CN108833385A - User data anonymity sharing method based on the encryption of alliance's chain - Google Patents

User data anonymity sharing method based on the encryption of alliance's chain Download PDF

Info

Publication number
CN108833385A
CN108833385A CN201810555229.XA CN201810555229A CN108833385A CN 108833385 A CN108833385 A CN 108833385A CN 201810555229 A CN201810555229 A CN 201810555229A CN 108833385 A CN108833385 A CN 108833385A
Authority
CN
China
Prior art keywords
data
network
acquisition node
public key
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810555229.XA
Other languages
Chinese (zh)
Inventor
张燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Way Technology Co Ltd
Original Assignee
Shenzhen Way Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Way Technology Co Ltd filed Critical Shenzhen Way Technology Co Ltd
Priority to CN201810555229.XA priority Critical patent/CN108833385A/en
Publication of CN108833385A publication Critical patent/CN108833385A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1044Group management mechanisms 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention discloses a kind of user data anonymity sharing method based on the encryption of alliance's chain, including:Each founder mechanism builds corresponding network data acquisition node and accesses alliance's chain network, forms initial chain;Rank and file mechanism establishes network data acquisition node after being verified, and sequentially accesses initial chain building alliance chain;Network data acquisition node obtains pseudonym identity and symmetric key corresponding with pseudonym identity;After network data acquisition node obtains data, upload request is sent to network data memory node;Final encryption data is decrypted by the private key of network data memory node to obtain assumed name encryption data;Network data memory node stores assumed name encryption data to local data base with the corresponding relationship of pseudonym identity;The data compression stored in stipulated time is generated block by network data memory node, and in the chain that coalizes.Effective control to rank and file mechanism permission is realized by building alliance's chain, ensure that the privacy of each member mechanism.

Description

User data anonymity sharing method based on the encryption of alliance's chain
Technical field
The present invention relates to Data Interchange Technology field more particularly to a kind of user data anonymity based on the encryption of alliance's chain are total Enjoy method.
Background technique
Block chain is the new application distribution formula data storage of one kind, point-to-point transmission, common recognition mechanism, Encryption Algorithm isotype Technology, it can be verified using block linked data structure algorithm of knowing together with storing data, using distributed node generating and More new data, utilizes what is be made of automatized script code at the safety for guaranteeing data transmission and access in the way of cryptography Intelligent contract programs and operation data, and block chain and relevant encryption technology and data sharing, data use the application such as safe It is closely related.
Block chain technology is just gradually applied to the multiple fields such as bank, finance, insurance at present, and mostly uses publicly-owned chain technology Bottom block chain is built, it, can not since access limit of the publicly-owned chain technology for block chain data lacks corresponding control Guarantee that each mechanism uploads the authenticity of data;In addition, each mechanism is when exchanging data, it usually needs the mutual true body of verifying Part, it is unfavorable for protecting the privacy of data providing, to limit the scale of shareable data.
Summary of the invention
The purpose of the present invention is to provide a kind of user data anonymity sharing methods based on the encryption of alliance's chain, pass through building Alliance's chain realizes effective control to rank and file mechanism permission, so that the acquisition threshold to shared data is limited, with The confidence level and safety of shared data are improved, in addition, to the member machine for initiating upload request or inquiry request or complaint request Structure carries out anonymous protection, ensure that the privacy of each member mechanism.
To achieve the goals above, it is total to provide a kind of user data anonymity based on the encryption of alliance's chain for an aspect of of the present present invention Method is enjoyed, including:
Each founder mechanism builds corresponding network data acquisition node and accesses alliance's chain network, is formed initial Chain;
Rank and file mechanism establishes network data acquisition node after being verified, and sequentially accesses the initial chain building connection Alliance's chain;
Network data acquisition node obtains pseudonym identity and symmetric key corresponding with the pseudonym identity;
After network data acquisition node obtains data, upload request is sent to network data memory node;
The network data memory node verifies whether the upload request passes through, if it is, receiving final encryption number According to, and the final encryption data is decrypted by the private key of the network data memory node to obtain assumed name encryption number According to;Wherein, the assumed name encryption data is that the network data acquisition node passes through the corresponding symmetric key of the pseudonym identity The data are encrypted to obtain, the final encryption data is that the network data acquisition node passes through the network data The public key of memory node is encrypted to obtain to the assumed name encryption data;
The network data memory node verifies whether the assumed name encryption data meets the requirements, if it is, will be described Assumed name encryption data is stored with the corresponding relationship of the pseudonym identity and the assumed name encryption data to local data base;
The data compression stored in stipulated time is generated block by the network data memory node, and connection is added In alliance's chain.
Rank and file mechanism establishes network data acquisition node after being verified, and sequentially accesses the initial chain building connection Alliance's chain;
When any member mechanism initiates upload request by respective network data acquisition node, to initiation upload request Member mechanism carry out anonymous protection and data broadcasting will be uploaded to each network data acquisition node of the whole network, know together in the whole network laggard Row data update;Alternatively,
When any member mechanism initiates inquiry request by respective network data acquisition node, to initiation inquiry request Member mechanism carry out anonymous protection and broadcast inquiry request to each network data acquisition node of the whole network, while obtaining inquiry number According to;Alternatively,
When any member mechanism initiates member's complaint request by respective network data acquisition node, know together through the whole network Judge whether complained member mechanism triggers punishment mechanism afterwards.
Specifically, each founder mechanism builds corresponding network data acquisition node and accesses alliance's link network Network, the method for forming initial chain include:
Generation and the one-to-one digital authenticating certificate of each founder mechanism, and by digital authenticating certificate receipt to correspondence Founder mechanism;
It is sequentially recorded the digital authenticating certificate of each founder mechanism, forms authentication list;
Corresponding network data acquisition node is built by founder mechanism, and authentication list is stored in each net respectively In network data acquisition node;
Authentication list is compared according to the digital authenticating certificate that founder mechanism holds, is allowed after being verified described original The corresponding network data acquisition node of member mechanism accesses alliance's chain network, forms initial chain.
Preferably, further include after the corresponding network data acquisition node access alliance's chain network of founder mechanism:
Typing organization information sum number is distinguished in network data acquisition node by the founder mechanism for accessing alliance's chain network Word authenticates the public key of certificate, and saves into the mechanism status database connecting with each network data acquisition node.
Preferably, the rank and file mechanism establishes network data acquisition node after being verified, it is sequentially ingressed into described Initially the method for chain building alliance chain includes:
The initial chain is added in the application of rank and file mechanism, and organization information is broadcasted to each network data acquisition section of the whole network Point;
Founder mechanism audits the organization information, and to each network data acquisition node broadcasts auditing result of the whole network;
After the auditing result of each founder mechanism is reached common understanding and agreed to, digital authenticating certificate receipt is generated to common Member mechanism;
The digital authenticating certificate sequence is added in the authentication list, and according to the new networking of digital authenticating certificate Network data acquisition node is successively connect with the initial chain network;
To the public key for creating organization information described in typing and the digital authenticating certificate in the network data acquisition node, And it saves into the mechanism status database being connect with each network data acquisition node;
The data of synchronous each network data acquisition node of the whole network, construct alliance's chain.
Specifically, described when any member mechanism initiates upload request by respective network data acquisition node, it is right The member mechanism for initiating upload request carries out anonymous protection and will upload data broadcasting to each network data acquisition node of the whole network, The method of progress data update includes after the whole network common recognition:
The first public private key pair is generated at random based on one-time pad technology, and the described first public and private key is saved to initiation and is uploaded The local address list of the member mechanism of request;
Selection uploads data, and the upload data include major key and data details, are added using the first public key to data details It is close to obtain data details ciphertext;
The extraction mechanism ID from the organization information of the member mechanism of upload request, and plaintext encryption is carried out to the mechanism ID Obtain primary encryption mechanism ID;
The public key for inquiring mechanism slip condition database Zhong Ge founder mechanism, is successively originated into using each according to set sequence The public key of member mechanism encrypts the primary encryption mechanism ID again, obtains secondary Sealing mechanism ID;
Using intelligent contract method for uploading by the major key, the data details ciphertext, first public key and described two Secondary Sealing mechanism ID packing is merged into shared data, and broadcasts to each network data acquisition node of the whole network;
The shared data is updated to the information state number connecting with each network data acquisition node after the whole network common recognition According to library, while return recording uploads the index value of data.
Optionally, described that mechanism ID progress is encrypted by the method for obtaining primary encryption mechanism ID in plain text includes:
The random regular length that generates is the character string of L, and the designated position of the character string interposer ID is obtained one Secondary Sealing mechanism ID.
Illustratively, it is described inquiry mechanism slip condition database Zhong Ge founder mechanism public key, according to set sequence according to The secondary public key using each founder mechanism encrypts the primary encryption mechanism ID again, obtains the side of secondary Sealing mechanism ID Method includes:
Authentication list is obtained from mechanism slip condition database, and extracts the public key of founder mechanism;
Successively the primary encryption mechanism ID is carried out using the public key of each founder mechanism according to set sequence compound Encryption, obtains secondary Sealing mechanism ID;
Wherein, the compound encryption refers to adds the data formed after n-th of public key encryption using (n+1)th public key again It is close.
Optionally, the one-time pad technology refers to:
The number of 32 bytes is randomly selected as private key, it is corresponding that the private key is calculated using elliptic curve encryption algorithm Uncompressed public key;
The cryptographic Hash for repeatedly calculating uncompressed public key takes the calculated result of last time cryptographic Hash to use base58 representation Address substitute obtains public key.
Specifically, described when any member mechanism initiates inquiry request by respective network data acquisition node, it is right The member mechanism for initiating inquiry request carries out anonymous protection and broadcasts inquiry request to each network data acquisition node of the whole network, together When obtain inquiry data method include:
According to inquiry data major key, using intelligent contract querying method in information state database retrieval and inquisition;
When there are inquiry data in information state database, shared data corresponding with the major key and index are returned Value;
Extract the first public key and data details ciphertext in the shared data, and from the member for initiating this inquiry request One first public key, the temporary public key as this inquiry request are randomly choosed in the local address list of mechanism;
With the first public key in the temporary public key, the index value, the data details ciphertext and the shared data As parameter the whole network broadcast distribution inquiry request;
Each network data acquisition node captures the inquiry request, while the upload member of shared data described in anonymously notifying Mechanism, which exists, is queried request;
The upload member mechanism of the shared data utilizes the first private key ciphertext data corresponding with the first public key of extraction Details ciphertext obtains data details, and wide to data details encryption formation return data ciphertext the whole network using temporary public key It broadcasts, while anonymously notifying initiates the member mechanism of inquiry request;
The member mechanism use temporary private key corresponding with the temporary public key of inquiry request is initiated to return data ciphertext Decryption, restoring data details obtain inquiry data.
Preferably, each network data acquisition node captures the inquiry request, the upload of anonymously notifying shared data There is the method for being queried request in member mechanism:
After each network data acquisition node captures the inquiry request, the first public key in shared data described in self-test is It is no there are in respective local address list, when local address list there are when first public key, can confirm it is corresponding at Member mechanism is the upload member mechanism of the shared data.
Preferably, the method that the anonymously notifying initiates the member mechanism of inquiry request includes:
After each network data acquisition node captures the broadcast of the return data ciphertext, return data ciphertext described in self-test In temporary public key with the presence or absence of in respective local address list, when local address list is there are when the temporary public key, i.e., It can confirm that corresponding member mechanism is to initiate the member mechanism of inquiry request.
Preferably, described when any member mechanism initiates member's complaint request by respective network data acquisition node When, the method for judging whether complained member mechanism triggers punishment mechanism after the whole network is known together includes:
According to the index value of violation data, complaint request is initiated to violation data and the whole network is broadcasted;
It is corresponding to the index value of violation data using the private key of each founder mechanism according to the reverse order of set sequence Secondary Sealing mechanism ID successively decrypt, obtain primary encryption mechanism ID;
The clear-text passwords in primary encryption mechanism ID is removed, the mechanism ID of complained member mechanism is obtained;
It calls the complaining method of intelligent contract to broadcast described mechanism ID the whole network, and records and complained successfully after the whole network common recognition Once;
When the mechanism ID, which is complained successful number, reaches threshold value, triggers the triggering to complained member mechanism and punish Mechanism.
Compared with prior art, it is provided by the invention based on alliance's chain encryption user data anonymity sharing method have with Lower beneficial effect:
Initial chain is built by multiple founder mechanisms, and constructs alliance's chain after initial chain is added in rank and file mechanism, So that founder mechanism can effectively manage rank and file mechanism using alliance's chain, to limit the acquisition of shared data Threshold improves the confidence level and safety of data;In addition, when any member mechanism is sent out by respective network data acquisition node When playing operation requests, anonymous protection can be carried out to member's organization information, so that initiating the letter of the member mechanism of operation requests Breath can be maintained secrecy, to realize the secret protection to each member mechanism, wherein operation requests include upload request, inquiry request With member's complaint request.
Another aspect of the present invention provides a kind of user data anonymity shared system based on the encryption of alliance's chain, is applied to upper It states in the user data anonymity sharing method based on the encryption of alliance's chain described in technical solution, the system comprises:
The initial chain forms unit, builds corresponding network data acquisition node simultaneously for each founder mechanism Alliance's chain network is accessed, initial chain is formed;
Alliance's chain building unit establishes network data acquisition node for rank and file mechanism after being verified, Sequentially access the initial chain building alliance chain;
The judging unit, the request class initiated for judging member mechanism by respective network data acquisition node Type, and according to any one of the corresponding response uploading unit of the request type, query unit, complaint unit;
The uploading unit is used to carry out anonymous protection to the member mechanism for initiating upload request and will upload data broadcasting To each network data acquisition node of the whole network, data update is carried out after the whole network common recognition;
The query unit is used to carry out anonymous protection to the member mechanism for initiating inquiry request and broadcasts inquiry request To each network data acquisition node of the whole network, while obtaining inquiry data;
It is total through the whole network when the complaint unit is used to initiate member's complaint request by respective network data acquisition node Judge whether complained member mechanism triggers punishment mechanism after knowledge.
Compared with prior art, the user data anonymity shared system provided by the invention based on the encryption of alliance's chain is beneficial Effect is identical as the user data anonymity sharing method beneficial effect based on the encryption of alliance's chain that above-mentioned technical proposal provides, herein It does not repeat them here.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes a part of the invention, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the process signal of the user data anonymity sharing method based on the encryption of alliance's chain in the embodiment of the present invention one Figure;
Fig. 2 is the construction method flow diagram of initial chain in Fig. 1;
Fig. 3 is the construction method flow diagram of Tu1Zhong alliance chain.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, implement below in conjunction with the present invention Attached drawing in example, technical scheme in the embodiment of the invention is clearly and completely described.Obviously, described embodiment Only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, the common skill in this field Art personnel all other embodiment obtained without creative labor belongs to the model that the present invention protects It encloses.
Fig. 1 is the process signal of the user data anonymity sharing method based on the encryption of alliance's chain in the embodiment of the present invention one Figure.Referring to Fig. 1, the present embodiment provides a kind of user data anonymity sharing methods based on the encryption of alliance's chain, including:
Each founder mechanism builds corresponding network data acquisition node and accesses alliance's chain network, is formed initial Chain;
Rank and file mechanism establishes network data acquisition node after being verified, and sequentially accesses the initial chain building connection Alliance's chain;
Network data acquisition node obtains pseudonym identity and symmetric key corresponding with the pseudonym identity;
After network data acquisition node obtains data, upload request is sent to network data memory node;
The network data memory node verifies whether the upload request passes through, if it is, receiving final encryption number According to, and the final encryption data is decrypted by the private key of the network data memory node to obtain assumed name encryption number According to;Wherein, the assumed name encryption data is that the network data acquisition node passes through the corresponding symmetric key of the pseudonym identity The data are encrypted to obtain, the final encryption data is that the network data acquisition node passes through the network data The public key of memory node is encrypted to obtain to the assumed name encryption data;
The network data memory node verifies whether the assumed name encryption data meets the requirements, if it is, will be described Assumed name encryption data is stored with the corresponding relationship of the pseudonym identity and the assumed name encryption data to local data base;
The data compression stored in stipulated time is generated block by the network data memory node, and connection is added In alliance's chain.
When any member mechanism initiates upload request by respective network data acquisition node, to initiation upload request Member mechanism carry out anonymous protection and data broadcasting will be uploaded to each network data acquisition node of the whole network, know together in the whole network laggard Row data update;Alternatively,
When any member mechanism initiates inquiry request by respective network data acquisition node, to initiation inquiry request Member mechanism carry out anonymous protection and broadcast inquiry request to each network data acquisition node of the whole network, while obtaining inquiry number According to;Alternatively,
When any member mechanism initiates member's complaint request by respective network data acquisition node, know together through the whole network Judge whether complained member mechanism triggers punishment mechanism afterwards.
When it is implemented, alliance's chain in the present embodiment is built using super account book Fabric frame, due to super account book Fabric is using modular frame technology, and the algorithm that super account book Fabric is used is Kafka common recognition ranking method, therefore With good amplification property and data-handling efficiency;Specifically, each network data acquisition node includes the multiple of sequential connection Orderer node (each Orderer node is equivalent to a block), and connect one to one with Orderer node more A Peer node, Peer node is for receiving request operation, since the received request operation of each Peer node is different, It needs to summarize by Orderer all request operations and the request operation summarized is ranked up, and is right after the whole network common recognition Each network data acquisition node is updated, to guarantee the consistency of each node data of the whole network.
According to it is provided by the above embodiment based on alliance's chain encryption user data anonymity sharing method it is found that firstly, by Initial chain is built by multiple founder mechanisms, and constructs alliance's chain after initial chain is added in rank and file mechanism, so as to originate into Member mechanism can effectively manage rank and file mechanism using alliance's chain, and the acquisition threshold of shared data is limited, and improve number According to confidence level and safety;In addition, when any member mechanism initiates operation requests by respective network data acquisition node When, anonymous protection can be carried out to member's organization information, and the information for the member mechanism for initiating operation requests is protected It is close, to realize the secret protection to each member mechanism, wherein operation requests include that upload request, inquiry request and member complain Request.
Specifically, referring to Fig. 2, corresponding network data acquisition is built by above-described embodiment Zhong Ge founder mechanism Node simultaneously accesses alliance's chain network, and the method for forming initial chain includes:
Generation and the one-to-one digital authenticating certificate of each founder mechanism, and by digital authenticating certificate receipt to correspondence Founder mechanism;It is sequentially recorded the digital authenticating certificate of each founder mechanism, forms authentication list;Founder mechanism Corresponding network data acquisition node is built, and authentication list is stored in respectively in each network data acquisition node;Root Authentication list is compared according to the digital authenticating certificate that founder mechanism holds, the founder mechanism pair is allowed after being verified The network data acquisition node access alliance's chain network answered, forms initial chain;The founder mechanism of access alliance's chain network exists The public key of typing organization information and digital authentication proof book is distinguished in network data acquisition node, and is saved and extremely adopted with each network data In the mechanism status database for collecting node connection.
When it is implemented, the digital authenticating certificate of each founder mechanism includes a unique public private key pair, (calibration mode is equivalent to by the way that an authentication list can be obtained in the digital authenticating certificate journal of each founder mechanism Plate), and the authentication list of generation is synchronized to each network data acquisition node, thus when the application of any founder mechanism is added When alliance's chain network, digital authenticating certificate and the authentication list that need to be held are compared, when there being above-mentioned number in authentication list When authenticating certificate, then verification is by allowing its to access alliance's chain network, when there not being above-mentioned digital authenticating certificate in authentication list When, then it verifies and unsuccessfully refuses its access alliance's chain network.
Further, referring to Fig. 3, rank and file mechanism establishes network data after being verified and adopts in above-described embodiment Collect node, the method for being sequentially ingressed into initial chain building alliance chain includes:
Initial chain is added in the application of rank and file mechanism, and organization information is broadcasted to each network data acquisition node of the whole network; Founder mechanism audits organization information, and to each network data acquisition node broadcasts auditing result of the whole network;As each founder After the auditing result of mechanism is reached common understanding and agreed to, generates digital authenticating certificate receipt and give rank and file mechanism;By digital authenticating Certificate sequence be added authentication list in, and according to digital authenticating certificate New-deployed Network data acquisition node successively with initial chain network Connection;The public key of typing organization information and digital authentication proof book into New-deployed Network data acquisition node, and save to each net In the mechanism status database of network data acquisition node connection;The data of synchronous each network data acquisition node of the whole network, building connection Alliance's chain.What above-described embodiment illustrated is the process that rank and file mechanism (recruit) is dynamically added alliance's chain, rank and file mechanism Application coalize chain when, needing to obtain approving after examination for each founder mechanism can just be allowed to be added, with realize to common Effective control of member mechanism permission provides the acquisition threshold of shared data.
Specifically, it is asked in above-described embodiment when any member mechanism initiates to upload by respective network data acquisition node When asking, anonymous protection is carried out to the member mechanism for initiating upload request and data broadcasting will be uploaded to each network data acquisition of the whole network Node, the method that data update is carried out after the whole network common recognition include:
The first public private key pair is generated at random based on one-time pad technology, and the first public and private key is saved to initiation upload request Member mechanism local address list;Selection uploads data, and uploading data includes major key and data details, utilizes the first public key Data details ciphertext is obtained to data details encryption;The extraction mechanism ID from the organization information of the member mechanism of upload request, and Encryption in plain text is carried out to mechanism ID and obtains primary encryption mechanism ID;Inquire the public affairs of mechanism slip condition database Zhong Ge founder mechanism Key successively encrypts primary encryption mechanism ID using the public key of each founder mechanism again according to set sequence, obtains secondary Sealing mechanism ID;Major key, data details ciphertext, the first public key and secondary Sealing mechanism ID are beaten using intelligent contract method for uploading Packet is merged into shared data, and broadcasts to each network data acquisition node of the whole network;Shared data is updated to after the whole network common recognition The information state database being connect with each network data acquisition node, while return recording uploads the index value of data.
Illustratively, encrypting the method for obtaining primary encryption mechanism ID in plain text to mechanism ID progress is:Random generate is fixed Length is the character string of L, and the designated position of character string interposer ID is obtained primary encryption mechanism ID.Wherein, " specific bit Set " it can be any position of mechanism ID, but the decryption of primary encryption mechanism ID for convenience, it is preferable that " designated position " is After mechanism ID.
The public key of above-mentioned inquiry mechanism slip condition database Zhong Ge founder mechanism, successively uses each wound according to set sequence The public key of beginning member mechanism encrypts the primary encryption mechanism ID again, and the method for obtaining secondary Sealing mechanism ID includes:From Authentication list is obtained in mechanism status database, and extracts the public key of founder mechanism;It is successively used respectively according to set sequence The public key of founder mechanism carries out compound encryption to the primary encryption mechanism ID, obtains secondary Sealing mechanism ID;Wherein, institute Compound encryption is stated to refer to and encrypt the data formed after n-th of public key encryption again using (n+1)th public key.
Theoretically " the set sequence " can be the arbitary convention sequence that each founder mechanism notes, but solve for adding From the aspect of close convenience, " set sequence " in the present embodiment is that digital authenticating certificate puts in order in authentication list, this Sample can facilitate decrypting process, need to only decrypt according to the backward that digital authenticating certificate puts in order.
By above-mentioned implementation process it is found that generating the first public private key pair at random by one-time pad technology, the first public affairs are utilized Key encrypts the data details for uploading data to obtain data details ciphertext, and is encrypted using character string and originated into each in plain text Member's authority public key encrypts the encryption technology means combined, multi-enciphering is carried out to the member mechanism ID of upload request, to obtain The packing of the data such as data details ciphertext, the first public key, secondary Sealing mechanism ID is finally merged into shared by secondary Sealing mechanism ID Data the whole network broadcast, so that network data acquisition node can not learn shared data in the case where not decrypting to shared data In data details and upload request member mechanism ID, and then realize to upload request member mechanism anonymity protect.
It is understood that above-mentioned one-time pad technology refers to:The number of 32 bytes is randomly selected as private key, is used Elliptic curve encryption algorithm calculates the corresponding uncompressed public key of the private key;The cryptographic Hash for repeatedly calculating uncompressed public key, takes most The calculated result of a cryptographic Hash obtains public key using base58 representation address substitute afterwards.
Illustratively, one-time pad technology includes the following steps:
S1:The number of 32 bytes is randomly selected as private key;
S2:The corresponding uncompressed public key of the private key is calculated using elliptic curve encryption algorithm;
S3:Calculate the SHA-256 cryptographic Hash of public key;
S4:Previous step is taken as a result, calculating RIPEMD-160 cryptographic Hash;
S5:Address version number is added before previous step result;
S6:Previous step is taken as a result, calculating SHA-256 cryptographic Hash;
S7:Previous step is taken as a result, calculating a SHA-256 cryptographic Hash again;
S8:Preceding 4 bytes of previous step result are taken, and this 4 bytes are added in behind the result of S5, obtain verification knot Fruit;
S9:Based on above-mentioned check results, its address is converted with base58 representation and obtains public key.
Further, when any member mechanism initiates inquiry by respective network data acquisition node in above-described embodiment When request, the member mechanism for initiating inquiry request is carried out anonymous protection and broadcasts inquiry request to each network data of the whole network to adopt Collect node, while the method for obtaining inquiry data includes:
According to inquiry data major key, using intelligent contract querying method in information state database retrieval and inquisition;When When there are inquiry data in information state database, shared data corresponding with major key and index value are returned;Extract shared data In the first public key and data details ciphertext, and it is random from the local address list of member mechanism for initiating this inquiry request One first public key is selected, the temporary public key as this inquiry request;With temporary public key, index value, data details ciphertext and it is total to The first public key in data is enjoyed as parameter the whole network broadcast distribution inquiry request;Each network data acquisition node capture inquiry is asked It asks, the upload member mechanism of anonymously notifying shared data, which exists, is queried request;The upload member mechanism of shared data utilize with The corresponding first private key ciphertext data details ciphertext of the first public key extracted obtains data details, and using temporary public key to data Details encryption forms the broadcast of return data ciphertext the whole network, while anonymously notifying initiates the member mechanism of inquiry request;Initiate inquiry The member mechanism use of request temporary private key corresponding with temporary public key decrypts return data ciphertext, and restoring data details obtain Inquire data.
Inquiry request is corresponding process with upload request, when it is implemented, passing through business platform input inquiry data Major key returns to sky when inquiry data are not present in information state database, when information state database, which exists, inquires data, returns Return shared data corresponding with major key and index value;At this point, initiating the member mechanism of inquiry request can mention from shared data Take out the first public key and data details ciphertext, and in order to guarantee to make to initiate inquiry request member mechanism (hereinafter referred to as inquiry at Member mechanism) it anonymous can inquire, inquiry member mechanism randomly chooses one first public key from its local address list, as this The temporary public key of secondary inquiry request, while by the first public key in temporary public key, index value, data details ciphertext, shared data As parameter the whole network broadcast distribution inquiry request, it is queried request to inform that the upload member mechanism of the shared data exists, When upload member mechanism learn it is above-mentioned be queried request after, use corresponding with the first public key of extraction the first private key to decrypt immediately Data details ciphertext restoring data details, and return data ciphertext the whole network is formed to the data details encryption using temporary public key Broadcast, while anonymously notifying initiates the member mechanism of inquiry request, so that inquiry member mechanism is corresponding temporarily using temporary public key Return data ciphertext is decrypted with private key, restoring data details obtain inquiry data.
By above-mentioned implementation process it is found that inquiry member mechanism pretends its true identity using temporary public key, with Realize the anonymity of inquiry request, while by the first public key in temporary public key, index value, data details ciphertext, shared data The upload member mechanism of transmitting shared data (including inquiring data) on anonymously notifying, after uploading member mechanism restoring data details, It is encrypted using the temporary public key of inquiry member mechanism transmitted, anonymity, which returns to inquiry member mechanism, makes it obtain inquiry number According to;As it can be seen that the present embodiment can be realized inquiry member mechanism and upload the two-way anonymity of member mechanism, member mechanism letter is improved The shared safety of breath.
You need to add is that above-mentioned each network data acquisition node captures inquiry request, anonymously notifying shared data it is upper Member mechanism, which is passed, in the presence of the method for being queried request includes:After each network data acquisition node captures inquiry request, self-test is total The first public key in data is enjoyed with the presence or absence of in respective local address list, when local address list is there are when the first public key, It can confirm that corresponding member mechanism is the upload member mechanism of shared data.That is, each member mechanism passes through than respective local Address list, when not having corresponding first public key in its local address list, can confirm oneself not is the upper of shared data Member mechanism is passed, on the contrary, when having corresponding first public key in its local address list, it can confirm it oneself is shared number According to upload member mechanism, since entire comparison result only has that member mechanism is known oneself and other people do not know, to realize Anonymously notifying.
The method that above-mentioned anonymously notifying initiates the member mechanism of inquiry request includes:Each network data acquisition node captures After the broadcast of return data ciphertext, the temporary public key in self-test return data ciphertext whether there is respective local address list In, when there are when temporary public key, can confirm that corresponding member mechanism is the member machine for initiating inquiry request for local address list Structure.When it is implemented, the method that anonymously notifying initiates the member mechanism of inquiry request, upper with above-mentioned anonymously notifying shared data It is identical in the presence of the method for being queried request to pass member mechanism, this will not be repeated here.
Further, when any member mechanism initiates member by respective network data acquisition node in above-described embodiment When complaint request, the method for judging whether complained member mechanism triggers punishment mechanism after the whole network is known together includes:
According to the index value of violation data, complaint request is initiated to violation data and the whole network is broadcasted;According to set sequence Reverse order is successively solved using the private key of each founder mechanism secondary Sealing mechanism ID corresponding to the index value of violation data It is close, obtain primary encryption mechanism ID;The clear-text passwords in primary encryption mechanism ID is removed, the mechanism of complained member mechanism is obtained ID;Call the complaining method of intelligent contract to broadcast mechanism ID the whole network, and after the whole network common recognition record complain it is successfully primary;Work as machine When structure ID is complained successful number and reaches threshold value, triggers the triggering to complained member mechanism and punish mechanism.
It is understood that the mechanism ID method of complained member is decrypted in the present embodiment, with encryption upload request member The method of mechanism ID is mutually echoed, and this will not be repeated here.Illustratively, punishment mechanism is to limit complained mechanism to information state number According to the access limit in library, and then realize the supervision to member mechanism malicious act.
It will appreciated by the skilled person that realizing that all or part of the steps in foregoing invention method is can to lead to Program is crossed to instruct relevant hardware and complete, above procedure can store in computer-readable storage medium, the program When being executed, each step including above-described embodiment method, and storage medium can be:ROM/RAM, magnetic disk, CD, storage Card etc..
More than, only a specific embodiment of the invention, but scope of protection of the present invention is not limited thereto, and it is any to be familiar with Those skilled in the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all cover Within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (10)

1. a kind of user data anonymity sharing method based on the encryption of alliance's chain, which is characterized in that including:
Each founder mechanism builds corresponding network data acquisition node and accesses alliance's chain network, forms initial chain;
Rank and file mechanism establishes network data acquisition node after being verified, and sequentially accesses the initial chain building alliance Chain;
Network data acquisition node obtains pseudonym identity and symmetric key corresponding with the pseudonym identity;
After network data acquisition node obtains data, upload request is sent to network data memory node;
The network data memory node verifies whether the upload request passes through, if it is, final encryption data is received, and The final encryption data is decrypted to obtain assumed name encryption data by the private key of the network data memory node;Its In, the assumed name encryption data is that the network data acquisition node passes through the corresponding symmetric key of the pseudonym identity to described Data are encrypted to obtain, and the final encryption data is that the network data acquisition node is saved by network data storage The public key of point is encrypted to obtain to the assumed name encryption data;
The network data memory node verifies whether the assumed name encryption data meets the requirements, if it is, by the assumed name Encryption data is stored with the corresponding relationship of the pseudonym identity and the assumed name encryption data to local data base;
The data compression stored in stipulated time is generated block, and the chain that coalizes by the network data memory node In.
2. user data anonymity sharing method according to claim 1, which is characterized in that each founder mechanism takes It builds corresponding network data acquisition node and accesses alliance's chain network, the method for forming initial chain includes:
Generation and the one-to-one digital authenticating certificate of each founder mechanism, and give digital authenticating certificate receipt to corresponding wound Beginning member mechanism;
It is sequentially recorded the digital authenticating certificate of each founder mechanism, forms authentication list;
Corresponding network data acquisition node is built by founder mechanism, and authentication list is stored in each network number respectively According in acquisition node;
Authentication list is compared according to the digital authenticating certificate that founder mechanism holds, the founder is allowed after being verified The corresponding network data acquisition node of mechanism accesses alliance's chain network, forms initial chain.
3. user data anonymity sharing method according to claim 2, which is characterized in that corresponding in founder mechanism Further include after network data acquisition node access alliance's chain network:
Typing organization information and number are recognized respectively in network data acquisition node for the founder mechanism of access alliance's chain network The public key of certificate is demonstrate,proved, and is saved into the mechanism status database being connect with each network data acquisition node.
4. user data anonymity sharing method according to claim 2 or 3, which is characterized in that the rank and file mechanism Network data acquisition node is established after being verified, the method for being sequentially ingressed into the initial chain building alliance chain includes:
The initial chain is added in the application of rank and file mechanism, and organization information is broadcasted to each network data acquisition node of the whole network;
Founder mechanism audits the organization information, and to each network data acquisition node broadcasts auditing result of the whole network;
After the auditing result of each founder mechanism is reached common understanding and agreed to, digital authenticating certificate receipt is generated to rank and file Mechanism;
The digital authenticating certificate sequence is added in the authentication list, and according to the digital authenticating certificate New-deployed Network number It is successively connect with the initial chain network according to acquisition node;
To creating the public key of organization information described in typing and the digital authenticating certificate in the network data acquisition node, and protect It deposits into the mechanism status database being connect with each network data acquisition node;
The data of synchronous each network data acquisition node of the whole network, construct alliance's chain.
5. user data anonymity sharing method according to claim 4, which is characterized in that described when any member mechanism is logical When crossing respective network data acquisition node initiation upload request, anonymous protection is carried out simultaneously to the member mechanism for initiating upload request Data broadcasting will be uploaded to each network data acquisition node of the whole network, the method that data update is carried out after the whole network common recognition includes:
The first public private key pair is generated at random based on one-time pad technology, and the described first public and private key is saved to initiation upload request Member mechanism local address list;
Selection uploads data, and the upload data include major key and data details, are obtained using the first public key to data details encryption To data details ciphertext;
The extraction mechanism ID from the organization information of the member mechanism of upload request, and encryption in plain text is carried out to the mechanism ID and is obtained Primary encryption mechanism ID;
The public key for inquiring mechanism slip condition database Zhong Ge founder mechanism, successively uses each founder's machine according to set sequence The public key of structure encrypts the primary encryption mechanism ID again, obtains secondary Sealing mechanism ID;
Using intelligent contract method for uploading by the major key, the data details ciphertext, first public key and it is described it is secondary plus Close mechanism ID packing is merged into shared data, and broadcasts to each network data acquisition node of the whole network;
The shared data is updated to the information state database connecting with each network data acquisition node after the whole network common recognition, Return recording uploads the index value of data simultaneously.
6. user data anonymity sharing method according to claim 5, which is characterized in that described to be carried out in plain text to mechanism ID Encrypting the method for obtaining primary encryption mechanism ID includes:
It is random to generate the character string that regular length is L, and the designated position of the character string interposer ID is obtained once adding Close mechanism ID.
7. user data anonymity sharing method according to claim 5 or 6, which is characterized in that the inquiry mechanism status The public key of database Zhong Ge founder mechanism successively uses the public key of each founder mechanism to described one according to set sequence Secondary Sealing mechanism ID is encrypted again, and the method for obtaining secondary Sealing mechanism ID includes:
Authentication list is obtained from mechanism slip condition database, and extracts the public key of founder mechanism;
Compound encryption successively is carried out to the primary encryption mechanism ID using the public key of each founder mechanism according to set sequence, Obtain secondary Sealing mechanism ID;
Wherein, the compound encryption refers to encrypts the data formed after n-th of public key encryption using (n+1)th public key again.
8. user data anonymity sharing method according to claim 5, which is characterized in that the one-time pad technology is Refer to:
The number of 32 bytes is randomly selected as private key, it is corresponding non-depressed that the private key is calculated using elliptic curve encryption algorithm Contracting public key;
The cryptographic Hash for repeatedly calculating uncompressed public key takes the calculated result of last time cryptographic Hash to convert using base58 representation Address obtains public key.
9. user data anonymity sharing method according to claim 4, which is characterized in that described when any member mechanism is logical When crossing respective network data acquisition node initiation inquiry request, anonymous protection is carried out simultaneously to the member mechanism for initiating inquiry request Inquiry request is broadcasted to each network data acquisition node of the whole network, while the method for obtaining inquiry data includes:
According to inquiry data major key, using intelligent contract querying method in information state database retrieval and inquisition;
When there are inquiry data in information state database, shared data corresponding with the major key and index value are returned;
Extract the first public key and data details ciphertext in the shared data, and from the member mechanism for initiating this inquiry request Local address list in randomly choose one first public key, the temporary public key as this inquiry request;
Using the first public key in the temporary public key, the index value, the data details ciphertext and the shared data as Parameter the whole network broadcast distribution inquiry request;
Each network data acquisition node captures the inquiry request, and the upload member mechanism of shared data described in anonymously notifying exists It is queried request;
The upload member mechanism of the shared data utilizes the first private key ciphertext data details corresponding with the first public key of extraction Ciphertext obtains data details, and forms return data ciphertext the whole network to the data details encryption using temporary public key and broadcast, together When anonymously notifying initiate inquiry request member mechanism;
The member mechanism use temporary private key corresponding with the temporary public key for initiating inquiry request decrypts return data ciphertext, Restoring data details obtain inquiry data.
10. user data anonymity sharing method according to claim 5, which is characterized in that each network data acquisition Node captures the inquiry request, and the upload member mechanism of anonymously notifying shared data has the method for being queried request and includes:
After each network data acquisition node captures the inquiry request, whether the first public key in shared data described in self-test is deposited In respective local address list, when local address list is there are when first public key, corresponding member machine can be confirmed Structure is the upload member mechanism of the shared data.
CN201810555229.XA 2018-06-01 2018-06-01 User data anonymity sharing method based on the encryption of alliance's chain Withdrawn CN108833385A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810555229.XA CN108833385A (en) 2018-06-01 2018-06-01 User data anonymity sharing method based on the encryption of alliance's chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810555229.XA CN108833385A (en) 2018-06-01 2018-06-01 User data anonymity sharing method based on the encryption of alliance's chain

Publications (1)

Publication Number Publication Date
CN108833385A true CN108833385A (en) 2018-11-16

Family

ID=64145743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810555229.XA Withdrawn CN108833385A (en) 2018-06-01 2018-06-01 User data anonymity sharing method based on the encryption of alliance's chain

Country Status (1)

Country Link
CN (1) CN108833385A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109831418A (en) * 2018-12-28 2019-05-31 无锡井通网络科技有限公司 Credible alliance's chain building method, system and electronic equipment based on certificate
CN110059495A (en) * 2018-12-14 2019-07-26 阿里巴巴集团控股有限公司 Data sharing method, apparatus and system, electronic equipment
CN110061968A (en) * 2019-03-15 2019-07-26 广东工程职业技术学院 A kind of file encryption-decryption method based on block chain, system and storage medium
CN110210249A (en) * 2019-06-13 2019-09-06 上海富数科技有限公司 The system and method for track query function of hideing are realized based on data obfuscation
CN110474886A (en) * 2019-07-24 2019-11-19 深圳壹账通智能科技有限公司 Data ciphering method, device, electronic equipment and storage medium based on block chain
CN110809000A (en) * 2019-11-12 2020-02-18 中钞信用卡产业发展有限公司杭州区块链技术研究院 Service interaction method, device, equipment and storage medium based on block chain network
CN111079136A (en) * 2019-11-07 2020-04-28 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN111327415A (en) * 2018-12-13 2020-06-23 航天信息股份有限公司 Alliance link data protection method and device
CN111402037A (en) * 2020-04-15 2020-07-10 中国银行股份有限公司 User data processing method and device
CN111556026A (en) * 2020-04-08 2020-08-18 东南大学 Anonymous identity authentication method based on alliance chain
CN111614739A (en) * 2020-05-08 2020-09-01 中国信息通信研究院 Network measurement data storage method, device and system
CN111861117A (en) * 2020-06-16 2020-10-30 北京工业大学 Musical instrument evaluation data sharing method and system based on alliance chain
CN112039892A (en) * 2020-08-31 2020-12-04 中国信息通信研究院 Data sharing method and related device
CN113392430A (en) * 2021-05-27 2021-09-14 中国联合网络通信集团有限公司 Digital resource management method and system based on intelligent contract authentication
CN114065253A (en) * 2021-11-22 2022-02-18 上海旺链信息科技有限公司 Method for anonymous sharing and verification of certificate and result
CN115801368A (en) * 2022-11-07 2023-03-14 昆明理工大学 Data sharing method based on alliance chain

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327415A (en) * 2018-12-13 2020-06-23 航天信息股份有限公司 Alliance link data protection method and device
CN110059495A (en) * 2018-12-14 2019-07-26 阿里巴巴集团控股有限公司 Data sharing method, apparatus and system, electronic equipment
CN110059495B (en) * 2018-12-14 2020-11-17 创新先进技术有限公司 Data sharing method, device and system and electronic equipment
CN109831418A (en) * 2018-12-28 2019-05-31 无锡井通网络科技有限公司 Credible alliance's chain building method, system and electronic equipment based on certificate
CN110061968A (en) * 2019-03-15 2019-07-26 广东工程职业技术学院 A kind of file encryption-decryption method based on block chain, system and storage medium
CN110210249A (en) * 2019-06-13 2019-09-06 上海富数科技有限公司 The system and method for track query function of hideing are realized based on data obfuscation
CN110210249B (en) * 2019-06-13 2021-01-08 上海富数科技有限公司 System and method for realizing track hiding query function based on data confusion
CN110474886A (en) * 2019-07-24 2019-11-19 深圳壹账通智能科技有限公司 Data ciphering method, device, electronic equipment and storage medium based on block chain
CN110474886B (en) * 2019-07-24 2022-04-05 深圳壹账通智能科技有限公司 Block chain based data encryption method and device, electronic equipment and storage medium
CN111079136A (en) * 2019-11-07 2020-04-28 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN111079136B (en) * 2019-11-07 2022-02-11 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN110809000A (en) * 2019-11-12 2020-02-18 中钞信用卡产业发展有限公司杭州区块链技术研究院 Service interaction method, device, equipment and storage medium based on block chain network
CN111556026A (en) * 2020-04-08 2020-08-18 东南大学 Anonymous identity authentication method based on alliance chain
CN111402037A (en) * 2020-04-15 2020-07-10 中国银行股份有限公司 User data processing method and device
CN111614739A (en) * 2020-05-08 2020-09-01 中国信息通信研究院 Network measurement data storage method, device and system
CN111861117A (en) * 2020-06-16 2020-10-30 北京工业大学 Musical instrument evaluation data sharing method and system based on alliance chain
CN112039892A (en) * 2020-08-31 2020-12-04 中国信息通信研究院 Data sharing method and related device
CN112039892B (en) * 2020-08-31 2022-11-29 中国信息通信研究院 Data sharing method and related device
CN113392430A (en) * 2021-05-27 2021-09-14 中国联合网络通信集团有限公司 Digital resource management method and system based on intelligent contract authentication
CN113392430B (en) * 2021-05-27 2023-05-19 中国联合网络通信集团有限公司 Digital resource management method and system based on intelligent contract authentication
CN114065253A (en) * 2021-11-22 2022-02-18 上海旺链信息科技有限公司 Method for anonymous sharing and verification of certificate and result
CN115801368A (en) * 2022-11-07 2023-03-14 昆明理工大学 Data sharing method based on alliance chain

Similar Documents

Publication Publication Date Title
CN108833385A (en) User data anonymity sharing method based on the encryption of alliance's chain
CN108632292A (en) Data sharing method based on alliance's chain and system
CN109040139B (en) Identity authentication system and method based on block chain and intelligent contract
CN108881189A (en) User data anonymity shared system based on alliance's chain
CN104579694B (en) A kind of identity identifying method and system
CN105025012B (en) Towards the access control system and its access control method of cloud storage service platform
Gong Optimal authentification protocols resistant to password guessing attacks
WO2016197770A1 (en) Access control system and access control method thereof for cloud storage service platform
CN109145612B (en) Block chain-based cloud data sharing method for preventing data tampering and user collusion
CN110224814A (en) A kind of block chain data sharing method and device
CN110046521A (en) Decentralization method for secret protection
CN111371561A (en) Alliance block chain data access control method based on CP-ABE algorithm
CN109120639A (en) A kind of data cloud storage encryption method and system based on block chain
CN109543443A (en) User data management, device, equipment and storage medium based on block chain
CN108429759A (en) Decentralization stores safety implementation method
CN108959911A (en) A kind of key chain generates, verification method and its device
CN102075544A (en) Encryption system, encryption method and decryption method for local area network shared file
Jin et al. Anonymous deduplication of encrypted data with proof of ownership in cloud storage
CN109347832A (en) A kind of dynamic data sharing method, terminal device and proxy server
CN108632385B (en) Time sequence-based cloud storage privacy protection method for multi-branch tree data index structure
CN110191153A (en) Social communication method based on block chain
Feng et al. Blockchain data privacy access control based on searchable attribute encryption
WO2021190453A1 (en) Lightweight attribute-based signcryption method for cloud and fog-assisted internet of things
CN111917543B (en) User access cloud platform security access authentication system and application method thereof
Abdalla et al. (Password) authenticated key establishment: From 2-party to group

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181116