WO2020253107A1 - Blockchain two-stage supervision method, apparatus, and device, and storage medium - Google Patents

Blockchain two-stage supervision method, apparatus, and device, and storage medium Download PDF

Info

Publication number
WO2020253107A1
WO2020253107A1 PCT/CN2019/120859 CN2019120859W WO2020253107A1 WO 2020253107 A1 WO2020253107 A1 WO 2020253107A1 CN 2019120859 W CN2019120859 W CN 2019120859W WO 2020253107 A1 WO2020253107 A1 WO 2020253107A1
Authority
WO
WIPO (PCT)
Prior art keywords
supervision
node
data
blockchain
level
Prior art date
Application number
PCT/CN2019/120859
Other languages
French (fr)
Chinese (zh)
Inventor
谢丹力
张文明
贾牧
陆陈一帆
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020253107A1 publication Critical patent/WO2020253107A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • This application relates to the field of blockchain technology, and in particular to a method, device, equipment and computer-readable storage medium for two-level supervision of blockchain.
  • Blockchain is a hot financial technology technology today, but its anonymity and data encryption are more like a double-edged sword. While protecting the data security and privacy of users, it also brings huge difficulties to supervision. . Financial transactions are inherently highly asymmetrical in information. If these financial transactions are allowed to grow naturally, it will increase information inequality and expand systemic risks. Therefore, strict supervision is a problem that must be resolved.
  • the traditional blockchain usually adopts the first-level supervision strategy, that is, the encryption key of the data on the chain is encrypted with the public key of the supervision, and then the supervising node can use its own private key to decrypt the data on the chain of the supervised node , So as to view all the on-chain data of the supervised node, thus realizing supervision.
  • the first-level supervision strategy that is, the encryption key of the data on the chain is encrypted with the public key of the supervision
  • the supervising node can use its own private key to decrypt the data on the chain of the supervised node , So as to view all the on-chain data of the supervised node, thus realizing supervision.
  • the traditional blockchain usually adopts the first-level supervision strategy, that is, the encryption key of the data on the chain is encrypted with the public key of the supervision, and then the supervising node can use its own private key to decrypt the data on the chain of the supervised node , So as to view all the on-chain data of the supervised node, thus real
  • the main purpose of this application is to provide a blockchain two-level supervision method, device, equipment, and computer-readable storage medium, aiming to solve the technical problem that the traditional blockchain supervision strategy cannot meet the multi-level supervision requirements.
  • this application provides a two-level supervision method for the blockchain, and the two-level supervision method for the blockchain includes the following steps:
  • the blockchain two-level supervision method further includes:
  • the current node When uploading data on the chain, if the current node is a first-level supervisory node, generate a public-private key pair (dp12, DP12) corresponding to the data to be uploaded on the current node under the first cyclic group domain;
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • this application also provides a two-level blockchain supervision device, the two-level blockchain supervision device includes:
  • the generating module is used to generate the public-private key pair (dp11, DP11) corresponding to the data to be uploaded on the current node under the preset first cycle group domain when the current node is an ordinary node when uploading data on the chain;
  • the calculation module is used to calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cyclic group domain, and CP2 is the supervision public key corresponding to the current node The supervision public key of the secondary supervision node under the preset second cycle group domain;
  • Encryption module used to use e(PP1, CP2) dp11 to encrypt the data to be chained to obtain encrypted data Text1;
  • the publishing module is used to publish the encrypted data Text1 and the public key DP11 to the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
  • the present application also provides a two-level blockchain supervision device, which includes a memory, a processor, and is stored on the memory and can be stored on the processor.
  • a blockchain two-level supervision program running on the computer when the blockchain two-level supervision program is executed by the processor, the steps of the blockchain two-level supervision method as described in any one of the above are implemented.
  • the present application also provides a computer-readable storage medium having a two-level blockchain supervision program stored on the computer-readable storage medium, and the two-level blockchain supervision program is The steps of the blockchain two-level supervision method as described in any one of the above are implemented during execution.
  • This application uses a bilinear encryption algorithm to encrypt data on the chain.
  • the encryption key of the data on the chain is a bilinear pair, and the generation of the bilinear pair uses the supervision of the primary supervisory node corresponding to the current node.
  • the public key and the supervision public key of the second-level supervisory node so that the encrypted data on the chain of the ordinary node can only be decrypted by the corresponding first-level supervisory node or the second-level supervisory node, and other first-level supervisory nodes cannot decrypt, thus ensuring the second Level supervision requires supervision of data isolation.
  • FIG. 1 is a schematic diagram of the structure of the device hardware operating environment involved in the embodiment of the application's blockchain two-level supervision device;
  • FIG. 2 is a schematic flowchart of a first embodiment of a two-level supervision method for applying a blockchain
  • FIG. 3 is a schematic flowchart of a second embodiment of a two-level supervision method for applying a blockchain
  • FIG. 4 is a schematic flowchart of a third embodiment of a two-level supervision method for applying a blockchain
  • FIG. 5 is a schematic flowchart of a fourth embodiment of a two-level supervision method for applying a blockchain
  • FIG. 6 is a schematic flowchart of a fifth embodiment of a two-level supervision method for applying a blockchain
  • FIG. 7 is a schematic diagram of functional modules of an embodiment of a two-level supervision device for a blockchain of this application.
  • This application provides a two-level blockchain supervision device.
  • Fig. 1 is a schematic structural diagram of the device hardware operating environment involved in the embodiment of the blockchain two-level supervision device of this application.
  • the blockchain two-level supervision device may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the memory 1005 may be a high-speed RAM memory, or a non-volatile memory (non-volatile memory), such as a magnetic disk memory.
  • the memory 1005 may also be a storage device independent of the foregoing processor 1001.
  • the hardware structure of the blockchain two-level supervision device shown in FIG. 1 does not constitute a limitation on the blockchain two-level supervision device, and may include more or less components than shown. Or combine certain components, or different component arrangements.
  • the memory 1005 as a computer-readable storage medium may include an operating system, a network communication module, a user interface module, and a two-level blockchain supervision program.
  • the operating system is a program that manages and controls the two-level supervision equipment and software resources of the blockchain, and supports the operation of network communication modules, user interface modules, two-level blockchain supervision programs, and other programs or software;
  • the network communication module is used for Manage and control the network interface 1004;
  • the user interface module is used to manage and control the user interface 1003.
  • the network interface 1004 is mainly used to connect to the system backend and communicate with the system backend;
  • the user interface 1003 is mainly used to connect the client (user end) and communicate with the customer
  • the blockchain two-level supervision device calls the blockchain two-level supervision program stored in the memory 1005 through the processor 1001 and executes the operations of the following embodiments of the blockchain two-level supervision method.
  • Fig. 2 is a schematic flowchart of a first embodiment of a two-level supervision method for a blockchain of this application.
  • the blockchain two-level supervision method includes the following steps:
  • Step S110 When uploading data, if the current node is a normal node, generate a public-private key pair (dp11, DP11) corresponding to the data to be uploaded to the current node under the preset first cyclic group domain;
  • the encryption method of the uplink data is improved, and the uplink data is encrypted based on the bilinear encryption algorithm. Before encryption, you need to generate the corresponding public-private key pair for the data to be uploaded.
  • a corresponding public-private key pair (dp11, DP11) is generated for the data to be uploaded, where dp11 is the private key and DP11 is the public key.
  • the public and private key pair (dp11, DP11) belongs to the first cyclic group domain.
  • Step S120 Calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cyclic group domain, and CP2 is the secondary supervision node corresponding to the current node The supervision public key of the supervision node under the preset second cycle group domain;
  • the private key dp11 is not used directly to encrypt the data to be uploaded, but a bilinear pair is used for encryption.
  • the specific format of the bilinear pair is as follows:
  • PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first recurring group domain
  • CP2 is the supervision public key of the secondary supervision node corresponding to the current node under the preset second recurring group domain.
  • Step S130 use e(PP1, CP2) dp11 to encrypt the data to be uploaded to the chain to obtain encrypted data Text1;
  • Step S140 Publish the encrypted data Text1 and the public key DP11 on the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
  • the data on the chain is encrypted based on the bilinear encryption algorithm, that is, the data to be chained is encrypted using e(PP1, CP2) dp11 to obtain encrypted data Text1, and then the encrypted data Text1 and the public key DP11 Publish to the blockchain.
  • the encryption key of the data on the chain is e(PP1, CP2) dp11 , the encryption key is generated using the supervision public key PP1 of the primary supervision node corresponding to the current node and the supervision of the secondary supervision node corresponding to the current node
  • the public key CP2 therefore, the encrypted data Text1 can only be decrypted by the corresponding primary supervision node or secondary supervision node, and other primary supervision nodes cannot decrypt, thereby ensuring the supervision requirements of secondary supervision for data isolation.
  • a bilinear encryption algorithm is used to encrypt data on the chain.
  • the encryption key of the data on the chain is a bilinear pair, and the generation of the bilinear pair uses the first-level supervisory node corresponding to the current node.
  • the supervision public key and the supervision public key of the secondary supervision node so that the encrypted data on the common node can only be decrypted by the corresponding primary supervision node or secondary supervision node, and other primary supervision nodes cannot decrypt, thus ensuring The regulatory requirements of secondary supervision for data isolation.
  • Fig. 3 is a schematic flowchart of a second embodiment of a two-level supervision method for a blockchain of this application.
  • the blockchain two-level supervision method further includes the following steps:
  • Step S210 When uploading data on the chain, if the current node is a first-level supervisory node, generate a public-private key pair (dp12, DP12) corresponding to the data to be uploaded on the current node under the first cyclic group domain;
  • Step S230 use key1 to encrypt the data to be chained to obtain encrypted data Text2;
  • Step S240 Publish the encrypted data Text2 and the public key DP12 to the blockchain for supervision and review by the secondary supervisory node corresponding to the current node.
  • the first-level supervisory node can also upload data on the chain, so it also belongs to the supervised object of the second-level supervisory node.
  • the primary supervisory node needs to generate a corresponding public-private key pair for the data on the chain.
  • the public-private key pair (dp12, DP12) belongs to the first cyclic group domain.
  • CP1 is the supervision public key of the second-level supervisory node corresponding to the current node under the first cyclic group domain, it is guaranteed that the encrypted data on the chain of this node can only be decrypted by the second-level supervisory node corresponding to this node, and other nodes cannot decrypt , Thus ensuring the regulatory requirements of secondary supervision for data isolation.
  • FIG. 4 is a schematic flowchart of a third embodiment of a two-level supervision method for a blockchain of this application.
  • the blockchain two-level supervision method further includes the following steps:
  • Step S310 When viewing the data on the chain, if the current node is a first-level supervisory node and the data to be viewed is encrypted data Text1, calculate the bilinear pair e(DP11, CP2) pp1 ;
  • Step S320 Use e(DP11, CP2) pp1 to decrypt the encrypted data Text1 published on the blockchain by the supervised common node to obtain corresponding plaintext data.
  • DP11 is the private key generated by the supervised node for on-chain data
  • CP2 is the supervised public key of the second-level supervised node corresponding to the current node
  • pp1 is the supervised private key of the first-level supervised node in the first cycle group domain.
  • e(DP11, CP2) pp1 can decrypt the encrypted data Text1 and obtain the plaintext data corresponding to the encrypted data published by the supervised node (ordinary node) on the blockchain, thereby realizing the supervision of the data released by the supervised node. It should be noted that since the supervision private key pp1 of the first-level supervisory node is kept by the first-level supervisory node itself, and the supervisory private keys used by different first-level supervisory nodes are different, other first-level supervisory nodes cannot decrypt non-supervised objects The released data guarantees the regulatory requirements of secondary supervision for data isolation.
  • FIG. 5 is a schematic flowchart of a fourth embodiment of a two-level supervision method for a blockchain of this application.
  • the blockchain two-level supervision method further includes the following steps:
  • Step S410 When viewing the data on the chain, if the current node is a secondary supervisory node and the data to be viewed is encrypted data Text1, calculate the bilinear pair e(DP11, PP2) cp1 ;
  • Step S420 Use e(DP11, PP2) cp1 to decrypt the encrypted data Text1 published on the blockchain by the supervised ordinary node to obtain the corresponding plaintext data.
  • DP11 is the private key generated by the supervised node for the data on the chain
  • PP2 is the supervision public key of the first-level supervisory node under the second-level supervisory node
  • cp1 is the supervision private key of the second-level supervisory node in the first cycle group domain.
  • FIG. 6 is a schematic flowchart of a fifth embodiment of a two-level supervision method for a blockchain of this application.
  • the blockchain two-level supervision method further includes the following steps:
  • Step S520 Use key2 to decrypt the encrypted data Text2 published by the supervised primary supervision node on the blockchain to obtain corresponding plaintext data.
  • the second-level supervisory node needs to view the encrypted data Text2 published by the supervised node (first-level supervisory node) corresponding to this node on the blockchain, the following bilinear pair needs to be calculated first:
  • cp1 is the supervision private key of the current secondary supervision node
  • DP12 is the private key generated by the supervised node for the data on the chain.
  • first level supervision Node the plaintext data corresponding to the encrypted data released on the blockchain
  • This application also provides a two-level supervision device for the blockchain.
  • FIG. 7 is a schematic diagram of functional modules of an embodiment of a two-level supervision device for a blockchain of this application.
  • the blockchain two-level supervision device includes:
  • the generating module 10 is used to generate a public-private key pair (dp11, DP11) corresponding to the data to be uploaded on the current node under the preset first cyclic group domain if the current node is an ordinary node when uploading data on the chain;
  • the encryption method of the uplink data is improved, and the uplink data is encrypted based on the bilinear encryption algorithm. Before encryption, you need to generate the corresponding public-private key pair for the data to be uploaded.
  • a corresponding public-private key pair (dp11, DP11) is generated for the data to be uploaded, where dp11 is the private key and DP11 is the public key.
  • the public and private key pair (dp11, DP11) belongs to the first cyclic group domain.
  • the calculation module 20 is used to calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cyclic group domain, and CP2 is the supervision public key corresponding to the current node The supervision public key of the second-level supervision node in the preset second cycle group domain;
  • the private key dp11 is not used directly to encrypt the data to be uploaded, but a bilinear pair is used for encryption.
  • the specific format of the bilinear pair is as follows:
  • PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first recurring group domain
  • CP2 is the supervision public key of the secondary supervision node corresponding to the current node under the preset second recurring group domain.
  • the encryption module 30 is used for encrypting the data to be uploaded on the chain using e(PP1, CP2) dp11 to obtain encrypted data Text1;
  • the publishing module 40 is used to publish the encrypted data Text1 and the public key DP11 to the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
  • the data on the chain is encrypted based on the bilinear encryption algorithm, that is, the data to be chained is encrypted using e(PP1, CP2) dp11 to obtain encrypted data Text1, and then the encrypted data Text1 and the public key DP11 Publish to the blockchain.
  • the encryption key of the data on the chain is e(PP1, CP2) dp11 , the encryption key is generated using the supervision public key PP1 of the primary supervision node corresponding to the current node and the supervision of the secondary supervision node corresponding to the current node
  • the public key CP2 therefore, the encrypted data Text1 can only be decrypted by the corresponding primary supervision node or secondary supervision node, and other primary supervision nodes cannot decrypt, thereby ensuring the supervision requirements of secondary supervision for data isolation.
  • a bilinear encryption algorithm is used to encrypt data on the chain.
  • the encryption key of the data on the chain is a bilinear pair, and the generation of the bilinear pair uses the first-level supervisory node corresponding to the current node.
  • the supervision public key and the supervision public key of the secondary supervision node so that the encrypted data on the common node can only be decrypted by the corresponding primary supervision node or secondary supervision node, and other primary supervision nodes cannot decrypt, thus ensuring The regulatory requirements of secondary supervision for data isolation.
  • This application also provides a computer-readable storage medium, which may be a non-volatile storage medium or a volatile storage medium, which is not specifically limited by this application.
  • the computer-readable storage medium stores a blockchain two-level supervision program, and when the blockchain two-level supervision program is executed by a processor, the district as described in any of the above embodiments is implemented.
  • the steps of the blockchain two-level supervision method can refer to the various embodiments of the block chain two-level supervision method of the present application, so it will not be repeated.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present application relates to the technical field of blockchains. Disclosed is a blockchain two-stage supervision method, comprising: when data is uploaded, if the current node is an ordinary node, generating a public-private key pair (dp11, DP11) corresponding to the data to be uploaded of the current node under a preset first cyclic group domain; calculating a bilinear pair e (PP1, CP2)dp11, wherein PP1 is a supervision public key of a first-stage supervision node corresponding to the current node under the preset first cyclic group domain, and CP2 is a supervision public key of a second-stage supervision node corresponding to the current node under a preset second cyclic group domain; using the e (PP1, CP2)dp11 to encrypt the data to be uploaded so as to obtain encrypted data Text1; and publishing the encrypted data Text1 and the public key DP11 onto a blockchain, so that the first-stage supervision node or the second-stage supervision node corresponding to the current node performs supervision and viewing. Further disclosed are a blockchain two-stage supervision apparatus and device, and a computer-readable storage medium. The present application achieves the two-stage supervision of the data on the blockchain, and meets the supervision requirement of the two-stage supervision for data isolation.

Description

区块链两级监管方法、装置、设备及存储介质Blockchain two-level supervision method, device, equipment and storage medium
本申请要求于2019年6月21日提交中国专利局、申请号为201910541954.6、发明名称为“区块链两级监管方法、装置、设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在申请中This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on June 21, 2019, the application number is 201910541954.6, and the invention title is "Blockchain two-level supervision method, device, equipment and storage medium", and its entire content Incorporated in the application by reference
技术领域Technical field
本申请涉及区块链技术领域,尤其涉及一种区块链两级监管方法、装置、设备及计算机可读存储介质。This application relates to the field of blockchain technology, and in particular to a method, device, equipment and computer-readable storage medium for two-level supervision of blockchain.
背景技术Background technique
区块链是当今炙手可热的金融科技技术,但其匿名性和数据加密等特点更像是一枚双刃剑,在保护了用户的数据安全和隐私的同时,也为监管带来了巨大的困难。而金融交易天生就具有很大的信息不对称性,如果任由这些金融交易自然生长,则会造成信息不平等的加剧、系统性风险扩大,所以,严格的监管是必须要解决的难题。Blockchain is a hot financial technology technology today, but its anonymity and data encryption are more like a double-edged sword. While protecting the data security and privacy of users, it also brings huge difficulties to supervision. . Financial transactions are inherently highly asymmetrical in information. If these financial transactions are allowed to grow naturally, it will increase information inequality and expand systemic risks. Therefore, strict supervision is a problem that must be resolved.
传统的区块链通常采用的是一级监管策略,也即用监管的公钥将上链数据的加密密钥进行加密,然后监管节点可以用自己的私钥对被监管节点的上链数据解密,从而查看被监管节点的所有上链数据,由此实现监管。但在实际业务场景中,常有多层级监管的需求,比如:省级监管仅可以监管本省内所有节点上链的数据,但是不能监管其他省内的数据(省和省之间有数据隔离的需求),而国家级监管可以监管全国所有节点上链的数据。显然,如果采用传统的区块链一级监管策略所上链的数据是难以实现多层级监管需求的。The traditional blockchain usually adopts the first-level supervision strategy, that is, the encryption key of the data on the chain is encrypted with the public key of the supervision, and then the supervising node can use its own private key to decrypt the data on the chain of the supervised node , So as to view all the on-chain data of the supervised node, thus realizing supervision. However, in actual business scenarios, there is often a need for multi-level supervision. For example, provincial supervision can only supervise the data on the chain of all nodes in the province, but cannot supervise the data in other provinces (there is data isolation between provinces and provinces). Demand), and national supervision can supervise the data on the chain of all nodes across the country. Obviously, it is difficult to achieve multi-level supervision requirements if the data on the chain is adopted by the traditional blockchain one-level supervision strategy.
发明内容Summary of the invention
本申请的主要目的在于提供一种区块链两级监管方法、装置、设备及计算机可读存储介质,旨在解决传统的区块链监管策略不能满足多层级监管需求的技术问题。The main purpose of this application is to provide a blockchain two-level supervision method, device, equipment, and computer-readable storage medium, aiming to solve the technical problem that the traditional blockchain supervision strategy cannot meet the multi-level supervision requirements.
为实现上述目的,本申请提供一种区块链两级监管方法,所述区块链两级监管方法包括以下步骤:In order to achieve the above objective, this application provides a two-level supervision method for the blockchain, and the two-level supervision method for the blockchain includes the following steps:
在上链数据时,若当前节点为普通节点,则生成当前节点在预置第一循环群域下的待上链数据对应的公私钥对(dp11,DP11);When uploading data on the chain, if the current node is a normal node, then generate the public-private key pair (dp11, DP11) corresponding to the data to be uploaded on the current node under the preset first cyclic group domain;
计算双线性对e(PP1,CP2) dp11,其中,PP1为当前节点对应的一级监管节点在预置第一循环群域下的监管公钥,CP2为当前节点对应的二级监管节点在预置第二循环群域下的监管公钥; Calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cycle group domain, and CP2 is the secondary supervision node corresponding to the current node in Preset the supervision public key under the second cycle group domain;
使用e(PP1,CP2) dp11对待上链数据进行加密,得到加密数据Text1; Use e(PP1, CP2) dp11 to encrypt the data to be chained to get encrypted data Text1;
将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看。Publish the encrypted data Text1 and the public key DP11 to the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
可选地,所述区块链两级监管方法还包括:Optionally, the blockchain two-level supervision method further includes:
在上链数据时,若当前节点为一级监管节点,则生成当前节点在所述第一循环群域下的待上链数据对应的公私钥对(dp12,DP12);When uploading data on the chain, if the current node is a first-level supervisory node, generate a public-private key pair (dp12, DP12) corresponding to the data to be uploaded on the current node under the first cyclic group domain;
计算key1=dp12*CP1,其中,CP1为当前节点对应的二级监管节点在所述第一循环群域下的监管公钥;Calculate key1=dp12*CP1, where CP1 is the supervision public key of the secondary supervision node corresponding to the current node under the first recurring group domain;
使用key1对待上链数据进行加密,得到加密数据Text2;Use key1 to encrypt the data to be chained to get encrypted data Text2;
将加密数据Text2以及公钥DP12发布到区块链上,以供当前节点对应的二级监管节点进行监管查看。Publish the encrypted data Text2 and the public key DP12 to the blockchain for supervision and review by the secondary supervisory node corresponding to the current node.
可选地,在所述将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看的步骤之后,还包括:Optionally, after the step of publishing the encrypted data Text1 and the public key DP11 on the blockchain for supervision and review by the primary or secondary supervision node corresponding to the current node, the method further includes:
在查看链上数据时,若当前节点为一级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,CP2) pp1When viewing the data on the chain, if the current node is a first-level supervisory node and the data to be viewed is encrypted data Text1, then the bilinear pair e(DP11, CP2) pp1 is calculated;
使用e(DP11,CP2) pp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Use e(DP11, CP2) pp1 to decrypt the encrypted data Text1 published on the blockchain by the supervised common node to obtain the corresponding plaintext data.
可选地,在所述将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看的步骤之后,还包括:Optionally, after the step of publishing the encrypted data Text1 and the public key DP11 on the blockchain for supervision and review by the primary or secondary supervision node corresponding to the current node, the method further includes:
在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,PP2) cp1When viewing the data on the chain, if the current node is a secondary supervision node and the data to be viewed is encrypted data Text1, then the bilinear pair e(DP11, PP2) cp1 is calculated;
使用e(DP11,PP2) cp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Use e(DP11, PP2) cp1 to decrypt the encrypted data Text1 published by the supervised common node on the blockchain to obtain the corresponding plaintext data.
可选地,在所述将加密数据Text2以及公钥DP12发布到区块链上,以供当前节点对应的二级监管节点进行监管查看的步骤之后,还包括:Optionally, after the step of publishing the encrypted data Text2 and the public key DP12 on the blockchain for supervision and review by the secondary supervision node corresponding to the current node, the method further includes:
在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text2,则计算key2=cp1*DP12,其中,cp1为当前节点在所述第一循环群域下的监管私钥;When viewing the data on the chain, if the current node is a secondary supervision node and the data to be viewed is encrypted data Text2, then calculate key2=cp1*DP12, where cp1 is the supervision privacy of the current node in the first cycle group domain. key;
使用key2对被监管的一级监管节点发布到区块链上的加密数据Text2进行解密,得到对应的明文数据。Use key2 to decrypt the encrypted data Text2 published on the blockchain by the supervised primary supervision node to obtain the corresponding plaintext data.
进一步地,为实现上述目的,本申请还提供一种区块链两级监管装置,所述区块链两级监管装置包括:Further, in order to achieve the above objective, this application also provides a two-level blockchain supervision device, the two-level blockchain supervision device includes:
生成模块,用于在上链数据时,若当前节点为普通节点,则生成当前节点在预置第一循环群域下的待上链数据对应的公私钥对(dp11,DP11);The generating module is used to generate the public-private key pair (dp11, DP11) corresponding to the data to be uploaded on the current node under the preset first cycle group domain when the current node is an ordinary node when uploading data on the chain;
计算模块,用于计算双线性对e(PP1,CP2) dp11,其中,PP1为当前节点对应的一级监管节点在预置第一循环群域下的监管公钥,CP2为当前节点对应的二级监管节点在预置第二循环群域下的监管公钥; The calculation module is used to calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cyclic group domain, and CP2 is the supervision public key corresponding to the current node The supervision public key of the secondary supervision node under the preset second cycle group domain;
加密模块,用于使用e(PP1,CP2) dp11对待上链数据进行加密,得到加密数据Text1; Encryption module, used to use e(PP1, CP2) dp11 to encrypt the data to be chained to obtain encrypted data Text1;
发布模块,用于将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看。The publishing module is used to publish the encrypted data Text1 and the public key DP11 to the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
进一步地,为实现上述目的,本申请还提供一种区块链两级监管设备,所述区块链两级监管设备包括存储器、处理器以及存储在所述存储器上并可在所述处理器上运行的区块链两级监管程序,所述区块链两级监管程序被所述处理器执行时实现如上述任一项所述的区块链两级监管方法的步骤。Further, in order to achieve the above object, the present application also provides a two-level blockchain supervision device, which includes a memory, a processor, and is stored on the memory and can be stored on the processor. A blockchain two-level supervision program running on the computer, when the blockchain two-level supervision program is executed by the processor, the steps of the blockchain two-level supervision method as described in any one of the above are implemented.
进一步地,为实现上述目的,本申请还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有区块链两级监管程序,所述区块链两级监管程序被处理器执行时实现如上述任一项所述的区块链两级监管方法的步骤。Further, in order to achieve the above object, the present application also provides a computer-readable storage medium having a two-level blockchain supervision program stored on the computer-readable storage medium, and the two-level blockchain supervision program is The steps of the blockchain two-level supervision method as described in any one of the above are implemented during execution.
本申请利用双线性对加密算法对上链数据进行加密,上链数据的加密密钥为双线性对,并且该双线性对的生成使用了当前节点分别对应的一级监管 节点的监管公钥以及二级监管节点的监管公钥,从而使得普通节点上链的加密数据只能由对应的一级监管节点或二级监管节点所解密,其他一级监管节点无法解密,从而保证了二级监管对于数据隔离的监管需求。This application uses a bilinear encryption algorithm to encrypt data on the chain. The encryption key of the data on the chain is a bilinear pair, and the generation of the bilinear pair uses the supervision of the primary supervisory node corresponding to the current node. The public key and the supervision public key of the second-level supervisory node, so that the encrypted data on the chain of the ordinary node can only be decrypted by the corresponding first-level supervisory node or the second-level supervisory node, and other first-level supervisory nodes cannot decrypt, thus ensuring the second Level supervision requires supervision of data isolation.
附图说明Description of the drawings
图1为本申请区块链两级监管设备实施例方案涉及的设备硬件运行环境的结构示意图;FIG. 1 is a schematic diagram of the structure of the device hardware operating environment involved in the embodiment of the application's blockchain two-level supervision device;
图2为本申请区块链两级监管方法第一实施例的流程示意图;FIG. 2 is a schematic flowchart of a first embodiment of a two-level supervision method for applying a blockchain;
图3为本申请区块链两级监管方法第二实施例的流程示意图;FIG. 3 is a schematic flowchart of a second embodiment of a two-level supervision method for applying a blockchain;
图4为本申请区块链两级监管方法第三实施例的流程示意图;FIG. 4 is a schematic flowchart of a third embodiment of a two-level supervision method for applying a blockchain;
图5为本申请区块链两级监管方法第四实施例的流程示意图;FIG. 5 is a schematic flowchart of a fourth embodiment of a two-level supervision method for applying a blockchain;
图6为本申请区块链两级监管方法第五实施例的流程示意图;FIG. 6 is a schematic flowchart of a fifth embodiment of a two-level supervision method for applying a blockchain;
图7为本申请区块链两级监管装置一实施例的功能模块示意图。FIG. 7 is a schematic diagram of functional modules of an embodiment of a two-level supervision device for a blockchain of this application.
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The realization, functional characteristics, and advantages of the purpose of this application will be further described in conjunction with the embodiments and with reference to the accompanying drawings.
具体实施方式Detailed ways
应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。It should be understood that the specific embodiments described herein are only used to explain the application, and not used to limit the application.
本申请提供一种区块链两级监管设备。This application provides a two-level blockchain supervision device.
参照图1,图1为本申请区块链两级监管设备实施例方案涉及的设备硬件运行环境的结构示意图。Referring to Fig. 1, Fig. 1 is a schematic structural diagram of the device hardware operating environment involved in the embodiment of the blockchain two-level supervision device of this application.
如图1所示,该区块链两级监管设备可以包括:处理器1001,例如CPU,通信总线1002、用户接口1003,网络接口1004,存储器1005。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储设备。As shown in FIG. 1, the blockchain two-level supervision device may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Among them, the communication bus 1002 is used to implement connection and communication between these components. The user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. The network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface). The memory 1005 may be a high-speed RAM memory, or a non-volatile memory (non-volatile memory), such as a magnetic disk memory. Optionally, the memory 1005 may also be a storage device independent of the foregoing processor 1001.
本领域技术人员可以理解,图1中示出的区块链两级监管设备的硬件结构并不构成对区块链两级监管设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。Those skilled in the art can understand that the hardware structure of the blockchain two-level supervision device shown in FIG. 1 does not constitute a limitation on the blockchain two-level supervision device, and may include more or less components than shown. Or combine certain components, or different component arrangements.
如图1所示,作为一种计算机可读存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及区块链两级监管程序。其中,操作系统是管理和控制区块链两级监管设备与软件资源的程序,支持网络通信模块、用户接口模块、区块链两级监管程序以及其他程序或软件的运行;网络通信模块用于管理和控制网络接口1004;用户接口模块用于管理和控制用户接口1003。As shown in FIG. 1, the memory 1005 as a computer-readable storage medium may include an operating system, a network communication module, a user interface module, and a two-level blockchain supervision program. Among them, the operating system is a program that manages and controls the two-level supervision equipment and software resources of the blockchain, and supports the operation of network communication modules, user interface modules, two-level blockchain supervision programs, and other programs or software; the network communication module is used for Manage and control the network interface 1004; the user interface module is used to manage and control the user interface 1003.
在图1所示的区块链两级监管设备硬件结构中,网络接口1004主要用于连接系统后台,与系统后台进行数据通信;用户接口1003主要用于连接客户端(用户端),与客户端进行数据通信;区块链两级监管设备通过处理器1001调用存储器1005中存储的区块链两级监管程序,并执行以下区块链两级监管方法的各实施例的操作。In the hardware structure of the block chain two-level supervision equipment shown in Figure 1, the network interface 1004 is mainly used to connect to the system backend and communicate with the system backend; the user interface 1003 is mainly used to connect the client (user end) and communicate with the customer The blockchain two-level supervision device calls the blockchain two-level supervision program stored in the memory 1005 through the processor 1001 and executes the operations of the following embodiments of the blockchain two-level supervision method.
基于上述区块链两级监管设备硬件结构,提出本申请区块链两级监管方法的各个实施例。Based on the above-mentioned block chain two-level supervision equipment hardware structure, various embodiments of the block chain two-level supervision method of this application are proposed.
参照图2,图2为本申请区块链两级监管方法第一实施例的流程示意图。本实施例中,所述区块链两级监管方法包括以下步骤:Referring to Fig. 2, Fig. 2 is a schematic flowchart of a first embodiment of a two-level supervision method for a blockchain of this application. In this embodiment, the blockchain two-level supervision method includes the following steps:
步骤S110,在上链数据时,若当前节点为普通节点,则生成当前节点在预置第一循环群域下的待上链数据对应的公私钥对(dp11,DP11);Step S110: When uploading data, if the current node is a normal node, generate a public-private key pair (dp11, DP11) corresponding to the data to be uploaded to the current node under the preset first cyclic group domain;
本实施例中,为实现二级监管需求,因此对上链数据的加密方式进行了改进,具体基于双线性对加密算法对上链数据进行加密。在加密之前,需要先为待上链数据生成对应的公私钥对。In this embodiment, in order to achieve secondary supervision requirements, the encryption method of the uplink data is improved, and the uplink data is encrypted based on the bilinear encryption algorithm. Before encryption, you need to generate the corresponding public-private key pair for the data to be uploaded.
本实施例中,若普通节点需要上链数据,则为待上链数据生成对应的公私钥对(dp11,DP11),其中,dp11为私钥、DP11为公钥。该公私钥对(dp11,DP11)属于第一循环群域。In this embodiment, if an ordinary node needs to upload data, a corresponding public-private key pair (dp11, DP11) is generated for the data to be uploaded, where dp11 is the private key and DP11 is the public key. The public and private key pair (dp11, DP11) belongs to the first cyclic group domain.
步骤S120,计算双线性对e(PP1,CP2) dp11,其中,PP1为当前节点对应的一级监管节点在预置第一循环群域下的监管公钥,CP2为当前节点对应的二级监管节点在预置第二循环群域下的监管公钥; Step S120: Calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cyclic group domain, and CP2 is the secondary supervision node corresponding to the current node The supervision public key of the supervision node under the preset second cycle group domain;
本实施例中并不直接使用私钥dp11对待上链数据进行加密,而是使用双线性对进行加密,双线性对的具体格式如下:In this embodiment, the private key dp11 is not used directly to encrypt the data to be uploaded, but a bilinear pair is used for encryption. The specific format of the bilinear pair is as follows:
e(PP1,CP2) dp11 e(PP1, CP2) dp11
其中,PP1为当前节点对应的一级监管节点在预置第一循环群域下的监管公钥,CP2为当前节点对应的二级监管节点在预置第二循环群域下的监管公钥。Among them, PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first recurring group domain, and CP2 is the supervision public key of the secondary supervision node corresponding to the current node under the preset second recurring group domain.
需要说明的是,所有区块链上的普通节点、一级监管节点与二级监管节点都使用同样的两个循环群来分别生成各自的公私钥对,以便利用双线性对的双线性特性实现数据加密与解密。It should be noted that all ordinary nodes, first-level supervision nodes and second-level supervision nodes on the blockchain use the same two cyclic groups to generate their respective public and private key pairs, in order to use the bilinearity of the bilinear pair Features realize data encryption and decryption.
步骤S130,使用e(PP1,CP2) dp11对待上链数据进行加密,得到加密数据Text1; Step S130, use e(PP1, CP2) dp11 to encrypt the data to be uploaded to the chain to obtain encrypted data Text1;
步骤S140,将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看。Step S140: Publish the encrypted data Text1 and the public key DP11 on the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
本实施例中,基于双线性对加密算法对上链数据进行加密,也即使用e(PP1,CP2) dp11对待上链数据进行加密,得到加密数据Text1,然后将加密数据Text1以及公钥DP11发布到区块链上。由于上链数据的加密密钥为e(PP1,CP2) dp11,该加密密钥的生成使用的是当前节点对应的一级监管节点的监管公钥PP1以及当前节点对应的二级监管节点的监管公钥CP2,因此,该加密数据Text1只能由对应的一级监管节点或二级监管节点所解密,其他一级监管节点无法解密,从而保证了二级监管对于数据隔离的监管需求。 In this embodiment, the data on the chain is encrypted based on the bilinear encryption algorithm, that is, the data to be chained is encrypted using e(PP1, CP2) dp11 to obtain encrypted data Text1, and then the encrypted data Text1 and the public key DP11 Publish to the blockchain. Since the encryption key of the data on the chain is e(PP1, CP2) dp11 , the encryption key is generated using the supervision public key PP1 of the primary supervision node corresponding to the current node and the supervision of the secondary supervision node corresponding to the current node The public key CP2, therefore, the encrypted data Text1 can only be decrypted by the corresponding primary supervision node or secondary supervision node, and other primary supervision nodes cannot decrypt, thereby ensuring the supervision requirements of secondary supervision for data isolation.
本实施例利用双线性对加密算法对上链数据进行加密,上链数据的加密密钥为双线性对,并且该双线性对的生成使用了当前节点分别对应的一级监管节点的监管公钥以及二级监管节点的监管公钥,从而使得普通节点上链的加密数据只能由对应的一级监管节点或二级监管节点所解密,其他一级监管节点无法解密,从而保证了二级监管对于数据隔离的监管需求。In this embodiment, a bilinear encryption algorithm is used to encrypt data on the chain. The encryption key of the data on the chain is a bilinear pair, and the generation of the bilinear pair uses the first-level supervisory node corresponding to the current node. The supervision public key and the supervision public key of the secondary supervision node, so that the encrypted data on the common node can only be decrypted by the corresponding primary supervision node or secondary supervision node, and other primary supervision nodes cannot decrypt, thus ensuring The regulatory requirements of secondary supervision for data isolation.
参照图3,图3为本申请区块链两级监管方法第二实施例的流程示意图。本实施例中,所述区块链两级监管方法还包括以下步骤:Referring to Fig. 3, Fig. 3 is a schematic flowchart of a second embodiment of a two-level supervision method for a blockchain of this application. In this embodiment, the blockchain two-level supervision method further includes the following steps:
步骤S210,在上链数据时,若当前节点为一级监管节点,则生成当前节点在所述第一循环群域下的待上链数据对应的公私钥对(dp12,DP12);Step S210: When uploading data on the chain, if the current node is a first-level supervisory node, generate a public-private key pair (dp12, DP12) corresponding to the data to be uploaded on the current node under the first cyclic group domain;
步骤S220,计算key1=dp12*CP1,其中,CP1为当前节点对应的二级监管节点在所述第一循环群域下的监管公钥;Step S220: Calculate key1=dp12*CP1, where CP1 is the supervision public key of the secondary supervision node corresponding to the current node under the first cyclic group domain;
步骤S230,使用key1对待上链数据进行加密,得到加密数据Text2;Step S230, use key1 to encrypt the data to be chained to obtain encrypted data Text2;
步骤S240,将加密数据Text2以及公钥DP12发布到区块链上,以供当前节点对应的二级监管节点进行监管查看。Step S240: Publish the encrypted data Text2 and the public key DP12 to the blockchain for supervision and review by the secondary supervisory node corresponding to the current node.
本实施例中,一级监管节点也可以上链数据,因此也属于二级监管节点的被监管对象。在上链数据时,一级监管节点需要为上链数据生成对应的公私钥对,该公私钥对(dp12,DP12)属于第一循环群域。In this embodiment, the first-level supervisory node can also upload data on the chain, so it also belongs to the supervised object of the second-level supervisory node. When uploading data on the chain, the primary supervisory node needs to generate a corresponding public-private key pair for the data on the chain. The public-private key pair (dp12, DP12) belongs to the first cyclic group domain.
一级监管节点对待上链数据进行加密所使用的加密密钥为key1=dp12*CP1,然后使用key1对待上链数据进行加密,得到加密数据Text2,并将加密数据Text2以及公钥DP12发布到区块链上,以供本节点对应的二级监管节点进行监管查看。The encryption key used by the primary supervisory node to encrypt the data to be chained is key1=dp12*CP1, and then use key1 to encrypt the data to be chained to obtain encrypted data Text2, and publish the encrypted data Text2 and the public key DP12 to the district On the block chain, it is available for supervision and inspection by the secondary supervision node corresponding to this node.
由于CP1为当前节点对应的二级监管节点在第一循环群域下的监管公钥,因而保证了本节点上链的加密数据只能由本节点对应的二级监管节点所解密,其他节点不能解密,从而保证了二级监管对于数据隔离的监管需求。Since CP1 is the supervision public key of the second-level supervisory node corresponding to the current node under the first cyclic group domain, it is guaranteed that the encrypted data on the chain of this node can only be decrypted by the second-level supervisory node corresponding to this node, and other nodes cannot decrypt , Thus ensuring the regulatory requirements of secondary supervision for data isolation.
参照图4,图4为本申请区块链两级监管方法第三实施例的流程示意图。本实施例中,所述区块链两级监管方法还包括以下步骤:Referring to FIG. 4, FIG. 4 is a schematic flowchart of a third embodiment of a two-level supervision method for a blockchain of this application. In this embodiment, the blockchain two-level supervision method further includes the following steps:
步骤S310,在查看链上数据时,若当前节点为一级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,CP2) pp1Step S310: When viewing the data on the chain, if the current node is a first-level supervisory node and the data to be viewed is encrypted data Text1, calculate the bilinear pair e(DP11, CP2) pp1 ;
步骤S320,使用e(DP11,CP2) pp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Step S320: Use e(DP11, CP2) pp1 to decrypt the encrypted data Text1 published on the blockchain by the supervised common node to obtain corresponding plaintext data.
本实施例中,若一级监管节点需要查看区块链上由本节点对应的被监管节点(普通节点)发布的加密数据Text1,则需先计算如下双线性对:In this embodiment, if the first-level supervisory node needs to view the encrypted data Text1 published by the supervised node (ordinary node) corresponding to this node on the blockchain, the following bilinear pair needs to be calculated first:
e(DP11,CP2) pp1 e(DP11, CP2) pp1
其中,DP11为被监管节点为上链数据生成的私钥,CP2为当前节点对应的二级监管节点的监管公钥,pp1为一级监管节点在第一循环群域下的监管私钥。Among them, DP11 is the private key generated by the supervised node for on-chain data, CP2 is the supervised public key of the second-level supervised node corresponding to the current node, and pp1 is the supervised private key of the first-level supervised node in the first cycle group domain.
加密数据Text1的加密密钥为e(PP1,CP2) dp11,由双线性对的特性可知,e(DP11,CP2) pp1=e(dp11*g,cp2*h) pp1=e(g,h) dp11*cp2*pp1=e(p11*g,cp2*h) dp11=e(PP1, CP2) dp11,其中,g∈第一循环群域G1,为G1的基点,h∈第二循环群域G2,为G2的基点。因此,使用e(DP11,CP2) pp1可以解密加密数据Text1,得到被监管节点(普通节点)在区块链上发布的加密数据对应的明文数据,从而实现对被监管节点发布数据的监管。需要说明的是,由于一级监管节点的监管私钥pp1由一级监管节点自身保管,且不同的一级监管节点所使用的监管私钥不同,因而使得其他一级监管节点无法解密非监管对象发布的数据,保证了二级监管对于数据隔离的监管需求。 The encryption key of the encrypted data Text1 is e(PP1, CP2) dp11 , which can be seen from the characteristics of the bilinear pair, e(DP11, CP2) pp1 = e(dp11*g, cp2*h) pp1 = e(g,h ) dp11*cp2*pp1 =e(p11*g,cp2*h) dp11 =e(PP1, CP2) dp11 , where g∈the first cyclic group domain G1 is the base point of G1, and h∈the second cyclic group domain G2 is the base point of G2. Therefore, using e(DP11, CP2) pp1 can decrypt the encrypted data Text1 and obtain the plaintext data corresponding to the encrypted data published by the supervised node (ordinary node) on the blockchain, thereby realizing the supervision of the data released by the supervised node. It should be noted that since the supervision private key pp1 of the first-level supervisory node is kept by the first-level supervisory node itself, and the supervisory private keys used by different first-level supervisory nodes are different, other first-level supervisory nodes cannot decrypt non-supervised objects The released data guarantees the regulatory requirements of secondary supervision for data isolation.
参照图5,图5为本申请区块链两级监管方法第四实施例的流程示意图。本实施例中,所述区块链两级监管方法还包括以下步骤:Referring to FIG. 5, FIG. 5 is a schematic flowchart of a fourth embodiment of a two-level supervision method for a blockchain of this application. In this embodiment, the blockchain two-level supervision method further includes the following steps:
步骤S410,在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,PP2) cp1Step S410: When viewing the data on the chain, if the current node is a secondary supervisory node and the data to be viewed is encrypted data Text1, calculate the bilinear pair e(DP11, PP2) cp1 ;
步骤S420,使用e(DP11,PP2) cp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Step S420: Use e(DP11, PP2) cp1 to decrypt the encrypted data Text1 published on the blockchain by the supervised ordinary node to obtain the corresponding plaintext data.
本实施例中,若二级监管节点需要查看区块链上由本节点对应的被监管节点(普通节点)发布的加密数据Text1,则需先计算如下双线性对:In this embodiment, if the secondary supervisory node needs to view the encrypted data Text1 published by the supervised node (ordinary node) corresponding to the node on the blockchain, the following bilinear pair needs to be calculated first:
e(DP11,PP2) cp1 e(DP11, PP2) cp1
其中,DP11为被监管节点为上链数据生成的私钥,PP2为二级监管节点下的一级监管节点的监管公钥,cp1为二级监管节点在第一循环群域下的监管私钥。Among them, DP11 is the private key generated by the supervised node for the data on the chain, PP2 is the supervision public key of the first-level supervisory node under the second-level supervisory node, and cp1 is the supervision private key of the second-level supervisory node in the first cycle group domain. .
加密数据Text1的加密密钥为e(PP1,CP2) dp11,由双线性对的特性可知,e(DP11,PP2) cp1=e(dp11*g,pp2*h) cp1=e(g,h) dp11*pp2*cp1=e(cp1*g,pp2*h) dp11,由于e(cp1*g,pp2*h) dp11=e(pp1*g,cp2*h) dp11,即e(DP11,PP2) cp1=e(PP1,CP2) dp11,因此,通过e(PP1,CP2) dp11可以解密加密数据Text1,得到被监管节点(普通节点)在区块链上发布的加密数据对应的明文数据,从而实现了一级监管节点和二级监管节点对被监管的普通节点发布的数据的监管,保证了二级监管需求。 The encryption key of the encrypted data Text1 is e(PP1, CP2) dp11 , which can be seen from the characteristics of the bilinear pair, e(DP11, PP2) cp1 = e(dp11*g, pp2*h) cp1 = e(g, h ) dp11*pp2*cp1 = e(cp1*g,pp2*h) dp11 , because e(cp1*g,pp2*h) dp11 = e(pp1*g,cp2*h) dp11 , that is, e(DP11,PP2 ) cp1 = e(PP1,CP2) dp11 , therefore, the encrypted data Text1 can be decrypted through e(PP1,CP2) dp11 , and the plaintext data corresponding to the encrypted data released by the supervised node (ordinary node) on the blockchain can be obtained, thereby It realizes the supervision of the data released by the supervised ordinary nodes by the primary supervision node and the secondary supervision node, and ensures the secondary supervision requirements.
参照图6,图6为本申请区块链两级监管方法第五实施例的流程示意图。本实施例中,所述区块链两级监管方法还包括以下步骤:Referring to FIG. 6, FIG. 6 is a schematic flowchart of a fifth embodiment of a two-level supervision method for a blockchain of this application. In this embodiment, the blockchain two-level supervision method further includes the following steps:
步骤S510,在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text2,则计算key2=cp1*DP12,其中,cp1为当前节点在所述第一循环群域下的监管私钥;Step S510: When viewing the data on the chain, if the current node is a secondary supervisory node and the data to be viewed is encrypted data Text2, calculate key2=cp1*DP12, where cp1 is the current node under the first cyclic group domain Custodial private key;
步骤S520,使用key2对被监管的一级监管节点发布到区块链上的加密数据Text2进行解密,得到对应的明文数据。Step S520: Use key2 to decrypt the encrypted data Text2 published by the supervised primary supervision node on the blockchain to obtain corresponding plaintext data.
本实施例中,若二级监管节点需要查看区块链上由本节点对应的被监管节点(一级监管节点)发布的加密数据Text2,则需先计算如下双线性对:In this embodiment, if the second-level supervisory node needs to view the encrypted data Text2 published by the supervised node (first-level supervisory node) corresponding to this node on the blockchain, the following bilinear pair needs to be calculated first:
key2=cp1*DP12key2=cp1*DP12
其中,cp1为当前二级监管节点在的监管私钥,DP12为被监管节点为上链数据生成的私钥。Among them, cp1 is the supervision private key of the current secondary supervision node, and DP12 is the private key generated by the supervised node for the data on the chain.
加密数据Text2的加密密钥为key1=dp12*CP1,由循环群特性可知,假设g∈第一循环群域G1,且为G1循环群域的基点,则:CP1=cp1*g;DP12=dp12*g;key1=dp12*CP1=dp12*cp1*g=cp1*dp12*g=cp1*DP12=key2;也即key1=key2,因此,key2可以解密加密数据Text2,得到被监管节点(一级监管节点)在区块链上发布的加密数据对应的明文数据,从而实现二级监管节点对被监管的一级监管节点发布数据的监管,保证了二级监管需求。The encryption key of the encrypted data Text2 is key1=dp12*CP1. From the characteristics of the cyclic group, assuming that g ∈ the first cyclic group domain G1, and is the base point of the G1 cyclic group domain, then: CP1=cp1*g; DP12=dp12 *g; key1=dp12*CP1=dp12*cp1*g=cp1*dp12*g=cp1*DP12=key2; that is, key1=key2, therefore, key2 can decrypt the encrypted data Text2 to obtain the supervised node (first level supervision Node) the plaintext data corresponding to the encrypted data released on the blockchain, so as to realize the supervision of the data released by the supervised first-level supervision node by the second-level supervision node, and ensure the second-level supervision demand.
本申请还提供一种区块链两级监管装置。This application also provides a two-level supervision device for the blockchain.
参照图7,图7为本申请区块链两级监管装置一实施例的功能模块示意图。本实施例中,所述区块链两级监管装置包括:Referring to FIG. 7, FIG. 7 is a schematic diagram of functional modules of an embodiment of a two-level supervision device for a blockchain of this application. In this embodiment, the blockchain two-level supervision device includes:
生成模块10,用于在上链数据时,若当前节点为普通节点,则生成当前节点在预置第一循环群域下的待上链数据对应的公私钥对(dp11,DP11);The generating module 10 is used to generate a public-private key pair (dp11, DP11) corresponding to the data to be uploaded on the current node under the preset first cyclic group domain if the current node is an ordinary node when uploading data on the chain;
本实施例中,为实现二级监管需求,因此对上链数据的加密方式进行了改进,具体基于双线性对加密算法对上链数据进行加密。在加密之前,需要先为待上链数据生成对应的公私钥对。In this embodiment, in order to achieve secondary supervision requirements, the encryption method of the uplink data is improved, and the uplink data is encrypted based on the bilinear encryption algorithm. Before encryption, you need to generate the corresponding public-private key pair for the data to be uploaded.
本实施例中,若普通节点需要上链数据,则为待上链数据生成对应的公私钥对(dp11,DP11),其中,dp11为私钥、DP11为公钥。该公私钥对(dp11,DP11)属于第一循环群域。In this embodiment, if an ordinary node needs to upload data, a corresponding public-private key pair (dp11, DP11) is generated for the data to be uploaded, where dp11 is the private key and DP11 is the public key. The public and private key pair (dp11, DP11) belongs to the first cyclic group domain.
计算模块20,用于计算双线性对e(PP1,CP2) dp11,其中,PP1为当前节 点对应的一级监管节点在预置第一循环群域下的监管公钥,CP2为当前节点对应的二级监管节点在预置第二循环群域下的监管公钥; The calculation module 20 is used to calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cyclic group domain, and CP2 is the supervision public key corresponding to the current node The supervision public key of the second-level supervision node in the preset second cycle group domain;
本实施例中并不直接使用私钥dp11对待上链数据进行加密,而是使用双线性对进行加密,双线性对的具体格式如下:In this embodiment, the private key dp11 is not used directly to encrypt the data to be uploaded, but a bilinear pair is used for encryption. The specific format of the bilinear pair is as follows:
e(PP1,CP2) dp11 e(PP1, CP2) dp11
其中,PP1为当前节点对应的一级监管节点在预置第一循环群域下的监管公钥,CP2为当前节点对应的二级监管节点在预置第二循环群域下的监管公钥。Among them, PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first recurring group domain, and CP2 is the supervision public key of the secondary supervision node corresponding to the current node under the preset second recurring group domain.
需要说明的是,所有区块链上的普通节点、一级监管节点与二级监管节点都使用同样的两个循环群来分别生成各自的公私钥对,以便利用双线性对的双线性特性实现数据加密与解密。It should be noted that all ordinary nodes, first-level supervision nodes and second-level supervision nodes on the blockchain use the same two cyclic groups to generate their respective public and private key pairs, in order to use the bilinearity of the bilinear pair Features realize data encryption and decryption.
加密模块30,用于使用e(PP1,CP2) dp11对待上链数据进行加密,得到加密数据Text1; The encryption module 30 is used for encrypting the data to be uploaded on the chain using e(PP1, CP2) dp11 to obtain encrypted data Text1;
发布模块40,用于将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看。The publishing module 40 is used to publish the encrypted data Text1 and the public key DP11 to the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
本实施例中,基于双线性对加密算法对上链数据进行加密,也即使用e(PP1,CP2) dp11对待上链数据进行加密,得到加密数据Text1,然后将加密数据Text1以及公钥DP11发布到区块链上。由于上链数据的加密密钥为e(PP1,CP2) dp11,该加密密钥的生成使用的是当前节点对应的一级监管节点的监管公钥PP1以及当前节点对应的二级监管节点的监管公钥CP2,因此,该加密数据Text1只能由对应的一级监管节点或二级监管节点所解密,其他一级监管节点无法解密,从而保证了二级监管对于数据隔离的监管需求。 In this embodiment, the data on the chain is encrypted based on the bilinear encryption algorithm, that is, the data to be chained is encrypted using e(PP1, CP2) dp11 to obtain encrypted data Text1, and then the encrypted data Text1 and the public key DP11 Publish to the blockchain. Since the encryption key of the data on the chain is e(PP1, CP2) dp11 , the encryption key is generated using the supervision public key PP1 of the primary supervision node corresponding to the current node and the supervision of the secondary supervision node corresponding to the current node The public key CP2, therefore, the encrypted data Text1 can only be decrypted by the corresponding primary supervision node or secondary supervision node, and other primary supervision nodes cannot decrypt, thereby ensuring the supervision requirements of secondary supervision for data isolation.
本实施例利用双线性对加密算法对上链数据进行加密,上链数据的加密密钥为双线性对,并且该双线性对的生成使用了当前节点分别对应的一级监管节点的监管公钥以及二级监管节点的监管公钥,从而使得普通节点上链的加密数据只能由对应的一级监管节点或二级监管节点所解密,其他一级监管节点无法解密,从而保证了二级监管对于数据隔离的监管需求。In this embodiment, a bilinear encryption algorithm is used to encrypt data on the chain. The encryption key of the data on the chain is a bilinear pair, and the generation of the bilinear pair uses the first-level supervisory node corresponding to the current node. The supervision public key and the supervision public key of the secondary supervision node, so that the encrypted data on the common node can only be decrypted by the corresponding primary supervision node or secondary supervision node, and other primary supervision nodes cannot decrypt, thus ensuring The regulatory requirements of secondary supervision for data isolation.
本申请还提供一种计算机可读存储介质,该存储介质可以是非易失性存储介质,也可以是易失性存储介质,具体本申请不做限定。This application also provides a computer-readable storage medium, which may be a non-volatile storage medium or a volatile storage medium, which is not specifically limited by this application.
本实施例中,所述计算机可读存储介质上存储有区块链两级监管程序,所述区块链两级监管程序被处理器执行时实现如上述任一项实施例中所述的区块链两级监管方法的步骤。其中,区块链两级监管程序被处理器执行时所实现的方法可参照本申请区块链两级监管方法的各个实施例,因此不再过多赘述。In this embodiment, the computer-readable storage medium stores a blockchain two-level supervision program, and when the blockchain two-level supervision program is executed by a processor, the district as described in any of the above embodiments is implemented. The steps of the blockchain two-level supervision method. Among them, the method implemented when the block chain two-level supervision program is executed by the processor can refer to the various embodiments of the block chain two-level supervision method of the present application, so it will not be repeated.
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,这些均属于本申请的保护之内。The embodiments of the present application are described above with reference to the accompanying drawings, but the present application is not limited to the above-mentioned specific embodiments. The above-mentioned specific embodiments are only illustrative and not restrictive. Those of ordinary skill in the art are Under the enlightenment of this application, without departing from the purpose of this application and the scope of protection of the claims, many forms can be made, any equivalent structure or equivalent process transformation made by using the content of the description and drawings of this application, or Directly or indirectly used in other related technical fields, these are all protected by this application.

Claims (20)

  1. 一种区块链两级监管方法,所述区块链两级监管方法包括以下步骤:A block chain two-level supervision method, the block chain two-level supervision method includes the following steps:
    在上链数据时,若当前节点为普通节点,则生成当前节点在预置第一循环群域下的待上链数据对应的公私钥对(dp11,DP11);When uploading data on the chain, if the current node is a normal node, then generate the public-private key pair (dp11, DP11) corresponding to the data to be uploaded on the current node under the preset first cyclic group domain;
    计算双线性对e(PP1,CP2) dp11,其中,PP1为当前节点对应的一级监管节点在预置第一循环群域下的监管公钥,CP2为当前节点对应的二级监管节点在预置第二循环群域下的监管公钥; Calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cycle group domain, and CP2 is the secondary supervision node corresponding to the current node in Preset the supervision public key under the second cycle group domain;
    使用e(PP1,CP2) dp11对待上链数据进行加密,得到加密数据Text1; Use e(PP1, CP2) dp11 to encrypt the data to be chained to get encrypted data Text1;
    将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看。Publish the encrypted data Text1 and the public key DP11 to the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
  2. 如权利要求1所述的区块链两级监管方法,所述区块链两级监管方法还包括:The blockchain two-level supervision method according to claim 1, which further comprises:
    在上链数据时,若当前节点为一级监管节点,则生成当前节点在所述第一循环群域下的待上链数据对应的公私钥对(dp12,DP12);When uploading data on the chain, if the current node is a first-level supervisory node, generate a public-private key pair (dp12, DP12) corresponding to the data to be uploaded on the current node under the first cyclic group domain;
    计算key1=dp12*CP1,其中,CP1为当前节点对应的二级监管节点在所述第一循环群域下的监管公钥;Calculate key1=dp12*CP1, where CP1 is the supervision public key of the secondary supervision node corresponding to the current node under the first recurring group domain;
    使用key1对待上链数据进行加密,得到加密数据Text2;Use key1 to encrypt the data to be chained to get encrypted data Text2;
    将加密数据Text2以及公钥DP12发布到区块链上,以供当前节点对应的二级监管节点进行监管查看。Publish the encrypted data Text2 and the public key DP12 to the blockchain for supervision and review by the secondary supervisory node corresponding to the current node.
  3. 如权利要求1所述的区块链两级监管方法,在所述将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看的步骤之后,还包括:The blockchain two-level supervision method according to claim 1, in which the encrypted data Text1 and the public key DP11 are published on the blockchain for supervision by the primary supervision node or secondary supervision node corresponding to the current node After reviewing the steps, it also includes:
    在查看链上数据时,若当前节点为一级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,CP2) pp1When viewing the data on the chain, if the current node is a first-level supervisory node and the data to be viewed is encrypted data Text1, then the bilinear pair e(DP11, CP2) pp1 is calculated;
    使用e(DP11,CP2) pp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Use e(DP11, CP2) pp1 to decrypt the encrypted data Text1 published on the blockchain by the supervised common node to obtain the corresponding plaintext data.
  4. 如权利要求1所述的区块链两级监管方法,在所述将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看的步骤之后,还包括:The blockchain two-level supervision method according to claim 1, in which the encrypted data Text1 and the public key DP11 are published on the blockchain for supervision by the primary supervision node or secondary supervision node corresponding to the current node After reviewing the steps, it also includes:
    在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,PP2) cp1When viewing the data on the chain, if the current node is a secondary supervision node and the data to be viewed is encrypted data Text1, then the bilinear pair e(DP11, PP2) cp1 is calculated;
    使用e(DP11,PP2) cp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Use e(DP11, PP2) cp1 to decrypt the encrypted data Text1 published by the supervised common node on the blockchain to obtain the corresponding plaintext data.
  5. 如权利要求3所述的区块链两级监管方法,在所述将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看的步骤之后,还包括:The blockchain two-level supervision method according to claim 3, in which the encrypted data Text1 and the public key DP11 are published on the blockchain for supervision by the primary supervision node or secondary supervision node corresponding to the current node After reviewing the steps, it also includes:
    在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,PP2) cp1When viewing the data on the chain, if the current node is a secondary supervision node and the data to be viewed is encrypted data Text1, then the bilinear pair e(DP11, PP2) cp1 is calculated;
    使用e(DP11,PP2) cp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Use e(DP11, PP2) cp1 to decrypt the encrypted data Text1 published by the supervised common node on the blockchain to obtain the corresponding plaintext data.
  6. 如权利要求2所述的区块链两级监管方法,在所述将加密数据Text2以及公钥DP12发布到区块链上,以供当前节点对应的二级监管节点进行监管查看的步骤之后,还包括:The blockchain two-level supervision method according to claim 2, after the step of publishing the encrypted data Text2 and the public key DP12 on the blockchain for supervision and review by the secondary supervision node corresponding to the current node, Also includes:
    在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text2,则计算key2=cp1*DP12,其中,cp1为当前节点在所述第一循环群域下的监管私钥;When viewing the data on the chain, if the current node is a secondary supervision node and the data to be viewed is encrypted data Text2, then calculate key2=cp1*DP12, where cp1 is the supervision privacy of the current node in the first cycle group domain. key;
    使用key2对被监管的一级监管节点发布到区块链上的加密数据Text2进行解密,得到对应的明文数据。Use key2 to decrypt the encrypted data Text2 published by the supervised primary supervision node on the blockchain to obtain the corresponding plaintext data.
  7. 一种区块链两级监管装置,所述区块链两级监管装置包括:A block chain two-level supervision device, the block chain two-level supervision device includes:
    生成模块,用于在上链数据时,若当前节点为普通节点,则生成当前节点在预置第一循环群域下的待上链数据对应的公私钥对(dp11,DP11);The generating module is used to generate the public-private key pair (dp11, DP11) corresponding to the data to be uploaded on the current node under the preset first cycle group domain when the current node is an ordinary node when uploading data on the chain;
    计算模块,用于计算双线性对e(PP1,CP2) dp11,其中,PP1为当前节点对应的一级监管节点在预置第一循环群域下的监管公钥,CP2为当前节点对 应的二级监管节点在预置第二循环群域下的监管公钥; The calculation module is used to calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cyclic group domain, and CP2 is the supervision public key corresponding to the current node The supervision public key of the secondary supervision node under the preset second cycle group domain;
    加密模块,用于使用e(PP1,CP2) dp11对待上链数据进行加密,得到加密数据Text1; Encryption module, used to use e(PP1, CP2) dp11 to encrypt the data to be chained to obtain encrypted data Text1;
    发布模块,用于将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看。The publishing module is used to publish the encrypted data Text1 and the public key DP11 to the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
  8. 如权利要求7所述的区块链两级监管装置,The blockchain two-level supervision device according to claim 7,
    所述生成模块还用于:在上链数据时,若当前节点为一级监管节点,则生成当前节点在所述第一循环群域下的待上链数据对应的公私钥对(dp12,DP12);The generating module is also used for: when uploading data on the chain, if the current node is a first-level supervisory node, generate the public-private key pair (dp12, DP12) corresponding to the data to be uploaded under the first cyclic group domain of the current node. );
    所述计算模块还用于:计算key1=dp12*CP1,其中,CP1为当前节点对应的二级监管节点在所述第一循环群域下的监管公钥;The calculation module is also used to calculate key1=dp12*CP1, where CP1 is the supervision public key of the secondary supervision node corresponding to the current node under the first cyclic group domain;
    所述加密模块还用于:使用key1对待上链数据进行加密,得到加密数据Text2;The encryption module is also used to: use key1 to encrypt the data to be chained to obtain encrypted data Text2;
    所述发布模块还用于:将加密数据Text2以及公钥DP12发布到区块链上,以供当前节点对应的二级监管节点进行监管查看。The publishing module is also used to publish the encrypted data Text2 and the public key DP12 to the blockchain for supervision and viewing by the secondary supervision node corresponding to the current node.
  9. 如权利要求7所述的区块链两级监管装置,所述区块链两级监管装置还包括:解密模块;The blockchain two-level supervision device according to claim 7, the blockchain two-level supervision device further comprising: a decryption module;
    所述计算模块还用于:在查看链上数据时,若当前节点为一级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,CP2) pp1;若当前节点为二级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,PP2) cp1;若当前节点为二级监管节点且待查看数据为加密数据Text2,则计算key2=cp1*DP12,其中,cp1为当前节点在所述第一循环群域下的监管私钥; The calculation module is also used to calculate the bilinear pair e(DP11, CP2) pp1 when viewing the data on the chain, if the current node is a first-level supervisory node and the data to be viewed is encrypted data Text1; if the current node is If the secondary supervisory node and the data to be viewed is encrypted data Text1, calculate the bilinear pair e(DP11, PP2) cp1 ; if the current node is the secondary supervisory node and the data to be viewed is encrypted data Text2, then calculate key2=cp1* DP12, where cp1 is the supervisory private key of the current node in the first cyclic group domain;
    所述解密模块用于:在查看链上数据时,若当前节点为一级监管节点且待查看数据为加密数据Text1,则使用e(DP11,CP2) pp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据;若当前节点为二级监管节点且待查看数据为加密数据Text1,则使用e(DP11,PP2) cp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应 的明文数据;若当前节点为二级监管节点且待查看数据为加密数据Text2,则使用key2对被监管的一级监管节点发布到区块链上的加密数据Text2进行解密,得到对应的明文数据。 The decryption module is used to: when viewing the data on the chain, if the current node is a first-level supervision node and the data to be viewed is encrypted data Text1, then use e(DP11, CP2) pp1 to publish to the block the supervised ordinary node The encrypted data Text1 on the chain is decrypted to obtain the corresponding plaintext data; if the current node is a secondary supervision node and the data to be viewed is encrypted data Text1, use e(DP11, PP2) cp1 to publish to the supervised common node The encrypted data Text1 on the block chain is decrypted to obtain the corresponding plaintext data; if the current node is a secondary supervision node and the data to be viewed is encrypted data Text2, use key2 to publish the supervised primary supervision node to the blockchain Decrypt the encrypted data Text2 to obtain the corresponding plaintext data.
  10. 一种区块链两级监管设备,所述区块链两级监管设备包括存储器、处理器以及存储在所述存储器上并可在所述处理器上运行的区块链两级监管程序,所述区块链两级监管程序被所述处理器执行时实现如下所述的区块链两级监管方法的步骤:A block chain two-level supervision device includes a memory, a processor, and a block chain two-level supervision program that is stored on the memory and can be run on the processor, so The block chain two-level supervision program is executed by the processor to implement the following steps of the block chain two-level supervision method:
    在上链数据时,若当前节点为普通节点,则生成当前节点在预置第一循环群域下的待上链数据对应的公私钥对(dp11,DP11);When uploading data on the chain, if the current node is a normal node, then generate the public-private key pair (dp11, DP11) corresponding to the data to be uploaded on the current node under the preset first cyclic group domain;
    计算双线性对e(PP1,CP2) dp11,其中,PP1为当前节点对应的一级监管节点在预置第一循环群域下的监管公钥,CP2为当前节点对应的二级监管节点在预置第二循环群域下的监管公钥; Calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cycle group domain, and CP2 is the secondary supervision node corresponding to the current node in Preset the supervision public key under the second cycle group domain;
    使用e(PP1,CP2) dp11对待上链数据进行加密,得到加密数据Text1; Use e(PP1, CP2) dp11 to encrypt the data to be chained to get encrypted data Text1;
    将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看。Publish the encrypted data Text1 and the public key DP11 to the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
  11. 如权利要求10所述的区块链两级监管设备,所述区块链两级监管程序被所述处理器执行时还实现如下所述的区块链两级监管方法的步骤:The block chain two-level supervision device according to claim 10, when the block chain two-level supervision program is executed by the processor, the following steps of the block chain two-level supervision method are also implemented:
    在上链数据时,若当前节点为一级监管节点,则生成当前节点在所述第一循环群域下的待上链数据对应的公私钥对(dp12,DP12);When uploading data on the chain, if the current node is a first-level supervisory node, generate a public-private key pair (dp12, DP12) corresponding to the data to be uploaded on the current node under the first cyclic group domain;
    计算key1=dp12*CP1,其中,CP1为当前节点对应的二级监管节点在所述第一循环群域下的监管公钥;Calculate key1=dp12*CP1, where CP1 is the supervision public key of the secondary supervision node corresponding to the current node under the first recurring group domain;
    使用key1对待上链数据进行加密,得到加密数据Text2;Use key1 to encrypt the data to be chained to get encrypted data Text2;
    将加密数据Text2以及公钥DP12发布到区块链上,以供当前节点对应的二级监管节点进行监管查看。Publish the encrypted data Text2 and the public key DP12 to the blockchain for supervision and review by the secondary supervisory node corresponding to the current node.
  12. 如权利要求10所述的区块链两级监管设备,所述区块链两级监管程序被所述处理器执行所述将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看的步骤之 后,还执行如下步骤:The block chain two-level supervision device according to claim 10, the block chain two-level supervision program is executed by the processor, and the encrypted data Text1 and the public key DP11 are released to the block chain for current After the first-level supervision node or the second-level supervision node corresponding to the node performs the supervision and inspection steps, the following steps are also performed:
    在查看链上数据时,若当前节点为一级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,CP2) pp1When viewing the data on the chain, if the current node is a first-level supervisory node and the data to be viewed is encrypted data Text1, then the bilinear pair e(DP11, CP2) pp1 is calculated;
    使用e(DP11,CP2) pp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Use e(DP11, CP2) pp1 to decrypt the encrypted data Text1 published on the blockchain by the supervised common node to obtain the corresponding plaintext data.
  13. 如权利要求10所述的区块链两级监管设备,所述区块链两级监管程序被所述处理器执行所述将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看的步骤之后,还执行如下步骤:The block chain two-level supervision device according to claim 10, the block chain two-level supervision program is executed by the processor, and the encrypted data Text1 and the public key DP11 are released to the block chain for current After the first-level supervision node or the second-level supervision node corresponding to the node performs the supervision and inspection steps, the following steps are also performed:
    在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,PP2) cp1When viewing the data on the chain, if the current node is a secondary supervision node and the data to be viewed is encrypted data Text1, then the bilinear pair e(DP11, PP2) cp1 is calculated;
    使用e(DP11,PP2) cp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Use e(DP11, PP2) cp1 to decrypt the encrypted data Text1 published by the supervised common node on the blockchain to obtain the corresponding plaintext data.
  14. 如权利要求12所述的区块链两级监管设备,所述区块链两级监管程序被所述处理器执行所述将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看的步骤之后,还执行如下步骤:The block chain two-level supervision device according to claim 12, the block chain two-level supervision program is executed by the processor, and the encrypted data Text1 and the public key DP11 are released to the block chain for current After the first-level supervision node or the second-level supervision node corresponding to the node performs the supervision and inspection steps, the following steps are also performed:
    在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,PP2) cp1When viewing the data on the chain, if the current node is a secondary supervision node and the data to be viewed is encrypted data Text1, then the bilinear pair e(DP11, PP2) cp1 is calculated;
    使用e(DP11,PP2) cp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Use e(DP11, PP2) cp1 to decrypt the encrypted data Text1 published by the supervised common node on the blockchain to obtain the corresponding plaintext data.
  15. 如权利要求11所述的区块链两级监管设备,所述区块链两级监管程序被所述处理器执行所述将加密数据Text2以及公钥DP12发布到区块链上,以供当前节点对应的二级监管节点进行监管查看的步骤之后,还执行如下步骤:The block chain two-level supervision device according to claim 11, the block chain two-level supervision program is executed by the processor, and the encrypted data Text2 and the public key DP12 are released to the block chain for current After the secondary supervisory node corresponding to the node performs the supervisory review step, the following steps are also performed:
    在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text2,则计算key2=cp1*DP12,其中,cp1为当前节点在所述第一循环群 域下的监管私钥;When viewing the data on the chain, if the current node is a secondary supervision node and the data to be viewed is encrypted data Text2, then calculate key2=cp1*DP12, where cp1 is the supervision privacy of the current node in the first cycle group domain. key;
    使用key2对被监管的一级监管节点发布到区块链上的加密数据Text2进行解密,得到对应的明文数据。Use key2 to decrypt the encrypted data Text2 published on the blockchain by the supervised primary supervision node to obtain the corresponding plaintext data.
  16. 一种计算机可读存储介质,所述计算机可读存储介质上存储有区块链两级监管程序,所述区块链两级监管程序被处理器执行时实现如下所述的区块链两级监管方法的步骤:A computer-readable storage medium having a two-level blockchain supervision program stored on the computer-readable storage medium. When the two-level blockchain supervision program is executed by a processor, the following two-level blockchain supervision program is implemented Steps of the supervision method:
    在上链数据时,若当前节点为普通节点,则生成当前节点在预置第一循环群域下的待上链数据对应的公私钥对(dp11,DP11);When uploading data on the chain, if the current node is a normal node, then generate the public-private key pair (dp11, DP11) corresponding to the data to be uploaded on the current node under the preset first cyclic group domain;
    计算双线性对e(PP1,CP2) dp11,其中,PP1为当前节点对应的一级监管节点在预置第一循环群域下的监管公钥,CP2为当前节点对应的二级监管节点在预置第二循环群域下的监管公钥; Calculate the bilinear pair e(PP1, CP2) dp11 , where PP1 is the supervision public key of the primary supervision node corresponding to the current node under the preset first cycle group domain, and CP2 is the secondary supervision node corresponding to the current node in Preset the supervision public key under the second cycle group domain;
    使用e(PP1,CP2) dp11对待上链数据进行加密,得到加密数据Text1; Use e(PP1, CP2) dp11 to encrypt the data to be chained to get encrypted data Text1;
    将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看。Publish the encrypted data Text1 and the public key DP11 to the blockchain for supervision and viewing by the primary or secondary supervisory node corresponding to the current node.
  17. 如权利要求16所述的计算机可读存储介质,所述区块链两级监管程序被处理器执行时实现如下所述的区块链两级监管方法的步骤:16. The computer-readable storage medium according to claim 16, when the two-level blockchain supervision program is executed by a processor, the steps of the two-level blockchain supervision method are implemented as follows:
    在上链数据时,若当前节点为一级监管节点,则生成当前节点在所述第一循环群域下的待上链数据对应的公私钥对(dp12,DP12);When uploading data on the chain, if the current node is a first-level supervisory node, generate a public-private key pair (dp12, DP12) corresponding to the data to be uploaded on the current node under the first cyclic group domain;
    计算key1=dp12*CP1,其中,CP1为当前节点对应的二级监管节点在所述第一循环群域下的监管公钥;Calculate key1=dp12*CP1, where CP1 is the supervision public key of the secondary supervision node corresponding to the current node under the first recurring group domain;
    使用key1对待上链数据进行加密,得到加密数据Text2;Use key1 to encrypt the data to be chained to get encrypted data Text2;
    将加密数据Text2以及公钥DP12发布到区块链上,以供当前节点对应的二级监管节点进行监管查看。Publish the encrypted data Text2 and the public key DP12 to the blockchain for supervision and review by the secondary supervisory node corresponding to the current node.
  18. 如权利要求16所述的计算机可读存储介质,所述区块链两级监管程序被处理器执行所述将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看的步骤之后,还执行如下步骤:The computer-readable storage medium according to claim 16, wherein the two-level supervision program of the blockchain is executed by the processor, and the encrypted data Text1 and the public key DP11 are published on the blockchain for a corresponding one of the current node. After the first-level supervisory node or the second-level supervisory node performs the supervisory review steps, the following steps are also performed:
    在查看链上数据时,若当前节点为一级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,CP2) pp1When viewing the data on the chain, if the current node is a first-level supervisory node and the data to be viewed is encrypted data Text1, then the bilinear pair e(DP11, CP2) pp1 is calculated;
    使用e(DP11,CP2) pp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Use e(DP11, CP2) pp1 to decrypt the encrypted data Text1 published on the blockchain by the supervised common node to obtain the corresponding plaintext data.
  19. 如权利要求16所述的计算机可读存储介质,所述区块链两级监管程序被所述处理器执行所述将加密数据Text1以及公钥DP11发布到区块链上,以供当前节点对应的一级监管节点或二级监管节点进行监管查看的步骤之后,还执行如下步骤:The computer-readable storage medium of claim 16, wherein the two-level supervision program of the blockchain is executed by the processor, and the encrypted data Text1 and the public key DP11 are published on the blockchain for the current node to correspond to After the first-level supervision node or the second-level supervision node performs the supervision and inspection steps, the following steps are also performed:
    在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text1,则计算双线性对e(DP11,PP2) cp1When viewing the data on the chain, if the current node is a secondary supervision node and the data to be viewed is encrypted data Text1, then the bilinear pair e(DP11, PP2) cp1 is calculated;
    使用e(DP11,PP2) cp1对被监管的普通节点发布到区块链上的加密数据Text1进行解密,得到对应的明文数据。 Use e(DP11, PP2) cp1 to decrypt the encrypted data Text1 published by the supervised common node on the blockchain to obtain the corresponding plaintext data.
  20. 如权利要求17所述的计算机可读存储介质,所述区块链两级监管程序被处理器执行所述将加密数据Text2以及公钥DP12发布到区块链上,以供当前节点对应的二级监管节点进行监管查看的步骤之后,还执行如下步骤:The computer-readable storage medium according to claim 17, wherein the two-level supervision program of the blockchain is executed by the processor, and the encrypted data Text2 and the public key DP12 are published on the blockchain for the two corresponding nodes of the current node. After the supervising node performs supervising and viewing steps, it also performs the following steps:
    在查看链上数据时,若当前节点为二级监管节点且待查看数据为加密数据Text2,则计算key2=cp1*DP12,其中,cp1为当前节点在所述第一循环群域下的监管私钥;When viewing the data on the chain, if the current node is a secondary supervision node and the data to be viewed is encrypted data Text2, then calculate key2=cp1*DP12, where cp1 is the supervision privacy of the current node in the first cycle group domain. key;
    使用key2对被监管的一级监管节点发布到区块链上的加密数据Text2进行解密,得到对应的明文数据。Use key2 to decrypt the encrypted data Text2 published by the supervised primary supervision node on the blockchain to obtain the corresponding plaintext data.
PCT/CN2019/120859 2019-06-21 2019-11-26 Blockchain two-stage supervision method, apparatus, and device, and storage medium WO2020253107A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910541954.6A CN110365475B (en) 2019-06-21 2019-06-21 Block chain two-stage supervision method, device, equipment and storage medium
CN201910541954.6 2019-06-21

Publications (1)

Publication Number Publication Date
WO2020253107A1 true WO2020253107A1 (en) 2020-12-24

Family

ID=68216528

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/120859 WO2020253107A1 (en) 2019-06-21 2019-11-26 Blockchain two-stage supervision method, apparatus, and device, and storage medium

Country Status (2)

Country Link
CN (1) CN110365475B (en)
WO (1) WO2020253107A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110365475B (en) * 2019-06-21 2021-12-10 深圳壹账通智能科技有限公司 Block chain two-stage supervision method, device, equipment and storage medium
CN112131615B (en) * 2020-02-10 2021-04-13 北京天德科技有限公司 Data storage mechanism supporting supervision
CN112667621B (en) * 2020-12-31 2023-03-10 杭州趣链科技有限公司 Block chain supervision method, equipment and computer readable storage medium
CN112968767A (en) * 2021-02-25 2021-06-15 平安科技(深圳)有限公司 Logistics combined transportation data monitoring method based on block chain and related equipment
CN115550026B (en) * 2022-09-26 2023-07-04 建信金融科技有限责任公司 Multi-supervision method, system and storage medium based on blockchain transaction

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
CN108647968A (en) * 2018-05-10 2018-10-12 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
EP3396612A1 (en) * 2017-04-24 2018-10-31 BlockSettle AB Method and system for creating a user identity
CN109637637A (en) * 2017-10-20 2019-04-16 北京航空航天大学 Medical management system based on block chain
CN110365475A (en) * 2019-06-21 2019-10-22 深圳壹账通智能科技有限公司 Block chain two-stage monitoring and managing method, device, equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10958417B2 (en) * 2017-12-18 2021-03-23 International Business Machines Corporation Protecting sensitive data in a distributed ledger system using blockchain hierarchies
US10607484B2 (en) * 2017-12-28 2020-03-31 Intel Corporation Privacy-preserving distributed visual data processing
CN108681966B (en) * 2018-05-11 2020-07-21 阿里巴巴集团控股有限公司 Information supervision method and device based on block chain
CN109040057B (en) * 2018-07-26 2020-12-01 百色学院 Multi-key hierarchical privacy protection system and method based on block chain
CN109614824A (en) * 2018-11-19 2019-04-12 上海景峰制药有限公司 A kind of drug data management method, device and server based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
EP3396612A1 (en) * 2017-04-24 2018-10-31 BlockSettle AB Method and system for creating a user identity
CN109637637A (en) * 2017-10-20 2019-04-16 北京航空航天大学 Medical management system based on block chain
CN108647968A (en) * 2018-05-10 2018-10-12 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
CN110365475A (en) * 2019-06-21 2019-10-22 深圳壹账通智能科技有限公司 Block chain two-stage monitoring and managing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN110365475A (en) 2019-10-22
CN110365475B (en) 2021-12-10

Similar Documents

Publication Publication Date Title
WO2020253107A1 (en) Blockchain two-stage supervision method, apparatus, and device, and storage medium
CN109768987B (en) Block chain-based data file safe and private storage and sharing method
CN109922077B (en) Identity authentication method and system based on block chain
CN112104619B (en) Data access control system and method based on outsourcing ciphertext attribute encryption
KR101982237B1 (en) Method and system for data sharing using attribute-based encryption in cloud computing
CN110247767B (en) Revocable attribute-based outsourcing encryption method in fog calculation
CN110602086B (en) Repealable and outsourced multi-authorization center attribute-based encryption method in fog computing
CN108833393A (en) A kind of revocable data sharing method calculated based on mist
WO2020253108A1 (en) Information hiding method, apparatus, device, and storage medium
KR101615137B1 (en) Data access method based on attributed
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
WO2021098152A1 (en) Blockchain-based data processing method, device, and computer apparatus
Peng et al. Comments on “identity-based distributed provable data possession in multicloud storage”
CN111625862A (en) Data processing method, system and storage medium based on multiple data nodes
CN113360944B (en) Dynamic access control system and method for electric power Internet of things
CN111586023A (en) Authentication method, authentication equipment and storage medium
CN114143072A (en) CP-ABE-based attribute revocation optimization method and system
Lu et al. Transactive energy system deployment over insecure communication links
US20210194694A1 (en) Data processing system
US20120201376A1 (en) Communication device and key calculating device
CN104935588A (en) Layered key management method of secure cloud storage system
CN114584975B (en) SDN-based anti-quantum satellite network access authentication method
JP5784662B2 (en) ENCRYPTED DATA OPERATION SYSTEM, DEVICE, AND PROGRAM
CN103746798A (en) Data access control method and data access control system
CN113132097A (en) Lightweight certificateless cross-domain authentication method, system and application suitable for Internet of things

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19933545

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19933545

Country of ref document: EP

Kind code of ref document: A1