CN115361193A - Encryption system for data security based on block chain - Google Patents

Encryption system for data security based on block chain Download PDF

Info

Publication number
CN115361193A
CN115361193A CN202210980887.XA CN202210980887A CN115361193A CN 115361193 A CN115361193 A CN 115361193A CN 202210980887 A CN202210980887 A CN 202210980887A CN 115361193 A CN115361193 A CN 115361193A
Authority
CN
China
Prior art keywords
data
module
contract
block chain
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210980887.XA
Other languages
Chinese (zh)
Inventor
褚艳云
周银
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Paco Information Technology Co ltd
Original Assignee
Shanghai Paco Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Paco Information Technology Co ltd filed Critical Shanghai Paco Information Technology Co ltd
Priority to CN202210980887.XA priority Critical patent/CN115361193A/en
Publication of CN115361193A publication Critical patent/CN115361193A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of block chains, and discloses a block chain-based data security encryption system which comprises a data layer, a network layer, a consensus layer, an excitation layer, a contract layer and an application layer, wherein the data layer comprises a plurality of block chains, block chain nodes are arranged below the block chains, the block chain nodes comprise data storage modules, the data storage modules are connected with a database, the network layer comprises network modules, the excitation layer comprises excitation modules, the contract layer comprises contract modules, and the application layer comprises application modules.

Description

Encryption system for data security based on block chain
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a data security encryption system based on a block chain.
Background
A blockchain is a database with data "hash validation" functionality. The blocks are data blocks, the data blocks are combined into a chain structure according to a time sequence, a cryptology algorithm is utilized, the reliability of the database is maintained in a distributed accounting mode, sharing records of the data are stored by a third-party server, even the sharing records are not stored, so that the credibility of the sharing records is completely dependent on the third-party server or cannot be traced, and when the sharing records of the data are stored on the third-party server, if the third-party server is attacked, tampered or forged, the server cannot be trusted, so that the stored sharing records are directly caused to be untrustworthy.
Disclosure of Invention
In view of the above situation, to overcome the defects of the prior art, the invention provides a block chain-based data security encryption system, which effectively solves the problem that the sharing record of data is saved by a third-party server, even the sharing record is not saved, so that the credibility of the sharing record completely depends on the third-party server or is not traced back, and when the sharing record of data is stored on the third-party server, if the third-party server is attacked, tampered or forged, the stored sharing record becomes untrustworthy directly due to the untrustworthiness of the server.
In order to achieve the purpose, the invention provides the following technical scheme: a block chain-based data security encryption system comprises a data layer, a network layer, a consensus layer, an excitation layer, a contract layer and an application layer, wherein the data layer comprises a plurality of block chains, block chain nodes are arranged below the block chains, the block chain nodes comprise data storage modules, the data storage modules are connected with a database, the network layer comprises a network module, the excitation layer comprises an excitation module, the contract layer comprises a contract module, and the application layer comprises an application module;
the information is exchanged among the block chain nodes through a P2P network;
the network module comprises a P2P networking mechanism, a data transmission mechanism, a data verification mechanism and the like, and performs an automatic networking function;
the consensus module adopts one of PoW, poS, DPOS, DAG and PBFT as a consensus mechanism.
The incentive module is used for integrating economic factors into a block chain technology system, and comprises an economic incentive issuing mechanism, an economic incentive distributing mechanism and the like.
The data storage module is used for storing data, a bottom layer data block and related data timestamp technical data are established in the data storage module, the bottom layer data block and the related data timestamp technical data are encrypted and run through an encryption public key instruction and an encryption private key instruction which are analyzed in the data storage module, and the chain structure of the bottom layer data block, the related asymmetric public and private key data encryption technology, the timestamp technology and other technologies are packaged.
The contract module is used for packaging various script codes and algorithms of a block chain system and more complex intelligent contracts generated by the script codes and the algorithms, C + +, GO programming languages are adopted, all data on the block chain are public and transparent, when the contract module runs, any party can check the codes and the data, the intelligent contract codes deployed on the block chain and output data generated by running are also not falsifiable, by programming relevant transaction rules in advance, the contract module can automatically complete money collection and product distribution, the nodes supporting the block chain network are often hundreds of thousands, the failure of part of nodes can not cause the intelligent contract to stop, and the asymmetric encryption is adopted to encrypt the data to and determine the information contract rules of each new node when the block chain is newly added or withdrawn, and the consensus layer obtains the consensus of other nodes on the block chain;
the application module is used for carrying out interactive module with the block chain, establishes the application APP in, supplies to the user and logs in this system, looks over through establishing the application APP in and uploads and share data, looks over and shares data, receives the data of downloading again after uploading for the contact between two users.
Preferably, the contract module is connected with a contract assisting module which is used for distributed recording, storage and verification, non-falsification, forgery and the like, each participant signing the contract agrees with the contract content, default conditions, default responsibility and an external checking data source, if necessary, the contract code is checked and tested to ensure no error and then is deployed on the block chain in the form of an intelligent contract, the intelligent contract is made by a plurality of users in the block chain in a shared mode and can be used for any transaction behaviors among the users, the right and the obligation of the users are clear in the contract, developers program the right and the obligation in an electronic mode (code), the code comprises conditions which can trigger the automatic execution of the contract, namely, the contract can be automatically signed on behalf of each signing party without any central mechanism, the programmable characteristic of the intelligent contract enables the signing party to add any complex terms, the signing party can be written into a specific block of the block chain after the propagation and the verification of the node through a P2P network, the intelligent contract can be packaged with a plurality of predefined states and conversion rules, the executed contract can be triggered, the contract reaches a specific event (such as a specific time or an occurrence event), can monitor the contract and monitor the external checking data source in real time, and can be satisfied with the external checking data source, and the contract status of the external checking data, and the external conditions can be triggered in real-time.
Preferably, the contract module is connected with an encryption module, the encryption module adopts asymmetric encryption, asymmetric encryption algorithm data is established in a regional chain data system, the asymmetric encryption algorithm data is compressed into encrypted data compression packets, the encrypted data compression packets are all copied and transmitted to a data layer, a network layer, a consensus layer, an excitation layer, a contract layer and an application layer, each encrypted data compression packet is analyzed by a server to obtain an encryption public key instruction and an encryption private key instruction, the encryption public key comprises at least one first party for establishing a homomorphic agent re-encryption key pair private key A and a public key A1, at least one second party for establishing a homomorphic agent re-encryption key pair private key B and a public key B1, encrypting a plaintext B to obtain a ciphertext B1, uploading the ciphertext B1 to a block chain, encrypting the plaintext a to obtain a ciphertext A1, uploading the ciphertext A1 to the block chain, wherein the first party and the second party both obtain a public key C1 from an intelligent contract of the block chain, the first party performs proxy re-encryption on the public key C1 and the private key A to obtain a key rekeyA, the second party performs proxy re-encryption on the public key C1 and the private key B to obtain a key rekeyB, the key rekeyA is used for encrypting the data to obtain a ciphertext, the key rekeyB is used for decrypting the ciphertext, the decrypted ciphertext is uploaded to the block chain to enable the block chain to check and sign the ciphertext, and then the ciphertext is stored to a block data layer.
Preferably, the excitation module is connected with an account book module, the account book module is used for managing an account book of a blockchain including a plurality of blockchain connection nodes, each block on the blockchain management account book receives and records a key, transaction hash and a sensitive state of an encryption block, a channel administrator is selected at the same time, a hash algorithm is adopted, the hash function is used for completing workload certification calculation and generating addresses, and a character string with any length is mapped into a character string with a short fixed length through the hash algorithm.
Preferably, the application module is connected with an application scene module, the application scene module encrypts information, digitally signs and performs login authentication, the information is encrypted by an information sender through an encryption public key instruction of a receiver and then is sent to the receiver, and the receiver decrypts the information by using an encryption private key instruction of the receiver.
Preferably, the database is provided with a database encryption module, and the database encryption module is used for encrypting the information in the database, so that the phenomenon that the information in the bottom database is maliciously tampered by people and the user makes a transaction error because the user does not know the information is avoided.
Preferably, the application module is connected with a hash value calculation module, the hash value calculation module is used for performing hash value calculation on the data to be transmitted by the user to obtain a hash value of the data to be transmitted, and is used for performing digital coding on characters in the hash value to obtain the number of the hash value, and then performing affine transformation processing on the digital character string of the hash value according to the encryption key to obtain the digital character string after affine transformation processing, and storing the digital character string in the block chain network.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the invention, the interactive flow between users and the interaction flow between the users and the block chain are reduced, the operation efficiency is increased, the credible calculation is carried out by using an intelligent contract, the calculation flow is enabled to be visualized, the credibility of the calculation result is increased, in the whole data sharing process, data exists and is transmitted in a ciphertext mode, the invisibility of the data can be ensured to the greatest extent, the data leakage can be prevented, the safety of the data sharing process is improved, the data sharing process is anchored to the block chain in a transaction hash mode, the data certainty can be realized, and the source attribution of the data can be recorded;
2. according to the invention, an asymmetric public and private key data encryption technology and a timestamp technology are used, technical data such as a layer data block and a related data timestamp are encrypted and run through an encrypted public key instruction and an encrypted private key instruction which are analyzed in a data layer, and users independently use respective private keys to independently chain up, so that the risk brought by private key leakage is reduced;
3. according to the invention, the database encryption module is arranged in the database and is used for encrypting the information in the database, so that the phenomenon that the information in the bottom database is maliciously tampered by people and the user does not know to cause transaction errors is avoided.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
In the drawings:
FIG. 1 is a block diagram of the system of the present invention;
FIG. 2 is a block diagram of a blockchain system according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments; all other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Referring to fig. 1-2, a block chain-based data security encryption system includes a data layer, a network layer, a consensus layer, an excitation layer, a contract layer, and an application layer, where the data layer includes a plurality of block chains, block chain nodes are separately arranged below the block chains, the block chain nodes include data storage modules, the data storage modules are connected to a database, the network layer includes a network module, the excitation layer includes an excitation module, the contract layer includes a contract module, and the application layer includes an application module;
the information exchange among the block chain nodes is carried out through a P2P network;
the network module comprises a P2P networking mechanism, a data transmission mechanism, a data verification mechanism and the like, and performs an automatic networking function;
the consensus module adopts one of PoW, poS, DPOS, DAG and PBFT as a consensus mechanism.
The incentive module is used for integrating economic factors into the block chain technology system, and comprises an economic incentive issuing mechanism, an economic incentive distributing mechanism and the like.
The data storage module is used for storing data, a bottom layer data block and related data timestamp technical data are established in the data storage module, the encryption operation processing is respectively carried out on the bottom layer data block and the related data timestamp technical data through an encryption public key instruction and an encryption private key instruction which are analyzed in the data storage module, and the chain structure of the bottom layer data block is packaged, and technologies such as a related asymmetric public and private key data encryption technology and a timestamp are packaged.
The contract module is used for encapsulating various script codes and algorithms of a block chain system and generating more complex intelligent contracts by using the script codes and the algorithms, adopts C, C + +, GO programming languages, all data on the block chain are public and transparent, when the contract module runs, any party can check the codes and the data, the intelligent contract codes deployed on the block chain and output data generated by running are not falsifiable, through programming related transaction rules in advance, the contract module can automatically complete money collection and product distribution, the nodes supporting the block chain network are often hundreds of nodes, the failure of part of the nodes can not cause the intelligent contract to stop, the asymmetric encryption is adopted to encrypt the data to come and GO, the information contract rules of each new node when the block chain is newly added or withdrawn are determined, and the consensus of other nodes is obtained on the block chain through the consensus layer;
the application module is used for carrying out the interactive module with the block chain, establishes the application APP in, supplies to the user and logs in this system, looks over through establishing the application APP in and uploads and share data, looks over and shares data, receives the data of downloading again after uploading for the contact between two users.
The contract module is connected with a contract auxiliary module, the contract auxiliary module is used for distributed recording, storage and verification, the contract auxiliary module is not capable of being tampered and forged and the like, each participant who signs a contract can achieve agreement on contract content, default conditions, default responsibility and an external verification data source, if necessary, contract codes are checked and tested to ensure that the contract codes are not correct, the contract codes are deployed on a block chain in the form of an intelligent contract, the intelligent contract is made by a plurality of users in the block chain in a co-participation mode and can be used for any transaction behaviors among the users, the right and the obligation of the users are clear in the contract, developers program the right and the obligation in an electronic mode (codes), the codes contain conditions which can trigger the automatic execution of the contract, namely, the contract can be automatically executed on behalf of each signing party without any central mechanism, the programmable characteristic of the intelligent contract enables the signing party to add any complex terms, the contract terms can be transmitted through a P2P network and verified and then written into a specific block of the block chain, a plurality of predefined states and conversion rules are packaged, situations (such as situations which trigger the execution of the contract execution of the situations (such as reaching a specific time or specific event), intelligent contract events), intelligent contract codes can be monitored and can be executed in real-time, and the external verification data sources can be triggered.
The contract module is connected with an encryption module, the encryption module adopts asymmetric encryption, asymmetric encryption algorithm data are established in a regional chain data system, meanwhile, the asymmetric encryption algorithm data are compressed into encrypted data compression packages, the encrypted data compression packages are all copied and transmitted to a data layer, a network layer, a consensus layer, an excitation layer, a contract layer and an application layer, each encrypted data compression package is analyzed through a server to obtain an encrypted public key instruction and an encrypted private key instruction, the encrypted public keys comprise at least one first party to establish a homomorphic proxy re-encryption key to a private key A and a public key A1, at least one second party to establish a homomorphic proxy re-encryption key to the private key B and a public key B1, a plaintext B is encrypted to obtain a ciphertext B1, the ciphertext B1 is uploaded to a block chain, the ciphertext A1 is encrypted to the plaintext a, the ciphertext A1 is uploaded to the block chain, the first party and the second party both obtain a ciphertext C1 from an intelligent contract of the block chain, the first party and the second party perform proxy re-encryption to the ciphertext a re-encryption to obtain a ciphertext a public key C1, the block chain, the second party performs proxy re-encryption to decrypt the ciphertext to obtain a ciphertext B, the ciphertext to obtain a public key, the public key to decrypt the ciphertext to obtain a ciphertext data, the public key to use the public key to decrypt the block chain, and decrypt the block data after the public key to obtain the ciphertext data.
The excitation module is connected with an account book module, the account book module is used for managing an account book of a block chain comprising a plurality of block chain connecting nodes, each block on the block chain management account book receives and records a key, transaction hash and a sensitive state of an encryption block, a channel manager is selected at the same time, a hash algorithm is adopted, the hash function is used for completing workload certification calculation and generating addresses respectively, character strings with any length are mapped into character strings with short fixed lengths through the hash algorithm, the decentralization calculation can be realized efficiently due to the certainty of the operation, and the sensitivity to input and the mapping inverse function are difficult to find (antigen-image attack), so that great help is provided for the safety of a block chain system.
The application module is connected with an application scene module, the application scene module encrypts information, digitally signs and logs in for authentication, the information is encrypted by an information sender through an encryption public key instruction of a receiver and then is sent to the receiver, and the receiver decrypts the information by using an encryption private key instruction of the receiver.
The database is provided with a database encryption module which is used for encrypting information in the database, so that the phenomenon that the information in the bottom database is maliciously tampered by people and users do not know the information to cause transaction errors is avoided.
The application module is connected with a hash value calculation module, the hash value calculation module is used for carrying out hash value calculation on data to be transmitted by a person to be used to obtain a hash value of the data to be transmitted, the hash value calculation module is used for carrying out digital coding on characters in the hash value to obtain the number of the hash value, then, according to an encryption key, affine transformation processing is carried out on the digital character string of the hash value to obtain the digital character string after the affine transformation processing, and the digital character string is stored in the block chain network.
In the whole data sharing process, data exist and are transmitted in a ciphertext mode, so that the invisibility of the data can be guaranteed to the greatest extent, the data leakage can be prevented, the safety of the data sharing process is improved, the data sharing process is anchored to a block chain in a transaction hash mode, the right of the data can be confirmed, the source attribution of the data is recorded, and the traceability of the data sharing process can be realized;
according to the invention, the interactive processes between users and between the users and the block chain are reduced, the operation efficiency is increased, the credible calculation is carried out by using an intelligent contract, the calculation process is streamlined and visualized, the reliability of the calculation result is increased, in the whole data sharing process, data exists and is transmitted in a ciphertext mode, the invisibility of the data can be ensured to the greatest extent, the data leakage can be prevented, the safety of the data sharing process is improved, the data sharing process is anchored to the block chain in a transaction hash mode, the definite right of the data can be realized, and the source attribution of the data can be recorded.
The invention uses the asymmetric public and private key data encryption technology and the time stamp technology, and carries out encryption operation processing on technical data such as layer data blocks, related data time stamps and the like through the encryption public key instruction and the encryption private key instruction which are analyzed in the data layer, and users independently use respective private keys to independently chain up, thereby reducing the risk brought by private key leakage.
It should be noted that, in this document, relational terms such as first and second, and the like are only used for distinguishing one entity or operation from another entity or operation without necessarily requiring or implying any actual such relationship or order between such entities or operations, and the terms "comprise", "include", or any other variation thereof are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but also other elements not expressly listed or inherent to such process, method, article, or apparatus, and the terms "mount", "connect", or "connect" should be broadly construed, for example, as being fixedly connected, detachably connected, or integrally connected unless expressly specified or limited otherwise; can be mechanically or electrically connected; the two elements may be directly connected or indirectly connected through an intermediate medium, and the two elements may be communicated with each other, and the specific meaning of the above terms in the present invention will be understood by those skilled in the art through specific situations.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (7)

1. A block chain based encryption system for data security, comprising: the network layer comprises a network module, the excitation layer comprises an excitation module, the contract layer comprises a contract module, and the application layer comprises an application module;
the information is exchanged among the block chain nodes through a P2P network;
the network module comprises a P2P networking mechanism, a data transmission mechanism, a data verification mechanism and the like, and performs an automatic networking function;
the consensus module adopts one of PoW, poS, DPOS, DAG and PBFT as a consensus mechanism.
The incentive module is used for integrating economic factors into a block chain technology system, and comprises an economic incentive issuing mechanism, an economic incentive distributing mechanism and the like.
The data storage module is used for storing data, a bottom layer data block and related data timestamp technical data are established in the data storage module, the bottom layer data block and the related data timestamp technical data are encrypted and run through an encryption public key instruction and an encryption private key instruction which are analyzed in the data storage module, and the chain structure of the bottom layer data block, the related asymmetric public and private key data encryption technology, the timestamp technology and other technologies are packaged.
The contract module is used for packaging various script codes and algorithms of a block chain system and more complex intelligent contracts generated by the script codes and the algorithms, C + +, GO programming languages are adopted, all data on the block chain are public and transparent, when the contract module runs, any party can check the codes and the data, the intelligent contract codes deployed on the block chain and output data generated by running are not falsifiable, through programming related transaction rules in advance, the contract module can automatically complete money collection and product distribution, the nodes supporting the block chain network are often hundreds of nodes, failure of part of the nodes can not cause the intelligent contract to stop, the incoming data is encrypted by asymmetric encryption, the information contract rules of each new node when the block chain is newly added or withdrawn are determined, and the consensus of other nodes is obtained on the block chain through a consensus layer;
the application module is used for carrying out interactive module with the block chain, establishes the application APP in, supplies to the user and logs in this system, looks over through establishing the application APP in and uploads and share data, looks over and shares data, receives the data of downloading again after uploading for the contact between two users.
2. The system according to claim 1, wherein the system comprises: the contract module is connected with a contract auxiliary module which is used for distributed recording, storage and verification, cannot be tampered and forged and the like, each participant who signs a contract agrees with the contract content, default conditions, default responsibility and an external verification data source, if necessary, the contract code is checked and tested to ensure that the contract code is correct and then is deployed on a block chain in the form of an intelligent contract, the intelligent contract is made by a plurality of users in the block chain in a cooperative mode and can be used for any transaction behaviors among the users, the right and the obligation of the users are clear in the contract, developers program the right and the obligation in an electronic mode (code), the code comprises conditions which can trigger the automatic execution of the contract, namely, the contract can be automatically executed on behalf of each signing party without depending on any central mechanism, the programmable characteristic of the intelligent contract enables the signing party to add any complicated terms, the terms can be added after the propagation and the node verification through a P2P network, the signing party can mark into a specific block of the block chain, a plurality of predefined states and conversion rules, trigger the execution of the contract (such as reaching specific time or specific events), the occurrence of the contract, the intelligent contract code can be monitored and can meet the external verification data source, and can monitor the external conditions in real-time, and can meet the external verification data source.
3. The system according to claim 1, wherein the system comprises: the contract module is connected with an encryption module, the encryption module adopts asymmetric encryption, asymmetric encryption algorithm data are established in a regional chain data system, meanwhile, the asymmetric encryption algorithm data are compressed into encrypted data compression packets, the encrypted data compression packets are all copied and transmitted to a data layer, a network layer, a consensus layer, an excitation layer, a contract layer and an application layer, each encrypted data compression packet is analyzed through a server to obtain an encrypted public key instruction and an encrypted private key instruction, the encrypted public keys comprise at least one first party to establish a homomorphic proxy re-encryption key pair private key A and a public key A1, at least one second party to establish a homomorphic proxy re-encryption key pair private key B and a public key B1, a plaintext B is encrypted to obtain a ciphertext B1, the ciphertext B1 is uploaded to a regional chain, the plaintext a is encrypted to obtain a ciphertext A1, the ciphertext A1 is uploaded to a regional chain, the first party and the second party both obtain a C1 from an intelligent contract of the regional chain, the first party perform proxy re-encryption on the public key C1 and the private key A to obtain a rekeyA, the ciphertext a second party uploads the regional chain, the ciphertext to the regional chain, the public key B to obtain a public key pair private key B, the encrypted data are decrypted data, and are stored in the regional chain, and are decrypted block chain.
4. The system according to claim 1, wherein the system comprises: the excitation module is connected with an account book module, the account book module is used for managing an account book of a block chain comprising a plurality of block chain connecting nodes, each block on the block chain management account book receives and records a key, transaction hash and a sensitive state of an encryption block, a channel manager is selected at the same time, a hash algorithm is adopted, the hash function is used for completing workload certification calculation and generating addresses respectively, character strings with any length are mapped into character strings with short fixed lengths through the hash algorithm, due to the certainty of the operation, decentralization calculation can be realized efficiently, and due to the sensitivity to input and the difficulty in finding of a mapping inverse function (antigen-image attack), the block chain system safety is greatly helped.
5. The system according to claim 1, wherein the system comprises: the application module is connected with an application scene module, the application scene module encrypts information, digitally signs and performs login authentication, the information is encrypted by an information sender through an encryption public key instruction of a receiver and then is sent to the receiver, and the receiver decrypts the information by using an encryption private key instruction of the receiver.
6. The system according to claim 1, wherein the system comprises: the database is provided with a database encryption module, and the database encryption module is used for encrypting information in the database, so that the phenomenon that the information in the bottom database is maliciously tampered by people and users make transaction errors because the users do not know the information is avoided.
7. The system according to claim 1, wherein the system comprises: the application module is connected with a hash value calculation module, the hash value calculation module is used for carrying out hash value calculation on data to be transmitted by a person to be used to obtain a hash value of the data to be transmitted, the hash value calculation module is used for carrying out digital coding on characters in the hash value to obtain the number of the hash value, then, according to an encryption key, affine transformation processing is carried out on a digital character string of the hash value to obtain a digital character string after the affine transformation processing, and the digital character string is stored in a block chain network.
CN202210980887.XA 2022-08-16 2022-08-16 Encryption system for data security based on block chain Pending CN115361193A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210980887.XA CN115361193A (en) 2022-08-16 2022-08-16 Encryption system for data security based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210980887.XA CN115361193A (en) 2022-08-16 2022-08-16 Encryption system for data security based on block chain

Publications (1)

Publication Number Publication Date
CN115361193A true CN115361193A (en) 2022-11-18

Family

ID=84033236

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210980887.XA Pending CN115361193A (en) 2022-08-16 2022-08-16 Encryption system for data security based on block chain

Country Status (1)

Country Link
CN (1) CN115361193A (en)

Similar Documents

Publication Publication Date Title
CN111737724B (en) Data processing method and device, intelligent equipment and storage medium
CN110933108B (en) Data processing method and device based on block chain network, electronic equipment and storage medium
CN112926982B (en) Transaction data processing method, device, equipment and storage medium
CN112446785A (en) Cross-chain transaction method, system, device, equipment and storage medium
JP4593533B2 (en) System and method for updating keys used for public key cryptography
CN114499895B (en) Data trusted processing method and system fusing trusted computing and block chain
US20060206433A1 (en) Secure and authenticated delivery of data from an automated meter reading system
US10880100B2 (en) Apparatus and method for certificate enrollment
CN110601848B (en) Appointment information processing method, device and system based on block chain and electronic equipment
CN112332975A (en) Internet of things equipment secure communication method and system
CN105610837A (en) Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system
CN112532656B (en) Block chain-based data encryption and decryption method and device and related equipment
CN111464315A (en) Digital signature processing method, device, computer equipment and storage medium
JP2022020595A (en) Electronic evidence trust system
CN108650096A (en) A kind of industrial field bus control system
CN111490874B (en) Distribution network safety protection method, system, device and storage medium
CN114866778B (en) Monitoring video safety system
CN113869901B (en) Key generation method, key generation device, computer-readable storage medium and computer equipment
CN115953244A (en) Transaction supervision method and device based on block chain, electronic equipment and storage medium
CN115409511A (en) Personal information protection system based on block chain
CN115361193A (en) Encryption system for data security based on block chain
CN113935874A (en) District chain-based book management system for studying income
CN114422189A (en) Park security management system and method based on block chain technology
CN112712428A (en) Block chain-based electronic certificate storage method and electronic equipment
CN116996331B (en) Block chain-based data processing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination