CN108650077B - Block chain based information transmission method, terminal, equipment and readable storage medium - Google Patents

Block chain based information transmission method, terminal, equipment and readable storage medium Download PDF

Info

Publication number
CN108650077B
CN108650077B CN201810478310.2A CN201810478310A CN108650077B CN 108650077 B CN108650077 B CN 108650077B CN 201810478310 A CN201810478310 A CN 201810478310A CN 108650077 B CN108650077 B CN 108650077B
Authority
CN
China
Prior art keywords
information
terminal
party system
group
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810478310.2A
Other languages
Chinese (zh)
Other versions
CN108650077A (en
Inventor
陈宇杰
石翔
李辉忠
张开翔
范瑞彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN201810478310.2A priority Critical patent/CN108650077B/en
Publication of CN108650077A publication Critical patent/CN108650077A/en
Application granted granted Critical
Publication of CN108650077B publication Critical patent/CN108650077B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information transmission method, a terminal, equipment and a computer readable storage medium based on a block chain, which utilize the characteristics of decentralized and account book sharing of the block chain, and information character strings and information signatures are issued to the block chain by a third-party system in a unified account identity, so that the identity of a user corresponding to a second terminal is not exposed in the block chain, and the information of the user corresponding to the second terminal is not exposed, thereby ensuring the confidentiality of first information, and reducing the communication overhead in the information transmission process and the cost of information transmission through the decentralized characteristic of the block chain.

Description

Block chain based information transmission method, terminal, equipment and readable storage medium
Technical Field
The present invention relates to the field of block chain technologies, and in particular, to a block chain-based information transmission method, a terminal, a device, and a readable storage medium.
Background
In the traditional information transmission system, the confidentiality of information cannot be ensured in the information transmission process, particularly in the information transaction process, and the confidentiality of information cannot be ensured by using a secret sharing technology among different users in time, but false information cannot be improved by preventing all users from being combined. For example, the conventional auction system is based on a centralized model, and mainly includes four roles of an item seller, an item, an auctioneer and a bidder, wherein the item seller issues second information and entrusts a third party organization (auctioneer) to auction a commodity, the bidder joins the auction system and bids on the item, and the item finally belongs to the highest bidder. In an anonymous auction scene, the information of bidders is kept secret from the outside, and only the information of bidders is published, so that the privacy of bidders is guaranteed. In order to prevent dishonest auctioneers and bidders from jointly cheating article sellers, the distributed auction system has come into existence, and a plurality of auctioneers are arranged in the distributed auction system, and the auctioneers use a secret sharing technology to commonly decrypt bidding information issued by the bidders.
In summary, the existing distributed information transmission system has high cost and cannot ensure the confidentiality of information.
Disclosure of Invention
The invention mainly aims to provide an information transmission method, a terminal, equipment and a readable storage medium based on a block chain, and aims to solve the technical problems that the existing distributed information transmission system is high in cost and cannot ensure the confidentiality of information.
In order to achieve the above object, the present invention provides an information transmission method based on a block chain, where the information transmission method based on a block chain includes the steps of:
after receiving a joining request which is sent by a second terminal and joins a preset information group, calling a group signature algorithm to generate a second terminal private key for the second terminal and acquiring a first terminal public key sent by a first terminal;
sending the second terminal private key and the first terminal public key to the second terminal, so that the second terminal generates an information signature and an information character string according to the acquired first information, the received second terminal private key and the received first terminal public key, and returns the information signature and the information character string;
after receiving the information signature and the information character string, writing the information signature and the information character string into a block chain;
the step of generating an information signature and an information character string by the second terminal according to the acquired first information, the received second terminal private key and the received first terminal public key comprises the following steps:
the second terminal acquires first information and calculates a first hash value of the first information;
the second terminal acquires a preset encryption key, encrypts the first information according to the encryption key, generates a ciphertext corresponding to the first information, and calculates a second hash value of the ciphertext;
encrypting the encryption key by using the first terminal public key to obtain the encrypted encryption key, and calculating a third hash value of the encrypted encryption key;
splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information character string;
and acquiring a prestored group public key from the block chain, and generating an information signature according to the second terminal private key, the group public key and the information character string based on a group signature algorithm.
Preferably, before the step of calling a group signature algorithm to generate a second terminal private key for the second terminal and obtain a first terminal public key sent by the first terminal after receiving a join request sent by the second terminal to join a preset information group, the method further includes:
after second information and a first terminal public key sent by a first terminal are received, an information group is created, and a group signature algorithm is called to generate a group public key and a group owner private key of the information group;
and writing the second information and the group public key into the block chain, and returning the group owner private key to the first terminal.
Preferably, before the step of sending the second terminal private key and the first terminal public key to the second terminal so that the second terminal generates an information signature and an information character string according to the obtained first information, the received second terminal private key and the received first terminal public key, and returns the information signature and the information character string, the method further includes:
judging whether the value of the article corresponding to the second information is smaller than or equal to a preset value or not;
if the value of the article is less than or equal to the preset value, executing the step of sending the second terminal private key and the first terminal public key to the second terminal;
if the value of the article is greater than the preset value, checking whether a user corresponding to the second terminal meets a preset condition;
and if the user corresponding to the second terminal meets the bidding condition, executing the step of sending the second terminal private key and the first terminal public key to the second terminal.
Preferably, the step of creating an information group after receiving the second information and the first terminal public key sent by the first terminal, and invoking a group signature algorithm to generate a group public key and a group owner private key of the information group includes:
after second information and a first terminal public key sent by a first terminal are received, whether an article corresponding to the second information is legal or not is detected according to the second information;
and if the article is determined to be legal, creating an information group, and calling a group signature algorithm to generate a group public key and a group owner private key of the information group.
Preferably, after the step of detecting whether the article corresponding to the second information is legal according to the second information after receiving the second information and the first terminal public key sent by the first terminal, the method further includes:
and if the article is determined to be illegal, generating prompt information, and sending the prompt information to the first terminal so that the first terminal prompts the corresponding user that the article is illegal according to the prompt information.
Preferably, after the step of writing the information signature and the information character string into the block chain after receiving the information signature and the information character string, the method further includes:
and after receiving the character string identification which is sent by the first terminal and used for acquiring the identity information, the first information and the information character string corresponding to the article user corresponding to the second information, writing the identity information, the first information and the character string identification which are used for acquiring the article user corresponding to the second information into the block chain.
Preferably, after the step of writing the information signature and the information character string into the block chain after receiving the information signature and the information character string, the method further includes:
after receiving a tracking request for tracking illegal first information sent by a supervision terminal, sending the tracking request to the first terminal, so that the first terminal determines an illegal information group corresponding to the illegal first information according to the tracking request, and determines a user corresponding to the illegal first information according to a group owner private key of the illegal information group.
In addition, in order to achieve the above object, the present invention further provides an information transmission method based on a block chain, where the information transmission method based on the block chain includes the following steps:
after a second terminal receives a second terminal private key and a first terminal public key of a first terminal, which are sent by a third-party system, first information and a preset encryption key are obtained;
calculating a first hash value of the first information, encrypting the first information according to the encryption key, generating a ciphertext corresponding to the first information, and calculating a second hash value of the ciphertext;
encrypting the encryption key by using the first terminal public key to obtain the encrypted encryption key, and calculating a third hash value of the encrypted encryption key;
splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information character string;
and acquiring a prestored group public key from a block chain, generating an information signature according to the second terminal private key, the group public key and the information character string based on a group signature algorithm, and sending the information signature and the information character string to the third-party system so that the third-party system can write the information signature and the information character string into the block chain.
Further, before the step of obtaining the first information and the preset encryption key after the second terminal receives the second terminal private key and the second public key sent by the first terminal, the method further includes:
and when the second terminal detects a join request for joining the information group created by the third-party system, the join request is sent to the third-party system so that the third-party system can call a group signature algorithm to generate a second terminal private key, and the second terminal private key and the first terminal public key sent by the first terminal are returned.
In addition, to achieve the above object, the present invention also provides a block chain based information transmission terminal, including:
the acquisition module is used for acquiring first information and a preset encryption key after receiving a second terminal private key and a first terminal public key of a first terminal which are sent by a third-party system;
the calculation module is used for calculating a first hash value of the first information;
the encryption module is used for encrypting the first information according to the encryption key and generating a ciphertext corresponding to the first information;
the calculation module is further used for calculating a second hash value of the ciphertext;
the encryption module is further configured to encrypt the encryption key by using the first terminal public key to obtain the encrypted encryption key;
the computing module is further configured to compute a third hash value of the encrypted encryption key;
the splicing module is used for splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information character string;
the generating module is used for acquiring a prestored group public key from the block chain and generating an information signature according to the second terminal private key, the group public key and the information character string based on a group signature algorithm;
and the sending module is used for sending the information signature and the information character string to the third-party system so that the third-party system can write the information signature and the information character string into the block chain.
In addition, to achieve the above object, the present invention further provides a blockchain-based information transmission apparatus, which includes a memory, a processor, and a blockchain-based information transmission program stored on the memory and executable on the processor, wherein the blockchain-based information transmission program, when executed by the processor, implements the steps of the blockchain-based information transmission method as described above.
Further, to achieve the above object, the present invention also provides a computer readable storage medium having stored thereon a block chain based information transmission program, which when executed by a processor, implements the steps of the block chain based information transmission method as described above.
According to the invention, the characteristics of decentralized of the block chain and account book sharing are utilized, and the information character string and the information signature are issued to the block chain by a third-party system in a unified account identity, so that the identity of the user corresponding to the second terminal is not exposed in the block chain, and the information of the user corresponding to the second terminal is not exposed, thereby ensuring the confidentiality of the first information, and through the decentralized characteristic of the block chain, the communication overhead in the information transmission process is reduced, and the cost of information transmission is reduced.
Drawings
FIG. 1 is a schematic diagram of a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a block chain-based information transmission method according to a first embodiment of the present invention;
fig. 3 is a flowchart illustrating a block chain-based information transmission method according to a second embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, fig. 1 is a schematic structural diagram of a hardware operating environment according to an embodiment of the present invention.
It should be noted that fig. 1 is a schematic structural diagram of a hardware operating environment of an information transmission device based on a block chain. The information transmission device based on the block chain in the embodiment of the invention can be a terminal device such as a PC, a portable computer and the like.
As shown in fig. 1, the block chain-based information transmission apparatus may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the blockchain based information transfer device structure shown in fig. 1 does not constitute a limitation of the blockchain based information transfer device and may include more or less components than those shown, or combine some components, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and an information transfer program based on a block chain. The operating system is a program for managing and controlling hardware and software resources of the information transmission device based on the block chain, and supports the operation of the information transmission program based on the block chain and other software or programs.
In the information transmission apparatus based on the block chain shown in fig. 1, the user interface 1003 is mainly used to receive requests, data, and the like sent by the first terminal, the second terminal, and the supervision terminal; the network interface 1004 is mainly used for connecting a background server and performing data communication with the background server; and the processor 1001 may be configured to call the blockchain-based information transfer program stored in the memory 1005, and perform the following operations:
after receiving a joining request which is sent by a second terminal and joins a preset information group, calling a group signature algorithm to generate a second terminal private key for the second terminal and acquiring a first terminal public key sent by a first terminal;
sending the second terminal private key and the first terminal public key to the second terminal, so that the second terminal generates an information signature and an information character string according to the acquired first information, the received second terminal private key and the received first terminal public key, and returns the information signature and the information character string;
after receiving the information signature and the information character string, writing the information signature and the information character string into a block chain;
the step of generating an information signature and an information character string by the second terminal according to the acquired first information, the received second terminal private key and the received first terminal public key comprises the following steps:
the second terminal acquires first information and calculates a first hash value of the first information;
the second terminal acquires a preset encryption key, encrypts the first information according to the encryption key, generates a ciphertext corresponding to the first information, and calculates a second hash value of the ciphertext;
encrypting the encryption key by using the first terminal public key to obtain the encrypted encryption key, and calculating a third hash value of the encrypted encryption key;
splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information character string;
and acquiring a prestored group public key from the block chain, and generating an information signature according to the second terminal private key, the group public key and the information character string based on a group signature algorithm.
Further, before the step of calling a group signature algorithm to generate a second terminal private key for the second terminal and obtain a first terminal public key sent by the first terminal after receiving a join request sent by the second terminal to join a preset information group, the processor 1001 may be further configured to call an information transmission program based on a block chain stored in the memory 1005, and execute the following steps:
after second information and a first terminal public key sent by a first terminal are received, an information group is created, and a group signature algorithm is called to generate a group public key and a group owner private key of the information group;
and writing the second information and the group public key into the block chain, and returning the group owner private key to the first terminal.
Further, before the step of sending the second terminal private key and the first terminal public key to the second terminal so that the second terminal generates an information signature and an information string according to the obtained first information, the received second terminal private key and the first terminal public key, and returns the information signature and the information string, the processor 1001 may be further configured to invoke an information transmission program based on a block chain stored in the memory 1005, and execute the following steps:
judging whether the value of the article corresponding to the second information is smaller than or equal to a preset value or not;
if the value of the article is less than or equal to the preset value, executing the step of sending the second terminal private key and the first terminal public key to the second terminal;
if the value of the article is greater than the preset value, checking whether a user corresponding to the second terminal meets a preset condition;
and if the user corresponding to the second terminal meets the bidding condition, executing the step of sending the second terminal private key and the first terminal public key to the second terminal.
Further, the step of creating an information group after receiving the second information and the first terminal public key sent by the first terminal, and invoking a group signature algorithm to generate a group public key and a group owner private key of the information group includes:
after second information and a first terminal public key sent by a first terminal are received, whether an article corresponding to the second information is legal or not is detected according to the second information;
and if the article is determined to be legal, creating an information group, and calling a group signature algorithm to generate a group public key and a group owner private key of the information group.
Further, after the step of detecting whether the article corresponding to the second information is legal according to the second information after receiving the second information and the public key of the first terminal sent by the first terminal, the processor 1001 may be further configured to call an information transmission program based on a block chain stored in the memory 1005, and execute the following steps:
and if the article is determined to be illegal, generating prompt information, and sending the prompt information to the first terminal so that the first terminal prompts the corresponding user that the article is illegal according to the prompt information.
Further, after the step of writing the information signature and the information string into the block chain after receiving the information signature and the information string, the processor 1001 may be further configured to call a block chain-based information transmission program stored in the memory 1005, and perform the following steps:
and after receiving the character string identification which is sent by the first terminal and used for acquiring the identity information, the first information and the information character string corresponding to the article user corresponding to the second information, writing the identity information, the first information and the character string identification which are used for acquiring the article user corresponding to the second information into the block chain.
Further, after the step of writing the information signature and the information string into the block chain after receiving the information signature and the information string, the processor 1001 may be further configured to call a block chain-based information transmission program stored in the memory 1005, and perform the following steps:
after receiving a tracking request for tracking illegal first information sent by a supervision terminal, sending the tracking request to the first terminal, so that the first terminal determines an illegal information group corresponding to the illegal first information according to the tracking request, and determines a user corresponding to the illegal first information according to a group owner private key of the illegal information group.
Based on the above structure, various embodiments of the information transmission method based on the block chain are proposed. The information transmission method based on the block chain is applied to information transmission equipment based on the block chain, and the information transmission equipment, the first terminal, the second terminal and the supervision terminal based on the block chain can be terminal equipment such as a PC (personal computer), a portable computer and the like. For simplicity of description, in the following embodiments of the block chain-based information transmission method, the body is executed in a third-party system (with respect to the first terminal and the second terminal).
Referring to fig. 2, fig. 2 is a flowchart illustrating a block chain-based information transmission method according to a first embodiment of the present invention.
While a logical order is shown in the flow chart, in some cases, the steps shown or described may be performed in a different order than that shown.
The terms used in this application are explained below:
(1) the organization members refer to organs, careers, enterprises, groups and other units established by law, nodes in the block chain are owned by the organization members, and the organization members can be positioned according to the node information in the block chain.
(2) The node refers to a network node participating in a blockchain network for transaction and data exchange, each independent organization member can have one or more transaction nodes, and each transaction node is a combination of a group of physical networks, computers, blockchain application software and databases. The nodes are connected with each other through a TCP/IP protocol.
(3) The group signature algorithm (BBS04) is based on bilinear cryptography, and is an algorithm for allowing members in a group to carry out signature by using a private key of the group members, and other people can obtain the group where the signature is located through the group signature but cannot track specific signer information; in the group signature algorithm, a group administrator can expose signer information if necessary, and the group signature algorithm has the following characteristics: (ii) completeness and completeness: valid signatures always pass verification, and invalid signatures always fail verification; unforgeable (Unforgeable): only members within the group can generate a valid signature; anonymity (Anonymity): except the group administrator, other members cannot acquire the signer information according to the signature information; traceability (Traceability): the group administrator may reveal signer information if necessary; no relevance (Unlinkability): given two or more pieces of signature information, whether the signatures are generated by the same signer cannot be judged; sixthly, joint fraud resistance (Unforgeable tracing verification): several members of the group cannot collude to construct a valid signature that makes the group owner unable to reveal the identity of the signer. The group signature algorithm comprises the following main processes: generating a group: generating a group public key and issuing a group owner private key for a group administrator; ② group members join the group: generating a group member private key for the group member by using a group owner private key and a group public key of a group administrator; generating a group signature: the group member generates a group signature by using a group member private key; fourthly, verifying the signature: the other people verify the signature through the group public key, at the moment, the group to which the group signature belongs can be positioned through the group public key, and the specific signer information cannot be acquired; group administrator reveals signer certificate: the group administrator acquires the signer certificate through the private key of the group member and reveals the identity information of the signer (namely, the organization member).
(4) Digital envelope technology:
the digital envelope technology simultaneously utilizes the safety of an asymmetric encryption algorithm and the high-performance characteristics of a symmetric encryption algorithm, wherein the asymmetric encryption algorithm is used for key exchange, the symmetric encryption algorithm is used for guaranteeing the confidentiality of Data, taking the example that a sending end Alice sends Data to a client Bob as an example, the digital envelope technology mainly comprises the following processes:
firstly, an Alice end generates a string of random symmetric keys DEK, and encrypts Data by adopting a symmetric encryption algorithm to generate ciphertext Cry _ Data;
secondly, the Alice terminal encrypts the symmetric Key DEK by using the public Key Puk _ b of the Bob terminal to generate a Cry _ Key;
the Alice terminal generates signatures Sig (Cry _ Data & & Cry _ Key) of Cry _ Data and Cry _ Key by using a private Key Prk _ a of the Alice terminal through a group signature algorithm;
fourthly, the Alice terminal sends [ Cry _ Data, Cry _ Key and Sig (Cry _ Data & Cry _ Key) ] to the Bob terminal;
after receiving the Data, the Bob end firstly verifies the validity of a signature Sig (Cry _ Data & Cry _ Key) by using an Alice end public Key Pub _ a, and if the signature is verified to be valid, decrypts the Cry _ Key by using a Bob end private Key Prk _ b to obtain a symmetric Key DEK;
after the Bob terminal acquires the symmetric key DEK, the Cry _ Data is decrypted to acquire plaintext Data.
In summary, through the digital envelope technology, the Alice terminal and the Bob terminal (both communication parties) can exchange secret data on an insecure channel.
The block chain-based information transmission method comprises the following steps:
step S10, after receiving a join request for joining a preset information group sent by a second terminal, calling a group signature algorithm to generate a second terminal private key for the second terminal, and acquiring a first terminal public key sent by a first terminal.
When the user corresponding to the second terminal inquires the second information in the block chain and decides to participate in acquiring the article corresponding to the second information, for example, purchasing the article corresponding to the second information or participating in auction of the article corresponding to the second information, the user corresponding to the second terminal can trigger a join request for joining the information group corresponding to the article to be acquired through the second terminal. And when the second terminal detects the joining request for joining the information group, the second terminal sends the joining request to the third-party system. And after the third-party system receives the joining request sent by the second terminal, the third-party system generates a second terminal private key for a second terminal corresponding user corresponding to the second terminal and acquires a first terminal public key sent by the first terminal.
Specifically, after the third-party system receives a join request for joining an information group sent by the second terminal, the third-party system calls a group signature algorithm, and the group owner private key and the group public key are used as input parameters of the group signature algorithm to obtain a second terminal private key corresponding to the group owner private key, namely a second terminal private key of a user corresponding to the second terminal. And after the third-party system obtains the second terminal private key, the second terminal private key and the first terminal public key are sent to the second terminal through a secure channel.
The first information is information input by a user corresponding to the second terminal in the second terminal, and the first information may be any information that needs to be transmitted by the user corresponding to the second terminal. In the scenario of article sale or auction, the first information is article information, including but not limited to article price, article sale time or auction time, and article name. Further, the first information may also include an ID (identification) of the second terminal. It will be appreciated that the second terminal may be uniquely identified by its ID. It should be noted that the selling time or auction time of the article may be specified to a certain day, or may be specified to a specific time, such as to an hour, or a minute, etc.
Step S20, sending the second terminal private key and the first terminal public key to the second terminal, so that the second terminal generates an information signature and an information string according to the obtained first information, the received second terminal private key and the received first terminal public key, and returns the information signature and the information string.
And the third-party system sends the second terminal private key and the first terminal public key sent by the first terminal to the second terminal. And after the second terminal receives the second terminal private key and the first terminal public key, the second terminal acquires the group public key from the block chain and acquires the first information. And the second terminal generates an information character string according to the first terminal public key and the first information and generates an information signature according to the group public key, the second terminal private key and the information character string. And after the second terminal generates the information signature and the information character string, the second terminal sends the information signature and the information character string to a third-party system. It should be noted that, in this embodiment, the second terminal private key is a group member private key in the group signature algorithm.
The step of generating an information signature and an information character string by the second terminal according to the acquired first information, the received second terminal private key and the received first terminal public key comprises the following steps:
step a, the second terminal acquires first information and calculates a first hash value of the first information;
b, the second terminal acquires a preset encryption key, encrypts the first information according to the encryption key, generates a ciphertext corresponding to the first information, and calculates a second hash value of the ciphertext;
and after the second terminal receives the second terminal private key and the first terminal public key, the second terminal acquires the first information and a preset encryption key. The preset encryption key is obtained by the second terminal through a symmetric encryption algorithm, namely the encryption key is a symmetric key. Symmetric Encryption algorithms include, but are not limited to, DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm).
And after the second terminal obtains the encryption key and the first information, calculating a hash value of the first information, recording the hash value of the first information as the first hash value, and encrypting the first information through the encryption key to generate a ciphertext corresponding to the first information. It can be understood that the ciphertext corresponding to the first information is the encrypted first information. And after the second terminal obtains the ciphertext, calculating the hash value of the ciphertext, and recording the hash value of the ciphertext as a second hash value. In the present embodiment, algorithms used to calculate the Hash value include, but are not limited to, MD5(Message-Digest Algorithm 5) and SHA (Secure Hash Algorithm).
Step c, encrypting the encryption key by adopting the first terminal public key to obtain the encrypted encryption key, and calculating a third hash value of the encrypted encryption key;
and after the second terminal receives the first terminal public key and obtains the encryption key, the second terminal encrypts the encryption key by using the first terminal public key to obtain the encrypted encryption key, calculates the hash value of the encrypted encryption key, and records the hash value of the encrypted encryption key as a third hash value.
D, splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information character string;
and e, acquiring a prestored group public key from the block chain, and generating an information signature according to the second terminal private key, the group public key and the information character string based on a group signature algorithm.
And the second terminal acquires the pre-stored group public key from the block chain. After the second terminal obtains the group public key, the second terminal private key, the ciphertext corresponding to the first information, the encrypted encryption key, the first hash value, the second hash value and the third hash value, the second terminal splices the ciphertext corresponding to the first information, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information character string. And after the second terminal obtains the information character string, the second terminal calls a group signature algorithm, and the group public key, the second terminal private key and the information character string are used as the input of the group signature algorithm to obtain the output of the group signature algorithm. It should be noted that the output of the group signature algorithm is an information signature. And after the information signature and the information character string are obtained by the second terminal, the information signature and the information character string are sent to a third-party system.
In the process of splicing the ciphertext corresponding to the first information, the encrypted encryption key, the first hash value, the second hash value and the third hash value into the information string, the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value may be spliced in the order, or the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value may not be spliced in the order, that is, the splicing manner used in the process of splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value to obtain the information string may be set according to specific needs, and the specific splicing manner is not limited in this embodiment.
And step S30, after receiving the information signature and the information character string, writing the information signature and the information character string into a block chain.
And after the third-party system receives the information signature and the information character string sent by the second terminal, the third-party system writes the information signature and the information character string into the block chain through the uniform account identity. Therefore, the information character string and the information signature are issued to the blockchain by the third-party system in a unified account identity, so that the identity of the user corresponding to the second terminal cannot be exposed, and other users only know that the information character string and the information signature are sent by the account of the third-party system; the information signature is a signature of an information character string, and the characteristics of a group signature algorithm show that in the process of verifying whether the information character string is in a valid state by other users except a group administrator (namely, a user corresponding to a first terminal), the other users can only determine the information group corresponding to the information character string, but cannot determine a specific user corresponding to a second terminal, the information character string is generated by adopting a cryptographic envelope technology, and only the user corresponding to the first terminal can decrypt the information character string by using a group master private key, so that the confidentiality of the first information is ensured.
It should be noted that, in a specific embodiment, the block chain-based information transmission method may be applied to an article auction scenario, where in the article auction scenario, the first terminal is a selling terminal that sells an auction article, the second terminal is a bidding terminal that participates in bidding, the information group is an auction group, and the first information is bidding information. By utilizing the characteristics of decentralization of the block chain and account book sharing, the role of the auctioneer is removed, the statistical authority of the bidding result is handed over to the selling user corresponding to the selling terminal, the unfair problem caused by dishonest of the auctioneer and joint cheating of a plurality of auctioneers is avoided, the fairness in the auction process is improved, and the cost of selling the auctioned commodities of the user is reduced. The bidding character string and the bidding signature are issued to the block chain by the trusted third-party system in a unified account identity, the identity of the bidding user cannot be exposed in the block chain, the bidding price of the bidding user cannot be exposed, the confidentiality of bidding information is ensured, and the anonymous auction is realized. Through the characteristic of the shared account book of the block chain, all bidding information and final bid winning information generated in the auction process are recorded, and the bidding information cannot be modified after being written into the data chain, so that illegal molecules are prevented from counterfeiting data, and the fairness and the credibility of the auction are ensured. Compared with the traditional auction method, the communication overhead in the bidding process is reduced through the decentralized characteristic of the block chain.
In the embodiment, the characteristics of decentralized of the blockchain and account book sharing are utilized, the information character string and the information signature are issued to the blockchain by a third-party system in a unified account identity, the identity of the user corresponding to the second terminal cannot be exposed in the blockchain, and the information of the user corresponding to the second terminal cannot be exposed, so that the confidentiality of the first information is ensured, and the communication overhead in the information transmission process is reduced and the cost of information transmission is reduced through the decentralized characteristic of the blockchain.
Further, in order to improve the security during the information transmission process, after the information signature and the information character string are written into the block chain, the first terminal may obtain the information character string and the information signature corresponding to the information group through the block chain. It will be appreciated that the information string and the information signature have a mapping relationship with the group public key. Therefore, the first terminal can determine the information character string and the information signature corresponding to the information group through the group public key. The information group corresponds to at least two information character strings and at least two information signatures. And after the first terminal acquires the information signature and the information character string, checking whether the information signature is in a valid state. If the information signature is in an effective state, the first terminal splits the information character string to obtain a ciphertext in the information character string, an encrypted encryption key, a first hash value, a second hash value and a third hash value. It can be understood that the process of splitting the information character string by the first terminal is the reverse process of splicing to obtain the information character string. If the first terminal is spliced in sequence to obtain the information character string, the first terminal splits the information character string according to the corresponding sequence.
Further, if the information signature is in an invalid state, the first terminal discards the information signature and the corresponding information character string, or discards the ciphertext, namely forbids the second terminal to acquire the article.
The process of the first terminal verifying whether the information signature is in the valid state may be: and calling a group signature algorithm, inputting the group public key and the information signature into the group signature algorithm by taking the group public key and the information signature as input parameters, and obtaining an output result. If the output result is the first result, determining that the information signature is in an effective state; and if the output result is the second result, determining that the information signature is in an invalid state. The specific representation forms of the first result and the second result may be set according to specific needs, for example, the first result may be set to "true", and the second result may be set to "false"; alternatively, the first result may be set to "1" and the second result may be set to "0".
And when the first terminal obtains the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value in the information character string, calculating the hash value corresponding to the ciphertext, recording the hash value of the ciphertext as a fourth hash value, calculating the hash value of the encrypted encryption key, and recording the hash value of the encryption key as a fifth hash value. And the first terminal judges whether the fourth hash value is the same as the second hash value or not and judges whether the fifth hash value is the same as the third hash value or not. If the fourth hash value is the same as the second hash value, the first terminal determines that the ciphertext is not tampered and is complete; and if the fourth hash value is different from the second hash value, the first terminal determines that the ciphertext is tampered and is incomplete. If the fifth hash value is the same as the third hash value, the first terminal determines that the encrypted encryption key is not tampered and is complete; and if the fifth hash value is different from the third hash value, the first terminal determines that the encrypted encryption key is tampered and is incomplete.
If the ciphertext and the encrypted encryption key are determined to be complete, the first terminal decrypts the encrypted encryption key by using the auction private key corresponding to the first terminal public key to obtain the original unencrypted encryption key. It can be understood that, when the first terminal generates the first terminal public key by using the asymmetric encryption algorithm, the first terminal private key corresponding to the first terminal public key is correspondingly generated. In other embodiments, the first terminal private key may be used to encrypt the encryption key, and then the corresponding first terminal public key may be used to decrypt the encrypted encryption key. And after the original encryption key is obtained, decrypting the ciphertext by using the encryption key to obtain first information. Note that the first information is plaintext information.
Further, if the ciphertext and the encrypted encryption key are incomplete, the first terminal discards the information signature and the corresponding information character string corresponding to the ciphertext, or discards the ciphertext, that is, the second terminal is prohibited from acquiring the article.
And the first terminal calculates the hash value of the first information, records the hash value as a sixth hash value, and judges whether the sixth hash value is in a valid state. The process of judging whether the sixth hash value is in the valid state is as follows: comparing the sixth hash value with the first hash value, and if the sixth hash value is the same as the first hash value, determining that the sixth hash value is in an effective state; and if the sixth hash value is not the same as the first hash value, determining that the sixth hash value is in an invalid state. If the sixth hash value is determined to be in an effective state, the first terminal searches the optimal first information in all the obtained first information, namely, finds the first information with the highest price of the article. It can be understood that the first information that the price of the item is the highest is obtained as winning bid information. And after the first terminal determines the bid-winning information, calling a group signature algorithm, determining the user identity corresponding to the bid-winning information through a group owner private key, namely calling the group signature algorithm, and determining a bid winner according to the information signature and/or the information character string corresponding to the bid-winning information through the group owner private key.
Further, if the sixth hash value is in an invalid state, the first terminal discards the corresponding first information, and prohibits the corresponding second terminal from participating in the auction.
Further, a second embodiment of the information transmission method based on the block chain is provided.
The second embodiment of the information transmission method based on a block chain differs from the first embodiment of the information transmission method based on a block chain in that, referring to fig. 3, the information transmission method based on a block chain further includes:
step S40, after receiving the second information and the first terminal public key sent by the first terminal, creating an information group, and invoking a group signature algorithm to generate a group public key and a group owner private key of the information group.
Step S50, writing the second information and the group public key into the block chain, and returning the group owner private key to the first terminal.
When a user corresponding to the first terminal wants to auction or sell own articles, the user corresponding to the first terminal triggers a creation request for creating an information group in the first terminal, and sends the creation request, the second information and the first terminal public key to a third-party system. The third-party system is a member of a mechanism in the block chain, the second information is article information including but not limited to an article name, an article starting price and an article picture, and the first terminal public key is generated by the first terminal according to an asymmetric encryption algorithm. In the present embodiment, asymmetric encryption algorithms include, but are not limited to, RSA, ECC (Elliptic curve cryptography), and Diffie-Hellman key exchange algorithms. After the third-party system receives the creation request, the second information and the first terminal public key sent by the first terminal, an information group is created according to the creation request, a group signature algorithm is called to generate a group public key and a group owner private key of the information group, the group owner private key is sent to the first terminal, and the second information and the first terminal public key are written into the block chain.
Further, in the process that the third-party system sends the group owner private key to the first terminal, the third-party system sends the group owner private key to the first terminal through the secure channel. The Secure channel may be a channel encrypted by SSL (Secure Sockets Layer) or TLS (Transport Layer Security). After the first terminal receives the group owner private key, the first terminal can track the identity of each information signature in the information group corresponding to the second terminal user according to the group owner private key.
And in the process that the third-party system writes the second information and the first terminal public key into the block chain, the third-party system writes the second information and the first terminal public key into the block chain in a uniform account identity. It should be noted that, the unified account identity is an account identity, and one account identity may correspond to one information group or to a plurality of information groups. It can be understood that, after the second information is written into the blockchain, the user corresponding to the second terminal may query the second information in the blockchain through the blockchain browser or the second terminal to determine whether to acquire the item.
In the embodiment, the second information is written into the block chain, so that the second information is not modified, the second information is prevented from being forged by illegal molecules, and the safety in the information transmission process is ensured.
Further, a third embodiment of the information transmission method based on the block chain is provided.
The third embodiment of the information transmission method based on a block chain differs from the first or second embodiment of the information transmission method based on a block chain in that the information transmission method based on a block chain further includes:
and f, judging whether the value of the article corresponding to the second information is less than or equal to a preset value.
And after the third-party system receives the joining request of joining the information group sent by the second terminal, the third-party system acquires the value of the article corresponding to the second information and judges whether the value of the article is less than or equal to the preset value. Wherein the value of the item is obtainable from the second information. The value of an item is the starting price of the item, such as during an auction for the item. The preset value can be set according to specific needs, for example, the preset value can be set to 50 ten thousand yuan, also can be set to 80 ten thousand yuan, and the like.
If the value of the item is less than or equal to the preset value, step S20 is executed.
And g, if the value of the article is greater than the preset value, checking whether the user corresponding to the second terminal meets preset conditions.
And if the third party system determines that the value of the article is less than or equal to the preset value, the third party system sends the second terminal private key and the first terminal public key to the second terminal. And if the third-party system determines that the value of the article is greater than the preset value, the third-party system checks whether the user corresponding to the second terminal meets the preset condition. The process that the third-party system checks whether the user corresponding to the second terminal meets the preset conditions is as follows: and acquiring the identity information and the qualification test report of the user corresponding to the second terminal from the second terminal. It is understood that the identity information and the verification report of the user corresponding to the second terminal can be input in the second terminal by the user corresponding to the second terminal. For example, in the auction process, the bidding document sent by the second terminal can be received and extracted from the bidding document.
And after the identity information of the user corresponding to the second terminal is acquired, the third-party system calls an identity information checking interface to check the authenticity of the identity information. The checking interface can be connected with a public security system, namely the authenticity of the identity information can be checked in the public security system. If the third-party system checks the information which is consistent with the identity information of the user corresponding to the second terminal through the checking interface, the identity information of the user corresponding to the second terminal is determined to be real; and if the third-party system does not check the information which is consistent with the identity information of the user corresponding to the second terminal through the checking interface, determining that the identity information corresponding to the user corresponding to the second terminal is false. The identity information of the natural person is name and identification number, and the identity information of the individual industrial and commercial enterprises and companies can be unified social credit code and company name.
And after the qualification verification report of the user corresponding to the second terminal is acquired, the third-party system extracts the name of the qualification verification organization in the qualification verification report and judges whether an organization name consistent with the extracted name of the qualification verification organization exists in a prestored qualification verification organization name set. If the organization name consistent with the extracted name of the qualification testing organization exists in the prestored name set of the qualification testing organization, the third-party system obtains the asset evaluation value in the qualification testing report and judges whether the asset evaluation value is larger than the value of the article. If the asset evaluation value is larger than the value of the article, the third-party system determines that the user corresponding to the second terminal meets the preset condition; and if the asset evaluation value is less than or equal to the value of the article, the third-party system determines that the user corresponding to the second terminal does not accord with the preset condition. And if the institution name consistent with the extracted qualification testing institution name does not exist in the prestored qualification testing institution name set, the third-party system determines that the user corresponding to the second terminal does not accord with the preset condition.
It can be understood that, in order to improve the security of information transmission and avoid the transmission of false information, in the process of determining whether the user corresponding to the second terminal meets the preset condition, information such as the liability condition and the credit condition of the user corresponding to the second terminal can be further acquired for determination.
If the user corresponding to the second terminal meets the bidding condition, step S20 is executed.
And if the fact that the user corresponding to the second terminal meets the preset conditions is determined, the third party system sends the second terminal private key and the first terminal public key to the second terminal. And if the third-party system determines that the user corresponding to the second terminal does not meet the preset condition, the third-party system refuses to generate a second terminal private key for the user corresponding to the second terminal so as to forbid the user corresponding to the second terminal from transmitting information.
The embodiment determines whether to audit the corresponding user of the second terminal according to the value of the article. When the value of the article is smaller than the preset value, the user corresponding to the second terminal is not checked; when the value of the article is greater than or equal to the preset value, the corresponding user of the second terminal is audited, and as long as the corresponding user of the second terminal passes the audit, a second terminal private key is generated for the corresponding user of the second terminal, the corresponding user of the second terminal is allowed to participate in article acquisition, the article is prevented from being acquired maliciously by some users, and the security in the article circulation process is improved.
Further, a fourth embodiment of the information transmission method based on the block chain is provided.
The fourth embodiment of the information transmission method based on a block chain differs from the second or third embodiment of the information transmission method based on a block chain in that the information transmission method based on a block chain further includes:
and h, after receiving second information and a first terminal public key sent by the first terminal, detecting whether an article corresponding to the second information is legal or not according to the second information.
And i, if the article is determined to be legal, creating an information group, and calling a group signature algorithm to generate a group public key and a group owner private key of the information group.
And after the third-party system receives the second information and the first terminal public key sent by the first terminal, the third-party system detects whether the article corresponding to the second information is legal or not according to the second information. And if the third-party system detects that the article is legal, the third-party system creates an information group, invokes a group signature algorithm to generate a group public key and a group owner private key of the information group, writes the second information and the group public key into the block chain, and returns the group owner private key to the first terminal.
The process of the third-party system for detecting whether the article is legal or not comprises the following steps: and the third-party system compares the picture of the article and the name of the article with a prestored circulation prohibited article database. If the picture consistent with the picture of the article exists in the article circulation forbidding database and/or the commodity name consistent with the name of the article exists in the article circulation forbidding database, the third-party system determines that the article is illegal; and if the picture consistent with the picture of the article does not exist in the article circulation forbidding database and the commodity name consistent with the name of the article does not exist in the article circulation forbidding database, the third-party system determines that the article is legal. It should be noted that when a picture with similarity greater than or equal to a preset similarity exists in the article database for auction streaming, it is determined that a picture consistent with the article picture exists in the article database for article streaming prohibition, and otherwise, it is determined that a picture consistent with the article picture does not exist in the article database for article streaming prohibition. The preset similarity may be set according to specific needs, and is not limited in this embodiment.
Further, the information transmission method based on the block chain further includes:
and k, if the article is determined to be illegal, generating prompt information, and sending the prompt information to the first terminal so that the first terminal can prompt the corresponding user that the article is illegal according to the prompt information.
And if the third-party system determines that the article is illegal, the third-party system generates prompt information and sends the prompt information to the first terminal. And after the first terminal receives the prompt message, prompting that the article corresponding to the user is illegal according to the prompt message. The presentation form of the prompt message includes, but is not limited to, a text form and a voice form.
Further, the authenticity of the item may also be detected, and only if the item is authentic, a message cluster is created.
According to the embodiment, after the second information and the public key of the first terminal are received, whether the article is legal or not is judged firstly, if the article is legal, the information group is established to transfer the article, the condition that the first terminal is illegal for the application user is avoided, the article which is forbidden to be transferred is transferred, and the condition that in the article transferring process, the second terminal corresponds to the article which is forbidden to be auctioned and is obtained by the user, so that property loss of the second terminal corresponding to the user is caused is avoided.
Further, a fifth embodiment of the information transmission method based on block chains according to the present invention is provided.
The fifth embodiment of the information transmission method based on a block chain is different from the first, second, third or fourth embodiments of the information transmission method based on a block chain in that the information transmission method based on a block chain further includes:
step l, after receiving the identification information, the first information and the character string identification of the information character string corresponding to the article user corresponding to the second information sent by the first terminal, writing the identification information, the first information and the character string identification of the article user corresponding to the second information into the block chain.
After the first terminal determines the user for acquiring the article, the first terminal acquires the character string identification corresponding to the information character string, and sends the identity information, the first information and the information character string corresponding to the user for acquiring the article to a third-party system. It should be noted that each information character string corresponds to a unique character string identifier, and the corresponding information character string can be uniquely determined by the character string identifier. After the third-party system receives the identity information, the first information and the character string identification of the user obtaining the article, the identity information, the first information and the character string identification of the user obtaining the article are written into the block chain, so that other users can look up the identity information and/or the first information and the like of the user obtaining the article through a block chain browser or a corresponding client side, and check the identity information and/or the first information and the like of the corresponding user obtaining the article. It should be noted that, in this embodiment, only the character string identifier corresponding to the information character string is written into the block chain, because the third-party system already writes the information character string into the block chain in the process of acquiring the article by the user corresponding to the second terminal, so as to avoid repeatedly writing the information character string into the block chain, in this embodiment, only the character string identifier is written into the block chain, and the information character string corresponding to the winning bidder can be acquired in the block chain by other users through the character string identifier.
Further, a sixth embodiment of the information transmission method based on the block chain according to the present invention is provided.
The sixth embodiment of the information transmission method based on a block chain differs from the first, second, third, fourth or fifth embodiment of the information transmission method based on a block chain in that the information transmission method based on a block chain further comprises:
and m, after receiving a tracking request for tracking the illegal first information sent by a supervision terminal, sending the tracking request to the first terminal so that the first terminal can determine an illegal information group corresponding to the illegal first information according to the tracking request and determine a user corresponding to the illegal first information according to a group owner private key of the illegal information group.
And when the first terminal corresponds to the user, completing the circulation work of the articles through the block chain. The supervision terminal can supervise whether the article which completes the circulation work in the block chain has illegal circulation operation in real time or at regular time, namely whether the first information corresponding to the successful bidder is illegal first information or not. And if the first information corresponding to the successful bidder is determined to be illegal first information, the first terminal triggers the tracking request and sends the tracking request to the third-party system. The process of monitoring whether the first information corresponding to the successful bidder is the illegal first information can be manually executed by a monitoring user corresponding to the monitoring terminal, and can also be automatically executed by the monitoring terminal according to a certain monitoring rule. When the process of monitoring whether the first information corresponding to the successful bidder is illegal is manually executed by the monitoring user, the tracking request is manually triggered in the monitoring terminal by the monitoring user; when the process of monitoring whether the first information corresponding to the successful bidder is illegal is automatically carried out by the monitoring terminal according to a certain monitoring rule, the tracking request is automatically triggered by the monitoring terminal.
And after receiving the tracking request, the third-party system sends the tracking request to the first terminal. In the tracking request, the group public key of the group in which the illegal first information is located is carried. After the first terminal receives the tracking request, a group public key in the tracking request is obtained, an illegal information group where the illegal first information is located is determined according to the group public key, a group owner private key corresponding to the illegal information group is obtained, and an information signature corresponding to the illegal first information is obtained in the block chain. After the first terminal obtains the information signature and the group owner private key, a group signature algorithm is called, and the group owner private key and the information signature are input into the group signature algorithm to determine that the second terminal corresponding to the illegal first information corresponds to the user. It should be noted that the output of the group signature algorithm is the identity information of the user corresponding to the second terminal.
In the embodiment, after the article circulation is completed, whether the illegal first information exists in the block chain can be monitored, and the specific illegal second terminal corresponding to the illegal first information can be determined through the group owner private key.
In addition, an embodiment of the present invention further provides an information transmission method based on a block chain, where the information transmission method based on the block chain includes the following steps:
step a1, when a second terminal receives a second terminal private key and a first terminal public key of a first terminal sent by a third-party system, acquiring first information and a preset encryption key;
step a2, calculating a first hash value of the first information, encrypting the first information according to the encryption key, generating a ciphertext corresponding to the first information, and calculating a second hash value of the ciphertext;
step a3, encrypting the encryption key by using the first terminal public key to obtain the encrypted encryption key, and calculating a third hash value of the encrypted encryption key;
a4, splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information string;
step a5, obtaining a pre-stored group public key from a block chain, generating an information signature according to the second terminal private key, the group public key and the information character string based on a group signature algorithm, and sending the information signature and the information character string to the third party system, so that the third party system can write the information signature and the information character string into the block chain.
Further, the information transmission method based on the block chain further includes:
step a6, after the second terminal detects a join request for joining the information group created by the third party system, the join request is sent to the third party system, so that the third party system can call a group signature algorithm to generate a second terminal private key, and the second terminal private key and the first terminal public key sent by the first terminal are returned.
The specific implementation of the block chain-based information transmission method of the present invention is substantially the same as the steps executed by the second terminal in the block chain-based information transmission method, and will not be described herein again.
In addition, an embodiment of the present invention further provides an information transmission terminal based on a block chain, where the information transmission terminal based on a block chain includes:
the acquisition module is used for acquiring first information and a preset encryption key after receiving a second terminal private key and a first terminal public key of a first terminal which are sent by a third-party system;
the calculation module is used for calculating a first hash value of the first information;
the encryption module is used for encrypting the first information according to the encryption key and generating a ciphertext corresponding to the first information;
the calculation module is further used for calculating a second hash value of the ciphertext;
the encryption module is further configured to encrypt the encryption key by using the first terminal public key to obtain the encrypted encryption key;
the computing module is further configured to compute a third hash value of the encrypted encryption key;
the splicing module is used for splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information character string;
the generating module is used for acquiring a prestored group public key from the block chain and generating an information signature according to the second terminal private key, the group public key and the information character string based on a group signature algorithm;
and the sending module is used for sending the information signature and the information character string to the third-party system so that the third-party system can write the information signature and the information character string into the block chain.
Further, the sending module is further configured to send, when the second terminal detects a join request for joining an information group created by the third-party system, the join request to the third-party system, so that the third-party system invokes a group signature algorithm to generate a second terminal private key, and return the second terminal private key and the first terminal public key sent by the first terminal.
The specific implementation of the information transmission terminal based on the block chain is basically the same as that of the above-mentioned embodiments of the information transmission method based on the block chain, and is not described herein again.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, where a blockchain-based information transmission program is stored on the computer-readable storage medium, and when executed by a processor, the method implements the steps of the reward sending method as described above.
The specific implementation of the computer-readable storage medium of the present invention is substantially the same as the embodiments of the above-mentioned information transmission method based on a block chain, and is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (12)

1. An information transmission method based on a block chain is characterized in that the information transmission method based on the block chain comprises the following steps:
after a third-party system receives a joining request which is sent by a second terminal and joins a preset information group, the third-party system calls a group signature algorithm to generate a second terminal private key for the second terminal and obtains a first terminal public key sent by a first terminal;
the third party system sends the second terminal private key and the first terminal public key to the second terminal, so that the second terminal generates an information signature and an information character string according to the acquired first information, the received second terminal private key and the received first terminal public key, and returns the information signature and the information character string to the third party system;
after the third-party system receives the information signature and the information character string, the third-party system writes the information signature and the information character string into a block chain;
the step of generating an information signature and an information character string by the second terminal according to the acquired first information, the received second terminal private key and the received first terminal public key comprises the following steps:
the second terminal acquires first information and calculates a first hash value of the first information;
the second terminal acquires a preset encryption key, encrypts the first information according to the encryption key, generates a ciphertext corresponding to the first information, and calculates a second hash value of the ciphertext;
the second terminal encrypts the encryption key by adopting the first terminal public key to obtain the encrypted encryption key, and calculates a third hash value of the encrypted encryption key;
the second terminal splices the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information character string;
and the second terminal acquires a prestored group public key from the block chain, and generates an information signature according to the second terminal private key, the group public key and the information character string based on a group signature algorithm.
2. The block chain-based information transmission method according to claim 1, wherein, before the step of, when the third party system receives a join request sent by the second terminal to join the preset information group, the third party system invoking a group signature algorithm to generate the second terminal private key for the second terminal and obtain the first terminal public key sent by the first terminal, the method further comprises:
after the third-party system receives the second information and the first terminal public key sent by the first terminal, the third-party system creates an information group and invokes a group signature algorithm to generate a group public key and a group owner private key of the information group;
and the third party system writes the second information and the group public key into the block chain and returns the group owner private key to the first terminal.
3. The blockchain-based information transmission method according to claim 2, wherein before the step of the third party system sending the second terminal private key and the first terminal public key to the second terminal so that the second terminal generates an information signature and an information character string according to the acquired first information, the received second terminal private key and the received first terminal public key, and returns the information signature and the information character string to the third party system, the method further comprises:
the third-party system judges whether the value of the article corresponding to the second information is smaller than or equal to a preset value;
if the third-party system determines that the value of the article is smaller than or equal to the preset value, the third-party system executes the step of sending the second terminal private key and the first terminal public key to the second terminal;
if the third-party system determines that the value of the article is greater than the preset value, the third-party system checks whether the user corresponding to the second terminal meets preset conditions;
and if the third-party system determines that the user corresponding to the second terminal meets the preset condition, the third-party system executes the step of sending the second terminal private key and the first terminal public key to the second terminal.
4. The block chain-based information transmission method according to claim 2, wherein the step of the third party system creating the information group and invoking a group signature algorithm to generate the group public key and the group owner private key of the information group after the third party system receives the second information and the first terminal public key sent by the first terminal comprises:
after a third-party system receives second information and a first terminal public key sent by a first terminal, the third-party system detects whether an article corresponding to the second information is legal or not according to the second information;
and if the third-party system determines that the article is legal, creating an information group, and calling a group signature algorithm to generate a group public key and a group owner private key of the information group.
5. The block chain-based information transmission method according to claim 4, wherein after the third party system receives the second information and the first terminal public key sent by the first terminal, the third party system detects whether the article corresponding to the second information is legal according to the second information, and further comprising:
and if the third-party system determines that the article is illegal, generating prompt information and sending the prompt information to the first terminal so that the first terminal prompts the corresponding user that the article is illegal according to the prompt information.
6. The blockchain-based information transmission method according to any one of claims 1 to 5, wherein after the step of writing the information signature and the information string into the blockchain by the third-party system after the third-party system receives the information signature and the information string, the method further comprises:
after the third-party system receives the identity information, the first information and the character string identification of the information character string, which are sent by the first terminal and correspond to the user of the article corresponding to the second information, the third-party system writes the identity information, the first information and the character string identification of the user of the article corresponding to the second information into the block chain.
7. The blockchain-based information transmission method according to any one of claims 1 to 5, wherein after the step of writing the information signature and the information string into the blockchain by the third-party system after the third-party system receives the information signature and the information string, the method further comprises:
after a third-party system receives a tracking request for tracking the illegal first information sent by a monitoring terminal, the third-party system sends the tracking request to the first terminal, so that the first terminal can determine an illegal information group corresponding to the illegal first information according to the tracking request, and determine a user corresponding to the illegal first information according to a group owner private key of the illegal information group.
8. An information transmission method based on a block chain is characterized in that the information transmission method based on the block chain comprises the following steps:
when a second terminal receives a second terminal private key sent by a third party system and a first terminal public key of the first terminal, the second terminal acquires first information and a preset encryption key, calculates a first hash value of the first information, encrypts the first information according to the encryption key to generate a ciphertext corresponding to the first information, calculates a second hash value of the ciphertext, encrypts the encryption key by using the first terminal public key to obtain the encrypted encryption key, and calculates a third hash value of the encrypted encryption key;
the second terminal splices the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information character string;
the second terminal acquires a prestored group public key from a block chain, generates an information signature according to the second terminal private key, the group public key and the information character string based on a group signature algorithm, and sends the information signature and the information character string to the third-party system so that the third-party system can write the information signature and the information character string into the block chain.
9. The block chain-based information transmission method according to claim 8, wherein before the step of obtaining the first information and the preset encryption key after the second terminal receives the second terminal private key and the second public key sent by the first terminal, the method further comprises:
and when the second terminal detects a join request for joining the information group created by the third-party system, the join request is sent to the third-party system so that the third-party system can call a group signature algorithm to generate a second terminal private key, and the second terminal private key and the first terminal public key sent by the first terminal are returned.
10. A block chain-based information transmission terminal, characterized by comprising:
the acquisition module is used for acquiring first information and a preset encryption key after receiving a second terminal private key and a first terminal public key of a first terminal which are sent by a third-party system;
the calculation module is used for calculating a first hash value of the first information by the second terminal;
the encryption module is used for encrypting the first information by the second terminal according to the encryption key to generate a ciphertext corresponding to the first information;
the calculation module is further used for the second terminal to calculate a second hash value of the ciphertext;
the encryption module is further used for the second terminal to encrypt the encryption key by adopting the first terminal public key to obtain the encrypted encryption key;
the calculation module is further used for the second terminal to calculate a third hash value of the encrypted encryption key;
the splicing module is used for splicing the ciphertext, the encrypted encryption key, the first hash value, the second hash value and the third hash value into an information character string by the second terminal;
the generating module is used for the second terminal to obtain a prestored group public key from the block chain and generate an information signature according to the second terminal private key, the group public key and the information character string based on a group signature algorithm;
and the sending module is used for sending the information signature and the information character string to the third-party system by the second terminal so that the third-party system can write the information signature and the information character string into the block chain.
11. A blockchain-based information transmission apparatus comprising a third party system and a second terminal, the blockchain-based information transmission apparatus comprising a memory, a processor and a blockchain-based information transmission program stored on the memory and executable on the processor, the blockchain-based information transmission program, when executed by the processor, implementing the steps of the blockchain-based information transmission method according to any one of claims 1 to 7.
12. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a blockchain-based information transmission program, which when executed by a processor in the blockchain-based information transmission apparatus, implements the steps of the blockchain-based information transmission method according to any one of claims 1 to 7, the blockchain-based information transmission apparatus including a third party system and a second terminal.
CN201810478310.2A 2018-05-17 2018-05-17 Block chain based information transmission method, terminal, equipment and readable storage medium Active CN108650077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810478310.2A CN108650077B (en) 2018-05-17 2018-05-17 Block chain based information transmission method, terminal, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810478310.2A CN108650077B (en) 2018-05-17 2018-05-17 Block chain based information transmission method, terminal, equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN108650077A CN108650077A (en) 2018-10-12
CN108650077B true CN108650077B (en) 2021-05-28

Family

ID=63756722

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810478310.2A Active CN108650077B (en) 2018-05-17 2018-05-17 Block chain based information transmission method, terminal, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN108650077B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109510818B (en) * 2018-10-29 2021-08-17 梁伟 Data transmission system, method, device, equipment and storage medium of block chain
CN111784338B (en) * 2019-04-10 2024-10-18 北京沃东天骏信息技术有限公司 Information processing method, device, system and storage medium
CN110189184B (en) * 2019-04-26 2024-04-26 深圳市智税链科技有限公司 Electronic invoice storage method and device
WO2020231223A1 (en) * 2019-05-15 2020-11-19 에스케이플래닛 주식회사 Electronic commerce service device and operating method therefor, and service device
CN110601816B (en) * 2019-09-18 2021-09-28 腾讯科技(深圳)有限公司 Lightweight node control method and device in block chain system
CN110677257B (en) * 2019-09-24 2022-09-30 安徽师范大学 Method and system for generating blocks in alliance chain
CN110808959A (en) * 2019-10-10 2020-02-18 深圳创链数据科技有限公司 Intelligent equipment data acquisition system and method based on block chain
CN111162912B (en) * 2019-12-30 2021-06-15 深圳前海微众银行股份有限公司 Verification method and device suitable for block chain and storage medium
CN113128999B (en) * 2019-12-31 2024-04-12 航天信息股份有限公司 Block chain privacy protection method and device
CN111556174B (en) * 2020-06-28 2021-07-20 江苏恒宝智能系统技术有限公司 Information interaction method, device and system
CN112465501B (en) * 2020-11-11 2023-07-14 中国人民大学 Method and system for automatically obtaining evidence of copyright deposit and infringement based on blockchain

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10079682B2 (en) * 2015-12-22 2018-09-18 Gemalto Sa Method for managing a trusted identity
CN107453865B (en) * 2017-07-18 2020-09-11 众安信息技术服务有限公司 Multi-party data sharing method and system for protecting privacy of data sending source
CN107392770A (en) * 2017-08-09 2017-11-24 北京云知科技有限公司 A kind of random-number generating method and system based on block chain
CN107911216B (en) * 2017-10-26 2020-07-14 矩阵元技术(深圳)有限公司 Block chain transaction privacy protection method and system
CN107730384A (en) * 2017-11-13 2018-02-23 深圳大学 Art sales method and server, server end and system based on block chain
CN108009825A (en) * 2017-11-29 2018-05-08 江苏安凰领御科技有限公司 A kind of identity management system and method based on block chain technology

Also Published As

Publication number Publication date
CN108650077A (en) 2018-10-12

Similar Documents

Publication Publication Date Title
CN108650077B (en) Block chain based information transmission method, terminal, equipment and readable storage medium
JP7181539B2 (en) METHOD AND APPARATUS FOR MANAGING USER IDENTIFICATION AND AUTHENTICATION DATA
CN109889504B (en) Decentralized data access right transaction method and system
US11700257B2 (en) System and method for storing and distributing consumer information
CA3057385C (en) Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
CN110135819B (en) Block chain-based third-party trusted data transaction system and method
WO2020062668A1 (en) Identity authentication method, identity authentication device, and computer readable medium
CN111095332A (en) Method and system for privacy-preserving social media advertising
CN109547206B (en) Digital certificate processing method and related device
CN109905360B (en) Data verification method and terminal equipment
WO2020051710A1 (en) System and process for managing digitized security tokens
CN110719176A (en) Logistics privacy protection method and system based on block chain and readable storage medium
US20220278841A1 (en) Methods and systems for distributed cryptographically secured data validation
WO2016054924A1 (en) Identity authentication method, third-party server, merchant server and user terminal
Li et al. A decentralized and secure blockchain platform for open fair data trading
CN111160998A (en) Comment data processing method and device based on block chain and comment system
CN116545773B (en) Method, medium and electronic equipment for processing privacy data
CN112801778A (en) Federated bad asset blockchain
JP2004030121A (en) Electronic contract system
CN113783690B (en) Authentication-based bidding method and device
CN116071071B (en) Block chain-based data element transaction method, system, storage medium and equipment
CN110189143B (en) Block chain-based marketing label authenticity verification method and system
CN111552950A (en) Software authorization method and device and computer readable storage medium
CN113783689B (en) Sign information processing method and device
Zhong et al. An Efficient Electronic English Auction System with a Secure On‐Shelf Mechanism and Privacy Preserving

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant