CN107483198A - A kind of block catenary system supervised and method - Google Patents

A kind of block catenary system supervised and method Download PDF

Info

Publication number
CN107483198A
CN107483198A CN201710873134.8A CN201710873134A CN107483198A CN 107483198 A CN107483198 A CN 107483198A CN 201710873134 A CN201710873134 A CN 201710873134A CN 107483198 A CN107483198 A CN 107483198A
Authority
CN
China
Prior art keywords
node
block chain
key
supervision department
kdc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710873134.8A
Other languages
Chinese (zh)
Other versions
CN107483198B (en
Inventor
张锐
肖禹亭
马晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Information Engineering of CAS
Original Assignee
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Information Engineering of CAS filed Critical Institute of Information Engineering of CAS
Priority to CN201710873134.8A priority Critical patent/CN107483198B/en
Publication of CN107483198A publication Critical patent/CN107483198A/en
Application granted granted Critical
Publication of CN107483198B publication Critical patent/CN107483198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The present invention relates to a kind of block catenary system supervised and method, including:Authentication center (CA), the log-on message of authentication, generation on the node is carried out to ordinary node, and openly wait the registration for being written into and node being completed in block chain to block chain network;KDC (KDC), regulatory rule is formulated, define the complete property set of supervision department, key is distributed for it according to the specific object of supervision department;Supervision department, key is obtained at KDC, the chain network transaction of monitoring block, once there is abnormal account, then utilizes the true identity of the Node registry acquisition of information node in the secret key decryption block chain of oneself;Ordinary node, interacted with CA, carry out authentication, complete registration addition block chain operation afterwards.The present invention builds a kind of block chain supervised using cryptological techniques such as ABE, signatures, it is allowed to which different supervision departments supervises according to the different data to block catenary system of function, thus takes precautions against the generation of illegal activities etc..

Description

A kind of block catenary system supervised and method
Technical field
The invention belongs to Computer Applied Technology field, and in particular to a kind of block catenary system supervised and method, permit Perhaps different supervision centers is supervised according to the different behaviors to block catenary system user of function.
Background technology
Block chain originates from bit coin, and its essence is a kind of distributed storage technology, has decentralization, anonymity, can chase after The property such as trace back, can not distort.Using block chain technology, a set of new trust can be established in the case of non-stop layer trust authority System.Therefore, the scenes such as financial service, shared economy, medical treatment & health, social management can be applied to.But in traditional block In chain, the accounts information and transaction content of all users are all disclosed.Even if any user can read these open numbers According to, but block chain can but bring great threat for the assumed name system that guarantee anonymity uses to social stability.For example, its nothing Method resists the illegal activities such as money laundering.One real user can generate many different accounts, and between these accounts constantly Carry out fund transfer, anti money washing is set to become difficult.In order to take precautions against such criminal offence, the present invention discloses a kind of block supervised Catenary system and method.
Encryption attribute scheme (ABE) is a kind of encryption technology that can realize fine granularity nonreciprocal access control mechanisms. In ABE, the condition that user is capable of successful decryption is that one group of attribute set disclosure satisfy that access control policy, and different according to function It is classified as two major classes:The encryption attribute scheme (KP-ABE) of Ciphertext policy, wherein key is associated with access control policy, close Text is associated with the attribute set of user;The encryption attribute scheme (CP-ABE) of Ciphertext policy, with KP-ABE on the contrary, key and use The attribute set at family is related, and ciphertext is associated with access strategy.For both encryption attribute schemes, only when attribute set is expired When sufficient access control policy, user can correctly decrypt.KP-ABE main application scenarios are paid for television system, and CP-ABE is mainly used in the information sharing system with access control, such as electronic medical record system.The present invention using CP-ABE come Realize the supervision to system user behavior.In order to improve encryption efficiency, using KEM/DEM Hybrid Encryptions.I.e. by CP-AB-KEM side Case encrypted session key, then private key encryption data by the use of session key as DEM are in itself.It is consistent with ABE schemes, only have The user of respective attributes can just decrypt the session key that KEM obtains encapsulation, recycle session key decryption DEM parts to obtain number According to.
Being currently known a Chinese patent CN 106503994A, (the block chain private data based on encryption attribute accesses control Method processed) also use attribute encryption technology block catenary system is improved.The invention proposes one kind and is based on encryption attribute Block chain private data access control method, mainly solve conventional art only the true identity of user in block chain is hidden Name protection, to transaction privacy information be not encrypted protection and caused by privacy leakage problem.Implementation step is:(1) system Initialization;(2) user's registration obtains attribute information;(3) authoritative center is according to customer attribute information dispatch user private key;(4) hand over Yi Fang encryptions transaction private data is simultaneously uploaded to block chain;(5) bookkeeper is verified to Transaction Information and performs transaction;(6) Supervision center is authorized to check transaction ciphertext using mandate private key decryption.The invention also allows to authorize it can be seen from above-mentioned steps 6 The problem of transaction ciphertext is checked in supervision center decryption, plays certain supervision effect, but presence one is serious:All Activity data Exist with ciphertext form, the supervision of supervision center can be caused will become extremely complex, especially supervision center is possibly can not Note abnormalities behavior in time and make corresponding processing.Once the no longer effective property of supervision, hits criminal offence Dynamics will weaken significantly.In addition, the invention is that user is made a distinction with attribute, but it is of virtually the user of same alike result simultaneously Non- only one, a transaction caused by whom is can not be known exactly which, i.e., can not confirm it when criminal offence occurs True identity, supervision are very difficult.
The content of the invention
The technology of the present invention solves problem:Overcome the deficiencies in the prior art, there is provided a kind of block catenary system supervised and Method, using cryptological techniques such as ABE, signatures, structure it is a kind of can real-time monitoring block chain, it is allowed to different supervision department's roots Supervised according to the different data to block catenary system of function, thus take precautions against the generation of illegal activities etc..
The present invention uses following technical scheme:A kind of block catenary system supervised, including:It is authentication center (CA), close Key Distribution Center (KDC), supervision department and ordinary node;
1st, authentication center (CA), the private key of generation signature is possessed:Authentication is carried out to ordinary node, obtains its true body Part information and the accounts information (such as public key or wallet address) for the operation of block chain;By real identity information according to given Regulatory rule ABE algorithm for encryption, generate corresponding ciphertext;Generation is on node accounts information and the label of ABE encrypted cipher texts Name;Encapsulating node accounts information, ABE encrypted cipher texts, signature turns into the log-on message of the node;Log-on message is published to block In chain network, wait by existing node verification and write block chain to complete Node registry.
2nd, KDC (KDC), definition describe the complete attribute set of each supervision department's function, generate ABE algorithms Common parameter and can be supervision department distribute key main private key;Formulate regulatory rule-supervision department with what attribute Gatekeeper pipe has the node of what identity;Common parameter and regulatory rule are sent to CA.Judge the category that supervision department meets Property collection, and generate corresponding private key using main private key for it.
3rd, supervision department, the private key of oneself is obtained at KDC.Block chain network trading activity is monitored, if note abnormalities A large amount of or a large sum of transaction is produced in account, such as short time, then searches for the log-on message in block chain on the account, checking The validity of signature, decryption ABE encrypted cipher texts obtain the true identity information of the account.
4th, ordinary node, the operation for interacting participation block chain after completion is registered with CA is passed through.
A kind of block chain method supervised of the present invention, realizes that step is as follows:
1st, system is established:CA generation signature public private key pairs, and the public key of oneself is disclosed;KDC definition describes each supervision department The complete attribute set of function, generate the common parameter of ABE algorithms and the main private key of key can be distributed for supervision department, formulate Regulatory rule, common parameter and regulatory rule are sent to CA.
2nd, administrative key is distributed:When there is new supervision department to add, KDC first determines whether its property set met, then Corresponding key is generated for it using the main private key of oneself, the key is finally sent to the supervision department in a secured manner.
3rd, block chain is run:Participated in jointly by ordinary node.Be with traditional block chain identical, block chain still with The wound generation block of special construction then by a series of there is mutually isostructural block to be formed with cryptographic Hash link, save as the beginning It can mutually be transferred accounts between point, and accounting nodes produced by mechanism of knowing together and write new block, and the block have recorded one The All Activity data occurred in the section time;Unlike, the present invention in data structure by increasing user's registration information table Monitoring function is realized, it is contained mainly in caused all new node log-on messages in a period of time, and (specific producing method is shown in 4th, Node registry), the data can be packaged into new block and final entry is on block chain.Therefore, by searching for block chain, Transaction data can be not only inquired about, log-on message can also be inquired about.
4th, Node registry:When there is new node to wish that adding block chain runs, it interacts with CA complete identity first Certification, and oneself accounts information that will be used in the operation of block chain, such as public key or wallet address are provided.CA is utilized and this The identity information that node interaction obtains afterwards, the regulatory rule provided with reference to KDC judge the supervision department with what attribute The true identity information of the node can be obtained at the following a certain moment, and the information obtains using ABE algorithm for encryption according to this judgement Ciphertext after must encrypting;Then using the signature private key generation of oneself on node accounts information and ABE encrypted cipher texts Signature, and encapsulate node accounts information, ABE encrypted cipher texts, sign as the log-on message of the node;It is finally that log-on message is public Cloth is into block chain network.All registered nodes can verify the validity of signature therein after log-on message is received, and Caused all new transaction data in a period of time and log-on message are generated into new area by certain data structure encapsulation Block.After log-on message is written into block chain, then new node registration is completed.Afterwards, the node can then be normally added area The operation of block chain.
5th, trading activity is supervised:Supervision department monitors block chain network trading activity by the method for oneself, once there is account There is abnormal behaviour in family, a large amount of or a large sum of transaction is produced in such as short time, then searches for the note in block chain on the node Volume information, verify the validity wherein signed and decrypt the true identity that ABE encrypted cipher texts obtain the node.
The present invention compared with prior art the advantages of be:
1st, compared with traditional block chain, invention increases monitoring function, solves existing block catenary system without supervision work( The shortcomings that energy.Utilize existing ABE, signature existing password technology, only part modification block chain data structure and node access Rule, it can reach the purpose of supervision customer transaction behavior.To realize that the supervision behavior such as anti money washing provides basis.
2nd, compared with existing patent, the present invention only encrypts to user real identification, and the entity of no authority can not decrypt note Its true identity of volume acquisition of information, on the one hand protects the anonymity of domestic consumer, and another aspect supervision department passes through monitoring net Transaction lockable exception account in network, once the account can that notes abnormalities obtains its true body by searching for block chain Part, accomplish real-time monitoring.
Brief description of the drawings
Fig. 1 is present system composition frame chart;
Fig. 2 is data structure diagram, i.e. the concrete mode figure of block chain storage;
Fig. 3 is that new node register flow path figure is authentication and open log-on message detail flowchart;
Fig. 4 is supervision flow figure.
Embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention is described in detail.
As shown in figure 1, the system all participation entities according to the part of function divide it is as follows:
1st, authentication center (CA), the log-on message of authentication, generation on the node is carried out to ordinary node, and openly To block chain network, the registration for being written into and node being completed in block chain is waited;
2nd, KDC (KDC), regulatory rule is formulated, the complete property set of supervision department is defined, according to supervision department Specific object for its distribute key;
3rd, supervision department, key is obtained at KDC, the chain network transaction of monitoring block, once there is abnormal account, is then utilized The true identity of Node registry acquisition of information node in the secret key decryption block chain of oneself;
4th, ordinary node, interacted with CA, carry out authentication, complete registration addition block chain operation afterwards.
Further, a block chain backup can be locally stored in all ordinary nodes, supervision department, and same in real time Walk the new data in block chain network.
Based on above entity, present system realizes following functions:
1st, system is established
The public private key pair of CA generation signatures, and the public key of oneself is disclosed;The system that KDC runs CP-AB-KEM schemes first Initialization algorithm, generates the open parameter PK and main private key MSK of oneself, and definition describes the complete property set of each supervision department's function U is closed, formulation regulatory rule, which describes the department with what attribute, can supervise the node of what identity, and selection is suitable symmetrically to be added Close algorithm (AES) is used as DEM algorithms, and discloses oneself open parameter, complete attribute set, regulatory rule and the DEM of selection Algorithm;Block chain wound generation block is generated, including completes the configuration (being no different with traditional block chain) of block chain, chooses preselected node, Completion registration is interacted by them and with CA, generates preselected node registration table.
Specifically, the system initialization algorithm of CP-AB-KEM schemes is:It is non-right according to default rule selection one first Bilinear map D=(the G of title1,G2,GT, e, p), wherein G1,G2,GTIt is three different groups, p is these order of a group numbers, is taken as Prime number, e are asymmetrical bilinear map e:G1×G2→GT, can be regarded as a function, input G respectively1In a member Element and G2In an element be an exportable GTIn element.The attribute description U of system is by finite field Zp(in integer item Mould p residual class ring) in element form, the attribute Z in real world that will be allpIn an element represent, and Uniquely corresponding such element, all corresponding relations are also recorded in attribute description U one attribute.Then algorithm is random Choose group G1In generation member g, h, u, v, w, randomly select crowd G2In generation member z, choose finite field ZpIn arbitrary random number α, using above-mentioned asymmetrical bilinear map e, generate GTOn element e (g, z), finally e (g, z) is done using random number α Module exponent computing obtains e (g, z)α.By the D of all above-mentioned selections or generation, g, h, u, v, w, z, e (g, z)αAs open parameter PK, it is denoted as PK=(D, g, h, u, v, w, z, e (g, z)α), and it is sent to all users;Simultaneously by PK, α is as main private key MSK, is denoted as MSK=(PK, α), is safely preserved by KDC.
2nd, administrative key is distributed
When there is new supervision department to add, KDC first determines whether its attribute set met Wherein A1,A2,...,AkBelong to finite field Zp, represent the supervision department and possess k attribute altogether, attribute set S is above-mentioned complete Full attribute set U a subset;Then KDC is calculated using the key generation of the main private key MSK operation CP-AB-KEM schemes of oneself Method generates corresponding key SK for it, and key is finally sent to the supervision department in a secured manner.
Specifically, the key schedule of CPA-AB-KEM schemes is:Main the private key MSK and user for inputting KDC meet Attribute setFrom finite field ZpIn randomly select k+1 value r, r1,r2,...,rk, use first Main private key cc g first to generation does module exponent computing and obtains gα, do module exponent computing with random number r ws first to generation and obtain wr, to above-mentioned Two parts do multiplication and obtain part of key K0=gαwr;Then done module exponent computing to being generated first z with random number r to obtain part close Key K1=zr, similar with said process for i=1,2 ..., k, difference calculating section keyAnd part of key(wherein-r represents r in finite field ZpIn additive inverse), finally by S, K0,K1,{Ki,2,Ki,3, i= 1,2 ..., k is safely preserved, and be denoted by SK=(S, K together as the private key SK of user by user oneself0,K1, {Ki,2,Ki,3), i=1,2 ..., k.
3rd, block chain is run
Participated in jointly by ordinary node.It is that block chain is still with the wound with special construction with traditional block chain identical Generation block then there is mutually isostructural block to link with cryptographic Hash form as the beginning by a series of, can phase between node Mutually transfer accounts, and accounting nodes are produced by mechanism of knowing together and write new block, and the block have recorded and occur within a period of time All Activity data;Unlike, the present invention realizes supervision work(by increasing user's registration information table in data structure Can, it is contained mainly in caused all new node log-on messages in a period of time, and (specific producing method is shown in that 4, new node is noted Volume), the data can be packaged into new block and final entry is on block chain.Therefore, not only can be with by searching for block chain Transaction data is inquired about, log-on message can also be inquired about.Specific data structure is as shown in Figure 2:Block chain is that had by a series of The block of time order and function order links composition in a manner of cryptographic Hash, and the beginning is used as to create generation block.Wound generation block, which includes, matches somebody with somebody Confidence ceases and preselected node registration table, configuration information include the configuration information of all about block chain, as at the beginning of common recognition mechanism, POW Beginning difficulty etc., preselected node registration table are included in the log-on message for the node that operation is may participate at the beginning of block catenary system is established, Its structure is consistent with the user's registration table in other blocks.In addition to generation block is created, each block is comprising block sequence number, block Head, block size, block Hash, user's registration table and data set.User's registration table is included in all new nodes in a period of time The information of registration, each log-on message by node public key PK, the ABE encrypted cipher texts of its true identity information (by Head, AB-KEM and DEM tri- parts form, and wherein Head marks in the ciphertext length of AB-KEM and DEM respectively so that ensure can be just Really decryption), CA connects composition with the private key of oneself to the signature of preceding two parts information.Data set includes all in a period of time Data (orderly).Block head record father's block Hash, timestamp, Merkle roots.Wherein, Merkel roots be by all data by The value of the root node of the structure composition of Merkle trees.Rapidly tested using Merkle tree constructions without downloading all data Demonstrate,prove the block and some specific data be present.
4th, new node is registered
Idiographic flow is as shown in Figure 3.When there is new node to wish that adding block chain runs, it initiates registration to CA first please Ask;Then authentication is carried out to new node by CA, obtains its real identity information;New node provides oneself to CA will be The accounts information used in the operation of block chain, the present invention is using public key as example, so node needs to generate public key PKnode, and Send it to CA;CA generates corresponding access structure (M, ρ) according to the real information of the KDC regulatory rules sent and node, The ciphertext on session key key is generated using the open parameter PK operations CP-AB-KEM received at KDC AES CT, and the true identity information by the use of session key key as the private key encryption new node of aes algorithm, and it is private with the signature of oneself Key generation forms log-on message on PK and the signature of encapsulation ciphertext;Then CA needs open log-on message existing to block chain Network in;All registered nodes can verify the validity of signature therein after log-on message is received, and during by one section All new transaction data caused by interior and log-on message generate new block by certain data structure encapsulation;Work as registration After information is written into block chain, then new node registration is completed, and by CA notices new node, it succeeds in registration.Afterwards, the node The operation of block chain can be then normally added.
Specifically, CP-AB-KEM AES is:Input common parameter PK, linear privacy sharing access structure (M, ρ), wherein M is the matrix of a l rows n row, and ρ is a mapping, and an attribute is mapped as by any a line in matrix M.It is first First, at random from finite field ZpMiddle selection random number s and y2,...,yn, column vector is set(T is to seek row vector (s,y2,...,yn) transposition), calculate the shared column vector on random number s Represent matrix M And vectorIt is multiplied, then from finite field ZpMiddle selection random number t1,t2,...,tk, session key key=e (g, z)αs(αs Represent that α is multiplied with s), calculating section ciphertext C0=zsFor j=1,2 ..., l, difference calculating section ciphertext And part ciphertext(attribute of ρ (j) representing matrixs M jth row mapping ,-tjRepresent random number tjLimited Domain ZpIn additive inverse), calculating section ciphertextSetting ciphertext is CT=((M, ρ), C0,{Cj,1,Cj,2,Cj,3), Wherein j=1,2 ..., l.
5th, user behavior is supervised
Idiographic flow is as shown in Figure 4.Supervision department monitors block chain network trading activity by the method for oneself, once have There is abnormal behaviour in account, it is (described largely to refer to many transactions, and a large sum of that a large amount of or a large sum of transaction is produced in such as short time Refer to the with large amount of a transaction), then search for the log-on message in block chain on the node.When searching out log-on message, First verify that the validity wherein signed, be verified after just according to the Head of ABE encrypted cipher texts identify distinguish wherein KEM with DEM parts, the decipherment algorithm decryption KEM parts for then running CP-AB-KEM obtain session key key, and with the session key Secret key decryption DEM parts therein as AES obtain the true identity of the node.This example is not related to specific monitoring party Method, supervision department can judge that what behavior is abnormal account according to the method and rule of oneself, and this example, which only provides, once to be sentenced It is set to the method how abnormal account obtains its true identity.
Specifically, CP-AB-KEM decipherment algorithms are:Input and ciphertext CT and and property set corresponding to access structure (M, ρ) CloseCorresponding key SK=(S, K0,K1,{Ki,2,Ki,3), i=1,2 ..., k.If property set Conjunction is unsatisfactory for access strategy, and algorithm terminates.Otherwise, in the attribute set that matrix M all row vectors map, selection and attribute Set S common factor is I={ i:ρ (i) ∈ S }, calculate in I per i row matrixs row to MiCoefficient ωiIt is set to meet following equalitiesWherein MiIt is matrix M the i-th row, ωi·MiRepresent coefficient ωiNumber multiplies row matrix vector Mi, then Calculate encapsulation keyWherein j is attribute ρ (i) Index in S, represent GTIn multiplication, long horizontal line represents group GTIn division, top is dividend, and lower section is divisor.Its Middle divisorExpression calculates all elements i in set I respectively firstThe result calculated is all multiplied again;And eachIt is then to calculate e respectively first with above-mentioned asymmetrical bilinear map e (Ci,1,K1), e (Ci,2,Kj,2), e (Kj,3,Ci,3), obtain a G after then it is all multipliedTIn element, finally utilize ωiModule exponent computing acquisition is done to the elementFinally, output encapsulation key Key=e (g, z)αs
Above example is provided just for the sake of the description purpose of the present invention, and is not intended to limit the scope of the present invention.This The scope of invention is defined by the following claims.The various equivalent substitutions that do not depart from spirit and principles of the present invention and make and repair Change, all should cover within the scope of the present invention.

Claims (2)

  1. A kind of 1. block catenary system supervised, it is characterised in that:Including authentication center (CA), KDC (KDC), prison Pipe portion door and ordinary node;
    Authentication center (CA), possess the private key of generation signature, authentication is carried out to ordinary node, obtains its true identity information And the accounts information for the operation of block chain;It is raw by real identity information according to given regulatory rule ABE algorithm for encryption Into corresponding ciphertext;Generation is on node accounts information and the signature of ABE encrypted cipher texts;Encapsulate node accounts information, ABE encryptions Ciphertext, signature turn into the log-on message of the node;Log-on message is published in block chain network, waited by existing node verification And block chain is write to complete Node registry;
    KDC (KDC), definition describe the complete attribute set of each supervision department's function, generate the public of ABE algorithms Parameter and the main private key that key can be distributed for supervision department;It is that the supervision department with what attribute supervises to formulate regulatory rule Node with what identity;Common parameter and regulatory rule are sent to CA, judge the property set that supervision department meets, and It is that supervision department generates corresponding private key using main private key;
    Supervision department, the private key of oneself is obtained at KDC, monitor the trading activity in block chain network, if noting abnormalities account, As produced a large amount of or a large sum of transaction in the short time, then the log-on message in block chain network on the abnormal account is searched for, is tested The validity of signed certificate name, decryption ABE encrypted cipher texts obtain the true identity information of the abnormal account;
    Ordinary node, pass through the operation for interacting participation block chain after completion is registered with CA.
  2. A kind of 2. block chain method supervised, it is characterised in that:Realize that step is as follows:
    (1) system is established:CA generation signature public private key pairs, and the public key of oneself is disclosed;KDC definition describes each supervision department's function Complete attribute set, generate ABE algorithms common parameter and can be supervision department distribute key main private key, formulate supervision Rule, common parameter and regulatory rule are sent to CA;
    (2) administrative key is distributed:When there is new supervision department to add, KDC first determines whether its property set met, then utilizes The main private key of oneself generates corresponding key for it, and the key is finally sent into the supervision department in a secured manner;
    (3) block chain is run:Participated in jointly by ordinary node, New Transaction is produced between node, it then follows common recognition mechanism generation new district Block, link all blocks according to certain data structure and form block chain;
    (4) Node registry:When there is new node to wish that adding block chain runs, it interacts completion identity with CA and recognized first Card, and oneself accounts information that will be used in the operation of block chain is provided;CA utilizes interacts the body obtained afterwards with the node Part information, the regulatory rule provided with reference to KDC judge that the supervision department with what attribute just can be in following a certain moment acquisition The true identity information of the node, and according to this judgement using the ciphertext after the information acquisition encryption of ABE algorithm for encryption;Then Generated using the signature private key of oneself on node accounts information and the signature of ABE encrypted cipher texts, and encapsulate node account letter Breath, ABE encrypted cipher texts, signature turn into the log-on message of the node;Finally log-on message is published in block chain network, owned Registered node can verify the validity of signature therein after log-on message is received, and by caused institute in a period of time The new transaction data and log-on message having generate new block by certain data structure encapsulation, when log-on message is written into area After in block chain, then new node registration is completed, and afterwards, the node can then be normally added the operation of block chain;
    (5) trading activity is supervised:Supervision department monitors block chain network trading activity by the method for oneself, once there is account to deposit In abnormal behaviour, then the log-on message in block chain network on the abnormal nodes is searched for, verifies the validity wherein signed simultaneously Decryption ABE encrypted cipher texts obtain the true identity of the abnormal nodes.
CN201710873134.8A 2017-09-25 2017-09-25 A kind of block catenary system supervised and method Active CN107483198B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710873134.8A CN107483198B (en) 2017-09-25 2017-09-25 A kind of block catenary system supervised and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710873134.8A CN107483198B (en) 2017-09-25 2017-09-25 A kind of block catenary system supervised and method

Publications (2)

Publication Number Publication Date
CN107483198A true CN107483198A (en) 2017-12-15
CN107483198B CN107483198B (en) 2019-11-12

Family

ID=60585958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710873134.8A Active CN107483198B (en) 2017-09-25 2017-09-25 A kind of block catenary system supervised and method

Country Status (1)

Country Link
CN (1) CN107483198B (en)

Cited By (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108460598A (en) * 2018-04-18 2018-08-28 北京天德科技有限公司 A kind of real-time automation supervision reporting system based on double-strand framework block chain
CN108520464A (en) * 2018-04-18 2018-09-11 北京天德科技有限公司 A kind of real-time automation supervision reporting system based on traditional block chain
CN108615144A (en) * 2018-04-11 2018-10-02 北京奇虎科技有限公司 Identity information processing method, device and the computing device of block chain node
CN108647523A (en) * 2018-04-28 2018-10-12 华南理工大学 A kind of electronic identification system based on block chain and deposit card, file access pattern method
CN108712395A (en) * 2018-04-27 2018-10-26 腾讯科技(深圳)有限公司 Account management method, device, server based on block chain and storage medium
CN108712409A (en) * 2018-05-09 2018-10-26 梧州市兴能农业科技有限公司 A kind of e bill transaction system based on privately owned block chain
CN108876363A (en) * 2018-04-18 2018-11-23 北京天德科技有限公司 A kind of cross-border supervision reporting system based on double-strand framework block chain
CN108900528A (en) * 2018-07-24 2018-11-27 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN108898475A (en) * 2018-05-08 2018-11-27 众安信息技术服务有限公司 Alliance's block chain based on encryption attribute realizes credit methods and system
CN108933778A (en) * 2018-05-23 2018-12-04 广州西麦科技股份有限公司 Product trading monitoring method, device and storage medium based on system for cloud computing
CN108964903A (en) * 2018-07-12 2018-12-07 腾讯科技(深圳)有限公司 password storage method and device
CN108989022A (en) * 2018-06-08 2018-12-11 中国科学院计算技术研究所 A kind of smart item shared key method for building up and system based on block chain
CN109005186A (en) * 2018-08-20 2018-12-14 杭州复杂美科技有限公司 A kind of method, system, equipment and the storage medium of user-isolated identity information
CN109064324A (en) * 2018-06-15 2018-12-21 重庆金融资产交易所有限责任公司 Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
CN109146678A (en) * 2018-04-18 2019-01-04 北京天德科技有限公司 A kind of cross-border supervision reporting system based on traditional block chain
CN109190384A (en) * 2018-07-26 2019-01-11 百色学院 A kind of multicenter block chain fuse protection system and method
CN109194487A (en) * 2018-09-13 2019-01-11 全链通有限公司 Construction method and system are traded or communicated to my real name based on block chain
CN109274481A (en) * 2018-08-01 2019-01-25 中国科学院数据与通信保护研究教育中心 A kind of traceable method of data of block chain
CN109361738A (en) * 2018-09-25 2019-02-19 安徽灵图壹智能科技有限公司 A kind of identity authorization system and method based on block chain network
CN109447742A (en) * 2018-10-16 2019-03-08 广东工业大学 A kind of order processing method and relevant apparatus
CN109472601A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 The block chain framework of privacy transaction can be supervised
CN109558742A (en) * 2018-11-16 2019-04-02 海南新软软件有限公司 A kind of effectiveness of information detection method and device based on block chain
CN109697670A (en) * 2018-12-29 2019-04-30 杭州趣链科技有限公司 A kind of public chain information screen method not influencing confidence level
CN109714173A (en) * 2019-01-25 2019-05-03 北京邮电大学 A kind of Internet of Things authentication method and device based on block chain
CN109741482A (en) * 2019-01-08 2019-05-10 京东方科技集团股份有限公司 A kind of information sharing method and device
CN109784918A (en) * 2018-12-15 2019-05-21 深圳壹账通智能科技有限公司 Information measure of supervision, device, equipment and storage medium based on block chain
CN109949882A (en) * 2018-11-15 2019-06-28 陕西医链区块链集团有限公司 A kind of medical treatment block chain data-storage system
CN109981547A (en) * 2017-12-28 2019-07-05 航天信息股份有限公司 A kind of logistics transmission method and device based on block chain
CN109981675A (en) * 2019-04-04 2019-07-05 西安电子科技大学 A kind of identity information guard method of digital identification authentication and encryption attribute
CN109993659A (en) * 2019-04-17 2019-07-09 上海沄界信息科技有限公司 A kind of internet trading system, method and apparatus
CN110071898A (en) * 2018-01-22 2019-07-30 厦门本能管家科技有限公司 A method of removing Spot detection node legitimacy
CN110289951A (en) * 2019-06-03 2019-09-27 杭州电子科技大学 A kind of shared content monitoring method based on Threshold key sharing and block chain
WO2019214623A1 (en) * 2018-05-10 2019-11-14 华为技术有限公司 Authentication method, related equipment, and system
CN110503560A (en) * 2019-09-27 2019-11-26 深圳市网心科技有限公司 Data trade method, data trade apparatus and system based on block chain
CN110570313A (en) * 2019-09-27 2019-12-13 深圳市网心科技有限公司 data transaction method, data transaction device and system based on block chain
CN110611647A (en) * 2019-03-06 2019-12-24 张超 Node joining method and device on block chain system
CN110809000A (en) * 2019-11-12 2020-02-18 中钞信用卡产业发展有限公司杭州区块链技术研究院 Service interaction method, device, equipment and storage medium based on block chain network
CN110827029A (en) * 2018-08-09 2020-02-21 普华云创科技(北京)有限公司 User management method, system and computer readable storage medium based on block chain
CN111010280A (en) * 2019-12-09 2020-04-14 中山大学 Group signature-based construction method for monitorable block chain
CN111106930A (en) * 2018-10-25 2020-05-05 北京国盾量子信息技术有限公司 Block chain network construction method and device and block chain network system
CN111149122A (en) * 2018-05-30 2020-05-12 重庆小雨点小额贷款有限公司 Block chain-based security management method, related device and storage medium
CN111192044A (en) * 2018-11-15 2020-05-22 富邦金融控股股份有限公司 Block chain network system with supervision mechanism and implementation method thereof
CN111277412A (en) * 2020-02-18 2020-06-12 暨南大学 Data security sharing system and method based on block chain key distribution
CN111355578A (en) * 2020-03-16 2020-06-30 北京有链科技有限公司 Public key encryption and decryption method and system with double monitoring parties
CN111586010A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Key distribution method and device
CN111598701A (en) * 2020-05-22 2020-08-28 深圳市网心科技有限公司 Information monitoring method, system, equipment and storage medium
CN111709053A (en) * 2020-06-11 2020-09-25 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
CN111797164A (en) * 2020-06-24 2020-10-20 北京荷月科技有限公司 Cross-chain transaction supervision method and system based on block chain
CN111797427A (en) * 2020-06-04 2020-10-20 中国科学院信息工程研究所 Block chain user identity supervision method and system considering privacy protection
CN111819817A (en) * 2018-03-08 2020-10-23 区块链控股有限公司 Method and system for block chain implementation for bilinear mapping accumulator-based authorization
CN111859444A (en) * 2020-06-12 2020-10-30 中国科学院信息工程研究所 Block chain data supervision method and system based on attribute encryption
CN111898148A (en) * 2018-05-11 2020-11-06 创新先进技术有限公司 Information supervision method and device based on block chain
CN112085502A (en) * 2020-09-09 2020-12-15 江苏大学 Lightweight block chain supervision method and system based on edge calculation
CN112115199A (en) * 2020-09-16 2020-12-22 安徽长泰信息安全服务有限公司 Data management system based on block chain technology
CN112131615A (en) * 2020-02-10 2020-12-25 北京天德科技有限公司 Data storage mechanism supporting supervision
CN112152982A (en) * 2019-06-28 2020-12-29 华为技术有限公司 Processing method, device and medium of block chain information
WO2020259156A1 (en) * 2019-06-28 2020-12-30 深圳前海微众银行股份有限公司 Blockchain-based private transaction method and apparatus
CN109242467B (en) * 2018-09-17 2021-01-01 金蝶软件(中国)有限公司 Block chain-based networking method and device, computer equipment and storage medium
CN112364387A (en) * 2020-10-23 2021-02-12 华南理工大学 Identity authentication method, device, medium and equipment based on block chain network
CN112511309A (en) * 2020-11-19 2021-03-16 从法信息科技有限公司 Method and device for directionally sharing supervision-oriented information on block chain and electronic equipment
CN112532584A (en) * 2020-10-30 2021-03-19 重庆恢恢信息技术有限公司 Construction site information security encryption working method according to block chain network
CN112565412A (en) * 2020-12-03 2021-03-26 重庆新致金服信息技术有限公司 Data transaction method, system and equipment based on block chain
CN112765650A (en) * 2021-01-05 2021-05-07 西安电子科技大学 Attribute-based searchable encryption block chain medical data sharing method
CN112823350A (en) * 2018-10-12 2021-05-18 黑莓有限公司 Method and system for a monocular public key for a public ledger
TWI733125B (en) * 2018-08-14 2021-07-11 開曼群島商創新先進技術有限公司 Multi-party safe calculation method and device, and electronic equipment
CN113206744A (en) * 2021-04-29 2021-08-03 杭州趣链科技有限公司 Cross-chain transaction supervision method, device, equipment and storage medium
CN113507511A (en) * 2021-06-25 2021-10-15 中标慧安信息技术股份有限公司 Internet of things data interaction trace-keeping method and system based on block chain
CN113538042A (en) * 2021-06-30 2021-10-22 杭州电子科技大学 Block chain-based online advertisement click fraud monitoring and preventing method
CN113570373A (en) * 2021-09-23 2021-10-29 北京理工大学 Responsibility pursuing transaction method and system based on block chain
CN114884702A (en) * 2022-04-19 2022-08-09 海南大学 Identity registration method, identity authentication method and identity management system
CN116720839A (en) * 2023-08-07 2023-09-08 成都创一博通科技有限公司 Financial information management method based on blockchain technology and supervision system thereof
WO2024011812A1 (en) * 2022-07-15 2024-01-18 广东浪潮智慧计算技术有限公司 Blockchain-based supervision system and method, device, and medium
CN117540432A (en) * 2024-01-05 2024-02-09 河北数港科技有限公司 Data privacy protection method and system for Internet

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017027900A1 (en) * 2015-08-14 2017-02-23 Identitii Pty Ltd A computer implemented method for processing a financial transaction and a system therefor
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN107171806A (en) * 2017-05-18 2017-09-15 北京航空航天大学 Mobile terminal network cryptographic key negotiation method based on block chain
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017027900A1 (en) * 2015-08-14 2017-02-23 Identitii Pty Ltd A computer implemented method for processing a financial transaction and a system therefor
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN107171806A (en) * 2017-05-18 2017-09-15 北京航空航天大学 Mobile terminal network cryptographic key negotiation method based on block chain
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain

Cited By (106)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981547A (en) * 2017-12-28 2019-07-05 航天信息股份有限公司 A kind of logistics transmission method and device based on block chain
CN109981547B (en) * 2017-12-28 2022-06-07 航天信息股份有限公司 Logistics transmission method and device based on block chain
CN110071898A (en) * 2018-01-22 2019-07-30 厦门本能管家科技有限公司 A method of removing Spot detection node legitimacy
CN110071898B (en) * 2018-01-22 2021-06-04 本无链科技(深圳)有限公司 Method for removing center to detect node validity
CN111819817A (en) * 2018-03-08 2020-10-23 区块链控股有限公司 Method and system for block chain implementation for bilinear mapping accumulator-based authorization
CN108615144A (en) * 2018-04-11 2018-10-02 北京奇虎科技有限公司 Identity information processing method, device and the computing device of block chain node
CN108876363A (en) * 2018-04-18 2018-11-23 北京天德科技有限公司 A kind of cross-border supervision reporting system based on double-strand framework block chain
CN108460598A (en) * 2018-04-18 2018-08-28 北京天德科技有限公司 A kind of real-time automation supervision reporting system based on double-strand framework block chain
CN108520464A (en) * 2018-04-18 2018-09-11 北京天德科技有限公司 A kind of real-time automation supervision reporting system based on traditional block chain
CN109146678B (en) * 2018-04-18 2022-07-05 北京天德科技有限公司 Cross-border supervision reporting system based on traditional block chain
CN109146678A (en) * 2018-04-18 2019-01-04 北京天德科技有限公司 A kind of cross-border supervision reporting system based on traditional block chain
CN108460598B (en) * 2018-04-18 2022-05-10 北京天德科技有限公司 Real-time automatic supervision reporting system based on double-chain architecture block chain
CN108520464B (en) * 2018-04-18 2022-05-10 北京天德科技有限公司 Real-time automatic supervision reporting system based on traditional block chain
CN108712395A (en) * 2018-04-27 2018-10-26 腾讯科技(深圳)有限公司 Account management method, device, server based on block chain and storage medium
CN108647523A (en) * 2018-04-28 2018-10-12 华南理工大学 A kind of electronic identification system based on block chain and deposit card, file access pattern method
CN108898475A (en) * 2018-05-08 2018-11-27 众安信息技术服务有限公司 Alliance's block chain based on encryption attribute realizes credit methods and system
CN108712409A (en) * 2018-05-09 2018-10-26 梧州市兴能农业科技有限公司 A kind of e bill transaction system based on privately owned block chain
CN108712409B (en) * 2018-05-09 2021-05-25 广西创轩科技有限公司 Electronic bill transaction system based on private block chain
US11246033B2 (en) 2018-05-10 2022-02-08 Huawei Technologies Co., Ltd. Authentication method, and related device and system
WO2019214623A1 (en) * 2018-05-10 2019-11-14 华为技术有限公司 Authentication method, related equipment, and system
CN111898148A (en) * 2018-05-11 2020-11-06 创新先进技术有限公司 Information supervision method and device based on block chain
CN108933778A (en) * 2018-05-23 2018-12-04 广州西麦科技股份有限公司 Product trading monitoring method, device and storage medium based on system for cloud computing
CN111149122B (en) * 2018-05-30 2023-10-10 重庆小雨点小额贷款有限公司 Block chain-based security management method, related device and storage medium
CN111149122A (en) * 2018-05-30 2020-05-12 重庆小雨点小额贷款有限公司 Block chain-based security management method, related device and storage medium
CN108989022B (en) * 2018-06-08 2021-11-09 中国科学院计算技术研究所 Intelligent object shared key establishment method and system based on block chain
CN108989022A (en) * 2018-06-08 2018-12-11 中国科学院计算技术研究所 A kind of smart item shared key method for building up and system based on block chain
CN109064324A (en) * 2018-06-15 2018-12-21 重庆金融资产交易所有限责任公司 Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
CN108964903B (en) * 2018-07-12 2021-12-14 腾讯科技(深圳)有限公司 Password storage method and device
CN108964903A (en) * 2018-07-12 2018-12-07 腾讯科技(深圳)有限公司 password storage method and device
CN108900528A (en) * 2018-07-24 2018-11-27 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN108900528B (en) * 2018-07-24 2021-08-31 中国联合网络通信集团有限公司 Block chain real-name authentication method, device, equipment and storage medium
CN109190384A (en) * 2018-07-26 2019-01-11 百色学院 A kind of multicenter block chain fuse protection system and method
CN109274481A (en) * 2018-08-01 2019-01-25 中国科学院数据与通信保护研究教育中心 A kind of traceable method of data of block chain
CN109274481B (en) * 2018-08-01 2020-03-27 中国科学院数据与通信保护研究教育中心 Data traceable method of block chain
CN110827029A (en) * 2018-08-09 2020-02-21 普华云创科技(北京)有限公司 User management method, system and computer readable storage medium based on block chain
TWI733125B (en) * 2018-08-14 2021-07-11 開曼群島商創新先進技術有限公司 Multi-party safe calculation method and device, and electronic equipment
CN109005186B (en) * 2018-08-20 2020-12-11 杭州复杂美科技有限公司 Method, system, equipment and storage medium for isolating user identity information
CN109005186A (en) * 2018-08-20 2018-12-14 杭州复杂美科技有限公司 A kind of method, system, equipment and the storage medium of user-isolated identity information
CN109194487A (en) * 2018-09-13 2019-01-11 全链通有限公司 Construction method and system are traded or communicated to my real name based on block chain
CN109242467B (en) * 2018-09-17 2021-01-01 金蝶软件(中国)有限公司 Block chain-based networking method and device, computer equipment and storage medium
CN109361738A (en) * 2018-09-25 2019-02-19 安徽灵图壹智能科技有限公司 A kind of identity authorization system and method based on block chain network
CN112823350A (en) * 2018-10-12 2021-05-18 黑莓有限公司 Method and system for a monocular public key for a public ledger
CN109447742A (en) * 2018-10-16 2019-03-08 广东工业大学 A kind of order processing method and relevant apparatus
CN111106930A (en) * 2018-10-25 2020-05-05 北京国盾量子信息技术有限公司 Block chain network construction method and device and block chain network system
CN111106930B (en) * 2018-10-25 2023-03-14 北京国盾量子信息技术有限公司 Block chain network construction method and device and block chain network system
CN111192044A (en) * 2018-11-15 2020-05-22 富邦金融控股股份有限公司 Block chain network system with supervision mechanism and implementation method thereof
CN109949882A (en) * 2018-11-15 2019-06-28 陕西医链区块链集团有限公司 A kind of medical treatment block chain data-storage system
CN109558742A (en) * 2018-11-16 2019-04-02 海南新软软件有限公司 A kind of effectiveness of information detection method and device based on block chain
CN109472601A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 The block chain framework of privacy transaction can be supervised
CN109784918A (en) * 2018-12-15 2019-05-21 深圳壹账通智能科技有限公司 Information measure of supervision, device, equipment and storage medium based on block chain
CN109697670A (en) * 2018-12-29 2019-04-30 杭州趣链科技有限公司 A kind of public chain information screen method not influencing confidence level
CN109741482A (en) * 2019-01-08 2019-05-10 京东方科技集团股份有限公司 A kind of information sharing method and device
CN109741482B (en) * 2019-01-08 2022-01-25 京东方科技集团股份有限公司 Information sharing method and device
CN109714173B (en) * 2019-01-25 2020-09-29 北京邮电大学 Block chain-based Internet of things authentication method and device
CN109714173A (en) * 2019-01-25 2019-05-03 北京邮电大学 A kind of Internet of Things authentication method and device based on block chain
CN110611647A (en) * 2019-03-06 2019-12-24 张超 Node joining method and device on block chain system
CN109981675B (en) * 2019-04-04 2021-10-26 西安电子科技大学 Identity information protection method for digital identity authentication and attribute encryption
CN109981675A (en) * 2019-04-04 2019-07-05 西安电子科技大学 A kind of identity information guard method of digital identification authentication and encryption attribute
CN109993659A (en) * 2019-04-17 2019-07-09 上海沄界信息科技有限公司 A kind of internet trading system, method and apparatus
CN110289951A (en) * 2019-06-03 2019-09-27 杭州电子科技大学 A kind of shared content monitoring method based on Threshold key sharing and block chain
CN112152982B (en) * 2019-06-28 2022-01-07 华为技术有限公司 Processing method, device and medium of block chain information
CN112152982A (en) * 2019-06-28 2020-12-29 华为技术有限公司 Processing method, device and medium of block chain information
WO2020259156A1 (en) * 2019-06-28 2020-12-30 深圳前海微众银行股份有限公司 Blockchain-based private transaction method and apparatus
CN110503560A (en) * 2019-09-27 2019-11-26 深圳市网心科技有限公司 Data trade method, data trade apparatus and system based on block chain
CN110570313A (en) * 2019-09-27 2019-12-13 深圳市网心科技有限公司 data transaction method, data transaction device and system based on block chain
CN110809000A (en) * 2019-11-12 2020-02-18 中钞信用卡产业发展有限公司杭州区块链技术研究院 Service interaction method, device, equipment and storage medium based on block chain network
CN111010280B (en) * 2019-12-09 2021-07-30 中山大学 Group signature-based construction method for monitorable block chain
CN111010280A (en) * 2019-12-09 2020-04-14 中山大学 Group signature-based construction method for monitorable block chain
CN112131615A (en) * 2020-02-10 2020-12-25 北京天德科技有限公司 Data storage mechanism supporting supervision
CN111277412A (en) * 2020-02-18 2020-06-12 暨南大学 Data security sharing system and method based on block chain key distribution
CN111277412B (en) * 2020-02-18 2023-03-24 暨南大学 Data security sharing system and method based on block chain key distribution
CN111355578A (en) * 2020-03-16 2020-06-30 北京有链科技有限公司 Public key encryption and decryption method and system with double monitoring parties
CN111586010A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Key distribution method and device
CN111586010B (en) * 2020-04-29 2022-04-01 中国联合网络通信集团有限公司 Key distribution method and device
CN111598701A (en) * 2020-05-22 2020-08-28 深圳市网心科技有限公司 Information monitoring method, system, equipment and storage medium
CN111598701B (en) * 2020-05-22 2023-09-19 深圳市迅雷网络技术有限公司 Information monitoring method, system, equipment and storage medium
CN111797427A (en) * 2020-06-04 2020-10-20 中国科学院信息工程研究所 Block chain user identity supervision method and system considering privacy protection
CN111709053A (en) * 2020-06-11 2020-09-25 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
CN111709053B (en) * 2020-06-11 2024-04-05 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
CN111859444B (en) * 2020-06-12 2022-03-01 中国科学院信息工程研究所 Block chain data supervision method and system based on attribute encryption
CN111859444A (en) * 2020-06-12 2020-10-30 中国科学院信息工程研究所 Block chain data supervision method and system based on attribute encryption
CN111797164A (en) * 2020-06-24 2020-10-20 北京荷月科技有限公司 Cross-chain transaction supervision method and system based on block chain
CN112085502A (en) * 2020-09-09 2020-12-15 江苏大学 Lightweight block chain supervision method and system based on edge calculation
CN112085502B (en) * 2020-09-09 2023-10-13 江苏大学 Lightweight block chain supervision method and system based on edge calculation
CN112115199A (en) * 2020-09-16 2020-12-22 安徽长泰信息安全服务有限公司 Data management system based on block chain technology
CN112364387A (en) * 2020-10-23 2021-02-12 华南理工大学 Identity authentication method, device, medium and equipment based on block chain network
CN112364387B (en) * 2020-10-23 2024-04-02 华南理工大学 Identity authentication method and device based on blockchain network, medium and equipment
CN112532584A (en) * 2020-10-30 2021-03-19 重庆恢恢信息技术有限公司 Construction site information security encryption working method according to block chain network
CN112532584B (en) * 2020-10-30 2022-08-19 重庆恢恢信息技术有限公司 Construction site information security encryption working method according to block chain network
CN112511309A (en) * 2020-11-19 2021-03-16 从法信息科技有限公司 Method and device for directionally sharing supervision-oriented information on block chain and electronic equipment
CN112511309B (en) * 2020-11-19 2022-07-08 从法信息科技有限公司 Method and device for directionally sharing supervision-oriented information on block chain and electronic equipment
CN112565412A (en) * 2020-12-03 2021-03-26 重庆新致金服信息技术有限公司 Data transaction method, system and equipment based on block chain
CN112765650A (en) * 2021-01-05 2021-05-07 西安电子科技大学 Attribute-based searchable encryption block chain medical data sharing method
CN112765650B (en) * 2021-01-05 2023-11-10 西安电子科技大学 Attribute-based searchable encrypted blockchain medical data sharing method
CN113206744B (en) * 2021-04-29 2024-04-02 杭州趣链科技有限公司 Cross-chain transaction supervision method, device, equipment and storage medium
CN113206744A (en) * 2021-04-29 2021-08-03 杭州趣链科技有限公司 Cross-chain transaction supervision method, device, equipment and storage medium
CN113507511A (en) * 2021-06-25 2021-10-15 中标慧安信息技术股份有限公司 Internet of things data interaction trace-keeping method and system based on block chain
CN113538042A (en) * 2021-06-30 2021-10-22 杭州电子科技大学 Block chain-based online advertisement click fraud monitoring and preventing method
CN113538042B (en) * 2021-06-30 2023-09-22 杭州电子科技大学 Block chain-based online advertisement click fraud monitoring and preventing method
CN113570373A (en) * 2021-09-23 2021-10-29 北京理工大学 Responsibility pursuing transaction method and system based on block chain
CN114884702A (en) * 2022-04-19 2022-08-09 海南大学 Identity registration method, identity authentication method and identity management system
WO2024011812A1 (en) * 2022-07-15 2024-01-18 广东浪潮智慧计算技术有限公司 Blockchain-based supervision system and method, device, and medium
CN116720839B (en) * 2023-08-07 2023-10-17 成都创一博通科技有限公司 Financial information management method based on blockchain technology and supervision system thereof
CN116720839A (en) * 2023-08-07 2023-09-08 成都创一博通科技有限公司 Financial information management method based on blockchain technology and supervision system thereof
CN117540432A (en) * 2024-01-05 2024-02-09 河北数港科技有限公司 Data privacy protection method and system for Internet
CN117540432B (en) * 2024-01-05 2024-03-19 河北数港科技有限公司 Data privacy protection method and system for Internet

Also Published As

Publication number Publication date
CN107483198B (en) 2019-11-12

Similar Documents

Publication Publication Date Title
CN107483198B (en) A kind of block catenary system supervised and method
Li et al. A blockchain privacy protection scheme based on ring signature
CN111008836B (en) Privacy security transfer payment method, device, system and storage medium
Xu et al. Enabling the sharing economy: Privacy respecting contract based on public blockchain
CN107864139A (en) A kind of cryptography attribute base access control method and system based on dynamic rules
CN104168108B (en) It is a kind of to reveal the traceable attribute base mixed encryption method of key
CN109417478A (en) Multilink cryptologic block chain
Li et al. Toward privacy and regulation in blockchain-based cryptocurrencies
CN110474893A (en) A kind of isomery is across the close state data safety sharing method of trust domain and system
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
CN113595971A (en) Block chain-based distributed data security sharing method, system and computer readable medium
CN103401839B (en) A kind of many authorization center encryption method based on attribute protection
CN108418783A (en) A kind of protection method of block chain intelligence contract privacy, medium
CN110011781A (en) A kind of homomorphic cryptography method encrypting and support zero-knowledge proof for transaction amount
Yuan et al. Blockchain with accountable CP-ABE: How to effectively protect the electronic documents
CA2593414A1 (en) Identity-based key generating methods and devices
El Defrawy et al. Founding digital currency on secure computation
Li et al. FPPB: A fast and privacy-preserving method based on the permissioned blockchain for fair transactions in sharing economy
Moriyama et al. PUF-based RFID authentication secure and private under memory leakage
CN106059765A (en) Digital virtual asset access control method based on attribute password under cloud environment
John et al. Provably secure data sharing approach for personal health records in cloud storage using session password, data access key, and circular interpolation
Zhou et al. Distributed bitcoin account management
Wu et al. The survey on the development of secure multi-party computing in the blockchain
Luo et al. Accountable data sharing scheme based on blockchain and SGX
CN116527322A (en) Combined credit investigation method and device based on block chain and privacy calculation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant