CN110009499A - A kind of method of commerce and system based on block chain and hidden address - Google Patents

A kind of method of commerce and system based on block chain and hidden address Download PDF

Info

Publication number
CN110009499A
CN110009499A CN201910308303.2A CN201910308303A CN110009499A CN 110009499 A CN110009499 A CN 110009499A CN 201910308303 A CN201910308303 A CN 201910308303A CN 110009499 A CN110009499 A CN 110009499A
Authority
CN
China
Prior art keywords
node
transaction
encrypted
hidden address
envelope
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910308303.2A
Other languages
Chinese (zh)
Other versions
CN110009499B (en
Inventor
胡志琳
阮安邦
魏明
尹朝明
陈旭明
马飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eight Component Mdt Infotech Ltd Of Beijing
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Eight Component Mdt Infotech Ltd Of Beijing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eight Component Mdt Infotech Ltd Of Beijing filed Critical Eight Component Mdt Infotech Ltd Of Beijing
Priority to CN201910308303.2A priority Critical patent/CN110009499B/en
Publication of CN110009499A publication Critical patent/CN110009499A/en
Application granted granted Critical
Publication of CN110009499B publication Critical patent/CN110009499B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The present invention provides a kind of method of commerce and system based on block chain and hidden address, this method, comprising: Transaction Information is saved in block chain by the node for initiating transaction, determines the hidden address for preserving the Transaction Information;The node for initiating transaction encrypts the hidden address, and the encrypted hidden address is sent to the node for receiving and trading by verifying network under chain;The node for receiving transaction receives the encrypted hidden address by verifying network under the chain, and the encrypted hidden address is decrypted;The node for receiving transaction obtains the Transaction Information from the block chain according to the hidden address decrypted.The present invention provides a kind of method of commerce and system based on block chain and hidden address can reduce the calculation amount for realizing the transaction based on block chain.

Description

A kind of method of commerce and system based on block chain and hidden address
Technical field
The present invention relates to block chain technical field, in particular to a kind of method of commerce based on block chain and hidden address and System.
Background technique
Existing based in the transaction of the privacy of block chain and hidden address scheme, the node in block chain needs to be traversed for area All Activity in block chain determines whether there is one's own transaction.Specifically, the node of transaction is received to obtaining others To transferring accounts for oneself, the All Activity on block chain can only be traversed, to judge whether transaction address belongs to this node every time.It is false If there is N number of node in block chain network, generates M each second and trade, then N number of node will carry out N × M hidden address in total and test Card.
As can be seen from the above description, in the prior art, realizing the calculating of the transaction based on block chain and hidden address scheme It measures very big.
Summary of the invention
The embodiment of the invention provides a kind of method of commerce and system based on block chain and hidden address, can reduce reality The now transaction calculation amount based on block chain and hidden address scheme.
On the one hand, the embodiment of the invention provides a kind of method of commerce based on block chain and hidden address, comprising:
Transaction Information is saved in block chain by the node for initiating transaction, and determination preserves the Transaction Information snugly Location;
The node for initiating transaction encrypts the hidden address, by verifying network under chain for encrypted institute It states hidden address and is sent to the node for receiving transaction;
The node for receiving transaction receives the encrypted hidden address by verifying network under the chain, to encryption The hidden address afterwards is decrypted;
The node for receiving transaction obtains the transaction from the block chain according to the hidden address decrypted Information.
Preferably,
It is described that the encrypted hidden address is sent to the node for receiving and trading by verifying network under chain, comprising:
The encrypted hidden address is sent under the chain at random and verifies in network by the node for initiating transaction At least one node;
Further comprise:
The node of the encrypted hidden address is each received, is executed: is encrypted described hiding to what is received Address is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted institute It states hidden address to be decrypted, otherwise, the encrypted hidden address is sent at random under the chain and is verified in network At least one node;
The node for receiving transaction receives the encrypted hidden address by verifying network under the chain, to encryption The hidden address afterwards is decrypted, comprising:
It is described receive transaction node when receiving the encrypted hidden address, to it is encrypted it is described snugly Location is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted described Hidden address is decrypted.
Preferably,
The encrypted hidden address is sent under the chain at random and verifies in network by the node for initiating transaction At least one node, comprising:
The node for initiating transaction generates transaction envelope, and the transaction envelope is sent at random under the chain and verifies net At least one node in network, wherein include: the encrypted hidden address in the transaction envelope, for verifying reconciliation Close plaintext metadata;
The node for each receiving the encrypted hidden address executes: encrypted described to what is received Hidden address is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, after to encryption The hidden address be decrypted, otherwise, the encrypted hidden address is sent at random under the chain and verifies network In at least one node, comprising:
The node of the encrypted hidden address is each received, is executed: using in the transaction envelope received Institute's clear-text metadata the transaction envelope is verified, judge whether the transaction envelope needs this node decryption, such as Fruit is that then the encrypted hidden address is decrypted using institute's clear-text metadata, otherwise, by the transaction envelope with Machine is sent at least one node verified in network under the chain;
It is described receive transaction node when receiving the encrypted hidden address, to it is encrypted it is described snugly Location is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted described Hidden address is decrypted, comprising:
The node for receiving transaction is using institute's clear-text metadata in the transaction envelope received to the friendship Easy envelope is verified, and judges whether the transaction envelope needs this node decryption, if it is, utilizing institute's clear-text metadata The encrypted hidden address is decrypted.
Preferably,
Institute's clear-text metadata includes: at least one target topic, deadline;
Further comprise:
The node of the encrypted hidden address is each received, executes: judging current time whether in the cut-off Before date, if it is, executing institute's clear-text metadata in the transaction envelope that the utilization receives to the friendship Easy envelope is verified, and otherwise, terminates current process;
The node for each receiving the encrypted hidden address executes: being believed using the transaction received Institute's clear-text metadata in envelope verifies the transaction envelope, judges whether the transaction envelope needs this node solution It is close, comprising:
The node of the encrypted hidden address is each received, is executed: according in the transaction envelope received At least one described target topic, judge it is described transaction envelope in the presence or absence of this node concern theme, if it does not, Then determine that the transaction envelope does not need this node decryption.
Preferably,
In the node for each receiving the encrypted hidden address, execute: to the encrypted institute received It states before hidden address verified, further comprises:
The node of the encrypted hidden address is each received, is executed: determining the transaction envelope received Cryptographic Hash judges cryptographic Hash identical with the transaction cryptographic Hash of envelope whether is recorded in this node, if it is, determining The transaction envelope had been received by, and terminated current process, otherwise, records the cryptographic Hash of the transaction envelope, executes the docking The encrypted hidden address received is verified.
On the other hand, the transaction system based on block chain and hidden address that the embodiment of the invention provides a kind of, comprising:
At least two nodes;
The node that transaction is initiated at least two node, for when initiating transaction, Transaction Information to be saved in area In block chain, determines the hidden address for preserving the Transaction Information, the hidden address is encrypted, by verifying net under chain The encrypted hidden address is sent to the node for receiving transaction by network;
The node of transaction is received at least two node, is used for when receiving transaction, by verifying net under the chain Network receives the encrypted hidden address, and the encrypted hidden address is decrypted, described hidden according to what is decrypted Address is hidden, obtains the Transaction Information from the block chain.
Preferably,
The node for initiating transaction, in the case where execution is described by chain, verifying network sends out the encrypted hidden address When giving the node for receiving transaction, it is specifically used for:
The encrypted hidden address is sent to at least one node verified in network under the chain at random;
The node for each receiving the encrypted hidden address, for executing: encrypted described to what is received Hidden address is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, after to encryption The hidden address be decrypted, otherwise, the encrypted hidden address is sent at random under the chain and verifies network In at least one node;
The node for receiving transaction, in the case where execution is described by the chain, verifying network receives encrypted described hiding Address is specifically used for when the encrypted hidden address is decrypted:
When receiving the encrypted hidden address, the encrypted hidden address is verified, judgement adds Whether the hidden address after close needs this node decryption, if it is, the encrypted hidden address is decrypted.
Preferably,
It is described initiate transaction node, execute it is described the encrypted hidden address is sent to the chain at random under When verifying at least one node in network, it is specifically used for:
Transaction envelope is generated, the transaction envelope is sent at random under the chain and verifies at least one of network section Point, wherein include: the encrypted hidden address, the plaintext metadata for verifying and decrypting in the transaction envelope;
The node for each receiving the encrypted hidden address, for executing: being believed using the transaction received Institute's clear-text metadata in envelope verifies the transaction envelope, judges whether the transaction envelope needs this node solution It is close, if it is, the encrypted hidden address is decrypted using institute's clear-text metadata, otherwise, by the transaction Envelope is sent at least one node verified in network under the chain at random;
The node for receiving transaction, for utilizing institute's clear-text metadata in the transaction envelope received to institute It states transaction envelope to be verified, judges whether the transaction envelope needs this node decryption, if it is, utilizing the plaintext member The encrypted hidden address is decrypted in data.
Preferably,
Institute's clear-text metadata includes: at least one target topic, deadline;
The node for each receiving the encrypted hidden address, is further used for executing: whether judging current time Before the deadline, if it is, executing the plaintext member number in the transaction envelope that the utilization receives It is verified according to the transaction envelope, otherwise, terminates current process;
The node for each receiving the encrypted hidden address, for executing: according to the friendship received At least one described target topic in easy envelope judges the theme in the transaction envelope with the presence or absence of the concern of this node, such as Fruit is not present, it is determined that the transaction envelope does not need this node decryption.
Preferably,
The node for each receiving the encrypted hidden address, is further used for executing: determination receives described The cryptographic Hash of transaction envelope, judges cryptographic Hash identical with the transaction cryptographic Hash of envelope whether is recorded in this node, such as Fruit is, it is determined that the transaction envelope had been received by, and terminated current process, otherwise, records the cryptographic Hash of the transaction envelope, holds The described pair of encrypted hidden address received of row is verified.
In embodiments of the present invention, hidden address is sent to reception friendship by verifying network under chain by the node for initiating transaction Easy node receives the node of transaction without traversing every transaction, need to only handle the hidden address received, base In the hidden address decrypted, Transaction Information is obtained from block chain, realizes transaction, which substantially reduces realization based on area The calculation amount of the transaction of block chain.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is a kind of flow chart for method of commerce based on block chain and hidden address that one embodiment of the invention provides;
Fig. 2 is the process for another method of commerce based on block chain and hidden address that one embodiment of the invention provides Figure;
Fig. 3 is a kind of schematic diagram for transaction system based on block chain and hidden address that one embodiment of the invention provides.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments, based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
As shown in Figure 1, the embodiment of the invention provides a kind of method of commerce based on block chain and hidden address, this method It may comprise steps of:
Step 101: Transaction Information is saved in block chain by the node for initiating transaction, and the Transaction Information is preserved in determination Hidden address;
Step 102: the node for initiating transaction encrypts the hidden address, will be added by verifying network under chain The hidden address after close is sent to the node for receiving transaction;
Step 103: the node for receiving transaction by verifying network under the chain receive it is encrypted it is described snugly The encrypted hidden address is decrypted in location;
Step 104: the node for receiving transaction is obtained from the block chain according to the hidden address decrypted The Transaction Information.
In embodiments of the present invention, hidden address is sent to reception friendship by verifying network under chain by the node for initiating transaction Easy node receives the node of transaction without traversing every transaction, need to only handle the hidden address received, base In the hidden address decrypted, Transaction Information is obtained from block chain, realizes transaction, which substantially reduces realization based on area The calculation amount of the transaction of block chain.
In embodiments of the present invention, it when trading between each node, is transmitted without the network by block chain hidden Address is hidden, hidden address need to be only transmitted by verifying network under chain, each node need to only be handled logical without traversing All Activity It crosses under chain and verifies the hidden address that network is sent, substantially reduce calculation amount.
In an embodiment of the present invention, described be sent to the encrypted hidden address by verifying network under chain connects Receive the node of transaction, comprising:
The encrypted hidden address is sent under the chain at random and verifies in network by the node for initiating transaction At least one node;
Further comprise:
The node of the encrypted hidden address is each received, is executed: is encrypted described hiding to what is received Address is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted institute It states hidden address to be decrypted, otherwise, the encrypted hidden address is sent at random under the chain and is verified in network At least one node;
The node for receiving transaction receives the encrypted hidden address by verifying network under the chain, to encryption The hidden address afterwards is decrypted, comprising:
It is described receive transaction node when receiving the encrypted hidden address, to it is encrypted it is described snugly Location is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted described Hidden address is decrypted.
In embodiments of the present invention, multiple nodes constitute and verify network under chain, and encrypted hidden address is tested under chain It is transmitted in multiple nodes in card network, each node does not need this section in the encrypted hidden address transmitted and received When point decryption, direct random forwarding gives other nodes, other nodes here can be from the multiple sections verified in network under chain It is randomly choosed in point.The node of transaction is received after receiving encrypted hidden address, is decrypted, without forwarding.
In an embodiment of the present invention, the encrypted hidden address is sent to by the node for initiating transaction at random At least one node in network is verified under the chain, comprising:
The node for initiating transaction generates transaction envelope, and the transaction envelope is sent at random under the chain and verifies net At least one node in network, wherein include: the encrypted hidden address in the transaction envelope, for verifying reconciliation Close plaintext metadata;
The node for each receiving the encrypted hidden address executes: encrypted described to what is received Hidden address is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, after to encryption The hidden address be decrypted, otherwise, the encrypted hidden address is sent at random under the chain and verifies network In at least one node, comprising:
The node of the encrypted hidden address is each received, is executed: using in the transaction envelope received Institute's clear-text metadata the transaction envelope is verified, judge whether the transaction envelope needs this node decryption, such as Fruit is that then the encrypted hidden address is decrypted using institute's clear-text metadata, otherwise, by the transaction envelope with Machine is sent at least one node verified in network under the chain;
It is described receive transaction node when receiving the encrypted hidden address, to it is encrypted it is described snugly Location is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted described Hidden address is decrypted, comprising:
The node for receiving transaction is using institute's clear-text metadata in the transaction envelope received to the friendship Easy envelope is verified, and judges whether the transaction envelope needs this node decryption, if it is, utilizing institute's clear-text metadata The encrypted hidden address is decrypted.
In embodiments of the present invention, encrypted hidden address is verified under chain by way of envelope and is transmitted in network, If node can not decrypt envelope, node knows nothing the message content in envelope, and single this, which will have no effect on node, to disappear Breath is forwarded diffusion.
The format that envelope can be encoded by RLP (Recursive Length Prefix, recursive length prefix) passes It is defeated: [Version, Expiry, TTL, Topic, AESNonce, Data, EnvNonce].
In embodiments of the present invention, the node other than the node of transaction is received after receiving transaction envelope, can not be Hidden address is decrypted according to plaintext metadata.Decryption hidden address handles the plaintext metadata in the envelope that needs to trade, and also needs The relevant information of the node of transaction is received, such as: receive the private key etc. of the node of transaction.
In an embodiment of the present invention, institute's clear-text metadata includes: at least one target topic, deadline;
Further comprise:
The node of the encrypted hidden address is each received, executes: judging current time whether in the cut-off Before date, if it is, executing institute's clear-text metadata in the transaction envelope that the utilization receives to the friendship Easy envelope is verified, and otherwise, terminates current process;
The node for each receiving the encrypted hidden address executes: being believed using the transaction received Institute's clear-text metadata in envelope verifies the transaction envelope, judges whether the transaction envelope needs this node solution It is close, comprising:
The node of the encrypted hidden address is each received, is executed: according in the transaction envelope received At least one described target topic, judge it is described transaction envelope in the presence or absence of this node concern theme, if it does not, Then determine that the transaction envelope does not need this node decryption.
In embodiments of the present invention, each node in network is verified under chain can pay close attention to corresponding theme, if it find that The theme for not having this node of interest in transaction envelope, then be directly forwarded to other nodes, substantially increases each node docking The processing speed of the transaction envelope received.
Whether the deadline in plaintext metadata defines the transaction envelope effective, if within the deadline, The transaction envelope is effective, continues with, if the transaction envelope is invalid, not continuing with (also not within the deadline It is, without verifying, without forwarding).For example, deadline in envelope of trading is 10 minutes 10 10 points of on January 1st, 2019 Second, if current node receives the transaction envelope, having had been subjected to the deadline, then the transaction envelope is invalid, if It is not above the deadline, then the transaction envelope is effective.
The node of transaction is initiated when generating transaction envelope, the node for receiving transaction at least one theme of interest is sealed It is attached in the transaction envelope, in this way, the transaction envelope would not be missed by receiving the node of transaction.
In an embodiment of the present invention, it in the node for each receiving the encrypted hidden address, executes: right Before the encrypted hidden address received is verified, further comprise:
The node of the encrypted hidden address is each received, is executed: determining the transaction envelope received Cryptographic Hash judges cryptographic Hash identical with the transaction cryptographic Hash of envelope whether is recorded in this node, if it is, determining The transaction envelope had been received by, and terminated current process, otherwise, records the cryptographic Hash of the transaction envelope, executes the docking The encrypted hidden address received is verified.
It in embodiments of the present invention, is to randomly select at least one node since each node is in transmitted transaction envelope, In this way, some nodes may repeat to receive same transaction envelope, by the cryptographic Hash for calculating the transaction envelope received Also the transaction envelope had been received before determining whether, if received, without processing, if it is not, record should Then the cryptographic Hash of transaction envelope carries out the processing such as subsequent verifying.
Below by taking three nodes as an example, come that the present invention will be described in detail embodiment provide it is a kind of based on block chain and snugly The method of commerce of location.These three nodes are node A, node B and node C respectively, these three nodes are verified in network under chain. Node A has initiated transaction to node B, that is to say, that node A is the node for initiating transaction, and node B is the node for receiving transaction. Transaction envelope is sent at least one node at random by node A, includes node C at least one node, and node C will be handed at random At least one node is given in credulity seal, includes node B at least one node.
As shown in Fig. 2, the embodiment of the invention provides a kind of method of commerce based on block chain and hidden address, this method It may comprise steps of:
Step 201: Transaction Information is saved in block chain by node A, determines the hidden address for preserving Transaction Information.
Step 202: node A encrypts hidden address, generates transaction envelope, and transaction envelope is sent under chain at random Verify at least one node in network, wherein include: encrypted hidden address, at least one target master in transaction envelope It inscribes, the deadline, includes node C at least one node.
Step 203: node C judges current time whether before the deadline in transaction envelope, if it is, executing Step 204, otherwise, terminate current process.
Step 204: node C determines the cryptographic Hash of the transaction envelope received, judges whether recorded and handed in this node Otherwise the identical cryptographic Hash of cryptographic Hash of easy envelope, executes step 205 if it is, terminating current process.
Step 205: the cryptographic Hash of node C record transaction envelope executes step 206.
Step 206: node C judges in transaction envelope according at least one target topic in the transaction envelope received With the presence or absence of the theme of this node concern, if it does not exist, then executing step 207;
Step 207: envelope of trading is sent at least one node verified in network under chain by node C at random, this is at least It include node B in one node.
Step 208: node B judges current time whether before the deadline in transaction envelope, if it is, executing Step 209, otherwise, terminate current process.
Step 209: node B determines the cryptographic Hash of the transaction envelope received, judges whether recorded and handed in this node Otherwise the identical cryptographic Hash of cryptographic Hash of easy envelope, executes step 210 if it is, terminating current process.
Step 210: the cryptographic Hash of node B record transaction envelope executes step 211.
Step 211: node B judges in transaction envelope according at least one target topic in the transaction envelope received With the presence or absence of the theme of this node concern, if so, thening follow the steps 212.
Step 212: the encrypted hidden address in transaction envelope is decrypted in node B, is hidden according to what is decrypted Address obtains Transaction Information from block chain.
In embodiments of the present invention, based on network is verified under chain, the node for initiating transaction generates a transaction every time, simultaneously By the address information of the transaction, it is directly pushed to the node for receiving transaction.Brute-force is no longer needed to receive the node of transaction Traverse each transaction on block chain, it is only necessary to verify under chain and receive to initiate the transaction that the node of transaction has been sent on network ?.The node for receiving transaction each so only needs to verify after receiving assigned transaction information, at this time verifying meter Calculation amount falls below minimum.
In embodiments of the present invention, network is verified under chain is the common recognition based on each node and reaches, to establish One verifying channel.When both parties trade, this transaction is on the one hand recorded on block chain, while being established one and being tested Demonstrate,prove channel.Since verifying channel is to maintain opening state always, both sides can be traded infinitely at any time. Completion that can be instant by verifying network under chain is verified, and is completed in millisecond, is swept without having to worry about blocks all on block chain The time loss retouched.And its safety is high under the protection of intelligent contract and ECDH, can complete without trusteeship service Verifying behavior, the node for receiving transaction in this way are not necessarily in any transaction verification information of cochain processing, and block chain, which can be only used as, to be ensured The information of data safety stores network and exists.
The news network that network is based entirely on ID is verified under chain, is the asynchronous broadcast network between a set of p2p node.Under chain Message on verifying network is encryption transmission, can be exposed to public network completely and be transmitted.
In embodiments of the present invention, the citation form in network with envelope for each node transmission data is verified under chain.
In embodiments of the present invention, message queue can be set in each node, the transaction envelope for needing to send is protected It is stored in message queue, node can periodically be handled the transaction envelope in message queue.
In embodiments of the present invention, when verifying transmission message in network under chain, gray scale can be carried out based on transaction envelope Control, the i.e. configurability of degree of privacy.In message process, by configuring theme, Permission Levels control public key and peace Congruent grade can choose the transaction verification message for allowing other nodes to know oneself corresponding authority.If encryption completely, message is passed Passing is 100% dark, also can choose and certain message is allowed to be that full disclosure or part are open in verifying network.
As shown in figure 3, a kind of provided in this embodiment one transaction system based on block chain and hidden address, comprising:
At least two nodes 301;
The node that transaction is initiated at least two node, for when initiating transaction, Transaction Information to be saved in area In block chain, determines the hidden address for preserving the Transaction Information, the hidden address is encrypted, by verifying net under chain The encrypted hidden address is sent to the node for receiving transaction by network;
The node of transaction is received at least two node, is used for when receiving transaction, by verifying net under the chain Network receives the encrypted hidden address, and the encrypted hidden address is decrypted, described hidden according to what is decrypted Address is hidden, obtains the Transaction Information from the block chain.
In embodiments of the present invention, the node in the system is verified in network under the same chain, also in the same block In chain network.
3 nodes 301 are shown in figure.
In an embodiment of the present invention, the node for initiating transaction, in the case where execution is described by chain, verifying network will add When the hidden address after close is sent to the node for receiving transaction, it is specifically used for:
The encrypted hidden address is sent to at least one node verified in network under the chain at random;
The node for each receiving the encrypted hidden address, for executing: encrypted described to what is received Hidden address is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, after to encryption The hidden address be decrypted, otherwise, the encrypted hidden address is sent at random under the chain and verifies network In at least one node;
The node for receiving transaction, in the case where execution is described by the chain, verifying network receives encrypted described hiding Address is specifically used for when the encrypted hidden address is decrypted:
When receiving the encrypted hidden address, the encrypted hidden address is verified, judgement adds Whether the hidden address after close needs this node decryption, if it is, the encrypted hidden address is decrypted.
In an embodiment of the present invention, it is described initiate transaction node, execute it is described will it is encrypted described in snugly When location is sent at least one node verified in network under the chain at random, it is specifically used for:
Transaction envelope is generated, the transaction envelope is sent at random under the chain and verifies at least one of network section Point, wherein include: the encrypted hidden address, the plaintext metadata for verifying and decrypting in the transaction envelope;
The node for each receiving the encrypted hidden address, for executing: being believed using the transaction received Institute's clear-text metadata in envelope verifies the transaction envelope, judges whether the transaction envelope needs this node solution It is close, if it is, the encrypted hidden address is decrypted using institute's clear-text metadata, otherwise, by the transaction Envelope is sent at least one node verified in network under the chain at random;
The node for receiving transaction, for utilizing institute's clear-text metadata in the transaction envelope received to institute It states transaction envelope to be verified, judges whether the transaction envelope needs this node decryption, if it is, utilizing the plaintext member The encrypted hidden address is decrypted in data.
In an embodiment of the present invention, institute's clear-text metadata includes: at least one target topic, deadline;
The node for each receiving the encrypted hidden address, is further used for executing: whether judging current time Before the deadline, if it is, executing the plaintext member number in the transaction envelope that the utilization receives It is verified according to the transaction envelope, otherwise, terminates current process;
The node for each receiving the encrypted hidden address, for executing: according to the friendship received At least one described target topic in easy envelope judges the theme in the transaction envelope with the presence or absence of the concern of this node, such as Fruit is not present, it is determined that the transaction envelope does not need this node decryption.
In an embodiment of the present invention, the node for each receiving the encrypted hidden address, is further used for holding Row: determining the cryptographic Hash of the transaction envelope received, judges the Kazakhstan with the transaction envelope whether is recorded in this node It is uncommon to be worth identical cryptographic Hash, if it is, determining that the transaction envelope had been received by, terminate current process, otherwise, described in record The cryptographic Hash of transaction envelope executes the described pair of encrypted hidden address received and verifies.
The contents such as the information exchange between each unit, implementation procedure in above-mentioned apparatus, due to implementing with the method for the present invention Example is based on same design, and for details, please refer to the description in the embodiment of the method for the present invention, and details are not described herein again.
The each embodiment of the present invention at least has the following beneficial effects:
1, hidden address is sent to reception by verifying network under chain by the node in embodiments of the present invention, initiating transaction The node of transaction receives the node of transaction without traversing every transaction, need to only handle the hidden address received, Based on the hidden address decrypted, Transaction Information is obtained from block chain, realizes transaction, which substantially reduces realization and be based on The calculation amount of the transaction of block chain.
2, in embodiments of the present invention, based on network is verified under chain, the node for initiating transaction generates a transaction every time, together When by the address information of the transaction, be directly pushed to receive transaction node.Brute-force is no longer needed to receive the node of transaction Traversal block chain on each transaction, it is only necessary to the friendship that has sent of node for receiving to initiate transaction on network is verified under chain Easily.The node for receiving transaction each so only needs to verify after receiving assigned transaction information, verifies at this time Calculation amount falls below minimum.
It should be noted that, in this document, such as first and second etc relational terms are used merely to an entity Or operation is distinguished with another entity or operation, is existed without necessarily requiring or implying between these entities or operation Any actual relationship or order.Moreover, the terms "include", "comprise" or its any other variant be intended to it is non- It is exclusive to include, so that the process, method, article or equipment for including a series of elements not only includes those elements, It but also including other elements that are not explicitly listed, or further include solid by this process, method, article or equipment Some elements.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including There is also other identical factors in the process, method, article or equipment of the element.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can store in computer-readable storage medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes: ROM, RAM, magnetic disk or light In the various media that can store program code such as disk.
Finally, it should be noted that the foregoing is merely presently preferred embodiments of the present invention, it is merely to illustrate skill of the invention Art scheme, is not intended to limit the scope of the present invention.Any modification for being made all within the spirits and principles of the present invention, Equivalent replacement, improvement etc., are included within the scope of protection of the present invention.

Claims (10)

1. a kind of method of commerce based on block chain and hidden address characterized by comprising
Transaction Information is saved in block chain by the node for initiating transaction, determines the hidden address for preserving the Transaction Information;
The node for initiating transaction encrypts the hidden address, will be encrypted described hidden by verifying network under chain Hiding address is sent to the node for receiving transaction;
The node for receiving transaction receives the encrypted hidden address by verifying network under the chain, to encrypted The hidden address is decrypted;
The node for receiving transaction obtains the transaction letter according to the hidden address decrypted from the block chain Breath.
2. the method according to claim 1, wherein
It is described that the encrypted hidden address is sent to the node for receiving and trading by verifying network under chain, comprising:
The encrypted hidden address is sent under the chain at random and verifies in network extremely by the node for initiating transaction A few node;
Further comprise:
The node of the encrypted hidden address is each received, is executed: to the encrypted hidden address received It is verified, judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted described hidden Hiding address is decrypted, and otherwise, the encrypted hidden address is sent at random under the chain and is verified in network at least One node;
The node for receiving transaction receives the encrypted hidden address by verifying network under the chain, to encrypted The hidden address is decrypted, comprising:
It is described receive transaction node when receiving the encrypted hidden address, to the encrypted hidden address into Row verifying, judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted described hiding Address is decrypted.
3. according to the method described in claim 2, it is characterized in that,
The encrypted hidden address is sent under the chain at random and verifies in network extremely by the node for initiating transaction A few node, comprising:
The node for initiating transaction generates transaction envelope, and the transaction envelope is sent at random under the chain and is verified in network At least one node, wherein include: the encrypted hidden address in the transaction envelope, for verifying and decrypting Plaintext metadata;
The node for each receiving the encrypted hidden address executes: encrypted described hiding to what is received Address is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted institute It states hidden address to be decrypted, otherwise, the encrypted hidden address is sent at random under the chain and is verified in network At least one node, comprising:
The node of the encrypted hidden address is each received, executes: utilizing the institute in the transaction envelope received Clear-text metadata verifies the transaction envelope, judges whether the transaction envelope needs this node decryption, if so, Then the encrypted hidden address is decrypted using institute's clear-text metadata, otherwise, the transaction envelope is sent out at random Give at least one node verified in network under the chain;
It is described receive transaction node when receiving the encrypted hidden address, to the encrypted hidden address into Row verifying, judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted described hiding Address is decrypted, comprising:
The node for receiving transaction believes the transaction using institute's clear-text metadata in the transaction envelope received Envelope is verified, and judges whether the transaction envelope needs this node decryption, if it is, using institute's clear-text metadata to adding The hidden address after close is decrypted.
4. according to the method described in claim 3, it is characterized in that,
Institute's clear-text metadata includes: at least one target topic, deadline;
Further comprise:
The node of the encrypted hidden address is each received, executes: judging current time whether in the deadline Before, if it is, the institute's clear-text metadata executed in the transaction envelope that the utilization receives believes the transaction Envelope is verified, and otherwise, terminates current process;
The node for each receiving the encrypted hidden address executes: using in the transaction envelope received Institute's clear-text metadata the transaction envelope is verified, judge whether the transaction envelope needs this node decryption, wrap It includes:
The node of the encrypted hidden address is each received, is executed: according to the institute in the transaction envelope received At least one target topic is stated, the theme in the transaction envelope with the presence or absence of the concern of this node is judged, if it does not exist, then really The fixed transaction envelope does not need this node decryption.
5. according to the method described in claim 3, it is characterized in that,
In the node for each receiving the encrypted hidden address, execute: encrypted described hidden to what is received Before hiding address is verified, further comprise:
The node of the encrypted hidden address is each received, is executed: determining the Hash of the transaction envelope received Value, judges cryptographic Hash identical with the transaction cryptographic Hash of envelope whether is recorded in this node, if it is, described in determining Transaction envelope had been received by, and terminated current process, otherwise, records the cryptographic Hash of the transaction envelope, executes described pair and receive The encrypted hidden address verified.
6. a kind of transaction system based on block chain and hidden address characterized by comprising
At least two nodes;
The node that transaction is initiated at least two node, for when initiating transaction, Transaction Information to be saved in block chain In, it determines the hidden address for preserving the Transaction Information, the hidden address is encrypted, it will by verifying network under chain The encrypted hidden address is sent to the node for receiving transaction;
The node of transaction is received at least two node, for being connect by verifying network under the chain when receiving transaction The encrypted hidden address is received, the encrypted hidden address is decrypted, according to decrypting snugly Location obtains the Transaction Information from the block chain.
7. system according to claim 6, which is characterized in that
The encrypted hidden address described is sent to by the node for initiating transaction executing by verifying network under chain When receiving the node of transaction, it is specifically used for:
The encrypted hidden address is sent to at least one node verified in network under the chain at random;
The node for each receiving the encrypted hidden address, for executing: encrypted described hiding to what is received Address is verified, and judges whether the encrypted hidden address needs this node decryption, if it is, to encrypted institute It states hidden address to be decrypted, otherwise, the encrypted hidden address is sent at random under the chain and is verified in network At least one node;
The node for receiving transaction, execute it is described by the chain under verifying network receive it is encrypted it is described snugly Location is specifically used for when the encrypted hidden address is decrypted:
When receiving the encrypted hidden address, the encrypted hidden address is verified, after judging encryption The hidden address whether need this node decryption, if it is, the encrypted hidden address is decrypted.
8. system according to claim 7, which is characterized in that
It is described initiate transaction node, execute it is described the encrypted hidden address is sent to the chain at random under verify When at least one node in network, it is specifically used for:
Transaction envelope is generated, the transaction envelope is sent at least one node verified in network under the chain at random, In, it include: the encrypted hidden address, the plaintext metadata for verifying and decrypting in the transaction envelope;
The node for each receiving the encrypted hidden address, for executing: using in the transaction envelope received Institute's clear-text metadata the transaction envelope is verified, judge whether the transaction envelope needs this node decryption, such as Fruit is that then the encrypted hidden address is decrypted using institute's clear-text metadata, otherwise, by the transaction envelope with Machine is sent at least one node verified in network under the chain;
The node for receiving transaction, for utilizing institute's clear-text metadata in the transaction envelope received to the friendship Easy envelope is verified, and judges whether the transaction envelope needs this node decryption, if it is, utilizing institute's clear-text metadata The encrypted hidden address is decrypted.
9. system according to claim 8, which is characterized in that
Institute's clear-text metadata includes: at least one target topic, deadline;
Whether the node for each receiving the encrypted hidden address, is further used for executing: judging current time in institute Before stating the deadline, if it is, executing institute's clear-text metadata pair in the transaction envelope that the utilization receives The transaction envelope is verified, and otherwise, terminates current process;
The node for each receiving the encrypted hidden address, for executing: being believed according to the transaction received At least one described target topic in envelope judges the theme in the transaction envelope with the presence or absence of the concern of this node, if not In the presence of, it is determined that the transaction envelope does not need this node decryption.
10. system according to claim 8, which is characterized in that
The node for each receiving the encrypted hidden address, is further used for executing: determining the transaction received The cryptographic Hash of envelope judges cryptographic Hash identical with the transaction cryptographic Hash of envelope whether is recorded in this node, if so, It then determines that the transaction envelope had been received by, terminates current process, otherwise, record the cryptographic Hash of the transaction envelope, execute institute It states and the encrypted hidden address received is verified.
CN201910308303.2A 2019-04-17 2019-04-17 Transaction method and system based on block chain and hidden address Active CN110009499B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910308303.2A CN110009499B (en) 2019-04-17 2019-04-17 Transaction method and system based on block chain and hidden address

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910308303.2A CN110009499B (en) 2019-04-17 2019-04-17 Transaction method and system based on block chain and hidden address

Publications (2)

Publication Number Publication Date
CN110009499A true CN110009499A (en) 2019-07-12
CN110009499B CN110009499B (en) 2021-05-11

Family

ID=67172481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910308303.2A Active CN110009499B (en) 2019-04-17 2019-04-17 Transaction method and system based on block chain and hidden address

Country Status (1)

Country Link
CN (1) CN110009499B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245569A (en) * 2020-01-14 2020-06-05 中国科学院软件研究所 Block chain network covert communication method based on node uniqueness identifier arrangement
CN111507711A (en) * 2020-04-08 2020-08-07 青岛科技大学 Service interaction method and system based on block chain invisible address
CN114614981A (en) * 2022-02-21 2022-06-10 北京航空航天大学 Hidden information transmission method and device based on-chain negotiation
CN114844729A (en) * 2022-07-04 2022-08-02 中国人民解放军国防科技大学 Network information hiding method and system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102130768A (en) * 2010-12-20 2011-07-20 西安西电捷通无线网络通信股份有限公司 Terminal equipment having capability of encrypting and decrypting link layer and data processing method thereof
CN103678175A (en) * 2013-12-05 2014-03-26 长城信息产业股份有限公司 Address concealing method and embedded equipment based on address concealing technology
CN106788985A (en) * 2016-11-25 2017-05-31 中国电子科技集团公司第三十研究所 The stealthy address implementation method that a kind of third party can supervise
CN107742212A (en) * 2017-10-13 2018-02-27 深圳怡化电脑股份有限公司 Assets verification method, apparatus and system based on block chain
CN108235772A (en) * 2017-12-29 2018-06-29 深圳前海达闼云端智能科技有限公司 Data processing method, device, storage medium and electronic equipment based on block chain
CN108600199A (en) * 2018-04-08 2018-09-28 国网浙江省电力有限公司电力科学研究院 A kind of transmission method and system of the Audit data based on block chain
CN108632254A (en) * 2018-04-03 2018-10-09 电子科技大学 A kind of access control method of the smart home environment based on privately owned chain
WO2018185724A1 (en) * 2017-04-07 2018-10-11 nChain Holdings Limited Method and system for secure data record distribution using a blockchain
CN108711105A (en) * 2018-05-16 2018-10-26 四川吉鼎科技有限公司 A kind of Secure Transaction verification method and system based on block chain
CN108833522A (en) * 2018-06-06 2018-11-16 北京八分量信息科技有限公司 A kind of believable system and method for determining node
CN109034801A (en) * 2018-07-31 2018-12-18 杭州复杂美科技有限公司 A kind of privacy method of commerce and system, equipment and can storage medium
CN109508552A (en) * 2018-11-09 2019-03-22 江苏大学 The method for secret protection of distributed cloud storage system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102130768A (en) * 2010-12-20 2011-07-20 西安西电捷通无线网络通信股份有限公司 Terminal equipment having capability of encrypting and decrypting link layer and data processing method thereof
CN103678175A (en) * 2013-12-05 2014-03-26 长城信息产业股份有限公司 Address concealing method and embedded equipment based on address concealing technology
CN106788985A (en) * 2016-11-25 2017-05-31 中国电子科技集团公司第三十研究所 The stealthy address implementation method that a kind of third party can supervise
WO2018185724A1 (en) * 2017-04-07 2018-10-11 nChain Holdings Limited Method and system for secure data record distribution using a blockchain
CN107742212A (en) * 2017-10-13 2018-02-27 深圳怡化电脑股份有限公司 Assets verification method, apparatus and system based on block chain
CN108235772A (en) * 2017-12-29 2018-06-29 深圳前海达闼云端智能科技有限公司 Data processing method, device, storage medium and electronic equipment based on block chain
CN108632254A (en) * 2018-04-03 2018-10-09 电子科技大学 A kind of access control method of the smart home environment based on privately owned chain
CN108600199A (en) * 2018-04-08 2018-09-28 国网浙江省电力有限公司电力科学研究院 A kind of transmission method and system of the Audit data based on block chain
CN108711105A (en) * 2018-05-16 2018-10-26 四川吉鼎科技有限公司 A kind of Secure Transaction verification method and system based on block chain
CN108833522A (en) * 2018-06-06 2018-11-16 北京八分量信息科技有限公司 A kind of believable system and method for determining node
CN109034801A (en) * 2018-07-31 2018-12-18 杭州复杂美科技有限公司 A kind of privacy method of commerce and system, equipment and can storage medium
CN109508552A (en) * 2018-11-09 2019-03-22 江苏大学 The method for secret protection of distributed cloud storage system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
NAGA ROHIT SAMINENI: "Stealth and semi-stealth MITM attacks, detection and defense in IPv4 networks", 《2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING》 *
PARAMETA: "小蚁白皮书:基于区块链技术的资产数字化系统", 《链节点》 *
初汐: "区块链隐私保护研究(一)", 《CSDN》 *
屈爽: "如何解决隐身地址问题", 《巴比特》 *
王皓等: "数字货币中的区块链及其隐私保护机制", 《信息网络安全》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245569A (en) * 2020-01-14 2020-06-05 中国科学院软件研究所 Block chain network covert communication method based on node uniqueness identifier arrangement
CN111507711A (en) * 2020-04-08 2020-08-07 青岛科技大学 Service interaction method and system based on block chain invisible address
CN111507711B (en) * 2020-04-08 2023-12-15 青岛科技大学 Business interaction method and system based on block chain invisible address
CN114614981A (en) * 2022-02-21 2022-06-10 北京航空航天大学 Hidden information transmission method and device based on-chain negotiation
CN114614981B (en) * 2022-02-21 2023-12-19 北京航空航天大学 Hidden information transmission method and device based on-chain negotiation
CN114844729A (en) * 2022-07-04 2022-08-02 中国人民解放军国防科技大学 Network information hiding method and system
CN114844729B (en) * 2022-07-04 2022-09-30 中国人民解放军国防科技大学 Network information hiding method and system

Also Published As

Publication number Publication date
CN110009499B (en) 2021-05-11

Similar Documents

Publication Publication Date Title
CN110009499A (en) A kind of method of commerce and system based on block chain and hidden address
CN107248994B (en) Information sending method, processing method and device
CN109831374B (en) Mail receiving and sending system based on block chain
CN106603233B (en) Encryption and decryption method for remote bid opening type bidding system
Karjoth et al. Protecting the computation results of free-roaming agents
Shmatikov Probabilistic analysis of an anonymity system
US8832437B2 (en) Stateless human detection for real-time messaging systems
EP4002181A1 (en) A consensus method and framework for a blockchain system
JP3688830B2 (en) Packet transfer method and packet processing apparatus
Latifa et al. Blockchain: Bitcoin wallet cryptography security, challenges and countermeasures
CN109194466A (en) A kind of cloud data integrity detection method and system based on block chain
CN111698084B (en) Block chain-based concealed communication method
CN110224808B (en) Bank data sharing method and device based on block chain, computer equipment and storage medium
CN107172056A (en) A kind of channel safety determines method, device, system, client and server
CN104967612A (en) Data encryption storage method, server and system
WO2019227225A1 (en) Systems and methods for establishing communications via blockchain
CN104539517A (en) Chatting method and system based on intelligent terminal local server
CN110912877A (en) Data transmitting and receiving method and device based on IEC61850 model in transformer substation
CN101741823A (en) Cross-validation safety communication method and system
CN107742246A (en) Overseas hotel's order confirmation method and system
GB2587541A (en) A consensus method and framework for a blockchain system
CN108965278A (en) Transaction request processing method and processing device
Guttman Authentication tests and disjoint encryption: a design method for security protocols
CN103188271A (en) Secure mail client local data storage and identification methods and devices
Schliep et al. Is bob sending mixed signals?

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant