CN108809652A - A kind of block chain encryption account book based on privacy sharing - Google Patents

A kind of block chain encryption account book based on privacy sharing Download PDF

Info

Publication number
CN108809652A
CN108809652A CN201810491417.0A CN201810491417A CN108809652A CN 108809652 A CN108809652 A CN 108809652A CN 201810491417 A CN201810491417 A CN 201810491417A CN 108809652 A CN108809652 A CN 108809652A
Authority
CN
China
Prior art keywords
key
account book
block chain
data
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810491417.0A
Other languages
Chinese (zh)
Other versions
CN108809652B (en
Inventor
李海波
包象琳
陆军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ANHUI AISINO Co Ltd
Original Assignee
ANHUI AISINO Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ANHUI AISINO Co Ltd filed Critical ANHUI AISINO Co Ltd
Priority to CN201810491417.0A priority Critical patent/CN108809652B/en
Publication of CN108809652A publication Critical patent/CN108809652A/en
Application granted granted Critical
Publication of CN108809652B publication Critical patent/CN108809652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The present invention discloses a kind of block chain encryption account book based on privacy sharing, including key management module, encryption data enter chain module, account book deciphering module;Key management module is responsible for the registration of user and key generates, and the segmentation of key is realized using Secret sharing techniques, is responsible for key information after collaboration storage is divided by each node of block chain, each node can only grasp incomplete key information;Encryption data enters chain module and is responsible for handling the upload request of data of user, by signature verification by the storage of user encryption data in block chain account book;Account book deciphering module is responsible for handling account book decoding request, only after block chain node reaches decryption common recognition, could synthesize decruption key, complete the decryption to encrypting account book.The present invention solves the problems, such as user key secure storage using Secret sharing techniques, and effectively avoids the unexpected leakage behavior of this private data of Partial Block chain node reconciliation, ensures the safety of user key storage and enhances the credibility of block catenary system.

Description

A kind of block chain encryption account book based on privacy sharing
Technical field
The invention belongs to block chain technical fields, are related to a kind of block chain encryption account book based on privacy sharing.
Background technology
" block chain " technology is designed by a kind of artificial bit coin (digital cash) of this acute hearing in an assumed name A kind of special database technology, from the perspective of data:Block chain is a kind of distributed data base (or for distribution Shared general ledger), " distribution " here is not only presented as the distributed storage of data, is also embodied in the distributed recording of data (being safeguarded come collective by system participant).Briefly, block chain can realize that the distributed recording of global metadata information (can be with Recorded by system participant collective, rather than by the mechanism centralized recording of a centralization) (data can be stored with distributed storage It in all nodes for participating in record data, rather than is centrally stored in the agency node of centralization).
From the perspective of effect:Block chain can generate a set of record time order and function, can not distorting, trusty Database, this sets of data library is decentralization storage and data safety can be effectively ensured.In short, block chain is Data structure a kind of that related data is stored in block, that block is combined in a manner of chain, it is suitble to storage letter Data single, having precedence relationship, being verified in system, with cryptography ensure that data can not distort and can not be pseudo- It makes.It can make participant build a consensus the event sequence and current state of the whole network transaction record.
The key point that block chain technology is related to includes:Trust, collective's maintenance, authentic data library, time are gone in decentralization Stamp, asymmetric encryption etc..In systems, participant, also need not be by third party's machine without understanding other people background information The guarantee or guarantee of structure, block chain technical guarantee system record the activity of value Transfer, are transmitted, are stored, last Result must be believable.
The source of block chain technical principle can be summarized as a mathematical problem:Byzantium's general's problem, intension can be summarized For:In the case where lacking central node trusty and channel trusty, each node being distributed in a network should be how Reach common understanding.Block chain technology is solves the problems, such as that it is a kind of without trusting individual node, can also create common recognition network that this is provided Method (common recognition protocol technology).Therefore the core of block chain Technology design is:
One:How a rigorous database is established so that the database can store the information of lower magnanimity, while again can Ensure the integrality of database under the system of not centralized architecture?
Two:How to record and store down this rigorous database so that even if the certain nodes for participating in data record collapse It bursts, we still can guarantee that the normal operation of entire Database Systems and information are complete?
Three:The database that this rigorous and full storage gets off how is set to become believable so that we can lack Successfully prevent node from doing evil under the block chain environment of trust?
For these three core points, a whole set of complete, coherent database technology of block chain building carrys out reached purpose, Solve the problems, such as that the technology of these three also becomes three most crucial big technologies of block chain.
But exactly because block chain is a public database, the record in each account is disclosed.It is such It is open and clear to bring prodigious data-privacy problem, by taking assets transaction application scene as an example:When you accuse your account address When knowing counterpart, other side can pass through all assets and historical trading in block chain query to this account.
To realize that data safety storage needs first to be distinguish the data type stored in block chain, different types of data Required encryption storage strategy is different:(1) structureless the logical operations such as validation verification need not be carried out for those Data are encrypted data after shared key between data related side;(2) those are needed to carry out validation verification It is (such as common transaction data) and more complicated, need to carry out (e.g., triggering for certain logical operation using the data The transaction data that intelligent contract executes), then it also needs to utilize some other cryptography tools.
The trust problem of block chain node is also to need the great difficult problem solved during system design is realized, one to making Disliking node does not have the block catenary system of Precaution Tactics can not safe handling.In addition, how effectively to store the privacy letter of user Breath is not also what block catenary system must take into consideration by unexpected leakage.The technical program is the trust problem solved between block chain node A kind of block chain encryption account book technology based on privacy sharing is proposed with privacy information secure storage problem.The account book of block chain It is stored after information encryption, single node can not decrypt account book by the key information after segmentation, only decrypt demand by all areas Decruption key can be just synthesized after block catenary system node common recognition, which solves the decruption key bursting tube in key management Reason problem.Block chain node will be transferred to store respectively after Secret splitting by Secret sharing techniques, effectively prevent storing in system The hidden danger that is leaked of key.Moreover, account book decrypting process triggers intelligent contract after decryption common recognition is reached and executes automatically It completes, account book flows to fully controllable after account book decrypting process may be implemented and decrypt.
End to End Encryption:Block chain based on End to End Encryption technology encrypts account book
Encipherment protection is that cryptographic algorithm, reconciliation notebook data is utilized to be encrypted, and realizes and only has related side that can decrypt Check encryption data.It not only needs that account book storage is encrypted in block catenary system, account book transmit process is also required to encrypt. Therefore only accomplish that end to end security is only safely and effectively.If completing encryption dependent on platform or intermediate node, these sections Point can obtain private data.
Corresponding Encryption Algorithm include symmetric cryptography (such as:AES256, SM4) and asymmetric encryption is (such as:RSA2048, SM2).Symmetric cryptography speed is fast, but relatively easily cracks, and rivest, shamir, adelman is then opposite.So general in practical application Symmetric cryptography and rivest, shamir, adelman can be used in combination.Digital envelope is exactly one of example, it leads to symmetric key Cross asymmetric encryption (i.e.:Have public key and private key two) result distribution symmetric key method, can solve a secret Multiple analogues are given in data sharing, accomplish that only these opponents can decrypt and check, other people can not know data clear text.
Disadvantage:1. if key is abused by other people, data-privacy if, does not know where to begin, and lacks the guarantor of the safety to key Barrier.2. though realize the secret protection of data on chain, it can cause block chain node that can not be directed to the encryption data and carry out logic Operation.
Homomorphic cryptography:Block chain based on homomorphic cryptography technology encrypts account book
Homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.To the number Jing Guo homomorphic cryptography According to being handled to obtain an output, this output is decrypted, result handles the original of unencryption with Same Way Output that data obtain is the result is that the same.If a kind of Encryption Algorithm can find corresponding behaviour for multiplication and addition Make, is just called full homomorphic encryption algorithm.
Data upload block catenary system after homomorphic cryptography, and user is only by encryption data external disclosure so that block chain Though node cannot obtain specific data content, the simple logic processing to data can be realized.
Disadvantage:Until there is presently no real available full homomorphic encryption algorithms.Block account book data after homomorphic cryptography, Block catenary system can only realize that simple logical process, block catenary system can not obtain data particular content, nothing to encryption data Method provides the service of higher logical requirements for block catenary system user.
Invention content
The purpose of the present invention is to provide a kind of, and the block chain based on privacy sharing encrypts account book.
The technical problems to be solved by the invention include:
1. preventing the malicious decryption behavior that single block chain node is directed to account book data, to protect user secret.Block chain System only after all chain nodes reach decryption common recognition, could successfully synthesize decruption key, decrypt account book data.
2. under the premise of ensureing user data privacy, the availability of block chain encryption account book data is improved.
3. while improving account book availability of data, the safety of user key storage is improved.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of block chain encryption account book based on privacy sharing, including key management module, encryption data enter chain module, account This deciphering module;
Wherein, the key management module is responsible for the registration of user and key generates, and utilizes the threshold secret sharing side (k, n) Case realizes the segmentation of key, is responsible for key information after collaboration storage is divided by each node of block chain, each node can only be grasped not Complete key information;
The encryption data enter chain module be responsible for handle user upload request of data, by signature verification by user add In ciphertext data storage to block chain account book;
The account book deciphering module is responsible for handling account book decoding request, only after block chain node reaches decryption common recognition, Decruption key could be synthesized, the decryption to encrypting account book is completed.
Block chain encryption account book needs installing the private key segmentation contract generation for realizing Secret sharing techniques in advance It is realized in the block chain environment of the closely sealed about code of code reconciliation;Meanwhile block catenary system must fulfil decryption common recognition agreement ahead of schedule It agrees on.
The key management module generates a pair of public and private key using the close SM2 algorithms of state, right with the close SM4 algorithms generation one of state Claim key, the public private key pair and symmetric key are sent to user;At the same time, client public key letter is disclosed in block catenary system Breath;User may be selected to utilize symmetric key encryption private data using symmetric cryptography mode, and asymmetric encryption mode also may be selected Private data is encrypted, while being signed to private data using digital signature technology using private key.
The block catenary system can be by triggering the Secret splitting contract code based on Secret sharing techniques, and segmentation decryption is close Key information is to realize the secure storage of key;If user's selection encrypts user data using asymmetric encryption techniques, by user Private key be divided into one by one incomplete secure store in block catenary system;If user's selection is encrypted using symmetric cryptosystem User data, then by the symmetric key of user be divided into one by one incomplete secure store in block catenary system;Block chain System is by the segmentation of key to realize that privacy sharing, each block chain node are only responsible for one incomplete key of storage.
The encryption data enters in chain module, and user can use his selected cipher mode encryption data, and profit in advance It is encryption data addition signature with digital signature technology, encryption data is then uploaded to block catenary system again;Block catenary system Each node receives encryption data, and after client public key Information Authentication signature disclosed in block catenary system, encryption data is deposited In storage to block chain account book.
The account book deciphering module realizes the synthesis of decruption key based on Secret sharing techniques in decrypting contract code;When Block catenary system execute decryption common recognition agreement reach decryption common recognition after, system pass through trigger block catenary system decryption contract code Restore key and completes the secure decryption process of data.
Beneficial effects of the present invention:
The present invention is based on Secret sharing techniques to decrypt behavior with the account book of specification block catenary system, realizes to block chain not Trusted node malice reveals the strick precaution of account book privacy behavior, is closed using Secret sharing techniques, intelligence in conjunction with block catenary system characteristic The about secure storage and management of technology and common recognition protocol realization user key;
Private data information can be obtained to improve account under the premise of ensureing account book security of private data using the present invention The subsequent expansion of block chain functionally is realized in the availability of this information, help;Block catenary system utilizes Secret sharing techniques simultaneously It is stored again after segmentation user key, ensure that the part for surprisingly having revealed user key even if respective nodes, will not cause The leakage of entire user key;Only after each node of block catenary system reaches decryption common recognition, block catenary system can just merge point Each key part after cutting obtains decryption key decryption block account book information;Account book decrypting process is by intelligent contract code It is automatic to execute the control, it can be achieved that account book decrypting process and account book information flow direction;
The present invention solves the problems, such as user key secure storage using Secret sharing techniques, and effectively prevents part The unexpected leakage behavior of this private data of block chain node reconciliation has ensured the safety of user key storage and has enhanced block The credibility of catenary system.
Description of the drawings
In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.
Fig. 1 is the structure chart that a kind of block chain based on privacy sharing of the present invention encrypts account book;
Fig. 2 is the flow chart of key management module of the present invention;
Fig. 3 is key management information flow graph of the present invention;
Fig. 4 is the flow chart that encryption data of the present invention enters chain module;
Fig. 5 is that encryption data of the present invention enters chain information flow graph;
Fig. 6 is the flow chart of account deciphering module of the present invention;
Fig. 7 is that account book of the present invention decrypts information flow direction figure;
Fig. 8 is account book solution confidential information detailed maps of the present invention.
Specific implementation mode
Technical scheme of the present invention is clearly and completely described below in conjunction with embodiment, it is clear that described reality It is only a part of the embodiment of the present invention to apply example, instead of all the embodiments.Based on the embodiments of the present invention, this field is general All other embodiment that logical technical staff is obtained without creative efforts belongs to what the present invention protected Range.
A kind of block chain encryption account book based on privacy sharing, needs to install for realizing Secret sharing techniques in advance Private key segmentation contract code conciliate in the block chain environment of closely sealed about code and realize.Meanwhile block catenary system must be complete in advance At agreing on for decryption common recognition agreement.The technical program includes key management module, encryption data enters chain module, account book is decrypted Module.Fig. 1 is the block chain encryption account book system structure based on privacy sharing.
Wherein, key management module is responsible for the registration of user and key generates, and key is realized using Secret sharing techniques Segmentation is responsible for key information after collaboration storage is divided by each node of block chain, and each node can only grasp incomplete key letter Breath;Specific key management flow is shown in Fig. 2.
The realization of Secret splitting uses (k, n) threshold secret sharing scheme in key management module, there is following two thresholdings Secret sharing scheme is available:
1) threshold secret sharing scheme of Shamir
Realize that (k, n) threshold secret sharing scheme, the program are specifically made of following three phases using polynomial interopolation:
(1) initial phase.Select finite field FqIf participant's collection is combined into P={ P1, P2..., Pn, k is threshold value, close Key information [s ∈ Fq].Select [Fq] on n mutually different nonzero element x1, x2..., xn, these elements are disclosed.
(2) the privacy sharing stage.Randomly choose FqOn k-1 order polynomials [g (x)=a0+a1x+ ...+ak-1xk-1 ,] Wherein a0=s, remaining ai it is random be selected from Fq.[si=g (xi), i=1,2 ..., n ,] is calculated separately by (xi, si) conduct Sub-secret is distributed to member Pi
(3) the secret reconstruction stage.The sub-secret that arbitrary k member can be held is shared, and Lagrange is passed through Interpolation formula recovers secret information s.
2) Blakley threshold secret sharing schemes
The program realizes the scheme of another (k, n) threshold secret sharing using geometry method.Its basic thought is Key value regards the point in a k dimension space as, and the sub-secret for being distributed to different participants is different k-1 n-dimensional subspace ns, when k When participant shares its sub-secret, the only intersection point of these subspaces can be obtained, to obtain key value.Specifically retouch It states as follows:
(1) initial phase.Select finite field FqIf participant's collection is combined into P={ P1, P2..., Pn, k is threshold value, secret Confidential information [s ∈ Fq].Select FqOn k member systems of linear equations be:
a11x1+a12x2+…a1kxk=b1a21x1+a22x2+…a2kxk=b2…an1x1+an2x2+…ankxk=bn
Equation group can be denoted as [AX=B], and when selection matrix [A] needs to meet two conditions:The arbitrary k lines of [A] It is unrelated;Secret value s is the solution of the above system of linear equations.
(2) the privacy sharing stage.Each equation is considered as the subspace of k-1 dimensions, is each block chain link Point distributes such a equation.
(3) the secret reconstruction stage.The k member systems of linear equations of a full rank can be obtained when wherein k node simultaneous equations, Therefore only value can be solved, obtains secret value s.If being less than k equations simultaneousness, it is unable to get only solution.
The key generated after user registration success is divided into multiple secrets, and the secret after these segmentations is distributed to block In chain node, key management information flow direction is shown in Fig. 3.
Encryption data enter chain module be responsible for handle user upload request of data, by signature verification by user encryption number According in storage to block chain account book, specific data enter chain flow and see Fig. 4.
Encryption data enters chain module and receives the encryption data that user is transmitted, and the upload data being verified are stored in block In chain account book, data enter chain information flow direction and see Fig. 5.
Account book deciphering module is responsible for handling account book decoding request, only after block chain node reaches decryption common recognition, ability Decruption key is synthesized, the decryption to encrypting account book is completed, specific account book decryption flow is shown in Fig. 6.
Account book deciphering module receiving and deciphering asks and common recognition result is sent to key management module, after chain node will be divided Key is sent to key management module for synthesizing decruption key;It is sent to account book deciphering module after decruption key synthesis, it is complete At the decryption of account book data, account book decryption information flow direction is shown in Fig. 7, Fig. 8.
Key management module is based on cryptological technique and generates a pair of public and private key and a symmetric key, the public private key pair and right Key is claimed to be sent to user.At the same time, client public key information is disclosed in block catenary system.User may be selected using symmetrical Cipher mode utilizes symmetric key encryption private data, and asymmetric encryption mode also may be selected and encrypt private data, use simultaneously Private key signs to private data using digital signature technology.
Block catenary system can be by triggering the Secret splitting contract code based on Secret sharing techniques, segmentation decruption key letter Breath is to realize the secure storage of key.If user's selection encrypts user data using asymmetric encryption techniques, by private key for user Be divided into one by one incomplete secure store in block catenary system;If user's selection encrypts user using symmetric cryptosystem Data, then by the symmetric key of user be divided into one by one incomplete secure store in block catenary system.Block catenary system By the segmentation of key to realize that privacy sharing, each block chain node are only responsible for one incomplete key of storage.
Encryption data enters in chain module, and user can use his selected cipher mode encryption data in advance, and utilize number Word signature technology is encryption data addition signature, and encryption data is then uploaded to block catenary system again.Block catenary system respectively saves Point receive encryption data, by disclosed in block catenary system client public key Information Authentication signature after, by encryption data store to In block chain account book.
Account book deciphering module realizes the synthesis of decruption key based on Secret sharing techniques in decrypting contract code.Work as block After catenary system execution decryption common recognition agreement reaches decryption common recognition, system is restored by the decryption contract code of triggering block catenary system Key and the secure decryption process for completing data.Therefore any decoding request without block catenary system common recognition will not be allowed to, It ensure that the privacy of encryption account book data, and the decrypting process for executing using intelligent contract technology account book automatically can be effective Control account book decrypting process and account book flow direction.
The technical program decrypts behavior based on Secret sharing techniques with the account book of specification block catenary system, realizes to block The strick precaution of the insincere malicious behaviors of nodes leakage account book privacy behavior of chain, Secret sharing techniques, intelligence are utilized in conjunction with block catenary system characteristic It can secure storage and management of the contract technology with common recognition protocol realization user key.
Privacy can be obtained under the premise of ensureing account book security of private data using the block catenary system of the technical program For data information to improve the availability of account book information, the subsequent expansion of block chain functionally is realized in help.Block catenary system simultaneously It is stored again after dividing user key using Secret sharing techniques, ensure that and surprisingly revealed the one of user key even if respective nodes Part will not cause the leakage of entire user key.Only after each node of block catenary system reaches decryption common recognition, block chain System can just merge each key part after segmentation, obtain decryption key decryption block account book information.Account book decrypting process according to The control, it can be achieved that account book decrypting process and account book information flow direction is executed automatically by intelligent contract code.The technical program profit It solves the problems, such as user key secure storage with Secret sharing techniques, and effectively prevents Partial Block chain node reconciliation sheet The unexpected leakage behavior of private data has ensured the safety of user key storage and has enhanced the credible journey of block catenary system Degree.
It the key problem in technology point of the present invention and is intended to protect and includes a little:It is realized based on privacy sharing combination block chain intelligence contract close Key management;The safety encryption storage of distributed data is realized based on privacy sharing;It is known together and is assisted based on privacy sharing combination block chain View realizes the secret protection of block chain account book data.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification, It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to preferably explain the present invention Principle and practical application, to enable skilled artisan to be best understood by and utilize the present invention.The present invention is only It is limited by claims and its full scope and equivalent.

Claims (6)

1. a kind of block chain based on privacy sharing encrypts account book, which is characterized in that enter comprising key management module, encryption data Chain module, account book deciphering module;
Wherein, the key management module is responsible for the registration of user and key generates, and utilizes (k, n) threshold secret sharing scheme real The segmentation of existing key is responsible for key information after collaboration storage is divided by each node of block chain, and each node can only be grasped imperfect Key information;
The encryption data enter chain module be responsible for handle user upload request of data, by signature verification by user encryption number According in storage to block chain account book;
The account book deciphering module is responsible for handling account book decoding request, only after block chain node reaches decryption common recognition, ability Decruption key is synthesized, the decryption to encrypting account book is completed.
2. a kind of block chain based on privacy sharing according to claim 1 encrypts account book, which is characterized in that the block chain Encryption account book needs installing the closely sealed about code of private key segmentation contract code reconciliation for realizing Secret sharing techniques in advance Block chain environment in realize;Meanwhile block catenary system must fulfil agreing on for decryption common recognition agreement ahead of schedule.
3. a kind of block chain based on privacy sharing according to claim 1 encrypts account book, which is characterized in that the key Management module generates a pair of public and private key using the close SM2 algorithms of state, and a symmetric key, the public and private key are generated with the close SM4 algorithms of state Pair and symmetric key be sent to user;At the same time, client public key information is disclosed in block catenary system;User may be selected to make Symmetric key encryption private data is utilized with symmetric cryptography mode, asymmetric encryption mode also may be selected and encrypt private data, together When signed to private data using digital signature technology using private key.
4. a kind of block chain based on privacy sharing according to claim 3 encrypts account book, which is characterized in that the block Catenary system can be by triggering the Secret splitting contract code based on Secret sharing techniques, and segmentation decryption key information is to realize key Secure storage;If user's selection encrypts user data using asymmetric encryption techniques, private key for user is divided into one by one Incomplete secure store is in block catenary system;If user's selection encrypts user data using symmetric cryptosystem, will use The symmetric key at family be divided into one by one incomplete secure store in block catenary system;Point that block catenary system passes through key It cuts to realize that privacy sharing, each block chain node are only responsible for one incomplete key of storage.
5. a kind of block chain based on privacy sharing according to claim 1 encrypts account book, which is characterized in that the encryption Data enter in chain module, and user can use his selected cipher mode encryption data in advance, and be using digital signature technology Encryption data addition signature, is then uploaded to block catenary system by encryption data again;Each node of block catenary system receives encryption number According to, by disclosed in block catenary system client public key Information Authentication signature after, encryption data is stored into block chain account book.
6. a kind of block chain based on privacy sharing according to claim 1 encrypts account book, which is characterized in that the account book Deciphering module realizes the synthesis of decruption key based on Secret sharing techniques in decrypting contract code;When block catenary system executes solution After close common recognition agreement reaches decryption common recognition, system is by triggering the decryption contract code recovery key of block catenary system and completing number According to secure decryption process.
CN201810491417.0A 2018-05-21 2018-05-21 Block chain encrypted account book based on secret sharing Active CN108809652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810491417.0A CN108809652B (en) 2018-05-21 2018-05-21 Block chain encrypted account book based on secret sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810491417.0A CN108809652B (en) 2018-05-21 2018-05-21 Block chain encrypted account book based on secret sharing

Publications (2)

Publication Number Publication Date
CN108809652A true CN108809652A (en) 2018-11-13
CN108809652B CN108809652B (en) 2021-07-23

Family

ID=64091328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810491417.0A Active CN108809652B (en) 2018-05-21 2018-05-21 Block chain encrypted account book based on secret sharing

Country Status (1)

Country Link
CN (1) CN108809652B (en)

Cited By (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109672529A (en) * 2019-01-07 2019-04-23 苏宁易购集团股份有限公司 A kind of method and system for going anonymization of combination block chain and privacy sharing
CN109687979A (en) * 2019-03-06 2019-04-26 郑州师范学院 A kind of ring signatures method, apparatus, equipment and medium
CN109697365A (en) * 2018-12-20 2019-04-30 深圳市元征科技股份有限公司 Information processing method and block chain node, electronic equipment
CN109728910A (en) * 2018-12-27 2019-05-07 北京永恒纪元科技有限公司 A kind of efficient thresholding distribution elliptic curve key generates and endorsement method and system
CN109951453A (en) * 2019-02-26 2019-06-28 符安文 A kind of safe encryption method based on block chain
CN110058820A (en) * 2019-04-23 2019-07-26 武汉汇迪森信息技术有限公司 Data safety write-in, deletion, read method and device based on Solid-state disc array
CN110162996A (en) * 2019-04-23 2019-08-23 上海链度科技有限公司 Ballot system, method and voting terminal based on block chain
CN110189143A (en) * 2019-04-26 2019-08-30 华中科技大学 A kind of marketing authenticity tag verification method and system based on block chain
CN110430039A (en) * 2019-07-19 2019-11-08 瑞纳智能设备股份有限公司 A kind of production management system and method based on block chain
CN110445845A (en) * 2019-07-17 2019-11-12 苏州同济区块链研究院有限公司 It is a kind of distribution account book in the system architecture based on boss's account book
CN110555783A (en) * 2019-07-18 2019-12-10 中国南方电网有限责任公司 block chain-based power marketing data protection method and system
CN110971390A (en) * 2019-11-29 2020-04-07 杭州云象网络技术有限公司 Fully homomorphic encryption method for intelligent contract privacy protection
CN111159306A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Information publishing method and device based on block chain and computer equipment
CN111277412A (en) * 2020-02-18 2020-06-12 暨南大学 Data security sharing system and method based on block chain key distribution
CN111368309A (en) * 2018-12-26 2020-07-03 阿里巴巴集团控股有限公司 Information processing method, system and equipment
CN111435241A (en) * 2019-01-15 2020-07-21 费希尔-罗斯蒙特系统公司 Machine-to-machine transactions using distributed ledgers in a process control system
CN111460468A (en) * 2020-02-27 2020-07-28 山东公链信息科技有限公司 Block chain encryption and decryption method and system based on fault-tolerant mechanism
CN111586011A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Information sharing method and device
CN111698198A (en) * 2019-03-13 2020-09-22 国际商业机器公司 Secret generation and share distribution
CN111858519A (en) * 2020-07-10 2020-10-30 北京远景视点科技有限公司 System and method for sharing confidential data on block chain
CN111865988A (en) * 2020-07-22 2020-10-30 山东华普信息科技有限公司 Certificate-free key management method, system and terminal based on block chain
WO2020258125A1 (en) * 2019-06-27 2020-12-30 云图有限公司 Private key recovery method and apparatus, collaborative address creation method and apparatus, collaborative address signing method and apparatus, and storage medium
CN112241553A (en) * 2020-10-27 2021-01-19 上海万向区块链股份公司 Block chain privacy protection method and system based on multi-account book architecture
CN112287392A (en) * 2020-11-23 2021-01-29 广东科学技术职业学院 Intelligent contract implementation method and system with privacy information protection function
CN112398648A (en) * 2020-11-05 2021-02-23 华控清交信息科技(北京)有限公司 Key management method and device for key management
CN112437089A (en) * 2020-11-26 2021-03-02 交控科技股份有限公司 Train control system key management method and device based on block chain
CN112507021A (en) * 2020-11-23 2021-03-16 厦门产业技术研究院 Block chain-based electronic contract management method and device and equipment
CN112511515A (en) * 2020-11-19 2021-03-16 成都无右区块链科技有限公司 Chain number cube for data chaining
CN112529573A (en) * 2020-08-31 2021-03-19 上海添玑网络服务有限公司 Combined block chain threshold signature method and system
CN112685760A (en) * 2021-01-08 2021-04-20 浙江泰科数联信息技术有限公司 Financial data privacy processing and sharing method capable of authorizing on block chain
CN112818061A (en) * 2021-02-02 2021-05-18 中国工商银行股份有限公司 Unstructured data storage method and block chain system
CN112927080A (en) * 2021-03-05 2021-06-08 广东电网有限责任公司 Block chain technology-based multi-party information sharing method for power industry
CN112966022A (en) * 2021-03-10 2021-06-15 安徽航天信息科技有限公司 Information query method, device and system for data transaction platform
CN112989321A (en) * 2021-03-02 2021-06-18 北京思特奇信息技术股份有限公司 Secret sharing algorithm-based key management method and system
CN113094731A (en) * 2021-04-15 2021-07-09 西南大学 Block chain privacy protection method based on different distribution recombination scheme
CN113098697A (en) * 2021-06-08 2021-07-09 清华大学 Block chain data writing and accessing method and device
CN113259124A (en) * 2021-06-08 2021-08-13 清华大学 Block chain data writing and accessing method and device
TWI737956B (en) * 2019-01-14 2021-09-01 開曼群島商現代財富控股有限公司 Threshold signature system based on secret sharing and method thereof
CN113364576A (en) * 2021-05-28 2021-09-07 湘潭大学 Data encryption evidence storing and sharing method based on block chain
CN113438205A (en) * 2021-05-31 2021-09-24 东软集团股份有限公司 Block chain data access control method, node and system
CN113536388A (en) * 2020-04-16 2021-10-22 中移物联网有限公司 Data sharing method and system based on block chain
CN113656828A (en) * 2021-07-20 2021-11-16 北京理工大学 Block chain privacy protection method based on lattice code and oriented to financial system transaction
CN113946878A (en) * 2021-10-15 2022-01-18 星矿科技(北京)有限公司 Accounting method
CN115051853A (en) * 2022-06-10 2022-09-13 广东技术师范大学 Digital collection platform system
CN117353919A (en) * 2023-12-01 2024-01-05 卓望数码技术(深圳)有限公司 Data security storage method and system based on secret key sharing algorithm

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170083860A1 (en) * 2015-02-26 2017-03-23 Skuchain, Inc. Tracking unitization occurring in a supply chain
CN106548345A (en) * 2016-12-07 2017-03-29 北京信任度科技有限公司 The method and system of block chain private key protection are realized based on Secret splitting
CN106982205A (en) * 2017-03-01 2017-07-25 中钞信用卡产业发展有限公司北京智能卡技术研究院 Digital asset treating method and apparatus based on block chain
CN107623569A (en) * 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 Block chain key escrow and restoration methods, device based on Secret sharing techniques
CN107666388A (en) * 2016-07-28 2018-02-06 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170083860A1 (en) * 2015-02-26 2017-03-23 Skuchain, Inc. Tracking unitization occurring in a supply chain
CN107666388A (en) * 2016-07-28 2018-02-06 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
CN106548345A (en) * 2016-12-07 2017-03-29 北京信任度科技有限公司 The method and system of block chain private key protection are realized based on Secret splitting
CN106982205A (en) * 2017-03-01 2017-07-25 中钞信用卡产业发展有限公司北京智能卡技术研究院 Digital asset treating method and apparatus based on block chain
CN107623569A (en) * 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 Block chain key escrow and restoration methods, device based on Secret sharing techniques

Cited By (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109697365A (en) * 2018-12-20 2019-04-30 深圳市元征科技股份有限公司 Information processing method and block chain node, electronic equipment
CN109697365B (en) * 2018-12-20 2023-04-07 深圳市元征科技股份有限公司 Information processing method, block chain node and electronic equipment
CN111368309A (en) * 2018-12-26 2020-07-03 阿里巴巴集团控股有限公司 Information processing method, system and equipment
CN111368309B (en) * 2018-12-26 2024-03-29 阿里巴巴集团控股有限公司 Information processing method, system and equipment
CN109728910A (en) * 2018-12-27 2019-05-07 北京永恒纪元科技有限公司 A kind of efficient thresholding distribution elliptic curve key generates and endorsement method and system
WO2020143246A1 (en) * 2019-01-07 2020-07-16 苏宁云计算有限公司 Method and system for de-anonymization by combining blockchain and secret sharing
CN109672529A (en) * 2019-01-07 2019-04-23 苏宁易购集团股份有限公司 A kind of method and system for going anonymization of combination block chain and privacy sharing
TWI737956B (en) * 2019-01-14 2021-09-01 開曼群島商現代財富控股有限公司 Threshold signature system based on secret sharing and method thereof
CN111435241A (en) * 2019-01-15 2020-07-21 费希尔-罗斯蒙特系统公司 Machine-to-machine transactions using distributed ledgers in a process control system
CN109951453A (en) * 2019-02-26 2019-06-28 符安文 A kind of safe encryption method based on block chain
CN109687979A (en) * 2019-03-06 2019-04-26 郑州师范学院 A kind of ring signatures method, apparatus, equipment and medium
CN111698198A (en) * 2019-03-13 2020-09-22 国际商业机器公司 Secret generation and share distribution
CN110162996A (en) * 2019-04-23 2019-08-23 上海链度科技有限公司 Ballot system, method and voting terminal based on block chain
CN110058820A (en) * 2019-04-23 2019-07-26 武汉汇迪森信息技术有限公司 Data safety write-in, deletion, read method and device based on Solid-state disc array
CN110189143A (en) * 2019-04-26 2019-08-30 华中科技大学 A kind of marketing authenticity tag verification method and system based on block chain
WO2020258125A1 (en) * 2019-06-27 2020-12-30 云图有限公司 Private key recovery method and apparatus, collaborative address creation method and apparatus, collaborative address signing method and apparatus, and storage medium
CN110445845A (en) * 2019-07-17 2019-11-12 苏州同济区块链研究院有限公司 It is a kind of distribution account book in the system architecture based on boss's account book
CN110445845B (en) * 2019-07-17 2021-10-15 苏州同济区块链研究院有限公司 System based on main and sub account books in distributed account book
CN110555783A (en) * 2019-07-18 2019-12-10 中国南方电网有限责任公司 block chain-based power marketing data protection method and system
CN110555783B (en) * 2019-07-18 2023-08-29 中国南方电网有限责任公司 Block chain-based electric power marketing data protection method and system
CN110430039A (en) * 2019-07-19 2019-11-08 瑞纳智能设备股份有限公司 A kind of production management system and method based on block chain
CN110971390A (en) * 2019-11-29 2020-04-07 杭州云象网络技术有限公司 Fully homomorphic encryption method for intelligent contract privacy protection
CN111277412B (en) * 2020-02-18 2023-03-24 暨南大学 Data security sharing system and method based on block chain key distribution
CN111277412A (en) * 2020-02-18 2020-06-12 暨南大学 Data security sharing system and method based on block chain key distribution
CN111460468A (en) * 2020-02-27 2020-07-28 山东公链信息科技有限公司 Block chain encryption and decryption method and system based on fault-tolerant mechanism
CN111159306A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Information publishing method and device based on block chain and computer equipment
WO2021197105A1 (en) * 2020-04-02 2021-10-07 支付宝(杭州)信息技术有限公司 Blockchain-based information release
CN113536388B (en) * 2020-04-16 2023-02-28 中移物联网有限公司 Data sharing method and system based on block chain
CN113536388A (en) * 2020-04-16 2021-10-22 中移物联网有限公司 Data sharing method and system based on block chain
CN111586011A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Information sharing method and device
CN111858519B (en) * 2020-07-10 2023-08-01 北京远景视点科技有限公司 System and method for sharing confidential data on blockchain
CN111858519A (en) * 2020-07-10 2020-10-30 北京远景视点科技有限公司 System and method for sharing confidential data on block chain
CN111865988B (en) * 2020-07-22 2022-10-18 山东华普信息科技有限公司 Certificate-free key management method, system and terminal based on block chain
CN111865988A (en) * 2020-07-22 2020-10-30 山东华普信息科技有限公司 Certificate-free key management method, system and terminal based on block chain
CN112529573A (en) * 2020-08-31 2021-03-19 上海添玑网络服务有限公司 Combined block chain threshold signature method and system
CN112241553A (en) * 2020-10-27 2021-01-19 上海万向区块链股份公司 Block chain privacy protection method and system based on multi-account book architecture
CN112398648A (en) * 2020-11-05 2021-02-23 华控清交信息科技(北京)有限公司 Key management method and device for key management
CN112398648B (en) * 2020-11-05 2023-12-29 华控清交信息科技(北京)有限公司 Key management method and device for key management
CN112511515B (en) * 2020-11-19 2023-03-10 成都无右区块链科技有限公司 Chain number cube for data chaining
CN112511515A (en) * 2020-11-19 2021-03-16 成都无右区块链科技有限公司 Chain number cube for data chaining
CN112507021A (en) * 2020-11-23 2021-03-16 厦门产业技术研究院 Block chain-based electronic contract management method and device and equipment
CN112287392A (en) * 2020-11-23 2021-01-29 广东科学技术职业学院 Intelligent contract implementation method and system with privacy information protection function
CN112437089A (en) * 2020-11-26 2021-03-02 交控科技股份有限公司 Train control system key management method and device based on block chain
CN112685760A (en) * 2021-01-08 2021-04-20 浙江泰科数联信息技术有限公司 Financial data privacy processing and sharing method capable of authorizing on block chain
CN112818061A (en) * 2021-02-02 2021-05-18 中国工商银行股份有限公司 Unstructured data storage method and block chain system
CN112989321A (en) * 2021-03-02 2021-06-18 北京思特奇信息技术股份有限公司 Secret sharing algorithm-based key management method and system
CN112927080A (en) * 2021-03-05 2021-06-08 广东电网有限责任公司 Block chain technology-based multi-party information sharing method for power industry
CN112966022B (en) * 2021-03-10 2024-04-05 安徽航天信息科技有限公司 Information query method, device and system of data transaction platform
CN112966022A (en) * 2021-03-10 2021-06-15 安徽航天信息科技有限公司 Information query method, device and system for data transaction platform
CN113094731A (en) * 2021-04-15 2021-07-09 西南大学 Block chain privacy protection method based on different distribution recombination scheme
CN113364576A (en) * 2021-05-28 2021-09-07 湘潭大学 Data encryption evidence storing and sharing method based on block chain
CN113364576B (en) * 2021-05-28 2022-07-22 湘潭大学 Data encryption evidence storing and sharing method based on block chain
CN113438205A (en) * 2021-05-31 2021-09-24 东软集团股份有限公司 Block chain data access control method, node and system
CN113259124A (en) * 2021-06-08 2021-08-13 清华大学 Block chain data writing and accessing method and device
CN113098697A (en) * 2021-06-08 2021-07-09 清华大学 Block chain data writing and accessing method and device
CN113656828A (en) * 2021-07-20 2021-11-16 北京理工大学 Block chain privacy protection method based on lattice code and oriented to financial system transaction
CN113946878A (en) * 2021-10-15 2022-01-18 星矿科技(北京)有限公司 Accounting method
CN113946878B (en) * 2021-10-15 2024-04-09 星矿科技(北京)有限公司 Accounting method
CN115051853B (en) * 2022-06-10 2023-07-21 广东技术师范大学 Digital collection platform system
CN115051853A (en) * 2022-06-10 2022-09-13 广东技术师范大学 Digital collection platform system
CN117353919A (en) * 2023-12-01 2024-01-05 卓望数码技术(深圳)有限公司 Data security storage method and system based on secret key sharing algorithm
CN117353919B (en) * 2023-12-01 2024-03-26 卓望数码技术(深圳)有限公司 Data security storage method and system based on secret key sharing algorithm

Also Published As

Publication number Publication date
CN108809652B (en) 2021-07-23

Similar Documents

Publication Publication Date Title
CN108809652A (en) A kind of block chain encryption account book based on privacy sharing
EP3862956B1 (en) Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
US10785019B2 (en) Data transmission method and apparatus
US10979221B2 (en) Generation of keys of variable length from cryptographic tables
CN107086915B (en) Data transmission method, data sending end and data receiving end
CN107040369A (en) Data transmission method, apparatus and system
US20110145576A1 (en) Secure method of data transmission and encryption and decryption system allowing such transmission
CN110289968B (en) Private key recovery method, collaborative address creation method, collaborative address signature device and storage medium
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN111431897B (en) Multi-attribute mechanism attribute-based encryption method with tracking function for cloud-assisted Internet of things
CN112367170B (en) Data hiding query security sharing system and method based on multi-party security calculation
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
NO20093259A1 (en) encryption
CN109831430A (en) Safely controllable efficient data sharing method and system under a kind of cloud computing environment
CN111541725A (en) Block chain all-in-one machine, password acceleration card thereof, and key management method and device
CN108768647B (en) Random number generation method for block chain
JP2016158189A (en) Change direction with key control system and change direction with key control method
CN104158880A (en) User-end cloud data sharing solution
CN112740615A (en) Multi-party computed key management
CA3056814A1 (en) Symmetric cryptographic method and system and applications thereof
Li et al. Privacy-aware secure anonymous communication protocol in CPSS cloud computing
CN110716724B (en) Method and device for realizing privacy block chain based on FPGA
CN109347923A (en) Anti- quantum calculation cloud storage method and system based on unsymmetrical key pond
US11563566B2 (en) Key splitting
Sharma et al. Analysis of AES Encryption with ECC

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant