CN113781073A - Subsidizing method capable of hiding real names based on matrix alliance chain - Google Patents
Subsidizing method capable of hiding real names based on matrix alliance chain Download PDFInfo
- Publication number
- CN113781073A CN113781073A CN202111323417.8A CN202111323417A CN113781073A CN 113781073 A CN113781073 A CN 113781073A CN 202111323417 A CN202111323417 A CN 202111323417A CN 113781073 A CN113781073 A CN 113781073A
- Authority
- CN
- China
- Prior art keywords
- node
- block
- transaction
- chain
- consensus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Abstract
The invention provides a subsidizing method of a concealable real name based on a matrix alliance chain, which is characterized in that a plurality of behavior bodies such as public welfare agencies, enterprises, individuals, governments, supervision agencies and the like are gathered together through an alliance chain system, a matrix alliance chain is designed, a structure is optimized, an alliance is established, and real name information can be concealed by a sponsor and a receiver without influencing the transparency and authenticity of the subsidizing information, so that traceability and tracing are ensured; and (4) optimizing a consensus mechanism and promoting the behavior integrity of the sponsor. The invention gives full play to the advantages of the block chain in public service scenes and effectively protects the privacy of users.
Description
Technical Field
The invention relates to the technical field of alliance chains, in particular to a subsidizing method capable of hiding real names based on a matrix alliance chain.
Background
The traditional public welfare charitable organization has low information disclosure transparency, a supervision mechanism is in short position, and public trust is insufficient. The 'fund going and using condition' and 'benevolence source' of the public welfare organization are always the focus of public attention, but the conventional public welfare organization often has insufficient information disclosure and weak social supervision strength, thereby influencing the confidence and the support degree of the public welfare organization. Most of the traditional public welfare charitable organizations are not transformed by digital technology, the traditional donation flow is complicated, the technical means is backward, and the efficiency is low; meanwhile, the rapid development of Chinese economy brings about the ever-increasing public demand of the masses. In recent years, the total value of social public welfare and the number of social organizations are continuously increased, the individual donation amount keeps better acceleration, and the scale of the individual donation assets, particularly the network donation, is widely seen in the future. With the rapid development of the internet and the wide application of information technology, the network public welfare crowd-funding platform develops rapidly such as easy funding, water droplet funding, love funding and the like, but due to the open characteristics of the internet, the crowd-funding platform is difficult to effectively screen information of an initiator and a beneficiary, and problems that individual recourse persons falsely build illness states, partial platform online business processes are not in compliance, user data are abused, individual platforms are involved in illegal funding and the like are frequently generated. The method not only damages the basic rights and interests of the donors, but also weakens the trust of the masses on the network public welfare and crowd raising activities, and restricts the sustainable development of the public welfare industry. In addition, in the existing public welfare scenario, including the products of block chains and public welfare, the financial and physical subsidies of money and objects are mainly focused, and the help of service resources such as 'volunteer time', 'online courses', 'experience knowledge' and the like which can be given by people is ignored. In the process of consolidating and expanding the poverty-escaping attack and hardening result and promoting the pleasure of the country, the public welfare scene of realizing the dream of children in the country is considered, and the property and service are considered.
The block chain technology is a distributed account book technology, is commonly maintained by multiple parties, uses cryptography to ensure transmission and access safety, can realize the accounting technology of data consistent storage, difficult tampering and prevention of repudiation, has the properties of decentralization, openness and transparency, traceable information and tamper resistance, can effectively ensure the openness and transparency of public service projects, and can be used for a donor to inquire each transaction and trace the issuing information, the use condition and the like of goods and money. The block chain has great application potential as a new digital technology, the block chain is gradually applied to the social public service field at present, however, in order to better and more publicly disclose the block chain to the public, the existing public service block chain system can record complete information of a sponsor and a sponsor in the block chain, and due to the characteristic that the block chain can not be tampered, the information of a user can be permanently kept in the block chain. For privacy protection, the sponsor or sponsor should be able to request to delete or hide private data records related to themselves, i.e. the user should be able to choose real names or hide real names to participate in the records of the blockchain without affecting the public transparency and tamper resistance of the sponsored data, so as to protect the privacy and anonymity of the user. Compared with the public chain, the admission mechanism of the alliance chain is more suitable for public service scenes, and public service platforms, government regulatory departments and credit department doors which have good credit and accord with the qualification are allowed to enter to participate in consensus. However, based on the existing alliance chain system, only the subsidy transaction information is continuously recorded in the block, all the subsidy information of a certain subsidy person cannot be accurately associated, a certain specific subsidy transaction cannot be positioned to realize on-chain modification, and real-name information of the subsidy person and the subsidy person cannot be protected.
Disclosure of Invention
In order to solve the technical problems, the invention provides a subsidizing method of a concealable real name based on a matrix alliance chain, after real name registration and authentication, a sponsor can subsidize the property or service of the sponsor, and by optimizing a block structure and a chain structure, real name information stored on the block chain is allowed to be concealed without influencing the whole structure of the chain, and meanwhile, the subsidizing information can be traced and accountable, and personal privacy information is effectively protected; optimizing a consensus mechanism, introducing the matching degree of the subsidy type and the credit score of an authoritative credit department, promoting the subsidiary to implement the integrity behavior, and feeding back the loss behavior to the integrity file of a credit unit to promote the integrity subsidization.
The invention relates to a subsidizing method of a concealable real name based on a matrix alliance chain, which comprises the following steps,
s1, initializing a alliance chain system to generate public parameters, wherein participants of the alliance chain comprise a person to be helped, a supervision mechanism and a key generation center;
s2, constructing a dream block to form a transverse chain in the matrix union chain; person to be helpedSubmitting application and subsidization information to the alliance chain system, and supervising the nodeThe application and the subsidy information are audited and verified, and the dreamy transaction information issued by the subsidee is packagedAnd generating a copy of the transactionThe supervisory node broadcasts transaction informationAnd transaction copiesThe consensus node compares the transaction information according to a consensus mechanismAnd transaction copiesPerforming verification and sending the verified transaction informationAnd transaction copiesWriting a dream block;
s3, constructing a subsidy block to form a vertical chain in the matrix alliance chain; help peopleFinish the person who is helpedAfter the subsidization, acquiring the subsidized certificate issued and endorsed by the supervision nodeSupervision node broadcasts subsidized transactionsAnd transactional copies thereofThe consensus node proceeds with the subsidized transaction according to the consensus mechanismAnd transactional copies thereofPerforming verification and subsidizing the transaction after verificationAnd transactional copies thereofStoring the data into a transaction pool; the main consensus node is based on the person under investigationIDAnd subsidized type of packagingBlocks broadcast to a blockchain network, verifying the correctness of the blocks from consensus nodes and voting, the number of votes exceeding a thresholdThe chain can be wound;
s4 qualified personWhen the subsidy information is wanted to be hidden, the subsidy person sends out a transaction modification request to supervise the nodeAfter receiving the request, quickly positioning the coordinates of the block where the transaction is locatedAfter verifying the identity of the sponsor, a pseudo-identity is generated for the sponsorAnd issuing a new certificate of subsidyAfter the mutual identification node passes the verification, the mutual identification node modifies the transaction information on the chain to hide the real name according to a mutual identification mechanism through the whole network broadcasting, and the sponsor can still apply for recovering the real name information from the supervision node after hiding the real name;
s5 qualified personWhen wanting to hide the subsidized information, the person to be subsidizedAfter receiving the subsidization, initiating a request for deleting the subsidization release, and supervising the nodeAfter receiving the request, the uplink inquires the transaction data of the person to be helped, and after verifying the information of the person to be helped, the supervisory nodeAnd initiating a deletion transaction, and modifying the dream block after the consensus node verifies according to the consensus mechanism.
Further, the specific step of S1 is:
s1-1, each participating user generates character string associated with own identityThe character strings generated by the sponsor, the supervising authority and the key generation center and associated with the identity information are respectively expressed as:
s1-2, inputting safety parametersSelecting addition cycle groupsAnd multiplication loop groupAnd is and,is composed ofThe large prime number of bits is the number of bits,into a groupAnd define such anBilinear mapping:;
S1-3, selecting random number at random by key generation centerAs the system master key, and calculates its public key asDefining 6 secure hash functions, which are respectively:
and a pair of encryption and decryption algorithms,Disclosure of system parametersAnd is recorded on the block chain,display moduleThe multiplicative group of the remaining class ring of (c),which represents the public key(s),indicating indefinite lengthA string of bits is then transmitted through the bit string,to represent(ii) a Of a long bit lengthA bit string;
s1-4, the key generation center provides the identity character string according to each participated userComputing,,,And anWherein, in the step (A),is a public and private key pair of a user,for the user block chain public key address,is the user's registration certificate, is generated by the private key signature of the key generation center,in order to be the registration number,is a universal hash function and then is transmitted through a secure channelAnd sending the data to the user.
Further, the step of S2 is:
s2-1, the person of interestPackaging personal registration information, dream content and type generating messagesAnd calculating the digital signature thereofWherein, in the step (A),sending messages for current timestampsTo a blockchain network;
s2-2, supervision nodeReceiving the person to be helpedMessageThen, first, the current timestamp is selectedDefinition ofIs the effective difference between the timestamp of the message and the timestamp of the received message, ifIf the message is valid, otherwise, the dialog is terminated, and then the following formula is calculated to verify the correctness of the message:
(ii) a If the above formula is established, receiving the message, verifying that the dream content and type of the person to be helped are correct, and returning confirmation information;
s2-3, supervision nodePacking the patrons according to the trading format of the dream blocksSubmitted information and generating a transaction copy, as follows:
wherein the content of the first and second substances,containing personal real information of a sponsorAnd,for transaction copiesAnd the two character strings are not included,is the signature of the supervising node on the transaction,the time is generated for the transaction,the label is a label of the dream block chain and is used for positioning block coordinates and a transaction position when the block chain is edited subsequently;
s2-4, supervision nodeBroadcasting the transaction and the transaction copy, verifying the transaction and the transaction copy by the consensus node according to the consensus mechanism, and verifying the transaction and the transaction copy according to the consensus mechanism after the verification is passedThe label is written into the dream block and an index list is establishedSaved as down-link data to a local database, whereinThe height of the block is used for fast positioning of the process of generating the subsidized chain, and two merkleroots are stored in the data structure of the block and are respectively、Correspondingly, the block header will store two hash values of the previous block, and the blocks are linked by the light chain and the dark chain, so as to ensure that the block chain structure is not damaged when modifying the contents of the block chain, that is:
wherein the content of the first and second substances,which represents the current block of the video stream,two hash values representing the previous block,a random number representing the current block is generated,representing the generation timestamp of the block.
Further, the step of S3 is:
s3-1, sponsorFinish the person who is helpedFunds transfer or service to a blockchain address of the mobile station, generating subsidy informationTo supervision nodeSending a generate funding certificate request,
Wherein the content of the first and second substances,the presentation of the sponsored content is performed,representing cryptographic algorithms, supervisory nodesAfter receiving the request, executing the decryption algorithmTo obtainIf and subsidizing the messageIs directly formed byCalculated valueIf they are equal, the request is confirmed to be received and the certificate of subsidy is issuedWhereinGenerating time for the certificate and endorsing;
s3-2, supervision nodeGenerating transactions according to the transaction format of the funded blockAnd copies of transactionsAnd broadcast to the whole network, verified by the consensus node according to the consensus mechanism, and in addition, the supervision nodeAnd also provide subsidized objectsRelated information ofFor block positioning;
wherein the content of the first and second substances,transaction copyDoes not include the personal related information of the sponsor,,Representing the supervisory node's signature on the transaction,means that the sponsor's public key is used to encrypt the corresponding certificate, and the certificate is used for receiving the certificate and then decrypting the certificate with the own private key to obtain the sponsorship certificate,representing a transaction generation time;
s3-3, after the transaction and the copy verification are passed, the main consensus node will trade according to the consensus mechanismAnd copiesIs deposited into a transaction pool and then willTo the same person under charge within a period of timeThe subsidized transactions are packaged into blocks and broadcast to a network of block chains, the blocks are verified from consensus nodes, and votes are cast over a thresholdThen, calculate the indexPositioningHeight of the blockheightLinking the block to a corresponding subsidized chain, the height of which is defined asdepthBlock coordinates of a transaction in the matrix federation chain: (height, depth) (ii) a Similarly, there are two merkleroot values in the block data structure of the grant chain, which are respectivelyAndand two hash values of the previous block, and the blocks are linked by a light chain and a dark chain.
Further, the specific content of S4 is:
WhereinIn order to modify the coordinates of the block where the transaction is located,in order to be able to use the encryption algorithm,a certificate of subsidy is represented and,is the current timestamp;
s4-2, supervision nodeReceive toFirst, select the current timestampIf, ifThe message is valid, according toQuery local database to obtainExecuting a decryption algorithm,
s4-3, after the message passes the verification, the supervision nodeFor the person of interestGenerating a pseudo-identityAnd issue a new certificate of subsidyEndorse in parallel, then supervise the nodeGenerating new transaction data
WhereinWhereinWhich represents the time at which the transaction was generated,a digital signature is represented for the transaction,represents a chain tag; furthermore, a supervisory nodeThe coordinate of the block where the transaction to be modified is located is also provided to the consensus nodeAnd modifying the identity information of the request originator;
S4-4, recognizing according to a recognition mechanismNode-to-node transactionsAfter the verification is passed, according toAndquickly inquiring the transaction to be modified and then sending the transaction to be modifiedIs replaced byRecalculating the value of merklerootAt this time, the bright chain between the block and the subsequent block is broken due to the change in the value of merkleroot, andthe value of (d) remains unchanged, so the dark chain maintains the integrity of the subsidized chain; if it isIf the block is also changed, the block is indicated to be subjected to unauthorized tampering;
s4-5, qualified personWhen the real name is needed again, a modification request is sent, and the node is monitoredRelevant endorsement content can be obtained by searching a local database, and steps S4-1 to S4-3 are carried out after identity verification to complete real name modification. When the information is subjected to false information or public welfare disputes, the information can still be checked, and traceability and accountability are ensured.
Further, the specific step of S5 is:
WhereinThe height of the dream block is the height of the dream block,a timestamp of the current request;
s5-2, supervision nodePerson receiving the informationAfter the sent deleting request, the current time is selected firstIf, ifIf the request is valid, then the uplink query obtains the transaction data
ComputingIf, ifIf yes, the identity of the person to be helped is credible; otherwise, the person is illegal orIf the value is subject to unauthorized tampering, the session is terminated;
s5-3, qualified personWhen the identity verification passes, the node is supervisedGenerating new transaction dataBroadcasting, and providing the height of the block to be modified;
S5-4, according to the consensus mechanism, after the consensus node is verified, the block to be modified is deleted, specifically, the original block is deletedIs replaced byAnd recalculatedDue to this value change, for the dream chain, the latter blockCurrent block stored thereinThe first hash value is changed, and the second hash value is kept unchanged, so that the structure of the dream chain is kept complete; similarly, for the subsidy chain, the second hash value stored in the first subsidy block is unchanged, and the structure of the subsidy block is complete; because the transaction content on the subsidized chain does not contain the person to be subsidizedThe corresponding subsidy certificate is encrypted, only the subsidy node with the corresponding private key can see the corresponding subsidy certificate, and the subsidy person cannot be inquired by other nodesThe related information of (2).
Further, the consensus mechanism is a practical Byzantine fault-tolerant mechanism based on multi-factor voting, and the consensus nodes are a sponsor and a helped person; the common knowledge of the common knowledge node is obtained when the transaction is issued or modified on the chain, and the common knowledge node calculates the matching degree through synthesisSDSubsidy limitSACredit rating of the sponsorCSThree-factor voting before rank selectionThe consensus node of the bit participates in consensus, each timeAnd (5) when the hour changes, reorganizing the election voting.
Further, according to the consensus mechanism, the step of verifying the consensus node is as follows:
s6-1, when the matrix alliance chain is cold-started, the supervising nodeWriting the subsidized transaction information into the founding block; the key generation center KGC distributes independent block chain addresses to each nodePrivate keyAnd public keyThe public key of the sponsor is only to the monitorThe management node and the consensus node are public, the account address written into the block is public and visible, and the account address not written into the block is not displayed in the network;
s6-2, third party credit organization in supervision organizationTo newly joined subsidized nodeCredit awarding score(ii) a Supervision nodeReading sponsoring nodesCertificate of subsidization ofRecording the subsidy value of the nodeAccording to the type of subsidizationtypeCalculating subsidized matching degree score;
S6-3, when entering into the voting time, the supervision nodeCalculating a composite score for the election node(ii) a Wherein the content of the first and second substances,,is toThe result of the normalization processing is selected before the grade sortingThe node of the bit acts as a consensus node;
s6-4, after the first group of consensus nodes are generated, the method is carried outWithin the time, the consensus nodes sequentially act as the main nodes according to the ranking; master nodeSPSubsidized transaction to be validatedPacking the information into a block, generatingSending the data to other slave nodes; the next node behind the main node is a secondary main node, and is packed with the main node at the same time, and blocks generated by the main node can be sent out when the main node has errors;
s6-5, and the rest slave nodesAfter receiving the pre-prepared message sent by the main node, verifying the signature, and if the verification is passed and the block uplink is approved, sending a confirmation messageForwarding to other consensus nodes, and sending if overtime or disapproval;
S6-6, after each consensus node receives the preparation message, when the number of the received effective preparation messages is large(maximum number of malicious nodes)) Calculate approvalAnd disfavorDetermining the number of tickets in the acknowledgment messageValue, node broadcast acknowledgement informationConfirmWhen an acknowledgement message is receivedIf so, executing the request;
s6-7, if the client receivesIf the responses are the same, the request initiated by the client side is proved to have the common consensus of the whole network, otherwise, the request needs to be sent again;is the number of system nodes, if the maximum number of malicious nodes allowed by the systemThen, it requires;
S6-8, if the malicious node is found, updating the credit scoreWherein, in the step (A),and sending the credit to a third party credit facility(ii) a If it is finishedIf the node is in the round of consensus, the credit score of the node is updated to be。
The invention has the beneficial effects that: 1. the method is different from the traditional subsidized public welfare mode, introduces the subsidizing type in the block subsidizing transaction of the method, adds the service subsidization, provides more subsidizing ways for the masses with more enthusiasm public welfare, fully exerts the enthusiasm of the subsidiaries and helps the subsidiaries more pertinently;
2. based on the scene classification subsidy mode, the consensus nodes are selected according to the subsidy matching degree, the credit value and other factors, so that each node is facilitated to participate in consensus, the influence of the credit value on the consensus is enhanced, the advantage that the node is easier to acquire the bookkeeping right due to multiple participation in the consensus is weakened, and the fair and justice of the consensus is facilitated;
3. based on the privacy protection of the sponsor and the sponsor, the sponsor and the sponsor can select to hide the personal real name information on the alliance chain through the optimized block chain structure so as to avoid being permanently recorded by the network and permanently concerned by the public; but can still ensure that the subsidizing and subsidized information is just public and transparent and traceable, and avoid public welfare disputes caused by false behaviors such as forged information or deception; on the premise of ensuring traceability, selecting whether real-name published rights are handed back to the user;
4. establishing a matrix alliance chain, and enabling a supervision node and a consensus node to quickly locate the position of a block to be modified in a transaction through coordinate information of the block on the chain and a down-chain index list, so that the improvement of block modification efficiency is facilitated;
5. an authoritative credit department, such as a Chinese people bank, a public security bureau or a payment treasure, is introduced to participate in supervision, endorsement authentication of dreams and dreams patrons is performed, credit scoring is granted to patrons, and when the patrons have distrust or malicious behaviors in a alliance chain, the credit is recorded in an integrity file of the real world at the same time, so that integrity of the patrons is facilitated to be used, and an effective credit feedback supervision mechanism is formed;
6. through a cryptographic method, any attacker cannot acquire real subsidy information or judge the real identity through the data operation of the dreams or the dreams, and the data privacy of the dreams and the dreams is protected.
Drawings
In order that the present invention may be more readily and clearly understood, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings.
FIG. 1 is a diagram of a model of the system of the present invention;
FIG. 2 is a block structure diagram;
FIG. 3 is a diagram of a matrix federation chain structure;
fig. 4 is a flow chart of the present invention.
Detailed Description
The important terms and constraints of the present invention are as follows:
federation chain: the block chain is a block chain type data structure which is not counterfeitable, difficult to tamper and traceable and is constructed through transparent and credible rules under a peer-to-peer network environment, and the mode of generating, accessing and using credible data is realized and managed. A federation chain generally refers to a chain formed by multiple parties after multiple entities reach a certain agreement or after a service federation is established, and members joining the federation chain need to be verified. The generation of each block is determined by all preselected nodes in common (preselected nodes participate in the consensus process), other access nodes can participate in the transaction, but no billing process is asked, and anyone else can make a qualified query through the API opened by the blockchain.
Matrix federation chain: the method comprises the steps of constructing a transverse chain (dream chain) and a longitudinal chain (subsidizing chain) in the alliance chain, wherein the transverse chain takes the height of a dream block as a transverse coordinate, the longitudinal chain takes the depth of the subsidizing block as a longitudinal coordinate, the unique position of the block in the alliance chain can be located through the block coordinate, and the practical meaning of the coordinate is a certain subsidizing behavior for a dream of a dream. This type of federation chain and block is called a "matrix federation chain" because its representational form is similar to a matrix.
A hash function: the binary value string with any length is mapped into the binary value string with fixed length, and the mapping rule is the hash algorithm. And the binary value string obtained after mapping through the original data is the hash value.
Tree: the Merkle tree is a hashed binary tree, which is a data structure used for rapid generalization and checking of large-scale data integrity. Such a binary tree contains cryptographic hash values. The term "tree" is commonly used in computer science to describe a data structure with branches.
A consensus mechanism: the consensus mechanism is that the transaction is verified and confirmed in a short time through the voting of special nodes; if several nodes with irrelevant interests can achieve consensus on a transaction, the whole network can be considered to achieve consensus on the node.
Practical Byzantine fault-tolerant algorithm: PBFT, Practical Byzantine factory Tolerance. PBFT is a practical consensus mechanism for implementing byzantine fault tolerance, where one node in the system is treated as the master node, while the other nodes are all child nodes. All nodes in the system communicate with each other, and the final goal is to achieve the consensus of data by a few principles subject to majority; PBFT requires a total number of nodes of𝑛Can accommodate at mostThe Byzantine node has wider application in a alliance chain.
The application scene of the invention can realize the children dream in the country, and the invention can help the country to be happy. The scheme described in the present invention includes the following four entities, as shown in fig. 1.
Dreams to family: the management system is characterized in that a receiver is referred, a country child with a dream in a country commonweal scene can complete real-name registration through the help of a parent teacher or other guardians, and the dream, the dream and all the subsidy information are identified and recorded on a alliance chain after the supervision organization endorsement is authenticated; after the dream is finished or when the dream no longer needs to be subsidized, the dreams can choose to hide the name information of the dreams.
The dream enlivenment person: refers to a person of interest, which may be an individual or a group; the dreams sponsor can check colorful dreams on a alliance chain after real-name registration and authentication by a supervisory organization, property subsidization or service subsidization is selected, dreams are realized by dreams, subsidizing information is recorded on the alliance chain, and then the dreams sponsor can select whether to hide personal real-name information on the alliance chain.
A supervision mechanism: the regulatory bodies are composed of government regulatory bodies, public welfare bodies and third-party credit bodies. The third party credit institution awards credit scores according to the credit record of the sponsor but does not participate in consensus when the sponsor is authenticated by the credit institution, and the credit record is recorded in the credit department credit record when the sponsor has a loss-of-credit behavior in the alliance chain.
The key generation center: and initializing common parameters, and generating and distributing keys and registration certificates for each member in the scheme.
The invention relates to a subsidizing method of a concealable real name based on a matrix alliance chain, a scheme model diagram is shown in figure 1, a specific flow is shown in figure 4, and the subsidizing method comprises the following steps:
s1, initializing a system, generating public parameters such as a security parameter, a system public key, an encryption and decryption algorithm, a secure hash function and the like, wherein participants are dreams (children in a poor country are Zhang Ming), dream sponsors (a finite company of an enterprise 'love class' focusing on online courses), supervision agencies (including a public welfare agency 'love core Seisakun', a local civil administration department, a third party credit agency (Chinese people bank credit center) and a Key Generation Center (KGC));
s1-1, each participant generates character string associated with own identityThe character strings which are respectively generated by the supervisors and the credit investigation center of the cooperation of Zhang Ming, love classroom company, civil administration department and 'love research' and are associated with the identity information are respectively expressed as follows:
s1-2, inputting safety parametersSelecting addition cycle groupsAnd multiplication loop groupAnd is and,is composed ofThe large prime number of bits is the number of bits,into a groupAnd define such a bilinear map:;
S1-3, KGC random selection random numberAs the system master key, and calculates its public key as(ii) a Defining 6 secure hash functions, which are respectively:
and a pair of encryption and decryption algorithms,Disclosure of system parametersAnd recording to the block chain; wherein, r represents a random number,display moduleThe multiplicative group of the remaining class ring of (c),which represents the public key(s),indicating indefinite lengthA string of bits is then transmitted through the bit string,to represent(ii) a Of a long bit lengthA bit string; (ii) a
S1-4, the key generation center provides the identity character string according to each participated userComputing,,,And anWherein, in the step (A),is a public and private key pair of a user,for the user block chain public key address,is the user's registration certificate, is generated by the private key signature of the key generation center,in order to be the registration number,is a universal hash function and then is transmitted through a secure channelAnd sending the data to the user.
S2, constructing a dream block to form a transverse chain (a dream chain) in the matrix union chain; zhang mingSubmitting personal registration information to the alliance chain system, and information of dream and service subsidization needed for being an outreachMThe civil bureau and love chips are used as supervision nodes to check the authenticity of personal information and dream of Zhangming children, and after the verification is passed, Zhangming children are packagedIDBlock chain addressAddrThereby becoming the dream content of the external officermsgType of service funding requiredtypeThe information is used as the transaction information of dreamAnd generating a copy of the transaction(containing no Zhang Ming)IDAnd a block chain addressAddr) Broadcasting, broadcastingAnd copiesAccording to the consensus mechanism, the consensus node verifies and writes the dream block, and the block structure is shown in FIG. 2. Light and dark double chains are connected between the dream blocks to form a dream chain as shown in figure 3.
The specific implementation steps of S2 are as follows:
s2-1 Zhang mingPacking personal registration information, dream content and type generation message of outreachAnd calculating the digital signature thereofWherein, in the step (A),sending messages for current timestampsTo a blockchain network;
s2-2, civil government office and love research formed supervision nodeReception of Zhang MingMessageThen, first, the current timestamp is selectedDefinition ofIs the effective difference between the timestamp of the message and the timestamp of the received message, ifIf the message is valid, otherwise, the dialog is terminated, and then the following formula is calculated to verify the correctness of the message:
if the above formula is established, receiving the message, verifying that the dream content and type of the person to be helped are correct, and returning confirmation information;
s2-3, supervision nodePacking Zhangming according to trading format of dream blockSubmitted informationAnd generating a copy of the transactionThe following are:
wherein the content of the first and second substances,containing personal truth informationAnd,to trade a copy, not including both strings,is the signature of the supervising node on the transaction,the time is generated for the transaction,the label is a label of the dream block chain and is used for positioning block coordinates and a transaction position when the block chain is edited subsequently;
S2-4、supervision nodeBroadcast transactionsAnd copies of transactionsAccording to the consensus mechanism, the consensus node verifies the transaction and the copy thereof, and the verification is carried out according to the resultThe label is written into the dream block and an index list is establishedSaved as down-link data to a local database, whereinThe height of the block is used for fast positioning of the process of generating the subsidized chain, and two merkleroots are stored in the data structure of the block and are respectively、Correspondingly, the block header will store two hash values of the previous block, and the blocks are linked by the light chain and the dark chain, so as to ensure that the block chain structure is not damaged when modifying the contents of the block chain, that is:
wherein the content of the first and second substances,which represents the current block of the video stream,two hash values representing the previous block,a random number representing the current block is generated,representing the generation timestamp of the block.
S3, constructing a subsidy block to form a vertical chain (subsidy chain) in the matrix alliance chain; love course companyZhang MingObtaining subsidy certification after subsidizing online English course free of chargeThe certificate is issued and endorsed by the civil bureau and the love chips together, and then the supervision node broadcasts the transactionAnd transactional copies thereofThe transaction content includes course and its associated information, certificate and type, the copy does not contain course enterprise information, the consensus node verifies the subsidized transaction according to the consensus mechanism, after the verification is passed, the subsidized transaction and its copy are stored in the transaction pool, after a period of time, the main consensus node verifies the subsidized transaction and its copy according to the declared informationIDAnd the subsidized types are packaged into blocks, broadcast to the block chain network, verify the correctness of the blocks from the consensus nodes and vote that the number of tickets exceeds the threshold valueAnd finally, chaining is carried out. For all assets of Zhang MingThe subsidized blocks are recorded on the subsidized chain linked to the expanded dream blocks, the structure of the subsidized blocks is shown in FIG. 2, and the structure of the subsidized chain is shown in FIG. 3.
The specific implementation steps of S3 are as follows:
s3-1, Aijie course CoComplete the explanation of the inventionThe block chain address of the user uses the account password of the English course resource for free to generate the subsidy information
Wherein the content of the first and second substances,the presentation of the sponsored content is performed,representing an encryption algorithm, the supervisory node executing a decryption algorithm upon receipt of a requestTo obtainIf and subsidizing the messageIs directly formed byCalculated valueIf they are equal, the request is confirmed to be received and the certificate of subsidy is issuedWhereinGenerating time for the certificate and endorsing; (ii) a
S3-2 supervisory nodeGenerating transactions according to the transaction format of the funded blockAnd copies of transactionsAnd broadcast to the whole network, verified by the consensus node according to the consensus mechanism, and in addition, the supervision nodeAlso needs to provide Zhang MingRelated information ofFor block positioning;
wherein the content of the first and second substances,transaction copyEnterprise related information without including love course,,Representing the supervisory node's signature on the transaction,the public key of the love course is used for encrypting the corresponding certificate, the public key is used for decrypting the love course after receiving the love course by the private key of the love course to obtain the subsidized certificate,representing a transaction generation time;
s3-3 transactionAnd copies of transactionsAfter the verification is passed, the main consensus node will trade according to the consensus mechanismAnd copies of transactionsIs deposited into a transaction pool and then willAim at Zhang Ming in timeOf (2)The transaction assistance is packaged into blocks and broadcast to a block chain network, the blocks are verified from a consensus node, and a vote exceeds a thresholdThen, calculate the indexPositioningHeight of the blockheightLinking the block to a corresponding subsidized chain, the height of which is defined asdepthBlock coordinates of a transaction in the matrix federation chain: (height, depth) (ii) a Similarly, there are two merkleroot values in the block data structure of the grant chain, which are respectivelyAndand two hash values of the previous block, and the blocks are linked by a light chain and a dark chain.
S4 course of loveWhen anonymous is wanted and self subsidization information is not disclosed to the outside, the course sends a transaction modification request, the request content comprises the related information of the enterprise, the coordinates of the block where the enterprise is located, and a supervision nodeAfter receiving the request, quickly positioning the coordinates of the block where the transaction is locatedAfter the identity of the love course is checked, a pseudo identity is generated for the love courseAnd issue newSubsidized certificate(ii) a Supervising the node according to the consensus mechanismBroadcasting new transaction (including information such as false identity and new certificate of sponsor) and providing coordinates of block where transaction to be modified is locatedModifying the transaction by the consensus node, wherein the block isIs changed, andthe hidden link of the subsidized link still exists, so that the integrity of the matrix alliance link structure is ensured; similarly, if the anonymous love course wants to be named after another time, only the real identity information and the old subsidy certificate need to be provided, and the clear link repair of the subsidy link can be completed through similar steps, so that a traceable and accountable mechanism after the real name is hidden is realized.
The specific implementation steps of S4 are as follows:
WhereinIn order to modify the coordinates of the block where the transaction is located,in order to be able to use the encryption algorithm,a certificate of subsidy is represented and,is the current timestamp;
s4-2, supervision nodeReceive toFirst, select the current timestampIf, ifThe message is valid, according toQuery local database to obtainExecuting a decryption algorithm,
s4-3, after the message passes the verification, the supervision nodeCourse for loveGenerating a pseudo-identityAnd issue a new certificate of subsidyEndorse in parallel, then supervise the nodeGenerating new transaction data
WhereinWhereinWhich represents the time at which the transaction was generated,a digital signature is represented for the transaction,represents a chain tag; furthermore, a supervisory nodeThe coordinate of the block where the transaction to be modified is located is also provided to the consensus nodeAnd modifying the identity information of the request originator;
S4-4, identifying the node pair for transaction according to the identification mechanismAfter the verification is passed, according toAndquickly inquiring the transaction to be modified and then sending the transaction to be modifiedIs replaced byRecalculating the value of merklerootAt this time, the bright chain between the block and the subsequent block is broken due to the change in the value of merkleroot, andthe value of (d) remains unchanged, so the dark chain maintains the integrity of the subsidized chain; if it isIf the block is also changed, the block is indicated to be subjected to unauthorized tampering;
s4-5 similarly, if love courseThe supervision node sends a modification request to want to be named againRelated endorsement content can be obtained by searching a local database, and after the identity is checked, steps S4-1 to S4-3 are carried out to complete real name modification; when the information is subjected to false information or public welfare disputes, the information can still be checked, and traceability and accountability are ensured.
S5 BengzhangWhen the dream is finished or the user no longer needs to fund, the user firstly initiates a deletion request when the user wants to cancel the dream release record, the request content comprises personal information and the height of the dream chain where the personal information is located, and a monitoring nodeAfter receiving the request, the chain inquires the well-known transaction data, verifies the personal information, initiates a deletion transaction, and modifies the dream block after passing through the common identification node verification according to the common identification mechanism.
The specific implementation steps of S5 are as follows:
WhereinThe height of the dream block is the height of the dream block,a timestamp of the current request;
s5-2, supervision nodeReception of Zhang MingAfter the sent deleting request, the current time is selected firstIf, ifIf the request is valid, then uplink inquiryObtaining transaction data
ComputingIf, ifIf yes, the identity of the person to be helped is credible; otherwise, the person is illegal orIf the value is subject to unauthorized tampering, the session is terminated;
s5-3, BenzhangmingWhen the identity verification passes, the node is supervisedGenerating new transaction dataBroadcasting, and providing the height of the block to be modified;
S5-4, according to the consensus mechanism, after the consensus node is verified, the block to be modified is deleted, specifically, the original block is deletedIs replaced byAnd recalculatedDue to this value change, for the dream chain, the latter blockCurrent block stored thereinThe first hash value is changed, and the second hash value is kept unchanged, so that the structure of the dream chain is kept complete; similarly, for the subsidy chain, the second hash value stored in the first subsidy block is unchanged, and the structure of the subsidy block is complete; because the transaction content on the subsidized chain does not contain the Zhang MingThe corresponding subsidy certificate is encrypted, only the subsidy node with the corresponding private key can see the corresponding subsidy certificate, and other nodes can not inquire the declarationThe related information of (2).
S6, implementing Practical Byzantine factory based on multifactor voting (MV-PBFT). The consensus node calculates the subsidized matching degree through synthesisSDSubsidy limitSADream patron credit ratingCSThree-factor voting before rank selectionThe consensus node of the bit participates in consensus, each timeAnd (5) when the hour changes, reorganizing the election voting. Get without loss of generality。
The consensus mechanism in the invention is a practical Byzantine fault-tolerant mechanism based on multi-factor voting, and the consensus nodes are sponsors and acceptorsHelping people; the common knowledge of the common knowledge node is obtained when the transaction is issued or modified on the chain, and the common knowledge node calculates the matching degree through synthesisSDSubsidy limitSACredit rating of the sponsorCSThree-factor voting before rank selectionThe consensus node of the bit participates in consensus, each timeAnd (5) when the hour changes, reorganizing the election voting.
According to the consensus mechanism, the step of verifying the consensus node is that
The specific implementation steps of S6 are as follows:
s6-1, when the matrix alliance chain is cold-started, the supervising nodeWriting the subsidized transaction information into the founding block; the key generation center KGC distributes independent block chain addresses to each nodePrivate keyAnd public keyThe public key of the dream sponsor is only disclosed to the supervision node and the consensus node, the account address written into the block is publicly visible, and the account address not written into the block is not displayed in the network;
s6-2, third party credit agencyFor newly-added love course companyCredit awarding score(percentile), read love course companyCertificate of subsidization ofRecording the subsidy value of the online course resource provided by the online course resource according to the market price(in thousand yuan), calculate subsidized matching scoreIf the subsidizing type of the subsidizing node is consistent with the type required by the dreams, thenAnd on the contrary,at this time, the subsidized matching degree of love courses is 1;
s6-3, when entering into the voting time, the supervision nodeCalculating the comprehensive score of the election node without loss of generality,
Wherein the content of the first and second substances,before selecting scores to rankThe node of the bit acts as a consensus node;
s6-4, after the first group of consensus nodes are generated, the method is carried outWithin the time, the consensus nodes sequentially act as the main nodes according to the ranking; master nodeSPSubsidized transaction to be validatedPacking the information into a block, generatingSending the data to other slave nodes; the next node behind the main node is a secondary main node, and is packed with the main node at the same time, and blocks generated by the main node can be sent out when the main node has errors;
s6-5, and the rest slave nodesAfter receiving the pre-prepared message sent by the main node, verifying the signature, and if the verification is passed and the block uplink is approved, sending a confirmation messageForwarding to other consensus nodes, and sending if overtime or disapproval;
S6-6, after each consensus node receives the preparation message, when the number of the received effective preparation messages is large(maximum number of malicious nodes)) Calculate approvalAnd disfavorDetermining the number of tickets in the acknowledgment messageValue, node broadcast acknowledgement informationConfirmWhen an acknowledgement message is receivedIf so, executing the request;
s6-7, if the client receivesIf the responses are the same, the request initiated by the client side is proved to have the common consensus of the whole network, otherwise, the request needs to be sent again;is the number of system nodes, if the maximum number of malicious nodes allowed by the systemThen, it requires;
S6-8, if the malicious node is found, updating the credit scoreWherein, in the step (A),and sending the credit to a third party credit facility(ii) a If finishedThe wheel is in common knowledge,then the credit score of the node is updated to。
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and all equivalent variations made by using the contents of the present specification and the drawings are within the protection scope of the present invention.
Claims (8)
1. A subsidizing method of a concealable real name based on a matrix alliance chain is characterized in that the steps of the method are as follows,
s1, initializing a alliance chain system to generate public parameters, wherein participants of the alliance chain comprise a person to be helped, a supervision mechanism and a key generation center;
s2, constructing a dream block to form a transverse chain in the matrix union chain; person to be helpedSubmitting application and subsidization information to the alliance chain system, and supervising the nodeThe application and the subsidy information are audited and verified, and the dreamy transaction information issued by the subsidee is packagedAnd generating a copy of the transactionThe supervisory node broadcasts transaction informationAnd transaction copiesThe consensus node compares the transaction information according to a consensus mechanismAnd transaction copiesPerforming verification and sending the verified transaction informationAnd transaction copiesWriting a dream block;
s3, constructing a subsidy block to form a vertical chain in the matrix alliance chain; help peopleFinish the person who is helpedAfter the subsidization, acquiring the subsidized certificate issued and endorsed by the supervision nodeSupervision node broadcasts subsidized transactionsAnd transactional copies thereofThe consensus node proceeds with the subsidized transaction according to the consensus mechanismAnd transactional copies thereofPerforming verification and verifying the dataFacilitating transactionsAnd transactional copies thereofStoring the data into a transaction pool; the main consensus node will be the person under investigationIDAnd the subsidized types are packaged into blocks, broadcast to the block chain network, verify the correctness of the blocks from the consensus nodes and vote that the number of tickets exceeds the threshold valueThe chain can be wound;
s4 qualified personWhen the subsidy information is wanted to be hidden, the subsidy person sends out a transaction modification request to supervise the nodeAfter receiving the request, quickly positioning the coordinates of the block where the transaction is locatedAfter verifying the identity of the sponsor, a pseudo-identity is generated for the sponsorAnd issuing a new certificate of subsidyAfter the verification of the consensus node is passed, modifying the transaction information on the link to hide the real name according to the consensus mechanism through the whole network broadcasting; after the real name is hidden, the sponsor can still apply for recovering the real name information from the supervision node for tracing and checking;
s5 qualified personWhen wanting to hide the subsidized information, the person to be subsidizedAfter receiving the subsidization, initiating a request for deleting the subsidization release, and supervising the nodeAfter receiving the request, the uplink inquires the transaction data of the person to be helped, and after verifying the information of the person to be helped, the supervisory nodeAnd initiating a deletion transaction, and modifying the dream block after the consensus node verifies according to the consensus mechanism.
2. The subsidizing method of concealable real names based on the matrix federation chain as claimed in claim 1, wherein the specific steps of S1 are:
s1-1, each participating user generates character string associated with own identityThe character strings generated by the sponsor, the supervising authority and the key generation center and associated with the identity information are respectively expressed as:
s1-2, inputting safety parametersSelecting addition cycle groupsAnd multiplication loop groupAnd is and,is composed ofThe large prime number of bits is the number of bits,into a groupAnd define such a bilinear map:;
S1-3, selecting random number at random by key generation centerAs the system master key, and calculates its public key asDefining 6 secure hash functions, which are respectively:
and a pair of encryption and decryption algorithms,Disclosure of system parametersAnd is recorded on the block chain,display moduleThe multiplicative group of the remaining class ring of (c),which represents the public key(s),indicating indefinite lengthA string of bits is then transmitted through the bit string,to represent(ii) a Of a long bit lengthA bit string;
s1-4, the key generation center provides the identity character string according to each participated userComputing,,,And anWherein, in the step (A),is a public and private key pair of a user,for the user block chain public key address,is the user's registration certificate, is generated by the private key signature of the key generation center,in order to be the registration number,is a universal hash function and then is transmitted through a secure channelAnd sending the data to the user.
3. The subsidizing method of concealable real names based on the matrix federation chain as claimed in claim 1, wherein the specific content of S2 is:
s2-1, the person of interestPackaging personal registration information, dream content and type generating messagesAnd calculating the digital signature thereofWherein, in the step (A),sending messages for current timestampsTo a blockchain network;
s2-2, supervision nodeReceiving the person to be helpedMessageThen, first, the current timestamp is selectedDefinition ofIs the effective difference between the timestamp of the message and the timestamp of the received message, ifIf the message is valid, otherwise, the dialog is terminated, and then the following formula is calculated to verify the correctness of the message:
if the above formula is established, receiving the message, verifying that the dream content and type of the person to be helped are correct, and returning confirmation information;
s2-3, supervision nodePacking the patrons according to the trading format of the dream blocksSubmitted information and generating a transaction copy, as follows:
wherein the content of the first and second substances,containing personal real information of a sponsorAnd,to trade a copy, not including both strings,is a label for supervising node to dealThe name of the person to be named,the time is generated for the transaction,the label is a label of the dream block chain and is used for positioning block coordinates and a transaction position when the block chain is edited subsequently;
s2-4, supervision nodeBroadcasting the transaction and the transaction copy, verifying the transaction and the transaction copy by the consensus node according to the consensus mechanism, and verifying the transaction and the transaction copy according to the consensus mechanism after the verification is passedThe label is written into the dream block and an index list is establishedSaved as down-link data to a local database, whereinThe height of the block is used for fast positioning of the process of generating the subsidized chain, and two merkleroots are stored in the data structure of the block and are respectively、Correspondingly, the block header will store two hash values of the previous block, and the blocks are linked by the light chain and the dark chain, so as to ensure that the block chain structure is not damaged when modifying the contents of the block chain, that is:
4. The subsidizing method of concealable real names based on the matrix federation chain as claimed in claim 1, wherein the specific steps of S3 are:
s3-1, sponsorFinish the person who is helpedFunds transfer or service to a blockchain address of the mobile station, generating subsidy informationTo supervision nodeSending a generate funding certificate request,
Wherein the content of the first and second substances,the presentation of the sponsored content is performed,representing an encryption algorithm, the supervisory node executing a decryption algorithm upon receipt of a requestTo obtainIf and subsidizing the messageIs directly formed byCalculated valueIf they are equal, the request is confirmed to be received and the certificate of subsidy is issuedWhereinGenerating time for the certificate and endorsing;
s3-2, supervision nodeGenerating transactions according to the transaction format of the funded blockAnd copies of transactionsAnd broadcast to the whole network, verified by the consensus node according to the consensus mechanism, and in addition, the supervision nodeAnd also provide subsidized objectsRelated information ofFor block positioning;
wherein the content of the first and second substances,transaction copyDoes not include the personal related information of the sponsor,,Representing the supervisory node's signature on the transaction,means that the sponsor's public key is used to encrypt the corresponding certificate, and the certificate is used for receiving the certificate and then decrypting the certificate with the own private key to obtain the sponsorship certificate,representing a transaction generation time;
s3-3, after the transaction and the copy verification are passed, the main consensus node will trade according to the consensus mechanismAnd copiesIs deposited into a transaction pool and then willTo the same person under charge within a period of timeThe subsidized transactions are packaged into blocks and broadcast to a network of block chains, the blocks are verified from consensus nodes, and votes are cast over a thresholdThen, calculate the indexPositioningHeight of the blockheightLinking the block to a corresponding subsidized chain, the height of which is defined asdepthBlock coordinates of a transaction in the matrix federation chain: (height, depth) (ii) a Similarly, there are two merkleroot values in the block data structure of the grant chain, which are respectivelyAndand the previous oneTwo hash values of the blocks, and the blocks are linked by a light chain and a dark chain.
5. The subsidizing method of the concealable real name based on the matrix federation chain as claimed in claim 1, wherein the specific steps of S4 are:
WhereinIn order to modify the coordinates of the block where the transaction is located,in order to be able to use the encryption algorithm,a certificate of subsidy is represented and,is the current timestamp;
s4-2, supervision nodeReceive toFirst, select the current timestampIf, ifThe message is valid, according toQuery local database to obtainExecuting a decryption algorithm,
s4-3, after the message passes the verification, the supervision nodeFor the person of interestGenerating a pseudo-identityAnd issue a new certificate of subsidyEndorse in parallel, then supervise the nodeGenerating new transaction data
WhereinWhereinWhich represents the time at which the transaction was generated,a digital signature is represented for the transaction,represents a chain tag; furthermore, a supervisory nodeThe coordinate of the block where the transaction to be modified is located is also provided to the consensus nodeAnd modifying the identity information of the request originator;
S4-4, identifying the node pair for transaction according to the identification mechanismAfter the verification is passed, according toAndquickly inquiring the transaction to be modified and then sending the transaction to be modifiedIs replaced byRecalculating the value of merklerootAt this time, the bright chain between the block and the subsequent block is broken due to the change in the value of merkleroot, andthe value of (d) remains unchanged, so the dark chain maintains the integrity of the subsidized chain; if it isIf the block is also changed, the block is indicated to be subjected to unauthorized tampering;
6. The subsidizing method of the concealable real name based on the matrix federation chain as claimed in claim 1, wherein the specific steps of S5 are:
WhereinThe height of the dream block is the height of the dream block,a timestamp of the current request;
s5-2, supervision nodePerson receiving the informationAfter the sent deleting request, the current time is selected firstIf, ifIf the request is valid, then the uplink query obtains the transaction data
CalculatingIf, ifIf yes, the identity of the person to be helped is credible; otherwise, the person is illegal orIf the value is subject to unauthorized tampering, the session is terminated;
s5-3, qualified personIdentity verification deviceOutdated, supervisory nodeGenerating new transaction dataBroadcasting, and providing the height of the block to be modified;
7. The fundation method based on the concealable real names of the matrix alliance chain as claimed in any one of claims 1 to 6, wherein the consensus mechanism is a practical Byzantine fault-tolerant mechanism based on multi-factor voting, and the consensus nodes are a sponsor and a helped person; the common knowledge of the common knowledge node is obtained when the transaction is issued or modified on the chain, and the common knowledge node calculates the matching degree through synthesisSDSubsidy limitSACredit rating of the sponsorCSThree-factor voting before rank selectionThe consensus node of the bit participates in consensus, each timeHour(s)And finally, reorganizing the election voting.
8. The subsidizing method of concealable real names based on the matrix federation chain as claimed in claim 7, wherein according to the consensus mechanism, the step of verifying the consensus node is:
s6-1, when the matrix alliance chain is cold-started, the supervising nodeWriting the subsidized transaction information into the founding block; the key generation center KGC distributes independent block chain addresses to each nodePrivate keyAnd public keyThe public key of the sponsor is only published for the supervision node and the consensus node, the account address written into the block is publicly visible, and the account address not written into the block cannot be displayed in the network;
s6-2, third party credit organization in supervision organizationTo newly joined subsidized nodeCredit awarding score(ii) a Supervision nodeReading sponsoring nodesCertificate of subsidization ofRecording the subsidy value of the nodeAccording to the type of subsidizationtypeCalculating subsidized matching degree score;
S6-3, when entering into the voting time, the supervision nodeCalculating a composite score for the election node(ii) a Wherein the content of the first and second substances,,is toThe result of the normalization processing is selected before the grade sortingThe node of the bit acts as a consensus node;
s6-4, after the first group of consensus nodes are generated, the method is carried outWithin the time, the consensus nodes sequentially act as the main nodes according to the ranking; master nodeSPSubsidized transaction to be validatedPacking the information into a block, generatingSending the data to other slave nodes; the next node behind the main node is a secondary main node, and is packed with the main node at the same time, and blocks generated by the main node can be sent out when the main node has errors;
s6-5, and the rest slave nodesAfter receiving the pre-prepared message sent by the main node, verifying the signature, and if the verification is passed and the block uplink is approved, sending a confirmation messageForwarding to other consensus nodes, and sending if overtime or disapproval;
S6-6, after each consensus node receives the preparation message, when the number of the received effective preparation messages is largeWhereinCalculating approval for the maximum number of malicious nodesAnd disfavorDetermining the number of tickets in the acknowledgment messageValue, node broadcast acknowledgement informationConfirmWhen an acknowledgement message is receivedIf so, executing the request;
s6-7, if the client receivesIf the responses are the same, the request initiated by the client side is proved to have the common consensus of the whole network, otherwise, the request needs to be sent again;is the number of system nodes, if the maximum number of malicious nodes allowed by the systemThen, it requires;
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111323417.8A CN113781073B (en) | 2021-11-10 | 2021-11-10 | Subsidizing method capable of hiding real names based on matrix alliance chain |
PCT/CN2022/106613 WO2023082690A1 (en) | 2021-11-10 | 2022-07-20 | Matrix consortium blockchain based sponsoring method capable of concealing real name |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111323417.8A CN113781073B (en) | 2021-11-10 | 2021-11-10 | Subsidizing method capable of hiding real names based on matrix alliance chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113781073A true CN113781073A (en) | 2021-12-10 |
CN113781073B CN113781073B (en) | 2022-03-04 |
Family
ID=78873677
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111323417.8A Active CN113781073B (en) | 2021-11-10 | 2021-11-10 | Subsidizing method capable of hiding real names based on matrix alliance chain |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113781073B (en) |
WO (1) | WO2023082690A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023082690A1 (en) * | 2021-11-10 | 2023-05-19 | 南京邮电大学 | Matrix consortium blockchain based sponsoring method capable of concealing real name |
CN116846916A (en) * | 2023-09-01 | 2023-10-03 | 武汉趣链数字科技有限公司 | Data synchronization method, device, electronic equipment and computer readable storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116436979B (en) * | 2023-06-15 | 2023-08-11 | 湖南湘江树图信息科技创新中心有限公司 | Method and system for invoking external services by alliance block chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109389541A (en) * | 2018-08-21 | 2019-02-26 | 广东工业大学 | Public good fund management method based on alliance's chain |
CN109615339A (en) * | 2018-12-24 | 2019-04-12 | 浙江大学 | Volunteer based on alliance's chain contributes integration of services public good crowd and raises system and method |
CN111654363A (en) * | 2020-06-18 | 2020-09-11 | 福建师范大学 | Alliance chain privacy protection method based on group signature and homomorphic encryption |
CN111831747A (en) * | 2020-06-24 | 2020-10-27 | 西安纸贵互联网科技有限公司 | Charitable donation service system and charitable donation service platform |
CN111988290A (en) * | 2020-08-05 | 2020-11-24 | 上海交通大学 | Transaction deletion method and system under user balance privacy protection and authorization supervision |
CN112100667A (en) * | 2020-09-24 | 2020-12-18 | 南京邮电大学 | Charity organization supervision and management method based on novel block chain structure |
WO2021040134A1 (en) * | 2019-08-30 | 2021-03-04 | 김태복 | System for transacting donated article by using blockchain |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113781073B (en) * | 2021-11-10 | 2022-03-04 | 南京邮电大学 | Subsidizing method capable of hiding real names based on matrix alliance chain |
-
2021
- 2021-11-10 CN CN202111323417.8A patent/CN113781073B/en active Active
-
2022
- 2022-07-20 WO PCT/CN2022/106613 patent/WO2023082690A1/en unknown
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109389541A (en) * | 2018-08-21 | 2019-02-26 | 广东工业大学 | Public good fund management method based on alliance's chain |
CN109615339A (en) * | 2018-12-24 | 2019-04-12 | 浙江大学 | Volunteer based on alliance's chain contributes integration of services public good crowd and raises system and method |
WO2021040134A1 (en) * | 2019-08-30 | 2021-03-04 | 김태복 | System for transacting donated article by using blockchain |
CN111654363A (en) * | 2020-06-18 | 2020-09-11 | 福建师范大学 | Alliance chain privacy protection method based on group signature and homomorphic encryption |
CN111831747A (en) * | 2020-06-24 | 2020-10-27 | 西安纸贵互联网科技有限公司 | Charitable donation service system and charitable donation service platform |
CN111988290A (en) * | 2020-08-05 | 2020-11-24 | 上海交通大学 | Transaction deletion method and system under user balance privacy protection and authorization supervision |
CN112100667A (en) * | 2020-09-24 | 2020-12-18 | 南京邮电大学 | Charity organization supervision and management method based on novel block chain structure |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023082690A1 (en) * | 2021-11-10 | 2023-05-19 | 南京邮电大学 | Matrix consortium blockchain based sponsoring method capable of concealing real name |
CN116846916A (en) * | 2023-09-01 | 2023-10-03 | 武汉趣链数字科技有限公司 | Data synchronization method, device, electronic equipment and computer readable storage medium |
CN116846916B (en) * | 2023-09-01 | 2023-12-08 | 武汉趣链数字科技有限公司 | Data synchronization method, device, electronic equipment and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2023082690A1 (en) | 2023-05-19 |
CN113781073B (en) | 2022-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hanifatunnisa et al. | Blockchain based e-voting recording system design | |
CN109785494B (en) | Traceable anonymous electronic voting method based on block chain | |
CN113781073B (en) | Subsidizing method capable of hiding real names based on matrix alliance chain | |
US11481768B2 (en) | System and method of generating and validating encapsulated cryptographic tokens based on multiple digital signatures | |
Çabuk et al. | A survey on feasibility and suitability of blockchain techniques for the e-voting systems | |
CN109417549A (en) | The method and apparatus of information proof is provided using centralization or distributed ledger | |
CN108650077B (en) | Block chain based information transmission method, terminal, equipment and readable storage medium | |
US20130318619A1 (en) | Encapsulated security tokens for electronic transactions | |
CN109274501A (en) | License block chain method for secret protection based on Proxy Signature | |
CN110689415B (en) | Public resource transaction platform management system | |
CN112801778B (en) | Alliance type bad asset block chain system | |
US11250423B2 (en) | Encapsulated security tokens for electronic transactions | |
WO2018088475A1 (en) | Electronic authentication method and program | |
CN112199448A (en) | Industrial and commercial registration method and system based on block chain | |
CN109919614A (en) | A kind of method for protecting intelligent contract privacy using zero-knowledge proof in block chain | |
CN111444267A (en) | Government information sharing platform and method based on block chain | |
CN115688191A (en) | Block chain-based electronic signature system and method | |
CN108540447A (en) | A kind of certification authentication method and system based on block chain | |
Sliusar et al. | Blockchain technology application for electronic voting systems | |
CN114169888B (en) | Universal type cryptocurrency custody method supporting multiple signatures | |
CN113094748B (en) | Realization method of authenticatable anonymous E-commerce evaluation mechanism based on blockchain | |
CN114565485A (en) | Labor contract management method and system based on block chain ipfs storage | |
Ramya et al. | A Hybrid Proof of Stake-Trust Block Chain Model in Pervasive Social Networking for E-voting System | |
Kashyap et al. | Immutable and Privacy Protected E-Certificate Repository on Blockchain | |
Bose et al. | Cryptoeconomics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |