CN108650073A - A kind of secret protection price competing method based on block chain - Google Patents
A kind of secret protection price competing method based on block chain Download PDFInfo
- Publication number
- CN108650073A CN108650073A CN201810425981.2A CN201810425981A CN108650073A CN 108650073 A CN108650073 A CN 108650073A CN 201810425981 A CN201810425981 A CN 201810425981A CN 108650073 A CN108650073 A CN 108650073A
- Authority
- CN
- China
- Prior art keywords
- block chain
- service side
- user
- secret protection
- promise
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0611—Request for offers or quotes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Abstract
The invention discloses a kind of secret protection price competing methods based on block chain.The present invention includes the following steps:1)Mission bit stream is published in block chain by user;2)Block chain provides the zone of reasonableness bidded, meanwhile, which is pushed to service side;3)Service side is hidden and encrypts to quote data, then will promise to undertake and ciphertext is published in block chain, and whether in the reasonable scope block chain confirms the promise, then carries out size comparison to meeting the corresponding ciphertext of the promise in range, generates final result;4)Public key and puppet ID are issued user by target service side in notice, service side;5)User to truly put be encrypted, sign after be sent to middle target service side;6)Service side verifies the identity of user, and obtains true address and verification information by decryption;Service side reaches true place and completes both sides' authentication by verification information, completes bid process.The present invention realizes the protection of private data.
Description
Technical field
The present invention relates to block chain technical fields, more particularly, to a kind of secret protection price competing method based on block chain.
Background technology
The appearance of web teaching system platform solves the problem of resource is more, and user disperses and improves transaction effect simultaneously well
Rate enables the cost of buyer's least cost, obtains highest value.But existing web teaching system platform is by third
Side safeguards, authenticity and reliability are completely dependent on the third-party institution, whether information disclose, operate whether it is transparent it is credible be people
Concern always.
Block chain is safeguarded as a distributed data base by all nodes jointly, well solves third party's degree of belief
Problem, still, the problem of block chain but causes privacy leakage there is the disclosure due to individual privacy data.Therefore, it is possible to
It is highly important to design a kind of secret protection price competing method based on block chain.
Invention content
In order to make up for the deficiencies of the prior art, the present invention provides a kind of secret protection price competing methods based on block chain.
The technical solution adopted by the present invention is:
A kind of secret protection price competing method based on block chain, includes the following steps:
1)User will be published to comprising personal information, starting point, destination, the mission bit stream that is intended to provide region residing for server
In block chain.
2)Block chain provides the zone of reasonableness bidded according to heuritic approach, meanwhile, which gives birth in new block
At when be pushed to service side.
3)Service side using promise to undertake hide its quote data, and to quote data carry out bit encryption, then will promise to undertake and
Ciphertext is published in block chain, and whether in the reasonable scope block chain confirms the promise, then to meeting the promise phase in range
Corresponding ciphertext carries out size comparison, generates final result.
4)Public key and puppet ID are issued user by target service side in block chain notice, the service side by block chain.
5)True place is encrypted in user, sign after be sent to middle target service side.
6)Middle target service side calculates data to verify the identity of user by chaotic maps, and is obtained really by decrypting
Address and verification information;Service side reaches true place and completes both sides' authentication by verification information, completes this task
Bid process.
The present invention stores and processs mission bit stream using block chain, and is added to quote data using promising to undertake
It is close, without opening the range judgement promised to undertake and can realized to quote data in block chain, protect quotation information privacy;This hair
It is bright that data are calculated to verify the identity of user by chaotic maps by middle target service side, and true address is obtained by decryption
And verification information;Service side reaches true place and completes both sides' authentication by verification information, completes bidding for this task
Process, the above-mentioned setting ensure that only certification both sides could obtain effective authentication information, effectively prevent the attack of opponent.
Preferably, block chain is ether mill block chain.The above-mentioned setting may make the present invention to have programmable functions.
Preferably, step 1)In, block chain first confirms to whether the personal information of the user has been registered, when a
When people's information has been registered, mission bit stream is able to issue on block chain.
Preferably, step 3)In, when final result is not unique, ether mill block chain will obtain the position of specific bidders
Confidence ceases, using manhatton distance calculated minimum as final result.
Preferably, step 4)In, after the bid process for completing this task, the final result bidded is announced on block chain.
It is bid publicly after completing bid process in the present invention as a result, ensure that the publicity of information and the transparency of operation.
Preferably, step 5)In, user is sent to middle target after carrying out ECC encryptions, Schnorr signatures to true place
Service side.The above-mentioned setting ensure that the authenticity and integrity of data.
Preferably, further include step 7), ether mill block chain is encrypted quote data using homomorphic cryptography attribute, with
The form of ciphertext carries out mean analysis and fluction analysis to quote data.The above-mentioned setting can generate with reference to work following quotation
With.
Preferably, further include step 8), ether mill block chain is using reserved parameter to abnormal existing for the activity of bidding or event
Barrier carries out calculation processing.The above-mentioned setting can effectively ensure that the normal operation of bid price scheme.
Compared with prior art, the present invention advantage is:
The present invention has the advantages that web teaching system is efficient, meanwhile, and the protection of private data is realized, invention removes
Tripartite, to ensure that the transparency and confidence level of operation, and analysis and statistical function of the present invention also with quote data,
The analysis result of generation bids with reference value to following, in addition, the fault-tolerant ability of the present invention provides for the activity of bidding
It ensures, increases the robustness of the present invention.
Specific implementation mode
Mission bit stream is included personal information, starting point, terminal, the task letter for being intended to provide region residing for server by user
It ceases, be published in the block chain of ether mill, whether ether mill block chain is noted firstly the need of the personal information of the confirmation user
Volume, after user information confirmation has been registered, mission bit stream is able to issue on the block chain of ether mill.
Ether mill block chain provides the zone of reasonableness bidded according to heuritic approach, meanwhile, the mission bit stream is in new area
Block is pushed to service side when generating, service side participate in oneself it is interested bid, service side hides its quote data using promising to undertake,
And bit encryption is carried out to quote data, then ciphertext and promise are published in the block chain of ether mill, ether mill block first-in-chain(FIC)
Whether in the reasonable scope first confirm the promise, size comparison, production are carried out for meeting the corresponding ciphertext of the promise in range
Raw final result, when final result is not unique, ether mill block chain will obtain the location information of specific bidders, and profit
Use manhatton distance calculated minimum as final result, ether mill block chain and target service side in notifying.
Public key and puppet ID are issued user by middle target service side by ether mill block chain;User carries out true place
It is sent to winning bidder after ECC is encrypted and Schnorr signs, meanwhile, middle target service side calculates data to test by chaotic maps
The identity of user is demonstrate,proved, and true address and verification information are obtained by decryption.Side to be serviced reaches true place and is believed by verifying
Breath completes both sides' authentication, just completes the bid process of this task.The final result bidded also will be in ether mill block chain
On announced.
Then, block chain in ether mill can be encrypted quote data using homomorphic cryptography attribute, in the form of ciphertext pair
Quote data carries out the fluctuation size of the mean value and quotation of average polymerization and variance polymerization analysis quotation, can be produced to following quotation
Raw reference role.Ether mill block chain also can be used reserved parameter and carry out calculation processing to exception existing for the activity of bidding or failure
To ensure the normal operation of bid price scheme.Homomorphic cryptography attribute carries out calculating generated result with ciphertext form in the present invention
Result is identical caused by being re-encrypted with the same calculating of plaintext version progress.
The present invention calculate non-decrypting exposure to quote data and in plain text, has protected the privacy of data well.This
Invention requirement must be in the case where meeting certain number, and bidding can just be normally carried out, the setting that the present invention passes through reserved parameter
Number can be handled extremely, guarantee, which is bidded, to be smoothed out.
Claims (8)
1. a kind of secret protection price competing method based on block chain, it is characterised in that this approach includes the following steps:
1)User will be published to comprising personal information, starting point, destination, the mission bit stream that is intended to provide region residing for server
In block chain;
2)Block chain provides the zone of reasonableness bidded according to heuritic approach, meanwhile, the mission bit stream is when new block generates
It is pushed to service side;
3)Service side, which utilizes, promises to undertake its hiding quote data, and carries out bit encryption to quote data, then will promise and ciphertext
It is published in block chain, whether in the reasonable scope block chain confirms the promise, then corresponding to meeting the promise in range
Ciphertext carry out size comparison, generate final result;
4)Public key and puppet ID are issued user by target service side in block chain notice, the service side by block chain;
5)True place is encrypted in user, sign after be sent to middle target service side;
6)Middle target service side calculates data to verify the identity of user by chaotic maps, and obtains true address by decryption
And verification information;Service side reaches true place and completes both sides' authentication by verification information, completes bidding for this task
Process.
2. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:Step 1)In, area
Block chain is ether mill block chain.
3. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:Step 1)In, area
Block chain first confirms to whether the personal information of the user has been registered, when personal information has been registered, task letter
Breath is able to issue on block chain.
4. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:Step 3)In, when
When final result is not unique, ether mill block chain calculates the location information of obtained bidders minimum using manhatton distance
Value is used as final result.
5. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:Step 4)In, it is complete
After the bid process of this task, the final result bidded is announced on block chain.
6. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:Step 5)In, it uses
Family is sent to middle target service side after carrying out ECC encryptions, Schnorr signatures to true place.
7. the secret protection price competing method according to claim 1 based on block chain, it is characterised in that:It further include step
7), ether mill block chain is encrypted quote data using homomorphic cryptography attribute, to quote data progress in the form of ciphertext
Mean analysis and fluction analysis generate reference role to following quotation.
8. the secret protection price competing method according to claim 1 or claim 7 based on block chain, it is characterised in that:It further include step
Rapid 8), ether mill block chain is using reserved parameter to exception existing for the activity of bidding or failure progress calculation processing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810425981.2A CN108650073B (en) | 2018-05-07 | 2018-05-07 | A kind of secret protection price competing method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810425981.2A CN108650073B (en) | 2018-05-07 | 2018-05-07 | A kind of secret protection price competing method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108650073A true CN108650073A (en) | 2018-10-12 |
CN108650073B CN108650073B (en) | 2019-03-29 |
Family
ID=63749222
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810425981.2A Active CN108650073B (en) | 2018-05-07 | 2018-05-07 | A kind of secret protection price competing method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108650073B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635956A (en) * | 2018-11-02 | 2019-04-16 | 广州裕申电子科技有限公司 | A kind of processing method and system of maintenance of equipment mission bit stream |
CN109635584A (en) * | 2018-11-23 | 2019-04-16 | 浙江工商大学 | A kind of data link privacy calculation method based on block chain |
CN109697670A (en) * | 2018-12-29 | 2019-04-30 | 杭州趣链科技有限公司 | A kind of public chain information screen method not influencing confidence level |
CN109754322A (en) * | 2018-12-27 | 2019-05-14 | 石更箭数据科技(上海)有限公司 | A kind of data service system |
CN109919748A (en) * | 2019-03-06 | 2019-06-21 | 中汇信息技术(上海)有限公司 | A kind of data processing method and system based on block chain |
CN110675265A (en) * | 2019-09-29 | 2020-01-10 | 四川师范大学 | Method for realizing block chain double-key hiding address protocol without temporary key leakage |
CN110830452A (en) * | 2019-10-22 | 2020-02-21 | 全链通有限公司 | Block chain-based electronic bidding method, device and storage medium |
CN110830232A (en) * | 2019-11-07 | 2020-02-21 | 南京远致数据技术有限公司 | Hidden bidding method and system based on homomorphic encryption algorithm |
CN111428267A (en) * | 2020-03-24 | 2020-07-17 | 大唐七台河发电有限责任公司 | Distributed enterprise information management system and method based on information sharing mechanism |
CN112787818A (en) * | 2019-11-07 | 2021-05-11 | 顺天乡大学校产学协力团 | User authentication system and method based on anonymous protocol, and recording medium |
CN113191863A (en) * | 2021-05-21 | 2021-07-30 | 中国联合网络通信集团有限公司 | Bidding method, third party device, sponsor device and bidder device |
CN115170237A (en) * | 2022-07-13 | 2022-10-11 | 深圳微言科技有限责任公司 | Inquiry system and method based on privacy protection |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105141425A (en) * | 2015-08-14 | 2015-12-09 | 重庆邮电大学 | Bidirectional authentication method capable of protecting identity based on chaotic mapping |
CN106897902A (en) * | 2017-02-21 | 2017-06-27 | 中链科技有限公司 | Service transacting method, system and trading server based on block chain technology |
CN107194587A (en) * | 2017-05-24 | 2017-09-22 | 暨南大学 | It is a kind of to be circulated based on block chain and the art work of expert system and identification register method |
CN107240009A (en) * | 2017-08-04 | 2017-10-10 | 北京中广掌视科技有限公司 | A kind of VR remote auction systems based on art work copyright authentication and transaction source tracing method |
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
CN107392743A (en) * | 2017-08-01 | 2017-11-24 | 安徽大学 | A kind of McAfee two way auctions method for secret protection and auction system |
EP3249599A1 (en) * | 2016-05-27 | 2017-11-29 | Sony Corporation | Blockchain-based system, and electronic apparatus and method in the system |
CN107454114A (en) * | 2017-09-29 | 2017-12-08 | 深圳市轱辘车联数据技术有限公司 | A kind of auction bidding method, server and readable storage medium storing program for executing |
CN107483211A (en) * | 2017-08-10 | 2017-12-15 | 北方工业大学 | A kind of personalized k anonymities secret protection motivational techniques based on block chain |
CN107612934A (en) * | 2017-10-24 | 2018-01-19 | 济南浪潮高新科技投资发展有限公司 | A kind of block chain mobile terminal computing system and method based on Secret splitting |
CN107679976A (en) * | 2017-09-28 | 2018-02-09 | 电子科技大学 | A kind of auction system based on block chain |
CN107730384A (en) * | 2017-11-13 | 2018-02-23 | 深圳大学 | Art sales method and server, server end and system based on block chain |
-
2018
- 2018-05-07 CN CN201810425981.2A patent/CN108650073B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105141425A (en) * | 2015-08-14 | 2015-12-09 | 重庆邮电大学 | Bidirectional authentication method capable of protecting identity based on chaotic mapping |
EP3249599A1 (en) * | 2016-05-27 | 2017-11-29 | Sony Corporation | Blockchain-based system, and electronic apparatus and method in the system |
CN106897902A (en) * | 2017-02-21 | 2017-06-27 | 中链科技有限公司 | Service transacting method, system and trading server based on block chain technology |
CN107194587A (en) * | 2017-05-24 | 2017-09-22 | 暨南大学 | It is a kind of to be circulated based on block chain and the art work of expert system and identification register method |
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
CN107392743A (en) * | 2017-08-01 | 2017-11-24 | 安徽大学 | A kind of McAfee two way auctions method for secret protection and auction system |
CN107240009A (en) * | 2017-08-04 | 2017-10-10 | 北京中广掌视科技有限公司 | A kind of VR remote auction systems based on art work copyright authentication and transaction source tracing method |
CN107483211A (en) * | 2017-08-10 | 2017-12-15 | 北方工业大学 | A kind of personalized k anonymities secret protection motivational techniques based on block chain |
CN107679976A (en) * | 2017-09-28 | 2018-02-09 | 电子科技大学 | A kind of auction system based on block chain |
CN107454114A (en) * | 2017-09-29 | 2017-12-08 | 深圳市轱辘车联数据技术有限公司 | A kind of auction bidding method, server and readable storage medium storing program for executing |
CN107612934A (en) * | 2017-10-24 | 2018-01-19 | 济南浪潮高新科技投资发展有限公司 | A kind of block chain mobile terminal computing system and method based on Secret splitting |
CN107730384A (en) * | 2017-11-13 | 2018-02-23 | 深圳大学 | Art sales method and server, server end and system based on block chain |
Non-Patent Citations (1)
Title |
---|
YI-HUI CHEN ETC: "Blockchain based smart contract for bidding system", 《2018 IEEE INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INVENTION》 * |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635956A (en) * | 2018-11-02 | 2019-04-16 | 广州裕申电子科技有限公司 | A kind of processing method and system of maintenance of equipment mission bit stream |
CN109635584A (en) * | 2018-11-23 | 2019-04-16 | 浙江工商大学 | A kind of data link privacy calculation method based on block chain |
CN109754322A (en) * | 2018-12-27 | 2019-05-14 | 石更箭数据科技(上海)有限公司 | A kind of data service system |
CN109697670A (en) * | 2018-12-29 | 2019-04-30 | 杭州趣链科技有限公司 | A kind of public chain information screen method not influencing confidence level |
CN109919748A (en) * | 2019-03-06 | 2019-06-21 | 中汇信息技术(上海)有限公司 | A kind of data processing method and system based on block chain |
CN110675265B (en) * | 2019-09-29 | 2022-07-08 | 四川师范大学 | Method for realizing block chain double-key hiding address protocol without temporary key leakage |
CN110675265A (en) * | 2019-09-29 | 2020-01-10 | 四川师范大学 | Method for realizing block chain double-key hiding address protocol without temporary key leakage |
CN110830452A (en) * | 2019-10-22 | 2020-02-21 | 全链通有限公司 | Block chain-based electronic bidding method, device and storage medium |
CN110830232B (en) * | 2019-11-07 | 2022-07-08 | 北京静宁数据科技有限公司 | Hidden bidding method and system based on homomorphic encryption algorithm |
CN112787818A (en) * | 2019-11-07 | 2021-05-11 | 顺天乡大学校产学协力团 | User authentication system and method based on anonymous protocol, and recording medium |
CN110830232A (en) * | 2019-11-07 | 2020-02-21 | 南京远致数据技术有限公司 | Hidden bidding method and system based on homomorphic encryption algorithm |
CN112787818B (en) * | 2019-11-07 | 2023-09-26 | 顺天乡大学校产学协力团 | User authentication system and method based on anonymous protocol, and recording medium |
CN111428267A (en) * | 2020-03-24 | 2020-07-17 | 大唐七台河发电有限责任公司 | Distributed enterprise information management system and method based on information sharing mechanism |
CN113191863A (en) * | 2021-05-21 | 2021-07-30 | 中国联合网络通信集团有限公司 | Bidding method, third party device, sponsor device and bidder device |
CN113191863B (en) * | 2021-05-21 | 2023-06-23 | 中国联合网络通信集团有限公司 | Bid method, third party device, bid issuing party device and bid issuing party device |
CN115170237A (en) * | 2022-07-13 | 2022-10-11 | 深圳微言科技有限责任公司 | Inquiry system and method based on privacy protection |
Also Published As
Publication number | Publication date |
---|---|
CN108650073B (en) | 2019-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108650073B (en) | A kind of secret protection price competing method based on block chain | |
CN109347878B (en) | Decentralized data verification and data security transaction system and method | |
CN110458554B (en) | Identity-based data rapid transaction method on block chain | |
CN110135819B (en) | Block chain-based third-party trusted data transaction system and method | |
CN104463567B (en) | A kind of secure electronic transaction method and system | |
CN101170407B (en) | A method for securely generating secret key pair and transmitting public key or certificate application file | |
CN108650077B (en) | Block chain based information transmission method, terminal, equipment and readable storage medium | |
CN107657553A (en) | A kind of electronic contract generation method based on alliance's chain, information anti-fake method of tracing to the source | |
DE112018002942T5 (en) | Process and system for data protection-preserving social media advertising | |
EP3376708B1 (en) | Anonymous communication system and method for subscribing to said communication system | |
CN109889504A (en) | Decentralization data access rights method of commerce and system | |
AU2007286004B2 (en) | Compliance assessment reporting service | |
CA2774155A1 (en) | Auction verification | |
Gupta et al. | Role of multiple encryption in secure electronic transaction | |
CN110414193A (en) | A kind of safe encryption method and system of the close PDF document E-seal of state | |
CN103714455A (en) | Personal information protection method for C2C electronic trading platform | |
CN107277000A (en) | A kind of electronic certificate method for managing security and system | |
CN112801785A (en) | Fair data transaction method and device based on block chain intelligent contract | |
CN113657978A (en) | Distributed energy auction method and system based on block chain and privacy protection | |
CN113468570A (en) | Private data sharing method based on intelligent contract | |
CN116545773A (en) | Method, medium and electronic equipment for processing privacy data | |
Wang et al. | Anonymity and security in continuous double auctions for Internet retails market | |
CN113783690B (en) | Authentication-based bidding method and device | |
Parkes et al. | Achieving trust without disclosure: Dark pools and a role for secrecy-preserving verification | |
CN112116414A (en) | Auction type safe nearest neighbor target base source searching system and method supporting range verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |