CN112789824B - Block chain system, information transmission method, system, device and computer medium - Google Patents

Block chain system, information transmission method, system, device and computer medium Download PDF

Info

Publication number
CN112789824B
CN112789824B CN201980059452.8A CN201980059452A CN112789824B CN 112789824 B CN112789824 B CN 112789824B CN 201980059452 A CN201980059452 A CN 201980059452A CN 112789824 B CN112789824 B CN 112789824B
Authority
CN
China
Prior art keywords
value
target
sub
block chain
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201980059452.8A
Other languages
Chinese (zh)
Other versions
CN112789824A (en
Inventor
李武璐
张骁
辛佳骏
陈磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Onething Technology Co Ltd
Original Assignee
Shenzhen Onething Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Onething Technology Co Ltd filed Critical Shenzhen Onething Technology Co Ltd
Publication of CN112789824A publication Critical patent/CN112789824A/en
Application granted granted Critical
Publication of CN112789824B publication Critical patent/CN112789824B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Abstract

The application discloses a block chain system, an information transmission method, a system, a device and a computer storage medium, which are applied to a target block chain node, wherein the method comprises the following steps: acquiring a predetermined discrete password group generating element and an encryption group element, wherein the encryption group element comprises a password group element obtained by operating a first random number and the discrete password group generating element based on a preset format, and the first random number is a trap door generated and stored by a supervision node; according to a preset format, processing private data of the monitoring node based on the discrete cipher group generating element and the cipher group element, and issuing a corresponding processing result to the block chain, so that the monitoring node can monitor the target block chain node and/or the private data based on the processing result and the first random number. In the application, the supervision node carries out identity supervision and privacy data supervision on the target block chain node through the discrete password group generating element, the encryption group element and the first random number.

Description

Block chain system, information transmission method, system, device and computer medium
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a block chain system, an information transmission method, a system, an apparatus, and a computer medium.
Background
With the development of communication technology, users have higher requirements on information security and transmission, and under such an environment, the blockchain receives attention from the users by virtue of the advantages of decentralization, non-tampering and traceability. A Blockchain (Blockchain) is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, the Blockchain is essentially a decentralized database and is a series of data blocks which are associated and generated by using a cryptography method, and each data block contains information of a batch of network transactions and is used for verifying the validity (anti-counterfeiting) of the information and generating a next block. However, in the application process of the block chain, in order to better hide the private information block chain system of the user, with the help of the block chain system, other users cannot know specific user information, and the manageability of the private information protection block chain system is reduced.
In summary, how to improve the manageability of the privacy protection blockchain system is an urgent problem to be solved.
Disclosure of Invention
The present application mainly aims to provide a blockchain system, an information transmission method, a system, an apparatus, and a computer readable storage medium, which are used to solve the technical problem of improving the manageability of the blockchain system.
In order to achieve the above object, the present application provides a method for transmitting blockchain information, which is applied to a target blockchain node in a blockchain system, where the blockchain system further includes a supervision node, and the method includes:
acquiring a predetermined discrete password group generating element and an encryption group element, wherein the encryption group element comprises a password group element obtained by operating a first random number and the discrete password group generating element based on a preset format, and the first random number is a trap door generated and stored by the supervision node;
according to the preset format, processing private data of the supervision node on the basis of the discrete cipher group generating element and the cipher group element, and issuing a corresponding processing result to the block chain, so that the supervision node can supervise the target block chain node and/or the private data on the basis of the processing result and the first random number.
Preferably, the discrete cipher group generator includes an elliptic curve group generator, and the encryption group element includes an elliptic curve group element;
according to the preset format, processing private data of the supervision node based on the discrete cipher group generating element and the cipher group element, and issuing a corresponding processing result to the block chain, so that the supervision node can supervise the target block chain node and/or the private data based on the processing result and the first random number, and the method comprises the following steps:
generating a primary signature private key, and generating and publishing a primary signature public key based on the elliptic curve group elements and the primary signature private key according to the preset format;
and calculating the elliptic curve group generating element and the primary signature private key according to the preset format to obtain identity verification information, and issuing the identity verification information to the block chain so that the supervision node can determine a sender of target data based on the first random number, the identity verification information and the primary signature public key.
Preferably, the block chain system further includes a verification block chain node, and after generating and publishing a primary signature public key based on the elliptic curve group element and the primary signature private key according to the preset format, the method further includes:
generating a ring signature private key, and generating a traceable linkable public key for tracing a linkable ring signature based on the elliptic curve group generator, the elliptic curve group element, the ring signature private key and the primary signature private key;
acquiring target data, and performing traceable linkable ring signature on the target data based on the traceable linkable public key, the elliptic curve group generator, the elliptic curve group element, the ring signature private key, the primary signature private key and the primary signature public key to obtain a traceable linkable ring signature result of the target data;
issuing the traceable linkable loop signature result to the verification blockchain node to enable the verification blockchain node to verify the traceable linkable loop signature result.
Preferably, the generating a traceable and linkable public key traceable and linkable based on the elliptic curve group generator, the elliptic curve group element, the ring signature private key, and the primary signature private key includes:
generating the traceable linkable public key for traceable linkable ring signature based on the elliptic curve group generator, the elliptic curve group element, the ring signature private key and the primary signature private key by a first operation formula;
the first operation formula includes:
Figure GDA0003707451300000031
wherein i represents a reference number of the target blockchain node; PK i The traceable linkable public key representing a traceable linkable loop signature by the target blockchain node; g represents the elliptic curve group generator;
Figure GDA0003707451300000032
representing the last generated UPK; h represents the elliptic curve group element; x is a radical of a fluorine atom i The ring signature private key representing the target blockchain node; a is i The primary signature private key representing the target blockchain node;
Figure GDA0003707451300000033
a zero knowledge proof result representing the legitimacy of the traceable linkable public key.
Preferably, the performing traceable linkable loop signature on the target data based on the traceable linkable public key, the elliptic curve group generator, the elliptic curve group element, the loop signature private key, the primary signature private key and the primary signature public key to obtain a traceable linkable loop signature result of the data includes:
selecting a preset number of other block chain nodes, and generating a ring signature public key based on the public keys of the other block chain nodes and the public key of the target block chain node through a second operation formula, wherein the preset number is n-1, and n is an integer greater than or equal to 2;
performing ring signature on the target data based on the ring signature public key and the ring signature private key through a third operation formula to obtain a common ring signature result;
performing primary signature on the common ring signature result based on the primary signature private key, the ring signature public key and the primary signature public key through a fourth operation formula to obtain a primary signature result;
taking the ring signature public key, the target data, the common ring signature result and the primary signature result as the traceable linkable ring signature result;
the second operation formula includes:
Figure GDA0003707451300000034
the third operation formula includes:
A=SIG(x i ,L,m);
the fourth operational formula includes:
Figure GDA0003707451300000035
wherein L represents the ring signature public key; j is more than or equal to 1 and less than or equal to n-1, and when j is not equal to i, x j Ring signature private key, a, representing the other blockchain node j A primary signature private key representing the other blockchain node; a represents the result of the ordinary ring signature; SIG represents a ring signature algorithm; m represents the target data; sigma represents the primary signature result; OSIG stands for Primary signature Algorithm; OPK denotes the one-time signature public key.
Preferably, the discrete cipher group generator includes an elliptic curve group generator, and the encryption group element includes an elliptic curve group element;
according to the preset format, processing private data of the supervision node based on the discrete cipher group generating element and the cipher group element, and issuing a corresponding processing result to the block chain, so that the supervision node can supervise the target block chain node and/or the private data based on the processing result and the first random number, and the method comprises the following steps:
acquiring a target numerical value and generating a second random number;
calculating the target numerical value based on the elliptic curve group generating element, the elliptic curve group element and the second random number to obtain a commitment value;
splitting the target numerical value into sub-target numerical values according to a preset splitting format, and splitting the second random number into sub-second random numbers corresponding to the sub-target numerical values;
calculating a first commitment value and a second commitment value of each sub-scalar value and the corresponding sub-second random number based on the elliptic curve group generator and the elliptic curve group element, and publishing the first commitment value;
and calculating and publishing a value verification result of each sub-target value and the corresponding sub-second random number based on the elliptic curve group elements, so that the supervision node can determine the target value based on the first commitment value, the value verification result and the first random number.
Preferably, after the calculating and publishing the value verification result of each sub-target value and the corresponding sub-second random number based on the elliptic curve group element, the method further includes:
calculating a sub public key of each sub-nominal value based on the first commitment value, the second commitment value and the value verification result of each sub-nominal value;
calculating a sub-ring signature result of each sub-target value based on the commitment value, the sub-public key of each sub-target value and the sub-second random number;
taking the commitment value and all the sub-ring signature results as a value traceable interval certification result of the target value;
and issuing the value traceable interval certification result to a verification block chain node so that the verification block chain node can verify the value traceable interval certification result and the value verification result and link the value traceable interval certification result after the verification is passed.
Preferably, the operating the target value based on the elliptic curve group generator, the elliptic curve group element, and the second random number to obtain a commitment value includes:
calculating the target numerical value based on the elliptic curve group generating element, the elliptic curve group element and the second random number through a commitment value calculation formula to obtain a commitment value;
the commitment value operation formula comprises:
c=g y h b
wherein c represents the commitment value; y represents the second random number; b represents the target value.
Preferably, the splitting the target value into sub-target values and the splitting the second random number into sub-second random numbers corresponding to the sub-target values according to a preset splitting format includes:
splitting the target numerical value into the sub-target numerical values through a first splitting formula;
splitting the second random number into the sub second random numbers corresponding to the sub-target values through a second splitting formula;
the first split formula includes:
b=b 0 +…+2 i b i +…+2 v-1 b v-1
the second split formula includes:
y 0 +…+y i +…+y v-1 =y;
wherein, b i Representing the ith sub-goal value, v representing the total number of sub-goal values, b i Has a value of 0 or 1; y is i Represents the sub-second random number corresponding to the ith sub-scalar value.
Preferably, the calculating a first commitment value and a second commitment value of each of the sub-scalar values and the corresponding sub-second random numbers based on the elliptic curve group generator and the elliptic curve group element includes:
calculating the first commitment value and the second commitment value of each sub-target value and the corresponding sub-second random number based on the elliptic curve group generator and the elliptic curve group element through a fifth operation formula;
the fifth operation formula includes:
Figure GDA0003707451300000051
wherein, c i Representing the ith said first commitment value; c' i Representing the ith said second commitment value;
the calculating and publishing the value verification result of each sub-target value and the corresponding sub-second random number based on the elliptic curve group elements comprises:
calculating and publishing the value verification result of each sub-target value and the corresponding sub-second random number based on the elliptic curve group elements through a sixth operation formula;
the sixth operational formula includes:
Figure GDA0003707451300000061
wherein, TK' i Representing the ith said numerical verification result;
the calculating a sub public key of each sub-scalar value based on the first commitment value, the second commitment value and the value verification result of each sub-scalar value comprises:
calculating the sub public key of each sub-nominal value based on the first commitment value, the second commitment value and the value verification result of each sub-nominal value through a seventh operation formula;
the seventh operational formula includes:
PK' i =(c i ,c' i ,TK' i ,π(c i ,c' i ,TK' i ) ); wherein, PK' i Representing the ith said child public key; pi (c) i ,c' i ,TK' i ) Represents TK' i Zero knowledge proof of legitimacy;
the calculating a sub-ring signature result of each sub-target value based on the commitment value, the sub-public key of each sub-target value and the sub-second random number comprises:
calculating the sub-ring signature result of each sub-target value based on the commitment value, the sub-public key of each sub-target value and the sub-second random number through an eighth operation formula;
the eighth operational formula includes:
σ i =SIG(PK' i ,y i and c); wherein σ i Representing the ith said sub-ring signature result.
Preferably, the preset format comprises alpha β α represents a code group element, and β represents a random number.
The application provides a block chain information transmission method, which is applied to a verification block chain node in a block chain system, wherein the block chain system further comprises a target block chain node, and the method comprises the following steps:
acquiring a primary signature public key published by the target block chain node, and judging whether the primary signature public key exists in the block chain system;
if the primary signature public key exists in the block chain system, outputting abnormal information, and if the primary signature public key does not exist in the block chain system, acquiring a traceable linkable loop signature result of the data issued by the target block chain node;
obtaining and inspecting
Figure GDA0003707451300000062
Whether it is correct; n representsZero knowledge proves that g represents an elliptic curve group generating element;
Figure GDA0003707451300000063
representing the last generated UPK; h represents an elliptic curve group element; x is the number of i A ring signature private key representing the target blockchain node; a is i A primary signature private key representing the target blockchain node;
if it is
Figure GDA0003707451300000064
If the result is correct, checking whether the ring signature public key in the traceable linkable ring signature result is correct;
if the ring signature public key is correct, checking whether a common ring signature result in the traceable linkable ring signature result is correct;
if the common ring signature result is correct, checking whether a primary signature result in the traceable linkable ring signature result is correct;
and if the one-time signature result is correct, checking whether the traceable linkable ring signature result is correct.
Preferably, the method further comprises the following steps:
obtaining a commitment value, a first commitment value, a second commitment value, a numerical verification result and a numerical traceable interval certification result generated by the target block chain node; acquiring elliptic curve group elements;
verifying all π (c) i ,c' i ,TK' i ) Whether all are correct; c. C i Representing the first commitment value; c' i Representing the second commitment value; TK' i Representing the numerical verification result;
if all pi (c) i ,c' i ,TK' i ) If it is correct, all the data are verified
Figure GDA0003707451300000071
Whether all are correct; h represents the elliptic curve group element;
if all
Figure GDA0003707451300000072
If correct, II c is verified i If c is correct, pi represents a summation operation, and c represents the commitment value;
if pi c i If c is correct, verifying the correctness of the result of proving the interval with the traceable value;
if the value traceable interval proof result is correct, the uplink value can pursue the interval proof result.
The application provides a block chain information transmission method, which is applied to a supervision node in a block chain system, wherein the block chain system further comprises a target block chain node, and the method comprises the following steps:
generating a first random number and storing the first random number as a trap door so that the block chain generates element operation on the first random number and the discrete password group based on a preset format to obtain an encryption group element;
publishing the encrypted group elements to enable block chain nodes in a block chain system to generate corresponding primary signature public keys based on the discrete cipher group generator, the encrypted group elements and corresponding primary signature private keys;
acquiring a first series of operation results issued by the block chain nodes in the block chain, wherein the first series of operation results comprise results obtained after the block chain nodes operate the discrete cipher group generating elements and the primary signature private key according to the preset format;
acquiring a target primary signature public key;
according to the preset format, each operation result in the first series of operation results is operated through the first random number to obtain a corresponding first operation value;
determining a block chain link point corresponding to the first operation value equal to the value of the target primary signature public key as a target block chain node;
wherein the preset format comprises alpha β α represents a code group element, and β represents a random number.
Preferably, after publishing the encryption group element, the method further includes:
acquiring a first commitment value and a value verification result which are published by the target block chain node and correspond to a target value;
for each first commitment value, calculating a second operation value corresponding to the first commitment value through the first random number according to the preset format, and judging whether the second operation value is equal to the numerical value verification result, if so, determining that the value of a sub-scalar value corresponding to the first commitment value is 0, and if not, determining that the value of the sub-scalar value of the first commitment value is 1;
and determining the target value based on the sub-target values according to a preset splitting format.
In order to achieve the above object, the present application further provides a blockchain information transmission system applied to a target blockchain node in a blockchain system, where the blockchain system further includes a supervision node, and the system includes:
the monitoring node comprises a first acquisition module, a second acquisition module and a monitoring module, wherein the first acquisition module is used for acquiring a predetermined discrete password group generating element and an encryption group element, the encryption group element comprises a password group element obtained after a first random number and the initial password group are operated based on a preset format, and the first random number is a trap door generated and stored by the monitoring node;
and the first processing module is used for processing private data of the monitoring node based on the discrete cipher group generating element and the encryption group element according to the preset format and issuing a corresponding processing result to the block chain, so that the monitoring node can monitor the target block chain node and/or the private data based on the processing result and the first random number.
To achieve the above object, the present application further provides a device for block chain information transmission, the device includes a memory and a processor, the memory stores a block chain information transmission program executable on the processor, and the block chain information transmission program implements the method as described above when executed by the processor.
To achieve the above object, the present application further provides a computer-readable storage medium having a blockchain information transmission program stored thereon, where the blockchain information transmission program is executable by one or more processors to implement the blockchain information transmission method as described in any one of the above.
In order to achieve the above object, the present application further provides a blockchain system, which includes a general blockchain node and a supervision node;
the normal blockchain link point is used for executing any one of the above-mentioned blockchain information transmission methods applied to the target blockchain node;
the supervising node is configured to perform any one of the above-described methods for transmitting blockchain information applied to the supervising node.
Preferably, the method further comprises verifying a blockchain node;
the verification block link point is used for executing the block chain information transmission method applied to the verification block chain node.
The block chain information transmission method is applied to a target block chain node, and predetermined discrete cipher group generating elements and encryption group elements are obtained, wherein the encryption group elements comprise cipher group elements obtained by operating a first random number and the discrete cipher group generating elements based on a preset format, and the first random number is a trap door generated and stored by a supervision node; according to a preset format, processing private data of the monitoring node based on the discrete cipher group generating element and the cipher group element, and issuing a corresponding processing result to the block chain, so that the monitoring node can monitor the target block chain node and/or the private data based on the processing result and the first random number. According to the method and the device, the target block chain node processes the private data of the target block chain node based on the acquired discrete cipher group generating element and the encryption group element according to the preset format, the encryption processing of the private data of the target block chain node is realized, the safety of the private data of the target block chain node is protected, the corresponding processing result is issued to the block chain, and the encryption group element is the cipher group element obtained after the first random number and the discrete cipher group generating element are operated based on the preset format, so that the format consistency exists between the operation result and the encryption group element, so that the supervision node can supervise the identity and/or the private data of the target block chain node through the discrete cipher group generating element, the encryption group element and the first random number, and the supervision property of supervision of a privacy protection block chain system is improved. The block chain system, the information transmission device and the computer readable storage medium provided by the application also solve the corresponding technical problems.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a blockchain system 10 according to an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart of a first embodiment of the present application;
FIG. 3 is a schematic flow chart of a second embodiment of the present application;
FIG. 4 is a schematic flow chart illustrating identity tracking performed by a supervision node on a target block chain node;
FIG. 5 is a schematic flow chart of a third embodiment of the present application;
fig. 6 is a schematic structural diagram of a block chain information transmission system according to an embodiment of the present application;
fig. 7 is a schematic internal structure diagram of a block chain information transmission device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and claims of this application and in the above-described drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be implemented in other sequences than those illustrated or described herein. Moreover, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention. The application provides a block chain information transmission method.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a block chain system 10 according to an embodiment of the present disclosure. In the present application, the blockchain system 10 includes a supervision node 11, a verification blockchain node 12, and a common blockchain node 13; the number of the supervision node 11, the verification block chain node 12, and the common block chain node 13 may be determined according to actual needs. And the general blockchain node 13 becomes the target blockchain node as described in this application when sending information.
It should be noted that the block chain information transmission method provided by the present application relates to three processes of transmitting information by a target block chain node, verifying the corresponding verification of the block chain node point to the information, and deciding whether to uplink the information, and supervising the uplink information by a supervising node. Next, the block chain information transmission method provided by the present application is described in three aspects of a target block chain node, a verification block chain node, and a supervision node.
First, a block chain information transmission method provided by the present application is described from the perspective of a target block chain node.
The first embodiment:
referring to fig. 2, fig. 2 is a schematic flow chart of the first embodiment of the present application.
In a first embodiment, a method for transmitting blockchain information provided by the present application is applied to a target blockchain node, and may include the following steps:
step S101: the method comprises the steps of obtaining a predetermined discrete cipher group generating element and an encryption group element, wherein the encryption group element comprises a cipher group element obtained after a generated first random number and the discrete cipher group generating element are operated based on a preset format, and the first random number is a trap door generated and stored by a supervision node.
In practical application, the supervisory node may first obtain a predetermined discrete cipher group generating element, then generate a first random number, and finally perform an operation on the first random number and the discrete cipher group generating element according to a preset format to obtain an encryption group element; and then, the monitoring node stores the first random number as a trap door and publishes the encryption group element to the block chain system, so that the block chain link point in the block chain system processes the private data of the monitoring node based on the discrete cipher group generating element and the encryption group element. It should be noted that the discrete cipher group generator may be generated by the supervisory node and passed by the blockchain consensus, or may be generated by other devices and passed by the privacy protection blockchain; the type of the supervision node in the application can be determined according to actual needs, for example, the supervision node can be a bank node in an access blockchain system, a financial management node in the access blockchain system, and the like; the target blockchain node may be any blockchain node in the blockchain system. In addition, the type of the discrete cipher group may be determined according to a specific application scenario, for example, the type of the discrete cipher group may be elliptic curve group, and the like. In addition, the supervisory node may be only responsible for generating the first random number, and the block chain generates the discrete cipher group generator and the cipher group element by using an external security component, for example, the discrete cipher group generator may be an elliptic curve group generator, and the cipher group element may be an elliptic curve group element, which are obtained by processing the first random number and the discrete cipher group generator by the external security component according to a preset format.
Step S102: according to a preset format, processing private data of the monitoring node based on the discrete cipher group generating element and the cipher group element, and issuing a corresponding processing result to the block chain, so that the monitoring node can monitor the private data on the target block chain node and/or the block chain based on the processing result and the first random number.
In practical application, the type of the private data transmitted by the target block chain node may be determined according to actual needs, for example, the type may be data to be transmitted, a numerical value to be transmitted, and the like, and the condition that the target block chain node issues the processing result to the block chain may be determined according to actual needs, for example, the target block chain node may issue the processing result to the block chain when performing a transaction by itself, and the like. The format of the preset format can also be determined according to actual needs, for example, the preset format can include alpha β α represents a cipher group element, i.e., a discrete cipher group generator or cipher group element, and β represents a random number.
The block chain information transmission method is applied to a target block chain node, and a predetermined discrete cipher group generating element and an encryption group element are obtained, wherein the encryption group element comprises a cipher group element obtained after a first random number and the discrete cipher group generating element are operated based on a preset format, and the first random number is a trap door generated and stored by a supervision node; according to a preset format, processing private data of the monitoring node based on the discrete cipher group generating element and the cipher group element, and issuing a corresponding processing result to the block chain, so that the monitoring node can monitor the target block chain node and/or the private data based on the processing result and the first random number. According to the method and the device, the target block chain node processes the private data of the target block chain node based on the acquired discrete cipher group generating element and the acquired encryption group element according to the preset format, the encryption processing of the private data of the target block chain node is realized, the safety of the private data of the target block chain node is protected, and the corresponding operation result is issued to the block chain.
Second embodiment:
referring to fig. 3, fig. 3 is a schematic flow chart of a second embodiment of the present application.
In a second embodiment, a discrete cipher group is taken as an elliptic curve group for illustration, and a block chain information transmission method provided by the present application is applied to a target block chain node, and in order to implement tracking and supervision of a supervision node on an identity of the target block chain node, the following steps may be performed:
step S201: and acquiring elliptic curve group generating elements and elliptic curve group elements published by the supervision node, wherein the elliptic curve group elements comprise curve group elements obtained by the supervision node through operation on the generated first random number and the elliptic curve group generating elements based on a preset format.
In practical application, the supervision node may select an elliptic curve group generating element first, then generate a first random number, and finally operate the first random number and the elliptic curve group generating element according to a preset format to obtain an elliptic curve group element; and then, the supervision node stores the first random number as a trap door and publishes the elliptic curve group generating element and the elliptic curve group element to the block chain system, so that the block chain link point in the block chain system processes the target data based on the elliptic curve group generating element and the elliptic curve group element. It should be noted that the type of the supervision node in the present application may be determined according to actual needs, for example, the supervision node may be a bank node in an access blockchain system, a financial management node in the access blockchain system, or the like; the target blockchain node refers to a blockchain node for transmitting information in the blockchain system.
Step S202: and generating a primary signature private key, and generating and publishing a primary signature public key based on the elliptic curve group elements and the primary signature private key according to a preset format.
In practical application, after obtaining the elliptic curve group generating element and the elliptic curve group element, the target block chain node may generate a primary signature private key, for example, a random number is generated as the primary signature private key, and it should be noted that, while generating the first signature private key, a ring signature private key is also generated, and according to a preset format, the first signature public key is generated and published based on the elliptic curve group element and the primary signature private key, for example, published during signature, and the like, so that the supervision node and other block chain nodes in the block chain system may both obtain the primary signature public key of the target block chain node, and thus, information interaction may be performed with the target block chain node based on the primary signature public key. In the process, the primary signature private key is generated by the target block chain node, so that the primary signature private key only belongs to the target block chain, and the security of the private key of the target block chain is ensured.
Step S203: and operating the elliptic curve group generating element and the primary signature private key according to a preset format to obtain identity verification information, and issuing the identity verification information to a block chain so that the supervision node determines a sender of the target data based on the first random number, the identity verification information and the primary signature public key.
In practical application, after the target block chain node generates and publishes the primary signature public key, the elliptic curve group generating element and the primary signature private key can be operated according to a preset format to obtain identity verification information, and the identity verification information is published to the block chain, so that the supervision node can determine a sender of target data based on the first random number, the identity verification information and the primary signature private key. In the process, the elliptic curve group element is used as a supervision node to carry out the first random number according to a preset formatThe elliptic curve group element and the primary signature private key are operated by the target block chain node according to a preset format, and the identity verification information is a result obtained by the target block chain node operating the elliptic curve group element and the primary signature private key according to the preset format, so that the elliptic curve group element, the primary signature public key and the identity verification information have format uniformity and relevance; then, the supervision node may calculate the authentication information and the first random number according to a preset format to obtain a corresponding calculation result, and the primary signature public key relates to transmission of the target data, so the supervision node may compare the calculation result with a value of the primary signature public key to determine a sender of the target data. Specifically, the predetermined format may include α β α represents an elliptic curve group, i.e., an elliptic curve group generator or an elliptic curve group element, and β represents a random number.
It should be noted that, in the application process of the block chain, in order to ensure the privacy of the target data, when transmitting data, one block chain node cooperates with other block chain nodes, for example, performs a ring signature on the target data with other block chain nodes, thereby making it difficult to determine the sender of the target data, and at this time, the supervisory node needs to identify a certain number of block chain nodes according to the block chain information transmission method provided in the present application to determine the sender of the target data. The Ring signature (Ring signature) related by the application is a special digital signature scheme, a signer uses public keys of the signer and users thereof to generate a public key set, then uses a private key of the signer to sign, and after verifying the validity of the signature, a verifier can only know a certain user of the public key set but cannot know the specific identity of the user, so that the identity privacy protection of the signer is realized.
The block chain information transmission method is applied to a target block chain node, and is used for acquiring a predetermined elliptic curve group generating element and an elliptic curve group element published by a supervision node, wherein the elliptic curve group element comprises a curve group element obtained by the supervision node after the supervision node operates a generated first random number and the elliptic curve group generating element based on a preset format; generating a primary signature private key, and generating and publishing a primary signature public key based on the elliptic curve group elements and the primary signature private key according to a preset format; and calculating the elliptic curve group generator and the primary signature private key according to a preset format to obtain identity verification information, and issuing the identity verification information to a block chain so that the supervision node determines a sender of the target data based on the first random number, the identity verification information and the primary signature public key. The block chain information transmission method includes the steps that a target block chain link point obtains an elliptic curve group generating element selected by a supervision node and an elliptic curve group element generated according to a preset format, and according to the preset format, a primary signature public key is generated based on the elliptic curve group element and the primary signature private key, so that the private key of the target block chain node is completely mastered by the target block chain node, the elliptic curve group generating element and the primary signature private key are operated according to the preset format to obtain authentication information, the authentication information is issued to a block chain, the supervision node can determine a sender of target data based on a first random number, the authentication information and the primary signature public key, and the supervision function of a block chain system is achieved.
In a second embodiment, when data is transmitted, in order to protect the data, the data may be transmitted in a ring signature manner, so after generating and publishing a primary signature public key based on an elliptic curve group element and a primary signature private key according to a preset format, the method may further include:
step S204: generating a ring signature private key;
in practical application, a random number may be generated as the ring signature private key, and certainly, the ring signature private key may also be generated in other manners, such as processing the own identification data information, using the processed identification data information as the ring signature private key, and the like.
Step S205: generating a traceable linkable public key for tracing the linkable ring signature based on the elliptic curve group generating element, the elliptic curve group element, the ring signature private key and the primary signature private key;
step S206: acquiring target data, and performing traceable linkable ring signature on the target data based on a traceable linkable public key, an elliptic curve group generating element, an elliptic curve group element, a ring signature private key, a primary signature private key and a primary signature public key to obtain a traceable linkable ring signature result of the data;
step S207: and issuing the traceable linkable ring signature result to the verification block chain node so that the verification block chain node verifies the traceable linkable ring signature result and links the traceable linkable ring signature result after the verification is passed.
It should be noted that traceable linkable ring signature results also enable hidden protection of target data transmitted by target blockchain nodes; the identity of the target block chain node is hidden, so that other common block chain nodes cannot acquire the identity of the target block chain node; and the supervision node can track and supervise the target block chain node through the traceable linkable ring signature result by means of the one-time signature public key.
In the second embodiment, in order to improve the transmission efficiency of the block chain information transmission method, when the target block chain node generates a traceable and linkable public key based on the elliptic curve group generator, the elliptic curve group element, the ring signature private key and the primary signature private key (S205), it may:
generating a traceable linkable public key for traceable linkable ring signature based on an elliptic curve group generating element, an elliptic curve group element, a ring signature private key and a primary signature private key through a first operation formula;
the first operation formula includes:
Figure GDA0003707451300000161
wherein i represents the target of the target blockchain nodeNumber; PK i The traceable linkable public key represents the traceable linkable public key when the traceable linkable ring signature is carried out on the target block chain node; g represents an elliptic curve group generator;
Figure GDA0003707451300000162
representing the UPK generated last time, i.e. the UTXO public key; h represents an elliptic curve group element; x is the number of i A ring signature private key representing a target block chain node; a is i A primary signature private key representing a target block chain node;
Figure GDA0003707451300000163
a zero knowledge proof result representing the legitimacy of the traceable linkable public key. It should be noted that UTXO refers to digital currency that is validated but not spent on the current blockchain.
As can be seen from the first operation formula, in the process, the elliptic curve group generating element, the elliptic curve group element, the ring signature private key and the primary signature private key are also operated according to the preset format in the process that the target block chain node generates the public key, so that the public key of the target block chain node is unified with the formats of the elliptic curve group element, the authentication information and the like, and the validity of the public key is ensured through zero knowledge certification. In addition, the corresponding description of zero knowledge proof in the present application can refer to the prior art, and is not repeated herein.
In the second embodiment, the process (S206) of the target block chain node performing traceable linkable ring signature on the target data based on the public key, the elliptic curve group generator, the elliptic curve group element, the ring signature private key, the primary signature private key, and the primary signature public key to obtain a traceable linkable ring signature result of the data may specifically be:
selecting a preset number of other block chain nodes, and generating a ring signature public key L based on the public keys of the other block chain nodes and the public key of the target block chain node through a second operation formula;
performing ring signature on the target data based on the ring signature public key and the ring signature private key through a third operation formula to obtain a common ring signature result A;
performing primary signature on the common ring signature result based on the primary signature private key, the ring signature public key and the primary signature public key through a fourth operation formula to obtain a primary signature result sigma;
taking a ring signature public key L, target data m, a common ring signature result A and a primary signature result sigma as traceable linkable ring signature results;
the second operation formula includes:
Figure GDA0003707451300000171
the third operation formula includes:
A=SIG(x i ,L,m);
the fourth operation formula includes:
Figure GDA0003707451300000172
wherein, L represents a ring signature public key; j is more than or equal to 1 and less than or equal to n-1, and x is not equal to i j Ring signature private Key, a, representing other Block chain nodes j A primary signature private key representing other blockchain nodes; a represents the result of the ordinary ring signature; SIG represents a ring signature algorithm; m represents target data; sigma represents a primary signature result; OSIG stands for Primary signature Algorithm; OPK denotes a one-time signature public key.
Note that in this process, the process of generating the public key by other block link nodes is the same as the process of generating the public key by the target block link node in this application, and is not described herein again.
In the second embodiment, the steps to be performed when the target block link point is subjected to data transmission from the perspective of the target block link node are described, in this process, the process of correspondingly verifying the data information transmitted by the target block link point by the verification block link point may be as follows:
acquiring a primary signature public key published by a target block chain node, and judging whether the primary signature public key exists in a block chain system;
if the primary signature public key exists in the block chain system, the double-flower situation of the target block chain is represented, corresponding abnormal information is output, and if the primary signature public key does not exist in the block chain system, a traceable linkable loop signature result of data issued by a target block chain node is obtained;
obtaining and inspecting
Figure GDA0003707451300000173
Whether it is correct; pi represents zero knowledge proof, g represents an elliptic curve group generating element;
Figure GDA0003707451300000174
representing the last generated UPK; h represents an elliptic curve group element; x is the number of i A ring signature private key representing a target block chain node; a is i A primary signature private key representing a target block chain node;
if it is
Figure GDA0003707451300000175
If the result is correct, checking whether the ring signature public key in the linkable ring signature result is correct or not;
if the ring signature public key is correct, checking whether the common ring signature result in the traceable linkable ring signature result is correct;
if the common ring signature result is correct, checking whether a primary signature result in the linkable ring signature result is correct or not;
if the signature result of one time is correct, whether the traceable linkable ring signature result is correct is checked.
It should be noted that, on the basis of no other verification conditions, after a signature result is correct once, the traceable linkable ring signature result can be considered to pass the verification, and when other verification conditions exist, the traceable linkable ring signature result can be continuously verified according to the verification conditions until the verification result is obtained.
It is to be understood that, after verifying that the block chain node is linked with the traceable linkable ring signature result, the supervising node may trace the block chain node, and now, with reference to fig. 4, a process of the supervising node in the second embodiment tracing the target block chain node is described, and the supervising node may perform the following steps in this process:
step S301: and generating a first random number and storing the first random number as a trap door so that the block chain operates the first random number and the elliptic curve group generating element on the basis of a preset format to obtain an elliptic curve group element.
Step S302: and publishing the elliptic curve group elements so that the block link points in the block chain system generate corresponding primary signature public keys based on the elliptic curve group generating elements, the elliptic curve group elements and the corresponding primary signature private keys.
Step S303: and acquiring a first series of operation results of a preset number of block chain links distributed in the block chain, wherein the first series of operation results comprise results obtained after the block chain nodes operate elliptic curve group generating elements and a primary signature private key according to a preset format.
Step S304: acquiring a target primary signature public key; and according to a preset format, calculating each operation result in the first series of operation results through a first random number to obtain a corresponding first operation value.
Step S305: and determining the block link point corresponding to the first operation value equal to the value of the target primary signature public key as a target block link node.
Specifically, the preset format may include α β α represents an elliptic curve group, β represents a random number; using the result of the first series of operations as
Figure GDA0003707451300000181
Target one-time signature public key of
Figure GDA0003707451300000182
Taking the first random number γ as an example, the supervising node passes the calculation and will satisfy
Figure GDA0003707451300000183
The block link point of (a) is determined as the target block link node.
The third embodiment:
referring to fig. 5, fig. 5 is a schematic flow chart of a third embodiment of the present application.
In the third embodiment, in order to implement the tracking and supervision of the supervision node on the value transmitted by the supervision node, after the target block chain node obtains the elliptic curve group generating element g and the elliptic curve group element h published by the supervision node, the following steps may be further performed:
step S401: a target value is obtained, and a second random number is generated.
In practical applications, the target value refers to a value to be transmitted by the target block node, and may be information of the value transmitted by the target block node.
Step S402: and calculating the target numerical value based on the elliptic curve group generating element, the elliptic curve group element and the second random number to obtain a commitment value.
In practical application, after the target block chain node obtains the target numerical value and generates the second random number, the target numerical value may be calculated based on the elliptic curve group generating element, the elliptic curve group element, and the second random number to obtain a corresponding commitment value. In addition, the target block chain node may operate the target numerical value based on the elliptic curve group generating element, the elliptic curve group element, and the second random number according to a preset format.
Step S403: and splitting the target numerical value into sub-target numerical values according to a preset splitting format, and splitting the second random number into sub-second random numbers corresponding to the sub-target numerical values.
In practical applications, because the target value may be split into different values for protection during transmission, for example, in a menuo currency, one value may be split into multiple values for transmission, the target block chain node may split the target value into sub-target values according to a preset splitting format, and split the second random number into sub-second random numbers corresponding to the sub-target values, which is easy to understand and is used to protect the corresponding sub-target values.
Step S404: and calculating a first commitment value and a second commitment value of each sub-target value and the corresponding sub-second random number based on the elliptic curve group generator and the elliptic curve group element, and publishing the first commitment value.
In practical application, when the target block chain node protects the corresponding sub-scalar values based on the sub-second random numbers, the first commitment value and the second commitment value of each sub-scalar value and the corresponding sub-second random number may be calculated based on the elliptic curve group generating element and the elliptic curve group element, and specifically, the first commitment value and the second commitment value of each sub-scalar value and the corresponding sub-second random number may be calculated based on the elliptic curve group generating element and the elliptic curve group element according to a preset format.
Step S405: and calculating and publishing the value verification result of each sub-target value and the corresponding sub-second random number based on the elliptic curve group elements, so that the supervision node determines a target value based on the first commitment value, the value verification result and the first random number.
In practical applications, the first commitment value is a result calculated based on the elliptic curve group generating element, the elliptic curve group element, the sub-target value and the sub-second random number, the value verification result is a result calculated based on the elliptic curve group element, the sub-target value and the sub-second random number, and the elliptic curve group element is associated with the elliptic curve group generating element and the first random number, so that the first commitment value, the value verification result and the first random number are associated with each other, and the target value is composed of the sub-target value, so that the supervisory node can determine the target value based on the first commitment value, the value verification result and the first random number.
The block chain information transmission method is applied to a target block chain node, and is used for acquiring a predetermined elliptic curve group generating element and an elliptic curve group element published by a supervision node, wherein the elliptic curve group element comprises a point obtained by the supervision node after the supervision node operates a generated first random number and the elliptic curve group generating element based on a preset format; acquiring a target numerical value and generating a second random number; calculating the target numerical value based on the elliptic curve group generating element, the encrypted elliptic curve group and the second random number to obtain a commitment value; splitting the target numerical value into sub-target numerical values according to a preset splitting format, and splitting the second random number into sub-second random numbers corresponding to the sub-target numerical values; calculating a first commitment value and a second commitment value of each sub-target value and the corresponding sub-second random number based on the elliptic curve group generating element and the elliptic curve group element, and publishing the first commitment value; and calculating and publishing the value verification result of each sub-target value and the corresponding sub-second random number based on the elliptic curve group elements, so that the supervision node determines a target value based on the first commitment value, the value verification result and the first random number. In the application, the target block chain node can be encrypted and hidden for the target numerical value by means of the elliptic curve group generating element and the elliptic curve group element published by the supervision node, and the specific numerical value of the target numerical value can be determined by the preset block chain node according to the operation process of the target numerical value by the target block chain node and the trap door stored by the preset block chain node, so that the target numerical value can be supervised.
In a third embodiment, in order to ensure safe transmission of a value, a ring signature may be performed on a target value by using a ring signature method, so as to hide a corresponding value, and after the target block chain node calculates and publishes a value verification result of each sub-target value and a corresponding sub-second random number based on the elliptic curve group element, the method may further include:
calculating a sub public key of each sub-standard value based on the first commitment value, the second commitment value and the value verification result of each sub-standard value;
calculating the sub-ring signature result of each sub-standard value based on the commitment value, the sub-public key of each sub-standard value and the sub-second random number;
taking the commitment value and all sub-ring signature results as a value traceable interval certification result of the target value;
and issuing the value traceable interval certification result to the verification block chain node so that the verification block chain node verifies the value traceable interval certification result and the value verification result and links the value traceable interval certification result after the verification is passed.
It should be noted that in the process of calculating the sub-ring signature result of each sub-target value based on the commitment value and the sub-public key and the sub-second random number of each sub-target value, the Borromean scheme can also be used to complete all sub-ring signatures at one time.
In the third embodiment, in order to improve the operation efficiency, the process (S402) of the target block chain node operating the target numerical value based on the elliptic curve group generating element, the elliptic curve group element, and the second random number to obtain the commitment value may specifically be:
calculating the target numerical value based on the elliptic curve group generating element, the elliptic curve group element and the second random number through a commitment value calculation formula to obtain a commitment value;
the commitment value operation formula comprises:
c=g y h b
wherein c represents a commitment value; y represents a second random number; b represents a target value.
In the third embodiment, in order to improve the operation efficiency, the process (S403) of splitting, by the target block chain node, the target value into sub-target values according to a preset splitting format, and splitting the second random number into sub-second random numbers corresponding to the sub-target values may specifically be:
splitting the target numerical value into sub-target numerical values through a first splitting formula;
splitting the second random number into sub second random numbers corresponding to the sub-target values through a second splitting formula;
the first split formula includes:
b=b 0 +…+2 i b i +…+2 v-1 b v-1
the second split formula includes:
y 0 +…+y i +…+y v-1 =y;
wherein, b i Denotes the ith sub-target number, v denotes the total number of sub-target numbers, b i Has a value of 0 or 1; y is i Represents a sub-second random number corresponding to the ith sub-target value, i is more than or equal to 1 and less than or equal to v-1。
In the third embodiment, in order to improve the operation efficiency, the process (S404) of the target block chain node calculating the first commitment value and the second commitment value of each sub-scalar value and the corresponding sub-second random number based on the elliptic curve group generator and the elliptic curve group element may specifically be:
calculating a first commitment value and a second commitment value of each sub-scalar value and the corresponding sub-second random number based on the elliptic curve group generator and the elliptic curve group element through a fifth operation formula;
the fifth operation formula includes:
Figure GDA0003707451300000221
wherein, c i Represents the ith first commitment value; c' i Represents the ith second commitment value;
calculating and publishing a value verification result of each sub-target value and the corresponding sub-second random number based on the elliptic curve group elements (S405), including:
calculating and publishing the numerical value verification result of each sub-target numerical value and the corresponding sub-second random number based on the elliptic curve group elements through a sixth operation formula;
the sixth operational formula includes:
Figure GDA0003707451300000222
wherein, TK' i Representing the ith numerical verification result;
calculating a sub public key of each sub-target value based on the first commitment value, the second commitment value and the value verification result of each sub-target value, wherein the sub public key comprises:
calculating a sub public key of each sub-target value based on the first commitment value, the second commitment value and the value verification result of each sub-target value through a seventh operation formula;
the seventh operational formula includes:
PK' i =(c i ,c' i ,TK' i ,π(c i ,c' i ,TK' i ) ); wherein, PK' i Represents the ith sub-public key; pi (c) i ,c' i ,TK' i ) Represents TK' i Zero knowledge proof of legitimacy;
calculating the sub-ring signature result of each sub-target value based on the commitment value, the sub-public key of each sub-target value and the sub-second random number, wherein the calculation comprises the following steps:
calculating the sub-ring signature result of each sub-standard value based on the commitment value, the sub-public key of each sub-standard value and the sub-second random number through an eighth operation formula;
the eighth operational formula includes:
σ i =SIG(PK' i ,y i and c); wherein σ i Representing the ith sub-ring signature result.
In practical application, in order to improve the operation efficiency, when the sub-ring signature result of each sub-target value is calculated based on the commitment value, the sub-public key of each sub-target value and the sub-second random number through the eighth operation formula, the ring signatures of n rings can be completed simultaneously by using a Borromean signature method.
In the second embodiment, the steps to be executed when the target blockchain node performs value transmission from the perspective of the target blockchain node are described, in this process, the process of correspondingly verifying the value information transmitted by the target blockchain node by the verification blockchain node may be as follows:
obtaining a commitment value, a first commitment value, a second commitment value, a value verification result and a value traceable interval certification result generated by a target block chain node; acquiring elliptic curve group elements;
verifying all π (c) i ,c' i ,TK' i ) Whether all are correct; c. C i Represents a first commitment value; c' i Represents a second commitment value; TK' i Representing a numerical verification result;
if all is pi (c) i ,c' i ,TK' i ) If it is correct, all the data are verified
Figure GDA0003707451300000231
Whether all are correct; h represents an elliptic curve group element;
if all
Figure GDA0003707451300000232
If correct, verify | _ c i If c is correct, II represents summation operation, c represents commitment value;
if u c i If c is correct, verifying the interval in which the value can be tracked to prove the correctness of the result;
if the value traceable interval proves that the result is correct, the uplink value traceable interval proves that the result is correct.
It should be noted that, in this embodiment, the verification block chain node verifies the result of the traceable interval certification of the value, so as to implement the traceable interval certification of the target value; and under the cooperation with target block chain node, supervision node, realized the supervision, the pursuit function to the target numerical value, improved privacy protection block chain system's can supervise nature.
It should be understood that, after the verification block link point links the numerical traceable interval certification result, the supervisory node may track and supervise the numerical values transmitted by the block link point, and now the process of the supervisory node in the second embodiment when tracking and supervising the numerical values transmitted by the target block link node is described, after the supervisory node publishes the elliptic curve group generating element and the elliptic curve group element, the following steps may be performed:
acquiring a first commitment value and a value verification result which are published by a target block chain node and correspond to a target value;
for each first commitment value, calculating a second operation value corresponding to the first commitment value through a first random number according to a preset format, judging whether the second operation value is equal to the value verification result, if so, determining that the value of a sub-target value corresponding to the first commitment value is 0, and if not, determining that the value of the sub-target value of the first commitment value is 1;
and determining a target value based on the sub-target values according to a preset splitting format.
In this process, the process that the supervisory node determines the target value based on the first commitment value, the value verification result, and the first random number is formulated as follows:
for each i, calculate
Figure GDA0003707451300000241
λ represents a first random number, i.e. the trapdoor held by the supervisory node;
for each i, if
Figure GDA0003707451300000242
Then output b i If is 0
Figure GDA0003707451300000243
Then output b i =1;
According to the formula b ═ b 0 +…+2 i b i +…+2 v-1 b v-1 The value of b is calculated.
The block chain information transmission method provided by the present application will now be explained with reference to the UTXO model in the block chain system.
The UTXO model realizes identity hiding through a linkable ring signature technology and numerical value hiding through interval certification, and the application process is as follows:
each UTXO contains the public and private keys (PK, SK) of the currency and the value Commitment (COM), and the owner keeps the public key (SK), Public Key (PK) and value Commitment (COM) of the currency open. Each time the value is transmitted, the user randomly selects other UTXOs in the chain, generates a public key set (L ═ { PK1, PK2, …, PKn }) by combining the UTXOs to be transmitted, generates a new public coin key by using the random number of the user and the private key of the receiver, can calculate the new public coin key only by the receiver, performs ring signature on L together with the new value commitment, the interval certification of the new value commitment and other bill information, and issues the signature to the block chain. The verifier checks whether the pattern is double-pattern (whether one numerical value is transmitted twice), if not, verifies the validity of the interval certificate and the validity of the ring signature, and packs the numerical value transmission process into blocks after all the patterns pass. And the verifier cannot acquire the identity information and numerical value information of both transmission parties. The receiver checks whether the value sent to the receiver exists or not by using the own private key for all the transmission processes of the new blocks on the chain, and if so, calculates the new private key of the UTXO and stores the value into the own value storage address.
In the above process, asymmetric encryption, digital signature, etc. are also involved; wherein, UTXO refers to a value that is confirmed but not transmitted on the current block chain; an Asymmetric encryption algorithm (Asymmetric encryption system) is different from a traditional symmetric encryption algorithm, and is a type of algorithm for ensuring safety based on asymmetry of calculation complexity in encryption and decryption processes; the Digital signature (Digital signature) is a branch of the asymmetric password, a user generates a public and private key, the user keeps the private key, the user uses the private key to sign any message, a verifier can verify the validity of the signature by using the public key, and the Digital signature realizes the authentication of identity and the verification of data integrity; the Linkable ring signature (Linable ring signature) is a special ring signature scheme, a user needs to provide label information during ring signature, and when the user carries out illegal signature (or illegal transmission values such as double flowers) or the like, the user can judge whether the signature is illegal (double flowers) or not by comparing the labels, so that the safe value transmission guarantee is realized; the interval proof (Range proof) is a zero-knowledge proof system that gives that a certain value belongs to a specified interval and does not reveal specific value information.
As can be seen from the using process of the UTXO model, the block link point cannot acquire the transmitted value and cannot determine the sender of a certain value, so that the UTXO model does not have the supervision and tracking functions, but the first embodiment provided by the present application realizes the tracking of the sender and the information linking function, so that the first embodiment of the present application provides a traceable and linkable ring signature scheme; traceable and Linkable ring signature (Traceable ring signature) is also a signature which realizes dual functions of Traceable and Linkable, wherein the Traceable ring signature (Traceable ring signature) can be used for tracing specific signature user identity, and the signature of a supervision function is realized. In addition, the second embodiment provided by the present application implements tracking of a numerical value, and essentially provides a Traceable interval proof (Traceable range proof) which refers to a proof system that gives a certain numerical value belonging to a specified interval, and for a general verification user, the proof satisfies zero knowledge (does not reveal the numerical value), and can solve a specific amount through the proof, thereby implementing the proof of a supervision function.
In practical applications, the process of applying the traceable linkable ring signature and the traceable interval certification provided by the present application to the menuo currency may be as follows:
the block chain system has a center, the center generates system parameters (elliptic curve group generating elements), a Trapdoor (first random number) and a Trapdoor public key MPK (elliptic curve group elements);
for each UTXO, a user generates a private key SK, then adds the private key SK into a public key generation algorithm according to MPK to obtain a public key PK (SK, MPK), and a verifier of the public key can verify whether the public key of the UTXO is generated in a specified mode;
the method comprises the steps that a user carries out numerical value transmission according to a UTXO model, in the transmission process, the user replaces an original interval certificate with a traceable interval certificate of the application in an interval certificate of a logarithmic value, and replaces a linkable ring signature with a traceable linkable ring signature;
in the link of the transmission process of the verification value, the verifier carries out the same verification work as the UTXO model, namely, the correctness of the verification interval certificate, the correctness of the verification ring signature, whether the transmission process of the value can be linked (whether the value is double-flower) or not, and the transmission value is confirmed and the block is discharged after the verification;
the central node (supervisor) on the chain is not responsible for confirming the legality of the transmission value, nor is it responsible for packing the transmission process of the value and the work of block output, only works when needing supervision, the center uses the Trapdoor to track and calculate the interval certification and the ring signature in the transmission process of the value, obtain the specific value information and the identity of the signer, the complete supervision function is realized, but the supervisor does not master the private key of the user, the signature of the user cannot be forged, the value of the user cannot be transferred away, the function of only supervision without interference is realized, and the multi-level supervision function is realized.
As can be seen from the above description, the block chain information transmission method provided by the present application implements tracking of a data sending party and supervision of a numerical value, avoids the disadvantage that a block chain system hides lawless person information due to the fact that the data sending party cannot be tracked and the numerical value cannot be known, and can be applied to specific application scenarios such as crime investigation, data statistics, and the like in a block chain application scenario; in addition, the private key of the user is completely mastered by the user, and anyone including a supervisor cannot forge the signature of the user, so that the transmission value of the user is counterfeited, and the requirement of 'decentralized' of a block chain is reserved to the greatest extent; and the supervisor does not need to be responsible for the verification of the numerical value transmission process, and also does not need to be responsible for the work of packing the numerical value transmission process, discharging blocks and the like, and the work only occurs when the supervision is needed, so that the calculation and communication pressure of the supervisor is effectively reduced, and compared with the prior art that the numerical value transmission needs to pass through the supervisor, the numerical value transmission efficiency of the block chain system is improved.
In another aspect, the present application provides a system for block chain information transmission.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a block chain information transmission system according to an embodiment of the present disclosure.
The block chain information transmission system provided in the embodiment of the present application is applied to a target block chain node, and may include:
a first obtaining module 101, configured to obtain a predetermined discrete cipher group generator and an encryption group element, where the encryption group element includes a cipher group element obtained by operating a first random number and an initial cipher group based on a preset format, and the first random number is a trapdoor generated and stored by a supervisory node;
the first processing module is used for processing the private data of the first processing module based on the discrete cipher group generating element and the cipher group element according to a preset format, and issuing a corresponding processing result to the block chain, so that the supervision node can supervise the target block chain node and/or the private data based on the processing result and the first random number.
For the related description of each module in the block chain information transmission system provided in the embodiment of the present application, please refer to the above embodiment, which is not described herein again.
In another aspect, the present application provides a device for transmitting blockchain information.
Referring to fig. 7, fig. 7 is a schematic diagram of an internal structure of a block chain information transmission device according to an embodiment of the present disclosure.
In this embodiment, the visual area block chain information transmission device 1 may be a PC (Personal Computer), or may also be a smart phone, a tablet Computer, a palmtop Computer, a portable Computer, an intelligent router, a network storage device, or a terminal device.
The blockchain information transmission apparatus 1 may be a node constituting a blockchain network.
The block chain information transmission apparatus 1 may include a memory 11, a processor 12, and a bus 13.
The memory 11 includes at least one type of readable storage medium, and the readable storage medium includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 11 may be an internal storage unit of the blockchain information transmission apparatus 1 in some embodiments, for example, a hard disk of the blockchain information transmission apparatus 1. The memory 11 may also be an external storage device of the blockchain information transmission apparatus 1 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the blockchain information transmission apparatus 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the block chain information transmission apparatus 1. The memory 11 may be used not only to store application software installed in the block chain information transmission device 1 and various types of data, such as the code of the block chain information transmission program 01, but also to temporarily store data that has been output or is to be output.
The processor 12, which may be a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor or other data Processing chip in some embodiments, is used for executing program codes stored in the memory 11 or Processing data, such as executing the block chain information transmission program 01.
The bus 13 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 7, but this is not intended to represent only one bus or type of bus.
Further, the block chain information transmission apparatus may further include a network interface 14, and the network interface 14 may optionally include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used to establish a communication connection between the apparatus 1 and other electronic devices.
Optionally, the block chain information transmission apparatus 1 may further include a user interface, the user interface may include a Display (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may further include a standard wired interface and a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is used to display information processed in the blockchain information transmission apparatus 1 and to display a visual user interface.
Fig. 7 shows only the blockchain information transmission apparatus 1 having the components 11 to 14 and the blockchain information transmission program 01, and it will be understood by those skilled in the art that the structure shown in fig. 7 does not constitute a limitation of the blockchain information transmission apparatus 1, and may include fewer or more components than those shown, or combine some components, or a different arrangement of components.
A computer-readable storage medium is provided, on which a block chain information transmission program is stored, where the block chain information transmission program can be executed by one or more processors to implement the block chain information transmission method described in any of the above embodiments.
Reference herein to a computer-readable storage medium includes Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
In the above embodiments, all or part of the implementation may be realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, herein are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (20)

1. A method for transmitting blockchain information, which is applied to a target blockchain node in a blockchain system, wherein the blockchain system further comprises a supervision node, and the method comprises:
acquiring a predetermined discrete password group generating element and an encryption group element, wherein the encryption group element comprises a password group element obtained by operating a first random number and the discrete password group generating element based on a preset format, and the first random number is a trap door generated and stored by the supervision node;
according to the preset format, processing private data of the supervision node on the basis of the discrete cipher group generating element and the cipher group element, and issuing a corresponding processing result to the block chain, so that the supervision node can supervise the target block chain node and/or the private data on the basis of the processing result and the first random number.
2. The method of claim 1, wherein the discrete cipher group generator comprises an elliptic curve group generator, and wherein the cryptographic group element comprises an elliptic curve group element;
according to the preset format, processing private data of the supervision node based on the discrete cipher group generating element and the cipher group element, and issuing a corresponding processing result to the block chain, so that the supervision node can supervise the target block chain node and/or the private data based on the processing result and the first random number, and the method comprises the following steps:
generating a primary signature private key, and generating and publishing a primary signature public key based on the elliptic curve group elements and the primary signature private key according to the preset format;
and calculating the elliptic curve group generator and the primary signature private key according to the preset format to obtain identity verification information, and issuing the identity verification information to the block chain so that the supervision node can determine a sender of target data based on the first random number, the identity verification information and the primary signature public key.
3. The method according to claim 2, wherein the blockchain system further includes a verification blockchain node, and after generating and publishing a primary signature public key based on the elliptic curve group element and the primary signature private key according to the preset format, the method further includes:
generating a ring signature private key, and generating a traceable linkable public key for traceable linkable ring signatures based on the elliptic curve group generator, the elliptic curve group element, the ring signature private key and the primary signature private key;
acquiring target data, and performing traceable linkable ring signature on the target data based on the traceable linkable public key, the elliptic curve group generator, the elliptic curve group element, the ring signature private key, the primary signature private key and the primary signature public key to obtain a traceable linkable ring signature result of the target data;
issuing the traceable linkable loop signature result to the verification blockchain node to enable the verification blockchain node to verify the traceable linkable loop signature result.
4. The method of claim 3, wherein generating a traceable and linkable public key based on the elliptic curve group generator, the elliptic curve group element, the ring signature private key and the primary signature private key comprises:
generating the traceable linkable public key for traceable linkable ring signature based on the elliptic curve group generator, the elliptic curve group element, the ring signature private key and the primary signature private key through a first operation formula;
the first operational formula includes:
Figure FDA0003526257000000021
wherein i represents a reference number of the target blockchain node; PK i The traceable linkable public key representing a traceable linkable loop signature by the target blockchain node; g represents the elliptic curve group generator;
Figure FDA0003526257000000022
represents the UTXO public key generated last time; h represents the elliptic curve group element; x is the number of i Representing the destination blockchain nodeThe ring signature private key; a is i The primary signature private key representing the target blockchain node;
Figure FDA0003526257000000023
a zero knowledge proof result representing the validity of the traceable linkable public key.
5. The method according to claim 4, wherein the traceable linkable loop signature of the target data based on the traceable linkable public key, the elliptic curve group generator, the elliptic curve group element, the loop signature private key, the primary signature private key and the primary signature public key to obtain a traceable linkable loop signature result of the data comprises:
selecting a preset number of other block chain nodes, and generating a ring signature public key based on the public keys of the other block chain nodes and the public key of the target block chain node through a second operation formula, wherein the preset number is n-1, and n is an integer greater than or equal to 2;
performing ring signature on the target data based on the ring signature public key and the ring signature private key through a third operation formula to obtain a common ring signature result;
performing primary signature on the common ring signature result based on the primary signature private key, the ring signature public key and the primary signature public key through a fourth operation formula to obtain a primary signature result;
taking the ring signature public key, the target data, the common ring signature result and the primary signature result as the traceable linkable ring signature result;
the second operational formula includes:
Figure FDA0003526257000000031
the third operation formula includes:
A=SIG(x i ,L,m);
the fourth operation formula includes:
Figure FDA0003526257000000032
wherein L represents the ring signature public key; j is more than or equal to 1 and less than or equal to n-1, and when j is not equal to i, x j Ring signature private key, a, representing the other blockchain node j A primary signature private key representing the other blockchain node; a represents the result of the ordinary ring signature; SIG represents a ring signature algorithm; m represents the target data; sigma represents the primary signature result; OSIG stands for Primary signature Algorithm; OPK denotes the one-time signature public key.
6. The method of claim 1, wherein the discrete cipher group generator comprises an elliptic curve group generator, and wherein the cryptographic group element comprises an elliptic curve group element;
according to the preset format, processing private data of the supervision node based on the discrete cipher group generating element and the cipher group element, and issuing a corresponding processing result to the block chain, so that the supervision node can supervise the target block chain node and/or the private data based on the processing result and the first random number, and the method comprises the following steps:
acquiring a target numerical value and generating a second random number;
calculating the target numerical value based on the elliptic curve group generating element, the elliptic curve group element and the second random number to obtain a commitment value;
splitting the target numerical value into sub-target numerical values according to a preset splitting format, and splitting the second random number into sub-second random numbers corresponding to the sub-target numerical values;
calculating a first commitment value and a second commitment value of each sub-scalar value and the corresponding sub-second random number based on the elliptic curve group generator and the elliptic curve group element, and publishing the first commitment value;
and calculating and publishing a value verification result of each sub-target value and the corresponding sub-second random number based on the elliptic curve group elements, so that the supervision node can determine the target value based on the first commitment value, the value verification result and the first random number.
7. The method of claim 6, wherein after the calculating and publishing the value verification result of each sub-target value and the corresponding sub-second random number based on the elliptic curve group element, further comprises:
calculating a sub public key of each sub-target value based on the first commitment value, the second commitment value and the value verification result of each sub-target value;
calculating a sub-ring signature result of each sub-target value based on the commitment value, the sub-public key of each sub-target value and the sub-second random number;
taking the commitment value and all the sub-ring signature results as a value traceable interval certification result of the target value;
and issuing the value traceable interval certification result to a verification block chain node so that the verification block chain node can verify the value traceable interval certification result and the value verification result and chain the value traceable interval certification result after the verification is passed.
8. The method according to claim 7, wherein the operating the target numerical value based on the elliptic curve group generator, the elliptic curve group element and the second random number to obtain a commitment value comprises:
calculating the target numerical value based on the elliptic curve group generating element, the elliptic curve group element and the second random number through a commitment value calculation formula to obtain a commitment value;
the commitment value operation formula comprises:
c=g y h b
wherein c represents the commitment value; y represents the second random number; b represents the target value.
9. The method of claim 8, wherein the splitting the target value into sub-target values and the splitting the second random number into sub-second random numbers corresponding to the sub-target values according to a preset splitting format comprises:
splitting the target numerical value into the sub-target numerical values through a first splitting formula;
splitting the second random number into the sub-second random numbers corresponding to the sub-target values through a second splitting formula;
the first split formula includes:
b=b 0 +…+2 i b i +…+2 v-1 b v-1
the second split formula comprises:
y 0 +…+y i +…+y v-1 =y;
wherein, b i Representing the ith sub-goal value, v representing the total number of sub-goal values, b i Is 0 or 1; y is i Represents the sub-second random number corresponding to the ith sub-scalar value.
10. The method of claim 9, wherein calculating the first commitment value and the second commitment value for each of the sub-target values and the corresponding sub-second random numbers based on the elliptic curve group generator and the elliptic curve group element comprises:
calculating the first commitment value and the second commitment value of each sub-target value and the corresponding sub-second random number based on the elliptic curve group generator and the elliptic curve group element through a fifth operation formula;
the fifth operation formula includes:
Figure FDA0003526257000000051
wherein, c i Representing the ith said first commitment value; c' i Representing the ith said second commitment value;
the calculating and publishing the value verification result of each sub-target value and the corresponding sub-second random number based on the elliptic curve group elements comprises:
calculating and publishing the numerical value verification result of each sub-target numerical value and the corresponding sub-second random number based on the elliptic curve group elements through a sixth operation formula;
the sixth operational formula includes:
Figure FDA0003526257000000052
wherein, TK' i Representing the ith said numerical verification result;
the calculating a sub public key of each sub-scalar value based on the first commitment value, the second commitment value and the value verification result of each sub-scalar value comprises:
calculating the sub public key of each sub-nominal value based on the first commitment value, the second commitment value and the value verification result of each sub-nominal value through a seventh operation formula;
the seventh operational formula includes:
PK′ i =(c i ,c′ i ,TK′ i ,π(c i ,c′ i ,TK′ i ) ); wherein, PK' i Representing the ith said child public key; pi (c) i ,c′ i ,TK′ i ) Represents TK' i Zero knowledge proof of legitimacy;
the calculating a sub-ring signature result of each sub-target value based on the commitment value, the sub-public key of each sub-target value and the sub-second random number comprises:
calculating the sub-ring signature result of each sub-target value based on the commitment value, the sub-public key of each sub-target value and the sub-second random number through an eighth operation formula;
the eighth operational formula includes:
σ i =SIG(PK′ i ,y i and c); wherein σ i Representing the ith said sub-ring signature result.
11. The method according to any one of claims 1 to 10, wherein the predetermined format comprises α β α represents a code group element, and β represents a random number.
12. A method for transmitting blockchain information, the method being applied to a verification blockchain node in a blockchain system, the blockchain system further comprising a target blockchain node, the method comprising:
acquiring a primary signature public key published by the target block chain node, and judging whether the primary signature public key exists in the block chain system;
if the primary signature public key exists in the block chain system, outputting abnormal information, and if the primary signature public key does not exist in the block chain system, acquiring a traceable linkable loop signature result of data issued by a target block chain node;
obtaining and inspecting
Figure FDA0003526257000000061
Whether it is correct; pi represents zero knowledge proof, g represents an elliptic curve group generating element;
Figure FDA0003526257000000062
representing the UTXO public key generated last time; h represents an elliptic curve group element; x is the number of i A ring signature private key representing the target blockchain node; a is i A primary signature private key representing the target blockchain node;
if it is
Figure FDA0003526257000000063
If the result is correct, checking whether the ring signature public key in the traceable linkable ring signature result is correct;
if the ring signature public key is correct, checking whether a common ring signature result in the traceable linkable ring signature result is correct;
if the common ring signature result is correct, checking whether a primary signature result in the traceable linkable ring signature result is correct;
and if the one-time signature result is correct, checking whether the traceable linkable ring signature result is correct.
13. The method of claim 12, further comprising:
obtaining a commitment value, a first commitment value, a second commitment value, a numerical verification result and a numerical traceable interval certification result generated by the target block chain node; acquiring elliptic curve group elements;
verifying all π (c) i ,c′ i ,TK′ i ) Whether all are correct; c. C i Representing the first commitment value; c' i Representing the second commitment value; TK' i Representing the numerical verification result;
if all is pi (c) i ,c′ i ,TK′ i ) If correct, verify all
Figure FDA0003526257000000064
Whether all are correct; h represents the elliptic curve group element;
if all
Figure FDA0003526257000000065
If correct, II c is verified i If c is correct, pi represents a summation operation, and c represents the commitment value;
if pi c i If c is correct, the traceable interval is verifiedThe correctness of the result is proved;
and if the numerical value traceable interval proves that the result is correct, the numerical value traceable interval proves that the result is uploaded.
14. A method for transmitting blockchain information, the method being applied to a supervisory node in a blockchain system, the blockchain system further comprising a target blockchain node, the method comprising:
generating a first random number and storing the first random number as a trap door so that the block chain operates on the first random number and the discrete cipher group generating element based on a preset format to obtain an encryption group element;
publishing the encrypted group element to enable a block link point in the block chain to generate a corresponding primary signature public key based on the discrete cipher group generator, the encrypted group element and a corresponding primary signature private key;
acquiring a first series of operation results issued by the block chain nodes in the block chain, wherein the first series of operation results comprise results obtained after the block chain nodes operate the discrete cipher group generating elements and the primary signature private key according to the preset format;
acquiring a target primary signature public key;
according to the preset format, each operation result in the first series of operation results is operated through the first random number to obtain a corresponding first operation value;
determining a block chain link point corresponding to the first operation value equal to the value of the target primary signature public key as a target block chain node;
wherein the preset format comprises alpha β α represents a code group element, and β represents a random number.
15. The method of claim 14, wherein after publishing the encrypted group element, further comprising:
acquiring a first commitment value and a value verification result which are published by the target block chain node and correspond to a target value;
for each first commitment value, calculating a second operation value corresponding to the first commitment value through the first random number according to the preset format, and judging whether the second operation value is equal to the numerical value verification result, if so, determining that the value of a sub-scalar value corresponding to the first commitment value is 0, and if not, determining that the value of the sub-scalar value of the first commitment value is 1;
and determining the target value based on the sub-target values according to a preset splitting format.
16. A blockchain information transmission system, applied to a target blockchain node in a blockchain system, the blockchain system further including a supervision node, the system comprising:
the monitoring node comprises a first acquisition module, a second acquisition module and a monitoring module, wherein the first acquisition module is used for acquiring a predetermined discrete password group generator and an encryption group element, the encryption group element comprises a password group element obtained by operating a first random number and the discrete password group generator based on a preset format, and the first random number is a trap door generated and stored by the monitoring node;
and the first processing module is used for processing private data of the monitoring node based on the discrete cipher group generating element and the encryption group element according to the preset format and issuing a corresponding processing result to the block chain, so that the monitoring node can monitor the target block chain node and/or the private data based on the processing result and the first random number.
17. A blockchain information transmission apparatus, the apparatus comprising a memory and a processor, the memory having stored thereon a blockchain information transmission program operable on the processor, the blockchain information transmission program when executed by the processor implementing the method according to any one of claims 1 to 15.
18. A computer-readable storage medium having stored thereon a blockchain information transmission program executable by one or more processors to implement the blockchain information transmission method according to any one of claims 1 to 15.
19. A block chain system is characterized by comprising a common block chain node and a supervision node;
the general blockchain node is configured to perform the blockchain information transmission method according to any one of claims 1 to 11;
the policing node is configured to perform the method of block chain information transmission according to claim 14 or 15.
20. The system of claim 19, further comprising a verification blockchain node;
the verification blockchain node is configured to perform the method of transmitting blockchain information according to claim 12 or 13.
CN201980059452.8A 2019-09-09 2019-09-09 Block chain system, information transmission method, system, device and computer medium Active CN112789824B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/104853 WO2021046668A1 (en) 2019-09-09 2019-09-09 Blockchain system, information transmission method, system and apparatus, and computer medium

Publications (2)

Publication Number Publication Date
CN112789824A CN112789824A (en) 2021-05-11
CN112789824B true CN112789824B (en) 2022-09-09

Family

ID=74866922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980059452.8A Active CN112789824B (en) 2019-09-09 2019-09-09 Block chain system, information transmission method, system, device and computer medium

Country Status (2)

Country Link
CN (1) CN112789824B (en)
WO (1) WO2021046668A1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113239935A (en) * 2021-04-15 2021-08-10 广州广电运通金融电子股份有限公司 Image feature extraction method, device, equipment and medium based on block chain
CN113239374B (en) * 2021-05-11 2024-02-02 中国联合网络通信集团有限公司 Resource exchange method and node server
CN113486408B (en) * 2021-07-05 2022-08-09 建信金融科技有限责任公司 Deposit receipt management system and method based on block chain
CN113609502B (en) * 2021-08-06 2023-09-26 东北大学 Space crowdsourcing system and method based on block chain
CN113779631A (en) * 2021-09-10 2021-12-10 杭州宇链科技有限公司 Motor vehicle automatic driving operation data recording method based on block chain
CN113761582B (en) * 2021-09-29 2023-06-16 山东省计算中心(国家超级计算济南中心) Group signature-based supervision blockchain transaction privacy protection method and system
CN114640462A (en) * 2022-02-17 2022-06-17 北京邮电大学 Block chain privacy protection method and device, electronic equipment and storage medium
CN115314352B (en) * 2022-07-27 2023-12-12 北京航空航天大学 Privacy-enhanced fair blockchain leader election method and device
CN115529141A (en) * 2022-09-19 2022-12-27 上海阵方科技有限公司 Traceable ring signature generation method and system for logarithmic signature size
CN115865426B (en) * 2022-11-14 2024-03-26 中国联合网络通信集团有限公司 Privacy intersection method and device
CN115829754B (en) * 2023-02-16 2023-05-05 之江实验室 Transaction supervision method and device for privacy protection blockchain
CN115865531B (en) * 2023-02-24 2023-06-06 南开大学 Proxy re-encryption digital asset authorization method
CN116633548A (en) * 2023-04-03 2023-08-22 北京熠智科技有限公司 Encryption process supervision method, device, system and storage medium
CN116389164B (en) * 2023-05-26 2023-09-12 建信金融科技有限责任公司 Data detection method and device
CN117037988A (en) * 2023-08-22 2023-11-10 广州视景医疗软件有限公司 Electronic medical record storage method and device based on blockchain
CN117499159B (en) * 2023-12-27 2024-03-26 杭州字节方舟科技有限公司 Block chain-based data transaction method and device and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659411B (en) * 2017-10-11 2020-09-15 深圳大学 Method and system for tracking user signature by condition in encrypted currency
CN109274481B (en) * 2018-08-01 2020-03-27 中国科学院数据与通信保护研究教育中心 Data traceable method of block chain
CN110009318A (en) * 2019-03-22 2019-07-12 陕西师范大学 A kind of digital cash method for tracing based on door sieve coin

Also Published As

Publication number Publication date
CN112789824A (en) 2021-05-11
WO2021046668A1 (en) 2021-03-18

Similar Documents

Publication Publication Date Title
CN112789824B (en) Block chain system, information transmission method, system, device and computer medium
CN110473105B (en) Block chain transaction settlement method, system and related equipment
CN108646983B (en) Processing method and device for storing service data on block chain
CN112769548B (en) Block chain numerical information transmission method, system, device and computer medium
CN112446785A (en) Cross-chain transaction method, system, device, equipment and storage medium
CN112215608A (en) Data processing method and device
CN107133520B (en) Credibility measuring method and device for cloud computing platform
CN111464518A (en) Method and device for sending and verifying cross-link communication data
CN111612600B (en) Block chain auction method, equipment, storage medium and block chain system
CN111160879B (en) Hardware wallet and security improving method and device thereof
CN112132577B (en) Multi-supervision transaction processing method and device based on block chain
US20230237437A1 (en) Apparatuses and methods for determining and processing dormant user data in a job resume immutable sequential listing
JP2016524431A (en) Electronic signature system
CN109951416B (en) Credible verification method and terminal
CN113055178B (en) Block chain system, and method, system, device and medium for transmitting numerical information
CN113591103A (en) Identity authentication method and system between intelligent terminals of power internet of things
CN109670956B (en) Block chain transaction method and device
CN113379415B (en) Block chain system, information processing method, system, device and computer medium
CN116112216A (en) Cloud data verification method and device, electronic equipment and nonvolatile storage medium
CN113055177B (en) Block chain system, and method, system, device and medium for transmitting numerical information
CN104298897A (en) Embedded copyright authentication method based on chaos technology and special processor
CN112751675B (en) Information monitoring method, system, equipment and storage medium based on block chain
WO2021081803A1 (en) Blockchain system, supervision method, system, device, and computer storage medium
CN113378212B (en) Block chain system, information processing method, system, device and computer medium
CN111127020A (en) Transaction data confusion method based on block chain and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant