CN108650073A - A kind of secret protection price competing method based on block chain - Google Patents

A kind of secret protection price competing method based on block chain Download PDF

Info

Publication number
CN108650073A
CN108650073A CN201810425981.2A CN201810425981A CN108650073A CN 108650073 A CN108650073 A CN 108650073A CN 201810425981 A CN201810425981 A CN 201810425981A CN 108650073 A CN108650073 A CN 108650073A
Authority
CN
China
Prior art keywords
block chain
service side
user
secret protection
promise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810425981.2A
Other languages
Chinese (zh)
Other versions
CN108650073B (en
Inventor
韩嵩
张健
杨柏林
谢满德
赵帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Gongshang University
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN201810425981.2A priority Critical patent/CN108650073B/en
Publication of CN108650073A publication Critical patent/CN108650073A/en
Application granted granted Critical
Publication of CN108650073B publication Critical patent/CN108650073B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0611Request for offers or quotes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Abstract

The invention discloses a kind of secret protection price competing methods based on block chain.The present invention includes the following steps:1)Mission bit stream is published in block chain by user;2)Block chain provides the zone of reasonableness bidded, meanwhile, which is pushed to service side;3)Service side is hidden and encrypts to quote data, then will promise to undertake and ciphertext is published in block chain, and whether in the reasonable scope block chain confirms the promise, then carries out size comparison to meeting the corresponding ciphertext of the promise in range, generates final result;4)Public key and puppet ID are issued user by target service side in notice, service side;5)User to truly put be encrypted, sign after be sent to middle target service side;6)Service side verifies the identity of user, and obtains true address and verification information by decryption;Service side reaches true place and completes both sides' authentication by verification information, completes bid process.The present invention realizes the protection of private data.

Description

A kind of secret protection price competing method based on block chain
Technical field
The present invention relates to block chain technical fields, more particularly, to a kind of secret protection price competing method based on block chain.
Background technology
The appearance of web teaching system platform solves the problem of resource is more, and user disperses and improves transaction effect simultaneously well Rate enables the cost of buyer's least cost, obtains highest value.But existing web teaching system platform is by third Side safeguards, authenticity and reliability are completely dependent on the third-party institution, whether information disclose, operate whether it is transparent it is credible be people Concern always.
Block chain is safeguarded as a distributed data base by all nodes jointly, well solves third party's degree of belief Problem, still, the problem of block chain but causes privacy leakage there is the disclosure due to individual privacy data.Therefore, it is possible to It is highly important to design a kind of secret protection price competing method based on block chain.
Invention content
In order to make up for the deficiencies of the prior art, the present invention provides a kind of secret protection price competing methods based on block chain.
The technical solution adopted by the present invention is:
A kind of secret protection price competing method based on block chain, includes the following steps:
1)User will be published to comprising personal information, starting point, destination, the mission bit stream that is intended to provide region residing for server In block chain.
2)Block chain provides the zone of reasonableness bidded according to heuritic approach, meanwhile, which gives birth in new block At when be pushed to service side.
3)Service side using promise to undertake hide its quote data, and to quote data carry out bit encryption, then will promise to undertake and Ciphertext is published in block chain, and whether in the reasonable scope block chain confirms the promise, then to meeting the promise phase in range Corresponding ciphertext carries out size comparison, generates final result.
4)Public key and puppet ID are issued user by target service side in block chain notice, the service side by block chain.
5)True place is encrypted in user, sign after be sent to middle target service side.
6)Middle target service side calculates data to verify the identity of user by chaotic maps, and is obtained really by decrypting Address and verification information;Service side reaches true place and completes both sides' authentication by verification information, completes this task Bid process.
The present invention stores and processs mission bit stream using block chain, and is added to quote data using promising to undertake It is close, without opening the range judgement promised to undertake and can realized to quote data in block chain, protect quotation information privacy;This hair It is bright that data are calculated to verify the identity of user by chaotic maps by middle target service side, and true address is obtained by decryption And verification information;Service side reaches true place and completes both sides' authentication by verification information, completes bidding for this task Process, the above-mentioned setting ensure that only certification both sides could obtain effective authentication information, effectively prevent the attack of opponent.
Preferably, block chain is ether mill block chain.The above-mentioned setting may make the present invention to have programmable functions.
Preferably, step 1)In, block chain first confirms to whether the personal information of the user has been registered, when a When people's information has been registered, mission bit stream is able to issue on block chain.
Preferably, step 3)In, when final result is not unique, ether mill block chain will obtain the position of specific bidders Confidence ceases, using manhatton distance calculated minimum as final result.
Preferably, step 4)In, after the bid process for completing this task, the final result bidded is announced on block chain. It is bid publicly after completing bid process in the present invention as a result, ensure that the publicity of information and the transparency of operation.
Preferably, step 5)In, user is sent to middle target after carrying out ECC encryptions, Schnorr signatures to true place Service side.The above-mentioned setting ensure that the authenticity and integrity of data.
Preferably, further include step 7), ether mill block chain is encrypted quote data using homomorphic cryptography attribute, with The form of ciphertext carries out mean analysis and fluction analysis to quote data.The above-mentioned setting can generate with reference to work following quotation With.
Preferably, further include step 8), ether mill block chain is using reserved parameter to abnormal existing for the activity of bidding or event Barrier carries out calculation processing.The above-mentioned setting can effectively ensure that the normal operation of bid price scheme.
Compared with prior art, the present invention advantage is:
The present invention has the advantages that web teaching system is efficient, meanwhile, and the protection of private data is realized, invention removes Tripartite, to ensure that the transparency and confidence level of operation, and analysis and statistical function of the present invention also with quote data, The analysis result of generation bids with reference value to following, in addition, the fault-tolerant ability of the present invention provides for the activity of bidding It ensures, increases the robustness of the present invention.
Specific implementation mode
Mission bit stream is included personal information, starting point, terminal, the task letter for being intended to provide region residing for server by user It ceases, be published in the block chain of ether mill, whether ether mill block chain is noted firstly the need of the personal information of the confirmation user Volume, after user information confirmation has been registered, mission bit stream is able to issue on the block chain of ether mill.
Ether mill block chain provides the zone of reasonableness bidded according to heuritic approach, meanwhile, the mission bit stream is in new area Block is pushed to service side when generating, service side participate in oneself it is interested bid, service side hides its quote data using promising to undertake, And bit encryption is carried out to quote data, then ciphertext and promise are published in the block chain of ether mill, ether mill block first-in-chain(FIC) Whether in the reasonable scope first confirm the promise, size comparison, production are carried out for meeting the corresponding ciphertext of the promise in range Raw final result, when final result is not unique, ether mill block chain will obtain the location information of specific bidders, and profit Use manhatton distance calculated minimum as final result, ether mill block chain and target service side in notifying.
Public key and puppet ID are issued user by middle target service side by ether mill block chain;User carries out true place It is sent to winning bidder after ECC is encrypted and Schnorr signs, meanwhile, middle target service side calculates data to test by chaotic maps The identity of user is demonstrate,proved, and true address and verification information are obtained by decryption.Side to be serviced reaches true place and is believed by verifying Breath completes both sides' authentication, just completes the bid process of this task.The final result bidded also will be in ether mill block chain On announced.
Then, block chain in ether mill can be encrypted quote data using homomorphic cryptography attribute, in the form of ciphertext pair Quote data carries out the fluctuation size of the mean value and quotation of average polymerization and variance polymerization analysis quotation, can be produced to following quotation Raw reference role.Ether mill block chain also can be used reserved parameter and carry out calculation processing to exception existing for the activity of bidding or failure To ensure the normal operation of bid price scheme.Homomorphic cryptography attribute carries out calculating generated result with ciphertext form in the present invention Result is identical caused by being re-encrypted with the same calculating of plaintext version progress.
The present invention calculate non-decrypting exposure to quote data and in plain text, has protected the privacy of data well.This Invention requirement must be in the case where meeting certain number, and bidding can just be normally carried out, the setting that the present invention passes through reserved parameter Number can be handled extremely, guarantee, which is bidded, to be smoothed out.

Claims (8)

1. a kind of secret protection price competing method based on block chain, it is characterised in that this approach includes the following steps:
1)User will be published to comprising personal information, starting point, destination, the mission bit stream that is intended to provide region residing for server In block chain;
2)Block chain provides the zone of reasonableness bidded according to heuritic approach, meanwhile, the mission bit stream is when new block generates It is pushed to service side;
3)Service side, which utilizes, promises to undertake its hiding quote data, and carries out bit encryption to quote data, then will promise and ciphertext It is published in block chain, whether in the reasonable scope block chain confirms the promise, then corresponding to meeting the promise in range Ciphertext carry out size comparison, generate final result;
4)Public key and puppet ID are issued user by target service side in block chain notice, the service side by block chain;
5)True place is encrypted in user, sign after be sent to middle target service side;
6)Middle target service side calculates data to verify the identity of user by chaotic maps, and obtains true address by decryption And verification information;Service side reaches true place and completes both sides' authentication by verification information, completes bidding for this task Process.
2. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:Step 1)In, area Block chain is ether mill block chain.
3. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:Step 1)In, area Block chain first confirms to whether the personal information of the user has been registered, when personal information has been registered, task letter Breath is able to issue on block chain.
4. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:Step 3)In, when When final result is not unique, ether mill block chain calculates the location information of obtained bidders minimum using manhatton distance Value is used as final result.
5. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:Step 4)In, it is complete After the bid process of this task, the final result bidded is announced on block chain.
6. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:Step 5)In, it uses Family is sent to middle target service side after carrying out ECC encryptions, Schnorr signatures to true place.
7. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:It further include step 7), ether mill block chain is encrypted quote data using homomorphic cryptography attribute, to quote data progress in the form of ciphertext Mean analysis and fluction analysis generate reference role to following quotation.
8. the secret protection price competing method according to claim 1 or claim 7 based on block chain, it is characterised in that:It further include step Rapid 8), ether mill block chain is using reserved parameter to exception existing for the activity of bidding or failure progress calculation processing.
CN201810425981.2A 2018-05-07 2018-05-07 A kind of secret protection price competing method based on block chain Active CN108650073B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810425981.2A CN108650073B (en) 2018-05-07 2018-05-07 A kind of secret protection price competing method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810425981.2A CN108650073B (en) 2018-05-07 2018-05-07 A kind of secret protection price competing method based on block chain

Publications (2)

Publication Number Publication Date
CN108650073A true CN108650073A (en) 2018-10-12
CN108650073B CN108650073B (en) 2019-03-29

Family

ID=63749222

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810425981.2A Active CN108650073B (en) 2018-05-07 2018-05-07 A kind of secret protection price competing method based on block chain

Country Status (1)

Country Link
CN (1) CN108650073B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635956A (en) * 2018-11-02 2019-04-16 广州裕申电子科技有限公司 A kind of processing method and system of maintenance of equipment mission bit stream
CN109635584A (en) * 2018-11-23 2019-04-16 浙江工商大学 A kind of data link privacy calculation method based on block chain
CN109697670A (en) * 2018-12-29 2019-04-30 杭州趣链科技有限公司 A kind of public chain information screen method not influencing confidence level
CN109754322A (en) * 2018-12-27 2019-05-14 石更箭数据科技(上海)有限公司 A kind of data service system
CN109919748A (en) * 2019-03-06 2019-06-21 中汇信息技术(上海)有限公司 A kind of data processing method and system based on block chain
CN110675265A (en) * 2019-09-29 2020-01-10 四川师范大学 Method for realizing block chain double-key hiding address protocol without temporary key leakage
CN110830452A (en) * 2019-10-22 2020-02-21 全链通有限公司 Block chain-based electronic bidding method, device and storage medium
CN110830232A (en) * 2019-11-07 2020-02-21 南京远致数据技术有限公司 Hidden bidding method and system based on homomorphic encryption algorithm
CN111428267A (en) * 2020-03-24 2020-07-17 大唐七台河发电有限责任公司 Distributed enterprise information management system and method based on information sharing mechanism
CN112787818A (en) * 2019-11-07 2021-05-11 顺天乡大学校产学协力团 User authentication system and method based on anonymous protocol, and recording medium
CN113191863A (en) * 2021-05-21 2021-07-30 中国联合网络通信集团有限公司 Bidding method, third party device, sponsor device and bidder device
CN115170237A (en) * 2022-07-13 2022-10-11 深圳微言科技有限责任公司 Inquiry system and method based on privacy protection

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141425A (en) * 2015-08-14 2015-12-09 重庆邮电大学 Bidirectional authentication method capable of protecting identity based on chaotic mapping
CN106897902A (en) * 2017-02-21 2017-06-27 中链科技有限公司 Service transacting method, system and trading server based on block chain technology
CN107194587A (en) * 2017-05-24 2017-09-22 暨南大学 It is a kind of to be circulated based on block chain and the art work of expert system and identification register method
CN107240009A (en) * 2017-08-04 2017-10-10 北京中广掌视科技有限公司 A kind of VR remote auction systems based on art work copyright authentication and transaction source tracing method
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN107392743A (en) * 2017-08-01 2017-11-24 安徽大学 A kind of McAfee two way auctions method for secret protection and auction system
EP3249599A1 (en) * 2016-05-27 2017-11-29 Sony Corporation Blockchain-based system, and electronic apparatus and method in the system
CN107454114A (en) * 2017-09-29 2017-12-08 深圳市轱辘车联数据技术有限公司 A kind of auction bidding method, server and readable storage medium storing program for executing
CN107483211A (en) * 2017-08-10 2017-12-15 北方工业大学 A kind of personalized k anonymities secret protection motivational techniques based on block chain
CN107612934A (en) * 2017-10-24 2018-01-19 济南浪潮高新科技投资发展有限公司 A kind of block chain mobile terminal computing system and method based on Secret splitting
CN107679976A (en) * 2017-09-28 2018-02-09 电子科技大学 A kind of auction system based on block chain
CN107730384A (en) * 2017-11-13 2018-02-23 深圳大学 Art sales method and server, server end and system based on block chain

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141425A (en) * 2015-08-14 2015-12-09 重庆邮电大学 Bidirectional authentication method capable of protecting identity based on chaotic mapping
EP3249599A1 (en) * 2016-05-27 2017-11-29 Sony Corporation Blockchain-based system, and electronic apparatus and method in the system
CN106897902A (en) * 2017-02-21 2017-06-27 中链科技有限公司 Service transacting method, system and trading server based on block chain technology
CN107194587A (en) * 2017-05-24 2017-09-22 暨南大学 It is a kind of to be circulated based on block chain and the art work of expert system and identification register method
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN107392743A (en) * 2017-08-01 2017-11-24 安徽大学 A kind of McAfee two way auctions method for secret protection and auction system
CN107240009A (en) * 2017-08-04 2017-10-10 北京中广掌视科技有限公司 A kind of VR remote auction systems based on art work copyright authentication and transaction source tracing method
CN107483211A (en) * 2017-08-10 2017-12-15 北方工业大学 A kind of personalized k anonymities secret protection motivational techniques based on block chain
CN107679976A (en) * 2017-09-28 2018-02-09 电子科技大学 A kind of auction system based on block chain
CN107454114A (en) * 2017-09-29 2017-12-08 深圳市轱辘车联数据技术有限公司 A kind of auction bidding method, server and readable storage medium storing program for executing
CN107612934A (en) * 2017-10-24 2018-01-19 济南浪潮高新科技投资发展有限公司 A kind of block chain mobile terminal computing system and method based on Secret splitting
CN107730384A (en) * 2017-11-13 2018-02-23 深圳大学 Art sales method and server, server end and system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
YI-HUI CHEN ETC: "Blockchain based smart contract for bidding system", 《2018 IEEE INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INVENTION》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635956A (en) * 2018-11-02 2019-04-16 广州裕申电子科技有限公司 A kind of processing method and system of maintenance of equipment mission bit stream
CN109635584A (en) * 2018-11-23 2019-04-16 浙江工商大学 A kind of data link privacy calculation method based on block chain
CN109754322A (en) * 2018-12-27 2019-05-14 石更箭数据科技(上海)有限公司 A kind of data service system
CN109697670A (en) * 2018-12-29 2019-04-30 杭州趣链科技有限公司 A kind of public chain information screen method not influencing confidence level
CN109919748A (en) * 2019-03-06 2019-06-21 中汇信息技术(上海)有限公司 A kind of data processing method and system based on block chain
CN110675265B (en) * 2019-09-29 2022-07-08 四川师范大学 Method for realizing block chain double-key hiding address protocol without temporary key leakage
CN110675265A (en) * 2019-09-29 2020-01-10 四川师范大学 Method for realizing block chain double-key hiding address protocol without temporary key leakage
CN110830452A (en) * 2019-10-22 2020-02-21 全链通有限公司 Block chain-based electronic bidding method, device and storage medium
CN110830232B (en) * 2019-11-07 2022-07-08 北京静宁数据科技有限公司 Hidden bidding method and system based on homomorphic encryption algorithm
CN112787818A (en) * 2019-11-07 2021-05-11 顺天乡大学校产学协力团 User authentication system and method based on anonymous protocol, and recording medium
CN110830232A (en) * 2019-11-07 2020-02-21 南京远致数据技术有限公司 Hidden bidding method and system based on homomorphic encryption algorithm
CN112787818B (en) * 2019-11-07 2023-09-26 顺天乡大学校产学协力团 User authentication system and method based on anonymous protocol, and recording medium
CN111428267A (en) * 2020-03-24 2020-07-17 大唐七台河发电有限责任公司 Distributed enterprise information management system and method based on information sharing mechanism
CN113191863A (en) * 2021-05-21 2021-07-30 中国联合网络通信集团有限公司 Bidding method, third party device, sponsor device and bidder device
CN113191863B (en) * 2021-05-21 2023-06-23 中国联合网络通信集团有限公司 Bid method, third party device, bid issuing party device and bid issuing party device
CN115170237A (en) * 2022-07-13 2022-10-11 深圳微言科技有限责任公司 Inquiry system and method based on privacy protection

Also Published As

Publication number Publication date
CN108650073B (en) 2019-03-29

Similar Documents

Publication Publication Date Title
CN108650073B (en) A kind of secret protection price competing method based on block chain
CN109347878B (en) Decentralized data verification and data security transaction system and method
CN110458554B (en) Identity-based data rapid transaction method on block chain
CN110135819B (en) Block chain-based third-party trusted data transaction system and method
CN104463567B (en) A kind of secure electronic transaction method and system
CN101170407B (en) A method for securely generating secret key pair and transmitting public key or certificate application file
CN108650077B (en) Block chain based information transmission method, terminal, equipment and readable storage medium
CN107657553A (en) A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source
DE112018002942T5 (en) Process and system for data protection-preserving social media advertising
EP3376708B1 (en) Anonymous communication system and method for subscribing to said communication system
CN109889504A (en) Decentralization data access rights method of commerce and system
AU2007286004B2 (en) Compliance assessment reporting service
CA2774155A1 (en) Auction verification
Gupta et al. Role of multiple encryption in secure electronic transaction
CN110414193A (en) A kind of safe encryption method and system of the close PDF document E-seal of state
CN103714455A (en) Personal information protection method for C2C electronic trading platform
CN107277000A (en) A kind of electronic certificate method for managing security and system
CN112801785A (en) Fair data transaction method and device based on block chain intelligent contract
CN113657978A (en) Distributed energy auction method and system based on block chain and privacy protection
CN113468570A (en) Private data sharing method based on intelligent contract
CN116545773A (en) Method, medium and electronic equipment for processing privacy data
Wang et al. Anonymity and security in continuous double auctions for Internet retails market
CN113783690B (en) Authentication-based bidding method and device
Parkes et al. Achieving trust without disclosure: Dark pools and a role for secrecy-preserving verification
CN112116414A (en) Auction type safe nearest neighbor target base source searching system and method supporting range verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant