CN109636599A - License block chain secret protection and monitoring and managing method based on group ranking - Google Patents
License block chain secret protection and monitoring and managing method based on group ranking Download PDFInfo
- Publication number
- CN109636599A CN109636599A CN201811316497.2A CN201811316497A CN109636599A CN 109636599 A CN109636599 A CN 109636599A CN 201811316497 A CN201811316497 A CN 201811316497A CN 109636599 A CN109636599 A CN 109636599A
- Authority
- CN
- China
- Prior art keywords
- transaction
- user
- block chain
- endorsement
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Finance (AREA)
- Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention discloses a kind of license block chain secret protection based on group ranking and monitoring and managing method; it is in process of exchange; the either common recognition process of the endorsement verifying of endorsement node or the sequence service of ordering joint and host node and accounting nodes; it is able to validate only the legitimacy of both parties' identity; signature cannot be mapped with user real identification, to ensure the privacy of identities of user.After the completion of transaction, supervision department can be by supervisory node block synchronous with other nodes, and then opening includes the signature in transaction, signature is mapped with the true identity of trade user, to supervise to block chain.
Description
Technical field
The present invention relates to block chain technical fields, and in particular to a kind of license block chain secret protection based on group ranking and
Monitoring and managing method.
Background technique
Floor layer Technology of the block chain as bit coin, starts one research boom in recent years.Substantially block chain is one
The database of kind decentralization, since its is anti-tamper, the features such as good opening and autonomy anonymity, with current social
Mode is completely different, by pursuing for people, is even more described as " fourth industrial revolution " by people.What block chain solved is current society
The trust problem of meeting is solved believable in incredible environment completion justice using certain cryptological technique and common recognition mechanism
Operation.
However, there is also problems since there are no full maturitys for current block chain technology: on the one hand current
Block chain also has quite serious privacy leakage problem.The especially transaction layer of block chain contains a large amount of sensitive transactions
Information, such as the identity public key of user, Transaction Information, signature etc. are especially permitted the Transaction Information on block chain, be may relate to
To trade secret;On the other hand because features, the oversight mechanism of block chain such as decentralization, anonymity of block chain technology are difficult to reality
It applies, hampers the landing application of block chain project.Such as first publicly-owned chain application bit coin of block chain, each participant can
To obtain complete data backup, all data be all it is open and clear, this is the advantageous feature of block chain, but is also ratio
One deadly defect of special coin.Illegal attacker, can be by public key address with the account book data of specific method analysis bit coin
It is mapped with the true address of bit coin user.Meanwhile because of the complete decentralization of bit coin, supervision department is difficult to bit coin
To be supervised.Money laundering is carried out using block chain technology at present, is extorted and the event of other criminal activities emerges one after another, such as
The viral wannacry that extorts for influencing 300,000, whole world user is exactly to be ransomed using bit coin.Since bit coin goes to center
The features such as change, anonymization are difficult to prevent to extort behavior, track the identity information of blackmailer.Again to permit the super account book of block chain
For Fabric, Fabric protects privacy with fine granularity, i.e., it is exclusive logical can to negotiate building one by several members in account book network
Road is isolated from the outside, and the node outside channel can not see account book and transaction data therein, greatly improves privacy.But
Cannot thus trade across channel (across chain), though channel interior peer node it can be seen that unrelated with oneself is complete
Portion's transaction data.Fabric has perfect member management service, and certain supervision can be carried out to block chain, but such
It supervises not thorough enough.
In conclusion either publicly-owned block chain still permits block chain, all there are problems that privacy leakage and supervision.It makes
In terms of mainly having following two the problem of privacy leakage: (1) trackability of trading.It is more than current block chain transaction often
The output of one transaction, as the input of next transaction, each transaction can trace back to a transaction.The attack of block chain
Person can be by the method for certain social engineering, using the trackability of block chain, by the true of address public key and user
Identity is mapped.(2) account book is of overall importance.In order to reach can not distorting and can not forging for digital asset, block chain it is each
A node is owned by the global account book comprising all data, by analyzing these data, the privacy information of available user.And
The problem of causing block chain to be difficult to lower supervision, mainly there is the following aspects: (1) decentralization.Block chain belongs to during one kind goes
The technology of the heart, the influence between the node and node of block chain form nonlinear causal relationship by block chain network, are one
Plant the system structure of open, flattening, equality.Because of the decentralization of block chain, so that supervision department cannot dominate block
The application of chain loses the supervision status to block chain.(2) anonymity of user.Some rows that user occurs on block chain
For be all it is anonymous, in addition to user, other users are difficult to guess the true identity of anonymous.Therefore supervision department without
Method learns bottom, and who is movable in participation block chain, and supervision can not carry out.
Summary of the invention
The present invention deficiency existing in terms of secret protection and oversight mechanism for existing license block chain, provides one kind
License block chain secret protection and monitoring and managing method based on group ranking, this method can protect license block chain under public visual angle
Privacy, while can satisfy supervision department to license block chain supervision.
To solve the above problems, the present invention is achieved by the following technical solutions:
License block chain secret protection and monitoring and managing method based on group ranking, specifically include that steps are as follows:
Step 1, supervision department generate supervision department's public key to and supervision department's private key pair;
Step 2, the user A in license block chain and user B intend trading to digital asset DA;In transaction beginning
Before, user A and user B apply that group is added to supervision department, and respectively obtain the final signing certificate that supervision department is sent;
After step 3, user A and user B obtain the final signing certificate of supervision department, sign respectively to transaction T,
Transaction T after being signed1;
Step 4, user A are by the transaction T after signature1It is sent to endorsement node;
Step 5, book node are to the transaction T after signature1Before being endorsed, first authentication user A and user B are to friendship
The legitimacy easily signed;Endorsement node is to the transaction T after signature after being verified1It endorses, and endorsement is proved to send
Give user A;
Step 6, user A prove endorsement the transaction T after signing is added1, the transaction proved comprising endorsement is formed, i.e.,
Transaction T after endorsement2;
Step 7, user A are by the transaction T after endorsement2It is sent to ordering joint;
Transaction T after step 8, ordering joint verifying endorsement2Endorsement prove, by the transaction after endorsement after being verified
T2It is put into trading pit;
Step 9, after the transaction amount amount of trading pit reaches certain threshold value, these transaction are packaged into area by node of endorsing
Block is sent to host node and accounting nodes, and by certain common recognition mechanism block chain is added in block by host node and accounting nodes;
Transaction T after endorsement2It is added after block chain, is completed between user A and user B about the transaction of digital asset DA;
Step 10, transaction T after endorsement2It is added after block chain, supervision department passes through supervisory node and other nodes
Synchronous block, user A and user B is supervised about the digital asset DA supervision traded.
In above-mentioned steps 2, before transaction starts, user A is the owner of digital asset DA.
In above-mentioned steps 9, after the completion of transaction, user B is the owner of digital asset DA.
Compared with prior art, the present invention has a characteristic that
1, the privacy of identities of user is protected.In existing license block chain project, most public affairs using key taken
Key is hashed into address public key.Address is voluntarily generated by user in block catenary system, unrelated with subscriber identity information, user's creation
It is participated in using address not need third party.Accordingly, with respect to traditional account (such as bank's card number), block chain address has
Preferable anonymity.But user is when participating in block chain business using block chain address, it is possible to reveal some sensitive letters
Breath, such as the transaction of block chain, in the propagation trajectories of network layer, these information are likely to be used for speculating that block chain address is corresponding
True identity.In the present invention, user is signed in license block chain activity using group ranking, and signature itself can not be with
User real identification is corresponding, but can pass through the legal verifying on license block chain.And group ranking is with unforgeable and not
Extractibility, so the identity information privacy of user can be protected.
2, supervision of the supervision department to block chain is supported.It is not account for block chain in current block chain application
Supervision so that block chain technology is used to money laundering, black market bargain and other criminal offences.In the present invention, we
Administrator in group ranking is set as supervision department.Supervision department acts not only as ordinary user's secret protection in the application of block chain
Role, guarantee that the legitimate signature of legitimate user can pass through the verifying of block chain, while group ranking can be opened, by group
Signature and user identity are mapped, and supervise to block chain application.
3, the secret protection of block chain and supervision.Group ranking technology can guarantee the verifying signed through verifier, but verify
Person not can determine that the true identity of signer.And group ranking can track the true of signer by the legal opening of supervision department
Identity.In the present invention, group ranking technology is utilized in we, and ordinary user is signed using group ranking, under public visual angle
Individual privacy is protected, while can pass through and be verified accordingly on block chain, such as trading signature.Supervision department is as pipe
Reason person helps ordinary user to generate group ranking, guarantees that the group ranking of user can pass through the verifying of block chain, while can be with
Group ranking is opened, the true identity of signer is tracked, exercises supervision to block chain.Block chain technology is utilized not in ordinary user
Can tamper, solve user between trust problem.And supervision department using block chain technology can not tamper, ensure that prison
The real reliability of pipe voucher.Supervision department only accesses block chain as node simultaneously, only the signature section of responsible block chain, no
Participate in other processes of block chain, such as node common recognition etc..
Detailed description of the invention
Fig. 1 is license block chain structure schematic diagram.
Fig. 2 is transaction flow figure.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific example, and referring to attached
Figure, the present invention is described in more detail.
Such as Fig. 1, it is assumed that in certain license block chain, containing n node, have supervisory node respectively in these nodes, carry on the back
Book node, ordering joint, host node, accounting nodes, ordinary node, wherein ordinary node and endorsement node, ordering joint, main section
It can mutually be converted between point, accounting nodes.Supervisory node is responsible for that ordinary node is helped to carry out group ranking, and carries out to block chain
Supervision;Endorsement node, which is responsible for trade, carries out endorsement verifying;Ordering joint is responsible for collecting transaction and is packaged transaction blocking;Book keeping operation
Block is added in block chain by node and host node according to certain common recognition algorithm.
If Fig. 2 is the transaction flow figure for permitting block chain, trade user is connected by ordinary node and block chain network
It connects, before carrying on a deal, first to the group ranking certificate of supervisory node application trading signature;Supervision department passes through supervision section
Point is connect with block chain network, by certain registration review mechanism, issues group certificate to ordinary node;The transaction of ordinary node
Both sides consult transaction specifying information, then send the transaction to endorsement node and carry out endorsement verifying;After being verified, endorsement
Node will return to both parties by the transaction of endorsement verifying.Both parties using endorsement node return information to trade into
The certain processing of row.After completion processing, transaction is sent to ordering joint.Ordering joint is responsible for collecting the transaction of certain period of time
It is packaged into block, is sent to host node and accounting nodes.Host node and accounting nodes add block according to certain common recognition algorithm
The area Ru Dao is across on chain.
A kind of license block chain secret protection and monitoring and managing method based on group ranking, specifically includes that steps are as follows:
Step 1, supervision department generate supervision department's public key to and supervision department's private key pair.
Assuming that the identity of supervision department is IDC, choose a RSA modulus nCWith a hash function h ().Selection is open
Exponent e1,e2> 1 and positive integer f1,f2> 1, and e2WithIt is coprime, nCFactorization is unknown, f1,f2E1Secondary root and e2
Secondary root is dyscalculia.
It is n that supervision department, which selects a rank,C, generating member is g cyclic group G=< g >, and discrete logarithm problem is calculated in G
It is difficult.Element h ∈ G is the discrete logarithm using g as base, and h is dyscalculia.
Supervision department is from integer set Z*Select length for the private key x of nC(the ∈ expression in full text belongs to, Z*Indicate integer
Collection,Expression length is n set of integers), i.e.,Calculate public key Random selectionCalculate dCMeetWherein, yC、eCFor supervision department's public key, xC、dC
For supervision department's private key.Open (nC,yC,e1,e2,f1,f2,G,g,h)。
Step 2 assumes that license block chain needs to carry out digital asset transaction, the number of transaction there are two user Alice and Bob
Word assets are DA.Wherein Alice is the owner of digital asset DA, the right to use with digital asset;Bob is digital asset DA
Recipient, after the transaction has been completed, Bob becomes the owner of digital asset DA, obtains the right to use of digital asset DA.It is handing over
Before easily starting, Alice and Bob apply that group is added to supervision department, and obtain the final signing certificate that supervision department sends.
The mode that group is added in view of AIice and Bob is identical, and the mode that group is added in Alice is only discussed in detail below.
Step 2.1, Alice random selectionIt calculatesCalculate identityWherein xA, yAIt is Alice identity private key, IDAIt is the public-key cryptography of Alice member identities.
Step 2.2 is that supervision department forges a signature when preventing application member certifications, and Alice calculates yABlind valueWith
And IDAWithKnowledge proof UAAnd VA:
Alice is by five-tuple (IDA,UA, VA) it is sent to supervision department.
Step 2.3, supervision department verify U by the verification mode of the signatures of Knowledge of e root of discrete logarithmA, VAIf correctly,
Then firmly believeIt is IDAThe private key of contained member blinds value.And it calculates one and blinds certificate
Step 2.4, Alice, which are received, blinds certificateAfterwards, it verifiesIf equation is set up, confirm
It is that supervision department sends and saves, calculatesThe final certificate of Alice is vA。
Bob applies obtaining final signing certificate v to supervision department according to sample loading mode same with AliceB。
Step 3, Alice and Bob are obtained after the signing certificate of supervision department, so that it may formally be started to digital asset DA
It trades.
Assuming that the form of transaction is T (From, To, DA, TxID,Other).From indicates digital asset DA provider Alice
Account address;The account address of To expression digital asset DA recipient Bob;DA indicates digital asset, such as the amount of money, electronic data
Deng;TxIDIndicate transaction T in block chain unique identifier;Other indicates the other content of transaction, such as exchange hour stamp.
Alice and Bob respectively signs to transaction T.In view of Alice as the mode that Bob signs, below only
The signature scheme of Alice is discussed in detail:
Alice random selectionCalculating blinds identityAnd three knowledge proof VA1、VA2、VA3:
Wherein
At this point, signature of the Alice to transaction T
Bob in an identical manner signs to transaction T, is signed
After Alice and Bob completes signature to transaction T, transaction T is obtained1=(From, To, σA,σB,DA,TxID,
Other)。
Step 4, Alice will trade T1Endorsement node E is sent to endorse.
Step 5, endorsement node E are to transaction T1Before being endorsed, first verify that digital asset provider Alice and
Legitimacy of the Bob to trading signature.As endorsement node E confirmation transaction T1When being legal, to T1It endorses, then to transaction T1
After completing endorsement, endorsement is proved into πEIt is sent to Alice.
The mode signed in view of endorsement node E verifying Alice and Bob is identical, and endorsement node E verifying is only discussed in detail below
The mode of Alice.
Endorsement node E receives transaction T1Later, first confirm that Alice signsNode of endorsing passes through the verification mode of the signatures of Knowledge of e root of discrete logarithm
Verify Alice signature sigmaAIn VA1, VA2.V first in signatureA1Prove that Alice knows'sIt is with h and g
For the e at bottom and the part g1Secondary root, such as β.V in signatureA2Prove that Alice knows'sIt is with h and g
The bottom of for andE2Secondary root.Therefore endorsement node is known thatA be up to tuple using h and g the bottom of as, and
Meet following equation:
This has turned out Alice and has knownE1Secondary root also means that Alice possesses a legal group ranking card
Book, and know the key of the key of corresponding group members qualification.There is above proof, endorsement node E is by Alice to transaction
The signature sigma of TA。
Endorsement node E verifies Bob to transaction T in an identical manner1Signature sigmaB.If the provider of digital asset DA
The signature of Alice and recipient Bob pass through verifying simultaneously, then the node E that endorses confirmation transaction T1It is legal.
Step 6, Alice prove endorsement transaction T is added1, form the transaction T proved comprising endorsement2=(From,
To,σA,σB,DA,TxID,Other,πE)。
Step 7, after completing above-mentioned steps, Alice will trade T2It is sent to ordering joint.
Step 8, ordering joint verifying transaction T2Endorsement prove, be verified after transaction be put into trading pit.
Step 9, after the transaction amount amount of trading pit reaches certain threshold value, these transaction are packaged into area by node of endorsing
Block is sent to host node and accounting nodes.By certain common recognition mechanism block chain is added in block by host node and accounting nodes.
When include transaction T2Block be added after block chain, completed between Alice and Bob about the transaction of digital asset DA, Bob claims
For the owner of digital asset, the right to use with digital asset.
Step 10, when being added in block chain it about the block of the transaction of digital asset DA comprising Alice and Bob
Afterwards, supervision department supervises block chain by supervisory node block synchronous with other nodes.
Such as the supervision that supervision department needs to trade to Alice and Bob about digital asset DA, pass through σ firstAAnd σBIn
VA3And VB3The effective group members of confirmation signature are signed.Further in the following manner determine signature it is corresponding at
Member's identity:
Supervision department can be in the hope of σ to upper typeAAnd σBCorresponding true identity is respectively Alice and Bob.
In process of exchange, the either endorsement verifying of endorsement node or sequence service and the host node of ordering joint
With the common recognition process of accounting nodes, it is able to validate only the legitimacy of both parties' identity, it cannot be by signature and user real identification pair
It should get up, to ensure the privacy of identities of user.After the completion of transaction, supervision department can be same by supervisory node and other nodes
Block is walked, then opening includes the signature in transaction, signature is mapped with the true identity of trade user, thus to area
Block chain is supervised.
It should be noted that although the above embodiment of the present invention be it is illustrative, this be not be to the present invention
Limitation, therefore the invention is not limited in above-mentioned specific embodiment.Without departing from the principles of the present invention, all
The other embodiment that those skilled in the art obtain under the inspiration of the present invention is accordingly to be regarded as within protection of the invention.
Claims (3)
1. license block chain secret protection and monitoring and managing method based on group ranking, characterized in that it is specifically included, and steps are as follows:
Step 1, supervision department generate supervision department's public key to and supervision department's private key pair;
Step 2, the user A in license block chain and user B intend trading to digital asset DA;Before transaction starts, use
Family A and user B applies that group is added to supervision department, and respectively obtains the final signing certificate that supervision department is sent;
After step 3, user A and user B obtain the final signing certificate of supervision department, signs, obtain to transaction T respectively
Transaction T after signature1;
Step 4, user A are by the transaction T after signature1It is sent to endorsement node;
Step 5, book node are to the transaction T after signature1Before being endorsed, first authentication user A and user B sign transaction
The legitimacy of name;Endorsement node is to the transaction T after signature after being verified1It endorses, and endorsement is proved to be sent to use
Family A;
Step 6, user A prove endorsement the transaction T after signing is added1, the transaction proved comprising endorsement is formed, that is, is endorsed
Transaction T afterwards2;
Step 7, user A are by the transaction T after endorsement2It is sent to ordering joint;
Transaction T after step 8, ordering joint verifying endorsement2Endorsement prove, by the transaction T after endorsement after being verified2It puts
Enter trading pit;
Step 9, after the transaction amount amount of trading pit reaches certain threshold value, endorsement node by these transaction is packaged into block hair
Give host node and accounting nodes, by certain common recognition mechanism block chain is added in block by host node and accounting nodes;Work as back
Transaction T after book2It is added after block chain, is completed between user A and user B about the transaction of digital asset DA;
Step 10, transaction T after endorsement2It is added after block chain, supervision department passes through supervisory node and other node synchronization zones
Block supervises user A and user B about the digital asset DA supervision traded.
2. the license block chain secret protection and monitoring and managing method according to claim 1 based on group ranking, characterized in that step
In rapid 2, before transaction starts, user A is the owner of digital asset DA.
3. the license block chain secret protection and monitoring and managing method according to claim 1 based on group ranking, characterized in that step
In rapid 9, after the completion of transaction, user B is the owner of digital asset DA.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811316497.2A CN109636599A (en) | 2018-11-07 | 2018-11-07 | License block chain secret protection and monitoring and managing method based on group ranking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811316497.2A CN109636599A (en) | 2018-11-07 | 2018-11-07 | License block chain secret protection and monitoring and managing method based on group ranking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109636599A true CN109636599A (en) | 2019-04-16 |
Family
ID=66067312
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811316497.2A Pending CN109636599A (en) | 2018-11-07 | 2018-11-07 | License block chain secret protection and monitoring and managing method based on group ranking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109636599A (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110264350A (en) * | 2019-05-10 | 2019-09-20 | 重庆金融资产交易所有限责任公司 | Bookkeeping methods, device and the computer equipment for thering is endorsement to sign based on block chain |
CN110401540A (en) * | 2019-07-25 | 2019-11-01 | 郑州师范学院 | A kind of threshold group signatures method that verification can be disclosed based on block chain |
CN110502931A (en) * | 2019-08-15 | 2019-11-26 | 广东工业大学 | A kind of internet arbitration and method for secret protection based on block chain |
CN110502905A (en) * | 2019-07-10 | 2019-11-26 | 布比(北京)网络技术有限公司 | A kind of distributed account book method of commerce and system of secret protection |
CN110581887A (en) * | 2019-09-02 | 2019-12-17 | 北京海益同展信息科技有限公司 | Data processing method, device, block chain node and storage medium |
CN110716932A (en) * | 2019-09-09 | 2020-01-21 | 平安国际智慧城市科技股份有限公司 | Data processing method, system, device and storage medium |
CN110889683A (en) * | 2019-11-21 | 2020-03-17 | 中国银行股份有限公司 | Mobile payment method and system for public service |
CN111010280A (en) * | 2019-12-09 | 2020-04-14 | 中山大学 | Group signature-based construction method for monitorable block chain |
CN111131171A (en) * | 2019-12-03 | 2020-05-08 | 深圳前海微众银行股份有限公司 | Node authentication method and device based on block chain network |
CN111311264A (en) * | 2020-01-22 | 2020-06-19 | 数据通信科学技术研究所 | Method and system for supervising transaction sender |
CN111445334A (en) * | 2020-03-30 | 2020-07-24 | 北京数字认证股份有限公司 | Aggregation signature method and device for block chain system and storage medium |
US10762228B2 (en) | 2019-08-30 | 2020-09-01 | Alibaba Group Holding Limited | Transaction scheduling method and apparatus |
CN112036884A (en) * | 2020-09-01 | 2020-12-04 | 中国银行股份有限公司 | Signature method and related equipment |
CN112073483A (en) * | 2020-08-28 | 2020-12-11 | 武汉大学 | Authority certification consensus method and system based on credit and committee endorsement mechanism |
WO2021036191A1 (en) * | 2019-08-30 | 2021-03-04 | 创新先进技术有限公司 | Transaction scheduling method and apparatus |
CN112671881A (en) * | 2020-12-18 | 2021-04-16 | 成都质数斯达克科技有限公司 | Node organization management method and device, electronic equipment and readable storage medium |
CN113222601A (en) * | 2021-05-19 | 2021-08-06 | 湖北工业大学 | System and method for permitting block chain anonymous transaction endorsement |
CN113591128A (en) * | 2021-08-17 | 2021-11-02 | 东北大学秦皇岛分校 | Block chain illegal address supervision system based on group signature and tracing method |
CN114553547A (en) * | 2022-02-24 | 2022-05-27 | 福建福链科技有限公司 | Data authentication method and system for block chain sensor capable of being managed |
CN115361145A (en) * | 2022-10-19 | 2022-11-18 | 北京理工大学 | Supervision-supporting alliance chain privacy protection method based on zero-knowledge proof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107451874A (en) * | 2017-07-27 | 2017-12-08 | 武汉天喻信息产业股份有限公司 | Electronic invoice integrated conduct method and system based on block chain |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN108269090A (en) * | 2018-01-19 | 2018-07-10 | 中国科学院软件研究所 | Based on the common recognition method and apparatus for block catenary system drawn lots at random without negotiation |
CN108572986A (en) * | 2017-03-13 | 2018-09-25 | 华为软件技术有限公司 | A kind of method and node device of data update |
CN108647964A (en) * | 2018-05-02 | 2018-10-12 | 郑杰骞 | A kind of block chain data processing method, device and computer readable storage medium |
CN108717630A (en) * | 2018-05-19 | 2018-10-30 | 上海分布信息科技有限公司 | One kind going out block method and its realizes system |
-
2018
- 2018-11-07 CN CN201811316497.2A patent/CN109636599A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108572986A (en) * | 2017-03-13 | 2018-09-25 | 华为软件技术有限公司 | A kind of method and node device of data update |
CN107451874A (en) * | 2017-07-27 | 2017-12-08 | 武汉天喻信息产业股份有限公司 | Electronic invoice integrated conduct method and system based on block chain |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN108269090A (en) * | 2018-01-19 | 2018-07-10 | 中国科学院软件研究所 | Based on the common recognition method and apparatus for block catenary system drawn lots at random without negotiation |
CN108647964A (en) * | 2018-05-02 | 2018-10-12 | 郑杰骞 | A kind of block chain data processing method, device and computer readable storage medium |
CN108717630A (en) * | 2018-05-19 | 2018-10-30 | 上海分布信息科技有限公司 | One kind going out block method and its realizes system |
Non-Patent Citations (4)
Title |
---|
单进勇等: "区块链理论研究进展", 《密码学报》 * |
张昊迪等: "基于区块链技术的跨域身份认证机制研究", 《广东通信技术》 * |
李佩丽等: "区块链技术在网络互助中的应用及用户隐私保护", 《信息网络安全》 * |
翟社平等: "区块链中的隐私保护技术", 《西安邮电大学学报》 * |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110264350A (en) * | 2019-05-10 | 2019-09-20 | 重庆金融资产交易所有限责任公司 | Bookkeeping methods, device and the computer equipment for thering is endorsement to sign based on block chain |
CN110502905A (en) * | 2019-07-10 | 2019-11-26 | 布比(北京)网络技术有限公司 | A kind of distributed account book method of commerce and system of secret protection |
CN110502905B (en) * | 2019-07-10 | 2021-06-04 | 布比(北京)网络技术有限公司 | Privacy-protecting distributed account book transaction method and system |
CN110401540A (en) * | 2019-07-25 | 2019-11-01 | 郑州师范学院 | A kind of threshold group signatures method that verification can be disclosed based on block chain |
CN110502931A (en) * | 2019-08-15 | 2019-11-26 | 广东工业大学 | A kind of internet arbitration and method for secret protection based on block chain |
CN110502931B (en) * | 2019-08-15 | 2021-05-04 | 广东工业大学 | Block chain-based internet arbitration and privacy protection method |
US10762228B2 (en) | 2019-08-30 | 2020-09-01 | Alibaba Group Holding Limited | Transaction scheduling method and apparatus |
WO2021036191A1 (en) * | 2019-08-30 | 2021-03-04 | 创新先进技术有限公司 | Transaction scheduling method and apparatus |
CN110581887A (en) * | 2019-09-02 | 2019-12-17 | 北京海益同展信息科技有限公司 | Data processing method, device, block chain node and storage medium |
CN110581887B (en) * | 2019-09-02 | 2021-03-30 | 北京海益同展信息科技有限公司 | Data processing method, device, block chain node and storage medium |
CN110716932A (en) * | 2019-09-09 | 2020-01-21 | 平安国际智慧城市科技股份有限公司 | Data processing method, system, device and storage medium |
CN110889683A (en) * | 2019-11-21 | 2020-03-17 | 中国银行股份有限公司 | Mobile payment method and system for public service |
CN111131171A (en) * | 2019-12-03 | 2020-05-08 | 深圳前海微众银行股份有限公司 | Node authentication method and device based on block chain network |
CN111131171B (en) * | 2019-12-03 | 2021-05-11 | 深圳前海微众银行股份有限公司 | Node authentication method and device based on block chain network |
CN111010280A (en) * | 2019-12-09 | 2020-04-14 | 中山大学 | Group signature-based construction method for monitorable block chain |
CN111010280B (en) * | 2019-12-09 | 2021-07-30 | 中山大学 | Group signature-based construction method for monitorable block chain |
CN111311264B (en) * | 2020-01-22 | 2023-12-22 | 数据通信科学技术研究所 | Supervision method and system for transaction sender |
CN111311264A (en) * | 2020-01-22 | 2020-06-19 | 数据通信科学技术研究所 | Method and system for supervising transaction sender |
WO2021147283A1 (en) * | 2020-01-22 | 2021-07-29 | 数据通信科学技术研究所 | Transaction sender supervision method and system |
CN111445334A (en) * | 2020-03-30 | 2020-07-24 | 北京数字认证股份有限公司 | Aggregation signature method and device for block chain system and storage medium |
CN111445334B (en) * | 2020-03-30 | 2023-09-05 | 北京数字认证股份有限公司 | Aggregation signature method, device and storage medium of blockchain system |
CN112073483B (en) * | 2020-08-28 | 2022-01-04 | 武汉大学 | Authority certification consensus method and system based on credit and committee endorsement mechanism |
CN112073483A (en) * | 2020-08-28 | 2020-12-11 | 武汉大学 | Authority certification consensus method and system based on credit and committee endorsement mechanism |
CN112036884A (en) * | 2020-09-01 | 2020-12-04 | 中国银行股份有限公司 | Signature method and related equipment |
CN112036884B (en) * | 2020-09-01 | 2024-03-01 | 中国银行股份有限公司 | Signature method and related equipment |
CN112671881A (en) * | 2020-12-18 | 2021-04-16 | 成都质数斯达克科技有限公司 | Node organization management method and device, electronic equipment and readable storage medium |
CN112671881B (en) * | 2020-12-18 | 2022-09-20 | 成都质数斯达克科技有限公司 | Node organization management method and device, electronic equipment and readable storage medium |
CN113222601A (en) * | 2021-05-19 | 2021-08-06 | 湖北工业大学 | System and method for permitting block chain anonymous transaction endorsement |
CN113222601B (en) * | 2021-05-19 | 2022-06-07 | 湖北工业大学 | System and method for permitting block chain anonymous transaction endorsement |
CN113591128A (en) * | 2021-08-17 | 2021-11-02 | 东北大学秦皇岛分校 | Block chain illegal address supervision system based on group signature and tracing method |
CN114553547A (en) * | 2022-02-24 | 2022-05-27 | 福建福链科技有限公司 | Data authentication method and system for block chain sensor capable of being managed |
CN114553547B (en) * | 2022-02-24 | 2024-06-07 | 福建福链科技有限公司 | Data authentication method and system for manageable blockchain sensor |
CN115361145A (en) * | 2022-10-19 | 2022-11-18 | 北京理工大学 | Supervision-supporting alliance chain privacy protection method based on zero-knowledge proof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109636599A (en) | License block chain secret protection and monitoring and managing method based on group ranking | |
US11757643B2 (en) | System and method for authenticating user identity | |
Khalilov et al. | A survey on anonymity and privacy in bitcoin-like digital cash systems | |
US11232478B2 (en) | Methods and system for collecting statistics against distributed private data | |
US10965668B2 (en) | Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification | |
US11146546B2 (en) | Identity proofing and portability on blockchain | |
CN109523683B (en) | Anonymous electronic voting method based on block chain technology | |
US20190122149A1 (en) | Enhanced System and Method for Identity Evaluation Using a Global Score Value | |
CN109274501A (en) | License block chain method for secret protection based on Proxy Signature | |
US7818200B2 (en) | Method and system for providing a trust-based reputation service for virtual organization formation | |
CN109417549A (en) | The method and apparatus of information proof is provided using centralization or distributed ledger | |
CN111800252A (en) | Information auditing method and device based on block chain and computer equipment | |
EP3376708A1 (en) | Anonymous communication system and method for subscribing to said communication system | |
US11727149B2 (en) | System and method for providing anonymous validation of a query among a plurality of nodes in a network | |
CN111369730B (en) | Voting processing method and device based on block chain | |
CN115795518B (en) | Block chain-based federal learning privacy protection method | |
Pathak et al. | Blockchain based e-voting system | |
Zhu et al. | Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework | |
Zhou et al. | Distributed bitcoin account management | |
CN111091380B (en) | Block chain asset management method based on friend hidden verification | |
CN111416705A (en) | Quantum computing resistance alliance chain voting system and method based on identity cryptography | |
Ghafourian et al. | Combining blockchain and biometrics: A survey on technical aspects and a first legal analysis | |
Li et al. | A new revocable reputation evaluation system based on blockchain | |
CN113486368A (en) | Input data credibility verification method and device based on block chain technology | |
Liu et al. | Blocksc: A blockchain empowered spatial crowdsourcing service in metaverse while preserving user location privacy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190416 |
|
WD01 | Invention patent application deemed withdrawn after publication |