CN108833385A - User data anonymity sharing method based on the encryption of alliance's chain - Google Patents
User data anonymity sharing method based on the encryption of alliance's chain Download PDFInfo
- Publication number
- CN108833385A CN108833385A CN201810555229.XA CN201810555229A CN108833385A CN 108833385 A CN108833385 A CN 108833385A CN 201810555229 A CN201810555229 A CN 201810555229A CN 108833385 A CN108833385 A CN 108833385A
- Authority
- CN
- China
- Prior art keywords
- data
- network
- acquisition node
- public key
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0414—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1044—Group management mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention discloses a kind of user data anonymity sharing method based on the encryption of alliance's chain, including:Each founder mechanism builds corresponding network data acquisition node and accesses alliance's chain network, forms initial chain;Rank and file mechanism establishes network data acquisition node after being verified, and sequentially accesses initial chain building alliance chain;Network data acquisition node obtains pseudonym identity and symmetric key corresponding with pseudonym identity;After network data acquisition node obtains data, upload request is sent to network data memory node;Final encryption data is decrypted by the private key of network data memory node to obtain assumed name encryption data;Network data memory node stores assumed name encryption data to local data base with the corresponding relationship of pseudonym identity;The data compression stored in stipulated time is generated block by network data memory node, and in the chain that coalizes.Effective control to rank and file mechanism permission is realized by building alliance's chain, ensure that the privacy of each member mechanism.
Description
Technical field
The present invention relates to Data Interchange Technology field more particularly to a kind of user data anonymity based on the encryption of alliance's chain are total
Enjoy method.
Background technique
Block chain is the new application distribution formula data storage of one kind, point-to-point transmission, common recognition mechanism, Encryption Algorithm isotype
Technology, it can be verified using block linked data structure algorithm of knowing together with storing data, using distributed node generating and
More new data, utilizes what is be made of automatized script code at the safety for guaranteeing data transmission and access in the way of cryptography
Intelligent contract programs and operation data, and block chain and relevant encryption technology and data sharing, data use the application such as safe
It is closely related.
Block chain technology is just gradually applied to the multiple fields such as bank, finance, insurance at present, and mostly uses publicly-owned chain technology
Bottom block chain is built, it, can not since access limit of the publicly-owned chain technology for block chain data lacks corresponding control
Guarantee that each mechanism uploads the authenticity of data;In addition, each mechanism is when exchanging data, it usually needs the mutual true body of verifying
Part, it is unfavorable for protecting the privacy of data providing, to limit the scale of shareable data.
Summary of the invention
The purpose of the present invention is to provide a kind of user data anonymity sharing methods based on the encryption of alliance's chain, pass through building
Alliance's chain realizes effective control to rank and file mechanism permission, so that the acquisition threshold to shared data is limited, with
The confidence level and safety of shared data are improved, in addition, to the member machine for initiating upload request or inquiry request or complaint request
Structure carries out anonymous protection, ensure that the privacy of each member mechanism.
To achieve the goals above, it is total to provide a kind of user data anonymity based on the encryption of alliance's chain for an aspect of of the present present invention
Method is enjoyed, including:
Each founder mechanism builds corresponding network data acquisition node and accesses alliance's chain network, is formed initial
Chain;
Rank and file mechanism establishes network data acquisition node after being verified, and sequentially accesses the initial chain building connection
Alliance's chain;
Network data acquisition node obtains pseudonym identity and symmetric key corresponding with the pseudonym identity;
After network data acquisition node obtains data, upload request is sent to network data memory node;
The network data memory node verifies whether the upload request passes through, if it is, receiving final encryption number
According to, and the final encryption data is decrypted by the private key of the network data memory node to obtain assumed name encryption number
According to;Wherein, the assumed name encryption data is that the network data acquisition node passes through the corresponding symmetric key of the pseudonym identity
The data are encrypted to obtain, the final encryption data is that the network data acquisition node passes through the network data
The public key of memory node is encrypted to obtain to the assumed name encryption data;
The network data memory node verifies whether the assumed name encryption data meets the requirements, if it is, will be described
Assumed name encryption data is stored with the corresponding relationship of the pseudonym identity and the assumed name encryption data to local data base;
The data compression stored in stipulated time is generated block by the network data memory node, and connection is added
In alliance's chain.
Rank and file mechanism establishes network data acquisition node after being verified, and sequentially accesses the initial chain building connection
Alliance's chain;
When any member mechanism initiates upload request by respective network data acquisition node, to initiation upload request
Member mechanism carry out anonymous protection and data broadcasting will be uploaded to each network data acquisition node of the whole network, know together in the whole network laggard
Row data update;Alternatively,
When any member mechanism initiates inquiry request by respective network data acquisition node, to initiation inquiry request
Member mechanism carry out anonymous protection and broadcast inquiry request to each network data acquisition node of the whole network, while obtaining inquiry number
According to;Alternatively,
When any member mechanism initiates member's complaint request by respective network data acquisition node, know together through the whole network
Judge whether complained member mechanism triggers punishment mechanism afterwards.
Specifically, each founder mechanism builds corresponding network data acquisition node and accesses alliance's link network
Network, the method for forming initial chain include:
Generation and the one-to-one digital authenticating certificate of each founder mechanism, and by digital authenticating certificate receipt to correspondence
Founder mechanism;
It is sequentially recorded the digital authenticating certificate of each founder mechanism, forms authentication list;
Corresponding network data acquisition node is built by founder mechanism, and authentication list is stored in each net respectively
In network data acquisition node;
Authentication list is compared according to the digital authenticating certificate that founder mechanism holds, is allowed after being verified described original
The corresponding network data acquisition node of member mechanism accesses alliance's chain network, forms initial chain.
Preferably, further include after the corresponding network data acquisition node access alliance's chain network of founder mechanism:
Typing organization information sum number is distinguished in network data acquisition node by the founder mechanism for accessing alliance's chain network
Word authenticates the public key of certificate, and saves into the mechanism status database connecting with each network data acquisition node.
Preferably, the rank and file mechanism establishes network data acquisition node after being verified, it is sequentially ingressed into described
Initially the method for chain building alliance chain includes:
The initial chain is added in the application of rank and file mechanism, and organization information is broadcasted to each network data acquisition section of the whole network
Point;
Founder mechanism audits the organization information, and to each network data acquisition node broadcasts auditing result of the whole network;
After the auditing result of each founder mechanism is reached common understanding and agreed to, digital authenticating certificate receipt is generated to common
Member mechanism;
The digital authenticating certificate sequence is added in the authentication list, and according to the new networking of digital authenticating certificate
Network data acquisition node is successively connect with the initial chain network;
To the public key for creating organization information described in typing and the digital authenticating certificate in the network data acquisition node,
And it saves into the mechanism status database being connect with each network data acquisition node;
The data of synchronous each network data acquisition node of the whole network, construct alliance's chain.
Specifically, described when any member mechanism initiates upload request by respective network data acquisition node, it is right
The member mechanism for initiating upload request carries out anonymous protection and will upload data broadcasting to each network data acquisition node of the whole network,
The method of progress data update includes after the whole network common recognition:
The first public private key pair is generated at random based on one-time pad technology, and the described first public and private key is saved to initiation and is uploaded
The local address list of the member mechanism of request;
Selection uploads data, and the upload data include major key and data details, are added using the first public key to data details
It is close to obtain data details ciphertext;
The extraction mechanism ID from the organization information of the member mechanism of upload request, and plaintext encryption is carried out to the mechanism ID
Obtain primary encryption mechanism ID;
The public key for inquiring mechanism slip condition database Zhong Ge founder mechanism, is successively originated into using each according to set sequence
The public key of member mechanism encrypts the primary encryption mechanism ID again, obtains secondary Sealing mechanism ID;
Using intelligent contract method for uploading by the major key, the data details ciphertext, first public key and described two
Secondary Sealing mechanism ID packing is merged into shared data, and broadcasts to each network data acquisition node of the whole network;
The shared data is updated to the information state number connecting with each network data acquisition node after the whole network common recognition
According to library, while return recording uploads the index value of data.
Optionally, described that mechanism ID progress is encrypted by the method for obtaining primary encryption mechanism ID in plain text includes:
The random regular length that generates is the character string of L, and the designated position of the character string interposer ID is obtained one
Secondary Sealing mechanism ID.
Illustratively, it is described inquiry mechanism slip condition database Zhong Ge founder mechanism public key, according to set sequence according to
The secondary public key using each founder mechanism encrypts the primary encryption mechanism ID again, obtains the side of secondary Sealing mechanism ID
Method includes:
Authentication list is obtained from mechanism slip condition database, and extracts the public key of founder mechanism;
Successively the primary encryption mechanism ID is carried out using the public key of each founder mechanism according to set sequence compound
Encryption, obtains secondary Sealing mechanism ID;
Wherein, the compound encryption refers to adds the data formed after n-th of public key encryption using (n+1)th public key again
It is close.
Optionally, the one-time pad technology refers to:
The number of 32 bytes is randomly selected as private key, it is corresponding that the private key is calculated using elliptic curve encryption algorithm
Uncompressed public key;
The cryptographic Hash for repeatedly calculating uncompressed public key takes the calculated result of last time cryptographic Hash to use base58 representation
Address substitute obtains public key.
Specifically, described when any member mechanism initiates inquiry request by respective network data acquisition node, it is right
The member mechanism for initiating inquiry request carries out anonymous protection and broadcasts inquiry request to each network data acquisition node of the whole network, together
When obtain inquiry data method include:
According to inquiry data major key, using intelligent contract querying method in information state database retrieval and inquisition;
When there are inquiry data in information state database, shared data corresponding with the major key and index are returned
Value;
Extract the first public key and data details ciphertext in the shared data, and from the member for initiating this inquiry request
One first public key, the temporary public key as this inquiry request are randomly choosed in the local address list of mechanism;
With the first public key in the temporary public key, the index value, the data details ciphertext and the shared data
As parameter the whole network broadcast distribution inquiry request;
Each network data acquisition node captures the inquiry request, while the upload member of shared data described in anonymously notifying
Mechanism, which exists, is queried request;
The upload member mechanism of the shared data utilizes the first private key ciphertext data corresponding with the first public key of extraction
Details ciphertext obtains data details, and wide to data details encryption formation return data ciphertext the whole network using temporary public key
It broadcasts, while anonymously notifying initiates the member mechanism of inquiry request;
The member mechanism use temporary private key corresponding with the temporary public key of inquiry request is initiated to return data ciphertext
Decryption, restoring data details obtain inquiry data.
Preferably, each network data acquisition node captures the inquiry request, the upload of anonymously notifying shared data
There is the method for being queried request in member mechanism:
After each network data acquisition node captures the inquiry request, the first public key in shared data described in self-test is
It is no there are in respective local address list, when local address list there are when first public key, can confirm it is corresponding at
Member mechanism is the upload member mechanism of the shared data.
Preferably, the method that the anonymously notifying initiates the member mechanism of inquiry request includes:
After each network data acquisition node captures the broadcast of the return data ciphertext, return data ciphertext described in self-test
In temporary public key with the presence or absence of in respective local address list, when local address list is there are when the temporary public key, i.e.,
It can confirm that corresponding member mechanism is to initiate the member mechanism of inquiry request.
Preferably, described when any member mechanism initiates member's complaint request by respective network data acquisition node
When, the method for judging whether complained member mechanism triggers punishment mechanism after the whole network is known together includes:
According to the index value of violation data, complaint request is initiated to violation data and the whole network is broadcasted;
It is corresponding to the index value of violation data using the private key of each founder mechanism according to the reverse order of set sequence
Secondary Sealing mechanism ID successively decrypt, obtain primary encryption mechanism ID;
The clear-text passwords in primary encryption mechanism ID is removed, the mechanism ID of complained member mechanism is obtained;
It calls the complaining method of intelligent contract to broadcast described mechanism ID the whole network, and records and complained successfully after the whole network common recognition
Once;
When the mechanism ID, which is complained successful number, reaches threshold value, triggers the triggering to complained member mechanism and punish
Mechanism.
Compared with prior art, it is provided by the invention based on alliance's chain encryption user data anonymity sharing method have with
Lower beneficial effect:
Initial chain is built by multiple founder mechanisms, and constructs alliance's chain after initial chain is added in rank and file mechanism,
So that founder mechanism can effectively manage rank and file mechanism using alliance's chain, to limit the acquisition of shared data
Threshold improves the confidence level and safety of data;In addition, when any member mechanism is sent out by respective network data acquisition node
When playing operation requests, anonymous protection can be carried out to member's organization information, so that initiating the letter of the member mechanism of operation requests
Breath can be maintained secrecy, to realize the secret protection to each member mechanism, wherein operation requests include upload request, inquiry request
With member's complaint request.
Another aspect of the present invention provides a kind of user data anonymity shared system based on the encryption of alliance's chain, is applied to upper
It states in the user data anonymity sharing method based on the encryption of alliance's chain described in technical solution, the system comprises:
The initial chain forms unit, builds corresponding network data acquisition node simultaneously for each founder mechanism
Alliance's chain network is accessed, initial chain is formed;
Alliance's chain building unit establishes network data acquisition node for rank and file mechanism after being verified,
Sequentially access the initial chain building alliance chain;
The judging unit, the request class initiated for judging member mechanism by respective network data acquisition node
Type, and according to any one of the corresponding response uploading unit of the request type, query unit, complaint unit;
The uploading unit is used to carry out anonymous protection to the member mechanism for initiating upload request and will upload data broadcasting
To each network data acquisition node of the whole network, data update is carried out after the whole network common recognition;
The query unit is used to carry out anonymous protection to the member mechanism for initiating inquiry request and broadcasts inquiry request
To each network data acquisition node of the whole network, while obtaining inquiry data;
It is total through the whole network when the complaint unit is used to initiate member's complaint request by respective network data acquisition node
Judge whether complained member mechanism triggers punishment mechanism after knowledge.
Compared with prior art, the user data anonymity shared system provided by the invention based on the encryption of alliance's chain is beneficial
Effect is identical as the user data anonymity sharing method beneficial effect based on the encryption of alliance's chain that above-mentioned technical proposal provides, herein
It does not repeat them here.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes a part of the invention, this hair
Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the process signal of the user data anonymity sharing method based on the encryption of alliance's chain in the embodiment of the present invention one
Figure;
Fig. 2 is the construction method flow diagram of initial chain in Fig. 1;
Fig. 3 is the construction method flow diagram of Tu1Zhong alliance chain.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, implement below in conjunction with the present invention
Attached drawing in example, technical scheme in the embodiment of the invention is clearly and completely described.Obviously, described embodiment
Only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, the common skill in this field
Art personnel all other embodiment obtained without creative labor belongs to the model that the present invention protects
It encloses.
Fig. 1 is the process signal of the user data anonymity sharing method based on the encryption of alliance's chain in the embodiment of the present invention one
Figure.Referring to Fig. 1, the present embodiment provides a kind of user data anonymity sharing methods based on the encryption of alliance's chain, including:
Each founder mechanism builds corresponding network data acquisition node and accesses alliance's chain network, is formed initial
Chain;
Rank and file mechanism establishes network data acquisition node after being verified, and sequentially accesses the initial chain building connection
Alliance's chain;
Network data acquisition node obtains pseudonym identity and symmetric key corresponding with the pseudonym identity;
After network data acquisition node obtains data, upload request is sent to network data memory node;
The network data memory node verifies whether the upload request passes through, if it is, receiving final encryption number
According to, and the final encryption data is decrypted by the private key of the network data memory node to obtain assumed name encryption number
According to;Wherein, the assumed name encryption data is that the network data acquisition node passes through the corresponding symmetric key of the pseudonym identity
The data are encrypted to obtain, the final encryption data is that the network data acquisition node passes through the network data
The public key of memory node is encrypted to obtain to the assumed name encryption data;
The network data memory node verifies whether the assumed name encryption data meets the requirements, if it is, will be described
Assumed name encryption data is stored with the corresponding relationship of the pseudonym identity and the assumed name encryption data to local data base;
The data compression stored in stipulated time is generated block by the network data memory node, and connection is added
In alliance's chain.
When any member mechanism initiates upload request by respective network data acquisition node, to initiation upload request
Member mechanism carry out anonymous protection and data broadcasting will be uploaded to each network data acquisition node of the whole network, know together in the whole network laggard
Row data update;Alternatively,
When any member mechanism initiates inquiry request by respective network data acquisition node, to initiation inquiry request
Member mechanism carry out anonymous protection and broadcast inquiry request to each network data acquisition node of the whole network, while obtaining inquiry number
According to;Alternatively,
When any member mechanism initiates member's complaint request by respective network data acquisition node, know together through the whole network
Judge whether complained member mechanism triggers punishment mechanism afterwards.
When it is implemented, alliance's chain in the present embodiment is built using super account book Fabric frame, due to super account book
Fabric is using modular frame technology, and the algorithm that super account book Fabric is used is Kafka common recognition ranking method, therefore
With good amplification property and data-handling efficiency;Specifically, each network data acquisition node includes the multiple of sequential connection
Orderer node (each Orderer node is equivalent to a block), and connect one to one with Orderer node more
A Peer node, Peer node is for receiving request operation, since the received request operation of each Peer node is different,
It needs to summarize by Orderer all request operations and the request operation summarized is ranked up, and is right after the whole network common recognition
Each network data acquisition node is updated, to guarantee the consistency of each node data of the whole network.
According to it is provided by the above embodiment based on alliance's chain encryption user data anonymity sharing method it is found that firstly, by
Initial chain is built by multiple founder mechanisms, and constructs alliance's chain after initial chain is added in rank and file mechanism, so as to originate into
Member mechanism can effectively manage rank and file mechanism using alliance's chain, and the acquisition threshold of shared data is limited, and improve number
According to confidence level and safety;In addition, when any member mechanism initiates operation requests by respective network data acquisition node
When, anonymous protection can be carried out to member's organization information, and the information for the member mechanism for initiating operation requests is protected
It is close, to realize the secret protection to each member mechanism, wherein operation requests include that upload request, inquiry request and member complain
Request.
Specifically, referring to Fig. 2, corresponding network data acquisition is built by above-described embodiment Zhong Ge founder mechanism
Node simultaneously accesses alliance's chain network, and the method for forming initial chain includes:
Generation and the one-to-one digital authenticating certificate of each founder mechanism, and by digital authenticating certificate receipt to correspondence
Founder mechanism;It is sequentially recorded the digital authenticating certificate of each founder mechanism, forms authentication list;Founder mechanism
Corresponding network data acquisition node is built, and authentication list is stored in respectively in each network data acquisition node;Root
Authentication list is compared according to the digital authenticating certificate that founder mechanism holds, the founder mechanism pair is allowed after being verified
The network data acquisition node access alliance's chain network answered, forms initial chain;The founder mechanism of access alliance's chain network exists
The public key of typing organization information and digital authentication proof book is distinguished in network data acquisition node, and is saved and extremely adopted with each network data
In the mechanism status database for collecting node connection.
When it is implemented, the digital authenticating certificate of each founder mechanism includes a unique public private key pair,
(calibration mode is equivalent to by the way that an authentication list can be obtained in the digital authenticating certificate journal of each founder mechanism
Plate), and the authentication list of generation is synchronized to each network data acquisition node, thus when the application of any founder mechanism is added
When alliance's chain network, digital authenticating certificate and the authentication list that need to be held are compared, when there being above-mentioned number in authentication list
When authenticating certificate, then verification is by allowing its to access alliance's chain network, when there not being above-mentioned digital authenticating certificate in authentication list
When, then it verifies and unsuccessfully refuses its access alliance's chain network.
Further, referring to Fig. 3, rank and file mechanism establishes network data after being verified and adopts in above-described embodiment
Collect node, the method for being sequentially ingressed into initial chain building alliance chain includes:
Initial chain is added in the application of rank and file mechanism, and organization information is broadcasted to each network data acquisition node of the whole network;
Founder mechanism audits organization information, and to each network data acquisition node broadcasts auditing result of the whole network;As each founder
After the auditing result of mechanism is reached common understanding and agreed to, generates digital authenticating certificate receipt and give rank and file mechanism;By digital authenticating
Certificate sequence be added authentication list in, and according to digital authenticating certificate New-deployed Network data acquisition node successively with initial chain network
Connection;The public key of typing organization information and digital authentication proof book into New-deployed Network data acquisition node, and save to each net
In the mechanism status database of network data acquisition node connection;The data of synchronous each network data acquisition node of the whole network, building connection
Alliance's chain.What above-described embodiment illustrated is the process that rank and file mechanism (recruit) is dynamically added alliance's chain, rank and file mechanism
Application coalize chain when, needing to obtain approving after examination for each founder mechanism can just be allowed to be added, with realize to common
Effective control of member mechanism permission provides the acquisition threshold of shared data.
Specifically, it is asked in above-described embodiment when any member mechanism initiates to upload by respective network data acquisition node
When asking, anonymous protection is carried out to the member mechanism for initiating upload request and data broadcasting will be uploaded to each network data acquisition of the whole network
Node, the method that data update is carried out after the whole network common recognition include:
The first public private key pair is generated at random based on one-time pad technology, and the first public and private key is saved to initiation upload request
Member mechanism local address list;Selection uploads data, and uploading data includes major key and data details, utilizes the first public key
Data details ciphertext is obtained to data details encryption;The extraction mechanism ID from the organization information of the member mechanism of upload request, and
Encryption in plain text is carried out to mechanism ID and obtains primary encryption mechanism ID;Inquire the public affairs of mechanism slip condition database Zhong Ge founder mechanism
Key successively encrypts primary encryption mechanism ID using the public key of each founder mechanism again according to set sequence, obtains secondary
Sealing mechanism ID;Major key, data details ciphertext, the first public key and secondary Sealing mechanism ID are beaten using intelligent contract method for uploading
Packet is merged into shared data, and broadcasts to each network data acquisition node of the whole network;Shared data is updated to after the whole network common recognition
The information state database being connect with each network data acquisition node, while return recording uploads the index value of data.
Illustratively, encrypting the method for obtaining primary encryption mechanism ID in plain text to mechanism ID progress is:Random generate is fixed
Length is the character string of L, and the designated position of character string interposer ID is obtained primary encryption mechanism ID.Wherein, " specific bit
Set " it can be any position of mechanism ID, but the decryption of primary encryption mechanism ID for convenience, it is preferable that " designated position " is
After mechanism ID.
The public key of above-mentioned inquiry mechanism slip condition database Zhong Ge founder mechanism, successively uses each wound according to set sequence
The public key of beginning member mechanism encrypts the primary encryption mechanism ID again, and the method for obtaining secondary Sealing mechanism ID includes:From
Authentication list is obtained in mechanism status database, and extracts the public key of founder mechanism;It is successively used respectively according to set sequence
The public key of founder mechanism carries out compound encryption to the primary encryption mechanism ID, obtains secondary Sealing mechanism ID;Wherein, institute
Compound encryption is stated to refer to and encrypt the data formed after n-th of public key encryption again using (n+1)th public key.
Theoretically " the set sequence " can be the arbitary convention sequence that each founder mechanism notes, but solve for adding
From the aspect of close convenience, " set sequence " in the present embodiment is that digital authenticating certificate puts in order in authentication list, this
Sample can facilitate decrypting process, need to only decrypt according to the backward that digital authenticating certificate puts in order.
By above-mentioned implementation process it is found that generating the first public private key pair at random by one-time pad technology, the first public affairs are utilized
Key encrypts the data details for uploading data to obtain data details ciphertext, and is encrypted using character string and originated into each in plain text
Member's authority public key encrypts the encryption technology means combined, multi-enciphering is carried out to the member mechanism ID of upload request, to obtain
The packing of the data such as data details ciphertext, the first public key, secondary Sealing mechanism ID is finally merged into shared by secondary Sealing mechanism ID
Data the whole network broadcast, so that network data acquisition node can not learn shared data in the case where not decrypting to shared data
In data details and upload request member mechanism ID, and then realize to upload request member mechanism anonymity protect.
It is understood that above-mentioned one-time pad technology refers to:The number of 32 bytes is randomly selected as private key, is used
Elliptic curve encryption algorithm calculates the corresponding uncompressed public key of the private key;The cryptographic Hash for repeatedly calculating uncompressed public key, takes most
The calculated result of a cryptographic Hash obtains public key using base58 representation address substitute afterwards.
Illustratively, one-time pad technology includes the following steps:
S1:The number of 32 bytes is randomly selected as private key;
S2:The corresponding uncompressed public key of the private key is calculated using elliptic curve encryption algorithm;
S3:Calculate the SHA-256 cryptographic Hash of public key;
S4:Previous step is taken as a result, calculating RIPEMD-160 cryptographic Hash;
S5:Address version number is added before previous step result;
S6:Previous step is taken as a result, calculating SHA-256 cryptographic Hash;
S7:Previous step is taken as a result, calculating a SHA-256 cryptographic Hash again;
S8:Preceding 4 bytes of previous step result are taken, and this 4 bytes are added in behind the result of S5, obtain verification knot
Fruit;
S9:Based on above-mentioned check results, its address is converted with base58 representation and obtains public key.
Further, when any member mechanism initiates inquiry by respective network data acquisition node in above-described embodiment
When request, the member mechanism for initiating inquiry request is carried out anonymous protection and broadcasts inquiry request to each network data of the whole network to adopt
Collect node, while the method for obtaining inquiry data includes:
According to inquiry data major key, using intelligent contract querying method in information state database retrieval and inquisition;When
When there are inquiry data in information state database, shared data corresponding with major key and index value are returned;Extract shared data
In the first public key and data details ciphertext, and it is random from the local address list of member mechanism for initiating this inquiry request
One first public key is selected, the temporary public key as this inquiry request;With temporary public key, index value, data details ciphertext and it is total to
The first public key in data is enjoyed as parameter the whole network broadcast distribution inquiry request;Each network data acquisition node capture inquiry is asked
It asks, the upload member mechanism of anonymously notifying shared data, which exists, is queried request;The upload member mechanism of shared data utilize with
The corresponding first private key ciphertext data details ciphertext of the first public key extracted obtains data details, and using temporary public key to data
Details encryption forms the broadcast of return data ciphertext the whole network, while anonymously notifying initiates the member mechanism of inquiry request;Initiate inquiry
The member mechanism use of request temporary private key corresponding with temporary public key decrypts return data ciphertext, and restoring data details obtain
Inquire data.
Inquiry request is corresponding process with upload request, when it is implemented, passing through business platform input inquiry data
Major key returns to sky when inquiry data are not present in information state database, when information state database, which exists, inquires data, returns
Return shared data corresponding with major key and index value;At this point, initiating the member mechanism of inquiry request can mention from shared data
Take out the first public key and data details ciphertext, and in order to guarantee to make to initiate inquiry request member mechanism (hereinafter referred to as inquiry at
Member mechanism) it anonymous can inquire, inquiry member mechanism randomly chooses one first public key from its local address list, as this
The temporary public key of secondary inquiry request, while by the first public key in temporary public key, index value, data details ciphertext, shared data
As parameter the whole network broadcast distribution inquiry request, it is queried request to inform that the upload member mechanism of the shared data exists,
When upload member mechanism learn it is above-mentioned be queried request after, use corresponding with the first public key of extraction the first private key to decrypt immediately
Data details ciphertext restoring data details, and return data ciphertext the whole network is formed to the data details encryption using temporary public key
Broadcast, while anonymously notifying initiates the member mechanism of inquiry request, so that inquiry member mechanism is corresponding temporarily using temporary public key
Return data ciphertext is decrypted with private key, restoring data details obtain inquiry data.
By above-mentioned implementation process it is found that inquiry member mechanism pretends its true identity using temporary public key, with
Realize the anonymity of inquiry request, while by the first public key in temporary public key, index value, data details ciphertext, shared data
The upload member mechanism of transmitting shared data (including inquiring data) on anonymously notifying, after uploading member mechanism restoring data details,
It is encrypted using the temporary public key of inquiry member mechanism transmitted, anonymity, which returns to inquiry member mechanism, makes it obtain inquiry number
According to;As it can be seen that the present embodiment can be realized inquiry member mechanism and upload the two-way anonymity of member mechanism, member mechanism letter is improved
The shared safety of breath.
You need to add is that above-mentioned each network data acquisition node captures inquiry request, anonymously notifying shared data it is upper
Member mechanism, which is passed, in the presence of the method for being queried request includes:After each network data acquisition node captures inquiry request, self-test is total
The first public key in data is enjoyed with the presence or absence of in respective local address list, when local address list is there are when the first public key,
It can confirm that corresponding member mechanism is the upload member mechanism of shared data.That is, each member mechanism passes through than respective local
Address list, when not having corresponding first public key in its local address list, can confirm oneself not is the upper of shared data
Member mechanism is passed, on the contrary, when having corresponding first public key in its local address list, it can confirm it oneself is shared number
According to upload member mechanism, since entire comparison result only has that member mechanism is known oneself and other people do not know, to realize
Anonymously notifying.
The method that above-mentioned anonymously notifying initiates the member mechanism of inquiry request includes:Each network data acquisition node captures
After the broadcast of return data ciphertext, the temporary public key in self-test return data ciphertext whether there is respective local address list
In, when there are when temporary public key, can confirm that corresponding member mechanism is the member machine for initiating inquiry request for local address list
Structure.When it is implemented, the method that anonymously notifying initiates the member mechanism of inquiry request, upper with above-mentioned anonymously notifying shared data
It is identical in the presence of the method for being queried request to pass member mechanism, this will not be repeated here.
Further, when any member mechanism initiates member by respective network data acquisition node in above-described embodiment
When complaint request, the method for judging whether complained member mechanism triggers punishment mechanism after the whole network is known together includes:
According to the index value of violation data, complaint request is initiated to violation data and the whole network is broadcasted;According to set sequence
Reverse order is successively solved using the private key of each founder mechanism secondary Sealing mechanism ID corresponding to the index value of violation data
It is close, obtain primary encryption mechanism ID;The clear-text passwords in primary encryption mechanism ID is removed, the mechanism of complained member mechanism is obtained
ID;Call the complaining method of intelligent contract to broadcast mechanism ID the whole network, and after the whole network common recognition record complain it is successfully primary;Work as machine
When structure ID is complained successful number and reaches threshold value, triggers the triggering to complained member mechanism and punish mechanism.
It is understood that the mechanism ID method of complained member is decrypted in the present embodiment, with encryption upload request member
The method of mechanism ID is mutually echoed, and this will not be repeated here.Illustratively, punishment mechanism is to limit complained mechanism to information state number
According to the access limit in library, and then realize the supervision to member mechanism malicious act.
It will appreciated by the skilled person that realizing that all or part of the steps in foregoing invention method is can to lead to
Program is crossed to instruct relevant hardware and complete, above procedure can store in computer-readable storage medium, the program
When being executed, each step including above-described embodiment method, and storage medium can be:ROM/RAM, magnetic disk, CD, storage
Card etc..
More than, only a specific embodiment of the invention, but scope of protection of the present invention is not limited thereto, and it is any to be familiar with
Those skilled in the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all cover
Within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (10)
1. a kind of user data anonymity sharing method based on the encryption of alliance's chain, which is characterized in that including:
Each founder mechanism builds corresponding network data acquisition node and accesses alliance's chain network, forms initial chain;
Rank and file mechanism establishes network data acquisition node after being verified, and sequentially accesses the initial chain building alliance
Chain;
Network data acquisition node obtains pseudonym identity and symmetric key corresponding with the pseudonym identity;
After network data acquisition node obtains data, upload request is sent to network data memory node;
The network data memory node verifies whether the upload request passes through, if it is, final encryption data is received, and
The final encryption data is decrypted to obtain assumed name encryption data by the private key of the network data memory node;Its
In, the assumed name encryption data is that the network data acquisition node passes through the corresponding symmetric key of the pseudonym identity to described
Data are encrypted to obtain, and the final encryption data is that the network data acquisition node is saved by network data storage
The public key of point is encrypted to obtain to the assumed name encryption data;
The network data memory node verifies whether the assumed name encryption data meets the requirements, if it is, by the assumed name
Encryption data is stored with the corresponding relationship of the pseudonym identity and the assumed name encryption data to local data base;
The data compression stored in stipulated time is generated block, and the chain that coalizes by the network data memory node
In.
2. user data anonymity sharing method according to claim 1, which is characterized in that each founder mechanism takes
It builds corresponding network data acquisition node and accesses alliance's chain network, the method for forming initial chain includes:
Generation and the one-to-one digital authenticating certificate of each founder mechanism, and give digital authenticating certificate receipt to corresponding wound
Beginning member mechanism;
It is sequentially recorded the digital authenticating certificate of each founder mechanism, forms authentication list;
Corresponding network data acquisition node is built by founder mechanism, and authentication list is stored in each network number respectively
According in acquisition node;
Authentication list is compared according to the digital authenticating certificate that founder mechanism holds, the founder is allowed after being verified
The corresponding network data acquisition node of mechanism accesses alliance's chain network, forms initial chain.
3. user data anonymity sharing method according to claim 2, which is characterized in that corresponding in founder mechanism
Further include after network data acquisition node access alliance's chain network:
Typing organization information and number are recognized respectively in network data acquisition node for the founder mechanism of access alliance's chain network
The public key of certificate is demonstrate,proved, and is saved into the mechanism status database being connect with each network data acquisition node.
4. user data anonymity sharing method according to claim 2 or 3, which is characterized in that the rank and file mechanism
Network data acquisition node is established after being verified, the method for being sequentially ingressed into the initial chain building alliance chain includes:
The initial chain is added in the application of rank and file mechanism, and organization information is broadcasted to each network data acquisition node of the whole network;
Founder mechanism audits the organization information, and to each network data acquisition node broadcasts auditing result of the whole network;
After the auditing result of each founder mechanism is reached common understanding and agreed to, digital authenticating certificate receipt is generated to rank and file
Mechanism;
The digital authenticating certificate sequence is added in the authentication list, and according to the digital authenticating certificate New-deployed Network number
It is successively connect with the initial chain network according to acquisition node;
To creating the public key of organization information described in typing and the digital authenticating certificate in the network data acquisition node, and protect
It deposits into the mechanism status database being connect with each network data acquisition node;
The data of synchronous each network data acquisition node of the whole network, construct alliance's chain.
5. user data anonymity sharing method according to claim 4, which is characterized in that described when any member mechanism is logical
When crossing respective network data acquisition node initiation upload request, anonymous protection is carried out simultaneously to the member mechanism for initiating upload request
Data broadcasting will be uploaded to each network data acquisition node of the whole network, the method that data update is carried out after the whole network common recognition includes:
The first public private key pair is generated at random based on one-time pad technology, and the described first public and private key is saved to initiation upload request
Member mechanism local address list;
Selection uploads data, and the upload data include major key and data details, are obtained using the first public key to data details encryption
To data details ciphertext;
The extraction mechanism ID from the organization information of the member mechanism of upload request, and encryption in plain text is carried out to the mechanism ID and is obtained
Primary encryption mechanism ID;
The public key for inquiring mechanism slip condition database Zhong Ge founder mechanism, successively uses each founder's machine according to set sequence
The public key of structure encrypts the primary encryption mechanism ID again, obtains secondary Sealing mechanism ID;
Using intelligent contract method for uploading by the major key, the data details ciphertext, first public key and it is described it is secondary plus
Close mechanism ID packing is merged into shared data, and broadcasts to each network data acquisition node of the whole network;
The shared data is updated to the information state database connecting with each network data acquisition node after the whole network common recognition,
Return recording uploads the index value of data simultaneously.
6. user data anonymity sharing method according to claim 5, which is characterized in that described to be carried out in plain text to mechanism ID
Encrypting the method for obtaining primary encryption mechanism ID includes:
It is random to generate the character string that regular length is L, and the designated position of the character string interposer ID is obtained once adding
Close mechanism ID.
7. user data anonymity sharing method according to claim 5 or 6, which is characterized in that the inquiry mechanism status
The public key of database Zhong Ge founder mechanism successively uses the public key of each founder mechanism to described one according to set sequence
Secondary Sealing mechanism ID is encrypted again, and the method for obtaining secondary Sealing mechanism ID includes:
Authentication list is obtained from mechanism slip condition database, and extracts the public key of founder mechanism;
Compound encryption successively is carried out to the primary encryption mechanism ID using the public key of each founder mechanism according to set sequence,
Obtain secondary Sealing mechanism ID;
Wherein, the compound encryption refers to encrypts the data formed after n-th of public key encryption using (n+1)th public key again.
8. user data anonymity sharing method according to claim 5, which is characterized in that the one-time pad technology is
Refer to:
The number of 32 bytes is randomly selected as private key, it is corresponding non-depressed that the private key is calculated using elliptic curve encryption algorithm
Contracting public key;
The cryptographic Hash for repeatedly calculating uncompressed public key takes the calculated result of last time cryptographic Hash to convert using base58 representation
Address obtains public key.
9. user data anonymity sharing method according to claim 4, which is characterized in that described when any member mechanism is logical
When crossing respective network data acquisition node initiation inquiry request, anonymous protection is carried out simultaneously to the member mechanism for initiating inquiry request
Inquiry request is broadcasted to each network data acquisition node of the whole network, while the method for obtaining inquiry data includes:
According to inquiry data major key, using intelligent contract querying method in information state database retrieval and inquisition;
When there are inquiry data in information state database, shared data corresponding with the major key and index value are returned;
Extract the first public key and data details ciphertext in the shared data, and from the member mechanism for initiating this inquiry request
Local address list in randomly choose one first public key, the temporary public key as this inquiry request;
Using the first public key in the temporary public key, the index value, the data details ciphertext and the shared data as
Parameter the whole network broadcast distribution inquiry request;
Each network data acquisition node captures the inquiry request, and the upload member mechanism of shared data described in anonymously notifying exists
It is queried request;
The upload member mechanism of the shared data utilizes the first private key ciphertext data details corresponding with the first public key of extraction
Ciphertext obtains data details, and forms return data ciphertext the whole network to the data details encryption using temporary public key and broadcast, together
When anonymously notifying initiate inquiry request member mechanism;
The member mechanism use temporary private key corresponding with the temporary public key for initiating inquiry request decrypts return data ciphertext,
Restoring data details obtain inquiry data.
10. user data anonymity sharing method according to claim 5, which is characterized in that each network data acquisition
Node captures the inquiry request, and the upload member mechanism of anonymously notifying shared data has the method for being queried request and includes:
After each network data acquisition node captures the inquiry request, whether the first public key in shared data described in self-test is deposited
In respective local address list, when local address list is there are when first public key, corresponding member machine can be confirmed
Structure is the upload member mechanism of the shared data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810555229.XA CN108833385A (en) | 2018-06-01 | 2018-06-01 | User data anonymity sharing method based on the encryption of alliance's chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810555229.XA CN108833385A (en) | 2018-06-01 | 2018-06-01 | User data anonymity sharing method based on the encryption of alliance's chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108833385A true CN108833385A (en) | 2018-11-16 |
Family
ID=64145743
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810555229.XA Withdrawn CN108833385A (en) | 2018-06-01 | 2018-06-01 | User data anonymity sharing method based on the encryption of alliance's chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108833385A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109831418A (en) * | 2018-12-28 | 2019-05-31 | 无锡井通网络科技有限公司 | Credible alliance's chain building method, system and electronic equipment based on certificate |
CN110059495A (en) * | 2018-12-14 | 2019-07-26 | 阿里巴巴集团控股有限公司 | Data sharing method, apparatus and system, electronic equipment |
CN110061968A (en) * | 2019-03-15 | 2019-07-26 | 广东工程职业技术学院 | A kind of file encryption-decryption method based on block chain, system and storage medium |
CN110210249A (en) * | 2019-06-13 | 2019-09-06 | 上海富数科技有限公司 | The system and method for track query function of hideing are realized based on data obfuscation |
CN110474886A (en) * | 2019-07-24 | 2019-11-19 | 深圳壹账通智能科技有限公司 | Data ciphering method, device, electronic equipment and storage medium based on block chain |
CN110809000A (en) * | 2019-11-12 | 2020-02-18 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Service interaction method, device, equipment and storage medium based on block chain network |
CN111079136A (en) * | 2019-11-07 | 2020-04-28 | 北京科技大学 | Fog computing intrusion detection feature sharing system based on block chain technology |
CN111327415A (en) * | 2018-12-13 | 2020-06-23 | 航天信息股份有限公司 | Alliance link data protection method and device |
CN111402037A (en) * | 2020-04-15 | 2020-07-10 | 中国银行股份有限公司 | User data processing method and device |
CN111556026A (en) * | 2020-04-08 | 2020-08-18 | 东南大学 | Anonymous identity authentication method based on alliance chain |
CN111614739A (en) * | 2020-05-08 | 2020-09-01 | 中国信息通信研究院 | Network measurement data storage method, device and system |
CN111861117A (en) * | 2020-06-16 | 2020-10-30 | 北京工业大学 | Musical instrument evaluation data sharing method and system based on alliance chain |
CN112039892A (en) * | 2020-08-31 | 2020-12-04 | 中国信息通信研究院 | Data sharing method and related device |
CN113392430A (en) * | 2021-05-27 | 2021-09-14 | 中国联合网络通信集团有限公司 | Digital resource management method and system based on intelligent contract authentication |
CN114065253A (en) * | 2021-11-22 | 2022-02-18 | 上海旺链信息科技有限公司 | Method for anonymous sharing and verification of certificate and result |
CN115801368A (en) * | 2022-11-07 | 2023-03-14 | 昆明理工大学 | Data sharing method based on alliance chain |
-
2018
- 2018-06-01 CN CN201810555229.XA patent/CN108833385A/en not_active Withdrawn
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111327415A (en) * | 2018-12-13 | 2020-06-23 | 航天信息股份有限公司 | Alliance link data protection method and device |
CN110059495A (en) * | 2018-12-14 | 2019-07-26 | 阿里巴巴集团控股有限公司 | Data sharing method, apparatus and system, electronic equipment |
CN110059495B (en) * | 2018-12-14 | 2020-11-17 | 创新先进技术有限公司 | Data sharing method, device and system and electronic equipment |
CN109831418A (en) * | 2018-12-28 | 2019-05-31 | 无锡井通网络科技有限公司 | Credible alliance's chain building method, system and electronic equipment based on certificate |
CN110061968A (en) * | 2019-03-15 | 2019-07-26 | 广东工程职业技术学院 | A kind of file encryption-decryption method based on block chain, system and storage medium |
CN110210249A (en) * | 2019-06-13 | 2019-09-06 | 上海富数科技有限公司 | The system and method for track query function of hideing are realized based on data obfuscation |
CN110210249B (en) * | 2019-06-13 | 2021-01-08 | 上海富数科技有限公司 | System and method for realizing track hiding query function based on data confusion |
CN110474886A (en) * | 2019-07-24 | 2019-11-19 | 深圳壹账通智能科技有限公司 | Data ciphering method, device, electronic equipment and storage medium based on block chain |
CN110474886B (en) * | 2019-07-24 | 2022-04-05 | 深圳壹账通智能科技有限公司 | Block chain based data encryption method and device, electronic equipment and storage medium |
CN111079136A (en) * | 2019-11-07 | 2020-04-28 | 北京科技大学 | Fog computing intrusion detection feature sharing system based on block chain technology |
CN111079136B (en) * | 2019-11-07 | 2022-02-11 | 北京科技大学 | Fog computing intrusion detection feature sharing system based on block chain technology |
CN110809000A (en) * | 2019-11-12 | 2020-02-18 | 中钞信用卡产业发展有限公司杭州区块链技术研究院 | Service interaction method, device, equipment and storage medium based on block chain network |
CN111556026A (en) * | 2020-04-08 | 2020-08-18 | 东南大学 | Anonymous identity authentication method based on alliance chain |
CN111402037A (en) * | 2020-04-15 | 2020-07-10 | 中国银行股份有限公司 | User data processing method and device |
CN111614739A (en) * | 2020-05-08 | 2020-09-01 | 中国信息通信研究院 | Network measurement data storage method, device and system |
CN111861117A (en) * | 2020-06-16 | 2020-10-30 | 北京工业大学 | Musical instrument evaluation data sharing method and system based on alliance chain |
CN112039892A (en) * | 2020-08-31 | 2020-12-04 | 中国信息通信研究院 | Data sharing method and related device |
CN112039892B (en) * | 2020-08-31 | 2022-11-29 | 中国信息通信研究院 | Data sharing method and related device |
CN113392430A (en) * | 2021-05-27 | 2021-09-14 | 中国联合网络通信集团有限公司 | Digital resource management method and system based on intelligent contract authentication |
CN113392430B (en) * | 2021-05-27 | 2023-05-19 | 中国联合网络通信集团有限公司 | Digital resource management method and system based on intelligent contract authentication |
CN114065253A (en) * | 2021-11-22 | 2022-02-18 | 上海旺链信息科技有限公司 | Method for anonymous sharing and verification of certificate and result |
CN115801368A (en) * | 2022-11-07 | 2023-03-14 | 昆明理工大学 | Data sharing method based on alliance chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108833385A (en) | User data anonymity sharing method based on the encryption of alliance's chain | |
CN108632292A (en) | Data sharing method based on alliance's chain and system | |
CN109040139B (en) | Identity authentication system and method based on block chain and intelligent contract | |
CN108881189A (en) | User data anonymity shared system based on alliance's chain | |
CN104579694B (en) | A kind of identity identifying method and system | |
CN105025012B (en) | Towards the access control system and its access control method of cloud storage service platform | |
Gong | Optimal authentification protocols resistant to password guessing attacks | |
WO2016197770A1 (en) | Access control system and access control method thereof for cloud storage service platform | |
CN109145612B (en) | Block chain-based cloud data sharing method for preventing data tampering and user collusion | |
CN110224814A (en) | A kind of block chain data sharing method and device | |
CN110046521A (en) | Decentralization method for secret protection | |
CN111371561A (en) | Alliance block chain data access control method based on CP-ABE algorithm | |
CN109120639A (en) | A kind of data cloud storage encryption method and system based on block chain | |
CN109543443A (en) | User data management, device, equipment and storage medium based on block chain | |
CN108429759A (en) | Decentralization stores safety implementation method | |
CN108959911A (en) | A kind of key chain generates, verification method and its device | |
CN102075544A (en) | Encryption system, encryption method and decryption method for local area network shared file | |
Jin et al. | Anonymous deduplication of encrypted data with proof of ownership in cloud storage | |
CN109347832A (en) | A kind of dynamic data sharing method, terminal device and proxy server | |
CN108632385B (en) | Time sequence-based cloud storage privacy protection method for multi-branch tree data index structure | |
CN110191153A (en) | Social communication method based on block chain | |
Feng et al. | Blockchain data privacy access control based on searchable attribute encryption | |
WO2021190453A1 (en) | Lightweight attribute-based signcryption method for cloud and fog-assisted internet of things | |
CN111917543B (en) | User access cloud platform security access authentication system and application method thereof | |
Abdalla et al. | (Password) authenticated key establishment: From 2-party to group |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181116 |