CN110149322A - A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild - Google Patents

A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild Download PDF

Info

Publication number
CN110149322A
CN110149322A CN201910372173.9A CN201910372173A CN110149322A CN 110149322 A CN110149322 A CN 110149322A CN 201910372173 A CN201910372173 A CN 201910372173A CN 110149322 A CN110149322 A CN 110149322A
Authority
CN
China
Prior art keywords
block chain
node
block
key
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910372173.9A
Other languages
Chinese (zh)
Inventor
李宝次
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Gongchain Information Technology Co., Ltd.
Original Assignee
Shandong Gongchain Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Gongchain Information Technology Co Ltd filed Critical Shandong Gongchain Information Technology Co Ltd
Priority to CN201910372173.9A priority Critical patent/CN110149322A/en
Publication of CN110149322A publication Critical patent/CN110149322A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Mathematical Analysis (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Algebra (AREA)
  • Strategic Management (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The block chain encryption method that a kind of irreversible dynamic failure re-examination according to the present invention is rebuild retrieves cryptographic block by peer node to rebuild supernumerary segment point part, and it retrieves at least some secrets and shares for rebuilding private key, and supernumerary segment point part is decrypted with the private key rebuild, Encryption Algorithm processing is carried out in plain text with key pair message, it is sent after obtaining node, after recipient receives node, use key identical with sender, and with the algorithm for inversion of the used Encryption Algorithm of sender, node is decrypted, is obtained in plain text;Broadcast by promoter signature and each part by encryption is into block chain, realize the various functions in relation to digital certificate management in authentication, and it by key, certificate and executes in record write-in block chain, dependence of the identity authorization system to original authentication center is substantially reduced, realizes that authentication overall process discloses, is transparent, can audit.

Description

A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild
Technical field
This application involves block chain technical fields, rebuild in particular to a kind of irreversible dynamic failure re-examination Block chain encryption method.
Background technique
Multiple Atomic Chain(abbreviation MAC, Duo Yuanlian) it is the third developed except block chain and ether mill Kind of the block chain bottom ecosystem is dedicated to expanding business application boundary and the technological boundary of block chain technology, allows public users User can really experience the value of block chain technology, make block chain more straight in academic theory level not in stagnation What is connect is applied in the practice of development and application, the exploitation of Duo Yuanlian by be business application and the collision of block chain technology spark, It is also a kind of challenge to the block chain prior art, prior art thinking of having jumped out is block chain 3.0 Ecological Information body System starts pioneer.In more original catenary systems, point-to-point value Transfer can be realized by value transport protocol, high-performance, High-throughput is fast and safely the characteristic of more former chains, to construct the multiple industry fields of support with the bottom of more former chains The scene application and development ecology of the decentralization of (finance, supply chain, social activity, game, electric business, traces to the source, trades at Internet of Things) is flat Platform.
More former chains public chain (in PublicBlockchain system, the whole world anyone all can be read, anyone all Can send transaction and transaction can obtain effectively confirm, anyone can participate in wherein common recognition process block chain (common recognition process is determined Which fixed block can be added in block chain and clear current state).Centered on change or true centricization trust substitution The safety of object, public block chain takes the modes such as proof of work mechanism or equity proof mechanism by " encryption digital economy ", will Financial incentive and encryption digit check combine, and follow rule: everyone therefrom obtainable financial incentive, It is directly proportional to the contribution made to common recognition process.These block chains are typically considered " complete decentralization ".
Similar with the fragment mechanism of any distributed data base, the fragment mechanism of NDPoS is based on DHT mode, according to subregion The hashed value of key carries out cutting.In such a mode, the accurate inquiry operation performance of specified partition key is high, while in general Enough accomplish that the data of entire cluster are uniformly distributed for equally distributed subregion bond energy.But it if is not wrapped in querying condition Key containing subregion, inquiry must be broadcasted into all fragments to obtain qualified record in whole subregions.Different from DAG The structure final consistency unpredictable to the trade confirmation time, NDPoS by the more living mechanism of equity of block chain, provide across The strong consistency of interchain transaction.Meanwhile NDPoS realizes the unlimited of whole network fragment quantity by the mechanism of Hierarchical Agent Elastic dilatation fundamentally solves performance and scaling concern that single-stranded account book quantity can not be excessive.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind State the block chain encryption method that a kind of irreversible dynamic failure re-examination of problem is rebuild.
A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild is claimed in the present invention, and feature exists In, comprising:
Block chain link point is encrypted using encryption function, encryption function is carried out using public key, is set as decrypting with private key Data information;
If the decrypted result carries the user identifier, it is determined that the data entry is corresponding with the user identifier The data information of user;
Identifying the decrypted result, whether it is sent by the node on block chain, if so, to tape is created between path node Part remaining sum, then trade initiator be sent to transaction acceptance side's transaction certificate supplement in parameter field;
File is requested access to according to client, cryptographic block is retrieved to rebuild supernumerary segment point part by a peer node, and retrieve At least some secrets are shared for rebuilding private key, and decrypt supernumerary segment point part with the private key rebuild;
Broadcast by promoter signature and each part by encryption is into block chain;
Sender carries out Encryption Algorithm processing using key pair message in plain text, sends after obtaining node, recipient receives section After point, using key identical with sender, and with the algorithm for inversion of the used Encryption Algorithm of sender, node is solved It is close, it obtains in plain text;
The All Activity that current block is packaged is recorded in a manner of Merkel tree, and the tree root of the field record transaction tree is breathed out Uncommon value, when each transaction, which enters, to be carried out block and be packaged, it is primary that field needs recalculate update, Merkel tree Root is all root node cryptographic Hash for being recorded transaction in the block.
The block chain encryption method that a kind of irreversible dynamic failure re-examination according to the present invention is rebuild passes through encryption letter The anti-distort of several confidentiality and block chain technology realizes the various functions in relation to digital certificate management in authentication, and And by key, certificate and execute in record write-in block chain, substantially reduce identity authorization system to original authentication center according to Rely, realizes that authentication overall process discloses, is transparent, can audit.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment Attached drawing is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not to be seen as It is the restriction to range, it for those of ordinary skill in the art, without creative efforts, can be with Other relevant attached drawings are obtained according to these attached drawings.
Fig. 1 shows a kind of process for the block chain encryption method that irreversible dynamic failure re-examination is rebuild according to the present invention Schematic diagram;
Fig. 2 shows the block chain encryption methods of irreversible dynamic failure re-examination reconstruction according to an embodiment of the invention The flow diagram of one embodiment.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing this public affairs in attached drawing The exemplary embodiment opened, it being understood, however, that may be realized in various forms the disclosure without the implementation that should be illustrated here Example is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the disclosure Range is fully disclosed to those skilled in the art.
A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild according to the present invention is shown referring to attached drawing 1 Flow diagram.
A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild is claimed in the present invention, and feature exists In, comprising:
Block chain link point is encrypted using encryption function, encryption function is carried out using public key, is set as decrypting with private key Data information;
If the decrypted result carries the user identifier, it is determined that the data entry is corresponding with the user identifier The data information of user;
Identifying the decrypted result, whether it is sent by the node on block chain, if so, to tape is created between path node Part remaining sum, then trade initiator be sent to transaction acceptance side's transaction certificate supplement in parameter field;
File is requested access to according to client, cryptographic block is retrieved to rebuild supernumerary segment point part by a peer node, and retrieve At least some secrets are shared for rebuilding private key, and decrypt supernumerary segment point part with the private key rebuild;
Broadcast by promoter signature and each part by encryption is into block chain;
Sender carries out Encryption Algorithm processing using key pair message in plain text, sends after obtaining node, recipient receives section After point, using key identical with sender, and with the algorithm for inversion of the used Encryption Algorithm of sender, node is solved It is close, it obtains in plain text;
The All Activity that current block is packaged is recorded in a manner of Merkel tree, and the tree root of the field record transaction tree is breathed out Uncommon value, when each transaction, which enters, to be carried out block and be packaged, it is primary that field needs recalculate update, Merkel tree Root is all root node cryptographic Hash for being recorded transaction in the block.
Further, described that block chain link point is encrypted using encryption function, encryption function is carried out using public key, It is set as ciphertext data information with private key, specifically includes:
Only sub- public key is independently generated with all each participant that shares of sub- private key, and participant oneself knows respective secret point It enjoys, so that meeting any attacker of encryption data under public key can not be appointed as long as the secret sharing that can not obtain master key The information what sub-key is shared;
Encryption function uses conic section digital encryption algorithm, indicates finite field using function (1) firstOn curve E;
(1)
Wherein,Enable setExpression meets the set of all the points (x, the y) composition of function (1), wherein;In addition,It also include a particular point O;When initialization, it is thus necessary to determine that the public variable of system;Choosing Select root node, the rank of G is n, and the major parameter of conic section digital encryption algorithm is, algorithm It is described in detail below:
Key schedule: random selection integer, calculate, then public key is Q, and private key is d;
Encryption Algorithm: input message m and private key d, random selection, calculate, x is converted into whole Number calculatesIf r=0, k is reselected, is calculated,For selected hash function, calculateIf s=0, k is reselected, exports encrypted result to (r, s);
Checking algorithm: input encrypted result is to (r, s), and message m, public key G, if following formula is set up, it is legal to export, and otherwise exports It is illegal.
Preferably, if the above-mentioned decrypted result carries the user identifier, it is determined that the data entry be with it is described The data information of the corresponding user of user identifier, specifically includes:
The cryptographic Hash of public key is the unique open mark of account in a network as account address, raw by signing and issuing center secret key At center certificate is signed and issued, for signing and issuing user certificate, root certificate is important tool of the EPID format as operations such as trading signatures;
Using the certificate provided by monitor as input, and this certificate is checked according to domain certificate policy, the domain certificate plan
The slightly specified reconstruction list allowed for the special domain certificate.If certificate is issued by the reconstruction in table within the rule Hair, then can execute a response policy, which is transferred to the block chain currency of anomaly reconstruction impacted The monitor of user and report violation.
Being locally stored is the simplest method for storing private key, is to store private key as a file format than more typical mode In local disk or store in the local database.When needing to create transaction, block chain client software reads private key data, It to trading signature and is broadcast in network, the block chain public key and corresponding private key of user is periodically automatically generated by client And it backs up.Many advantages are locally stored, firstly, since only block chain client can access the file directory of private key, therefore User need to only log in a client, and not having to additional progress authentication can be operated.Secondly, the storage of local disk Space is bigger, therefore can store a large amount of private key.Finally, user need to only use the progress of block chain client some simple Operation can generate transaction.However, this simple and easy mode also brings certain threat, such as the number of private key file According to may be by
Malware is read, and when especially user uses network or sharing data, to avoid leakage private key file catalogue.This Outside, it also to avoid local device that physical accident occurs, such as damage, is stolen.In order to improve the safety being locally stored, encrypt Wallet is suggested, it be it is a kind of it is special mode is locally stored, private key is stored in different on disk, encryption wallet pair from directly Be stored in local after private key file encryption, encryption it is close
Key is obtained according to the password derivative of user's selection.Compared to being locally stored, encryption wallet can resist physics stealing: Even wallet equipment goes adrift, and no password is not available private key still, but has little significance for number stealing, such as It says, if Malware is implanted into wallet equipment in advance and tracks the input password of acquisition user by attacker, password at this time is protected Shield no longer works.
Referring to attached drawing 2, the block that irreversible dynamic failure re-examination according to an embodiment of the invention is rebuild is shown The flow diagram of one embodiment of chain encryption method.
Further, sender carries out Encryption Algorithm processing using key pair message in plain text, sends after obtaining node, After recipient receives node, using key identical with sender, and the algorithm for inversion of the used Encryption Algorithm of sender is used, Node is decrypted, obtains in plain text, specifically including;
New node can random complete node request block chain into network complete information, when receiving block, new node meeting The correctness of block is successively verified according to the sequence on block chain;
If the block data of block chain slowly fails to synchronously complete, new node can bear with a period of time, more than a timing Between after threshold value, go to other nodes and obtain block chain data, when node is from after offline time is too long in block chain network, once again When online, it is also desirable to carry out the synchronous reconstruction of block chain;
If participant agrees to signature, Hash operation can be carried out to content and obtain the second cryptographic Hash, using participant's private key to the Two cryptographic Hash are encrypted to obtain participant's signature, and participant is signed broadcast into block chain;
Promoter can obtain participant's signature of each participant's broadcast from block chain, use the ginseng of each participant respectively Participant's signature corresponding with person's public key decryptions, if successful decryption, proves that the signature is the signature of corresponding participant, decrypts Failure then proves that the signature is not the signature for being participant.
When realizing that failure is rebuild, devise some data structures, these data structures primarily to convenient to use, By sequencing method when storage, in the form of binary storage in the database, at the time of reading by the method for unserializing, It reads in memory.
Rebuild certificate chained list
When initial, certificate will be rebuild and be added to chained list, at this moment only one element.It is corresponding new when key is rebuild in replacement Storage can be also requested by rebuilding certificate, and new reconstruction certificate is at this moment added to single linked list end.
Verify certificate
When user is when inquiry verifies the validity of some certificate, according to certificate acquisition label originator information is analyzed, then in weight It builds in certificate chained list and traverses, carry out whether verification certificate signature is signed and issued by corresponding certificate of rebuilding after having looked for.If verification label Name failure can not find as invalid certificates.
Authentication
When receiving new certificate issuance request, newest reconstruction certificate, that is, the certificate at the chained list end need to be used It is verified.If verified successfully, as valid certificate, subsequent storage is carried out.Otherwise it is assumed that being illegal certificate, return Failure.
Further, the All Activity that the current block is packaged is recorded in a manner of Merkel tree, field note The tree root cryptographic Hash for recording the transaction tree, when each transaction entrance, which carrys out block, to be packaged, field needs are recalculated It updating once, the root of Merkel tree is all root node cryptographic Hash for being recorded transaction in the block, it specifically includes:
Full node determines all blocks that may include the transaction according to the feature of transaction, at this moment can be stabbed according to exchange hour It determines that the block of neighbouring time, Quan Jiedian search for the Transaction Information from possible block, and generates this block and all trade Merkle tree, and calculate information Merkle certification path, and certification path is returned into SPV node, what is at this moment used is Merkle technology;
The communication network of block catenary system is a non-stop layer, and point-to-point broadcast type network, it be used to broadcast newly-generated Transaction and block.All nodes are all equality in network, and the topological structure of network is also random.New node wants that net is added It when network, need to only be communicated with a known node, which is referred to as seed node, and seed node is by node broadcasts known to oneself To new access node, repeatedly after, new access node can be communicated with many nodes.Each node is also logical when giving out information It crosses this mechanism: when node issues connection request while relaying away the link information of oneself, when node receives connection request When can also inquire link information.One effective random network of this Mechanism establishing, being capable of rapidly broadcast message;
For user when carrying out communicating etc. the behavior that other need safety requirements on block chain, the data entry of user is encryption, Index and data key do not lose in the case where, each user have it is all oneself data complete plaintext state;
Merkle tree is used to conclude the All Activity in a block, while generating the digital finger-print of entire Transaction Set, and Provide a kind of high effective way that verification block is traded with the presence or absence of certain.It is recursively right that one complete Merkle tree of generation needs A pair of of node carries out Hash, and newly-generated Hash node is inserted into Merkle tree, should until only remaining a Hash node Node is exactly the root of Merkle tree;
When user wants to obtain the clear data of other users on block chain, it is necessary to could be obtained by authorization.It needs to illustrate , the index of each data entry includes that the user identifier in user identifier is not plaintext state, is needed to data entry Index can just obtain user identifier after being decrypted.
In order to resist the attack of Malware, private key can be stored on offline portable device.Such as it can will be private Key is printed upon on paper, be stored in USB equipment etc..At this time to the protection of private key just at a physical security the problem of, can Private key is protected using traditional mode, for example portable device is put into safety box.Offline storage also has drawback, it cannot be created It establishs diplomatic relations easily, signature will be generated by means of that can calculate equipment when private key signature and be published to network by using every time.Offline storage is applicable in In backup private key, in this case, off-line device needs to regularly update private to keep synchronous with other block chain wallets Key.
Dynamic node in block chain network can collect newly generated transaction in nearest a period of time network, and dynamic saves first Whether point can examine the transaction received legal, and the transaction will be added to confirmation transaction team by dynamic node after examining successfully It arranges medium to be confirmed.Transaction to be confirmed is combined into a block data by dynamic, is then proved by competing amount of calculation Problem can confirm that transaction whom to be determined, first solves the problems, such as that the node of proof of work is considered having paid enough calculation power Carry out trade confirmation.Then the node by the block of oneself to whole network broadcast, notify network in other nodes by oneself Block be added to behind original block chain.
On the basis of the symmetrical and non-title double-encryption algorithm in cryptography theory, it is only to incorporate Liao Duoyuan chain technical team Irreversible four re-encryption (Token+ public key+private key+dynamic failure re-examination is rebuild)+exclusive core algorithm of wound, transmit contract, Transaction, data are safer, allow and crack as history.The full point intercommunication communications protocol of Duo Yuan chain technical team original creation, permission DIY, Follow oneself can formulate under the premise of more former platform chain agreements the internal point-to- point communication of application, using straight line communication between packet, using A It is internal to be communicated with straight line inside application B, connected and interrogated by public chain bridge.With realize contract, token and operation flow diversity and Flexibility.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (7)

1. a kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild characterized by comprising
Block chain link point is encrypted using encryption function, encryption function is carried out using public key, is set as decrypting with private key Data information;
If the decrypted result carries the user identifier, it is determined that the data entry is corresponding with the user identifier The data information of user;
Identifying the decrypted result, whether it is sent by the node on block chain, if so, to tape is created between path node Part remaining sum, then trade initiator be sent to transaction acceptance side's transaction certificate supplement in parameter field;
File is requested access to according to client, cryptographic block is retrieved to rebuild supernumerary segment point part by a peer node, and retrieve At least some secrets are shared for rebuilding private key, and decrypt supernumerary segment point part with the private key rebuild;
Broadcast by promoter signature and each part by encryption is into block chain;
Sender carries out Encryption Algorithm processing using key pair message in plain text, sends after obtaining node, recipient receives section After point, using key identical with sender, and with the algorithm for inversion of the used Encryption Algorithm of sender, node is solved It is close, it obtains in plain text;
The All Activity that current block is packaged is recorded in a manner of Merkel tree, and the tree root of the field record transaction tree is breathed out Uncommon value, when each transaction, which enters, to be carried out block and be packaged, it is primary that field needs recalculate update, Merkel tree Root is all root node cryptographic Hash for being recorded transaction in the block.
2. the block chain encryption method that a kind of irreversible dynamic failure re-examination as described in claim 1 is rebuild, feature exist In:
It is described that block chain link point is encrypted using encryption function, encryption function is carried out using public key, is set as with private key Ciphertext data information, specifically includes:
Only sub- public key is independently generated with all each participant that shares of sub- private key, and participant oneself knows respective secret point It enjoys, so that meeting any attacker of encryption data under public key can not be appointed as long as the secret sharing that can not obtain master key The information what sub-key is shared;
Encryption function uses conic section digital encryption algorithm, indicates finite field using function (1) firstOn curve E;
(1)
Wherein,Enable setExpression meets the set of all the points (x, the y) composition of function (1), wherein;In addition,It also include a particular point O;When initialization, it is thus necessary to determine that the public variable of system; Select root node, the rank of G is n, and the major parameter of conic section digital encryption algorithm is, calculate Method is described in detail below:
Key schedule: random selection integer, calculate, then public key is Q, and private key is d;
Encryption Algorithm: input message m and private key d, random selection, calculate, x is converted into whole Number calculatesIf r=0, k is reselected, is calculated,For selected hash function, calculateIf s=0, k is reselected, exports encrypted result to (r, s);
Checking algorithm: input encrypted result is to (r, s), and message m, public key G, if following formula is set up, it is legal to export, and otherwise exports It is illegal.
3. the block chain encryption method that a kind of irreversible dynamic failure re-examination as described in claim 1 is rebuild, feature exist In:
If the decrypted result carries the user identifier, it is determined that the data entry is corresponding with the user identifier The data information of user, specifically includes:
The cryptographic Hash of public key is the unique open mark of account in a network as account address, raw by signing and issuing center secret key At center certificate is signed and issued, for signing and issuing user certificate, root certificate is important tool of the EPID format as operations such as trading signatures;
Using the certificate provided by monitor as input, and this certificate is checked according to domain certificate policy, the domain certificate plan
The slightly specified reconstruction list allowed for the special domain certificate;
If certificate is issued by the reconstruction in table within the rule, a response policy can be executed, which will The block chain currency of anomaly reconstruction is transferred to the monitor of impacted user and report violation.
4. the block chain encryption method that a kind of irreversible dynamic failure re-examination as described in claim 1 is rebuild, feature exist In:
Sender carries out Encryption Algorithm processing using key pair message in plain text, sends after obtaining node, recipient receives section After point, using key identical with sender, and with the algorithm for inversion of the used Encryption Algorithm of sender, node is solved It is close, it obtains in plain text, specifically including;
New node can random complete node request block chain into network complete information, when receiving block, new node meeting The correctness of block is successively verified according to the sequence on block chain;
If the block data of block chain slowly fails to synchronously complete, new node can bear with a period of time, more than a timing Between after threshold value, go to other nodes and obtain block chain data, when node is from after offline time is too long in block chain network, once again When online, it is also desirable to carry out the synchronous reconstruction of block chain;
If participant agrees to signature, Hash operation can be carried out to content and obtain the second cryptographic Hash, using participant's private key to the Two cryptographic Hash are encrypted to obtain participant's signature, and participant is signed broadcast into block chain;
Promoter can obtain participant's signature of each participant's broadcast from block chain, use the ginseng of each participant respectively Participant's signature corresponding with person's public key decryptions, if successful decryption, proves that the signature is the signature of corresponding participant, decrypts Failure then proves that the signature is not the signature for being participant.
5. the block chain encryption method that a kind of irreversible dynamic failure re-examination as described in claim 1 is rebuild, feature exist In:
The All Activity that the current block is packaged is recorded in a manner of Merkel tree, the tree of the field record transaction tree Root cryptographic Hash, when each transaction entrance, which carrys out block, to be packaged, field needs recalculate update once, Merkel The root of tree is all root node cryptographic Hash for being recorded transaction in the block, is specifically included:
Full node determines all blocks that may include the transaction according to the feature of transaction, at this moment can be stabbed according to exchange hour It determines that the block of neighbouring time, Quan Jiedian search for the Transaction Information from possible block, and generates this block and all trade Merkle tree, and calculate information Merkle certification path, and certification path is returned into SPV node, what is at this moment used is Merkle technology;
For user when carrying out communicating etc. the behavior that other need safety requirements on block chain, the data entry of user is encryption, Index and data key do not lose in the case where, each user have it is all oneself data complete plaintext state;
Merkle tree is used to conclude the All Activity in a block, while generating the digital finger-print of entire Transaction Set, and Provide a kind of high effective way that verification block is traded with the presence or absence of certain.
6. generating a complete Merkle tree to need recursively to a pair of of node progress Hash, and by newly-generated Hash node It is inserted into Merkle tree, until only remaining a Hash node, which is exactly the root of Merkle tree;
When user wants to obtain the clear data of other users on block chain, it is necessary to could be obtained by authorization.
7. being needed it should be noted that the index of each data entry is not plaintext state including the user identifier in user identifier User identifier can be just obtained after the index of data entry being decrypted.
CN201910372173.9A 2019-05-06 2019-05-06 A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild Pending CN110149322A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910372173.9A CN110149322A (en) 2019-05-06 2019-05-06 A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910372173.9A CN110149322A (en) 2019-05-06 2019-05-06 A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild

Publications (1)

Publication Number Publication Date
CN110149322A true CN110149322A (en) 2019-08-20

Family

ID=67594801

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910372173.9A Pending CN110149322A (en) 2019-05-06 2019-05-06 A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild

Country Status (1)

Country Link
CN (1) CN110149322A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110912707A (en) * 2019-11-22 2020-03-24 腾讯科技(深圳)有限公司 Block chain-based digital certificate processing method, device, equipment and storage medium
CN111199371A (en) * 2019-12-27 2020-05-26 航天信息股份有限公司 Grain circulation tracing release verification method and system based on block chain
CN111343187A (en) * 2020-03-04 2020-06-26 开采夫(杭州)科技有限公司 Block chain data encryption method using space-time information as function model
CN111614658A (en) * 2020-05-19 2020-09-01 深圳杰微芯片科技有限公司 Calculation force contract generation method based on block chain network, electronic device and medium
CN111866066A (en) * 2020-06-04 2020-10-30 江苏理工学院 Vehicle networking consensus algorithm based on DPoS
CN112333187A (en) * 2020-11-04 2021-02-05 齐鲁工业大学 Intelligent edge calculation method and intelligent edge system based on block chain
CN112333173A (en) * 2020-03-11 2021-02-05 合肥达朴汇联科技有限公司 Data transmission method, system, equipment and storage medium based on data provider
CN112507352A (en) * 2020-11-30 2021-03-16 中国联合网络通信集团有限公司 Data sharing method and system based on block chain
CN112907247A (en) * 2021-03-18 2021-06-04 上海能链众合科技有限公司 Block chain authorization calculation control method
CN113034139A (en) * 2021-03-15 2021-06-25 中国人民大学 Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof
CN113258593A (en) * 2021-06-18 2021-08-13 广东新电电力科技有限公司 Three-phase imbalance online treatment platform and method
CN113570369A (en) * 2021-07-29 2021-10-29 成都质数斯达克科技有限公司 Block chain privacy transaction method, device, equipment and readable storage medium
CN114025346A (en) * 2021-10-12 2022-02-08 杭州趣链科技有限公司 Safe and effective data transmission method for data between mobile self-set networks
CN114334110A (en) * 2021-12-28 2022-04-12 中国联合网络通信集团有限公司 Reservation method, block chain system, electronic device and computer readable medium
CN114586315A (en) * 2019-08-29 2022-06-03 美国运通旅游有关服务公司 Decentralized data authentication
CN114866595A (en) * 2022-04-02 2022-08-05 深圳力维智联技术有限公司 Connection method, end station data acquisition unit and management platform
CN114978730A (en) * 2022-05-27 2022-08-30 深圳铸泰科技有限公司 Security detection method and storage medium for Internet of things at perception situation
CN115150103A (en) * 2022-08-29 2022-10-04 人民法院信息技术服务中心 Block chain-based digital certificate offline verification method, device and equipment
CN115459921A (en) * 2022-08-25 2022-12-09 浪潮云信息技术股份公司 Cross-chain method and system based on proxy re-encryption and directed acyclic graph

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114586315A (en) * 2019-08-29 2022-06-03 美国运通旅游有关服务公司 Decentralized data authentication
CN110912707A (en) * 2019-11-22 2020-03-24 腾讯科技(深圳)有限公司 Block chain-based digital certificate processing method, device, equipment and storage medium
CN111199371A (en) * 2019-12-27 2020-05-26 航天信息股份有限公司 Grain circulation tracing release verification method and system based on block chain
CN111199371B (en) * 2019-12-27 2024-02-20 航天信息股份有限公司 Grain circulation tracing release verification method and system based on blockchain
CN111343187A (en) * 2020-03-04 2020-06-26 开采夫(杭州)科技有限公司 Block chain data encryption method using space-time information as function model
CN111343187B (en) * 2020-03-04 2022-04-05 开采夫(杭州)科技有限公司 Block chain data encryption method using space-time information as function model
CN112333173B (en) * 2020-03-11 2023-07-04 合肥达朴汇联科技有限公司 Data transmission method, system, equipment and storage medium based on data provider
CN112333173A (en) * 2020-03-11 2021-02-05 合肥达朴汇联科技有限公司 Data transmission method, system, equipment and storage medium based on data provider
CN111614658A (en) * 2020-05-19 2020-09-01 深圳杰微芯片科技有限公司 Calculation force contract generation method based on block chain network, electronic device and medium
CN111866066A (en) * 2020-06-04 2020-10-30 江苏理工学院 Vehicle networking consensus algorithm based on DPoS
CN111866066B (en) * 2020-06-04 2023-11-07 江苏理工学院 Internet of vehicles consensus algorithm based on DPoS
CN112333187B (en) * 2020-11-04 2022-08-09 齐鲁工业大学 Intelligent edge calculation method and intelligent edge system based on block chain
CN112333187A (en) * 2020-11-04 2021-02-05 齐鲁工业大学 Intelligent edge calculation method and intelligent edge system based on block chain
CN112507352A (en) * 2020-11-30 2021-03-16 中国联合网络通信集团有限公司 Data sharing method and system based on block chain
CN112507352B (en) * 2020-11-30 2023-01-17 中国联合网络通信集团有限公司 Data sharing method and system based on block chain
CN113034139B (en) * 2021-03-15 2023-12-26 中国人民大学 Block chain multi-coin wallet based on living organism biological characteristic authentication and implementation method thereof
CN113034139A (en) * 2021-03-15 2021-06-25 中国人民大学 Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof
CN112907247B (en) * 2021-03-18 2024-01-26 上海零数众合信息科技有限公司 Block chain authorization calculation control method
CN112907247A (en) * 2021-03-18 2021-06-04 上海能链众合科技有限公司 Block chain authorization calculation control method
CN113258593B (en) * 2021-06-18 2023-04-18 广东新电电力科技有限公司 Three-phase imbalance online treatment platform and method
CN113258593A (en) * 2021-06-18 2021-08-13 广东新电电力科技有限公司 Three-phase imbalance online treatment platform and method
CN113570369A (en) * 2021-07-29 2021-10-29 成都质数斯达克科技有限公司 Block chain privacy transaction method, device, equipment and readable storage medium
CN113570369B (en) * 2021-07-29 2024-05-28 成都质数斯达克科技有限公司 Block chain privacy transaction method, device, equipment and readable storage medium
CN114025346B (en) * 2021-10-12 2024-03-29 杭州趣链科技有限公司 Data transmission method for data security and effectiveness between mobile self-setting networks
CN114025346A (en) * 2021-10-12 2022-02-08 杭州趣链科技有限公司 Safe and effective data transmission method for data between mobile self-set networks
CN114334110B (en) * 2021-12-28 2023-01-17 中国联合网络通信集团有限公司 Reservation method, block chain system, electronic device and computer readable medium
CN114334110A (en) * 2021-12-28 2022-04-12 中国联合网络通信集团有限公司 Reservation method, block chain system, electronic device and computer readable medium
CN114866595B (en) * 2022-04-02 2024-02-27 深圳力维智联技术有限公司 Connection method, terminal station data collector and management platform
CN114866595A (en) * 2022-04-02 2022-08-05 深圳力维智联技术有限公司 Connection method, end station data acquisition unit and management platform
CN114978730B (en) * 2022-05-27 2023-09-15 深圳铸泰科技有限公司 Security detection method and storage medium for Internet of things at perceived situation
CN114978730A (en) * 2022-05-27 2022-08-30 深圳铸泰科技有限公司 Security detection method and storage medium for Internet of things at perception situation
CN115459921B (en) * 2022-08-25 2024-04-30 浪潮云信息技术股份公司 Agent re-encryption and directed acyclic graph-based cross-chain method and system
CN115459921A (en) * 2022-08-25 2022-12-09 浪潮云信息技术股份公司 Cross-chain method and system based on proxy re-encryption and directed acyclic graph
CN115150103B (en) * 2022-08-29 2022-11-29 人民法院信息技术服务中心 Block chain-based digital certificate offline verification method, device and equipment
CN115150103A (en) * 2022-08-29 2022-10-04 人民法院信息技术服务中心 Block chain-based digital certificate offline verification method, device and equipment

Similar Documents

Publication Publication Date Title
CN110149322A (en) A kind of block chain encryption method that irreversible dynamic failure re-examination is rebuild
US11936774B2 (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
Cecchetti et al. Solidus: Confidential distributed ledger transactions via PVORM
CN108418680B (en) Block chain key recovery method and medium based on secure multi-party computing technology
CN108885741B (en) Tokenization method and system for realizing exchange on block chain
CN106534092B (en) The privacy data encryption method of key is depended on based on message
CN110084068A (en) Block catenary system and data processing method for block catenary system
US9704159B2 (en) Purchase transaction system with encrypted transaction information
CN108352015A (en) The anti-loss storage of Secure for the system combination wallet management system based on block chain and encryption key transfer
CN109074434A (en) Method and system for verifying ownership of digital assets using distributed hash tables and point-to-point distributed ledgers
CN109829326A (en) Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain
CN108737374A (en) The method for secret protection that data store in a kind of block chain
CN110599163B (en) Transaction record outsourcing method facing block chain transaction supervision
CN103248476B (en) The management method of data encryption key, system and terminal
CN110034917A (en) A kind of alliance's chain data processing method and device based on homomorphic encryption algorithm
CN111106930B (en) Block chain network construction method and device and block chain network system
KR102383099B1 (en) The non-face-to-face large document access blockchain system that combines blockchain-based DID service and IPFS-based data sharing technology and private key distributed storage technology
CN109522681A (en) Digital content really weighs method, apparatus and storage medium
Conley Encryption, hashing, ppk, and blockchain: A simple introduction
CN110519040B (en) Anti-quantum computation digital signature method and system based on identity
Sisodiya et al. A comprehensive study of Blockchain and its various Applications
Anil et al. Achieving effective secrecy based on blockchain and data sharing in cloud computing
CN117648706B (en) Access control method based on block chain and attribute encryption
Take et al. E-certificate generation using blockchain for p2p network: An overview
Alharbi et al. A Blockchain Review: A Comparative Study Between Public Key Infrastructure and Identity Based Encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20191225

Address after: 350000 Yuanfu garden, no.196, middle lianjiang Road, Jin'an District, Fuzhou City, Fujian Province

Applicant after: Li Baoci

Applicant after: Shandong Gongchain Information Technology Co., Ltd.

Address before: Room 301, 15 Yanzishan Road, Lixia District, Jinan City, Shandong Province, 250000

Applicant before: Shandong Gongchain Information Technology Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190820