CN114710297B - Block chain evidence storing method, device and equipment based on aggregated signature and storage medium - Google Patents

Block chain evidence storing method, device and equipment based on aggregated signature and storage medium Download PDF

Info

Publication number
CN114710297B
CN114710297B CN202210572017.9A CN202210572017A CN114710297B CN 114710297 B CN114710297 B CN 114710297B CN 202210572017 A CN202210572017 A CN 202210572017A CN 114710297 B CN114710297 B CN 114710297B
Authority
CN
China
Prior art keywords
transaction
signature
certificate
storing
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210572017.9A
Other languages
Chinese (zh)
Other versions
CN114710297A (en
Inventor
钟一民
陈传义
郭峰
金宏洲
程亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tiangu Information Technology Co ltd
Original Assignee
Shenzhen Tiangu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tiangu Information Technology Co ltd filed Critical Shenzhen Tiangu Information Technology Co ltd
Priority to CN202210572017.9A priority Critical patent/CN114710297B/en
Publication of CN114710297A publication Critical patent/CN114710297A/en
Application granted granted Critical
Publication of CN114710297B publication Critical patent/CN114710297B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

The application relates to a block chain evidence storing method, a block chain evidence storing device, block chain evidence storing equipment and a block chain evidence storing storage medium based on an aggregation signature. The method comprises the following steps: the method comprises the steps of obtaining a certificate storage transaction after a transaction submitter signs certificate storage data of a target subject, verifying the certificate storage transaction, deleting certificate storage information in the certificate storage transaction when the verification is passed, judging whether the certificate storage transaction is an initial certificate storage transaction or an incremental certificate storage transaction, generating a block based on a certificate storage signature in the initial certificate storage transaction and carrying out chain connection certificate storage when the initial certificate storage transaction is judged, verifying whether a historical signature exists in position information of a previous transaction in the block chain of the incremental certificate storage transaction or not when the incremental certificate storage transaction is judged, carrying out chain connection certificate storage based on the certificate storage signature and the historical signature generation block of the incremental certificate storage transaction if the historical signature exists, and carrying out merging operation on signature information in the block based on the historical signature. The method and the device can reduce the storage capacity of the block chain, reduce the calculated amount during block verification, and reduce the certified data amount and verified calculated amount.

Description

Block chain evidence storing method, device and equipment based on aggregated signature and storage medium
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method, an apparatus, a device, and a storage medium for storing a blockchain certificate based on an aggregated signature.
Background
With the rapid development of the internet, a large number of transactions are conducted on line, and more electronic transaction data is generated. In order to ensure that the electronic transaction data is not tampered, the electronic data of online transaction is usually stored as evidence by using a block chain technology.
At present, because often save the deposit card information in the deposit card transaction data, safety problems such as information leakage may result in, and because a deposit card transaction corresponds to a signature, there is the signature and can occupy a large amount of block chain spaces, when providing a large amount of deposit cards when once proving, because the signature quantity is more, the signature that obtains, verify the deposit card and correspond also needs great calculated amount.
Disclosure of Invention
In view of the above, the present application provides a block chain credentialing method, apparatus, device and storage medium based on aggregated signatures, and aims to solve the above technical problems.
In a first aspect, the present application provides a block chain credentialing method based on an aggregated signature, including:
acquiring the deposit certificate transaction after a transaction submitter signs the deposit certificate data of a target subject, verifying the deposit certificate transaction, and deleting the deposit certificate information in the deposit certificate transaction when the verification is passed;
judging whether the card storage transaction is an initial card storage transaction or an incremental card storage transaction;
when the certificate storing transaction is judged to be an initial certificate storing transaction, generating a block based on a certificate storing signature in the initial certificate storing transaction and performing chain storing;
when the evidence storing transaction is judged to be the increment evidence storing transaction, whether a historical signature exists in the position information of the previous transaction of the increment evidence storing transaction in a block chain or not is verified, if yes, the block is generated to carry out chain storing on the basis of the evidence storing signature of the increment evidence storing transaction and the historical signature, and merging operation is carried out on the signature information in the block on the basis of the historical signature.
In a second aspect, the present application provides an aggregated signature-based blockchain credentialing apparatus, including:
an acquisition module: the system comprises a transaction submitting party, a verification server and a verification server, wherein the transaction submitting party is used for obtaining the certificate storage transaction after signing the certificate storage data of a target subject, verifying the certificate storage transaction and deleting the certificate storage information in the certificate storage transaction when the verification is passed;
a judging module: the system is used for judging whether the deposit transaction is an initial deposit transaction or an incremental deposit transaction;
an initial evidence storage processing module: the system is used for generating a block and carrying out chain storing and certificate based on a storing and certificate signature in the initial storing and certificate transaction when the storing and certificate transaction is judged to be the initial storing and certificate transaction;
an increment evidence storage processing module: and when the evidence storing transaction is judged to be the increment evidence storing transaction, verifying whether a historical signature exists in the position information of the previous transaction of the increment evidence storing transaction in a block chain, if so, performing chain storing on the blocks based on the evidence storing signature of the increment evidence storing transaction and the historical signature, and performing merging operation on the signature information in the blocks based on the historical signature.
In a third aspect, the present application provides an electronic device, including a processor, a communication interface, a memory and a communication bus, where the processor, the communication interface, and the memory complete mutual communication through the communication bus;
a memory for storing a computer program;
a processor, configured to implement the steps of the aggregated signature-based blockchain attestation method according to any one of the embodiments of the first aspect when executing the program stored in the memory.
In a fourth aspect, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the steps of the aggregation signature based blockchain attestation method as described in any one of the embodiments of the first aspect.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
according to the block chain evidence storing method, device, equipment and storage medium based on the aggregated signature, the evidence storing transaction after signature of the evidence storing data of the target subject is carried out by the transaction submitter is obtained, and the evidence storing information in the evidence storing transaction is deleted when the verification is passed.
Judging whether the deposit transaction is an initial deposit transaction or an incremental deposit transaction, when the initial deposit transaction is judged, generating a block based on the deposit signature in the initial deposit transaction and linking the deposit, when the incremental deposit certificate transaction is judged, verifying whether a historical signature exists in the position information of the previous transaction of the incremental deposit certificate transaction in the block chain, if so, performing chain deposit certificate based on the deposit certificate signature of the incremental deposit certificate transaction and the historical signature generation block, performing merging operation on the signature information in the block based on the historical signature, because all signatures under the same target subject are merged, historical signature data can be merged and deleted, therefore, the storage capacity of the block chain and the calculation amount during block verification are reduced, and the certified data amount, the data processing amount required by searching the certified signature and the certified verification calculation amount are also reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a schematic flow chart diagram illustrating a preferred embodiment of the aggregated signature-based blockchain credentialing method according to the present application;
FIG. 2 is a schematic diagram of an aggregated signature tree of the present application;
fig. 3 is a schematic diagram illustrating modification of signature information of a historical signature into a corresponding hash value according to the present application;
fig. 4 is a schematic diagram of a hash value of a sibling node corresponding to a node where the location information of the present application is located;
fig. 5 is a schematic diagram illustrating merging of a node where position information is located and a sibling node according to the present application;
FIG. 6 is a schematic diagram of the best case scenario after performing the merge operation;
FIG. 7 is a block diagram illustrating a block chaining verification apparatus according to a preferred embodiment of the present invention;
FIG. 8 is a schematic view of a preferred embodiment of an electronic device of the present application;
the implementation, functional features and advantages of the object of the present application will be further explained with reference to the embodiments, and with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the descriptions in this application referring to "first", "second", etc. are for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
The application provides a block chain evidence storing method based on an aggregate signature. Fig. 1 is a schematic method flow diagram illustrating an embodiment of the block chain verification method based on aggregated signatures according to the present application. The method may be performed by an electronic device, which may be implemented by software and/or hardware. The block chain evidence storing method based on the aggregation signature comprises the following steps:
step S10: acquiring the deposit certificate transaction after a transaction submitter signs the deposit certificate data of a target subject, verifying the deposit certificate transaction, and deleting the deposit certificate information in the deposit certificate transaction when the verification is passed;
step S20: judging whether the deposit transaction is an initial deposit transaction or an incremental deposit transaction;
step S30: when the certificate storing transaction is judged to be an initial certificate storing transaction, generating a block based on a certificate storing signature in the initial certificate storing transaction and performing chain storing;
step S40: when the evidence storing transaction is judged to be the increment evidence storing transaction, whether a historical signature exists in the position information of the previous transaction of the increment evidence storing transaction in a block chain or not is verified, if yes, the block is generated to carry out chain storing on the basis of the evidence storing signature of the increment evidence storing transaction and the historical signature, and merging operation is carried out on the signature information in the block on the basis of the historical signature.
If there are N deposits submitted by one or more different submitters under one topic, the topic is called the target topic of the deposits. For example, the transaction of an e-commerce is composed of multiple links of contract initiation, contract signing, contract fulfillment, etc., and the target subject may be "deposit certificate of user a related to the e-commerce contract determined by user B at time T, e-commerce contract number xxxxxxxx". The target topic may also be the ID of a user under which all the credentials gathered by the user are stored. The target topic may also be the ID of a certain NFT (i.e. a non-homogeneous token) under which the proof of all transactions related to that NFT is stored. The first transaction under the target subject of the deposit is called the initial transaction, the subsequent transactions are called incremental transactions, and all transactions belong to either the initial transaction or the incremental transaction. The block chain members comprise a block chain submitter and a block chain reader, the block chain submitter has the block submitting authority, the block chain reader only has the reading authority and does not have the block submitting authority.
The transaction submitter comprises an initial transaction submitter and an incremental transaction submitter, the blockchain submitter can acquire the certificate storage transaction after the transaction submitter signs the certificate storage data of the target theme, the blockchain submitter verifies the certificate storage transaction, and when the verification is passed, the certificate storage information in the certificate storage transaction is deleted, specifically, the hash operation result of the target theme and the certificate storage data is deleted from the certificate storage transaction. If the verification of the deposit transaction fails, the deposit transaction is discarded by the blockchain submitter.
And judging whether the deposit transaction is an initial deposit transaction or an incremental deposit transaction, namely judging whether the deposit transaction is submitted by an initial transaction submitter or an incremental transaction submitter. Whether a previous submitter exists to determine whether the submitted certificate-deposit transaction is an initial certificate-deposit transaction or an incremental certificate-deposit transaction can be judged under the target theme, if the previous submitter does not exist, the certificate-deposit transaction is the initial certificate-deposit transaction, and if the previous submitter exists, the certificate-deposit transaction is the incremental certificate-deposit transaction. Optionally, the transaction submitter may add a flag to the contents of the transaction, which flag serves as an identification of the initial transaction or incremental transaction.
And when the certificate storing transaction is judged to be the initial certificate storing transaction, generating a block according to the certificate storing signature in the initial certificate storing transaction and carrying out chain storing. Since the hash operation result TXH1 of the target subject TID and the initial evidence data is deleted from the initial evidence transaction TX1, only the first evidence signature TXs1 is put into the transaction list, and then the Merkle root is obtained through calculation, the blockchain submitter generates a block based on the transaction list so that the other blockchain members corresponding to the block verify the block, the logic of the blockchain submitter verifying the block can verify whether the TXs1 is the signature of the U1 on the TID and the TXH1 by using the public key of the U1, the blockchain reader only verifies the correctness of the block, and since evidence information (namely, the TXH 1) is not obtained, signature verification is not performed on the evidence name, and when the verification is passed, the block is subjected to uplink evidence.
The initial transaction submitter U1 may store the TID, the credential DATA1 and the location POS1 (the representation method may be: yy transaction of the xx th block, or xxyy) corresponding to the initial credential transaction TX1 in a storage path outside the blockchain, and the storage path outside the blockchain may be a local storage path, a cloud storage, or a P2P storage of the initial transaction submitter.
Because the storage of the certificate-storing information (namely TXH 1) is removed in the initial certificate-storing transaction, only the first certificate-storing signature TXS1 is stored, the storage amount of the block chain to the certificate-storing information is removed, and the certificate-storing safety is improved because the certificate-storing information is not exposed.
And when the evidence storing transaction is judged to be the increment evidence storing transaction, verifying whether a historical signature exists in the position information of the previous transaction of the increment evidence storing transaction in the block chain, if so, performing chain storing on the block based on the evidence storing signature of the increment evidence storing transaction and the historical signature generation block, and then performing merging operation on the signature information in the block according to the historical signature.
When the evidence storing transaction is judged to be the increment evidence storing transaction, the position information POSj of the previous transaction under the same target subject TID in the block chain is obtained from the previous submitter, and if the position has the historical signature, the historical signature is TXSPOSj. And verifying whether the historical signature exists in the position information POSj of the previous transaction of the increment evidence transaction in the blockchain (namely verifying whether TXSPOSj exists at the position of POSj), and discarding the increment evidence transaction TXI when the historical signature does not exist in the position information of the previous transaction of the increment evidence transaction in the blockchain (namely TXSSPOSj does not exist at the position of POSj).
When the historical signature TXSPOSj exists at the position of the POSj, the target subject TID, the hash operation result TXHi of the incremental certificate storage data and the position information POSj are deleted from the incremental certificate storage transaction TXI, therefore, only the aggregated signature of the second certificate storage signature TXSI and the historical signature TXSPOSj is used as a certificate storage signature to be put into a transaction list, then a Merkle root is obtained through calculation, a block chain submitter generates a block based on the transaction list so that other block chain members corresponding to the block verify the block, the logic of the block chain submitter for verifying the block can verify whether the TXSI is the signature of Ui on the TID, TXHi and POSj or not by using the public key of the Ui, and the Ui is the incremental transaction submitter of the incremental certificate storage transaction TXI. The blockchain reader only verifies the correctness of the block, and does not perform signature verification on the verification signature because the verification information (i.e., TXHi) is not obtained. When the block chain node verifies that the block passes, performing a merging operation on the signature information in the block based on the historical signature, specifically:
since the aggregated signature of the incremental certified transaction TXi has merged TXSPOSj at POSj, TXSPOSj needs to be deleted, the signature information of the historical signature TXSPOSj can be modified into a hash value corresponding to the historical signature by using a hash algorithm, for example, the historical signature TXSPOSj is located at a position of S1 in the aggregated signature tree shown in fig. 2, S1 to S8 are solid lines, S1 to S8 can be represented as signatures corresponding to the 1 st to 8 th transactions, and after the signature is modified into a corresponding hash value, the block content becomes as shown in fig. 3, that is, S1 becomes a dotted line, the dotted line represents a null value or a deleted value, the hash value H1 corresponding to S1 becomes a solid line, and the actually stored content is H1 in a Merkle tree structure. Optionally, the timing of performing the merge operation on the signature information in the block based on the historical signature is performed immediately after a new block is formed at the current time for the blockchain submitter, and immediately after an instruction sent by the blockchain submitter trusted by the self is received for the blockchain reader, where the instruction includes the TXSPOSj information. Optionally, the timing for performing the merge operation on the signature information in the block based on the historical signature is performed immediately after the new block is formed at the current time for all blockchain members, and at this time, the blockchain submitter has added the TXSPOSj information to the broadcast message of the new block.
Judging whether the value of the parallel node (i.e. the sibling node) corresponding to the node where the position information POSj is located is also the hash value, if so (as shown in fig. 4, the position of the sibling node S2 is the hash value H2), then merging the node where the position information is located and the parallel nodes to obtain merged nodes (as shown in fig. 5, merged H1 and H2 are H12, that is, H1 and H2 become dotted lines, H12 becomes solid lines, and the actually stored content is H12 in the Merkle tree structure), continuing to determine whether the value of the parallel node corresponding to the merged node is a hash value, if so, merging the merged node and the parallel nodes of the merged node, repeating the merging step until merging and deleting cannot be performed, wherein the best case of merging and deleting is shown in fig. 6, H1-8 is a solid line, the rest are broken lines, 8 data H1-H8 are reduced to H1-8, and the actually stored content is H1-8 in the Merkle tree structure. When the block chain member needs to verify the block after executing data merging and deletion, if the Merkle root is calculated to meet the hash value, the hash calculation of all subtrees of the Merkle node is not needed, so that the calculation amount can be reduced.
And the increment transaction submitter Ui stores the target subject TID, the increment evidence storage data DATAi and the position information POSi corresponding to the increment transaction outside the block chain.
Because all signatures under the same evidence storing subject are aggregated, the related historical signature data can be deleted, and the storage amount of the block chain and the calculation amount during block verification are greatly reduced.
When a prover (e.g., an authority organization) needs to perform provenance from a block chain, it is assumed that an off-chain proof stored in an ith user is depsi = DATAi | | POSi | | PKi, where PKi is a public key of the ith user, the prover collects all off-chain proofs, an off-chain proof set is DEPOS = { depsi, i ∈ [1, N ] }, the prover takes TXPOSN (i.e., a proof signature at the position of POSN) from the block chain according to POSN, and the provenance data is a target subject, an off-chain proof set DEPOS, and TXPOSN (if the verifier is a member of the block chain, TXPOSN may not be provided). Since the certified signature portion contains only one aggregated signature, the amount of certified data and the amount of data processing required to search for certified signatures is reduced.
The verifier receives the target subject TID, the off-chain memory set DEPOS and the TXPSN (if the exporter does not provide the TXPSN, the verifier takes the TXPSN out of the block chain according to the POSN)
After the DEPOS is analyzed, the combination is N signature messages:
MSG1= TID | | TXH1, where THX1 is the evidence information of DATA 1;
MSG2= TID | | TXH2| | POS1, wherein THX2 is evidence storage information of DATA 2;
by analogy, MSGN = TID | | TXHN | | | POS (N-1), wherein THXN is evidence storage information of DATAN;
the verifier verifies the TXPPOSN by the aggregated signature verification method according to MSG 1-MSGN, PK 1-PKN
If the verification is passed, the certification is approved. Since only one aggregated signature needs to be verified, the amount of verification computations for the provenance is reduced.
Further, obtaining the deposit transaction after the transaction submitter signs the deposit data of the target subject, including:
the transaction submitter executes Hash calculation on the certificate storage data to obtain a Hash operation result of the certificate storage data;
the transaction submitter signs the hash operation result of the certificate-storing data to obtain a certificate-storing signature;
and acquiring the certificate storing transaction sent by the transaction submitter, wherein the certificate storing transaction comprises the target theme, the Hash operation result and the certificate storing signature. If the evidence storing transaction is an increment evidence storing transaction, the signed object also comprises the position information of the previous transaction of the increment evidence storing transaction in the block chain.
The block chain submitter may obtain an initial credit transaction TX1 after the initial transaction submitter U1 signs the initial credit DATA, specifically, the initial transaction submitter U1 performs hash calculation on the initial credit DATA1 to obtain a hash operation result TXH1 of the initial credit DATA, the initial transaction submitter signs the hash operation result TXH1 of the initial credit DATA to obtain a first credit signature TXs1, and the U1 submits the TX1 to the block chain submitter in the block chain network, where the initial credit transaction TX1 includes a target subject TID, the hash operation result TXH1, and the first credit signature TXs 1.
The blockchain submitter may obtain the incremental deposit certificate transaction TXi after the incremental transaction submitter Ui signs the incremental deposit certificate data, specifically, the incremental transaction submitter Ui finds the previous submitter first, and it may be understood that the previous submitter may be the initial transaction submitter or the incremental transaction submitter. The method comprises the steps that position information POSj of a previous transaction in a block chain under the same target subject TID is obtained from a previous submitter, a historical signature of the position is TXSPOSj, an increment transaction submitter conducts hash calculation on increment evidence storage data DATAi to obtain a hash calculation result TXHi of the increment evidence storage data, the target subject TID, the hash calculation result TXHi of the increment evidence storage data and the position information POSj are signed to obtain a second evidence storage signature TXSI, and the increment transaction submitter Ui submits the increment evidence storage transaction TXI to the block chain submitter in the block chain network, wherein the increment evidence storage transaction TXI comprises the target subject TID, the hash calculation result TXHi of the increment evidence storage data, the position information POSj and the second evidence storage signature TXSI.
Further, verifying the credentialing transaction comprises:
and verifying whether the deposit certificate transaction is the transaction submitter, and signing the hash operation result of the target theme and the initial deposit certificate data. If the evidence storing transaction is an increment evidence storing transaction, the signed object also comprises the position information of the previous transaction of the increment evidence storing transaction in the block chain.
After the blockchain submitter acquires the initial credit transaction TX1 sent by the initial transaction submitter, the blockchain submitter verifies the initial credit transaction TX1, that is, verifies whether the initial credit transaction TX1 is the initial transaction submitter U1, signs the target subject TID and the hash result TXH1 of the initial credit data, and the blockchain submitter can verify whether the TXs1 is the signature of the U1 on the TID and the TXH1 by using the public key of the U1, and verifies that the TID and the TXH1 are approved.
After the block chain submitter acquires the increment deposit certificate transaction Txi sent by the increment transaction submitter, the block chain submitter verifies the increment deposit certificate transaction Txi, namely verifies whether the increment deposit certificate transaction Txi is the increment transaction submitter Ui, signs of the target subject TID, the hash operation result TXHi of the increment deposit certificate data and the position information POSj, and the block chain submitter can verify whether TXSI is the signature of the TID, TXHi and POSj of the Ui by using a public key of the Ui and approves the TID, TXHi and POSj after verification.
Fig. 7 is a schematic diagram illustrating functional modules of the block chain verification apparatus 100 based on aggregated signatures according to the present application.
The aggregated signature-based blockchain credentialing apparatus 100 can be installed in an electronic device. According to the implemented functions, the block chain evidence storing device 100 based on the aggregation signature may include an obtaining module 110, a determining module 120, an initial evidence storing processing module 130, and an incremental evidence storing processing module 140. A module, which may also be referred to as a unit in this application, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the obtaining module 110: the system comprises a transaction submitting party, a verification server and a verification server, wherein the transaction submitting party is used for obtaining the certificate storage transaction after signing the certificate storage data of a target subject, verifying the certificate storage transaction and deleting the certificate storage information in the certificate storage transaction when the verification is passed;
the judging module 120: the system is used for judging whether the deposit transaction is an initial deposit transaction or an incremental deposit transaction;
the initial evidence storage processing module 130: the system is used for generating a block and carrying out chain storing and certificate based on a storing and certificate signature in the initial storing and certificate transaction when the storing and certificate transaction is judged to be the initial storing and certificate transaction;
the incremental evidence storage processing module 140: and when the evidence storing transaction is judged to be the increment evidence storing transaction, verifying whether a historical signature exists in the position information of the previous transaction of the increment evidence storing transaction in a block chain, if so, performing chain storing on the blocks based on the evidence storing signature of the increment evidence storing transaction and the historical signature, and performing merging operation on the signature information in the blocks based on the historical signature.
In one embodiment, the obtaining of the deposit transaction after the transaction submitter signs the deposit data of the target subject includes:
the transaction submitter executes Hash calculation on the certificate storage data to obtain a Hash operation result of the certificate storage data;
the transaction submitter signs the hash operation result of the certificate-storing data to obtain a certificate-storing signature;
and acquiring the certificate storing transaction sent by the transaction submitter, wherein the certificate storing transaction comprises the target theme, the Hash operation result and the certificate storing signature.
In one embodiment, said verifying said credentialing transaction comprises:
and verifying whether the deposit certificate transaction is the transaction submitter, and signing the hash operation result of the target theme and the initial deposit certificate data.
In one embodiment, the deleting the deposit information in the deposit transaction includes:
and deleting the target subject and the hash operation result of the evidence storing data in the evidence storing transaction.
In one embodiment, the generating a block and performing an uplink credit based on the credit signature in the initial credit transaction comprises:
putting the deposit certificate signature of the initial deposit certificate transaction into a transaction list;
generating a block based on the transaction list so that the other block chain members corresponding to the block verify the block;
and when the verification is passed, performing uplink storage for the block.
In one embodiment, the incremental evidence processing module is further configured to:
discarding the incremental deposit transaction when it is verified that a historical signature does not exist in the location information of the previous transaction of the incremental deposit transaction in the blockchain.
In one embodiment, the performing a merge operation on the signature information in the chunk based on the historical signature comprises:
modifying the signature information of the historical signature into a hash value corresponding to the historical signature;
judging whether the value of the parallel node corresponding to the node where the position information is located is a hash value;
if so, combining the node where the position information is located and the parallel nodes to obtain a combined node;
judging whether the value of the parallel node corresponding to the merged node is a hash value or not;
and if so, merging the merging node and the parallel nodes of the merging node.
Fig. 8 is a schematic diagram of an electronic device 1 according to a preferred embodiment of the present application.
The electronic device 1 includes but is not limited to: memory 11, processor 12, display 13, and network interface 14. The electronic device 1 is connected to a network via a network interface 14. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System for Mobile communications (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), Wi-Fi, or a communication network.
The memory 11 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 11 may be an internal storage unit of the electronic device 1, such as a hard disk or a memory of the electronic device 1. In other embodiments, the memory 11 may also be an external storage device of the electronic device 1, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like equipped with the electronic device 1. Of course, the memory 11 may also comprise both an internal memory unit and an external memory device of the electronic device 1. In this embodiment, the memory 11 is generally used for storing an operating system installed in the electronic device 1 and various types of application software, such as program codes of the block chain certification program 10 based on the aggregated signature. Further, the memory 11 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 12 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 12 is typically used for controlling the overall operation of the electronic device 1, such as performing data interaction or communication related control and processing. In this embodiment, the processor 12 is configured to execute the program code stored in the memory 11 or process data, for example, execute the program code of the block chain certification program 10 based on the aggregation signature.
The display 13 may be referred to as a display screen or display unit. In some embodiments, the display 13 may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an Organic Light-Emitting Diode (OLED) touch screen, or the like. The display 13 is used for displaying information processed in the electronic device 1 and for displaying a visual work interface.
The network interface 14 may optionally comprise a standard wired interface, a wireless interface (e.g. WI-FI interface), the network interface 14 typically being used for establishing a communication connection between the electronic device 1 and other electronic devices.
Fig. 8 only shows the electronic device 1 with components 11-14 and the aggregated signature based blockchain credentialing program 10, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
Optionally, the electronic device 1 may further comprise a user interface, the user interface may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may further comprise a standard wired interface and a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an Organic Light-Emitting Diode (OLED) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable, among other things, for displaying information processed in the electronic device 1 and for displaying a visualized user interface.
The electronic device 1 may further include a Radio Frequency (RF) circuit, a sensor, an audio circuit, and the like, which are not described in detail herein.
In the above embodiment, the processor 12 may implement the following steps when executing the block chain attestation program 10 based on the aggregated signature stored in the memory 11:
acquiring the deposit certificate transaction after a transaction submitter signs the deposit certificate data of a target subject, verifying the deposit certificate transaction, and deleting the deposit certificate information in the deposit certificate transaction when the verification is passed;
judging whether the deposit transaction is an initial deposit transaction or an incremental deposit transaction;
when the certificate storing transaction is judged to be an initial certificate storing transaction, generating a block based on a certificate storing signature in the initial certificate storing transaction and performing chain storing;
when the evidence storing transaction is judged to be the increment evidence storing transaction, whether a historical signature exists in the position information of the previous transaction of the increment evidence storing transaction in a block chain or not is verified, if yes, the block is generated to carry out chain storing on the basis of the evidence storing signature of the increment evidence storing transaction and the historical signature, and merging operation is carried out on the signature information in the block on the basis of the historical signature.
The storage device may be the memory 11 of the electronic device 1, or may be another storage device communicatively connected to the electronic device 1.
For detailed description of the above steps, please refer to the above description of fig. 7 regarding a functional block diagram of an embodiment of the aggregated signature-based blockchain credentialing apparatus 100 and fig. 1 regarding a flowchart of an embodiment of the aggregated signature-based blockchain credentialing method.
In addition, the embodiment of the present application also provides a computer-readable storage medium, which may be non-volatile or volatile. The computer readable storage medium may be any one or any combination of hard disks, multimedia cards, SD cards, flash memory cards, SMCs, Read Only Memories (ROMs), Erasable Programmable Read Only Memories (EPROMs), portable compact disc read only memories (CD-ROMs), USB memories, etc. The computer-readable storage medium includes a storage data area and a storage program area, the storage program area stores an aggregated signature-based block chain attestation program 10, and when executed by a processor, the aggregated signature-based block chain attestation program 10 implements the following operations:
acquiring the deposit certificate transaction after a transaction submitter signs the deposit certificate data of a target subject, verifying the deposit certificate transaction, and deleting the deposit certificate information in the deposit certificate transaction when the verification is passed;
judging whether the deposit transaction is an initial deposit transaction or an incremental deposit transaction;
when the certificate storing transaction is judged to be an initial certificate storing transaction, generating a block based on a certificate storing signature in the initial certificate storing transaction and performing chain storing;
when the evidence storing transaction is judged to be the increment evidence storing transaction, whether a historical signature exists in the position information of the previous transaction of the increment evidence storing transaction in a block chain or not is verified, if yes, the block is generated to carry out chain storing on the basis of the evidence storing signature of the increment evidence storing transaction and the historical signature, and merging operation is carried out on the signature information in the block on the basis of the historical signature.
The embodiment of the computer-readable storage medium of the present application is substantially the same as the embodiment of the above block chaining authentication method based on aggregated signatures, and is not described herein again.
It should be noted that the above-mentioned serial numbers of the embodiments of the present application are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, an electronic device, or a network device) to execute the method according to the embodiments of the present application.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (10)

1. A block chain evidence storing method based on an aggregation signature is characterized by comprising the following steps:
acquiring the certificate storage transaction after a transaction submitter signs the certificate storage data of the target subject, verifying the certificate storage transaction, and deleting the certificate storage information in the certificate storage transaction when the verification is passed;
judging whether the deposit transaction is an initial deposit transaction or an incremental deposit transaction;
when the certificate storing transaction is judged to be an initial certificate storing transaction, generating a block based on a certificate storing signature in the initial certificate storing transaction and performing chain storing;
when the evidence storing transaction is judged to be the increment evidence storing transaction, whether a historical signature exists in the position information of the previous transaction of the increment evidence storing transaction in a block chain or not is verified, if yes, the block is generated to carry out chain storing on the basis of the evidence storing signature of the increment evidence storing transaction and the historical signature, and merging operation is carried out on the signature information in the block on the basis of the historical signature.
2. The aggregated signature-based blockchain credentialing method of claim 1, wherein obtaining the credentialing transaction after the transaction submitter signs the credentialing data of the target subject comprises:
the transaction submitter executes Hash calculation on the certificate storage data to obtain a Hash operation result of the certificate storage data;
the transaction submitter signs the hash operation result of the certificate-storing data to obtain a certificate-storing signature;
and acquiring the certificate storing transaction sent by the transaction submitter, wherein the certificate storing transaction comprises the target theme, the Hash operation result and the certificate storing signature.
3. The aggregated signature-based blockchain credentialing method of claim 1, wherein said verifying the credentialing transaction comprises:
and verifying whether the deposit certificate transaction is the transaction submitter, and signing the hash operation result of the target theme and the initial deposit certificate data.
4. The aggregated signature-based blockchain credentialing method of claim 1, wherein said deleting credentialing information in the credentialing transaction comprises:
and deleting the target subject and the hash operation result of the evidence storing data in the evidence storing transaction.
5. The block chaining verification method based on aggregated signatures as claimed in claim 1, wherein said generating blocks and performing chain crediting based on the credentialing signature in the initial credentialing transaction comprises:
putting the deposit certificate signature of the initial deposit certificate transaction into a transaction list;
generating a block based on the transaction list so that the other block chain members corresponding to the block verify the block;
and when the verification is passed, performing uplink storage for the block.
6. The aggregated signature-based blockchain credentialing method of claim 1, wherein the method further comprises:
discarding the incremental deposit transaction when it is verified that a historical signature does not exist in the location information of the previous transaction of the incremental deposit transaction in the blockchain.
7. The aggregated signature-based blockchain credentialing method of claim 1, wherein performing a merge operation on the signature information in the block based on the historical signature comprises:
modifying the signature information of the historical signature into a hash value corresponding to the historical signature;
judging whether the value of the parallel node corresponding to the node where the position information is located is a hash value;
if so, combining the node where the position information is located and the parallel nodes to obtain a combined node;
judging whether the value of the parallel node corresponding to the merged node is a hash value or not;
and if so, merging the merging node and the parallel nodes of the merging node.
8. An aggregated signature-based blockchain credentialing apparatus, the apparatus comprising:
an acquisition module: the system comprises a transaction submitting party, a verification server and a verification server, wherein the transaction submitting party is used for obtaining the certificate storage transaction after signing the certificate storage data of a target subject, verifying the certificate storage transaction and deleting the certificate storage information in the certificate storage transaction when the verification is passed;
a judging module: the system is used for judging whether the deposit transaction is an initial deposit transaction or an incremental deposit transaction;
an initial evidence storage processing module: the system is used for generating a block and carrying out chain storing and certificate based on a storing and certificate signature in the initial storing and certificate transaction when the storing and certificate transaction is judged to be the initial storing and certificate transaction;
an increment evidence storage processing module: and when the evidence storing transaction is judged to be the increment evidence storing transaction, verifying whether a historical signature exists in the position information of the previous transaction of the increment evidence storing transaction in a block chain, if so, performing chain storing on the blocks based on the evidence storing signature of the increment evidence storing transaction and the historical signature, and performing merging operation on the signature information in the blocks based on the historical signature.
9. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor, configured to implement the aggregated signature-based blockchain attestation method of any one of claims 1 to 7 when executing a program stored in a memory.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the aggregated signature-based blockchain attestation method according to any one of claims 1 to 7.
CN202210572017.9A 2022-05-25 2022-05-25 Block chain evidence storing method, device and equipment based on aggregated signature and storage medium Active CN114710297B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210572017.9A CN114710297B (en) 2022-05-25 2022-05-25 Block chain evidence storing method, device and equipment based on aggregated signature and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210572017.9A CN114710297B (en) 2022-05-25 2022-05-25 Block chain evidence storing method, device and equipment based on aggregated signature and storage medium

Publications (2)

Publication Number Publication Date
CN114710297A CN114710297A (en) 2022-07-05
CN114710297B true CN114710297B (en) 2022-09-06

Family

ID=82176774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210572017.9A Active CN114710297B (en) 2022-05-25 2022-05-25 Block chain evidence storing method, device and equipment based on aggregated signature and storage medium

Country Status (1)

Country Link
CN (1) CN114710297B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115510037B (en) * 2022-11-14 2023-03-28 杭州天谷信息科技有限公司 Block chain data deleting method and system based on business theme

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840767B (en) * 2018-01-09 2021-06-11 中国科学院计算技术研究所 Multi-party fair contract evidence storing method and system based on block chain technology
CN109040082B (en) * 2018-08-10 2020-04-21 阿里巴巴集团控股有限公司 Authentication and verification method and device for identity content information of user
CN109840769B (en) * 2019-01-21 2022-01-25 中国联合网络通信集团有限公司 Block chain based evidence storing method, device, system and storage medium
CN112446785B (en) * 2020-11-06 2023-09-22 杭州趣链科技有限公司 Cross-chain transaction method, system, device, equipment and storage medium
CN114491636A (en) * 2022-01-28 2022-05-13 上海交通大学 Data use result transaction method based on scene

Also Published As

Publication number Publication date
CN114710297A (en) 2022-07-05

Similar Documents

Publication Publication Date Title
CN109492983B (en) Electronic seal signing method, device, equipment and medium based on block chain intelligent contract
CN111163182B (en) Block chain-based device registration method and apparatus, electronic device, and storage medium
CN100565418C (en) The security ststem and the data security verification method that are used for information handling system
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
JP2006518499A (en) Ordering program data for loading into the device
CN112558946A (en) Method, device and equipment for generating code and computer readable storage medium
CN114338666A (en) Method, device, equipment and medium for verifying Fabric block chain cross-chain transaction
CN112738253A (en) Data processing method, device and equipment based on block chain and storage medium
CN114710297B (en) Block chain evidence storing method, device and equipment based on aggregated signature and storage medium
CN112631911A (en) Automatic testing method and device, computer equipment and storage medium
US7065680B2 (en) Method and a system for evaluating the reliability of a program in an electronic device, and an electronic device
CN112817935A (en) Data processing method, device and equipment based on field type and storage medium
CN111489156A (en) Transaction method based on block chain, electronic device and readable storage medium
CN109951416B (en) Credible verification method and terminal
CN113434254A (en) Client deployment method, client deployment apparatus, computer device, and storage medium
EP4040720A1 (en) Secure identity card using unclonable functions
CN111275417B (en) Transaction endorsement processing method, server and computer readable storage medium
CN112052141A (en) Data fragment verification method and device, computer equipment and readable storage medium
CN111177099A (en) Data processing method and device of business system, electronic equipment and storage medium
CN113112270B (en) Data organization method based on block chain
CN112732676B (en) Block chain-based data migration method, device, equipment and storage medium
CN114266680A (en) Block chain-based electronic contract signing method, device and system
CN113448919B (en) Method, apparatus and computer program product for creating and validating index files
CN114090682A (en) Multi-channel alliance link chaining method, device, equipment and storage medium
CN109948326B (en) Abnormal state backtracking method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant