CN107483198A - A kind of block catenary system supervised and method - Google Patents
A kind of block catenary system supervised and method Download PDFInfo
- Publication number
- CN107483198A CN107483198A CN201710873134.8A CN201710873134A CN107483198A CN 107483198 A CN107483198 A CN 107483198A CN 201710873134 A CN201710873134 A CN 201710873134A CN 107483198 A CN107483198 A CN 107483198A
- Authority
- CN
- China
- Prior art keywords
- node
- block chain
- key
- supervision department
- kdc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Abstract
The present invention relates to a kind of block catenary system supervised and method, including:Authentication center (CA), the log-on message of authentication, generation on the node is carried out to ordinary node, and openly wait the registration for being written into and node being completed in block chain to block chain network;KDC (KDC), regulatory rule is formulated, define the complete property set of supervision department, key is distributed for it according to the specific object of supervision department;Supervision department, key is obtained at KDC, the chain network transaction of monitoring block, once there is abnormal account, then utilizes the true identity of the Node registry acquisition of information node in the secret key decryption block chain of oneself;Ordinary node, interacted with CA, carry out authentication, complete registration addition block chain operation afterwards.The present invention builds a kind of block chain supervised using cryptological techniques such as ABE, signatures, it is allowed to which different supervision departments supervises according to the different data to block catenary system of function, thus takes precautions against the generation of illegal activities etc..
Description
Technical field
The invention belongs to Computer Applied Technology field, and in particular to a kind of block catenary system supervised and method, permit
Perhaps different supervision centers is supervised according to the different behaviors to block catenary system user of function.
Background technology
Block chain originates from bit coin, and its essence is a kind of distributed storage technology, has decentralization, anonymity, can chase after
The property such as trace back, can not distort.Using block chain technology, a set of new trust can be established in the case of non-stop layer trust authority
System.Therefore, the scenes such as financial service, shared economy, medical treatment & health, social management can be applied to.But in traditional block
In chain, the accounts information and transaction content of all users are all disclosed.Even if any user can read these open numbers
According to, but block chain can but bring great threat for the assumed name system that guarantee anonymity uses to social stability.For example, its nothing
Method resists the illegal activities such as money laundering.One real user can generate many different accounts, and between these accounts constantly
Carry out fund transfer, anti money washing is set to become difficult.In order to take precautions against such criminal offence, the present invention discloses a kind of block supervised
Catenary system and method.
Encryption attribute scheme (ABE) is a kind of encryption technology that can realize fine granularity nonreciprocal access control mechanisms.
In ABE, the condition that user is capable of successful decryption is that one group of attribute set disclosure satisfy that access control policy, and different according to function
It is classified as two major classes:The encryption attribute scheme (KP-ABE) of Ciphertext policy, wherein key is associated with access control policy, close
Text is associated with the attribute set of user;The encryption attribute scheme (CP-ABE) of Ciphertext policy, with KP-ABE on the contrary, key and use
The attribute set at family is related, and ciphertext is associated with access strategy.For both encryption attribute schemes, only when attribute set is expired
When sufficient access control policy, user can correctly decrypt.KP-ABE main application scenarios are paid for television system, and
CP-ABE is mainly used in the information sharing system with access control, such as electronic medical record system.The present invention using CP-ABE come
Realize the supervision to system user behavior.In order to improve encryption efficiency, using KEM/DEM Hybrid Encryptions.I.e. by CP-AB-KEM side
Case encrypted session key, then private key encryption data by the use of session key as DEM are in itself.It is consistent with ABE schemes, only have
The user of respective attributes can just decrypt the session key that KEM obtains encapsulation, recycle session key decryption DEM parts to obtain number
According to.
Being currently known a Chinese patent CN 106503994A, (the block chain private data based on encryption attribute accesses control
Method processed) also use attribute encryption technology block catenary system is improved.The invention proposes one kind and is based on encryption attribute
Block chain private data access control method, mainly solve conventional art only the true identity of user in block chain is hidden
Name protection, to transaction privacy information be not encrypted protection and caused by privacy leakage problem.Implementation step is:(1) system
Initialization;(2) user's registration obtains attribute information;(3) authoritative center is according to customer attribute information dispatch user private key;(4) hand over
Yi Fang encryptions transaction private data is simultaneously uploaded to block chain;(5) bookkeeper is verified to Transaction Information and performs transaction;(6)
Supervision center is authorized to check transaction ciphertext using mandate private key decryption.The invention also allows to authorize it can be seen from above-mentioned steps 6
The problem of transaction ciphertext is checked in supervision center decryption, plays certain supervision effect, but presence one is serious:All Activity data
Exist with ciphertext form, the supervision of supervision center can be caused will become extremely complex, especially supervision center is possibly can not
Note abnormalities behavior in time and make corresponding processing.Once the no longer effective property of supervision, hits criminal offence
Dynamics will weaken significantly.In addition, the invention is that user is made a distinction with attribute, but it is of virtually the user of same alike result simultaneously
Non- only one, a transaction caused by whom is can not be known exactly which, i.e., can not confirm it when criminal offence occurs
True identity, supervision are very difficult.
The content of the invention
The technology of the present invention solves problem:Overcome the deficiencies in the prior art, there is provided a kind of block catenary system supervised and
Method, using cryptological techniques such as ABE, signatures, structure it is a kind of can real-time monitoring block chain, it is allowed to different supervision department's roots
Supervised according to the different data to block catenary system of function, thus take precautions against the generation of illegal activities etc..
The present invention uses following technical scheme:A kind of block catenary system supervised, including:It is authentication center (CA), close
Key Distribution Center (KDC), supervision department and ordinary node;
1st, authentication center (CA), the private key of generation signature is possessed:Authentication is carried out to ordinary node, obtains its true body
Part information and the accounts information (such as public key or wallet address) for the operation of block chain;By real identity information according to given
Regulatory rule ABE algorithm for encryption, generate corresponding ciphertext;Generation is on node accounts information and the label of ABE encrypted cipher texts
Name;Encapsulating node accounts information, ABE encrypted cipher texts, signature turns into the log-on message of the node;Log-on message is published to block
In chain network, wait by existing node verification and write block chain to complete Node registry.
2nd, KDC (KDC), definition describe the complete attribute set of each supervision department's function, generate ABE algorithms
Common parameter and can be supervision department distribute key main private key;Formulate regulatory rule-supervision department with what attribute
Gatekeeper pipe has the node of what identity;Common parameter and regulatory rule are sent to CA.Judge the category that supervision department meets
Property collection, and generate corresponding private key using main private key for it.
3rd, supervision department, the private key of oneself is obtained at KDC.Block chain network trading activity is monitored, if note abnormalities
A large amount of or a large sum of transaction is produced in account, such as short time, then searches for the log-on message in block chain on the account, checking
The validity of signature, decryption ABE encrypted cipher texts obtain the true identity information of the account.
4th, ordinary node, the operation for interacting participation block chain after completion is registered with CA is passed through.
A kind of block chain method supervised of the present invention, realizes that step is as follows:
1st, system is established:CA generation signature public private key pairs, and the public key of oneself is disclosed;KDC definition describes each supervision department
The complete attribute set of function, generate the common parameter of ABE algorithms and the main private key of key can be distributed for supervision department, formulate
Regulatory rule, common parameter and regulatory rule are sent to CA.
2nd, administrative key is distributed:When there is new supervision department to add, KDC first determines whether its property set met, then
Corresponding key is generated for it using the main private key of oneself, the key is finally sent to the supervision department in a secured manner.
3rd, block chain is run:Participated in jointly by ordinary node.Be with traditional block chain identical, block chain still with
The wound generation block of special construction then by a series of there is mutually isostructural block to be formed with cryptographic Hash link, save as the beginning
It can mutually be transferred accounts between point, and accounting nodes produced by mechanism of knowing together and write new block, and the block have recorded one
The All Activity data occurred in the section time;Unlike, the present invention in data structure by increasing user's registration information table
Monitoring function is realized, it is contained mainly in caused all new node log-on messages in a period of time, and (specific producing method is shown in
4th, Node registry), the data can be packaged into new block and final entry is on block chain.Therefore, by searching for block chain,
Transaction data can be not only inquired about, log-on message can also be inquired about.
4th, Node registry:When there is new node to wish that adding block chain runs, it interacts with CA complete identity first
Certification, and oneself accounts information that will be used in the operation of block chain, such as public key or wallet address are provided.CA is utilized and this
The identity information that node interaction obtains afterwards, the regulatory rule provided with reference to KDC judge the supervision department with what attribute
The true identity information of the node can be obtained at the following a certain moment, and the information obtains using ABE algorithm for encryption according to this judgement
Ciphertext after must encrypting;Then using the signature private key generation of oneself on node accounts information and ABE encrypted cipher texts
Signature, and encapsulate node accounts information, ABE encrypted cipher texts, sign as the log-on message of the node;It is finally that log-on message is public
Cloth is into block chain network.All registered nodes can verify the validity of signature therein after log-on message is received, and
Caused all new transaction data in a period of time and log-on message are generated into new area by certain data structure encapsulation
Block.After log-on message is written into block chain, then new node registration is completed.Afterwards, the node can then be normally added area
The operation of block chain.
5th, trading activity is supervised:Supervision department monitors block chain network trading activity by the method for oneself, once there is account
There is abnormal behaviour in family, a large amount of or a large sum of transaction is produced in such as short time, then searches for the note in block chain on the node
Volume information, verify the validity wherein signed and decrypt the true identity that ABE encrypted cipher texts obtain the node.
The present invention compared with prior art the advantages of be:
1st, compared with traditional block chain, invention increases monitoring function, solves existing block catenary system without supervision work(
The shortcomings that energy.Utilize existing ABE, signature existing password technology, only part modification block chain data structure and node access
Rule, it can reach the purpose of supervision customer transaction behavior.To realize that the supervision behavior such as anti money washing provides basis.
2nd, compared with existing patent, the present invention only encrypts to user real identification, and the entity of no authority can not decrypt note
Its true identity of volume acquisition of information, on the one hand protects the anonymity of domestic consumer, and another aspect supervision department passes through monitoring net
Transaction lockable exception account in network, once the account can that notes abnormalities obtains its true body by searching for block chain
Part, accomplish real-time monitoring.
Brief description of the drawings
Fig. 1 is present system composition frame chart;
Fig. 2 is data structure diagram, i.e. the concrete mode figure of block chain storage;
Fig. 3 is that new node register flow path figure is authentication and open log-on message detail flowchart;
Fig. 4 is supervision flow figure.
Embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention is described in detail.
As shown in figure 1, the system all participation entities according to the part of function divide it is as follows:
1st, authentication center (CA), the log-on message of authentication, generation on the node is carried out to ordinary node, and openly
To block chain network, the registration for being written into and node being completed in block chain is waited;
2nd, KDC (KDC), regulatory rule is formulated, the complete property set of supervision department is defined, according to supervision department
Specific object for its distribute key;
3rd, supervision department, key is obtained at KDC, the chain network transaction of monitoring block, once there is abnormal account, is then utilized
The true identity of Node registry acquisition of information node in the secret key decryption block chain of oneself;
4th, ordinary node, interacted with CA, carry out authentication, complete registration addition block chain operation afterwards.
Further, a block chain backup can be locally stored in all ordinary nodes, supervision department, and same in real time
Walk the new data in block chain network.
Based on above entity, present system realizes following functions:
1st, system is established
The public private key pair of CA generation signatures, and the public key of oneself is disclosed;The system that KDC runs CP-AB-KEM schemes first
Initialization algorithm, generates the open parameter PK and main private key MSK of oneself, and definition describes the complete property set of each supervision department's function
U is closed, formulation regulatory rule, which describes the department with what attribute, can supervise the node of what identity, and selection is suitable symmetrically to be added
Close algorithm (AES) is used as DEM algorithms, and discloses oneself open parameter, complete attribute set, regulatory rule and the DEM of selection
Algorithm;Block chain wound generation block is generated, including completes the configuration (being no different with traditional block chain) of block chain, chooses preselected node,
Completion registration is interacted by them and with CA, generates preselected node registration table.
Specifically, the system initialization algorithm of CP-AB-KEM schemes is:It is non-right according to default rule selection one first
Bilinear map D=(the G of title1,G2,GT, e, p), wherein G1,G2,GTIt is three different groups, p is these order of a group numbers, is taken as
Prime number, e are asymmetrical bilinear map e:G1×G2→GT, can be regarded as a function, input G respectively1In a member
Element and G2In an element be an exportable GTIn element.The attribute description U of system is by finite field Zp(in integer item
Mould p residual class ring) in element form, the attribute Z in real world that will be allpIn an element represent, and
Uniquely corresponding such element, all corresponding relations are also recorded in attribute description U one attribute.Then algorithm is random
Choose group G1In generation member g, h, u, v, w, randomly select crowd G2In generation member z, choose finite field ZpIn arbitrary random number
α, using above-mentioned asymmetrical bilinear map e, generate GTOn element e (g, z), finally e (g, z) is done using random number α
Module exponent computing obtains e (g, z)α.By the D of all above-mentioned selections or generation, g, h, u, v, w, z, e (g, z)αAs open parameter
PK, it is denoted as PK=(D, g, h, u, v, w, z, e (g, z)α), and it is sent to all users;Simultaneously by PK, α is as main private key
MSK, is denoted as MSK=(PK, α), is safely preserved by KDC.
2nd, administrative key is distributed
When there is new supervision department to add, KDC first determines whether its attribute set met
Wherein A1,A2,...,AkBelong to finite field Zp, represent the supervision department and possess k attribute altogether, attribute set S is above-mentioned complete
Full attribute set U a subset;Then KDC is calculated using the key generation of the main private key MSK operation CP-AB-KEM schemes of oneself
Method generates corresponding key SK for it, and key is finally sent to the supervision department in a secured manner.
Specifically, the key schedule of CPA-AB-KEM schemes is:Main the private key MSK and user for inputting KDC meet
Attribute setFrom finite field ZpIn randomly select k+1 value r, r1,r2,...,rk, use first
Main private key cc g first to generation does module exponent computing and obtains gα, do module exponent computing with random number r ws first to generation and obtain wr, to above-mentioned
Two parts do multiplication and obtain part of key K0=gαwr;Then done module exponent computing to being generated first z with random number r to obtain part close
Key K1=zr, similar with said process for i=1,2 ..., k, difference calculating section keyAnd part of key(wherein-r represents r in finite field ZpIn additive inverse), finally by S, K0,K1,{Ki,2,Ki,3, i=
1,2 ..., k is safely preserved, and be denoted by SK=(S, K together as the private key SK of user by user oneself0,K1,
{Ki,2,Ki,3), i=1,2 ..., k.
3rd, block chain is run
Participated in jointly by ordinary node.It is that block chain is still with the wound with special construction with traditional block chain identical
Generation block then there is mutually isostructural block to link with cryptographic Hash form as the beginning by a series of, can phase between node
Mutually transfer accounts, and accounting nodes are produced by mechanism of knowing together and write new block, and the block have recorded and occur within a period of time
All Activity data;Unlike, the present invention realizes supervision work(by increasing user's registration information table in data structure
Can, it is contained mainly in caused all new node log-on messages in a period of time, and (specific producing method is shown in that 4, new node is noted
Volume), the data can be packaged into new block and final entry is on block chain.Therefore, not only can be with by searching for block chain
Transaction data is inquired about, log-on message can also be inquired about.Specific data structure is as shown in Figure 2:Block chain is that had by a series of
The block of time order and function order links composition in a manner of cryptographic Hash, and the beginning is used as to create generation block.Wound generation block, which includes, matches somebody with somebody
Confidence ceases and preselected node registration table, configuration information include the configuration information of all about block chain, as at the beginning of common recognition mechanism, POW
Beginning difficulty etc., preselected node registration table are included in the log-on message for the node that operation is may participate at the beginning of block catenary system is established,
Its structure is consistent with the user's registration table in other blocks.In addition to generation block is created, each block is comprising block sequence number, block
Head, block size, block Hash, user's registration table and data set.User's registration table is included in all new nodes in a period of time
The information of registration, each log-on message by node public key PK, the ABE encrypted cipher texts of its true identity information (by Head,
AB-KEM and DEM tri- parts form, and wherein Head marks in the ciphertext length of AB-KEM and DEM respectively so that ensure can be just
Really decryption), CA connects composition with the private key of oneself to the signature of preceding two parts information.Data set includes all in a period of time
Data (orderly).Block head record father's block Hash, timestamp, Merkle roots.Wherein, Merkel roots be by all data by
The value of the root node of the structure composition of Merkle trees.Rapidly tested using Merkle tree constructions without downloading all data
Demonstrate,prove the block and some specific data be present.
4th, new node is registered
Idiographic flow is as shown in Figure 3.When there is new node to wish that adding block chain runs, it initiates registration to CA first please
Ask;Then authentication is carried out to new node by CA, obtains its real identity information;New node provides oneself to CA will be
The accounts information used in the operation of block chain, the present invention is using public key as example, so node needs to generate public key PKnode, and
Send it to CA;CA generates corresponding access structure (M, ρ) according to the real information of the KDC regulatory rules sent and node,
The ciphertext on session key key is generated using the open parameter PK operations CP-AB-KEM received at KDC AES
CT, and the true identity information by the use of session key key as the private key encryption new node of aes algorithm, and it is private with the signature of oneself
Key generation forms log-on message on PK and the signature of encapsulation ciphertext;Then CA needs open log-on message existing to block chain
Network in;All registered nodes can verify the validity of signature therein after log-on message is received, and during by one section
All new transaction data caused by interior and log-on message generate new block by certain data structure encapsulation;Work as registration
After information is written into block chain, then new node registration is completed, and by CA notices new node, it succeeds in registration.Afterwards, the node
The operation of block chain can be then normally added.
Specifically, CP-AB-KEM AES is:Input common parameter PK, linear privacy sharing access structure (M,
ρ), wherein M is the matrix of a l rows n row, and ρ is a mapping, and an attribute is mapped as by any a line in matrix M.It is first
First, at random from finite field ZpMiddle selection random number s and y2,...,yn, column vector is set(T is to seek row vector
(s,y2,...,yn) transposition), calculate the shared column vector on random number s Represent matrix M
And vectorIt is multiplied, then from finite field ZpMiddle selection random number t1,t2,...,tk, session key key=e (g, z)αs(αs
Represent that α is multiplied with s), calculating section ciphertext C0=zsFor j=1,2 ..., l, difference calculating section ciphertext
And part ciphertext(attribute of ρ (j) representing matrixs M jth row mapping ,-tjRepresent random number tjLimited
Domain ZpIn additive inverse), calculating section ciphertextSetting ciphertext is CT=((M, ρ), C0,{Cj,1,Cj,2,Cj,3),
Wherein j=1,2 ..., l.
5th, user behavior is supervised
Idiographic flow is as shown in Figure 4.Supervision department monitors block chain network trading activity by the method for oneself, once have
There is abnormal behaviour in account, it is (described largely to refer to many transactions, and a large sum of that a large amount of or a large sum of transaction is produced in such as short time
Refer to the with large amount of a transaction), then search for the log-on message in block chain on the node.When searching out log-on message,
First verify that the validity wherein signed, be verified after just according to the Head of ABE encrypted cipher texts identify distinguish wherein KEM with
DEM parts, the decipherment algorithm decryption KEM parts for then running CP-AB-KEM obtain session key key, and with the session key
Secret key decryption DEM parts therein as AES obtain the true identity of the node.This example is not related to specific monitoring party
Method, supervision department can judge that what behavior is abnormal account according to the method and rule of oneself, and this example, which only provides, once to be sentenced
It is set to the method how abnormal account obtains its true identity.
Specifically, CP-AB-KEM decipherment algorithms are:Input and ciphertext CT and and property set corresponding to access structure (M, ρ)
CloseCorresponding key SK=(S, K0,K1,{Ki,2,Ki,3), i=1,2 ..., k.If property set
Conjunction is unsatisfactory for access strategy, and algorithm terminates.Otherwise, in the attribute set that matrix M all row vectors map, selection and attribute
Set S common factor is I={ i:ρ (i) ∈ S }, calculate in I per i row matrixs row to MiCoefficient ωiIt is set to meet following equalitiesWherein MiIt is matrix M the i-th row, ωi·MiRepresent coefficient ωiNumber multiplies row matrix vector Mi, then
Calculate encapsulation keyWherein j is attribute ρ (i)
Index in S, represent GTIn multiplication, long horizontal line represents group GTIn division, top is dividend, and lower section is divisor.Its
Middle divisorExpression calculates all elements i in set I respectively firstThe result calculated is all multiplied again;And eachIt is then to calculate e respectively first with above-mentioned asymmetrical bilinear map e
(Ci,1,K1), e (Ci,2,Kj,2), e (Kj,3,Ci,3), obtain a G after then it is all multipliedTIn element, finally utilize
ωiModule exponent computing acquisition is done to the elementFinally, output encapsulation key
Key=e (g, z)αs。
Above example is provided just for the sake of the description purpose of the present invention, and is not intended to limit the scope of the present invention.This
The scope of invention is defined by the following claims.The various equivalent substitutions that do not depart from spirit and principles of the present invention and make and repair
Change, all should cover within the scope of the present invention.
Claims (2)
- A kind of 1. block catenary system supervised, it is characterised in that:Including authentication center (CA), KDC (KDC), prison Pipe portion door and ordinary node;Authentication center (CA), possess the private key of generation signature, authentication is carried out to ordinary node, obtains its true identity information And the accounts information for the operation of block chain;It is raw by real identity information according to given regulatory rule ABE algorithm for encryption Into corresponding ciphertext;Generation is on node accounts information and the signature of ABE encrypted cipher texts;Encapsulate node accounts information, ABE encryptions Ciphertext, signature turn into the log-on message of the node;Log-on message is published in block chain network, waited by existing node verification And block chain is write to complete Node registry;KDC (KDC), definition describe the complete attribute set of each supervision department's function, generate the public of ABE algorithms Parameter and the main private key that key can be distributed for supervision department;It is that the supervision department with what attribute supervises to formulate regulatory rule Node with what identity;Common parameter and regulatory rule are sent to CA, judge the property set that supervision department meets, and It is that supervision department generates corresponding private key using main private key;Supervision department, the private key of oneself is obtained at KDC, monitor the trading activity in block chain network, if noting abnormalities account, As produced a large amount of or a large sum of transaction in the short time, then the log-on message in block chain network on the abnormal account is searched for, is tested The validity of signed certificate name, decryption ABE encrypted cipher texts obtain the true identity information of the abnormal account;Ordinary node, pass through the operation for interacting participation block chain after completion is registered with CA.
- A kind of 2. block chain method supervised, it is characterised in that:Realize that step is as follows:(1) system is established:CA generation signature public private key pairs, and the public key of oneself is disclosed;KDC definition describes each supervision department's function Complete attribute set, generate ABE algorithms common parameter and can be supervision department distribute key main private key, formulate supervision Rule, common parameter and regulatory rule are sent to CA;(2) administrative key is distributed:When there is new supervision department to add, KDC first determines whether its property set met, then utilizes The main private key of oneself generates corresponding key for it, and the key is finally sent into the supervision department in a secured manner;(3) block chain is run:Participated in jointly by ordinary node, New Transaction is produced between node, it then follows common recognition mechanism generation new district Block, link all blocks according to certain data structure and form block chain;(4) Node registry:When there is new node to wish that adding block chain runs, it interacts completion identity with CA and recognized first Card, and oneself accounts information that will be used in the operation of block chain is provided;CA utilizes interacts the body obtained afterwards with the node Part information, the regulatory rule provided with reference to KDC judge that the supervision department with what attribute just can be in following a certain moment acquisition The true identity information of the node, and according to this judgement using the ciphertext after the information acquisition encryption of ABE algorithm for encryption;Then Generated using the signature private key of oneself on node accounts information and the signature of ABE encrypted cipher texts, and encapsulate node account letter Breath, ABE encrypted cipher texts, signature turn into the log-on message of the node;Finally log-on message is published in block chain network, owned Registered node can verify the validity of signature therein after log-on message is received, and by caused institute in a period of time The new transaction data and log-on message having generate new block by certain data structure encapsulation, when log-on message is written into area After in block chain, then new node registration is completed, and afterwards, the node can then be normally added the operation of block chain;(5) trading activity is supervised:Supervision department monitors block chain network trading activity by the method for oneself, once there is account to deposit In abnormal behaviour, then the log-on message in block chain network on the abnormal nodes is searched for, verifies the validity wherein signed simultaneously Decryption ABE encrypted cipher texts obtain the true identity of the abnormal nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710873134.8A CN107483198B (en) | 2017-09-25 | 2017-09-25 | A kind of block catenary system supervised and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710873134.8A CN107483198B (en) | 2017-09-25 | 2017-09-25 | A kind of block catenary system supervised and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107483198A true CN107483198A (en) | 2017-12-15 |
CN107483198B CN107483198B (en) | 2019-11-12 |
Family
ID=60585958
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710873134.8A Active CN107483198B (en) | 2017-09-25 | 2017-09-25 | A kind of block catenary system supervised and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107483198B (en) |
Cited By (73)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108460598A (en) * | 2018-04-18 | 2018-08-28 | 北京天德科技有限公司 | A kind of real-time automation supervision reporting system based on double-strand framework block chain |
CN108520464A (en) * | 2018-04-18 | 2018-09-11 | 北京天德科技有限公司 | A kind of real-time automation supervision reporting system based on traditional block chain |
CN108615144A (en) * | 2018-04-11 | 2018-10-02 | 北京奇虎科技有限公司 | Identity information processing method, device and the computing device of block chain node |
CN108647523A (en) * | 2018-04-28 | 2018-10-12 | 华南理工大学 | A kind of electronic identification system based on block chain and deposit card, file access pattern method |
CN108712395A (en) * | 2018-04-27 | 2018-10-26 | 腾讯科技(深圳)有限公司 | Account management method, device, server based on block chain and storage medium |
CN108712409A (en) * | 2018-05-09 | 2018-10-26 | 梧州市兴能农业科技有限公司 | A kind of e bill transaction system based on privately owned block chain |
CN108876363A (en) * | 2018-04-18 | 2018-11-23 | 北京天德科技有限公司 | A kind of cross-border supervision reporting system based on double-strand framework block chain |
CN108900528A (en) * | 2018-07-24 | 2018-11-27 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN108898475A (en) * | 2018-05-08 | 2018-11-27 | 众安信息技术服务有限公司 | Alliance's block chain based on encryption attribute realizes credit methods and system |
CN108933778A (en) * | 2018-05-23 | 2018-12-04 | 广州西麦科技股份有限公司 | Product trading monitoring method, device and storage medium based on system for cloud computing |
CN108964903A (en) * | 2018-07-12 | 2018-12-07 | 腾讯科技(深圳)有限公司 | password storage method and device |
CN108989022A (en) * | 2018-06-08 | 2018-12-11 | 中国科学院计算技术研究所 | A kind of smart item shared key method for building up and system based on block chain |
CN109005186A (en) * | 2018-08-20 | 2018-12-14 | 杭州复杂美科技有限公司 | A kind of method, system, equipment and the storage medium of user-isolated identity information |
CN109064324A (en) * | 2018-06-15 | 2018-12-21 | 重庆金融资产交易所有限责任公司 | Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain |
CN109146678A (en) * | 2018-04-18 | 2019-01-04 | 北京天德科技有限公司 | A kind of cross-border supervision reporting system based on traditional block chain |
CN109190384A (en) * | 2018-07-26 | 2019-01-11 | 百色学院 | A kind of multicenter block chain fuse protection system and method |
CN109194487A (en) * | 2018-09-13 | 2019-01-11 | 全链通有限公司 | Construction method and system are traded or communicated to my real name based on block chain |
CN109274481A (en) * | 2018-08-01 | 2019-01-25 | 中国科学院数据与通信保护研究教育中心 | A kind of traceable method of data of block chain |
CN109361738A (en) * | 2018-09-25 | 2019-02-19 | 安徽灵图壹智能科技有限公司 | A kind of identity authorization system and method based on block chain network |
CN109447742A (en) * | 2018-10-16 | 2019-03-08 | 广东工业大学 | A kind of order processing method and relevant apparatus |
CN109472601A (en) * | 2018-11-21 | 2019-03-15 | 北京蓝石环球区块链科技有限公司 | The block chain framework of privacy transaction can be supervised |
CN109558742A (en) * | 2018-11-16 | 2019-04-02 | 海南新软软件有限公司 | A kind of effectiveness of information detection method and device based on block chain |
CN109697670A (en) * | 2018-12-29 | 2019-04-30 | 杭州趣链科技有限公司 | A kind of public chain information screen method not influencing confidence level |
CN109714173A (en) * | 2019-01-25 | 2019-05-03 | 北京邮电大学 | A kind of Internet of Things authentication method and device based on block chain |
CN109741482A (en) * | 2019-01-08 | 2019-05-10 | 京东方科技集团股份有限公司 | A kind of information sharing method and device |
CN109784918A (en) * | 2018-12-15 | 2019-05-21 | 深圳壹账通智能科技有限公司 | Information measure of supervision, device, equipment and storage medium based on block chain |
CN109949882A (en) * | 2018-11-15 | 2019-06-28 | 陕西医链区块链集团有限公司 | A kind of medical treatment block chain data-storage system |
CN109981547A (en) * | 2017-12-28 | 2019-07-05 | 航天信息股份有限公司 | A kind of logistics transmission method and device based on block chain |
CN109981675A (en) * | 2019-04-04 | 2019-07-05 | 西安电子科技大学 | A kind of identity information guard method of digital identification authentication and encryption attribute |
CN109993659A (en) * | 2019-04-17 | 2019-07-09 | 上海沄界信息科技有限公司 | A kind of internet trading system, method and apparatus |
CN110071898A (en) * | 2018-01-22 | 2019-07-30 | 厦门本能管家科技有限公司 | A method of removing Spot detection node legitimacy |
CN110289951A (en) * | 2019-06-03 | 2019-09-27 | 杭州电子科技大学 | A kind of shared content monitoring method based on Threshold key sharing and block chain |
WO2019214623A1 (en) * | 2018-05-10 | 2019-11-14 | 华为技术有限公司 | Authentication method, related equipment, and system |
CN110503560A (en) * | 2019-09-27 | 2019-11-26 | 深圳市网心科技有限公司 | Data trade method, data trade apparatus and system based on block chain |
CN110570313A (en) * | 2019-09-27 | 2019-12-13 | 深圳市网心科技有限公司 | data transaction method, data transaction device and system based on block chain |
CN110611647A (en) * | 2019-03-06 | 2019-12-24 | 张超 | Node joining method and device on block chain system |
CN110809000A (en) * | 2019-11-12 | 2020-02-18 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Service interaction method, device, equipment and storage medium based on block chain network |
CN110827029A (en) * | 2018-08-09 | 2020-02-21 | 普华云创科技(北京)有限公司 | User management method, system and computer readable storage medium based on block chain |
CN111010280A (en) * | 2019-12-09 | 2020-04-14 | 中山大学 | Group signature-based construction method for monitorable block chain |
CN111106930A (en) * | 2018-10-25 | 2020-05-05 | 北京国盾量子信息技术有限公司 | Block chain network construction method and device and block chain network system |
CN111149122A (en) * | 2018-05-30 | 2020-05-12 | 重庆小雨点小额贷款有限公司 | Block chain-based security management method, related device and storage medium |
CN111192044A (en) * | 2018-11-15 | 2020-05-22 | 富邦金融控股股份有限公司 | Block chain network system with supervision mechanism and implementation method thereof |
CN111277412A (en) * | 2020-02-18 | 2020-06-12 | 暨南大学 | Data security sharing system and method based on block chain key distribution |
CN111355578A (en) * | 2020-03-16 | 2020-06-30 | 北京有链科技有限公司 | Public key encryption and decryption method and system with double monitoring parties |
CN111586010A (en) * | 2020-04-29 | 2020-08-25 | 中国联合网络通信集团有限公司 | Key distribution method and device |
CN111598701A (en) * | 2020-05-22 | 2020-08-28 | 深圳市网心科技有限公司 | Information monitoring method, system, equipment and storage medium |
CN111709053A (en) * | 2020-06-11 | 2020-09-25 | 中国工商银行股份有限公司 | Operation method and operation device based on loose coupling transaction network |
CN111797164A (en) * | 2020-06-24 | 2020-10-20 | 北京荷月科技有限公司 | Cross-chain transaction supervision method and system based on block chain |
CN111797427A (en) * | 2020-06-04 | 2020-10-20 | 中国科学院信息工程研究所 | Block chain user identity supervision method and system considering privacy protection |
CN111819817A (en) * | 2018-03-08 | 2020-10-23 | 区块链控股有限公司 | Method and system for block chain implementation for bilinear mapping accumulator-based authorization |
CN111859444A (en) * | 2020-06-12 | 2020-10-30 | 中国科学院信息工程研究所 | Block chain data supervision method and system based on attribute encryption |
CN111898148A (en) * | 2018-05-11 | 2020-11-06 | 创新先进技术有限公司 | Information supervision method and device based on block chain |
CN112085502A (en) * | 2020-09-09 | 2020-12-15 | 江苏大学 | Lightweight block chain supervision method and system based on edge calculation |
CN112115199A (en) * | 2020-09-16 | 2020-12-22 | 安徽长泰信息安全服务有限公司 | Data management system based on block chain technology |
CN112131615A (en) * | 2020-02-10 | 2020-12-25 | 北京天德科技有限公司 | Data storage mechanism supporting supervision |
CN112152982A (en) * | 2019-06-28 | 2020-12-29 | 华为技术有限公司 | Processing method, device and medium of block chain information |
WO2020259156A1 (en) * | 2019-06-28 | 2020-12-30 | 深圳前海微众银行股份有限公司 | Blockchain-based private transaction method and apparatus |
CN109242467B (en) * | 2018-09-17 | 2021-01-01 | 金蝶软件(中国)有限公司 | Block chain-based networking method and device, computer equipment and storage medium |
CN112364387A (en) * | 2020-10-23 | 2021-02-12 | 华南理工大学 | Identity authentication method, device, medium and equipment based on block chain network |
CN112511309A (en) * | 2020-11-19 | 2021-03-16 | 从法信息科技有限公司 | Method and device for directionally sharing supervision-oriented information on block chain and electronic equipment |
CN112532584A (en) * | 2020-10-30 | 2021-03-19 | 重庆恢恢信息技术有限公司 | Construction site information security encryption working method according to block chain network |
CN112565412A (en) * | 2020-12-03 | 2021-03-26 | 重庆新致金服信息技术有限公司 | Data transaction method, system and equipment based on block chain |
CN112765650A (en) * | 2021-01-05 | 2021-05-07 | 西安电子科技大学 | Attribute-based searchable encryption block chain medical data sharing method |
CN112823350A (en) * | 2018-10-12 | 2021-05-18 | 黑莓有限公司 | Method and system for a monocular public key for a public ledger |
TWI733125B (en) * | 2018-08-14 | 2021-07-11 | 開曼群島商創新先進技術有限公司 | Multi-party safe calculation method and device, and electronic equipment |
CN113206744A (en) * | 2021-04-29 | 2021-08-03 | 杭州趣链科技有限公司 | Cross-chain transaction supervision method, device, equipment and storage medium |
CN113507511A (en) * | 2021-06-25 | 2021-10-15 | 中标慧安信息技术股份有限公司 | Internet of things data interaction trace-keeping method and system based on block chain |
CN113538042A (en) * | 2021-06-30 | 2021-10-22 | 杭州电子科技大学 | Block chain-based online advertisement click fraud monitoring and preventing method |
CN113570373A (en) * | 2021-09-23 | 2021-10-29 | 北京理工大学 | Responsibility pursuing transaction method and system based on block chain |
CN114884702A (en) * | 2022-04-19 | 2022-08-09 | 海南大学 | Identity registration method, identity authentication method and identity management system |
CN116720839A (en) * | 2023-08-07 | 2023-09-08 | 成都创一博通科技有限公司 | Financial information management method based on blockchain technology and supervision system thereof |
WO2024011812A1 (en) * | 2022-07-15 | 2024-01-18 | 广东浪潮智慧计算技术有限公司 | Blockchain-based supervision system and method, device, and medium |
CN117540432A (en) * | 2024-01-05 | 2024-02-09 | 河北数港科技有限公司 | Data privacy protection method and system for Internet |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017027900A1 (en) * | 2015-08-14 | 2017-02-23 | Identitii Pty Ltd | A computer implemented method for processing a financial transaction and a system therefor |
CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
CN107171806A (en) * | 2017-05-18 | 2017-09-15 | 北京航空航天大学 | Mobile terminal network cryptographic key negotiation method based on block chain |
CN107301521A (en) * | 2017-06-26 | 2017-10-27 | 深圳前海华深安信物联技术有限公司 | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain |
-
2017
- 2017-09-25 CN CN201710873134.8A patent/CN107483198B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017027900A1 (en) * | 2015-08-14 | 2017-02-23 | Identitii Pty Ltd | A computer implemented method for processing a financial transaction and a system therefor |
CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
CN107171806A (en) * | 2017-05-18 | 2017-09-15 | 北京航空航天大学 | Mobile terminal network cryptographic key negotiation method based on block chain |
CN107301521A (en) * | 2017-06-26 | 2017-10-27 | 深圳前海华深安信物联技术有限公司 | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain |
Cited By (106)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109981547A (en) * | 2017-12-28 | 2019-07-05 | 航天信息股份有限公司 | A kind of logistics transmission method and device based on block chain |
CN109981547B (en) * | 2017-12-28 | 2022-06-07 | 航天信息股份有限公司 | Logistics transmission method and device based on block chain |
CN110071898A (en) * | 2018-01-22 | 2019-07-30 | 厦门本能管家科技有限公司 | A method of removing Spot detection node legitimacy |
CN110071898B (en) * | 2018-01-22 | 2021-06-04 | 本无链科技(深圳)有限公司 | Method for removing center to detect node validity |
CN111819817A (en) * | 2018-03-08 | 2020-10-23 | 区块链控股有限公司 | Method and system for block chain implementation for bilinear mapping accumulator-based authorization |
CN108615144A (en) * | 2018-04-11 | 2018-10-02 | 北京奇虎科技有限公司 | Identity information processing method, device and the computing device of block chain node |
CN108876363A (en) * | 2018-04-18 | 2018-11-23 | 北京天德科技有限公司 | A kind of cross-border supervision reporting system based on double-strand framework block chain |
CN108460598A (en) * | 2018-04-18 | 2018-08-28 | 北京天德科技有限公司 | A kind of real-time automation supervision reporting system based on double-strand framework block chain |
CN108520464A (en) * | 2018-04-18 | 2018-09-11 | 北京天德科技有限公司 | A kind of real-time automation supervision reporting system based on traditional block chain |
CN109146678B (en) * | 2018-04-18 | 2022-07-05 | 北京天德科技有限公司 | Cross-border supervision reporting system based on traditional block chain |
CN109146678A (en) * | 2018-04-18 | 2019-01-04 | 北京天德科技有限公司 | A kind of cross-border supervision reporting system based on traditional block chain |
CN108460598B (en) * | 2018-04-18 | 2022-05-10 | 北京天德科技有限公司 | Real-time automatic supervision reporting system based on double-chain architecture block chain |
CN108520464B (en) * | 2018-04-18 | 2022-05-10 | 北京天德科技有限公司 | Real-time automatic supervision reporting system based on traditional block chain |
CN108712395A (en) * | 2018-04-27 | 2018-10-26 | 腾讯科技(深圳)有限公司 | Account management method, device, server based on block chain and storage medium |
CN108647523A (en) * | 2018-04-28 | 2018-10-12 | 华南理工大学 | A kind of electronic identification system based on block chain and deposit card, file access pattern method |
CN108898475A (en) * | 2018-05-08 | 2018-11-27 | 众安信息技术服务有限公司 | Alliance's block chain based on encryption attribute realizes credit methods and system |
CN108712409A (en) * | 2018-05-09 | 2018-10-26 | 梧州市兴能农业科技有限公司 | A kind of e bill transaction system based on privately owned block chain |
CN108712409B (en) * | 2018-05-09 | 2021-05-25 | 广西创轩科技有限公司 | Electronic bill transaction system based on private block chain |
US11246033B2 (en) | 2018-05-10 | 2022-02-08 | Huawei Technologies Co., Ltd. | Authentication method, and related device and system |
WO2019214623A1 (en) * | 2018-05-10 | 2019-11-14 | 华为技术有限公司 | Authentication method, related equipment, and system |
CN111898148A (en) * | 2018-05-11 | 2020-11-06 | 创新先进技术有限公司 | Information supervision method and device based on block chain |
CN108933778A (en) * | 2018-05-23 | 2018-12-04 | 广州西麦科技股份有限公司 | Product trading monitoring method, device and storage medium based on system for cloud computing |
CN111149122B (en) * | 2018-05-30 | 2023-10-10 | 重庆小雨点小额贷款有限公司 | Block chain-based security management method, related device and storage medium |
CN111149122A (en) * | 2018-05-30 | 2020-05-12 | 重庆小雨点小额贷款有限公司 | Block chain-based security management method, related device and storage medium |
CN108989022B (en) * | 2018-06-08 | 2021-11-09 | 中国科学院计算技术研究所 | Intelligent object shared key establishment method and system based on block chain |
CN108989022A (en) * | 2018-06-08 | 2018-12-11 | 中国科学院计算技术研究所 | A kind of smart item shared key method for building up and system based on block chain |
CN109064324A (en) * | 2018-06-15 | 2018-12-21 | 重庆金融资产交易所有限责任公司 | Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain |
CN108964903B (en) * | 2018-07-12 | 2021-12-14 | 腾讯科技(深圳)有限公司 | Password storage method and device |
CN108964903A (en) * | 2018-07-12 | 2018-12-07 | 腾讯科技(深圳)有限公司 | password storage method and device |
CN108900528A (en) * | 2018-07-24 | 2018-11-27 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN108900528B (en) * | 2018-07-24 | 2021-08-31 | 中国联合网络通信集团有限公司 | Block chain real-name authentication method, device, equipment and storage medium |
CN109190384A (en) * | 2018-07-26 | 2019-01-11 | 百色学院 | A kind of multicenter block chain fuse protection system and method |
CN109274481A (en) * | 2018-08-01 | 2019-01-25 | 中国科学院数据与通信保护研究教育中心 | A kind of traceable method of data of block chain |
CN109274481B (en) * | 2018-08-01 | 2020-03-27 | 中国科学院数据与通信保护研究教育中心 | Data traceable method of block chain |
CN110827029A (en) * | 2018-08-09 | 2020-02-21 | 普华云创科技(北京)有限公司 | User management method, system and computer readable storage medium based on block chain |
TWI733125B (en) * | 2018-08-14 | 2021-07-11 | 開曼群島商創新先進技術有限公司 | Multi-party safe calculation method and device, and electronic equipment |
CN109005186B (en) * | 2018-08-20 | 2020-12-11 | 杭州复杂美科技有限公司 | Method, system, equipment and storage medium for isolating user identity information |
CN109005186A (en) * | 2018-08-20 | 2018-12-14 | 杭州复杂美科技有限公司 | A kind of method, system, equipment and the storage medium of user-isolated identity information |
CN109194487A (en) * | 2018-09-13 | 2019-01-11 | 全链通有限公司 | Construction method and system are traded or communicated to my real name based on block chain |
CN109242467B (en) * | 2018-09-17 | 2021-01-01 | 金蝶软件(中国)有限公司 | Block chain-based networking method and device, computer equipment and storage medium |
CN109361738A (en) * | 2018-09-25 | 2019-02-19 | 安徽灵图壹智能科技有限公司 | A kind of identity authorization system and method based on block chain network |
CN112823350A (en) * | 2018-10-12 | 2021-05-18 | 黑莓有限公司 | Method and system for a monocular public key for a public ledger |
CN109447742A (en) * | 2018-10-16 | 2019-03-08 | 广东工业大学 | A kind of order processing method and relevant apparatus |
CN111106930A (en) * | 2018-10-25 | 2020-05-05 | 北京国盾量子信息技术有限公司 | Block chain network construction method and device and block chain network system |
CN111106930B (en) * | 2018-10-25 | 2023-03-14 | 北京国盾量子信息技术有限公司 | Block chain network construction method and device and block chain network system |
CN111192044A (en) * | 2018-11-15 | 2020-05-22 | 富邦金融控股股份有限公司 | Block chain network system with supervision mechanism and implementation method thereof |
CN109949882A (en) * | 2018-11-15 | 2019-06-28 | 陕西医链区块链集团有限公司 | A kind of medical treatment block chain data-storage system |
CN109558742A (en) * | 2018-11-16 | 2019-04-02 | 海南新软软件有限公司 | A kind of effectiveness of information detection method and device based on block chain |
CN109472601A (en) * | 2018-11-21 | 2019-03-15 | 北京蓝石环球区块链科技有限公司 | The block chain framework of privacy transaction can be supervised |
CN109784918A (en) * | 2018-12-15 | 2019-05-21 | 深圳壹账通智能科技有限公司 | Information measure of supervision, device, equipment and storage medium based on block chain |
CN109697670A (en) * | 2018-12-29 | 2019-04-30 | 杭州趣链科技有限公司 | A kind of public chain information screen method not influencing confidence level |
CN109741482A (en) * | 2019-01-08 | 2019-05-10 | 京东方科技集团股份有限公司 | A kind of information sharing method and device |
CN109741482B (en) * | 2019-01-08 | 2022-01-25 | 京东方科技集团股份有限公司 | Information sharing method and device |
CN109714173B (en) * | 2019-01-25 | 2020-09-29 | 北京邮电大学 | Block chain-based Internet of things authentication method and device |
CN109714173A (en) * | 2019-01-25 | 2019-05-03 | 北京邮电大学 | A kind of Internet of Things authentication method and device based on block chain |
CN110611647A (en) * | 2019-03-06 | 2019-12-24 | 张超 | Node joining method and device on block chain system |
CN109981675B (en) * | 2019-04-04 | 2021-10-26 | 西安电子科技大学 | Identity information protection method for digital identity authentication and attribute encryption |
CN109981675A (en) * | 2019-04-04 | 2019-07-05 | 西安电子科技大学 | A kind of identity information guard method of digital identification authentication and encryption attribute |
CN109993659A (en) * | 2019-04-17 | 2019-07-09 | 上海沄界信息科技有限公司 | A kind of internet trading system, method and apparatus |
CN110289951A (en) * | 2019-06-03 | 2019-09-27 | 杭州电子科技大学 | A kind of shared content monitoring method based on Threshold key sharing and block chain |
CN112152982B (en) * | 2019-06-28 | 2022-01-07 | 华为技术有限公司 | Processing method, device and medium of block chain information |
CN112152982A (en) * | 2019-06-28 | 2020-12-29 | 华为技术有限公司 | Processing method, device and medium of block chain information |
WO2020259156A1 (en) * | 2019-06-28 | 2020-12-30 | 深圳前海微众银行股份有限公司 | Blockchain-based private transaction method and apparatus |
CN110503560A (en) * | 2019-09-27 | 2019-11-26 | 深圳市网心科技有限公司 | Data trade method, data trade apparatus and system based on block chain |
CN110570313A (en) * | 2019-09-27 | 2019-12-13 | 深圳市网心科技有限公司 | data transaction method, data transaction device and system based on block chain |
CN110809000A (en) * | 2019-11-12 | 2020-02-18 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Service interaction method, device, equipment and storage medium based on block chain network |
CN111010280B (en) * | 2019-12-09 | 2021-07-30 | 中山大学 | Group signature-based construction method for monitorable block chain |
CN111010280A (en) * | 2019-12-09 | 2020-04-14 | 中山大学 | Group signature-based construction method for monitorable block chain |
CN112131615A (en) * | 2020-02-10 | 2020-12-25 | 北京天德科技有限公司 | Data storage mechanism supporting supervision |
CN111277412A (en) * | 2020-02-18 | 2020-06-12 | 暨南大学 | Data security sharing system and method based on block chain key distribution |
CN111277412B (en) * | 2020-02-18 | 2023-03-24 | 暨南大学 | Data security sharing system and method based on block chain key distribution |
CN111355578A (en) * | 2020-03-16 | 2020-06-30 | 北京有链科技有限公司 | Public key encryption and decryption method and system with double monitoring parties |
CN111586010A (en) * | 2020-04-29 | 2020-08-25 | 中国联合网络通信集团有限公司 | Key distribution method and device |
CN111586010B (en) * | 2020-04-29 | 2022-04-01 | 中国联合网络通信集团有限公司 | Key distribution method and device |
CN111598701A (en) * | 2020-05-22 | 2020-08-28 | 深圳市网心科技有限公司 | Information monitoring method, system, equipment and storage medium |
CN111598701B (en) * | 2020-05-22 | 2023-09-19 | 深圳市迅雷网络技术有限公司 | Information monitoring method, system, equipment and storage medium |
CN111797427A (en) * | 2020-06-04 | 2020-10-20 | 中国科学院信息工程研究所 | Block chain user identity supervision method and system considering privacy protection |
CN111709053A (en) * | 2020-06-11 | 2020-09-25 | 中国工商银行股份有限公司 | Operation method and operation device based on loose coupling transaction network |
CN111709053B (en) * | 2020-06-11 | 2024-04-05 | 中国工商银行股份有限公司 | Operation method and operation device based on loose coupling transaction network |
CN111859444B (en) * | 2020-06-12 | 2022-03-01 | 中国科学院信息工程研究所 | Block chain data supervision method and system based on attribute encryption |
CN111859444A (en) * | 2020-06-12 | 2020-10-30 | 中国科学院信息工程研究所 | Block chain data supervision method and system based on attribute encryption |
CN111797164A (en) * | 2020-06-24 | 2020-10-20 | 北京荷月科技有限公司 | Cross-chain transaction supervision method and system based on block chain |
CN112085502A (en) * | 2020-09-09 | 2020-12-15 | 江苏大学 | Lightweight block chain supervision method and system based on edge calculation |
CN112085502B (en) * | 2020-09-09 | 2023-10-13 | 江苏大学 | Lightweight block chain supervision method and system based on edge calculation |
CN112115199A (en) * | 2020-09-16 | 2020-12-22 | 安徽长泰信息安全服务有限公司 | Data management system based on block chain technology |
CN112364387A (en) * | 2020-10-23 | 2021-02-12 | 华南理工大学 | Identity authentication method, device, medium and equipment based on block chain network |
CN112364387B (en) * | 2020-10-23 | 2024-04-02 | 华南理工大学 | Identity authentication method and device based on blockchain network, medium and equipment |
CN112532584A (en) * | 2020-10-30 | 2021-03-19 | 重庆恢恢信息技术有限公司 | Construction site information security encryption working method according to block chain network |
CN112532584B (en) * | 2020-10-30 | 2022-08-19 | 重庆恢恢信息技术有限公司 | Construction site information security encryption working method according to block chain network |
CN112511309A (en) * | 2020-11-19 | 2021-03-16 | 从法信息科技有限公司 | Method and device for directionally sharing supervision-oriented information on block chain and electronic equipment |
CN112511309B (en) * | 2020-11-19 | 2022-07-08 | 从法信息科技有限公司 | Method and device for directionally sharing supervision-oriented information on block chain and electronic equipment |
CN112565412A (en) * | 2020-12-03 | 2021-03-26 | 重庆新致金服信息技术有限公司 | Data transaction method, system and equipment based on block chain |
CN112765650A (en) * | 2021-01-05 | 2021-05-07 | 西安电子科技大学 | Attribute-based searchable encryption block chain medical data sharing method |
CN112765650B (en) * | 2021-01-05 | 2023-11-10 | 西安电子科技大学 | Attribute-based searchable encrypted blockchain medical data sharing method |
CN113206744B (en) * | 2021-04-29 | 2024-04-02 | 杭州趣链科技有限公司 | Cross-chain transaction supervision method, device, equipment and storage medium |
CN113206744A (en) * | 2021-04-29 | 2021-08-03 | 杭州趣链科技有限公司 | Cross-chain transaction supervision method, device, equipment and storage medium |
CN113507511A (en) * | 2021-06-25 | 2021-10-15 | 中标慧安信息技术股份有限公司 | Internet of things data interaction trace-keeping method and system based on block chain |
CN113538042A (en) * | 2021-06-30 | 2021-10-22 | 杭州电子科技大学 | Block chain-based online advertisement click fraud monitoring and preventing method |
CN113538042B (en) * | 2021-06-30 | 2023-09-22 | 杭州电子科技大学 | Block chain-based online advertisement click fraud monitoring and preventing method |
CN113570373A (en) * | 2021-09-23 | 2021-10-29 | 北京理工大学 | Responsibility pursuing transaction method and system based on block chain |
CN114884702A (en) * | 2022-04-19 | 2022-08-09 | 海南大学 | Identity registration method, identity authentication method and identity management system |
WO2024011812A1 (en) * | 2022-07-15 | 2024-01-18 | 广东浪潮智慧计算技术有限公司 | Blockchain-based supervision system and method, device, and medium |
CN116720839B (en) * | 2023-08-07 | 2023-10-17 | 成都创一博通科技有限公司 | Financial information management method based on blockchain technology and supervision system thereof |
CN116720839A (en) * | 2023-08-07 | 2023-09-08 | 成都创一博通科技有限公司 | Financial information management method based on blockchain technology and supervision system thereof |
CN117540432A (en) * | 2024-01-05 | 2024-02-09 | 河北数港科技有限公司 | Data privacy protection method and system for Internet |
CN117540432B (en) * | 2024-01-05 | 2024-03-19 | 河北数港科技有限公司 | Data privacy protection method and system for Internet |
Also Published As
Publication number | Publication date |
---|---|
CN107483198B (en) | 2019-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107483198B (en) | A kind of block catenary system supervised and method | |
Li et al. | A blockchain privacy protection scheme based on ring signature | |
CN111008836B (en) | Privacy security transfer payment method, device, system and storage medium | |
Xu et al. | Enabling the sharing economy: Privacy respecting contract based on public blockchain | |
CN107864139A (en) | A kind of cryptography attribute base access control method and system based on dynamic rules | |
CN104168108B (en) | It is a kind of to reveal the traceable attribute base mixed encryption method of key | |
CN109417478A (en) | Multilink cryptologic block chain | |
Li et al. | Toward privacy and regulation in blockchain-based cryptocurrencies | |
CN110474893A (en) | A kind of isomery is across the close state data safety sharing method of trust domain and system | |
Nagaraju et al. | Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway | |
CN113595971A (en) | Block chain-based distributed data security sharing method, system and computer readable medium | |
CN103401839B (en) | A kind of many authorization center encryption method based on attribute protection | |
CN108418783A (en) | A kind of protection method of block chain intelligence contract privacy, medium | |
CN110011781A (en) | A kind of homomorphic cryptography method encrypting and support zero-knowledge proof for transaction amount | |
Yuan et al. | Blockchain with accountable CP-ABE: How to effectively protect the electronic documents | |
CA2593414A1 (en) | Identity-based key generating methods and devices | |
El Defrawy et al. | Founding digital currency on secure computation | |
Li et al. | FPPB: A fast and privacy-preserving method based on the permissioned blockchain for fair transactions in sharing economy | |
Moriyama et al. | PUF-based RFID authentication secure and private under memory leakage | |
CN106059765A (en) | Digital virtual asset access control method based on attribute password under cloud environment | |
John et al. | Provably secure data sharing approach for personal health records in cloud storage using session password, data access key, and circular interpolation | |
Zhou et al. | Distributed bitcoin account management | |
Wu et al. | The survey on the development of secure multi-party computing in the blockchain | |
Luo et al. | Accountable data sharing scheme based on blockchain and SGX | |
CN116527322A (en) | Combined credit investigation method and device based on block chain and privacy calculation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |