CN111460497B - Editable block chain system - Google Patents

Editable block chain system Download PDF

Info

Publication number
CN111460497B
CN111460497B CN202010236720.3A CN202010236720A CN111460497B CN 111460497 B CN111460497 B CN 111460497B CN 202010236720 A CN202010236720 A CN 202010236720A CN 111460497 B CN111460497 B CN 111460497B
Authority
CN
China
Prior art keywords
trapdoor
chain
common node
fragments
target content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010236720.3A
Other languages
Chinese (zh)
Other versions
CN111460497A (en
Inventor
任炬
陈琳韦娅
徐旸
张尧学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN202010236720.3A priority Critical patent/CN111460497B/en
Publication of CN111460497A publication Critical patent/CN111460497A/en
Application granted granted Critical
Publication of CN111460497B publication Critical patent/CN111460497B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention discloses an editable block chain system, which comprises a first chain and a second chain; the first chain and the second chain are connected by a common node; the first chain is provided with an editing control intelligent contract; the common node is provided with trapdoor fragments, and the trapdoor fragments are used for synthesizing trapdoors; the common node is used for initiating an editing behavior, synthesizing the trapdoors according to the trapdoor fragments, verifying the trapdoors through the editing control intelligent contract, calculating a hash collision value according to original content, an original random number and target content after the verification is passed, and issuing the target content and the hash collision value to a second chain; and the node in the second chain verifies the target content and the hash collision value, and if the verification is passed, the target content is replaced by the original content. The method has the advantages of meeting the requirements on the safety of data storage and the requirements on data modification under specific conditions, and the like.

Description

Editable block chain system
Technical Field
The present invention relates to the field of blockchain technology, and in particular, to an editable blockchain system.
Background
The block chain is used as a decentralized, tamper-resistant and traceable distributed account book system and is applied to the field of social aspects. The core concept of the block chain is that a centralized accounting mode is changed into a distributed account book which is backed up by people together, and the anti-tamper property and the safety of the account book are enhanced through supervision of people. However, the non-tamper-ability of the block chain provides a data security guarantee for the distributed ledger, and also provides a severe test for the management of the content on the block chain. The european union 'general data protection regulation' (GDPR) was implemented in 2018, where "deletion right (oblivious right)" stipulates that a controller, whose information subject has the right to request information under specific conditions, deletes information, and the information controller is obligated to do so. Once the uplink is successful, the data on the blockchain is stored in all nodes in a decentralized mode and is stored in the system permanently. This is contrary to the idea of "delete right" and "correct right" in personal information protection. And when the information on the chain is harmful, even touching the red line of law, the non-tamper property of the block chain should not become a refuge umbrella and a arrow-blocking board for an illegal criminal. Thus, legislation states that an efficient editable blockchain protocol must be designed in a controlled manner to address this problem. The information in the blockchain application project must be controllably editable under a supervisory authority to prevent sensitive and harmful information from being uploaded into the blockchain. Under appropriate conditions, individuals are entitled to delete their personal private data, preventing such information from adversely affecting the development of society and individuals.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the technical problems in the prior art, the invention provides an editable block chain system which can meet the requirements on the safety of data storage and the requirement on data modification under specific conditions.
In order to solve the technical problems, the technical scheme provided by the invention is as follows: an editable blockchain system comprises a first chain and a second chain;
the first chain and the second chain are connected by a common node;
the first chain is provided with an editing control intelligent contract;
the common node has trapdoor fragments which are used for synthesizing trapdoors;
the common node is used for initiating an editing behavior, synthesizing the trapdoors according to trapdoor fragmentation, verifying the trapdoors through the editing control intelligent contract, calculating a hash collision value according to original content, an original random number and target content after the verification is passed, and issuing the target content and the hash collision value to a second chain;
and the node in the second chain verifies the target content and the hash collision value, and if the verification is passed, the target content is replaced by the original content.
Further, the number of the common nodes is multiple, and each common node has a different trapdoor fragment.
Further, the step of synthesizing the trapdoor by the common nodes according to the trapdoor fragments comprises the following steps: and the common node broadcasts the trapdoor fragments owned by the common node, acquires the trapdoor fragments broadcasted by other common nodes, and synthesizes the trapdoors according to all the trapdoor fragments.
Further, the verifying the trapdoor by the edit control smart contract comprises: and the editing control intelligent contract acquires the trap door homomorphic value calculated by the common node, verifies whether the homomorphic value of the trap door is consistent with homomorphic-chameleon functions of the trap door fragments or not, and if so, verifies that the trap door of the common node passes the verification.
Further, the verifying the trapdoor by the editing control intelligent contract in a voting mode specifically comprises the following steps: and if the proportion of the number of the common nodes of which the trapdoors pass the verification in all the common nodes reaches a preset proportion, the verification is passed.
Further, the common node is further configured to calculate a hash value of the target content and publish the hash value to the first chain;
the first chain is further configured to store a hash value of the target content.
Further, the common node is a dynamic update node and has a dynamically updated trapdoor fragment.
Further, the first chain is a non-editable chain.
Compared with the prior art, the invention has the advantages that:
1. the editable block chain has the advantages of decentralized block chain, distributed accounting, openness, difficulty in data tampering and the like, and can provide data modification permission after a specific verification process is carried out under the condition of meeting specific conditions, so that the block chain can meet the requirement of law on deletion permission, and the requirement of a user on data modification under specific conditions is met.
2. The editable block chain system adopts the dynamically updated common node and the dynamically updated trap door fragment, so that the safety of the editable block chain system can be better ensured, and the editing authority of the editable block chain system is effectively prevented from being illegally utilized.
3. In the editable block chain system, the first chain stores and manages the editing control intelligent contract and is an uneditable chain, so that the safety of the editing control intelligent contract can be effectively ensured and cannot be tampered, and the safety of the editable block chain system can be better improved.
4. In the editable block chain system, the data content submitted to the block chain by the user is stored in the second chain, and the first chain only stores the hash value of the data content, so that the requirement of the block chain on the storage space can be reduced, and the efficiency of inquiring and managing the data content stored in the block chain can be ensured.
Drawings
Fig. 1 is a schematic diagram of an editable block chain structure according to an embodiment of the invention.
Fig. 2 is a schematic flow chart of verifying a trapdoor by a single common node according to an embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the drawings and specific preferred embodiments of the description, without thereby limiting the scope of protection of the invention.
The editable blockchain system of the embodiment, as shown in fig. 1, includes a first chain and a second chain; the first chain and the second chain are connected by a common node; the first chain is provided with an intelligent contract for editing control; the common node is provided with trap door fragments which are used for synthesizing the trap door; the common node is used for initiating an editing behavior, synthesizing the trapdoors according to the trapdoor fragments, verifying the trapdoors through an editing control intelligent contract, calculating a hash collision value according to original content, an original random number and target content after the verification is passed, and issuing the target content and the hash collision value to a second chain; and verifying the target content and the hash collision value by the node in the second chain, and replacing the original content with the target content if the verification is passed. The common node is multiple, and each common node is provided with a different trapdoor fragment. As shown in fig. 1, the first chain is composed of L nodes, including: p11, P12, \ 8230; \ 8230;, P1L. The second chain consists of K nodes, including P21, P22, \8230;, P2K. The first chain and the second chain are connected through a common node, namely the common node has the access rights of the first chain and the second chain at the same time, and the common node comprises G1, 8230 \ 8230;, gi, 8230; \8230;. It should be noted that the number of nodes in the first chain, the number of nodes in the second chain, and the number of common nodes are not fixed.
In this embodiment, the common node is used to manage trapdoor shards x i . Trapdoor slices are used to synthesize trapdoors. In order to ensure the security of the blockchain system, it is preferable in this embodiment that each common node has and only manages one trapdoor fragment x i . Of course, the same common node may also manage more than one trapdoor fragment, but this may reduce the security performance of the blockchain system. In this embodiment, a chameleon trapdoor is adopted, and the trapdoor is partitioned into x pieces i The trap door x is synthesized according to the formula (1):
x=x 1 ·x 2 ···x n (1)
in this embodiment, a trapdoor public key h can also be generated through the trapdoor fragmentation, and the manner of generating the trapdoor public key h is as shown in formula (2):
Figure GDA0004067716810000031
in the formula (2), g is a cardinal number of a chameleon hash function preset in the blockchain, q is a preset blockchain parameter, q and another preset blockchain parameter p in the blockchain are two prime numbers which are relatively prime, p and q preferably satisfy p = kq +1, k is an arbitrary integer, and n is the number of trap door fragments.
In this embodiment, to ensure that the trapdoor is sliced x i Without exposure, it is preferable to generate the trapdoor public key fragments h in sequence i The strategy for generating the trapdoor public key h through the public key fragmentation specifically comprises the following steps: the first common node divides the pieces x according to the trapdoors owned by the first common node 1 Generating a first trapdoor public key fragment h 1 And the first trapdoor public key fragment h is issued by editing and controlling an intelligent contract 1 Generating a first trapdoor public key fragment h 1 The specific mode of (3) is preferably as shown in the following formula: h is 1 =g x1 modq; the second common node obtains a first trapdoor public key fragment h issued by the first common node 1 Then combining the trap door fragment x owned by the user 2 Generating a second trapdoor public key fragment h 2 Generating a second trapdoor public key fragment h 2 The specific mode of (3) is preferably as shown in the following formula:
Figure GDA0004067716810000042
and so on, the ith common node fragments h according to the (i-1) th trapdoor public key i-1 Generating the ith trapdoor public key fragment h i Until a completed trapdoor public key is generated, as in
Figure GDA0004067716810000043
Shown, x = x 1 ·x 2 ···x n The definition of each parameter is the same as above. According to the difficult-to-solve nature of the discrete logarithm problem, after any node obtains the trapdoor public key h and the parameters g, p and q of the block chain, the trapdoor fragment x cannot be obtained through calculation i And trapdoor x, whereby the confidentiality of the blockchain key can be guaranteed.
In this embodiment, when a user in the editable blockchain system needs to store a data content m (when the data content needs to be modified, the data content is an original content) into a blockchain, the user submits the data content m and a generated random number r to the blockchain system, and nodes in the blockchain system perform hash value calculation to obtain a hash value H of a block, where H = F (g, H, m, r) = g m ·h r modp, formulaWhere F (g, h, m, r) is a hash function, the definition of each parameter is the same as above. And after the hash value passes the verification, storing the data content into the block. At this time, under the condition that any node does not know the trapdoor x, it is impossible to determine the target content m 'and the random number r' corresponding to the target content m ', so that the hash value of the target content m' is equal to the hash value of the original content, that is, the equation F (g, h, m ', r') = F (g, h, m, r) is not satisfied, that is, the data content cannot be modified.
In this embodiment, as shown in fig. 2, when a certain data content m in a block chain needs to be modified into a target content m', an editing behavior is initiated, and a common node broadcasts a trapdoor fragment x owned by the common node through a network i Meanwhile, the trapdoor fragment x 'broadcasted by other common nodes is also acquired through the network' j Common node as receiver cannot determine trapdoor fragment x 'received by common node' j Is true, therefore, the trapdoor fragment received by the common node is marked as x' j That is, for a common node i, its own trapdoor slice is x i And the trapdoor fragment broadcast by the common node i and received by other common nodes through the network is marked as x i '. When the common node receives the trapdoor fragments acquired to other common nodes through the network, the trapdoor x ' can be synthesized through a formula shown in formula (1), and the trapdoor fragments x ' provided by other common nodes cannot be determined at this time ' j If the common node is correct, the trapdoor synthesized by the common node is marked as x', and meanwhile, the common node can also calculate to obtain a trapdoor homomorphism value
Figure GDA0004067716810000041
The trap door homomorphic value is the sum of the trap door fragments.
In this embodiment, the verifying the trapdoor by the editing control intelligent contract comprises: and the editing control intelligent contract acquires a trap door homomorphic value calculated by the common node, verifies whether the homomorphic value of the trap door is consistent with homomorphic-chameleon functions of all the trap door fragments or not, and if the homomorphic value of the trap door is consistent with the homomorphic-chameleon functions of all the trap door fragments, the trap door of the common node passes the verification. Since the common node cannot be determined to be obtained through the networkTaken trapdoor fragment x 'broadcast by other common nodes' j Whether the trap door x 'is correct or not cannot be determined, and the synthesized trap door x' needs to be verified, wherein the verification process comprises the following steps: common node homomorphic value of trap door
Figure GDA0004067716810000051
Submitting to an editing control intelligent contract, and after the editing control intelligent contract receives the trapdoor homomorphic value, verifying through a formula shown in a formula (3):
Figure GDA0004067716810000052
in the formula (3), f (·) is a homomorphic-chameleon function, f (x) = g x modq, the remaining parameters are as defined above. And when the formula (3) is satisfied, judging that the trapdoor synthesized by the common nodes submitting the trapdoor homomorphic value is verified.
In this embodiment, in order to further ensure the safety of the editable area chain in the editing process, preferably, verifying the trapdoor by using a voting method specifically includes: and if the ratio of the number of the common nodes of which the trapdoor passes the verification to all the common nodes reaches a preset ratio, the verification is passed. Setting a total of n common nodes, wherein each common node calculates the trap door homomorphic value
Figure GDA0004067716810000053
Submitting to an editing control intelligent contract for verification, wherein the number of the verified common nodes is s, and when the number is greater than or equal to s>
Figure GDA0004067716810000054
When the value of the data reaches the preset proportion, the modification behavior of the editable block chain system is judged to pass the trapdoor verification, the modification of the data content is legal, otherwise, the data content is not verified, the modification of the data content is illegal, and the modification operation is not continued. In the present embodiment, the predetermined ratio is preferably 50% or more.
In this embodiment, after passing the verification of the trapdoor, the common node initiating the modification calculates a hash collision value r 'according to the original content m, the original random number r, and the target content m', and issues the target content m 'and the hash collision value r' to the second chain. The way of calculating the hash collision value r' is shown in equations (4) and (5):
H=g m ·h r =g m′ ·h r′ modp (4)
from equation (4), the hash collision value expression shown in equation (5) can be obtained:
r′=F′(m,m′,r)=(m-m′+xr)x -1 modq (5)
in the formulae (4) and (5), the parameters are as defined above.
In this embodiment, after the common node calculates the hash collision value r ' of the target content m ', the target content m ' and the hash collision value r ' are published on the second chain, and after the node on the second chain receives the target content m ' and the hash collision value r ', the target content m ' and the hash collision value r ' can be verified, and after the verification is passed, the original content m is modified into the target content m ', and the modification of the original content m is completed.
To save storage space of the blockchain, the present embodiment publishes only the target content m 'and the hash collision value r' on the second chain. Further, in order to optimize the query and management efficiency of the block chain, the common node also calculates a hash value of the target content m' and issues the hash value to the first chain; the nodes in the first chain store hash values of the target content m'.
In this embodiment, in order to improve the security of the editable blockchain system, the common node is a dynamic update node having a dynamically updated trapdoor partition. That is, the number of common nodes is not fixed, and can be increased or decreased according to the operation requirement of the block chain system, and when the common nodes are changed, the common nodes regenerate the trapdoor fragments x i . Further preferably, after the data content is modified once, the common node also regenerates the trapdoor fragment x i . When the trapdoor divides into pieces x i After regeneration, the trapdoor public keySegment h i And the trapdoor public key h will be updated accordingly.
It is further preferred in this embodiment that the first chain is a non-editable chain. Therefore, the editing control intelligent contract managed by the first chain can be guaranteed not to be tampered, and the safety and reliability of the system are guaranteed. It should be noted that the editing control intelligent contract in this embodiment is only naming of the intelligent contract, and data exchange performed by editing control intelligent contracts can ensure data security and cannot be illegally tampered, and in actual engineering applications, the editing control intelligent contract may be a set of intelligent contracts, and different intelligent contracts in the set may perform different specific functions, such as identity verification intelligent contracts for identity verification, key management intelligent contracts for key management, and the like, and the protection range of the present invention is not limited by different naming of the intelligent contracts.
The foregoing is considered as illustrative of the preferred embodiments of the invention and is not to be construed as limiting the invention in any way. Although the present invention has been described with reference to the preferred embodiments, it is not intended to be limited thereto. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical essence of the present invention shall fall within the protection scope of the technical solution of the present invention, unless the technical essence of the present invention departs from the content of the technical solution of the present invention.

Claims (4)

1. An editable blockchain system, comprising: comprises a first chain and a second chain;
the first chain and the second chain are connected by a common node;
the first chain is provided with an intelligent contract for editing control;
the common node is provided with trapdoor fragments, and the trapdoor fragments are used for synthesizing trapdoors;
the common node is used for initiating an editing behavior, synthesizing the trapdoors according to trapdoor fragmentation, verifying the trapdoors through the editing control intelligent contract, calculating a hash collision value according to original content, an original random number and target content after the verification is passed, and issuing the target content and the hash collision value to a second chain;
the node in the second chain verifies the target content and the hash collision value, and if the verification is passed, the original content is replaced by the target content;
the number of the common nodes is multiple, and each common node is provided with a different trapdoor fragment;
the common node synthesizes the trapdoor according to the trapdoor fragments and comprises the following steps: the common node broadcasts the trapdoor fragments owned by the common node, acquires the trapdoor fragments broadcasted by other common nodes, and synthesizes the trapdoors according to all the trapdoor fragments;
the verifying the trapdoor by the editing control intelligent contract comprises the following steps: the editing control intelligent contract obtains a trap door homomorphic value calculated by the common node, verifies whether the homomorphic value of the trap door is consistent with homomorphic-chameleon functions of the trap door fragments or not, and if the homomorphic value of the trap door is consistent with the homomorphic-chameleon functions of the trap door fragments, the trap door of the common node passes verification;
the editing control intelligent contract verifies the trapdoor in a voting mode, and specifically comprises the following steps: and if the proportion of the number of the common nodes of which the trapdoors pass the verification in all the common nodes reaches a preset proportion, the verification is passed.
2. The editable blockchain system of claim 1, wherein: the common node is also used for calculating a hash value of the target content and issuing the hash value to the first chain;
the first chain is further configured to store a hash value of the target content.
3. The editable blockchain system of claim 1 or 2, wherein: the common node is a dynamic update node and is provided with a dynamically updated trapdoor fragment.
4. The editable blockchain system of claim 1 or 2, wherein: the first chain is a non-editable chain.
CN202010236720.3A 2020-03-30 2020-03-30 Editable block chain system Active CN111460497B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010236720.3A CN111460497B (en) 2020-03-30 2020-03-30 Editable block chain system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010236720.3A CN111460497B (en) 2020-03-30 2020-03-30 Editable block chain system

Publications (2)

Publication Number Publication Date
CN111460497A CN111460497A (en) 2020-07-28
CN111460497B true CN111460497B (en) 2023-04-07

Family

ID=71683389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010236720.3A Active CN111460497B (en) 2020-03-30 2020-03-30 Editable block chain system

Country Status (1)

Country Link
CN (1) CN111460497B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187455B (en) * 2020-09-24 2023-04-18 西南交通大学 Method for constructing distributed public key infrastructure based on editable block chain
CN112437069A (en) * 2020-10-23 2021-03-02 湖南天河国云科技有限公司 Block chain editing method based on distributed key management
CN112380584B (en) * 2021-01-13 2021-04-16 北京笔新互联网科技有限公司 Block chain data updating method and device, electronic equipment and storage medium
CN115374450A (en) * 2021-05-18 2022-11-22 华为技术有限公司 Method and apparatus for editing blockchains
CN113536389B (en) * 2021-06-15 2022-05-20 复旦大学 Fine-grained controllable decentralized editable block chain construction method and system
CN113393241A (en) * 2021-06-18 2021-09-14 中国工商银行股份有限公司 Editing method and device of block chain account book data
CN113438073B (en) * 2021-06-24 2023-05-09 福建师范大学 Block chain compiling and correcting method based on period and supporting appointed modification times
CN113973003A (en) * 2021-06-30 2022-01-25 江苏腾武信息技术有限公司 Verification method of cloud cluster scheduling storage information based on block chain
CN113822680B (en) * 2021-08-31 2023-04-25 北京市农林科学院信息技术研究中心 Editable blockchain tracing method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583885A (en) * 2017-09-01 2019-04-05 埃森哲环球解决方案有限公司 Bout controls rewritable block chain
CN110061850A (en) * 2019-04-24 2019-07-26 电子科技大学 The collision calculation method and editable block chain building method of chameleon hash function
CN110457297A (en) * 2019-07-10 2019-11-15 北京航空航天大学 Editable block catenary system and method based on more authorization center encryption attributes

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583885A (en) * 2017-09-01 2019-04-05 埃森哲环球解决方案有限公司 Bout controls rewritable block chain
CN110061850A (en) * 2019-04-24 2019-07-26 电子科技大学 The collision calculation method and editable block chain building method of chameleon hash function
CN110457297A (en) * 2019-07-10 2019-11-15 北京航空航天大学 Editable block catenary system and method based on more authorization center encryption attributes

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Alexander Marsalek etal.《A correctable public blockchain》.《IEEE》.2019,全文. *
任艳丽 ; 徐丹婷 ; 张新鹏 ; 谷大武 ; .基于门限环签名的可删除区块链.通信学报.2019,(04),全文. *
李佩丽 ; 徐海霞 ; 马添军 ; 穆永恒 ; .可更改区块链技术研究.密码学报.2018,(05),全文. *

Also Published As

Publication number Publication date
CN111460497A (en) 2020-07-28

Similar Documents

Publication Publication Date Title
CN111460497B (en) Editable block chain system
CN109040012B (en) Block chain-based data security protection and sharing method and system and application
CN109583885A (en) Bout controls rewritable block chain
CN110546664A (en) Secure transfer between block chains
Wang et al. Blockchain-based data storage mechanism for industrial internet of things
CN111639935A (en) Account book modification method applicable to editable block chain
Srinivasan et al. Hyperproofs: Aggregating and maintaining proofs in vector commitments
CN109743182B (en) Intelligent contract approval method and system based on block chain
CN114139203B (en) Block chain-based heterogeneous identity alliance risk assessment system and method and terminal
CN110933093A (en) Block chain data sharing platform and method based on differential privacy protection technology
CN109428892A (en) Multistage rewritable block chain
Cai et al. Privacy-protected deletable blockchain
CN114915404A (en) Block chain data storage extension model construction method for Internet of things
CN111683058A (en) Data storage system based on block chain and storage method thereof
CN113626875A (en) Knowledge graph file storage method for block chain fragment enabling
Kim et al. A study on an energy-effective and secure consensus algorithm for private blockchain systems (PoM: Proof of Majority)
CN111368311A (en) Block chain-based point management method and related device
CN109120609B (en) Social information reporting method and device based on block chain
CN114528565A (en) Efficient sensitive data uplink algorithm based on block chain
CN112039837B (en) Electronic evidence preservation method based on block chain and secret sharing
CN113407977A (en) Cross-chain extension method and system based on aggregated signature
CN116938521A (en) Distributed digital identity trusted authentication method based on hierarchical storage
CN113591161B (en) Alliance chain management method, device, equipment and storage medium
CN112887078B (en) Method and device for editing blocks in block chain
CN115459901A (en) Building Internet of things data management method based on block chain multi-chain and attribute encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant