CN115879135A - Bidding data processing method, apparatus, device and storage medium - Google Patents

Bidding data processing method, apparatus, device and storage medium Download PDF

Info

Publication number
CN115879135A
CN115879135A CN202310010271.4A CN202310010271A CN115879135A CN 115879135 A CN115879135 A CN 115879135A CN 202310010271 A CN202310010271 A CN 202310010271A CN 115879135 A CN115879135 A CN 115879135A
Authority
CN
China
Prior art keywords
result
bidding
encryption
homomorphic
bid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310010271.4A
Other languages
Chinese (zh)
Other versions
CN115879135B (en
Inventor
陈海锋
李朝霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Unicom Cloud Data Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Unicom Cloud Data Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Digital Technology Co Ltd, Unicom Cloud Data Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202310010271.4A priority Critical patent/CN115879135B/en
Publication of CN115879135A publication Critical patent/CN115879135A/en
Application granted granted Critical
Publication of CN115879135B publication Critical patent/CN115879135B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a bid inviting and bidding data processing method, a bid inviting and bidding data processing device, bid inviting and bidding data processing equipment and a storage medium, wherein the method relates to the technical field of communication, is applied to a bid inviting end and comprises the following steps: broadcasting bidding requirement information and a random number over a blockchain network; receiving a second encryption result sent by the first bidding end and a fourth encryption result sent by the second bidding end; respectively carrying out decryption processing on the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result; calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, and sending the first calculation result to the supervision end; receiving the difference between the first bidding end quote and the second bidding end quote sent by the supervising end; and the bid-winning result is determined according to the difference between the first bid-side offer and the second bid-side offer, so that the safety and fairness of bidding are improved.

Description

Bidding data processing method, apparatus, device and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a bid data processing method, apparatus, device, and storage medium.
Background
With the development of computer technology, bidding has gradually started to utilize internet technology to publish bidding information through a network system. The bidding terminal logs in the electronic system for bidding, and the bidding terminal publishes the bid-winning condition through the electronic system after checking and auditing the bidding information.
At present, in the prior art, when a bidding terminal bids, bidding data such as quotes and the like are generally directly sent to an electronic system and transmitted to the bidding terminal.
However, the bidding data in the prior art is easy to leak, and the security and fairness of bidding are low.
Disclosure of Invention
The application provides a bid data processing method, device, equipment and storage medium, which are used for solving the technical problems that bid data in the prior art are easy to leak, and bid security and fairness are low.
In a first aspect, the present application provides a bid and tender data processing method, applied to a bid and tender terminal, including:
broadcasting bidding requirement information and a random number over a blockchain network;
receiving a second encryption result sent by a first bidding end and a fourth encryption result sent by a second bidding end, wherein the second encryption result is a homomorphic encryption public key sent by a supervision end through a block chain network after the first bidding end receives the bidding requirement information and the random number, encrypting the sum of the random number and the first bidding end quoted price according to the homomorphic encryption public key to obtain a first encryption result, encrypting the first encryption result through a preset algorithm by adopting a public key of the bidding end to obtain a second encryption result, and sending the second encryption result to the bidding end; the fourth encryption result is that the second bidding terminal obtains a homomorphic encryption public key sent by a supervision terminal through a block chain network after receiving the bidding requirement information and the random number, encrypts the sum of the random number and the second bidding terminal quoted price according to the homomorphic encryption public key to obtain a third encryption result, encrypts the third encryption result through a preset algorithm by adopting the public key of the bidding terminal to obtain a fourth encryption result, and sends the fourth encryption result to the bidding terminal;
respectively carrying out decryption processing on the second encryption result and the fourth encryption result to obtain the first encryption result and the third encryption result;
calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to a supervision terminal so that the supervision terminal can decrypt the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding end quote and the second bidding end quote, and sending the difference between the first bidding end quote and the second bidding end quote to a bid inviting terminal;
receiving a difference between the first and second bidder bids;
and determining a successful bid result according to the difference between the first bidding end quote and the second bidding end quote.
Here, the bid-inviting and bidding end method provided by the embodiment of the present application applies a homomorphic technique to the comparison of the bid results, the bid-inviting end receives bid offers of two bid ends after homomorphic encryption, determines a bid-winning result by comparing the bid prices after homomorphic encryption, and obtains the bid result without knowing the bid prices through homomorphic comparison. In order to ensure the public fairness of bid inviting, the embodiment of the application is additionally provided with a supervising end, a homomorphic encrypted public and private key pair is stored through the supervising end, a homomorphic encrypted private key is issued by the supervising end, so that the bid inviting end with encrypted data does not have a decrypted private key, and the supervising end with the private key does not have encrypted data for bidding, so that any end cannot obtain a bid price before a bid result comes out, meanwhile, in order to improve the safety of the bid inviting and bidding data, the fact that the supervising end finally obtains a real bid price for analysis is avoided, a random number sent by the bid inviting end is added to the bid inviting end before sending a quote, and the possibility that the supervising end uses mass data to carry out an attack test to obtain a final bid result is avoided. The bidding data is not easy to leak, and the bidding safety and fairness are improved.
Optionally, after determining a winning result according to a difference between the first and second bidder bids, the method further includes: respectively sending the first encryption result and the third encryption result to the supervision end so that the supervision end respectively decrypts the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and sending the first homomorphic result and the third homomorphic result to the bidding end; and calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quote and the second bidding end quote, and determining whether the bidding result is valid according to the comparison result.
The method and the system can also send the first encryption result and the third encryption result to the supervision terminal after the bid-winning result is determined, the supervision terminal respectively conducts decryption processing to obtain a first homomorphic result and a third homomorphic result and sends the first homomorphic result and the third homomorphic result to the bid inviting terminal, the bid inviting terminal conducts validity judgment according to the difference between the first homomorphic result and the third homomorphic result and the difference between the first bid-end offer and the second bid-end offer to determine whether fake or wrong data exist in the transmission process or not, and the safety and fairness of the bid-winning data are further guaranteed.
Optionally, after determining a result of winning a bid according to a difference between the first and second bid-end offers, further comprising: sending the first encryption result to the supervision end so that the supervision end decrypts the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, and sending the first homomorphic result to the bidding end; and encrypting the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is valid according to the comparison result.
The method and the device can also send the first encryption result to the supervision end after the bid winning result is determined, the supervision end is enabled to conduct decryption processing, the first homomorphic result is obtained and sent to the bid winning end, the bid winning end conducts homomorphic encryption again to obtain the first homomorphic verification result, the first homomorphic verification result is compared with the first encryption result obtained in the transmission process, whether fake or wrong data are generated or not in the transmission process can be determined, and safety and fairness of bid data are further guaranteed.
Optionally, after determining a winning result according to a difference between the first and second bidder bids, the method further includes: broadcasting the successful bid result on the block chain network in a private key signature mode.
In a second aspect, an embodiment of the present application provides a bid data processing method, applied to a supervising end, including:
broadcasting a homomorphic encryption public key on a block chain network;
receiving a first calculation result sent by a bidding terminal, wherein the first calculation result is that the bidding terminal issues bidding demand information and a random number on a block chain network, receiving a second encryption result sent by a first bidding terminal and a fourth encryption result sent by a second bidding terminal, respectively decrypting the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result, calculating a difference between the first encryption result and the third encryption result to obtain a first calculation result, and sending the first calculation result to a supervision terminal; the second encryption result is that the homomorphic encryption public key sent by a supervision end is obtained by the first bidding end through a block chain network after the first bidding end receives the bidding requirement information and the random number, the sum of the random number and the quoted price of the first bidding end is encrypted according to the homomorphic encryption public key to obtain a first encryption result, the public key of the bidding end is adopted to encrypt the first encryption result through a preset algorithm to obtain a second encryption result, and the second encryption result is sent to the bidding end; the fourth encryption result is that the second bidding terminal obtains a homomorphic encryption public key sent by a supervision terminal through a block chain network after receiving the bidding requirement information and the random number, encrypts the sum of the random number and the second bidding terminal quoted price according to the homomorphic encryption public key to obtain a third encryption result, encrypts the third encryption result through a preset algorithm by adopting the public key of the bidding terminal to obtain a fourth encryption result, and sends the fourth encryption result to the bidding terminal;
decrypting the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding end quote and the second bidding end quote;
and sending the difference between the first and second bidding end quotes to a bidding end so that the bidding end determines a bid-winning result according to the difference between the first and second bidding end quotes.
Here, in the embodiment of the present application, the monitoring end is used to store the homomorphic encrypted public and private key pair, and the homomorphic encrypted private key is issued by the monitoring end, so that the bidding end with encrypted data does not have the decrypted private key, and the monitoring end with the private key does not have the encrypted data for bidding, so that any party cannot obtain the bidding price before the bidding result comes out, the bidding data is not easy to be leaked, and the security and fairness of the bidding data are improved.
Optionally, after the sending the difference between the first and second bid-side offers to a bid-inviting side so that the bid-inviting side determines a bid-winning result according to the difference between the first and second bid-side offers, the method further includes: receiving a first encryption result and a third encryption result sent by the bidding terminal; and decrypting the first encrypted result and the third encrypted result respectively through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, sending the first homomorphic result and the third homomorphic result to the bid inviting end so that the bid inviting end calculates the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the bid price of the first bidding end and the bid price of the second bidding end, and determining whether the bid inviting result is valid according to the comparison result.
Optionally, after the sending the difference between the first and second bid-side offers to a bid-inviting side so that the bid-inviting side determines a bid-winning result according to the difference between the first and second bid-side offers, the method further includes: receiving a first encryption result sent by the invitation terminal; the homomorphic encryption private key is used for decrypting the first encryption result to obtain a first homomorphic result, the first homomorphic result is sent to the bid inviting end, so that the bid inviting end can encrypt the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, the first homomorphic verification result is compared with the first encryption result, and whether the bid inviting result is effective or not is determined according to the comparison result.
In a third aspect, an embodiment of the present application provides a bid data processing apparatus, which is applied to a bid server, and includes:
a first broadcasting module for broadcasting bidding requirement information and a random number on a blockchain network;
the system comprises a first receiving module, a second encrypting module, a fourth encrypting module and a third encrypting module, wherein the first encrypting module is used for receiving a second encrypting result sent by a first bidding terminal and a fourth encrypting result sent by a second bidding terminal, the second encrypting result is a homomorphic encrypting public key sent by a supervising terminal through a block chain network after the first bidding terminal receives the bidding requirement information and the random number, the first encrypting result is obtained by encrypting the sum of the random number and the quoted sum of the first bidding terminal according to the homomorphic encrypting public key, the public key of the bidding terminal is used for encrypting the first encrypting result through a preset algorithm to obtain a second encrypting result, the second encrypting result is sent to the bidding terminal, the fourth encrypting result is a homomorphic encrypting result sent by the supervising terminal after the second bidding terminal receives the bidding requirement information and the random number, the homomorphic encrypting result sent by the block chain network is obtained, the sum of the quoted sum of the random number and the second bidding terminal is encrypted according to obtain a third encrypting result, the public key of the bidding terminal is used for encrypting the sum of the quoted sum of the third bidding result through the preset public key, the third encrypting result is sent to the fourth bidding terminal, and the fourth encrypting result is obtained by the homomorphic encrypting algorithm;
the first decryption module is used for respectively decrypting the second encryption result and the fourth encryption result to obtain the first encryption result and the third encryption result;
the first processing module is used for calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to a supervision terminal so that the supervision terminal can decrypt the first calculation result through a homomorphic encryption private key to obtain the difference between the first bid-end offer and the second bid-end offer, and sending the difference between the first bid-end offer and the second bid-end offer to a bid inviting terminal;
a second receiving module for receiving a difference between the first and second bidder bids;
and the result determining module is used for determining a successful bid result according to the difference between the first bidding end quote and the second bidding end quote.
Optionally, after the result determining module determines the winning bid result according to a difference between the first and second bid-end offers, the apparatus further includes:
the first validity authentication module is used for respectively sending the first encryption result and the third encryption result to the supervision end so that the supervision end respectively decrypts the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and sends the first homomorphic result and the third homomorphic result to the bidding end; and calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quote and the second bidding end quote, and determining whether the bidding result is valid according to the comparison result.
Optionally, after the result determining module determines the winning bid result according to a difference between the first and second bid-end offers, the apparatus further includes:
the second validity authentication module is used for sending the first encryption result to the supervision end so that the supervision end can decrypt the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, and the first homomorphic result is sent to the bidding end; and encrypting the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is valid according to the comparison result.
Optionally, after the result determining module determines the winning bid result according to a difference between the first and second bid-end offers, the apparatus further includes:
and the third broadcasting module is used for broadcasting the bid-winning result on the block chain network in a private key signature mode.
In a fourth aspect, an embodiment of the present application provides a bid data processing apparatus, which is applied to a supervising end, and includes:
the second broadcast module is used for broadcasting the homomorphic encryption public key on the block chain network;
a third receiving module, configured to receive a first calculation result sent by a bidding terminal, where the first calculation result is that the bidding terminal issues bidding requirement information and a random number on a blockchain network, receive a second encryption result sent by a first bidding terminal and a fourth encryption result sent by a second bidding terminal, decrypt the second encryption result and the fourth encryption result respectively to obtain a first encryption result and a third encryption result, calculate a difference between the first encryption result and the third encryption result to obtain a first calculation result, send the first calculation result to the supervising terminal, and the second encryption result is that the first bidding terminal obtains a homomorphic encryption public key sent by the supervising terminal through the blockchain network after receiving the bidding requirement information and the random number, encrypting the sum of the random number and the quoted price of the first bidding terminal according to the homomorphic encryption public key to obtain a first encryption result, encrypting the first encryption result through a preset algorithm by adopting a bidding terminal public key to obtain a second encryption result, sending the second encryption result to the bidding terminal, and encrypting the sum of the random number and the quoted price of the second bidding terminal according to the homomorphic encryption public key to obtain a third encryption result after the second bidding terminal receives the bidding demand information and the random number through a block chain network;
the second decryption module is used for decrypting the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding end quote and the second bidding end quote;
and the sending module is used for sending the difference between the first and second bidding ends to the bid inviting end so that the bid inviting end determines a bid-winning result according to the difference between the first and second bidding ends.
Optionally, after the sending module sends the difference between the first and second bid-side offers to a bid-inviting side, so that the bid-inviting side determines a bid-winning result according to the difference between the first and second bid-side offers, the apparatus further includes:
a third validity authentication module to: receiving a first encryption result and a third encryption result sent by the bidding terminal; and respectively decrypting the first encrypted result and the third encrypted result by the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, sending the first homomorphic result and the third homomorphic result to the bidding terminal so that the bidding terminal calculates the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding terminal quote and the second bidding terminal quote, and determining whether the bidding result is valid according to the comparison result.
Optionally, after the sending module sends the difference between the first bid-end offer and the second bid-end offer to the bid-inviting end, so that the bid-inviting end determines a bid-winning result according to the difference between the first bid-end offer and the second bid-end offer, the apparatus further includes:
a fourth validity authentication module to: receiving a first encryption result sent by the invitation terminal; and decrypting the first encrypted result through the homomorphic encryption private key to obtain a first homomorphic result, sending the first homomorphic result to the bid inviting end so that the bid inviting end encrypts the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encrypted result, and determining whether the bid inviting result is valid according to the comparison result.
In a fifth aspect, the present application provides a bid data processing apparatus comprising: at least one processor and memory;
the memory stores computer-executable instructions;
execution of the computer-executable instructions stored by the memory by the at least one processor causes the at least one processor to perform the bidding data processing method as set forth above in the first aspect and in various possible designs of the first aspect.
In a sixth aspect, the present application provides a bid data processing apparatus comprising: at least one processor and memory;
the memory stores computer execution instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the bid data processing method as set forth above in the second aspect and in various possible designs of the second aspect.
In a seventh aspect, the present application provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the bid data processing method according to the first aspect and various possible designs of the first aspect is implemented.
In an eighth aspect, the present application provides a computer-readable storage medium having stored thereon computer-executable instructions that, when executed by a processor, implement the bid data processing method as set forth in the second aspect and various possible designs of the second aspect.
In a ninth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements a bid data processing method as described above in relation to the first aspect and various possible designs of the first aspect.
In a tenth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements a bid data processing method as set forth in the second aspect above and in various possible designs of the second aspect.
The bidding data processing method, the bidding data processing device, the bidding data processing equipment and the storage medium have the advantages that homomorphic technology is applied to comparison of bidding results, the bidding terminals receive bidding offers of two bidding terminals after homomorphic encryption, bid winning results are determined by comparing the bid prices after homomorphic encryption, and the bidding results are obtained under the condition that the bid prices are not known through homomorphic comparison. In order to ensure the public fairness of the bid inviting, a supervising end is added in the embodiment of the application, a public and private key pair encrypted in a same state is stored through the supervising end, and a private key encrypted in the same state is issued by the supervising end, so that the bid inviting end with encrypted data does not have a decrypted private key, and the supervising end with the private key does not have encrypted data for bidding, so that any end cannot obtain a bidding price before a bidding result comes out, meanwhile, in order to improve the safety of the bid inviting and bidding data, the fact that the supervising end finally obtains a real bidding price for analysis is avoided, a random number sent by the bid inviting end is added to the bidding end before sending a quotation, and the possibility that the supervising end uses mass data for carrying out an attack test to obtain the final bid inviting result is avoided. The bidding data is not easy to leak, and the bidding safety and fairness are improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a schematic diagram of a bid data processing system according to an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart illustrating a bid data processing method according to an embodiment of the present disclosure;
FIG. 3 is a schematic flow chart illustrating another bidding data processing method according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a bidding data processing apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a bid data processing device according to an embodiment of the present application.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terms "first," "second," "third," and "fourth," if any, in the description and claims of this application and the above-described figures are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be implemented in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, displayed data, etc.) referred to in the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with the relevant laws and regulations and standards of the relevant country and region, and are provided with corresponding operation entrances for the user to choose authorization or denial.
With the development of computer technology, bidding has gradually started to utilize internet technology to publish bidding information through a network system. The bidding terminal logs in the electronic system for bidding, and the bidding information is examined and audited by the bidding terminal and then the bid-winning condition is published by the electronic system. At present, in the prior art, when a bid is placed on a bid placing end, a bid placing end generally directly sends bid placing data such as quotes to an electronic system to transmit the bid placing data to the bid placing end. The bidding data in the prior art is easy to leak, and the bidding security and fairness are low.
In order to solve the above technical problems, embodiments of the present application provide a bid data processing method, apparatus, device, and storage medium, in which a supervising end is added, a homomorphic encrypted public-private key pair is stored by the supervising end, and a homomorphic encrypted private key is issued by the supervising end, so that the bid end with encrypted data does not have a decrypted private key, and the supervising end with the private key does not have encrypted data for bid, so that any end cannot obtain a bid price before a bid result comes out, and in order to improve the security of the bid data, it is avoided that the supervising end finally obtains a real bid price for analysis, and the bidding end adds a random number sent by the bid end before sending an offer, thereby avoiding the possibility that the supervising end uses massive data to perform an attack test to obtain a final bid result. The bidding data is not easy to leak, and the bidding safety and fairness are improved.
Optionally, fig. 1 is a schematic diagram of an architecture of a bidding data processing system according to an embodiment of the present application. As shown in fig. 1, the architecture includes: a first bidder 101, a second bidder 102, a tenderer 103, and a supervisor 104.
It is understood that the number and the specific structure of the second tender end, the first tender end and the tender end can be determined according to actual situations, fig. 1 is only an illustration, and the number of the nodes is not particularly limited in the embodiments of the present application.
The number of the bidders may be determined according to actual conditions, and only two bidders are illustrated in fig. 1, which may be more or less in actual conditions.
The nodes are all connected in a block chain, the nodes can be cloud servers, servers or terminal equipment and the like, and communication can be achieved between any two nodes through the block chain network.
The second bidding end, the first bidding end, the supervising end and the tendering end can be arranged on the server or the terminal device, and the second bidding end, the first bidding end, the supervising end and the tendering end can also be the server or the terminal device.
Optionally, each of the bidding terminals (the first bidding terminal and the second bidding terminal), the supervising terminal and the bidding terminal is simultaneously accessed to the blockchain network and registers its identity, that is, each of the bidding terminals, the supervising terminal and the bidding terminal issues its own blockchain identifier, identity identifier and public key in the form of a broadcast message requiring a private key signature.
Optionally, the bid-inviting end issues its own bid-inviting file into the blockchain network in the form of a broadcast message signed by its own private key.
Optionally, the supervising end locally generates a homomorphically encrypted public-private key pair on its own, and then publishes the homomorphically encrypted public key PK in the blockchain network using a broadcast message signed with a private key.
Alternatively, all the bidders and tenderers may acquire the broadcast message transmitted by the supervising end. And then, authenticating the private key signature of the broadcast message, and if the broadcast message passes the authentication, recording the homomorphic encrypted public key PK by all the bidding terminals and the bidding terminals.
Optionally, the bidding terminal sends a random number R to the block chain network by using a broadcast message signed by a private key, and the goal is to send the random number R to the bidding terminal.
It is to be understood that the illustrated architecture of the embodiments of the present application does not constitute a specific limitation on the bidding data processing system architecture. In other possible embodiments of the present application, the architecture may include more or fewer components than those shown in the drawings, or combine some components, or split some components, or arrange different components, which may be determined according to an actual application scenario and is not limited herein. The components shown in fig. 1 may be implemented in hardware, software, or a combination of software and hardware.
In addition, the network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not constitute a limitation to the technical solution provided in the embodiment of the present application, and it can be known by a person skilled in the art that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
The technical solutions of the present application are described below with several embodiments as examples, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is a schematic flowchart of a bid inviting and bidding data processing method provided in an embodiment of the present application, where the embodiment of the present application may be applied to the bid inviting terminal 103 in fig. 1, the bid inviting terminal 103 may be a server or a terminal device, and a specific execution subject may be determined according to an actual application scenario. As shown in fig. 2, the method comprises the steps of:
s201: bidding requirement information and random numbers are broadcast over a blockchain network.
Alternatively, the random number may be generated according to a hash algorithm.
Alternatively, broadcast messages signed using the tenderer's own private key are published into the blockchain network.
S202: and receiving the second encryption result sent by the first bidding end and the fourth encryption result sent by the second bidding end.
The second encryption result is that the first bidding terminal obtains a homomorphic encryption public key sent by the supervision terminal through the block chain network after receiving the bidding requirement information and the random number, the sum of the random number and the quoted price of the first bidding terminal is encrypted according to the homomorphic encryption public key to obtain a first encryption result, the public key of the bidding terminal is adopted to encrypt the first encryption result through a preset algorithm to obtain a second encryption result, and the second encryption result is sent to the bidding terminal.
And the fourth encryption result is that the second bidding terminal obtains a homomorphic encryption public key sent by the supervision terminal through the block chain network after receiving the bidding requirement information and the random number, encrypts the sum of the random number and the quoted price of the second bidding terminal according to the homomorphic encryption public key to obtain a third encryption result, encrypts the third encryption result through a preset algorithm by adopting the public key of the bidding terminal to obtain a fourth encryption result, and sends the fourth encryption result to the bidding terminal.
In one possible implementation manner, the manner of sending the second encrypted result and the fourth result by the bidding end is as follows:
all the bidding terminals and the tendering terminals can acquire the broadcast message sent by the supervision terminal. And then, authenticating the private key signature of the broadcast message, and if the broadcast message passes the authentication, recording the homomorphic encrypted public key PK by all the bidding terminals and the bidding terminals.
The bidding terminal sends a random number R to the block chain network by using a broadcast message signed by a private key, and the goal is to send the random number R to the bidding terminal.
The bidding terminal issues the bidding requirement information in a broadcast message signed by a private key, after receiving the broadcast message, the bidding terminal authenticates the private key signature of the broadcast message, if the authentication is passed, the bidding is carried out according to the requirement, and the first bidding terminal quotes a + R (quote + random number) and the second bidding terminal quotes b + R.
The first bidding terminal encrypts a (or encrypts a + R) by using the homomorphic public key PK to obtain a first result Epk (a + R), encrypts the encrypted result by using the public key of the bidding terminal according to a predetermined algorithm to obtain a second encrypted result, and then sends the second encrypted result to the bidding terminal.
And the second bidding terminal encrypts b by using the homomorphic public key PK to obtain Epk (b + R), encrypts the encryption result by using the public key of the bidding terminal according to a predetermined algorithm to obtain a fourth encryption result, and then sends the fourth encryption result to the bidding terminal.
S203: and respectively carrying out decryption processing on the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result.
Optionally, the tenderer obtains a second encryption result and a fourth encryption result, decrypts the second encryption result and the fourth encryption result respectively by using their own public keys according to a predetermined algorithm to obtain Epk (a + R) and Epk (b + R), then calculates a first calculation result DR = Epk (a + R) -Epk (b + R) by the tenderer, and sends the first calculation result to the supervisor after being signed by using the private key of the tenderer.
S204: and calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to the supervision terminal so that the supervision terminal can decrypt the first calculation result through the homomorphic encryption private key to obtain the difference between the first bid-end offer and the second bid-end offer, and sending the difference between the first bid-end offer and the second bid-end offer to the bid inviting terminal.
In one possible implementation, the manner of supervising the difference of the end first and second bidder bids is as follows:
and after receiving the information containing the first calculation result, the supervision terminal verifies the private key signature of the information, decrypts DR by using the homomorphic private key of the supervision terminal after the verification is passed, finally obtains a + R-b + R = a-b, and feeds back the result of a-b to the bidding terminal.
S205: a difference between the first and second bid-end offers is received.
S206: and determining a successful bidding result according to the difference between the first bid end quote and the second bid end quote.
The bid-winning result can be determined by judging which bid end has a high bid price according to the positive and negative of the difference between the first bid-end bid price and the second bid-end bid price.
Optionally, after determining the winning bid result according to the difference between the first and second bid-end quotes, the method further comprises: and broadcasting the successful bid result on the block chain network in a private key signature mode.
Optionally, the successful bid result is published in a broadcast mode of private key signature.
Here, the bid-inviting and bidding end method provided by the embodiment of the present application applies a homomorphic technique to the comparison of the bid results, the bid-inviting end receives bid offers of two bid ends after homomorphic encryption, determines a bid-winning result by comparing the bid prices after homomorphic encryption, and obtains the bid result without knowing the bid prices through homomorphic comparison. In order to ensure the public fairness of the bid inviting, a supervising end is added in the embodiment of the application, a public and private key pair encrypted in a same state is stored through the supervising end, and a private key encrypted in the same state is issued by the supervising end, so that the bid inviting end with encrypted data does not have a decrypted private key, and the supervising end with the private key does not have encrypted data for bidding, so that any end cannot obtain a bidding price before a bidding result comes out, meanwhile, in order to improve the safety of the bid inviting and bidding data, the fact that the supervising end finally obtains a real bidding price for analysis is avoided, a random number sent by the bid inviting end is added to the bidding end before sending a quotation, and the possibility that the supervising end uses mass data for carrying out an attack test to obtain the final bid inviting result is avoided. The bidding data is not easy to leak, and the bidding safety and fairness are improved.
Optionally, after determining the winning bid result according to the difference between the first and second bid-end quotes, the method further comprises: the first encryption result and the third encryption result are respectively sent to a supervision end, so that the supervision end respectively decrypts the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and the first homomorphic result and the third homomorphic result are sent to a bidding end; and calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quote and the second bidding end quote, and determining whether the bidding result is effective or not according to the comparison result.
In one possible implementation, the tenderer sends the first encryption result Epk (a + R) and the third encryption result Epk (b + R) to the supervising end, respectively.
And the supervision terminal respectively calculates Epk (a + R) and Epk (b + R) by adopting homomorphic private keys to obtain a first homomorphic result (a + R) 'and a third homomorphic result (b + R)' and sends the first homomorphic result (a + R) '- (b + R)' and a-b comparison result to the bidding terminal, and if the first homomorphic result (a + R) 'and the third homomorphic result (b + R)' are the same, the bidding is effective.
After the bid-winning result is determined, the first encryption result and the third encryption result can be sent to the supervision terminal, the supervision terminal is enabled to carry out decryption processing respectively to obtain a first homomorphic result and a third homomorphic result and send the first homomorphic result and the third homomorphic result to the bid inviting terminal, the bid inviting terminal carries out validity judgment according to the difference between the first homomorphic result and the third homomorphic result and the difference between the bid price of the first bid terminal and the bid price of the second bid terminal, whether fake or wrong data exist in the transmission process or not is determined, and the safety and fairness of the bid-winning data are further guaranteed.
Optionally, after determining the winning result according to the difference between the first and second bid-end offers, further comprising: sending the first encryption result to a supervision end so that the supervision end can decrypt the first encryption result through a homomorphic encryption private key to obtain a first homomorphic result, and sending the first homomorphic result to a bidding end; and encrypting the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is valid according to the comparison result.
In one possible implementation manner, the bidding terminal obtains the first homomorphic verification result Epk ((a + R) '), verifies the first homomorphic verification result Epk ((a + R)') = Epk (a + R), and thus avoids that the supervising terminal does not cheat.
The method and the device can also send the first encryption result to the supervision end after the bid winning result is determined, the supervision end is enabled to conduct decryption processing, the first homomorphic result is obtained and sent to the bid winning end, the bid winning end conducts homomorphic encryption again to obtain the first homomorphic verification result, the first homomorphic verification result is compared with the first encryption result obtained in the transmission process, whether fake or wrong data are generated or not in the transmission process can be determined, and safety and fairness of bid data are further guaranteed.
Alternatively, the true bid price a can be obtained by subtracting R from (a + R)' obtained by decryption. Or the same method to obtain b.
Fig. 3 is a flowchart of another bidding data processing method provided in an embodiment of the present application, where the embodiment of the present application may be applied to the supervising end 104 in fig. 1, the supervising end 104 may be a server or a terminal device, and a specific execution subject may be determined according to an actual application scenario. As shown in fig. 3, the method comprises the steps of:
s301: a homomorphic cryptographic public key is broadcast over the blockchain network.
S302: and receiving a first calculation result sent by the bidding terminal.
The first calculation result is that the bidding terminal issues bidding requirement information and random numbers on the block chain network, receives a second encryption result sent by the first bidding terminal and a fourth encryption result sent by the second bidding terminal, respectively decrypts the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result, calculates the difference between the first encryption result and the third encryption result to obtain a first calculation result, and sends the first calculation result to the supervision terminal.
The second encryption result is that the first bidding terminal obtains a homomorphic encryption public key sent by the supervision terminal through the block chain network after receiving the bidding requirement information and the random number, the sum of the random number and the quoted price of the first bidding terminal is encrypted according to the homomorphic encryption public key to obtain a first encryption result, the public key of the bidding terminal is adopted to encrypt the first encryption result through a preset algorithm to obtain a second encryption result, and the second encryption result is sent to the bidding terminal.
The fourth encryption result is that the second bidding terminal obtains a homomorphic encryption public key sent by the supervision terminal through the block chain network after receiving the bidding requirement information and the random number, encrypts the sum of the random number and the quoted price of the second bidding terminal according to the homomorphic encryption public key to obtain a third encryption result, encrypts the third encryption result through a preset algorithm by adopting the public key of the bidding terminal to obtain a fourth encryption result, and sends the fourth encryption result to the bidding terminal;
s303: and decrypting the first calculation result through the homomorphic encryption private key to obtain the difference between the first bidding end quote and the second bidding end quote.
S304: and sending the difference between the first and second bid-end quotes to the bid-inviting end so that the bid-inviting end determines a bid-winning result according to the difference between the first and second bid-end quotes.
Optionally, after sending the difference between the first and second bid-end offers to the bid-inviting end, so that the bid-inviting end determines a bid-winning result according to the difference between the first and second bid-end offers, the method further comprises: receiving a first encryption result and a third encryption result sent by the bidding terminal; and respectively decrypting the first encrypted result and the third encrypted result by using the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, sending the first homomorphic result and the third homomorphic result to the bid inviting end so that the bid inviting end calculates the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the bid price of the first bid end and the bid price of the second bid end, and determining whether the bid inviting result is valid or not according to the comparison result.
Optionally, after sending the difference between the first and second bid-end offers to the bid-inviting end, so that the bid-inviting end determines a bid-winning result according to the difference between the first and second bid-end offers, the method further comprises: receiving a first encryption result sent by the bidding terminal; the first encrypted result is decrypted through the homomorphic encrypted private key to obtain a first homomorphic result, the first homomorphic result is sent to the bid inviting end, so that the bid inviting end encrypts the first homomorphic result through the homomorphic encrypted public key to obtain a first homomorphic verification result, the first homomorphic verification result is compared with the first encrypted result, and whether the bid inviting result is valid or not is determined according to the comparison result.
Here, in the embodiment of the present application, the monitoring end is used to store the homomorphic encrypted public and private key pair, and the homomorphic encrypted private key is issued by the monitoring end, so that the bidding end with encrypted data does not have the decrypted private key, and the monitoring end with the private key does not have the encrypted data for bidding, so that any party cannot obtain the bidding price before the bidding result comes out, the bidding data is not easy to be leaked, and the security and fairness of the bidding data are improved.
The embodiment of the application also provides a bid inviting and bidding processing device.
Fig. 4 is a schematic structural diagram of a bid data processing apparatus according to an embodiment of the present application, which is applied to a bid server, and as shown in fig. 4, the apparatus according to the embodiment of the present application includes: a first broadcasting module 401, a first receiving module 402, a first decrypting module 403, a first processing module 404, a second receiving module 405, and a result determining module 406. The bid data processing device may be a server or a terminal device, or a chip or an integrated circuit that realizes the functions of the server or the terminal device. It should be noted here that the division of the first broadcasting module 401, the first receiving module 402, the first decrypting module 403, the first processing module 404, the second receiving module 405, and the result determining module 406 is only a division of logical functions, and the two may be integrated or independent physically.
The first broadcasting module is used for broadcasting bidding requirement information and random numbers on the block chain network;
the system comprises a first receiving module, a second encrypting module, a fourth encrypting module and a third encrypting module, wherein the first receiving module is used for receiving a second encrypting result sent by a first bidding terminal and a fourth encrypting result sent by a second bidding terminal, the second encrypting result is a homomorphic encrypting public key sent by the first bidding terminal through a block chain network after the first bidding terminal receives bidding requirement information and a random number, the homomorphic encrypting public key is obtained by the supervising terminal according to the homomorphic encrypting public key, the random number and the sum of quotes of the first bidding terminal are encrypted according to the homomorphic encrypting public key to obtain a first encrypting result, the first encrypting result is obtained by encrypting the sum of the random number and quotes of the first bidding terminal through a preset algorithm, the second encrypting result is sent to the bidding terminal, the fourth encrypting result is obtained by encrypting the sum of the random number and the sum of quotes of the second bidding terminal through the block chain network after the second bidding terminal receives the bidding requirement information and the random number, the homomorphic encrypting public key is obtained by the supervising terminal, the third encrypting result is obtained by the preset algorithm, and the fourth encrypting result is sent to the fourth bidding terminal;
the first decryption module is used for respectively decrypting the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result;
the first processing module is used for calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to the supervision terminal so that the supervision terminal can decrypt the first calculation result through a homomorphic encryption private key to obtain the difference between the first bid-end quote and the second bid-end quote, and sending the difference between the first bid-end quote and the second bid-end quote to the bid inviting terminal;
the second receiving module is used for receiving the difference between the first bidding end quote and the second bidding end quote;
and the result determining module is used for determining a successful bid result according to the difference between the first bidding end quote and the second bidding end quote.
Optionally, after the result determining module determines the winning result according to the difference between the first and second bid-side offers, the apparatus further includes:
the first validity authentication module is used for respectively sending the first encryption result and the third encryption result to the supervision end so that the supervision end can respectively decrypt the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and sending the first homomorphic result and the third homomorphic result to the bidding end; and calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quote and the second bidding end quote, and determining whether the bidding result is effective or not according to the comparison result.
Optionally, after the result determining module determines the winning bid result according to a difference between the first and second bid-end offers, the apparatus further comprises:
the second validity authentication module is used for sending the first encryption result to the supervision end so that the supervision end can decrypt the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result and send the first homomorphic result to the bidding end; and encrypting the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is valid according to the comparison result.
Optionally, after the result determining module determines the winning result according to the difference between the first and second bid-side offers, the apparatus further includes:
and the third broadcasting module is used for broadcasting the successful bid result on the block chain network in a private key signature mode.
The embodiment of the application also provides another bidding data processing device. Be applied to supervision end, the device of this application embodiment includes: the device comprises a second broadcasting module, a third receiving module, a second decryption module and a sending module. The bid data processing device may be a server or a terminal device, or a chip or an integrated circuit that implements functions of the server or the terminal device. It should be noted here that the division of the second broadcasting module, the third receiving module, the second decrypting module and the sending module is only a division of logical functions, and the two modules may be integrated or independent physically.
The second broadcast module is used for broadcasting the homomorphic encryption public key on the block chain network;
a third receiving module, configured to receive a first calculation result sent by the bidding terminal, where the first calculation result is that the bidding terminal issues the bidding requirement information and the random number on the blockchain network, receive a second encryption result sent by the first bidding terminal and a fourth encryption result sent by the second bidding terminal, decrypt the second encryption result and the fourth encryption result respectively to obtain a first encryption result and a third encryption result, calculate a difference between the first encryption result and the third encryption result to obtain a first calculation result, send the first calculation result to the supervising terminal, and the second encryption result is that the first bidding terminal obtains a homomorphic encryption public key sent by the supervising terminal through the blockchain network after receiving the bidding requirement information and the random number, encrypting the sum of the random number and the quoted price of the first bidding terminal according to the homomorphic encryption public key to obtain a first encryption result, encrypting the first encryption result through a preset algorithm by adopting a public key of the bidding terminal to obtain a second encryption result, sending the second encryption result to the bidding terminal, obtaining a homomorphic encryption public key sent by a supervision terminal through a block chain network according to the homomorphic encryption public key after the second bidding terminal receives the bidding demand information and the random number, encrypting the sum of the random number and the quoted price of the second bidding terminal according to the homomorphic encryption public key to obtain a third encryption result, encrypting the third encryption result through the preset algorithm by adopting the public key of the bidding terminal to obtain a fourth encryption result, and sending the fourth encryption result to the bidding terminal;
the second decryption module is used for decrypting the first calculation result through the homomorphic encryption private key to obtain the difference between the first bidding end quote and the second bidding end quote;
and the sending module is used for sending the difference between the first and second bidding ends to the bidding end so that the bidding end determines the bid-winning result according to the difference between the first and second bidding ends.
Optionally, after the sending module sends the difference between the first and second bid-end offers to the bid inviting end, so that the bid inviting end determines the bid-winning result according to the difference between the first and second bid-end offers, the apparatus further comprises:
a third validity authentication module to: receiving a first encryption result and a third encryption result sent by the bidding terminal; and respectively decrypting the first encrypted result and the third encrypted result by using a homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, sending the first homomorphic result and the third homomorphic result to the bidding terminal so that the bidding terminal calculates the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the quoted price of the first bidding terminal and the quoted price of the second bidding terminal, and determining whether the bidding result is valid according to the comparison result.
Optionally, after the sending module sends the difference between the first and second bid-side offers to the bid-side so that the bid-side determines the bid-winning result according to the difference between the first and second bid-side offers, the apparatus further includes:
a fourth validity authentication module to: receiving a first encryption result sent by the bidding terminal; and decrypting the first encrypted result through the homomorphic encryption private key to obtain a first homomorphic result, sending the first homomorphic result to the bid inviting end so that the bid inviting end encrypts the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encrypted result, and determining whether the bid inviting result is valid according to the comparison result.
Referring to fig. 5, a schematic structural diagram of a bidding data processing device 500 suitable for implementing an embodiment of the present disclosure is shown, where the bidding data processing device 500 may be a terminal device or a server. Among them, the terminal Device may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a Digital broadcast receiver, a Personal Digital Assistant (PDA), a tablet computer (PAD), a Portable Multimedia Player (PMP), a car navigation terminal (e.g., a car navigation terminal), etc., and a fixed terminal such as a Digital TV, a desktop computer, etc. The bidding data processing apparatus shown in fig. 5 is only an example and should not impose any limitation on the functionality and scope of use of the embodiments of the present disclosure.
As shown in fig. 5, bidding data processing apparatus 500 may include a processing device (e.g., central processing unit, graphics processor, etc.) 501 that may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage device 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for the operation of the bid data processing apparatus 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
Generally, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 507 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage devices 508 including, for example, magnetic tape, hard disk, etc.; and a communication device 509. The communication means 509 may allow the bidding data processing apparatus 500 to communicate with other apparatuses wirelessly or by wire to exchange data. While FIG. 5 illustrates bidding data processing apparatus 500 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, the processes described above with reference to the flow diagrams may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 509, or installed from the storage means 508, or installed from the ROM 502. The computer program performs the above-described functions defined in the methods of the embodiments of the present disclosure when executed by the processing device 501.
It should be noted that the computer readable medium of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the bid data processing apparatus; or may exist separately and not be installed in the bidding data processing apparatus.
The computer readable medium carries one or more programs which, when executed by the bid data processing apparatus, cause the bid data processing apparatus to perform the method shown in the embodiments described above.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of Network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements that have been described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (13)

1. A bid and tender data processing method is applied to a bid and tender end and comprises the following steps:
broadcasting bidding requirement information and a random number over a blockchain network;
receiving a second encryption result sent by a first bidding end and a fourth encryption result sent by a second bidding end, wherein the second encryption result is a homomorphic encryption public key sent by a supervision end through a block chain network after the first bidding end receives the bidding requirement information and the random number, encrypting the sum of the random number and the first bidding end quoted price according to the homomorphic encryption public key to obtain a first encryption result, encrypting the first encryption result through a preset algorithm by adopting a public key of the bidding end to obtain a second encryption result, and sending the second encryption result to the bidding end; the fourth encryption result is that the second bidding terminal obtains a homomorphic encryption public key sent by a supervision terminal through a block chain network after receiving the bidding requirement information and the random number, encrypts the sum of the random number and the second bidding terminal quoted price according to the homomorphic encryption public key to obtain a third encryption result, encrypts the third encryption result through a preset algorithm by adopting the public key of the bidding terminal to obtain a fourth encryption result, and sends the fourth encryption result to the bidding terminal;
respectively carrying out decryption processing on the second encryption result and the fourth encryption result to obtain the first encryption result and the third encryption result;
calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to a supervision terminal, so that the supervision terminal decrypts the first calculation result through a homomorphic encryption private key to obtain the difference between the first bid-end offer and the second bid-end offer, and sending the difference between the first bid-end offer and the second bid-end offer to a bid inviting terminal;
receiving a difference between the first and second bidder bids;
and determining a successful bidding result according to the difference between the first and second bidding ends.
2. The method of claim 1, further comprising, after said determining a bid-closing result based on a difference between said first and second bidder bids:
respectively sending the first encryption result and the third encryption result to the supervision end so that the supervision end respectively decrypts the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and sending the first homomorphic result and the third homomorphic result to the bidding end;
and calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quote and the second bidding end quote, and determining whether the bidding result is valid according to the comparison result.
3. The method of claim 1, further comprising, after said determining a bid-closing result based on a difference between said first and second bidder bids:
sending the first encryption result to the supervision end so that the supervision end decrypts the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, and sending the first homomorphic result to the bidding end;
and encrypting the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is valid according to the comparison result.
4. The method of any of claims 1-3, further comprising, after said determining a bid-closing result based on a difference between said first and second bidder bids:
broadcasting the successful bid result on the block chain network in a private key signature mode.
5. A bid data processing method is applied to a supervision terminal and comprises the following steps:
broadcasting a homomorphic encryption public key on a block chain network;
receiving a first calculation result sent by a bidding terminal, wherein the first calculation result is that the bidding terminal issues bidding requirement information and a random number on a block chain network, receiving a second encryption result sent by a first bidding terminal and a fourth encryption result sent by a second bidding terminal, respectively decrypting the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result, calculating a difference between the first encryption result and the third encryption result to obtain a first calculation result, and sending the first calculation result to the supervising terminal; the second encryption result is that the first bidding terminal obtains a homomorphic encryption public key sent by a supervision terminal through a block chain network after receiving the bidding requirement information and the random number, encrypts the sum of the random number and the first bidding terminal quoted price according to the homomorphic encryption public key to obtain a first encryption result, encrypts the first encryption result through a preset algorithm by adopting the public key of the bidding terminal to obtain a second encryption result, and sends the second encryption result to the bidding terminal; the fourth encryption result is that the second bidding terminal obtains a homomorphic encryption public key sent by a supervision terminal through a block chain network after receiving the bidding requirement information and the random number, encrypts the sum of the random number and the quotation of the second bidding terminal according to the homomorphic encryption public key to obtain a third encryption result, encrypts the third encryption result through a preset algorithm by adopting the public key of the bidding terminal to obtain a fourth encryption result, and sends the fourth encryption result to the bidding terminal;
decrypting the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding end quote and the second bidding end quote;
and sending the difference between the first and second bidding end quotes to a bidding end so that the bidding end determines a bid-winning result according to the difference between the first and second bidding end quotes.
6. The method of claim 5, further comprising, after said transmitting the difference between the first and second bidder bids to a tenderer to cause the tenderer to determine a bid-winning outcome based on the difference between the first and second bidder bids, further comprising:
receiving a first encryption result and a third encryption result sent by the bidding terminal;
and respectively decrypting the first encrypted result and the third encrypted result by the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, sending the first homomorphic result and the third homomorphic result to the bidding terminal so that the bidding terminal calculates the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding terminal quote and the second bidding terminal quote, and determining whether the bidding result is valid according to the comparison result.
7. The method of claim 5, further comprising, after said transmitting the difference between the first and second bidder bids to a tenderer to cause the tenderer to determine a bid-winning outcome based on the difference between the first and second bidder bids, further comprising:
receiving a first encryption result sent by the invitation terminal;
the homomorphic encryption private key is used for decrypting the first encryption result to obtain a first homomorphic result, the first homomorphic result is sent to the bid inviting end, so that the bid inviting end can encrypt the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, the first homomorphic verification result is compared with the first encryption result, and whether the bid inviting result is effective or not is determined according to the comparison result.
8. A bidding data processing apparatus applied to a bidding terminal, the apparatus comprising:
the first broadcasting module is used for broadcasting bidding requirement information and random numbers on the block chain network;
the system comprises a first receiving module, a second encrypting module, a fourth encrypting module and a third encrypting module, wherein the first encrypting module is used for receiving a second encrypting result sent by a first bidding terminal and a fourth encrypting result sent by a second bidding terminal, the second encrypting result is a homomorphic encrypting public key sent by a supervising terminal through a block chain network after the first bidding terminal receives the bidding requirement information and the random number, the first encrypting result is obtained by encrypting the sum of the random number and the quoted sum of the first bidding terminal according to the homomorphic encrypting public key, the public key of the bidding terminal is used for encrypting the first encrypting result through a preset algorithm to obtain a second encrypting result, the second encrypting result is sent to the bidding terminal, the fourth encrypting result is a homomorphic encrypting result sent by the supervising terminal after the second bidding terminal receives the bidding requirement information and the random number, the homomorphic encrypting result sent by the block chain network is obtained, the sum of the quoted sum of the random number and the second bidding terminal is encrypted according to obtain a third encrypting result, the public key of the bidding terminal is used for encrypting the sum of the quoted sum of the third bidding result through the preset public key, the third encrypting result is sent to the fourth bidding terminal, and the fourth encrypting result is obtained by the homomorphic encrypting algorithm;
the first decryption module is used for respectively decrypting the second encryption result and the fourth encryption result to obtain the first encryption result and the third encryption result;
the first processing module is used for calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to a supervision terminal so that the supervision terminal can decrypt the first calculation result through a homomorphic encryption private key to obtain the difference between the first bid-end offer and the second bid-end offer, and sending the difference between the first bid-end offer and the second bid-end offer to a bid inviting terminal;
a second receiving module for receiving a difference between the first and second bid-side quotes;
and the result determining module is used for determining a successful bid result according to the difference between the first bidding end quote and the second bidding end quote.
9. A bid data processing device applied to a supervision terminal includes:
the second broadcasting module is used for broadcasting the homomorphic encryption public key on the block chain network;
a third receiving module, configured to receive a first calculation result sent by a bidding terminal, where the first calculation result is that the bidding terminal issues bidding requirement information and a random number on a block chain network, receive a second encryption result sent by a first bidding terminal and a fourth encryption result sent by a second bidding terminal, decrypt the second encryption result and the fourth encryption result respectively to obtain a first encryption result and a third encryption result, calculate a difference between the first encryption result and the third encryption result to obtain a first calculation result, send the first calculation result to the supervising terminal, and the second encryption result is that the first bidding terminal obtains a homomorphic encryption public key sent by the supervising terminal through the block chain network after receiving the bidding requirement information and the random number, encrypting the sum of the random number and the quoted price of the first bidding end according to the homomorphic encryption public key to obtain a first encryption result, encrypting the first encryption result through a preset algorithm by adopting a bidding end public key to obtain a second encryption result, sending the second encryption result to the bidding end, obtaining a homomorphic encryption public key sent by a supervision end through a block link network according to the homomorphic encryption public key after the second bidding end receives the bidding demand information and the random number, encrypting the sum of the random number and the quoted price of the second bidding end according to the homomorphic encryption public key to obtain a third encryption result, encrypting the third encryption result through a preset algorithm by adopting the bidding end to obtain a fourth encryption result, and sending the fourth encryption result to the bidding end;
the second decryption module is used for decrypting the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding end quote and the second bidding end quote;
and the sending module is used for sending the difference between the first and second bidding end quotes to a bidding end so that the bidding end determines a bid-winning result according to the difference between the first and second bidding end quotes.
10. A bid data processing apparatus, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the first and the second end of the pipe are connected with each other,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the bid data processing method of any of claims 1 to 4.
11. A bid data processing apparatus, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a bid data processing method according to any one of claims 5 to 7.
12. A computer-readable storage medium having computer-executable instructions stored therein, which when executed by a processor, are configured to implement the bidding data processing method according to any one of claims 1 to 4.
13. A computer-readable storage medium having computer-executable instructions stored therein, which when executed by a processor, are configured to implement the bidding data processing method according to any one of claims 5 to 7.
CN202310010271.4A 2023-01-05 2023-01-05 Bid data processing method, device, equipment and storage medium Active CN115879135B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310010271.4A CN115879135B (en) 2023-01-05 2023-01-05 Bid data processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310010271.4A CN115879135B (en) 2023-01-05 2023-01-05 Bid data processing method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115879135A true CN115879135A (en) 2023-03-31
CN115879135B CN115879135B (en) 2023-05-16

Family

ID=85758052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310010271.4A Active CN115879135B (en) 2023-01-05 2023-01-05 Bid data processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115879135B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108520402A (en) * 2018-04-09 2018-09-11 济南浪潮高新科技投资发展有限公司 A kind of method of commerce and transaction system based on block chain
CN110751544A (en) * 2019-10-18 2020-02-04 中国联合网络通信集团有限公司 Bidding information, supervision information and bid evaluation information processing method, terminal and system
CN112862576A (en) * 2021-02-07 2021-05-28 湖南大学 Bidding auction method, system, equipment and storage medium based on block chain
CN113191863A (en) * 2021-05-21 2021-07-30 中国联合网络通信集团有限公司 Bidding method, third party device, sponsor device and bidder device
CN113205399A (en) * 2021-05-21 2021-08-03 中国联合网络通信集团有限公司 Electronic bidding method, bidding node, first bidding node and third party node
CN113420321A (en) * 2021-05-21 2021-09-21 中国联合网络通信集团有限公司 Electronic bidding method, bidding node, first bidding node and third party node
US20210304297A1 (en) * 2020-03-24 2021-09-30 Saudi Arabian Oil Company Autonomous bidder solicitation and selection system
CN114626922A (en) * 2022-03-21 2022-06-14 国网辽宁省电力有限公司 Self-adaptive bidding multi-energy P2P trading platform based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108520402A (en) * 2018-04-09 2018-09-11 济南浪潮高新科技投资发展有限公司 A kind of method of commerce and transaction system based on block chain
CN110751544A (en) * 2019-10-18 2020-02-04 中国联合网络通信集团有限公司 Bidding information, supervision information and bid evaluation information processing method, terminal and system
US20210304297A1 (en) * 2020-03-24 2021-09-30 Saudi Arabian Oil Company Autonomous bidder solicitation and selection system
CN112862576A (en) * 2021-02-07 2021-05-28 湖南大学 Bidding auction method, system, equipment and storage medium based on block chain
CN113191863A (en) * 2021-05-21 2021-07-30 中国联合网络通信集团有限公司 Bidding method, third party device, sponsor device and bidder device
CN113205399A (en) * 2021-05-21 2021-08-03 中国联合网络通信集团有限公司 Electronic bidding method, bidding node, first bidding node and third party node
CN113420321A (en) * 2021-05-21 2021-09-21 中国联合网络通信集团有限公司 Electronic bidding method, bidding node, first bidding node and third party node
CN114626922A (en) * 2022-03-21 2022-06-14 国网辽宁省电力有限公司 Self-adaptive bidding multi-energy P2P trading platform based on block chain

Also Published As

Publication number Publication date
CN115879135B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CN110061846B (en) Method, device and computer readable storage medium for identity authentication and confirmation of user node in block chain
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
CN109361508A (en) Data transmission method, electronic equipment and computer readable storage medium
CN111369236A (en) Data management method and device applied to block chain
CN107920060B (en) Data access method and device based on account
CN109740319B (en) Digital identity verification method and server
CN113162915B (en) Block chain based transaction method, node, electronic device, medium and system
CN110677261A (en) Credible two-dimensional code generation method and device, electronic equipment and storage medium
CN115906140A (en) Bidding data processing method, device, equipment and storage medium
CN115766294B (en) Cloud server resource authentication processing method, device, equipment and storage medium
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain
CN114745207B (en) Data transmission method, device, equipment, computer readable storage medium and product
CN115879135B (en) Bid data processing method, device, equipment and storage medium
CN112767142B (en) Processing method, device, computing equipment and medium for transaction file
CN111832046B (en) Trusted data certification method based on blockchain technology
CN115001828A (en) Secure access method, system, electronic device and medium for transaction data
CN114172923A (en) Data transmission method, communication system and communication device
CN110766400B (en) Transaction record processing method based on block chain, accounting node and medium
CN110782347B (en) Intelligent contract signing method, device and medium based on block chain
CN114826616B (en) Data processing method, device, electronic equipment and medium
CN115906182A (en) Data comparison processing method, device, equipment and storage medium
CN116471327B (en) Cloud resource processing method, device, equipment and storage medium
CN117150544A (en) Bid data comparison method, device, equipment and storage medium
CN114785560B (en) Information processing method, device, equipment and medium
CN112926076B (en) Data processing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant