020-09-25 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
WO2020233149A1 (en) * 2019-05-23 2020-11-26 创新先进技术有限公司 Method, apparatus and device for timing authentication in blockchain account book
CN112418853A (en) * 2020-09-22 2021-02-26 上海哔哩哔哩科技有限公司 Transaction data encryption method and device based on block chain
CN112950376A (en) * 2021-03-05 2021-06-11 广东电网有限责任公司 Electric power industry digital identity card management method and system based on block chain technology
CN113409046A (en) * 2021-06-30 2021-09-17 立信(重庆)数据科技股份有限公司 Ciphertext analysis method and system for data transaction
CN114022150A (en) * 2022-01-07 2022-02-08 北京笔新互联网科技有限公司 Resource transfer method, device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101637854B1 (en) * 2015-10-16 2016-07-08 주식회사 코인플러그 Certificate issuance system and method based on block chain, certificate authentication system and method based on block chain
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101637854B1 (en) * 2015-10-16 2016-07-08 주식회사 코인플러그 Certificate issuance system and method based on block chain, certificate authentication system and method based on block chain
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109754250A (en) * 2018-12-27 2019-05-14 石更箭数据科技(上海)有限公司 Data trade method and system, platform, storage medium
CN109754250B (en) * 2018-12-27 2021-06-08 石更箭数据科技(上海)有限公司 Data transaction method and system, platform and storage medium
CN109815747A (en) * 2019-01-17 2019-05-28 重庆金融资产交易所有限责任公司 Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN109961276A (en) * 2019-02-27 2019-07-02 深圳市朗科科技股份有限公司 Digital cash wallet, method of commerce, transaction system and computer storage medium
CN110034917A (en) * 2019-04-11 2019-07-19 鸿秦(北京)科技有限公司 A kind of alliance's chain data processing method and device based on homomorphic encryption algorithm
CN110264350A (en) * 2019-05-10 2019-09-20 重庆金融资产交易所有限责任公司 Bookkeeping methods, device and the computer equipment for thering is endorsement to sign based on block chain
US10771241B2 (en) 2019-05-23 2020-09-08 Alibaba Group Holding Limited Time authentication method, apparatus and device in blockchain-type ledger
WO2020233149A1 (en) * 2019-05-23 2020-11-26 创新先进技术有限公司 Method, apparatus and device for timing authentication in blockchain account book
CN110458558A (en) * 2019-07-04 2019-11-15 重庆金融资产交易所有限责任公司 Data encryption method, device and computer equipment based on block chain
CN110768781B (en) * 2019-08-28 2021-10-22 如般量子科技有限公司 Public and private key issuing and issuing method and system based on alliance chain and resisting quantum computation
CN110768781A (en) * 2019-08-28 2020-02-07 如般量子科技有限公司 Public and private key issuing and issuing method and system based on alliance chain and resisting quantum computation
CN111343150A (en) * 2020-02-06 2020-06-26 深圳市网心科技有限公司 Transaction data transmission method and system based on block chain and related components
CN111343150B (en) * 2020-02-06 2022-11-29 深圳市网心科技有限公司 Transaction data transmission method and system based on block chain and related components
CN111400756A (en) * 2020-03-13 2020-07-10 杭州复杂美科技有限公司 Private data uplink method, device and storage medium
CN111709053A (en) * 2020-06-11 2020-09-25 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
CN111709053B (en) * 2020-06-11 2024-04-05 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
CN112418853A (en) * 2020-09-22 2021-02-26 上海哔哩哔哩科技有限公司 Transaction data encryption method and device based on block chain
CN112950376A (en) * 2021-03-05 2021-06-11 广东电网有限责任公司 Electric power industry digital identity card management method and system based on block chain technology
CN113409046A (en) * 2021-06-30 2021-09-17 立信(重庆)数据科技股份有限公司 Ciphertext analysis method and system for data transaction
CN114022150A (en) * 2022-01-07 2022-02-08 北京笔新互联网科技有限公司 Resource transfer method, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109064324A (en) Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
AU2015277000B2 (en) Efficient methods for authenticated communication
CN103067401B (en) Method and system for key protection
US9647845B2 (en) Key downloading method, management method, downloading management method, device and system
CN109728906B (en) Anti-quantum-computation asymmetric encryption method and system based on asymmetric key pool
CN110519046B (en) Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD
CN103914913B (en) A kind of application of IC cards scene recognition method and system
CN109921905B (en) Anti-quantum computation key negotiation method and system based on private key pool
CN109918888B (en) Anti-quantum certificate issuing method and issuing system based on public key pool
CN109660338B (en) Anti-quantum computation digital signature method and system based on symmetric key pool
CN109936456B (en) Anti-quantum computation digital signature method and system based on private key pool
CN109787758B (en) Anti-quantum computation MQV key agreement method and system based on private key pool and Elgamal
CN109034796A (en) Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN110380845B (en) Quantum secret communication alliance chain transaction method, system and equipment based on group symmetric key pool
CN110138548B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and DH protocol
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
CN109728905B (en) Anti-quantum computation MQV key negotiation method and system based on asymmetric key pool
CN104462949A (en) Method and device for calling plug-in
CN109905229B (en) Anti-quantum computing Elgamal encryption and decryption method and system based on group asymmetric key pool
CN109815747A (en) Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN110046906A (en) A kind of the two-way authentication method of commerce and system of MPOS machine and server
CN110176989B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool
CN110098925B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number
CN110266483B (en) Quantum communication service station key negotiation method, system and device based on asymmetric key pool pair and QKD

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181221

WD01 Invention patent application deemed withdrawn after publication