CN109636599A - License block chain secret protection and monitoring and managing method based on group ranking - Google Patents

License block chain secret protection and monitoring and managing method based on group ranking Download PDF

Info

Publication number
CN109636599A
CN109636599A CN201811316497.2A CN201811316497A CN109636599A CN 109636599 A CN109636599 A CN 109636599A CN 201811316497 A CN201811316497 A CN 201811316497A CN 109636599 A CN109636599 A CN 109636599A
Authority
CN
China
Prior art keywords
transaction
user
block chain
endorsement
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811316497.2A
Other languages
Chinese (zh)
Inventor
刘鹏
李春培
李先贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangxi Normal University
Original Assignee
Guangxi Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangxi Normal University filed Critical Guangxi Normal University
Priority to CN201811316497.2A priority Critical patent/CN109636599A/en
Publication of CN109636599A publication Critical patent/CN109636599A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses a kind of license block chain secret protection based on group ranking and monitoring and managing method; it is in process of exchange; the either common recognition process of the endorsement verifying of endorsement node or the sequence service of ordering joint and host node and accounting nodes; it is able to validate only the legitimacy of both parties' identity; signature cannot be mapped with user real identification, to ensure the privacy of identities of user.After the completion of transaction, supervision department can be by supervisory node block synchronous with other nodes, and then opening includes the signature in transaction, signature is mapped with the true identity of trade user, to supervise to block chain.

Description

License block chain secret protection and monitoring and managing method based on group ranking
Technical field
The present invention relates to block chain technical fields, and in particular to a kind of license block chain secret protection based on group ranking and Monitoring and managing method.
Background technique
Floor layer Technology of the block chain as bit coin, starts one research boom in recent years.Substantially block chain is one The database of kind decentralization, since its is anti-tamper, the features such as good opening and autonomy anonymity, with current social Mode is completely different, by pursuing for people, is even more described as " fourth industrial revolution " by people.What block chain solved is current society The trust problem of meeting is solved believable in incredible environment completion justice using certain cryptological technique and common recognition mechanism Operation.
However, there is also problems since there are no full maturitys for current block chain technology: on the one hand current Block chain also has quite serious privacy leakage problem.The especially transaction layer of block chain contains a large amount of sensitive transactions Information, such as the identity public key of user, Transaction Information, signature etc. are especially permitted the Transaction Information on block chain, be may relate to To trade secret;On the other hand because features, the oversight mechanism of block chain such as decentralization, anonymity of block chain technology are difficult to reality It applies, hampers the landing application of block chain project.Such as first publicly-owned chain application bit coin of block chain, each participant can To obtain complete data backup, all data be all it is open and clear, this is the advantageous feature of block chain, but is also ratio One deadly defect of special coin.Illegal attacker, can be by public key address with the account book data of specific method analysis bit coin It is mapped with the true address of bit coin user.Meanwhile because of the complete decentralization of bit coin, supervision department is difficult to bit coin To be supervised.Money laundering is carried out using block chain technology at present, is extorted and the event of other criminal activities emerges one after another, such as The viral wannacry that extorts for influencing 300,000, whole world user is exactly to be ransomed using bit coin.Since bit coin goes to center The features such as change, anonymization are difficult to prevent to extort behavior, track the identity information of blackmailer.Again to permit the super account book of block chain For Fabric, Fabric protects privacy with fine granularity, i.e., it is exclusive logical can to negotiate building one by several members in account book network Road is isolated from the outside, and the node outside channel can not see account book and transaction data therein, greatly improves privacy.But Cannot thus trade across channel (across chain), though channel interior peer node it can be seen that unrelated with oneself is complete Portion's transaction data.Fabric has perfect member management service, and certain supervision can be carried out to block chain, but such It supervises not thorough enough.
In conclusion either publicly-owned block chain still permits block chain, all there are problems that privacy leakage and supervision.It makes In terms of mainly having following two the problem of privacy leakage: (1) trackability of trading.It is more than current block chain transaction often The output of one transaction, as the input of next transaction, each transaction can trace back to a transaction.The attack of block chain Person can be by the method for certain social engineering, using the trackability of block chain, by the true of address public key and user Identity is mapped.(2) account book is of overall importance.In order to reach can not distorting and can not forging for digital asset, block chain it is each A node is owned by the global account book comprising all data, by analyzing these data, the privacy information of available user.And The problem of causing block chain to be difficult to lower supervision, mainly there is the following aspects: (1) decentralization.Block chain belongs to during one kind goes The technology of the heart, the influence between the node and node of block chain form nonlinear causal relationship by block chain network, are one Plant the system structure of open, flattening, equality.Because of the decentralization of block chain, so that supervision department cannot dominate block The application of chain loses the supervision status to block chain.(2) anonymity of user.Some rows that user occurs on block chain For be all it is anonymous, in addition to user, other users are difficult to guess the true identity of anonymous.Therefore supervision department without Method learns bottom, and who is movable in participation block chain, and supervision can not carry out.
Summary of the invention
The present invention deficiency existing in terms of secret protection and oversight mechanism for existing license block chain, provides one kind License block chain secret protection and monitoring and managing method based on group ranking, this method can protect license block chain under public visual angle Privacy, while can satisfy supervision department to license block chain supervision.
To solve the above problems, the present invention is achieved by the following technical solutions:
License block chain secret protection and monitoring and managing method based on group ranking, specifically include that steps are as follows:
Step 1, supervision department generate supervision department's public key to and supervision department's private key pair;
Step 2, the user A in license block chain and user B intend trading to digital asset DA;In transaction beginning Before, user A and user B apply that group is added to supervision department, and respectively obtain the final signing certificate that supervision department is sent;
After step 3, user A and user B obtain the final signing certificate of supervision department, sign respectively to transaction T, Transaction T after being signed1
Step 4, user A are by the transaction T after signature1It is sent to endorsement node;
Step 5, book node are to the transaction T after signature1Before being endorsed, first authentication user A and user B are to friendship The legitimacy easily signed;Endorsement node is to the transaction T after signature after being verified1It endorses, and endorsement is proved to send Give user A;
Step 6, user A prove endorsement the transaction T after signing is added1, the transaction proved comprising endorsement is formed, i.e., Transaction T after endorsement2
Step 7, user A are by the transaction T after endorsement2It is sent to ordering joint;
Transaction T after step 8, ordering joint verifying endorsement2Endorsement prove, by the transaction after endorsement after being verified T2It is put into trading pit;
Step 9, after the transaction amount amount of trading pit reaches certain threshold value, these transaction are packaged into area by node of endorsing Block is sent to host node and accounting nodes, and by certain common recognition mechanism block chain is added in block by host node and accounting nodes; Transaction T after endorsement2It is added after block chain, is completed between user A and user B about the transaction of digital asset DA;
Step 10, transaction T after endorsement2It is added after block chain, supervision department passes through supervisory node and other nodes Synchronous block, user A and user B is supervised about the digital asset DA supervision traded.
In above-mentioned steps 2, before transaction starts, user A is the owner of digital asset DA.
In above-mentioned steps 9, after the completion of transaction, user B is the owner of digital asset DA.
Compared with prior art, the present invention has a characteristic that
1, the privacy of identities of user is protected.In existing license block chain project, most public affairs using key taken Key is hashed into address public key.Address is voluntarily generated by user in block catenary system, unrelated with subscriber identity information, user's creation It is participated in using address not need third party.Accordingly, with respect to traditional account (such as bank's card number), block chain address has Preferable anonymity.But user is when participating in block chain business using block chain address, it is possible to reveal some sensitive letters Breath, such as the transaction of block chain, in the propagation trajectories of network layer, these information are likely to be used for speculating that block chain address is corresponding True identity.In the present invention, user is signed in license block chain activity using group ranking, and signature itself can not be with User real identification is corresponding, but can pass through the legal verifying on license block chain.And group ranking is with unforgeable and not Extractibility, so the identity information privacy of user can be protected.
2, supervision of the supervision department to block chain is supported.It is not account for block chain in current block chain application Supervision so that block chain technology is used to money laundering, black market bargain and other criminal offences.In the present invention, we Administrator in group ranking is set as supervision department.Supervision department acts not only as ordinary user's secret protection in the application of block chain Role, guarantee that the legitimate signature of legitimate user can pass through the verifying of block chain, while group ranking can be opened, by group Signature and user identity are mapped, and supervise to block chain application.
3, the secret protection of block chain and supervision.Group ranking technology can guarantee the verifying signed through verifier, but verify Person not can determine that the true identity of signer.And group ranking can track the true of signer by the legal opening of supervision department Identity.In the present invention, group ranking technology is utilized in we, and ordinary user is signed using group ranking, under public visual angle Individual privacy is protected, while can pass through and be verified accordingly on block chain, such as trading signature.Supervision department is as pipe Reason person helps ordinary user to generate group ranking, guarantees that the group ranking of user can pass through the verifying of block chain, while can be with Group ranking is opened, the true identity of signer is tracked, exercises supervision to block chain.Block chain technology is utilized not in ordinary user Can tamper, solve user between trust problem.And supervision department using block chain technology can not tamper, ensure that prison The real reliability of pipe voucher.Supervision department only accesses block chain as node simultaneously, only the signature section of responsible block chain, no Participate in other processes of block chain, such as node common recognition etc..
Detailed description of the invention
Fig. 1 is license block chain structure schematic diagram.
Fig. 2 is transaction flow figure.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific example, and referring to attached Figure, the present invention is described in more detail.
Such as Fig. 1, it is assumed that in certain license block chain, containing n node, have supervisory node respectively in these nodes, carry on the back Book node, ordering joint, host node, accounting nodes, ordinary node, wherein ordinary node and endorsement node, ordering joint, main section It can mutually be converted between point, accounting nodes.Supervisory node is responsible for that ordinary node is helped to carry out group ranking, and carries out to block chain Supervision;Endorsement node, which is responsible for trade, carries out endorsement verifying;Ordering joint is responsible for collecting transaction and is packaged transaction blocking;Book keeping operation Block is added in block chain by node and host node according to certain common recognition algorithm.
If Fig. 2 is the transaction flow figure for permitting block chain, trade user is connected by ordinary node and block chain network It connects, before carrying on a deal, first to the group ranking certificate of supervisory node application trading signature;Supervision department passes through supervision section Point is connect with block chain network, by certain registration review mechanism, issues group certificate to ordinary node;The transaction of ordinary node Both sides consult transaction specifying information, then send the transaction to endorsement node and carry out endorsement verifying;After being verified, endorsement Node will return to both parties by the transaction of endorsement verifying.Both parties using endorsement node return information to trade into The certain processing of row.After completion processing, transaction is sent to ordering joint.Ordering joint is responsible for collecting the transaction of certain period of time It is packaged into block, is sent to host node and accounting nodes.Host node and accounting nodes add block according to certain common recognition algorithm The area Ru Dao is across on chain.
A kind of license block chain secret protection and monitoring and managing method based on group ranking, specifically includes that steps are as follows:
Step 1, supervision department generate supervision department's public key to and supervision department's private key pair.
Assuming that the identity of supervision department is IDC, choose a RSA modulus nCWith a hash function h ().Selection is open Exponent e1,e2> 1 and positive integer f1,f2> 1, and e2WithIt is coprime, nCFactorization is unknown, f1,f2E1Secondary root and e2 Secondary root is dyscalculia.
It is n that supervision department, which selects a rank,C, generating member is g cyclic group G=< g >, and discrete logarithm problem is calculated in G It is difficult.Element h ∈ G is the discrete logarithm using g as base, and h is dyscalculia.
Supervision department is from integer set Z*Select length for the private key x of nC(the ∈ expression in full text belongs to, Z*Indicate integer Collection,Expression length is n set of integers), i.e.,Calculate public key Random selectionCalculate dCMeetWherein, yC、eCFor supervision department's public key, xC、dC For supervision department's private key.Open (nC,yC,e1,e2,f1,f2,G,g,h)。
Step 2 assumes that license block chain needs to carry out digital asset transaction, the number of transaction there are two user Alice and Bob Word assets are DA.Wherein Alice is the owner of digital asset DA, the right to use with digital asset;Bob is digital asset DA Recipient, after the transaction has been completed, Bob becomes the owner of digital asset DA, obtains the right to use of digital asset DA.It is handing over Before easily starting, Alice and Bob apply that group is added to supervision department, and obtain the final signing certificate that supervision department sends.
The mode that group is added in view of AIice and Bob is identical, and the mode that group is added in Alice is only discussed in detail below.
Step 2.1, Alice random selectionIt calculatesCalculate identityWherein xA, yAIt is Alice identity private key, IDAIt is the public-key cryptography of Alice member identities.
Step 2.2 is that supervision department forges a signature when preventing application member certifications, and Alice calculates yABlind valueWith And IDAWithKnowledge proof UAAnd VA:
Alice is by five-tuple (IDA,UA, VA) it is sent to supervision department.
Step 2.3, supervision department verify U by the verification mode of the signatures of Knowledge of e root of discrete logarithmA, VAIf correctly, Then firmly believeIt is IDAThe private key of contained member blinds value.And it calculates one and blinds certificate
Step 2.4, Alice, which are received, blinds certificateAfterwards, it verifiesIf equation is set up, confirm It is that supervision department sends and saves, calculatesThe final certificate of Alice is vA
Bob applies obtaining final signing certificate v to supervision department according to sample loading mode same with AliceB
Step 3, Alice and Bob are obtained after the signing certificate of supervision department, so that it may formally be started to digital asset DA It trades.
Assuming that the form of transaction is T (From, To, DA, TxID,Other).From indicates digital asset DA provider Alice Account address;The account address of To expression digital asset DA recipient Bob;DA indicates digital asset, such as the amount of money, electronic data Deng;TxIDIndicate transaction T in block chain unique identifier;Other indicates the other content of transaction, such as exchange hour stamp.
Alice and Bob respectively signs to transaction T.In view of Alice as the mode that Bob signs, below only The signature scheme of Alice is discussed in detail:
Alice random selectionCalculating blinds identityAnd three knowledge proof VA1、VA2、VA3:
Wherein
At this point, signature of the Alice to transaction T
Bob in an identical manner signs to transaction T, is signed
After Alice and Bob completes signature to transaction T, transaction T is obtained1=(From, To, σAB,DA,TxID, Other)。
Step 4, Alice will trade T1Endorsement node E is sent to endorse.
Step 5, endorsement node E are to transaction T1Before being endorsed, first verify that digital asset provider Alice and Legitimacy of the Bob to trading signature.As endorsement node E confirmation transaction T1When being legal, to T1It endorses, then to transaction T1 After completing endorsement, endorsement is proved into πEIt is sent to Alice.
The mode signed in view of endorsement node E verifying Alice and Bob is identical, and endorsement node E verifying is only discussed in detail below The mode of Alice.
Endorsement node E receives transaction T1Later, first confirm that Alice signsNode of endorsing passes through the verification mode of the signatures of Knowledge of e root of discrete logarithm Verify Alice signature sigmaAIn VA1, VA2.V first in signatureA1Prove that Alice knows'sIt is with h and g For the e at bottom and the part g1Secondary root, such as β.V in signatureA2Prove that Alice knows'sIt is with h and g The bottom of for andE2Secondary root.Therefore endorsement node is known thatA be up to tuple using h and g the bottom of as, and Meet following equation:
This has turned out Alice and has knownE1Secondary root also means that Alice possesses a legal group ranking card Book, and know the key of the key of corresponding group members qualification.There is above proof, endorsement node E is by Alice to transaction The signature sigma of TA
Endorsement node E verifies Bob to transaction T in an identical manner1Signature sigmaB.If the provider of digital asset DA The signature of Alice and recipient Bob pass through verifying simultaneously, then the node E that endorses confirmation transaction T1It is legal.
Step 6, Alice prove endorsement transaction T is added1, form the transaction T proved comprising endorsement2=(From, To,σAB,DA,TxID,Other,πE)。
Step 7, after completing above-mentioned steps, Alice will trade T2It is sent to ordering joint.
Step 8, ordering joint verifying transaction T2Endorsement prove, be verified after transaction be put into trading pit.
Step 9, after the transaction amount amount of trading pit reaches certain threshold value, these transaction are packaged into area by node of endorsing Block is sent to host node and accounting nodes.By certain common recognition mechanism block chain is added in block by host node and accounting nodes. When include transaction T2Block be added after block chain, completed between Alice and Bob about the transaction of digital asset DA, Bob claims For the owner of digital asset, the right to use with digital asset.
Step 10, when being added in block chain it about the block of the transaction of digital asset DA comprising Alice and Bob Afterwards, supervision department supervises block chain by supervisory node block synchronous with other nodes.
Such as the supervision that supervision department needs to trade to Alice and Bob about digital asset DA, pass through σ firstAAnd σBIn VA3And VB3The effective group members of confirmation signature are signed.Further in the following manner determine signature it is corresponding at Member's identity:
Supervision department can be in the hope of σ to upper typeAAnd σBCorresponding true identity is respectively Alice and Bob.
In process of exchange, the either endorsement verifying of endorsement node or sequence service and the host node of ordering joint With the common recognition process of accounting nodes, it is able to validate only the legitimacy of both parties' identity, it cannot be by signature and user real identification pair It should get up, to ensure the privacy of identities of user.After the completion of transaction, supervision department can be same by supervisory node and other nodes Block is walked, then opening includes the signature in transaction, signature is mapped with the true identity of trade user, thus to area Block chain is supervised.
It should be noted that although the above embodiment of the present invention be it is illustrative, this be not be to the present invention Limitation, therefore the invention is not limited in above-mentioned specific embodiment.Without departing from the principles of the present invention, all The other embodiment that those skilled in the art obtain under the inspiration of the present invention is accordingly to be regarded as within protection of the invention.

Claims (3)

1. license block chain secret protection and monitoring and managing method based on group ranking, characterized in that it is specifically included, and steps are as follows:
Step 1, supervision department generate supervision department's public key to and supervision department's private key pair;
Step 2, the user A in license block chain and user B intend trading to digital asset DA;Before transaction starts, use Family A and user B applies that group is added to supervision department, and respectively obtains the final signing certificate that supervision department is sent;
After step 3, user A and user B obtain the final signing certificate of supervision department, signs, obtain to transaction T respectively Transaction T after signature1
Step 4, user A are by the transaction T after signature1It is sent to endorsement node;
Step 5, book node are to the transaction T after signature1Before being endorsed, first authentication user A and user B sign transaction The legitimacy of name;Endorsement node is to the transaction T after signature after being verified1It endorses, and endorsement is proved to be sent to use Family A;
Step 6, user A prove endorsement the transaction T after signing is added1, the transaction proved comprising endorsement is formed, that is, is endorsed Transaction T afterwards2
Step 7, user A are by the transaction T after endorsement2It is sent to ordering joint;
Transaction T after step 8, ordering joint verifying endorsement2Endorsement prove, by the transaction T after endorsement after being verified2It puts Enter trading pit;
Step 9, after the transaction amount amount of trading pit reaches certain threshold value, endorsement node by these transaction is packaged into block hair Give host node and accounting nodes, by certain common recognition mechanism block chain is added in block by host node and accounting nodes;Work as back Transaction T after book2It is added after block chain, is completed between user A and user B about the transaction of digital asset DA;
Step 10, transaction T after endorsement2It is added after block chain, supervision department passes through supervisory node and other node synchronization zones Block supervises user A and user B about the digital asset DA supervision traded.
2. the license block chain secret protection and monitoring and managing method according to claim 1 based on group ranking, characterized in that step In rapid 2, before transaction starts, user A is the owner of digital asset DA.
3. the license block chain secret protection and monitoring and managing method according to claim 1 based on group ranking, characterized in that step In rapid 9, after the completion of transaction, user B is the owner of digital asset DA.
CN201811316497.2A 2018-11-07 2018-11-07 License block chain secret protection and monitoring and managing method based on group ranking Pending CN109636599A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811316497.2A CN109636599A (en) 2018-11-07 2018-11-07 License block chain secret protection and monitoring and managing method based on group ranking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811316497.2A CN109636599A (en) 2018-11-07 2018-11-07 License block chain secret protection and monitoring and managing method based on group ranking

Publications (1)

Publication Number Publication Date
CN109636599A true CN109636599A (en) 2019-04-16

Family

ID=66067312

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811316497.2A Pending CN109636599A (en) 2018-11-07 2018-11-07 License block chain secret protection and monitoring and managing method based on group ranking

Country Status (1)

Country Link
CN (1) CN109636599A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110264350A (en) * 2019-05-10 2019-09-20 重庆金融资产交易所有限责任公司 Bookkeeping methods, device and the computer equipment for thering is endorsement to sign based on block chain
CN110401540A (en) * 2019-07-25 2019-11-01 郑州师范学院 A kind of threshold group signatures method that verification can be disclosed based on block chain
CN110502931A (en) * 2019-08-15 2019-11-26 广东工业大学 A kind of internet arbitration and method for secret protection based on block chain
CN110502905A (en) * 2019-07-10 2019-11-26 布比(北京)网络技术有限公司 A kind of distributed account book method of commerce and system of secret protection
CN110581887A (en) * 2019-09-02 2019-12-17 北京海益同展信息科技有限公司 Data processing method, device, block chain node and storage medium
CN110716932A (en) * 2019-09-09 2020-01-21 平安国际智慧城市科技股份有限公司 Data processing method, system, device and storage medium
CN110889683A (en) * 2019-11-21 2020-03-17 中国银行股份有限公司 Mobile payment method and system for public service
CN111010280A (en) * 2019-12-09 2020-04-14 中山大学 Group signature-based construction method for monitorable block chain
CN111131171A (en) * 2019-12-03 2020-05-08 深圳前海微众银行股份有限公司 Node authentication method and device based on block chain network
CN111311264A (en) * 2020-01-22 2020-06-19 数据通信科学技术研究所 Method and system for supervising transaction sender
CN111445334A (en) * 2020-03-30 2020-07-24 北京数字认证股份有限公司 Aggregation signature method and device for block chain system and storage medium
US10762228B2 (en) 2019-08-30 2020-09-01 Alibaba Group Holding Limited Transaction scheduling method and apparatus
CN112036884A (en) * 2020-09-01 2020-12-04 中国银行股份有限公司 Signature method and related equipment
CN112073483A (en) * 2020-08-28 2020-12-11 武汉大学 Authority certification consensus method and system based on credit and committee endorsement mechanism
WO2021036191A1 (en) * 2019-08-30 2021-03-04 创新先进技术有限公司 Transaction scheduling method and apparatus
CN112671881A (en) * 2020-12-18 2021-04-16 成都质数斯达克科技有限公司 Node organization management method and device, electronic equipment and readable storage medium
CN113222601A (en) * 2021-05-19 2021-08-06 湖北工业大学 System and method for permitting block chain anonymous transaction endorsement
CN113591128A (en) * 2021-08-17 2021-11-02 东北大学秦皇岛分校 Block chain illegal address supervision system based on group signature and tracing method
CN114553547A (en) * 2022-02-24 2022-05-27 福建福链科技有限公司 Data authentication method and system for block chain sensor capable of being managed
CN115361145A (en) * 2022-10-19 2022-11-18 北京理工大学 Supervision-supporting alliance chain privacy protection method based on zero-knowledge proof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107451874A (en) * 2017-07-27 2017-12-08 武汉天喻信息产业股份有限公司 Electronic invoice integrated conduct method and system based on block chain
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN108269090A (en) * 2018-01-19 2018-07-10 中国科学院软件研究所 Based on the common recognition method and apparatus for block catenary system drawn lots at random without negotiation
CN108572986A (en) * 2017-03-13 2018-09-25 华为软件技术有限公司 A kind of method and node device of data update
CN108647964A (en) * 2018-05-02 2018-10-12 郑杰骞 A kind of block chain data processing method, device and computer readable storage medium
CN108717630A (en) * 2018-05-19 2018-10-30 上海分布信息科技有限公司 One kind going out block method and its realizes system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108572986A (en) * 2017-03-13 2018-09-25 华为软件技术有限公司 A kind of method and node device of data update
CN107451874A (en) * 2017-07-27 2017-12-08 武汉天喻信息产业股份有限公司 Electronic invoice integrated conduct method and system based on block chain
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN108269090A (en) * 2018-01-19 2018-07-10 中国科学院软件研究所 Based on the common recognition method and apparatus for block catenary system drawn lots at random without negotiation
CN108647964A (en) * 2018-05-02 2018-10-12 郑杰骞 A kind of block chain data processing method, device and computer readable storage medium
CN108717630A (en) * 2018-05-19 2018-10-30 上海分布信息科技有限公司 One kind going out block method and its realizes system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
单进勇等: "区块链理论研究进展", 《密码学报》 *
张昊迪等: "基于区块链技术的跨域身份认证机制研究", 《广东通信技术》 *
李佩丽等: "区块链技术在网络互助中的应用及用户隐私保护", 《信息网络安全》 *
翟社平等: "区块链中的隐私保护技术", 《西安邮电大学学报》 *

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110264350A (en) * 2019-05-10 2019-09-20 重庆金融资产交易所有限责任公司 Bookkeeping methods, device and the computer equipment for thering is endorsement to sign based on block chain
CN110502905A (en) * 2019-07-10 2019-11-26 布比(北京)网络技术有限公司 A kind of distributed account book method of commerce and system of secret protection
CN110502905B (en) * 2019-07-10 2021-06-04 布比(北京)网络技术有限公司 Privacy-protecting distributed account book transaction method and system
CN110401540A (en) * 2019-07-25 2019-11-01 郑州师范学院 A kind of threshold group signatures method that verification can be disclosed based on block chain
CN110502931A (en) * 2019-08-15 2019-11-26 广东工业大学 A kind of internet arbitration and method for secret protection based on block chain
CN110502931B (en) * 2019-08-15 2021-05-04 广东工业大学 Block chain-based internet arbitration and privacy protection method
US10762228B2 (en) 2019-08-30 2020-09-01 Alibaba Group Holding Limited Transaction scheduling method and apparatus
WO2021036191A1 (en) * 2019-08-30 2021-03-04 创新先进技术有限公司 Transaction scheduling method and apparatus
CN110581887A (en) * 2019-09-02 2019-12-17 北京海益同展信息科技有限公司 Data processing method, device, block chain node and storage medium
CN110581887B (en) * 2019-09-02 2021-03-30 北京海益同展信息科技有限公司 Data processing method, device, block chain node and storage medium
CN110716932A (en) * 2019-09-09 2020-01-21 平安国际智慧城市科技股份有限公司 Data processing method, system, device and storage medium
CN110889683A (en) * 2019-11-21 2020-03-17 中国银行股份有限公司 Mobile payment method and system for public service
CN111131171A (en) * 2019-12-03 2020-05-08 深圳前海微众银行股份有限公司 Node authentication method and device based on block chain network
CN111131171B (en) * 2019-12-03 2021-05-11 深圳前海微众银行股份有限公司 Node authentication method and device based on block chain network
CN111010280A (en) * 2019-12-09 2020-04-14 中山大学 Group signature-based construction method for monitorable block chain
CN111010280B (en) * 2019-12-09 2021-07-30 中山大学 Group signature-based construction method for monitorable block chain
CN111311264B (en) * 2020-01-22 2023-12-22 数据通信科学技术研究所 Supervision method and system for transaction sender
CN111311264A (en) * 2020-01-22 2020-06-19 数据通信科学技术研究所 Method and system for supervising transaction sender
WO2021147283A1 (en) * 2020-01-22 2021-07-29 数据通信科学技术研究所 Transaction sender supervision method and system
CN111445334A (en) * 2020-03-30 2020-07-24 北京数字认证股份有限公司 Aggregation signature method and device for block chain system and storage medium
CN111445334B (en) * 2020-03-30 2023-09-05 北京数字认证股份有限公司 Aggregation signature method, device and storage medium of blockchain system
CN112073483B (en) * 2020-08-28 2022-01-04 武汉大学 Authority certification consensus method and system based on credit and committee endorsement mechanism
CN112073483A (en) * 2020-08-28 2020-12-11 武汉大学 Authority certification consensus method and system based on credit and committee endorsement mechanism
CN112036884A (en) * 2020-09-01 2020-12-04 中国银行股份有限公司 Signature method and related equipment
CN112036884B (en) * 2020-09-01 2024-03-01 中国银行股份有限公司 Signature method and related equipment
CN112671881A (en) * 2020-12-18 2021-04-16 成都质数斯达克科技有限公司 Node organization management method and device, electronic equipment and readable storage medium
CN112671881B (en) * 2020-12-18 2022-09-20 成都质数斯达克科技有限公司 Node organization management method and device, electronic equipment and readable storage medium
CN113222601A (en) * 2021-05-19 2021-08-06 湖北工业大学 System and method for permitting block chain anonymous transaction endorsement
CN113222601B (en) * 2021-05-19 2022-06-07 湖北工业大学 System and method for permitting block chain anonymous transaction endorsement
CN113591128A (en) * 2021-08-17 2021-11-02 东北大学秦皇岛分校 Block chain illegal address supervision system based on group signature and tracing method
CN114553547A (en) * 2022-02-24 2022-05-27 福建福链科技有限公司 Data authentication method and system for block chain sensor capable of being managed
CN114553547B (en) * 2022-02-24 2024-06-07 福建福链科技有限公司 Data authentication method and system for manageable blockchain sensor
CN115361145A (en) * 2022-10-19 2022-11-18 北京理工大学 Supervision-supporting alliance chain privacy protection method based on zero-knowledge proof

Similar Documents

Publication Publication Date Title
CN109636599A (en) License block chain secret protection and monitoring and managing method based on group ranking
US11757643B2 (en) System and method for authenticating user identity
Khalilov et al. A survey on anonymity and privacy in bitcoin-like digital cash systems
US11232478B2 (en) Methods and system for collecting statistics against distributed private data
US10965668B2 (en) Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification
US11146546B2 (en) Identity proofing and portability on blockchain
CN109523683B (en) Anonymous electronic voting method based on block chain technology
US20190122149A1 (en) Enhanced System and Method for Identity Evaluation Using a Global Score Value
CN109274501A (en) License block chain method for secret protection based on Proxy Signature
US7818200B2 (en) Method and system for providing a trust-based reputation service for virtual organization formation
CN109417549A (en) The method and apparatus of information proof is provided using centralization or distributed ledger
CN111800252A (en) Information auditing method and device based on block chain and computer equipment
EP3376708A1 (en) Anonymous communication system and method for subscribing to said communication system
US11727149B2 (en) System and method for providing anonymous validation of a query among a plurality of nodes in a network
CN111369730B (en) Voting processing method and device based on block chain
CN115795518B (en) Block chain-based federal learning privacy protection method
Pathak et al. Blockchain based e-voting system
Zhu et al. Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework
Zhou et al. Distributed bitcoin account management
CN111091380B (en) Block chain asset management method based on friend hidden verification
CN111416705A (en) Quantum computing resistance alliance chain voting system and method based on identity cryptography
Ghafourian et al. Combining blockchain and biometrics: A survey on technical aspects and a first legal analysis
Li et al. A new revocable reputation evaluation system based on blockchain
CN113486368A (en) Input data credibility verification method and device based on block chain technology
Liu et al. Blocksc: A blockchain empowered spatial crowdsourcing service in metaverse while preserving user location privacy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190416

WD01 Invention patent application deemed withdrawn after publication