CN108809652A - A kind of block chain encryption account book based on privacy sharing - Google Patents
A kind of block chain encryption account book based on privacy sharing Download PDFInfo
- Publication number
- CN108809652A CN108809652A CN201810491417.0A CN201810491417A CN108809652A CN 108809652 A CN108809652 A CN 108809652A CN 201810491417 A CN201810491417 A CN 201810491417A CN 108809652 A CN108809652 A CN 108809652A
- Authority
- CN
- China
- Prior art keywords
- key
- account book
- block chain
- data
- user
- Prior art date
Links
- 238000000034 methods Methods 0.000 claims abstract description 39
- 230000011218 segmentation Effects 0.000 claims abstract description 16
- 230000002194 synthesizing Effects 0.000 claims description 5
- 230000015572 biosynthetic process Effects 0.000 claims description 4
- 238000003786 synthesis reactions Methods 0.000 claims description 4
- 230000002708 enhancing Effects 0.000 abstract 1
- 230000006399 behavior Effects 0.000 description 9
- 230000000694 effects Effects 0.000 description 3
- 280000012370 Confidential companies 0.000 description 2
- 230000000875 corresponding Effects 0.000 description 2
- 230000001154 acute Effects 0.000 description 1
- 230000001427 coherent Effects 0.000 description 1
- 230000001419 dependent Effects 0.000 description 1
- 239000011159 matrix materials Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006011 modification reactions Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Abstract
Description
Technical field
The invention belongs to block chain technical fields, are related to a kind of block chain encryption account book based on privacy sharing.
Background technology
" block chain " technology is designed by a kind of artificial bit coin (digital cash) of this acute hearing in an assumed name A kind of special database technology, from the perspective of data:Block chain is a kind of distributed data base (or for distribution Shared general ledger), " distribution " here is not only presented as the distributed storage of data, is also embodied in the distributed recording of data (being safeguarded come collective by system participant).Briefly, block chain can realize that the distributed recording of global metadata information (can be with Recorded by system participant collective, rather than by the mechanism centralized recording of a centralization) (data can be stored with distributed storage It in all nodes for participating in record data, rather than is centrally stored in the agency node of centralization).
From the perspective of effect:Block chain can generate a set of record time order and function, can not distorting, trusty Database, this sets of data library is decentralization storage and data safety can be effectively ensured.In short, block chain is Data structure a kind of that related data is stored in block, that block is combined in a manner of chain, it is suitble to storage letter Data single, having precedence relationship, being verified in system, with cryptography ensure that data can not distort and can not be pseudo- It makes.It can make participant build a consensus the event sequence and current state of the whole network transaction record.
The key point that block chain technology is related to includes:Trust, collective's maintenance, authentic data library, time are gone in decentralization Stamp, asymmetric encryption etc..In systems, participant, also need not be by third party's machine without understanding other people background information The guarantee or guarantee of structure, block chain technical guarantee system record the activity of value Transfer, are transmitted, are stored, last Result must be believable.
The source of block chain technical principle can be summarized as a mathematical problem:Byzantium's general's problem, intension can be summarized For:In the case where lacking central node trusty and channel trusty, each node being distributed in a network should be how Reach common understanding.Block chain technology is solves the problems, such as that it is a kind of without trusting individual node, can also create common recognition network that this is provided Method (common recognition protocol technology).Therefore the core of block chain Technology design is:
One:How a rigorous database is established so that the database can store the information of lower magnanimity, while again can Ensure the integrality of database under the system of not centralized architecture?
Two:How to record and store down this rigorous database so that even if the certain nodes for participating in data record collapse It bursts, we still can guarantee that the normal operation of entire Database Systems and information are complete?
Three:The database that this rigorous and full storage gets off how is set to become believable so that we can lack Successfully prevent node from doing evil under the block chain environment of trust?
For these three core points, a whole set of complete, coherent database technology of block chain building carrys out reached purpose, Solve the problems, such as that the technology of these three also becomes three most crucial big technologies of block chain.
But exactly because block chain is a public database, the record in each account is disclosed.It is such It is open and clear to bring prodigious data-privacy problem, by taking assets transaction application scene as an example:When you accuse your account address When knowing counterpart, other side can pass through all assets and historical trading in block chain query to this account.
To realize that data safety storage needs first to be distinguish the data type stored in block chain, different types of data Required encryption storage strategy is different:(1) structureless the logical operations such as validation verification need not be carried out for those Data are encrypted data after shared key between data related side;(2) those are needed to carry out validation verification It is (such as common transaction data) and more complicated, need to carry out (e.g., triggering for certain logical operation using the data The transaction data that intelligent contract executes), then it also needs to utilize some other cryptography tools.
The trust problem of block chain node is also to need the great difficult problem solved during system design is realized, one to making Disliking node does not have the block catenary system of Precaution Tactics can not safe handling.In addition, how effectively to store the privacy letter of user Breath is not also what block catenary system must take into consideration by unexpected leakage.The technical program is the trust problem solved between block chain node A kind of block chain encryption account book technology based on privacy sharing is proposed with privacy information secure storage problem.The account book of block chain It is stored after information encryption, single node can not decrypt account book by the key information after segmentation, only decrypt demand by all areas Decruption key can be just synthesized after block catenary system node common recognition, which solves the decruption key bursting tube in key management Reason problem.Block chain node will be transferred to store respectively after Secret splitting by Secret sharing techniques, effectively prevent storing in system The hidden danger that is leaked of key.Moreover, account book decrypting process triggers intelligent contract after decryption common recognition is reached and executes automatically It completes, account book flows to fully controllable after account book decrypting process may be implemented and decrypt.
End to End Encryption:Block chain based on End to End Encryption technology encrypts account book
Encipherment protection is that cryptographic algorithm, reconciliation notebook data is utilized to be encrypted, and realizes and only has related side that can decrypt Check encryption data.It not only needs that account book storage is encrypted in block catenary system, account book transmit process is also required to encrypt. Therefore only accomplish that end to end security is only safely and effectively.If completing encryption dependent on platform or intermediate node, these sections Point can obtain private data.
Corresponding Encryption Algorithm include symmetric cryptography (such as:AES256, SM4) and asymmetric encryption is (such as:RSA2048, SM2).Symmetric cryptography speed is fast, but relatively easily cracks, and rivest, shamir, adelman is then opposite.So general in practical application Symmetric cryptography and rivest, shamir, adelman can be used in combination.Digital envelope is exactly one of example, it leads to symmetric key Cross asymmetric encryption (i.e.:Have public key and private key two) result distribution symmetric key method, can solve a secret Multiple analogues are given in data sharing, accomplish that only these opponents can decrypt and check, other people can not know data clear text.
Disadvantage:1. if key is abused by other people, data-privacy if, does not know where to begin, and lacks the guarantor of the safety to key Barrier.2. though realize the secret protection of data on chain, it can cause block chain node that can not be directed to the encryption data and carry out logic Operation.
Homomorphic cryptography:Block chain based on homomorphic cryptography technology encrypts account book
Homomorphic cryptography is the cryptological technique of the computational complexity theory based on difficult math question.To the number Jing Guo homomorphic cryptography According to being handled to obtain an output, this output is decrypted, result handles the original of unencryption with Same Way Output that data obtain is the result is that the same.If a kind of Encryption Algorithm can find corresponding behaviour for multiplication and addition Make, is just called full homomorphic encryption algorithm.
Data upload block catenary system after homomorphic cryptography, and user is only by encryption data external disclosure so that block chain Though node cannot obtain specific data content, the simple logic processing to data can be realized.
Disadvantage:Until there is presently no real available full homomorphic encryption algorithms.Block account book data after homomorphic cryptography, Block catenary system can only realize that simple logical process, block catenary system can not obtain data particular content, nothing to encryption data Method provides the service of higher logical requirements for block catenary system user.
Invention content
The purpose of the present invention is to provide a kind of, and the block chain based on privacy sharing encrypts account book.
The technical problems to be solved by the invention include:
1. preventing the malicious decryption behavior that single block chain node is directed to account book data, to protect user secret.Block chain System only after all chain nodes reach decryption common recognition, could successfully synthesize decruption key, decrypt account book data.
2. under the premise of ensureing user data privacy, the availability of block chain encryption account book data is improved.
3. while improving account book availability of data, the safety of user key storage is improved.
The purpose of the present invention can be achieved through the following technical solutions:
A kind of block chain encryption account book based on privacy sharing, including key management module, encryption data enter chain module, account This deciphering module;
Wherein, the key management module is responsible for the registration of user and key generates, and utilizes the threshold secret sharing side (k, n) Case realizes the segmentation of key, is responsible for key information after collaboration storage is divided by each node of block chain, each node can only be grasped not Complete key information;
The encryption data enter chain module be responsible for handle user upload request of data, by signature verification by user add In ciphertext data storage to block chain account book;
The account book deciphering module is responsible for handling account book decoding request, only after block chain node reaches decryption common recognition, Decruption key could be synthesized, the decryption to encrypting account book is completed.
Block chain encryption account book needs installing the private key segmentation contract generation for realizing Secret sharing techniques in advance It is realized in the block chain environment of the closely sealed about code of code reconciliation;Meanwhile block catenary system must fulfil decryption common recognition agreement ahead of schedule It agrees on.
The key management module generates a pair of public and private key using the close SM2 algorithms of state, right with the close SM4 algorithms generation one of state Claim key, the public private key pair and symmetric key are sent to user;At the same time, client public key letter is disclosed in block catenary system Breath;User may be selected to utilize symmetric key encryption private data using symmetric cryptography mode, and asymmetric encryption mode also may be selected Private data is encrypted, while being signed to private data using digital signature technology using private key.
The block catenary system can be by triggering the Secret splitting contract code based on Secret sharing techniques, and segmentation decryption is close Key information is to realize the secure storage of key;If user's selection encrypts user data using asymmetric encryption techniques, by user Private key be divided into one by one incomplete secure store in block catenary system;If user's selection is encrypted using symmetric cryptosystem User data, then by the symmetric key of user be divided into one by one incomplete secure store in block catenary system;Block chain System is by the segmentation of key to realize that privacy sharing, each block chain node are only responsible for one incomplete key of storage.
The encryption data enters in chain module, and user can use his selected cipher mode encryption data, and profit in advance It is encryption data addition signature with digital signature technology, encryption data is then uploaded to block catenary system again;Block catenary system Each node receives encryption data, and after client public key Information Authentication signature disclosed in block catenary system, encryption data is deposited In storage to block chain account book.
The account book deciphering module realizes the synthesis of decruption key based on Secret sharing techniques in decrypting contract code;When Block catenary system execute decryption common recognition agreement reach decryption common recognition after, system pass through trigger block catenary system decryption contract code Restore key and completes the secure decryption process of data.
Beneficial effects of the present invention:
The present invention is based on Secret sharing techniques to decrypt behavior with the account book of specification block catenary system, realizes to block chain not Trusted node malice reveals the strick precaution of account book privacy behavior, is closed using Secret sharing techniques, intelligence in conjunction with block catenary system characteristic The about secure storage and management of technology and common recognition protocol realization user key;
Private data information can be obtained to improve account under the premise of ensureing account book security of private data using the present invention The subsequent expansion of block chain functionally is realized in the availability of this information, help;Block catenary system utilizes Secret sharing techniques simultaneously It is stored again after segmentation user key, ensure that the part for surprisingly having revealed user key even if respective nodes, will not cause The leakage of entire user key;Only after each node of block catenary system reaches decryption common recognition, block catenary system can just merge point Each key part after cutting obtains decryption key decryption block account book information;Account book decrypting process is by intelligent contract code It is automatic to execute the control, it can be achieved that account book decrypting process and account book information flow direction;
The present invention solves the problems, such as user key secure storage using Secret sharing techniques, and effectively prevents part The unexpected leakage behavior of this private data of block chain node reconciliation has ensured the safety of user key storage and has enhanced block The credibility of catenary system.
Description of the drawings
In order to facilitate the understanding of those skilled in the art, the present invention will be further described below with reference to the drawings.
Fig. 1 is the structure chart that a kind of block chain based on privacy sharing of the present invention encrypts account book;
Fig. 2 is the flow chart of key management module of the present invention;
Fig. 3 is key management information flow graph of the present invention;
Fig. 4 is the flow chart that encryption data of the present invention enters chain module;
Fig. 5 is that encryption data of the present invention enters chain information flow graph;
Fig. 6 is the flow chart of account deciphering module of the present invention;
Fig. 7 is that account book of the present invention decrypts information flow direction figure;
Fig. 8 is account book solution confidential information detailed maps of the present invention.
Specific implementation mode
Technical scheme of the present invention is clearly and completely described below in conjunction with embodiment, it is clear that described reality It is only a part of the embodiment of the present invention to apply example, instead of all the embodiments.Based on the embodiments of the present invention, this field is general All other embodiment that logical technical staff is obtained without creative efforts belongs to what the present invention protected Range.
A kind of block chain encryption account book based on privacy sharing, needs to install for realizing Secret sharing techniques in advance Private key segmentation contract code conciliate in the block chain environment of closely sealed about code and realize.Meanwhile block catenary system must be complete in advance At agreing on for decryption common recognition agreement.The technical program includes key management module, encryption data enters chain module, account book is decrypted Module.Fig. 1 is the block chain encryption account book system structure based on privacy sharing.
Wherein, key management module is responsible for the registration of user and key generates, and key is realized using Secret sharing techniques Segmentation is responsible for key information after collaboration storage is divided by each node of block chain, and each node can only grasp incomplete key letter Breath;Specific key management flow is shown in Fig. 2.
The realization of Secret splitting uses (k, n) threshold secret sharing scheme in key management module, there is following two thresholdings Secret sharing scheme is available:
1) threshold secret sharing scheme of Shamir
Realize that (k, n) threshold secret sharing scheme, the program are specifically made of following three phases using polynomial interopolation:
(1) initial phase.Select finite field FqIf participant's collection is combined into P={ P1, P2..., Pn, k is threshold value, close Key information [s ∈ Fq].Select [Fq] on n mutually different nonzero element x1, x2..., xn, these elements are disclosed.
(2) the privacy sharing stage.Randomly choose FqOn k-1 order polynomials [g (x)=a0+a1x+ ...+ak-1xk-1 ,] Wherein a0=s, remaining ai it is random be selected from Fq.[si=g (xi), i=1,2 ..., n ,] is calculated separately by (xi, si) conduct Sub-secret is distributed to member Pi。
(3) the secret reconstruction stage.The sub-secret that arbitrary k member can be held is shared, and Lagrange is passed through Interpolation formula recovers secret information s.
2) Blakley threshold secret sharing schemes
The program realizes the scheme of another (k, n) threshold secret sharing using geometry method.Its basic thought is Key value regards the point in a k dimension space as, and the sub-secret for being distributed to different participants is different k-1 n-dimensional subspace ns, when k When participant shares its sub-secret, the only intersection point of these subspaces can be obtained, to obtain key value.Specifically retouch It states as follows:
(1) initial phase.Select finite field FqIf participant's collection is combined into P={ P1, P2..., Pn, k is threshold value, secret Confidential information [s ∈ Fq].Select FqOn k member systems of linear equations be:
a11x1+a12x2+…a1kxk=b1a21x1+a22x2+…a2kxk=b2…an1x1+an2x2+…ankxk=bn
Equation group can be denoted as [AX=B], and when selection matrix [A] needs to meet two conditions:The arbitrary k lines of [A] It is unrelated;Secret value s is the solution of the above system of linear equations.
(2) the privacy sharing stage.Each equation is considered as the subspace of k-1 dimensions, is each block chain link Point distributes such a equation.
(3) the secret reconstruction stage.The k member systems of linear equations of a full rank can be obtained when wherein k node simultaneous equations, Therefore only value can be solved, obtains secret value s.If being less than k equations simultaneousness, it is unable to get only solution.
The key generated after user registration success is divided into multiple secrets, and the secret after these segmentations is distributed to block In chain node, key management information flow direction is shown in Fig. 3.
Encryption data enter chain module be responsible for handle user upload request of data, by signature verification by user encryption number According in storage to block chain account book, specific data enter chain flow and see Fig. 4.
Encryption data enters chain module and receives the encryption data that user is transmitted, and the upload data being verified are stored in block In chain account book, data enter chain information flow direction and see Fig. 5.
Account book deciphering module is responsible for handling account book decoding request, only after block chain node reaches decryption common recognition, ability Decruption key is synthesized, the decryption to encrypting account book is completed, specific account book decryption flow is shown in Fig. 6.
Account book deciphering module receiving and deciphering asks and common recognition result is sent to key management module, after chain node will be divided Key is sent to key management module for synthesizing decruption key;It is sent to account book deciphering module after decruption key synthesis, it is complete At the decryption of account book data, account book decryption information flow direction is shown in Fig. 7, Fig. 8.
Key management module is based on cryptological technique and generates a pair of public and private key and a symmetric key, the public private key pair and right Key is claimed to be sent to user.At the same time, client public key information is disclosed in block catenary system.User may be selected using symmetrical Cipher mode utilizes symmetric key encryption private data, and asymmetric encryption mode also may be selected and encrypt private data, use simultaneously Private key signs to private data using digital signature technology.
Block catenary system can be by triggering the Secret splitting contract code based on Secret sharing techniques, segmentation decruption key letter Breath is to realize the secure storage of key.If user's selection encrypts user data using asymmetric encryption techniques, by private key for user Be divided into one by one incomplete secure store in block catenary system;If user's selection encrypts user using symmetric cryptosystem Data, then by the symmetric key of user be divided into one by one incomplete secure store in block catenary system.Block catenary system By the segmentation of key to realize that privacy sharing, each block chain node are only responsible for one incomplete key of storage.
Encryption data enters in chain module, and user can use his selected cipher mode encryption data in advance, and utilize number Word signature technology is encryption data addition signature, and encryption data is then uploaded to block catenary system again.Block catenary system respectively saves Point receive encryption data, by disclosed in block catenary system client public key Information Authentication signature after, by encryption data store to In block chain account book.
Account book deciphering module realizes the synthesis of decruption key based on Secret sharing techniques in decrypting contract code.Work as block After catenary system execution decryption common recognition agreement reaches decryption common recognition, system is restored by the decryption contract code of triggering block catenary system Key and the secure decryption process for completing data.Therefore any decoding request without block catenary system common recognition will not be allowed to, It ensure that the privacy of encryption account book data, and the decrypting process for executing using intelligent contract technology account book automatically can be effective Control account book decrypting process and account book flow direction.
The technical program decrypts behavior based on Secret sharing techniques with the account book of specification block catenary system, realizes to block The strick precaution of the insincere malicious behaviors of nodes leakage account book privacy behavior of chain, Secret sharing techniques, intelligence are utilized in conjunction with block catenary system characteristic It can secure storage and management of the contract technology with common recognition protocol realization user key.
Privacy can be obtained under the premise of ensureing account book security of private data using the block catenary system of the technical program For data information to improve the availability of account book information, the subsequent expansion of block chain functionally is realized in help.Block catenary system simultaneously It is stored again after dividing user key using Secret sharing techniques, ensure that and surprisingly revealed the one of user key even if respective nodes Part will not cause the leakage of entire user key.Only after each node of block catenary system reaches decryption common recognition, block chain System can just merge each key part after segmentation, obtain decryption key decryption block account book information.Account book decrypting process according to The control, it can be achieved that account book decrypting process and account book information flow direction is executed automatically by intelligent contract code.The technical program profit It solves the problems, such as user key secure storage with Secret sharing techniques, and effectively prevents Partial Block chain node reconciliation sheet The unexpected leakage behavior of private data has ensured the safety of user key storage and has enhanced the credible journey of block catenary system Degree.
It the key problem in technology point of the present invention and is intended to protect and includes a little:It is realized based on privacy sharing combination block chain intelligence contract close Key management;The safety encryption storage of distributed data is realized based on privacy sharing;It is known together and is assisted based on privacy sharing combination block chain View realizes the secret protection of block chain account book data.
Present invention disclosed above preferred embodiment is only intended to help to illustrate the present invention.There is no detailed for preferred embodiment All details are described, are not limited the invention to the specific embodiments described.Obviously, according to the content of this specification, It can make many modifications and variations.These embodiments are chosen and specifically described to this specification, is in order to preferably explain the present invention Principle and practical application, to enable skilled artisan to be best understood by and utilize the present invention.The present invention is only It is limited by claims and its full scope and equivalent.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810491417.0A CN108809652A (en) | 2018-05-21 | 2018-05-21 | A kind of block chain encryption account book based on privacy sharing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810491417.0A CN108809652A (en) | 2018-05-21 | 2018-05-21 | A kind of block chain encryption account book based on privacy sharing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108809652A true CN108809652A (en) | 2018-11-13 |
Family
ID=64091328
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810491417.0A CN108809652A (en) | 2018-05-21 | 2018-05-21 | A kind of block chain encryption account book based on privacy sharing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108809652A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109672529A (en) * | 2019-01-07 | 2019-04-23 | 苏宁易购集团股份有限公司 | A kind of method and system for going anonymization of combination block chain and privacy sharing |
CN109951453A (en) * | 2019-02-26 | 2019-06-28 | 符安文 | A kind of safe encryption method based on block chain |
CN110162996A (en) * | 2019-04-23 | 2019-08-23 | 上海链度科技有限公司 | Ballot system, method and voting terminal based on block chain |
CN111159306A (en) * | 2020-04-02 | 2020-05-15 | 支付宝(杭州)信息技术有限公司 | Information publishing method and device based on block chain and computer equipment |
WO2020258125A1 (en) * | 2019-06-27 | 2020-12-30 | 云图有限公司 | Private key recovery method and apparatus, collaborative address creation method and apparatus, collaborative address signing method and apparatus, and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170083860A1 (en) * | 2015-02-26 | 2017-03-23 | Skuchain, Inc. | Tracking unitization occurring in a supply chain |
CN106548345A (en) * | 2016-12-07 | 2017-03-29 | 北京信任度科技有限公司 | The method and system of block chain private key protection are realized based on Secret splitting |
CN106982205A (en) * | 2017-03-01 | 2017-07-25 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Digital asset treating method and apparatus based on block chain |
CN107623569A (en) * | 2017-09-30 | 2018-01-23 | 矩阵元技术(深圳)有限公司 | Block chain key escrow and restoration methods, device based on Secret sharing techniques |
CN107666388A (en) * | 2016-07-28 | 2018-02-06 | 郑珂威 | Block chain information encryption method based on complete homomorphic cryptography method |
-
2018
- 2018-05-21 CN CN201810491417.0A patent/CN108809652A/en active Search and Examination
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170083860A1 (en) * | 2015-02-26 | 2017-03-23 | Skuchain, Inc. | Tracking unitization occurring in a supply chain |
CN107666388A (en) * | 2016-07-28 | 2018-02-06 | 郑珂威 | Block chain information encryption method based on complete homomorphic cryptography method |
CN106548345A (en) * | 2016-12-07 | 2017-03-29 | 北京信任度科技有限公司 | The method and system of block chain private key protection are realized based on Secret splitting |
CN106982205A (en) * | 2017-03-01 | 2017-07-25 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Digital asset treating method and apparatus based on block chain |
CN107623569A (en) * | 2017-09-30 | 2018-01-23 | 矩阵元技术(深圳)有限公司 | Block chain key escrow and restoration methods, device based on Secret sharing techniques |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109672529A (en) * | 2019-01-07 | 2019-04-23 | 苏宁易购集团股份有限公司 | A kind of method and system for going anonymization of combination block chain and privacy sharing |
WO2020143246A1 (en) * | 2019-01-07 | 2020-07-16 | 苏宁云计算有限公司 | Method and system for de-anonymization by combining blockchain and secret sharing |
CN109951453A (en) * | 2019-02-26 | 2019-06-28 | 符安文 | A kind of safe encryption method based on block chain |
CN110162996A (en) * | 2019-04-23 | 2019-08-23 | 上海链度科技有限公司 | Ballot system, method and voting terminal based on block chain |
WO2020258125A1 (en) * | 2019-06-27 | 2020-12-30 | 云图有限公司 | Private key recovery method and apparatus, collaborative address creation method and apparatus, collaborative address signing method and apparatus, and storage medium |
CN111159306A (en) * | 2020-04-02 | 2020-05-15 | 支付宝(杭州)信息技术有限公司 | Information publishing method and device based on block chain and computer equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | Beekeeper: A blockchain-based iot system with secure storage and homomorphic computation | |
US10659223B2 (en) | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system | |
Chandra et al. | A comparative survey of symmetric and asymmetric key cryptography | |
Hu et al. | A secure and verifiable access control scheme for big data storage in clouds | |
WO2019120092A1 (en) | Intelligent contract-based data transfer method and system | |
US6240187B1 (en) | Key replacement in a public key cryptosystem | |
CA1292790C (en) | Controlled use of cryptographic keys via generating station establishedcontrol values | |
Ateniese et al. | Improved proxy re-encryption schemes with applications to secure distributed storage | |
Hota et al. | Capability-based cryptographic data access control in cloud computing | |
Tseng et al. | A chaotic maps-based key agreement protocol that preserves user anonymity | |
CN104253694B (en) | A kind of time slot scrambling for network data transmission | |
EP2228942B1 (en) | Securing communications sent by a first user to a second user | |
CN102624522B (en) | A kind of key encryption method based on file attribute | |
RU2175465C2 (en) | Method for crypto key exchange between user's and network computer units | |
CN106911470A (en) | A kind of bit coin transaction privacy Enhancement Method | |
CN104685826B (en) | Method and system for the input consistency desired result of both sides' secure function evaluation | |
TWI706279B (en) | Multi-party safe calculation method and device, electronic equipment | |
CN107251476A (en) | Secret communication is managed | |
CN108292402A (en) | The determination of the public secret of secure exchange for information and level certainty key | |
CN106104562A (en) | Safety of secret data stores and recovery system and method | |
US8855317B2 (en) | System for protecting an encrypted information unit | |
EP2323306A1 (en) | Secured data transmission method and encryption and decryption system enabling such a transmission | |
WO2013026086A1 (en) | Virtual zeroisation system and method | |
CN101447870B (en) | Safe storage method of private key based on technology of distributed password | |
CN102687132A (en) | Trustworthy extensible markup language for trustworthy computing and data services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |