CN113468549A - Retrieval method and system for encrypted information evidence based on block chain and electronic equipment - Google Patents

Retrieval method and system for encrypted information evidence based on block chain and electronic equipment Download PDF

Info

Publication number
CN113468549A
CN113468549A CN202110474025.5A CN202110474025A CN113468549A CN 113468549 A CN113468549 A CN 113468549A CN 202110474025 A CN202110474025 A CN 202110474025A CN 113468549 A CN113468549 A CN 113468549A
Authority
CN
China
Prior art keywords
information
hash value
hash
certificate
certificate information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110474025.5A
Other languages
Chinese (zh)
Inventor
罗少龙
柳发健
胥勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Mobile Technology Co ltd
Original Assignee
Shenzhen Qianhai Mobile Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhai Mobile Technology Co ltd filed Critical Shenzhen Qianhai Mobile Technology Co ltd
Priority to CN202110474025.5A priority Critical patent/CN113468549A/en
Publication of CN113468549A publication Critical patent/CN113468549A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

The invention discloses a block chain-based encrypted information evidence retrieval method, which comprises the following steps: encrypting the storage position of the certificate information by adopting an asymmetric encryption technology; adding the encrypted storage location information to the credential information; calculating a hash value of the credential information by using an SHA256 hash function; recording the certificate information and the corresponding hash value into an intelligent contract on the chain; for the chained credit certificates, a hash retrieval tree is constructed in an intelligent contract according to the hash value of the certificate information, and each node on the hash retrieval tree correspondingly stores one certificate information; and obtaining the certificate information according to the hash value, verifying the certificate information, and decrypting the verified storage position information. The block chain-based encrypted information evidence retrieval method, the block chain-based encrypted information evidence retrieval system and the electronic equipment have the advantages of high confidentiality, rapid data retrieval and the like.

Description

Retrieval method and system for encrypted information evidence based on block chain and electronic equipment
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain-based encrypted information evidence retrieval method and system and electronic equipment.
Background
The block chain is a decentralized accounting technology, and plays a great role in various application scenes by virtue of characteristics of decentralized, privacy protection, difficult tampering and the like since the appearance of the bitcoin in 2008. With the development of technology, representative blockchain platforms such as etherhouse and superhedger Fabric are coming out in succession, and they also represent the explosion in the field of blockchain technology. However, in the field of combining the blockchain with the supply chain finance, it is difficult to store unstructured data (text, pictures, video, deposit certificates, etc.) on the blockchain, and only information such as byte codes can be stored, which causes that credit voucher information of small and medium-sized enterprises in the supply chain finance is difficult to link, and how to ensure confidentiality of information on the chain and fast retrieval of data is also a problem to be solved.
Disclosure of Invention
The invention provides a retrieval method, a retrieval system and electronic equipment for storing encrypted information based on a block chain, and aims to solve the problems.
According to a first embodiment of the present application, a block chain-based encrypted information certificate retrieval method includes the following steps:
step S1: encrypting the storage position of the certificate information by adopting an asymmetric encryption technology;
step S2: adding the encrypted storage location information to the credential information;
step S3: calculating a hash value of the credential information by using an SHA256 hash function;
step S4: recording the certificate information and the corresponding hash value into an intelligent contract on the chain;
step S5: for the chained credit certificates, a hash retrieval tree is constructed in an intelligent contract according to the hash value of the certificate information, and each node on the hash retrieval tree correspondingly stores one certificate information;
step S6: and obtaining the certificate information according to the hash value, verifying the certificate information, and decrypting the verified storage position information.
Preferably, the step S3 includes the steps of:
step S31: recording the certificate information;
step S32: SHA256 hash function processing;
step S33: a hash value of the credential information is obtained.
Preferably, the step S4 includes the steps of:
step S41: taking the first 5 bits of the hash value as key values of the hash retrieval tree to construct the hash retrieval tree;
step S42: judging the sizes of the hash value and the node hash value;
step S43: if the hash value is the same as the node hash value, the evidence storing record is already stored on the chain;
step S44: if the hash value is smaller than the hash value of the node, the hash value is judged to the left node, if the hash value is empty, the certificate information is stored on the node, otherwise, the hash value is compared with the hash value of the left node;
step S45: if the hash value is larger than the hash value of the node, the hash value is judged to the right node, if the hash value is empty, the certificate information is stored on the node, otherwise, the hash value is compared with the hash value of the right node.
Preferably, the step S6 includes:
step S61: obtaining certificate information according to the hash value hash, and decrypting the encrypted storage position in the certificate information through a private key of a central credit enterprise to obtain a real storage position;
step S62: encrypting the certificate information of the storage position by adopting a public key of a central credit enterprise to form a certificate information structure;
step S63: calculating a hash value of the certificate by using a SHA256 hash function 1;
step S64: judging whether the hash value hash1 is equal to the hash value hash;
step S65: if the hash value hash1 is equal to the hash value hash, the certificate information passes verification;
step S66: and if the hash value hash1 is not equal to the hash value hash, the certificate information is proved to be tampered.
In order to solve the above technical problem, a second embodiment of the present invention provides a system for storing encrypted information based on a blockchain, including:
a hash search tree unit: the hash retrieval tree unit has the functions of adding, deleting and searching key values for node hash values, and when data needs to be added, starting from a root node, the sizes of the hash values and the hash values on the nodes are sequentially judged;
a transaction credential unit: the SHA256 hash function processes a transaction certificate unit to obtain a corresponding hash value, wherein the encrypted storage position, the content abstract, the timestamp, the certificate information number and the company ID are included;
central credit enterprise unit: the certificate information encryption device comprises a private key and a public key, wherein the private key is used for decrypting the encrypted storage position in the certificate information, and the public key is used for encrypting the certificate information in the storage position.
Preferably, the system for storing encrypted information based on a blockchain further includes:
a credential information unit: information that can prove credit for the transaction certificates of small and medium-sized enterprises in the upstream and downstream of supply chain finance;
supply chain financial unit: the method is characterized in that a bank surrounds a core enterprise, the fund flow and logistics of small and medium-sized enterprises in the upstream and downstream are managed, the uncontrollable risk of a single enterprise is converted into the overall controllable risk of the supply chain enterprise, and the risk is controlled to be the lowest financial service by three-dimensionally acquiring various information.
In order to solve the above technical problem, a third embodiment of the present invention provides an electronic device, including a memory and a processor, where the memory stores therein a computer program, and the computer program is configured to execute the block chain-based encrypted information storage retrieval method when running;
the processor is arranged to execute the block chain based encrypted information credentialing retrieval method by the computer program.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
1. the application designs a retrieval method, a system and electronic equipment for storing encrypted information based on a block chain, the application encrypts the storage position of certificate information (related transaction certificates of small and medium-sized enterprises) by an asymmetric encryption technology, and the asymmetric encryption technology can only obtain the exact storage position by a central enterprise in a chain decryption mode. The SHA256 hash function is used for obtaining the transaction certificate information and the hash values of the relevant information such as the relevant timestamp, the storage position, the certification enterprise and the like, and chaining the hash values and the storage position of the certificate information, and because the SHA256 hash values have uniqueness, the chaining of the certificate information is ensured, and meanwhile, the data encryption is also ensured. The invention establishes a complete block chain + supply chain finance related rapid information acquisition and information encryption deposit certificate system by combining credit characteristic scenes faced by supply chain finance. The existing block chain technology lacks a mature relevant model for solving the relevant pain points of supply chain finance and lacks integrity.
2. The invention records the related certificate information of unstructured financial data of a supply chain by linking the field information such as storage addresses of certificate information (pictures, videos and texts) of transactions, transaction details, hash values and timestamps of the related certificate information, designs a tree-shaped data structure for fast retrieval for the certificate information, realizes fast retrieval, and ensures the legality of the related certificate by adding the timestamp of the related certificate information, thereby being a feasible technical means.
3. The relevant byte data of the transaction certificate information obtained by using the SHA256 hash function is used as input to obtain the corresponding hash value, and the hash value obtained by using the SHA256 hash function has uniqueness, so that any tampering on any transaction certificate information data can cause the hash value calculated by the SHA256 hash function to be changed, and the non-tampering of the data is ensured.
4. The voucher information record at least comprises an encrypted storage position, a content digest, a timestamp, a voucher information number, a company ID and a SHA256 hash function, and the corresponding hash value is obtained by processing the transaction voucher unit. These voucher information records will become the central credit voucher for small and medium sized enterprises.
5. For the uplink data, inputting hash value hash of related certificate information to obtain corresponding certificate information, decrypting the encrypted storage position in the certificate information through a related private key of a central credit enterprise, in the invention, decrypting by using an RSA algorithm to obtain a real storage position, encrypting the related certificate in the storage position by using a related public key of the central credit enterprise, then forming a related certificate data structure, calculating the hash value hash1 through an SHA256 hash function, if the hash1 is equal to the hash, the data certificate information passes verification, and if the hash value hash is not equal to the hash, the data is proved to be tampered.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a retrieval method for storing encrypted information based on a block chain according to a first embodiment of the present invention;
fig. 2 is a schematic flowchart of step S3 in the method for retrieving an encrypted information certificate based on a blockchain according to the first embodiment of the present invention;
fig. 3 is a flowchart illustrating step S4 in the method for retrieving the encrypted information certificate based on the blockchain according to the first embodiment of the present invention;
fig. 4 is a schematic structural diagram of a hash search tree in the search method for storing encrypted information based on a block chain according to the first embodiment of the present invention;
fig. 5 is a flowchart illustrating step S6 in the method for retrieving the encrypted information certificate based on the blockchain according to the first embodiment of the present invention;
fig. 6 is a schematic structural diagram of a system for storing encrypted information based on a block chain according to a second embodiment of the present invention;
fig. 7 is a schematic structural diagram of a system for storing encrypted information based on a block chain according to a second embodiment of the present invention;
fig. 8 is a schematic structural diagram of an electronic device according to a third embodiment of the invention.
Description of reference numerals:
10. a retrieval method of encrypted information evidence based on a block chain; 11. a hash search tree unit; 12. a transaction credential unit; 13. a central credit enterprise unit; 14. a credential information unit; 15. a supply chain financial unit; 20. an electronic device; 21. a memory; 22. a processor; 30. a system for storing encrypted information based on a blockchain.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, a first embodiment of the present invention discloses a block chain-based encrypted information certificate retrieval method 10, where the block chain-based encrypted information certificate retrieval method 10 includes the following steps:
step S1: encrypting the storage position of the certificate information by adopting an asymmetric encryption technology;
step S2: adding the encrypted storage location information to the credential information;
step S3: calculating a hash value of the credential information by using an SHA256 hash function;
step S4: recording the certificate information and the corresponding hash value into an intelligent contract on the chain;
step S5: for the chained credit certificates, a hash retrieval tree is constructed in an intelligent contract according to the hash value of the certificate information, and each node on the hash retrieval tree correspondingly stores one certificate information;
step S6: obtaining the certificate information according to the hash value, verifying the certificate information, and decrypting the verified storage position information;
the hash retrieval tree is a data structure, data are stored according to stored key values, for a certain non-leaf node, the key value of a left node is smaller than the node, and the key value of a right node is larger than the node. The SHA256 hash function is a method of creating a small digital "fingerprint" from any kind of data. The hash function compresses a message or data into a digest so that the amount of data becomes small, fixing the format of the data. This function mixes the data shuffled and recreates a fingerprint called a hash value (or hash value). The hash value is usually represented by a character string consisting of short random letters and numbers, the voucher information is information which can prove credit of related transaction vouchers and the like of upstream and downstream small and medium-sized enterprises in supply chain finance, the supply chain finance surrounds a core enterprise for banks, the fund flow and the logistics of the upstream and downstream small and medium-sized enterprises are managed, the uncontrollable risk of a single enterprise is converted into the controllable risk of the whole supply chain enterprise, and the risk is controlled to be the lowest financial service by three-dimensionally acquiring various information.
By adopting the design, the storage position of the certificate information (the related transaction certificate of small and medium-sized enterprises) is encrypted by the asymmetric encryption technology, and the accurate storage position can be obtained only by the central enterprise in a decryption mode under a chain by adopting the asymmetric encryption technology. The SHA256 hash function is used for obtaining the transaction certificate information and the hash values of the relevant information such as the relevant timestamp, the storage position, the certification enterprise and the like, and chaining the hash values and the storage position of the certificate information, and because the SHA256 hash values have uniqueness, the chaining of the certificate information is ensured, and meanwhile, the data encryption is also ensured. The invention establishes a complete block chain + supply chain finance related rapid information acquisition and information encryption deposit certificate system by combining credit characteristic scenes faced by supply chain finance. The existing block chain technology lacks a mature relevant model for solving the relevant pain points of supply chain finance and lacks integrity.
The invention records the related certificate information of unstructured financial data of a supply chain by linking the field information such as storage addresses of certificate information (pictures, videos and texts) of transactions, transaction details, hash values and timestamps of the related certificate information, designs a tree-shaped data structure for fast retrieval for the certificate information, realizes fast retrieval, and ensures the legality of the related certificate by adding the timestamp of the related certificate information, thereby being a feasible technical means.
Referring to fig. 2, the step S3 includes the following steps:
step S31: recording the certificate information;
step S32: SHA256 hash function processing;
step S33: a hash value of the credential information is obtained.
The relevant byte data of the transaction certificate information obtained by using the SHA256 hash function is used as input to obtain the corresponding hash value, and the hash value obtained by using the SHA256 hash function has uniqueness, so that any tampering on any transaction certificate information data can cause the hash value calculated by the SHA256 hash function to be changed, and the non-tampering of the data is ensured.
The voucher information record at least comprises an encrypted storage position, a content digest, a timestamp, a voucher information number, a company ID and a SHA256 hash function, and the corresponding hash value is obtained by processing the transaction voucher unit. These voucher information records will become the central credit voucher for small and medium sized enterprises.
Referring to fig. 3 and 4, the step S4 includes the following steps:
step S41: taking the first 5 bits of the hash value as key values of the hash retrieval tree to construct the hash retrieval tree;
step S42: judging the sizes of the hash value and the node hash value;
step S43: if the hash value is the same as the node hash value, the evidence storing record is already stored on the chain;
step S44: if the hash value is smaller than the hash value of the node, the hash value is judged to the left node, if the hash value is empty, the certificate information is stored on the node, otherwise, the hash value is compared with the hash value of the left node;
step S45: if the hash value is larger than the hash value of the node, the hash value is judged to the right node, if the hash value is empty, the certificate information is stored on the node, otherwise, the hash value is compared with the hash value of the right node.
Referring to fig. 5, the step S6 includes:
step S61: obtaining certificate information according to the hash value hash, and decrypting the encrypted storage position in the certificate information through a private key of a central credit enterprise to obtain a real storage position;
step S62: encrypting the certificate information of the storage position by adopting a public key of a central credit enterprise to form a certificate information structure;
step S63: calculating a hash value of the certificate by using a SHA256 hash function 1;
step S64: judging whether the hash value hash1 is equal to the hash value hash;
step S65: if the hash value hash1 is equal to the hash value hash, the certificate information passes verification;
step S66: and if the hash value hash1 is not equal to the hash value hash, the certificate information is proved to be tampered.
For the uplink data, inputting hash value hash of related certificate information to obtain corresponding certificate information, decrypting the encrypted storage position in the certificate information through a related private key of a central credit enterprise, in the invention, decrypting by using an RSA algorithm to obtain a real storage position, encrypting the related certificate in the storage position by using a related public key of the central credit enterprise, then forming a related certificate data structure, calculating the hash value hash1 through an SHA256 hash function, if the hash1 is equal to the hash, the data certificate information passes verification, and if the hash value hash is not equal to the hash, the data is proved to be tampered.
In step S61, the credential information is obtained according to the hash value hash, and the stored hash value of the relevant credential is input to search from the hash search tree constructed in the intelligent contract on the link to find the corresponding credential information storage node.
Referring to fig. 6, a second embodiment of the present invention discloses a system 30 for storing encrypted information based on a blockchain, including:
hash search tree unit 11: the hash retrieval tree unit has the functions of adding, deleting and searching key values for node hash values, and when data needs to be added, starting from a root node, the sizes of the hash values and the hash values on the nodes are sequentially judged;
the transaction credential unit 12: the SHA256 hash function processes a transaction certificate unit to obtain a corresponding hash value, wherein the encrypted storage position, the content abstract, the timestamp, the certificate information number and the company ID are included;
central credit enterprise unit 13: the certificate information encryption device comprises a private key and a public key, wherein the private key is used for decrypting the encrypted storage position in the certificate information, and the public key is used for encrypting the certificate information in the storage position.
Referring to fig. 7, the system 30 for storing encrypted information based on blockchain further includes:
the credential information unit 14: information that can prove credit for the transaction certificates of small and medium-sized enterprises in the upstream and downstream of supply chain finance;
supply chain financial unit 15: the method is characterized in that a bank surrounds a core enterprise, the fund flow and logistics of small and medium-sized enterprises in the upstream and downstream are managed, the uncontrollable risk of a single enterprise is converted into the overall controllable risk of the supply chain enterprise, and the risk is controlled to be the lowest financial service by three-dimensionally acquiring various information.
Referring to fig. 8, a third embodiment of the present invention discloses an electronic device 20, which includes a memory 21 and a processor 22, where the memory 21 stores therein a computer program, and the computer program is configured to execute, when running, the steps in any one of the embodiments of the block chain-based encrypted information storage retrieval method; the processor 22 is arranged to carry out the steps of the above embodiments of the block chain based retrieval method for the certification of encrypted information by means of the computer program.
Alternatively, in this embodiment, the electronic device 20 may be located in at least one network device of a plurality of network devices of an operating machine network.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
1. the application designs a retrieval method, a system and electronic equipment for storing encrypted information based on a block chain, the application encrypts the storage position of certificate information (related transaction certificates of small and medium-sized enterprises) by an asymmetric encryption technology, and the asymmetric encryption technology can only obtain the exact storage position by a central enterprise in a chain decryption mode. The SHA256 hash function is used for obtaining the transaction certificate information and the hash values of the relevant information such as the relevant timestamp, the storage position, the certification enterprise and the like, and chaining the hash values and the storage position of the certificate information, and because the SHA256 hash values have uniqueness, the chaining of the certificate information is ensured, and meanwhile, the data encryption is also ensured. The invention establishes a complete block chain + supply chain finance related rapid information acquisition and information encryption deposit certificate system by combining credit characteristic scenes faced by supply chain finance. The existing block chain technology lacks a mature relevant model for solving the relevant pain points of supply chain finance and lacks integrity.
2. The invention records the related certificate information of unstructured financial data of a supply chain by linking the field information such as storage addresses of certificate information (pictures, videos and texts) of transactions, transaction details, hash values and timestamps of the related certificate information, designs a tree-shaped data structure for fast retrieval for the certificate information, realizes fast retrieval, and ensures the legality of the related certificate by adding the timestamp of the related certificate information, thereby being a feasible technical means.
3. The relevant byte data of the transaction certificate information obtained by using the SHA256 hash function is used as input to obtain the corresponding hash value, and the hash value obtained by using the SHA256 hash function has uniqueness, so that any tampering on any transaction certificate information data can cause the hash value calculated by the SHA256 hash function to be changed, and the non-tampering of the data is ensured.
4. The voucher information record at least comprises an encrypted storage position, a content digest, a timestamp, a voucher information number, a company ID and a SHA256 hash function, and the corresponding hash value is obtained by processing the transaction voucher unit. These voucher information records will become the central credit voucher for small and medium sized enterprises.
5. For the uplink data, inputting hash value hash of related certificate information to obtain corresponding certificate information, decrypting the encrypted storage position in the certificate information through a related private key of a central credit enterprise, in the invention, decrypting by using an RSA algorithm to obtain a real storage position, encrypting the related certificate in the storage position by using a related public key of the central credit enterprise, then forming a related certificate data structure, calculating the hash value hash1 through an SHA256 hash function, if the hash1 is equal to the hash, the data certificate information passes verification, and if the hash value hash is not equal to the hash, the data is proved to be tampered.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. The retrieval method of the encrypted information deposit certificate based on the block chain is characterized by comprising the following steps:
step S1: encrypting the storage position of the certificate information by adopting an asymmetric encryption technology;
step S2: adding the encrypted storage location information to the credential information;
step S3: calculating a hash value of the credential information by using an SHA256 hash function;
step S4: recording the certificate information and the corresponding hash value into an intelligent contract on the chain;
step S5: for the chained credit certificates, a hash retrieval tree is constructed in an intelligent contract according to the hash value of the certificate information, and each node on the hash retrieval tree correspondingly stores one certificate information;
step S6: and obtaining the certificate information according to the hash value, verifying the certificate information, and decrypting the verified storage position information.
2. The method for retrieving the encrypted information certificate based on the blockchain according to claim 1, wherein the step S3 comprises the steps of:
step S31: recording the certificate information;
step S32: SHA256 hash function processing;
step S33: a hash value of the credential information is obtained.
3. The method for retrieving the encrypted information certificate based on the blockchain according to claim 1, wherein the step S4 comprises the steps of:
step S41: taking the first 5 bits of the hash value as key values of the hash retrieval tree to construct the hash retrieval tree;
step S42: judging the sizes of the hash value and the node hash value;
step S43: if the hash value is the same as the node hash value, the evidence storing record is already stored on the chain;
step S44: if the hash value is smaller than the hash value of the node, the hash value is judged to the left node, if the hash value is empty, the certificate information is stored on the node, otherwise, the hash value is compared with the hash value of the left node;
step S45: if the hash value is larger than the hash value of the node, the hash value is judged to the right node, if the hash value is empty, the certificate information is stored on the node, otherwise, the hash value is compared with the hash value of the right node.
4. The method for retrieving the encrypted information certificate based on the blockchain according to claim 3, wherein the step S6 includes:
step S61: obtaining certificate information according to the hash value hash, and decrypting the encrypted storage position in the certificate information through a private key of a central credit enterprise to obtain a real storage position;
step S62: encrypting the certificate information of the storage position by adopting a public key of a central credit enterprise to form a certificate information structure;
step S63: calculating a hash value of the certificate by using a SHA256 hash function 1;
step S64: judging whether the hash value hash1 is equal to the hash value hash;
step S65: if the hash value hash1 is equal to the hash value hash, the certificate information passes verification;
step S66: and if the hash value hash1 is not equal to the hash value hash, the certificate information is proved to be tampered.
5. System for encrypted information evidence based on block chain, characterized by, includes:
a hash search tree unit: the hash retrieval tree unit has the functions of adding, deleting and searching key values for node hash values, and when data needs to be added, starting from a root node, the sizes of the hash values and the hash values on the nodes are sequentially judged;
a transaction credential unit: the SHA256 hash function processes a transaction certificate unit to obtain a corresponding hash value, wherein the encrypted storage position, the content abstract, the timestamp, the certificate information number and the company ID are included;
central credit enterprise unit: the certificate information encryption device comprises a private key and a public key, wherein the private key is used for decrypting the encrypted storage position in the certificate information, and the public key is used for encrypting the certificate information in the storage position.
6. The system for blockchain-based cryptographic information attestation according to claim 5, comprising:
a credential information unit: information that can prove credit for the transaction certificates of small and medium-sized enterprises in the upstream and downstream of supply chain finance;
supply chain financial unit: the method is characterized in that a bank surrounds a core enterprise, the fund flow and logistics of small and medium-sized enterprises in the upstream and downstream are managed, the uncontrollable risk of a single enterprise is converted into the overall controllable risk of the supply chain enterprise, and the risk is controlled to be the lowest financial service by three-dimensionally acquiring various information.
7. An electronic device comprising a memory and a processor, characterized in that: the memory having stored therein a computer program arranged, when executed, to perform the method of retrieving a blockchain based encrypted information certificate of any one of claims 1 to 4;
the processor is arranged to execute the method of retrieving a blockchain based encrypted information certificate of any one of claims 1 to 4 by means of the computer program.
CN202110474025.5A 2021-04-29 2021-04-29 Retrieval method and system for encrypted information evidence based on block chain and electronic equipment Pending CN113468549A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110474025.5A CN113468549A (en) 2021-04-29 2021-04-29 Retrieval method and system for encrypted information evidence based on block chain and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110474025.5A CN113468549A (en) 2021-04-29 2021-04-29 Retrieval method and system for encrypted information evidence based on block chain and electronic equipment

Publications (1)

Publication Number Publication Date
CN113468549A true CN113468549A (en) 2021-10-01

Family

ID=77870528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110474025.5A Pending CN113468549A (en) 2021-04-29 2021-04-29 Retrieval method and system for encrypted information evidence based on block chain and electronic equipment

Country Status (1)

Country Link
CN (1) CN113468549A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115829729A (en) * 2023-02-14 2023-03-21 四川华西集采电子商务有限公司 Supply chain financial credit evaluation system and method based on three-chain architecture

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833438A (en) * 2018-07-18 2018-11-16 电子科技大学 A kind of industrial Internet of Things secure information storage method based on block chain
CN109741056A (en) * 2018-12-26 2019-05-10 中国银联股份有限公司 A kind of method and device that electronic certificate uploads
CN111061680A (en) * 2018-10-15 2020-04-24 北京京东尚科信息技术有限公司 Data retrieval method and device
CN112084164A (en) * 2020-09-16 2020-12-15 厦门市美亚柏科信息安全研究所有限公司 Data evidence storing method and system based on block chain and interplanetary file system
CN112232813A (en) * 2020-10-12 2021-01-15 国网上海市电力公司 Renewable energy power consumption voucher management method and device based on block chain
CN112383611A (en) * 2020-11-11 2021-02-19 上海保险交易所股份有限公司 File evidence storing method, system and server based on block chain
CN112651052A (en) * 2020-12-24 2021-04-13 江苏通付盾科技有限公司 Data right confirming method and system based on block chain technology

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833438A (en) * 2018-07-18 2018-11-16 电子科技大学 A kind of industrial Internet of Things secure information storage method based on block chain
CN111061680A (en) * 2018-10-15 2020-04-24 北京京东尚科信息技术有限公司 Data retrieval method and device
CN109741056A (en) * 2018-12-26 2019-05-10 中国银联股份有限公司 A kind of method and device that electronic certificate uploads
CN112084164A (en) * 2020-09-16 2020-12-15 厦门市美亚柏科信息安全研究所有限公司 Data evidence storing method and system based on block chain and interplanetary file system
CN112232813A (en) * 2020-10-12 2021-01-15 国网上海市电力公司 Renewable energy power consumption voucher management method and device based on block chain
CN112383611A (en) * 2020-11-11 2021-02-19 上海保险交易所股份有限公司 File evidence storing method, system and server based on block chain
CN112651052A (en) * 2020-12-24 2021-04-13 江苏通付盾科技有限公司 Data right confirming method and system based on block chain technology

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115829729A (en) * 2023-02-14 2023-03-21 四川华西集采电子商务有限公司 Supply chain financial credit evaluation system and method based on three-chain architecture
CN115829729B (en) * 2023-02-14 2023-05-02 四川华西集采电子商务有限公司 Three-chain architecture-based supply chain financial credit evaluation system and method

Similar Documents

Publication Publication Date Title
JP7292365B2 (en) Cryptographic methods and systems for secure extraction of data from blockchains
Dagher et al. Broncovote: Secure voting system using ethereum’s blockchain
RU2351978C2 (en) Method for provision of data records set integrity
CN109074434A (en) Method and system for verifying ownership of digital assets using distributed hash tables and point-to-point distributed ledgers
CN106776904A (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
CN109379182A (en) Support efficient data re-encryption method and system, the cloud storage system of data deduplication
CN108923932A (en) A kind of decentralization co-verification model and verification algorithm
CN112347508A (en) Block chain data sharing encryption and decryption method and system
US20190305968A1 (en) Human-solved puzzles as proof-of-work for blockchain
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN113704357A (en) Smart city data sharing method and system based on block chain
CN111680013A (en) Data sharing method based on block chain, electronic equipment and device
CN115208628B (en) Data integrity verification method based on block chain
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN113315745A (en) Data processing method, device, equipment and medium
CN116644479A (en) Tamper-resistant electronic contract signing method based on blockchain technology
CN115659417A (en) Audit log storage method, audit log verification method, audit log storage device, audit log verification device and computer equipment
CN111597167A (en) Big data management system and method applying block chain technology
CN113014394B (en) Electronic data certification method and system based on alliance chain
CN113468549A (en) Retrieval method and system for encrypted information evidence based on block chain and electronic equipment
KR102349014B1 (en) Method and system for building fast synchronizable decentralized distributed database
Cheng et al. Fast consistency auditing for massive industrial data in untrusted cloud services
Lashkami et al. A blockchain based framework for complete secure data outsourcing with malicious behavior prevention
CN115643090A (en) Longitudinal federal analysis method, device, equipment and medium based on privacy retrieval
CN108920971A (en) The method of data encryption, the method for verification, the device of encryption and verification device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination