CN108809652A - A kind of block chain encryption account book based on privacy sharing - Google Patents

A kind of block chain encryption account book based on privacy sharing Download PDF

Info

Publication number
CN108809652A
CN108809652A CN201810491417.0A CN201810491417A CN108809652A CN 108809652 A CN108809652 A CN 108809652A CN 201810491417 A CN201810491417 A CN 201810491417A CN 108809652 A CN108809652 A CN 108809652A
Authority
CN
China
Prior art keywords
key
account book
block chain
data
user
Prior art date
Application number
CN201810491417.0A
Other languages
Chinese (zh)
Inventor
李海波
包象琳
陆军
Original Assignee
安徽航天信息有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 安徽航天信息有限公司 filed Critical 安徽航天信息有限公司
Priority to CN201810491417.0A priority Critical patent/CN108809652A/en
Publication of CN108809652A publication Critical patent/CN108809652A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The present invention discloses a kind of block chain encryption account book based on privacy sharing, including key management module, encryption data enter chain module, account book deciphering module;Key management module is responsible for the registration of user and key generates, and the segmentation of key is realized using Secret sharing techniques, is responsible for key information after collaboration storage is divided by each node of block chain, each node can only grasp incomplete key information;Encryption data enters chain module and is responsible for handling the upload request of data of user, by signature verification by the storage of user encryption data in block chain account book;Account book deciphering module is responsible for handling account book decoding request, only after block chain node reaches decryption common recognition, could synthesize decruption key, complete the decryption to encrypting account book.The present invention solves the problems, such as user key secure storage using Secret sharing techniques, and effectively avoids the unexpected leakage behavior of this private data of Partial Block chain node reconciliation, ensures the safety of user key storage and enhances the credibility of block catenary system.

Description

A kind of block chain encryption account book based on privacy sharing

Technical field

The invention belongs to block chain technical fields, are related to a kind of block chain encryption account book based on privacy sharing.

Background technology

" block chain " technology is designed by a kind of artificial bit coin (digital cash) of this acute hearing in an assumed name A kind of special database technology, from the perspective of data:Block chain is a kind of distributed data base (or for distribution Shared general ledger), " distribution " here is not only presented as the distributed storage of data, is also embodied in the distributed recording of data (being safeguarded come collective by system participant).Briefly, block chain can realize that the distributed recording of global metadata information (can be with Recorded by system participant collective, rather than by the mechanism centralized recording of a centralization) (data can be stored with distributed storage It in all nodes for participating in record data, rather than is centrally stored in the agency node of centralization).

From the perspective of effect:Block chain can generate a set of record time order and function, can not distorting, trusty Database, this sets of data library is decentralization storage and data safety can be effectively ensured.In short, block chain is Data structure a kind of that related data is stored in block, that block is combined in a manner of chain, it is suitble to storage letter Data single, having precedence relationship, being verified in system, with cryptography ensure that data can not distort and can not be pseudo- It makes.It can make participant build a consensus the event sequence and current state of the whole network transaction record.

The key point that block chain technology is related to includes:Trust, collective's maintenance, authentic data library, time are gone in decentralization Stamp, asymmetric encryption etc..In systems, participant, also need not be by third party's machine without understanding other people background information The guarantee or guarantee of structure, block chain technical guarantee system record the activity of value Transfer, are transmitted, are stored, last Result must be believable.

The source of block chain technical principle can be summarized as a mathematical problem:Byzantium's general's problem, intension can be summarized For:In the case where lacking central node trusty and channel trusty, each node being distributed in a network should be how Reach common understanding.Block chain technology is solves the problems, such as that it is a kind of without trusting individual node, can also create common recognition network that this is provided Method (common recognition protocol technology).Therefore the core of block chain Technology design is:

One:How a rigorous database is established so that the database can store the information of lower magnanimity, while again can Ensure the integrality of database under the system of not centralized architecture?

Two:How to record and store down this rigorous database so that even if the certain nodes for participating in data record collapse It bursts, we still can guarantee that the normal operation of entire Database Systems and information are complete?

Three:The database that this rigorous and full storage gets off how is set to become believable so that we can lack Successfully prevent node from doing evil under the block chain environment of trust?

For these three core points, a whole set of complete, coherent database technology of block chain building carrys out reached purpose, Solve the problems, such as that the technology of these three also becomes three most crucial big technologies of block chain.

But exactly because block chain is a public database, the record in each account is disclosed.It is such It is open and clear to bring prodigious data-privacy problem, by taking assets transaction application scene as an example:When you accuse your account address When knowing counterpart, other side can pass through all assets and historical trading in block chain query to this account.

To realize that data safety storage needs first to be distinguish the data type stored in block chain, different types of data Required encryption storage strategy is different:(1) structureless the logical operations such as validation verification need not be carried out for those Data are encrypted data after shared key between data related side;(2) those are needed to carry out validation verification It is (such as common transaction data) and more complicated, need to carry out (e.g., triggering for certain logical operation using the data The transaction data that intelligent contract executes), then it also needs to utilize some other cryptography tools.

The trust problem of block chain node is also to need the great difficult problem solved during system design is realized, one to making Disliking node does not have the block catenary system of Precaution Tactics can not safe handling.In addition, how effectively to store the privacy letter of user Breath is not also what block catenary system must take into consideration by unexpected leakage.The technical program is the trust problem solved between block chain node A kind of block chain encryption account book technology based on privacy sharing is proposed with privacy information secure storage problem.The account book of block chain It is stored after information encryption, single node can not decrypt account book by the key information after segmentation, only decrypt demand by all areas Decruption key can be just synthesized after block catenary system node common recognition, which solves the decruption key bursting tube in key management Reason problem.Block chain node will be transferred to store respectively after Secret splitting by Secret sharing techniques, effectively prevent storing in system The hidden danger that is leaked of key.Moreover, account book decrypting process triggers intelligent contract after decryption common recognition is reached and executes automatically It completes, account book flows to fully controllable after account book decrypting process may be implemented and decrypt.

End to End Encryption:Block chain based on End to End Encryption technology encrypts account book

Encipherment protection is that cryptographic algorithm, reconciliation notebook data is utilized to be encrypted, and realizes and only has related side that can decrypt Check encryption data.It not only needs that account book storage is encrypted in block catenary system, account book transmit process is also required to encrypt. Therefore only accomplish that end to end security is only safely and effectively.If completing encryption dependent on platform or intermediate node, these sections Point can obtain private data.

Corresponding Encryption Algorithm include symmetric cryptography (such as:AES256, SM4) and asymmetric encryption is (such as:RSA2048, SM2).Symmetric cryptography speed is fast, but relatively easily cracks, and rivest, shamir, adelman is then opposite.So general in practical application Symmetric cryptography and rivest, shamir, adelman can be used in combination.Digital envelope is exactly one of example, it leads to symmetric key Cross asymmetric encryption (i.e.:Have public key and private key two) result distribution symmetric key method, can solve a secret Multiple analogues are given in data sharing, accomplish that only these opponents can decrypt and check, other people can not know data clear text.

Disadvantage:1. if key is abused by other people, data-privacy if, does not know where to begin, and lacks the guarantor of the safety to key Barrier.2. though realize the secret protection of data on chain, it can cause block chain node that can not be directed to the encryption data and carry out logic Operation.

Homomorphic cryptography:Block chain based on homomorphic cryptography technology encrypts account book

Homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.To the number Jing Guo homomorphic cryptography According to being handled to obtain an output, this output is decrypted, result handles the original of unencryption with Same Way Output that data obtain is the result is that the same.If a kind of Encryption Algorithm can find corresponding behaviour for multiplication and addition Make, is just called full homomorphic encryption algorithm.

Data upload block catenary system after homomorphic cryptography, and user is only by encryption data external disclosure so that block chain Though node cannot obtain specific data content, the simple logic processing to data can be realized.

Disadvantage:Until there is presently no real available full homomorphic encryption algorithms.Block account book data after homomorphic cryptography, Block catenary system can only realize that simple logical process, block catenary system can not obtain data particular content, nothing to encryption data Method provides the service of higher logical requirements for block catenary system user.

Invention content

The purpose of the present invention is to provide a kind of, and the block chain based on privacy sharing encrypts account book.

The technical problems to be solved by the invention include:

1. preventing the malicious decryption behavior that single block chain node is directed to account book data, to protect user secret.Block chain System only after all chain nodes reach decryption common recognition, could successfully synthesize decruption key, decrypt account book data.

2. under the premise of ensureing user data privacy, the availability of block chain encryption account book data is improved.

3. while improving account book availability of data, the safety of user key storage is improved.

The purpose of the present invention can be achieved through the following technical solutions:

A kind of block chain encryption account book based on privacy sharing, including key management module, encryption data enter chain module, account This deciphering module;

Wherein, the key management module is responsible for the registration of user and key generates, and utilizes the threshold secret sharing side (k, n) Case realizes the segmentation of key, is responsible for key information after collaboration storage is divided by each node of block chain, each node can only be grasped not Complete key information;

The encryption data enter chain module be responsible for handle user upload request of data, by signature verification by user add In ciphertext data storage to block chain account book;

The account book deciphering module is responsible for handling account book decoding request, only after block chain node reaches decryption common recognition, Decruption key could be synthesized, the decryption to encrypting account book is completed.

Block chain encryption account book needs installing the private key segmentation contract generation for realizing Secret sharing techniques in advance It is realized in the block chain environment of the closely sealed about code of code reconciliation;Meanwhile block catenary system must fulfil decryption common recognition agreement ahead of schedule It agrees on.

The key management module generates a pair of public and private key using the close SM2 algorithms of state, right with the close SM4 algorithms generation one of state Claim key, the public private key pair and symmetric key are sent to user;At the same time, client public key letter is disclosed in block catenary system Breath;User may be selected to utilize symmetric key encryption private data using symmetric cryptography mode, and asymmetric encryption mode also may be selected Private data is encrypted, while being signed to private data using digital signature technology using private key.

The block catenary system can be by triggering the Secret splitting contract code based on Secret sharing techniques, and segmentation decryption is close Key information is to realize the secure storage of key;If user's selection encrypts user data using asymmetric encryption techniques, by user Private key be divided into one by one incomplete secure store in block catenary system;If user's selection is encrypted using symmetric cryptosystem User data, then by the symmetric key of user be divided into one by one incomplete secure store in block catenary system;Block chain System is by the segmentation of key to realize that privacy sharing, each block chain node are only responsible for one incomplete key of storage.

The encryption data enters in chain module, and user can use his selected cipher mode encryption data, and profit in advance It is encryption data addition signature with digital signature technology, encryption data is then uploaded to block catenary system again;Block catenary system Each node receives encryption data, and after client public key Information Authentication signature disclosed in block catenary system, encryption data is deposited In storage to block chain account book.

The account book deciphering module realizes the synthesis of decruption key based on Secret sharing techniques in decrypting contract code;When Block catenary system execute decryption common recognition agreement reach decryption common recognition after, system pass through trigger block catenary system decryption contract code Restore key and completes the secure decryption process of data.

Beneficial effects of the present invention:

The present invention is based on Secret sharing techniques to decrypt behavior with the account book of specification block catenary system, realizes to block chain not Trusted node malice reveals the strick precaution of account book privacy behavior, is closed using Secret sharing techniques, intelligence in conjunction with block catenary system characteristic The about secure storage and management of technology and common recognition protocol realization user key;

Private data information can be obtained to improve account under the premise of ensureing account book security of private data using the present invention The subsequent expansion of block chain functionally is realized in the availability of this information, help;Block catenary system utilizes Secret sharing techniques simultaneously It is stored again after segmentation user key, ensure that the part for surprisingly having revealed user key even if respective nodes, will not cause The leakage of entire user key;Only after each node of block catenary system reaches decryption common recognition, block catenary system can just merge point Each key part after cutting obtains decryption key decryption block account book information;Account book decrypting process is by intelligent contract code It is automatic to execute the control, it can be achieved that account book decrypting process and account book information flow direction;

The present invention solves the problems, such as user key secure storage using Secret sharing techniques, and effectively prevents part The unexpected leakage behavior of this private data of block chain node reconciliation has ensured the safety of user key storage and has enhanced block The credibility of catenary system.

Description of the drawings

In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.

Fig. 1 is the structure chart that a kind of block chain based on privacy sharing of the present invention encrypts account book;

Fig. 2 is the flow chart of key management module of the present invention;

Fig. 3 is key management information flow graph of the present invention;

Fig. 4 is the flow chart that encryption data of the present invention enters chain module;

Fig. 5 is that encryption data of the present invention enters chain information flow graph;

Fig. 6 is the flow chart of account deciphering module of the present invention;

Fig. 7 is that account book of the present invention decrypts information flow direction figure;

Fig. 8 is account book solution confidential information detailed maps of the present invention.

Specific implementation mode

Technical scheme of the present invention is clearly and completely described below in conjunction with embodiment, it is clear that described reality It is only a part of the embodiment of the present invention to apply example, instead of all the embodiments.Based on the embodiments of the present invention, this field is general All other embodiment that logical technical staff is obtained without creative efforts belongs to what the present invention protected Range.

A kind of block chain encryption account book based on privacy sharing, needs to install for realizing Secret sharing techniques in advance Private key segmentation contract code conciliate in the block chain environment of closely sealed about code and realize.Meanwhile block catenary system must be complete in advance At agreing on for decryption common recognition agreement.The technical program includes key management module, encryption data enters chain module, account book is decrypted Module.Fig. 1 is the block chain encryption account book system structure based on privacy sharing.

Wherein, key management module is responsible for the registration of user and key generates, and key is realized using Secret sharing techniques Segmentation is responsible for key information after collaboration storage is divided by each node of block chain, and each node can only grasp incomplete key letter Breath;Specific key management flow is shown in Fig. 2.

The realization of Secret splitting uses (k, n) threshold secret sharing scheme in key management module, there is following two thresholdings Secret sharing scheme is available:

1) threshold secret sharing scheme of Shamir

Realize that (k, n) threshold secret sharing scheme, the program are specifically made of following three phases using polynomial interopolation:

(1) initial phase.Select finite field FqIf participant's collection is combined into P={ P1, P2..., Pn, k is threshold value, close Key information [s ∈ Fq].Select [Fq] on n mutually different nonzero element x1, x2..., xn, these elements are disclosed.

(2) the privacy sharing stage.Randomly choose FqOn k-1 order polynomials [g (x)=a0+a1x+ ...+ak-1xk-1 ,] Wherein a0=s, remaining ai it is random be selected from Fq.[si=g (xi), i=1,2 ..., n ,] is calculated separately by (xi, si) conduct Sub-secret is distributed to member Pi

(3) the secret reconstruction stage.The sub-secret that arbitrary k member can be held is shared, and Lagrange is passed through Interpolation formula recovers secret information s.

2) Blakley threshold secret sharing schemes

The program realizes the scheme of another (k, n) threshold secret sharing using geometry method.Its basic thought is Key value regards the point in a k dimension space as, and the sub-secret for being distributed to different participants is different k-1 n-dimensional subspace ns, when k When participant shares its sub-secret, the only intersection point of these subspaces can be obtained, to obtain key value.Specifically retouch It states as follows:

(1) initial phase.Select finite field FqIf participant's collection is combined into P={ P1, P2..., Pn, k is threshold value, secret Confidential information [s ∈ Fq].Select FqOn k member systems of linear equations be:

a11x1+a12x2+…a1kxk=b1a21x1+a22x2+…a2kxk=b2…an1x1+an2x2+…ankxk=bn

Equation group can be denoted as [AX=B], and when selection matrix [A] needs to meet two conditions:The arbitrary k lines of [A] It is unrelated;Secret value s is the solution of the above system of linear equations.

(2) the privacy sharing stage.Each equation is considered as the subspace of k-1 dimensions, is each block chain link Point distributes such a equation.

(3) the secret reconstruction stage.The k member systems of linear equations of a full rank can be obtained when wherein k node simultaneous equations, Therefore only value can be solved, obtains secret value s.If being less than k equations simultaneousness, it is unable to get only solution.

The key generated after user registration success is divided into multiple secrets, and the secret after these segmentations is distributed to block In chain node, key management information flow direction is shown in Fig. 3.

Encryption data enter chain module be responsible for handle user upload request of data, by signature verification by user encryption number According in storage to block chain account book, specific data enter chain flow and see Fig. 4.

Encryption data enters chain module and receives the encryption data that user is transmitted, and the upload data being verified are stored in block In chain account book, data enter chain information flow direction and see Fig. 5.

Account book deciphering module is responsible for handling account book decoding request, only after block chain node reaches decryption common recognition, ability Decruption key is synthesized, the decryption to encrypting account book is completed, specific account book decryption flow is shown in Fig. 6.

Account book deciphering module receiving and deciphering asks and common recognition result is sent to key management module, after chain node will be divided Key is sent to key management module for synthesizing decruption key;It is sent to account book deciphering module after decruption key synthesis, it is complete At the decryption of account book data, account book decryption information flow direction is shown in Fig. 7, Fig. 8.

Key management module is based on cryptological technique and generates a pair of public and private key and a symmetric key, the public private key pair and right Key is claimed to be sent to user.At the same time, client public key information is disclosed in block catenary system.User may be selected using symmetrical Cipher mode utilizes symmetric key encryption private data, and asymmetric encryption mode also may be selected and encrypt private data, use simultaneously Private key signs to private data using digital signature technology.

Block catenary system can be by triggering the Secret splitting contract code based on Secret sharing techniques, segmentation decruption key letter Breath is to realize the secure storage of key.If user's selection encrypts user data using asymmetric encryption techniques, by private key for user Be divided into one by one incomplete secure store in block catenary system;If user's selection encrypts user using symmetric cryptosystem Data, then by the symmetric key of user be divided into one by one incomplete secure store in block catenary system.Block catenary system By the segmentation of key to realize that privacy sharing, each block chain node are only responsible for one incomplete key of storage.

Encryption data enters in chain module, and user can use his selected cipher mode encryption data in advance, and utilize number Word signature technology is encryption data addition signature, and encryption data is then uploaded to block catenary system again.Block catenary system respectively saves Point receive encryption data, by disclosed in block catenary system client public key Information Authentication signature after, by encryption data store to In block chain account book.

Account book deciphering module realizes the synthesis of decruption key based on Secret sharing techniques in decrypting contract code.Work as block After catenary system execution decryption common recognition agreement reaches decryption common recognition, system is restored by the decryption contract code of triggering block catenary system Key and the secure decryption process for completing data.Therefore any decoding request without block catenary system common recognition will not be allowed to, It ensure that the privacy of encryption account book data, and the decrypting process for executing using intelligent contract technology account book automatically can be effective Control account book decrypting process and account book flow direction.

The technical program decrypts behavior based on Secret sharing techniques with the account book of specification block catenary system, realizes to block The strick precaution of the insincere malicious behaviors of nodes leakage account book privacy behavior of chain, Secret sharing techniques, intelligence are utilized in conjunction with block catenary system characteristic It can secure storage and management of the contract technology with common recognition protocol realization user key.

Privacy can be obtained under the premise of ensureing account book security of private data using the block catenary system of the technical program For data information to improve the availability of account book information, the subsequent expansion of block chain functionally is realized in help.Block catenary system simultaneously It is stored again after dividing user key using Secret sharing techniques, ensure that and surprisingly revealed the one of user key even if respective nodes Part will not cause the leakage of entire user key.Only after each node of block catenary system reaches decryption common recognition, block chain System can just merge each key part after segmentation, obtain decryption key decryption block account book information.Account book decrypting process according to The control, it can be achieved that account book decrypting process and account book information flow direction is executed automatically by intelligent contract code.The technical program profit It solves the problems, such as user key secure storage with Secret sharing techniques, and effectively prevents Partial Block chain node reconciliation sheet The unexpected leakage behavior of private data has ensured the safety of user key storage and has enhanced the credible journey of block catenary system Degree.

It the key problem in technology point of the present invention and is intended to protect and includes a little:It is realized based on privacy sharing combination block chain intelligence contract close Key management;The safety encryption storage of distributed data is realized based on privacy sharing;It is known together and is assisted based on privacy sharing combination block chain View realizes the secret protection of block chain account book data.

Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification, It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to preferably explain the present invention Principle and practical application, to enable skilled artisan to be best understood by and utilize the present invention.The present invention is only It is limited by claims and its full scope and equivalent.

Claims (6)

1. a kind of block chain based on privacy sharing encrypts account book, which is characterized in that enter comprising key management module, encryption data Chain module, account book deciphering module;
Wherein, the key management module is responsible for the registration of user and key generates, and utilizes (k, n) threshold secret sharing scheme real The segmentation of existing key is responsible for key information after collaboration storage is divided by each node of block chain, and each node can only be grasped imperfect Key information;
The encryption data enter chain module be responsible for handle user upload request of data, by signature verification by user encryption number According in storage to block chain account book;
The account book deciphering module is responsible for handling account book decoding request, only after block chain node reaches decryption common recognition, ability Decruption key is synthesized, the decryption to encrypting account book is completed.
2. a kind of block chain based on privacy sharing according to claim 1 encrypts account book, which is characterized in that the block chain Encryption account book needs installing the closely sealed about code of private key segmentation contract code reconciliation for realizing Secret sharing techniques in advance Block chain environment in realize;Meanwhile block catenary system must fulfil agreing on for decryption common recognition agreement ahead of schedule.
3. a kind of block chain based on privacy sharing according to claim 1 encrypts account book, which is characterized in that the key Management module generates a pair of public and private key using the close SM2 algorithms of state, and a symmetric key, the public and private key are generated with the close SM4 algorithms of state Pair and symmetric key be sent to user;At the same time, client public key information is disclosed in block catenary system;User may be selected to make Symmetric key encryption private data is utilized with symmetric cryptography mode, asymmetric encryption mode also may be selected and encrypt private data, together When signed to private data using digital signature technology using private key.
4. a kind of block chain based on privacy sharing according to claim 3 encrypts account book, which is characterized in that the block Catenary system can be by triggering the Secret splitting contract code based on Secret sharing techniques, and segmentation decryption key information is to realize key Secure storage;If user's selection encrypts user data using asymmetric encryption techniques, private key for user is divided into one by one Incomplete secure store is in block catenary system;If user's selection encrypts user data using symmetric cryptosystem, will use The symmetric key at family be divided into one by one incomplete secure store in block catenary system;Point that block catenary system passes through key It cuts to realize that privacy sharing, each block chain node are only responsible for one incomplete key of storage.
5. a kind of block chain based on privacy sharing according to claim 1 encrypts account book, which is characterized in that the encryption Data enter in chain module, and user can use his selected cipher mode encryption data in advance, and be using digital signature technology Encryption data addition signature, is then uploaded to block catenary system by encryption data again;Each node of block catenary system receives encryption number According to, by disclosed in block catenary system client public key Information Authentication signature after, encryption data is stored into block chain account book.
6. a kind of block chain based on privacy sharing according to claim 1 encrypts account book, which is characterized in that the account book Deciphering module realizes the synthesis of decruption key based on Secret sharing techniques in decrypting contract code;When block catenary system executes solution After close common recognition agreement reaches decryption common recognition, system is by triggering the decryption contract code recovery key of block catenary system and completing number According to secure decryption process.
CN201810491417.0A 2018-05-21 2018-05-21 A kind of block chain encryption account book based on privacy sharing CN108809652A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810491417.0A CN108809652A (en) 2018-05-21 2018-05-21 A kind of block chain encryption account book based on privacy sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810491417.0A CN108809652A (en) 2018-05-21 2018-05-21 A kind of block chain encryption account book based on privacy sharing

Publications (1)

Publication Number Publication Date
CN108809652A true CN108809652A (en) 2018-11-13

Family

ID=64091328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810491417.0A CN108809652A (en) 2018-05-21 2018-05-21 A kind of block chain encryption account book based on privacy sharing

Country Status (1)

Country Link
CN (1) CN108809652A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109672529A (en) * 2019-01-07 2019-04-23 苏宁易购集团股份有限公司 A kind of method and system for going anonymization of combination block chain and privacy sharing
CN109951453A (en) * 2019-02-26 2019-06-28 符安文 A kind of safe encryption method based on block chain
CN110162996A (en) * 2019-04-23 2019-08-23 上海链度科技有限公司 Ballot system, method and voting terminal based on block chain
CN111159306A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Information publishing method and device based on block chain and computer equipment
WO2020258125A1 (en) * 2019-06-27 2020-12-30 云图有限公司 Private key recovery method and apparatus, collaborative address creation method and apparatus, collaborative address signing method and apparatus, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170083860A1 (en) * 2015-02-26 2017-03-23 Skuchain, Inc. Tracking unitization occurring in a supply chain
CN106548345A (en) * 2016-12-07 2017-03-29 北京信任度科技有限公司 The method and system of block chain private key protection are realized based on Secret splitting
CN106982205A (en) * 2017-03-01 2017-07-25 中钞信用卡产业发展有限公司北京智能卡技术研究院 Digital asset treating method and apparatus based on block chain
CN107623569A (en) * 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 Block chain key escrow and restoration methods, device based on Secret sharing techniques
CN107666388A (en) * 2016-07-28 2018-02-06 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170083860A1 (en) * 2015-02-26 2017-03-23 Skuchain, Inc. Tracking unitization occurring in a supply chain
CN107666388A (en) * 2016-07-28 2018-02-06 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
CN106548345A (en) * 2016-12-07 2017-03-29 北京信任度科技有限公司 The method and system of block chain private key protection are realized based on Secret splitting
CN106982205A (en) * 2017-03-01 2017-07-25 中钞信用卡产业发展有限公司北京智能卡技术研究院 Digital asset treating method and apparatus based on block chain
CN107623569A (en) * 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 Block chain key escrow and restoration methods, device based on Secret sharing techniques

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109672529A (en) * 2019-01-07 2019-04-23 苏宁易购集团股份有限公司 A kind of method and system for going anonymization of combination block chain and privacy sharing
WO2020143246A1 (en) * 2019-01-07 2020-07-16 苏宁云计算有限公司 Method and system for de-anonymization by combining blockchain and secret sharing
CN109951453A (en) * 2019-02-26 2019-06-28 符安文 A kind of safe encryption method based on block chain
CN110162996A (en) * 2019-04-23 2019-08-23 上海链度科技有限公司 Ballot system, method and voting terminal based on block chain
WO2020258125A1 (en) * 2019-06-27 2020-12-30 云图有限公司 Private key recovery method and apparatus, collaborative address creation method and apparatus, collaborative address signing method and apparatus, and storage medium
CN111159306A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Information publishing method and device based on block chain and computer equipment

Similar Documents

Publication Publication Date Title
Zhou et al. Beekeeper: A blockchain-based iot system with secure storage and homomorphic computation
US10659223B2 (en) Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
Chandra et al. A comparative survey of symmetric and asymmetric key cryptography
Hu et al. A secure and verifiable access control scheme for big data storage in clouds
WO2019120092A1 (en) Intelligent contract-based data transfer method and system
US6240187B1 (en) Key replacement in a public key cryptosystem
CA1292790C (en) Controlled use of cryptographic keys via generating station establishedcontrol values
Ateniese et al. Improved proxy re-encryption schemes with applications to secure distributed storage
Hota et al. Capability-based cryptographic data access control in cloud computing
Tseng et al. A chaotic maps-based key agreement protocol that preserves user anonymity
CN104253694B (en) A kind of time slot scrambling for network data transmission
EP2228942B1 (en) Securing communications sent by a first user to a second user
CN102624522B (en) A kind of key encryption method based on file attribute
RU2175465C2 (en) Method for crypto key exchange between user's and network computer units
CN106911470A (en) A kind of bit coin transaction privacy Enhancement Method
CN104685826B (en) Method and system for the input consistency desired result of both sides' secure function evaluation
TWI706279B (en) Multi-party safe calculation method and device, electronic equipment
CN107251476A (en) Secret communication is managed
CN108292402A (en) The determination of the public secret of secure exchange for information and level certainty key
CN106104562A (en) Safety of secret data stores and recovery system and method
US8855317B2 (en) System for protecting an encrypted information unit
EP2323306A1 (en) Secured data transmission method and encryption and decryption system enabling such a transmission
WO2013026086A1 (en) Virtual zeroisation system and method
CN101447870B (en) Safe storage method of private key based on technology of distributed password
CN102687132A (en) Trustworthy extensible markup language for trustworthy computing and data services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination