CN110381066B - Resource data transmission method for enhancing privacy in block chain - Google Patents

Resource data transmission method for enhancing privacy in block chain Download PDF

Info

Publication number
CN110381066B
CN110381066B CN201910667324.3A CN201910667324A CN110381066B CN 110381066 B CN110381066 B CN 110381066B CN 201910667324 A CN201910667324 A CN 201910667324A CN 110381066 B CN110381066 B CN 110381066B
Authority
CN
China
Prior art keywords
node
output address
resource data
nodes
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910667324.3A
Other languages
Chinese (zh)
Other versions
CN110381066A (en
Inventor
欧毓毅
聂敏航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201910667324.3A priority Critical patent/CN110381066B/en
Publication of CN110381066A publication Critical patent/CN110381066A/en
Application granted granted Critical
Publication of CN110381066B publication Critical patent/CN110381066B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The application discloses a resource data transmission method for enhancing privacy in a block chain, a block chain node and a computer readable storage medium, wherein the resource data transmission method is applied to the block chain node and comprises the following steps: determining a node set, wherein the node set comprises N nodes with the same resource data; n is a natural number; randomly sending the output address of the local resource data to M other nodes; m is a natural number less than N; randomly sending the received output address to M other nodes; sending all the output addresses received in history to preset management nodes in a node set; after the preset management node randomly sends each received output address to each corresponding node, the local resource data are sent to the corresponding output address sent by the preset management node. According to the method and the device, the output address is randomly and mixedly sent among all the nodes of the node set, and privacy confidentiality and information security of resource data transmission are effectively improved after a plurality of times of mixedly sending.

Description

Resource data transmission method for enhancing privacy in block chain
Technical Field
The present application relates to the field of communications technologies, and in particular, to a resource data transmission method for enhancing privacy in a blockchain, a blockchain node, and a computer-readable storage medium.
Background
With the development of communication technology and network technology, information security issues are becoming more and more important. In practical applications, in many cases, it is necessary to ensure privacy confidentiality and security of information and resource data, and to prevent theft and illegal use by others. Therefore, a transmission method is proposed in the prior art, which utilizes data mixing among a plurality of nodes having the same transmission task, and achieves a certain security effect while completing the transmission task of each node: external people and devices can be prevented from exploring the resource data transfer chain of these nodes. However, in the prior art, the nodes are often mixed in sequence, and related security measures are not set, so that information leakage is easy to occur from the interior of the nodes, and the security needs to be improved.
In view of the above, it is an important need for those skilled in the art to provide a solution to the above technical problems.
Disclosure of Invention
The application aims to provide a resource data transmission method for enhancing privacy in a block chain, a block chain node and a computer readable storage medium, so that privacy confidentiality and information security in the resource data transmission process are effectively improved.
In order to solve the foregoing technical problem, in a first aspect, the present application discloses a resource data transmission method for enhancing privacy in a blockchain, which is applied to a blockchain node, and includes:
determining a node set, wherein the node set comprises N nodes with the same resource data; n is a natural number;
randomly sending the output address of the local resource data to M other nodes; m is a natural number less than N;
randomly sending the received output address to M other nodes;
sending all the output addresses received in history to preset management nodes in the node set;
and after the preset management node randomly sends each received output address to each corresponding node, sending local resource data to the corresponding output address sent by the preset management node.
Optionally, the randomly sending the output address of the local resource data to M other nodes includes:
and based on the public key of the preset management node, encrypting the output address of the local resource data and then randomly sending the encrypted output address to M other nodes in a ciphertext mode.
Optionally, the sending all the output addresses received in the history to the preset management node in the node set includes:
and after the output addresses received by the K wheel are forwarded, all the output addresses received by the K wheel are sent to the preset management node.
Optionally, after the sending the local resource data to the corresponding output address sent by the preset management node, the method further includes:
and sending a transmission completion check message to other nodes.
Optionally, after the preset management node randomly sends each received output address to each corresponding node, sending local resource data to the output address sent by the preset management node includes:
and after the preset management node constructs output address vectors of the received output addresses in a random sequence and sends the output address vectors to the nodes, local resource data are sent to the output addresses corresponding to the local node numbers in the output address vectors.
Optionally, the sending the local resource data to the output address corresponding to the local node number in the output address vector includes:
judging whether an output address of local resource data appears in the output address vector or not;
if yes, starting a step of sending local resource data to an output address corresponding to the local node number in the output address vector.
Optionally, the preset management node constructs output address vectors from the received output addresses in a random order and sends the output address vectors to the nodes, including:
and the preset management node constructs output address vectors according to the received output addresses in a random sequence, and the output address vectors are signed and then are sent to the nodes.
Optionally, the sending the local resource data to the corresponding output address sent by the preset management node includes:
verifying the signature abstract value of the preset management node;
and if the verification is successful, starting a step of sending the local resource data to the corresponding output address sent by the preset management node.
In a second aspect, the present application also discloses a block link point comprising:
a determining module, configured to determine a node set, where the node set includes N nodes having the same resource data; n is a natural number;
the transmission module is used for randomly sending the output address of the local resource data to M other nodes; m is a natural number less than N; randomly sending the received output address to M other nodes; sending all the output addresses received in history to preset management nodes in the node set;
and the output module is used for sending the local resource data to the corresponding output address sent by the preset management node after the preset management node randomly sends each received output address to each corresponding node.
In a third aspect, the present application also discloses a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, is configured to implement the steps of the resource data transmission method for enhancing privacy in any of the blockchains as described above.
The resource data transmission method for enhancing privacy in the block chain, provided by the application, is applied to the block chain node, and comprises the following steps: determining a node set, wherein the node set comprises N nodes with the same resource data; n is a natural number; randomly sending the output address of the local resource data to M other nodes; m is a natural number less than N; randomly sending the received output address to M other nodes; sending all the output addresses received in history to preset management nodes in the node set; and after the preset management node randomly sends each received output address to each corresponding node, sending local resource data to the corresponding output address sent by the preset management node.
Therefore, the output addresses are randomly and mixedly sent among all the nodes in the node set, and after a plurality of times of mixing, all the nodes transmit the resource data to the corresponding output addresses for other nodes randomly. The method and the device not only ensure the privacy of the information outside the node set, but also effectively avoid the transmission information from being predicted and revealed by other nodes in the node set through multiple times of irregular random forwarding, thereby effectively improving the privacy and information security of resource data transmission. The block chain node and the computer readable storage medium provided by the application also have the beneficial effects.
Drawings
In order to more clearly illustrate the technical solutions in the prior art and the embodiments of the present application, the drawings that are needed to be used in the description of the prior art and the embodiments of the present application will be briefly described below. Of course, the following description of the drawings related to the embodiments of the present application is only a part of the embodiments of the present application, and it will be obvious to those skilled in the art that other drawings can be obtained from the provided drawings without any creative effort, and the obtained other drawings also belong to the protection scope of the present application.
Fig. 1 is a flowchart of a method for transmitting resource data with enhanced privacy in a blockchain according to an embodiment of the present disclosure;
fig. 2 is a flowchart of another method for transmitting resource data with enhanced privacy in a blockchain according to an embodiment of the present disclosure;
fig. 3 is a block diagram of a block link point according to an embodiment of the present disclosure.
Detailed Description
The core of the application is to provide a resource data transmission method, a node and a computer readable storage medium for enhancing privacy in a block chain, so as to effectively improve privacy confidentiality and information security in the resource data transmission process.
In order to more clearly and completely describe the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
At present, in order to ensure privacy confidentiality and security of user information and resource data in a block chain and prevent stealing and illegal utilization by others, a resource data transmission method is provided in the prior art, and by utilizing data mixing among a plurality of nodes with the same transmission task, certain confidentiality effect is achieved while the transmission task of each node is completed: external people and devices can be prevented from exploring the resource data transfer chain of these nodes. However, in the prior art, the nodes are often mixed in sequence, and related security measures are not set, so that information leakage is easy to occur from the interior of the nodes, and the security needs to be improved. In view of the above, the present application provides a method for transmitting resource data in a blockchain to enhance privacy, which can effectively solve the above problem.
Referring to fig. 1, an embodiment of the present application discloses a resource data transmission method for enhancing privacy in a blockchain, which is applied to a blockchain node, and mainly includes:
s11: a node set is determined, the node set comprising N nodes having the same resource data.
Wherein, N is a natural number and can be set according to the practical application condition. It is easily understood that, in theory, the larger N, the higher the security of the transmitted information.
Specifically, a node has a copy of locally stored resource data and corresponds to an output address, which is an address to which the node needs to send the resource data.
It will be readily appreciated that the nodes may transmit information to each other in a broadcast fashion to establish membership of each other in the node set, and that the nodes may determine the node numbers in the node set. As a specific embodiment, the node numbers may be determined according to a dictionary order of the addresses of the nodes.
S12: and randomly sending the output address of the local resource data to M other nodes.
Wherein M is a natural number less than N.
It should be noted that, in the resource data transmission method provided in the embodiment of the present application, when each node mixedly sends its own output address, it is specifically sent randomly. The number M of the transmission objects can be selected and set by those skilled in the art. As a specific embodiment, M may be taken to be 3.
As a specific implementation manner, in order to further improve the security of information transmission, encrypted transmission may be performed, and step S12 may specifically include:
and based on the public key of the preset management node, encrypting the output address of the local resource data and then randomly sending the encrypted output address to M other nodes in a ciphertext mode.
S13: and randomly sending the received output address to M other nodes.
When the node receives the output addresses sent by other nodes, the node can randomly forward the received output addresses to the M other nodes. It should be noted that, each time transmission is performed, all the M other nodes are randomly selected, that is, the M other nodes randomly forwarded in step S13 are not necessarily M other nodes in step S12.
It should be noted that, in order to further increase the complexity of the mixing process to improve the privacy and security of the transmitted information, step S13 may perform multiple rounds, for example, K rounds, and each node randomly forwards the output address after receiving one round, and thus, the K rounds are repeatedly completed.
S14: and sending all the output addresses received in the history to preset management nodes in the node set.
The preset management node is a preset node in the node set. Specifically, the selection of each node in the node set or the random determination may be performed.
It is easily understood that, as described above, the output addresses transmitted or forwarded in steps S12 and S13 may be encrypted based on the public key of the preset management node, and thus, when the preset management node receives the output addresses transmitted by each of the other nodes, the output addresses that are not repeated may be decrypted.
In a specific embodiment, step S14 may specifically include:
and after the output addresses received by the K wheel are forwarded, all the output addresses received by the K wheel are sent to the preset management node.
S15: after the preset management node randomly sends each received output address to each corresponding node, the local resource data are sent to the corresponding output address sent by the preset management node.
It is easy to understand that there are a large number of duplicate addresses in the output address received by the predetermined management node, so that the predetermined management node can perform merging processing on the duplicate addresses therein. Therefore, after multiple times of mixing, the output address received by the preset management node completely breaks up the association with the original corresponding node, and even the nodes in the node set cannot guess and predict the corresponding relation between each output address and the node.
The preset management node randomly distributes and sends each combined output address to each node, and each node receiving the output address from the preset management node can send local resource data to the output address.
As a preferred embodiment, the preset management node may construct an output address vector from the received output addresses in a random order, and send the output address vector to each node after signing. Furthermore, each node of the output address vector after receiving the signature can verify the signature abstract value of the preset management node; and if the verification is successful, starting a step of sending the local resource data to the corresponding output address sent by the preset management node. Each node can verify the signature abstract value by comparing whether the signature abstract values received by the two nodes are consistent or not.
The resource data transmission method provided by the embodiment of the application is applied to a block chain node, and comprises the following steps: determining a node set, wherein the node set comprises N nodes with the same resource data; n is a natural number; randomly sending the output address of the local resource data to M other nodes; m is a natural number less than N; randomly sending the received output address to M other nodes; sending all the output addresses received in history to preset management nodes in a node set; after the preset management node randomly sends each received output address to each corresponding node, the local resource data are sent to the corresponding output address sent by the preset management node.
Therefore, the output addresses are randomly and mixedly sent among all the nodes in the node set, and after a plurality of times of mixing, all the nodes transmit the resource data to the corresponding output addresses for other nodes randomly. The method and the device not only ensure the privacy of the information outside the node set, but also effectively avoid the transmission information from being predicted and revealed by other nodes in the node set through multiple times of irregular random forwarding, thereby effectively improving the privacy and information security of resource data transmission.
Referring to fig. 2, an embodiment of the present application discloses another resource data transmission method for enhancing privacy in a blockchain, which is applied to a blockchain node, and mainly includes:
s21: a node set is determined, the node set comprising N nodes having the same resource data.
S22: and randomly sending the output address of the local resource data to M other nodes.
S23: and randomly sending the received output address to M other nodes.
S24: and after the output addresses received by the K wheel are forwarded, all the output addresses received by the K wheel are sent to the preset management node.
S25: and receiving an output address vector which is sent by a preset management node and is constructed in a random sequence according to the received output addresses.
It should be noted that, in this embodiment, after receiving the output addresses historically received by each node, the preset management node performs merging processing, and then establishes the output address vectors in a random order. Once the output address vector is determined, the order of the individual output addresses in the output address vector is determined.
As a specific embodiment, in order to further improve the information transmission security, when the preset management node constructs output address vectors from the received output addresses in a random order and sends the output address vectors to the nodes, the preset management node may specifically construct output address vectors from the received output addresses in the random order, and then send the output address vectors to the nodes after signing.
S26: judging whether the output address of the local resource data appears in the output address vector or not; if yes, the process proceeds to S27.
In order to further improve the security and reliability, in this embodiment, the processing result of the preset management node is also checked. Each node respectively judges whether the initial output address of the node is in the output address vector, and if not, the node can judge that an error occurs.
S27: and sending the local resource data to the output address corresponding to the local node number in the output address vector.
For example, if N is 100, the output address vector is a 100-dimensional vector. After each node receives the output address vector, for node 3, the 3 rd output address in the output address vector can be used as the target address of the node, and the local resource data is sent to the target address.
Furthermore, if the content sent by the preset management node further includes a signature digest value generated after signing, before the step S27 is executed by each node, the signature digest value of the preset management node may be checked first; if the verification is successful, step S27 is executed again.
S28: and sending a transmission completion check message to other nodes.
Further, in order to ensure that each node performs resource data transmission according to the output address vector, transmission behavior verification is performed in this embodiment. Specifically, each node needs to provide a transmission completion check message which is acquired after transmission is completed, so that it is determined that the node has actually completed transmission of the resource data according to the transmission completion check message.
Referring to fig. 3, an embodiment of the present application discloses a block link point, which mainly includes:
a determining module 301, configured to determine a node set, where the node set includes N nodes having the same resource data; n is a natural number;
a transmission module 302, configured to randomly send an output address of the local resource data to M other nodes; m is a natural number less than N; randomly sending the received output address to M other nodes; sending all the output addresses received in history to preset management nodes in a node set;
the output module 303 is configured to send the local resource data to the corresponding output address sent by the preset management node after the preset management node randomly sends each received output address to the corresponding node.
For the specific content of the above block chain node, reference may be made to the foregoing detailed description of the resource data transmission method, which is not repeated herein.
It can be seen that, in the block link point disclosed in the embodiment of the present application, the output address is randomly mixed and sent among the nodes in the node set, and after several times of mixed sending, the nodes transmit the resource data to the corresponding output address for other nodes at random. The method and the device not only ensure the privacy of the information outside the node set, but also effectively avoid the transmission information from being predicted and revealed by other nodes in the node set through multiple times of irregular random forwarding, thereby effectively improving the privacy and information security of resource data transmission.
Based on the above, further, in an embodiment of the block link point disclosed in the embodiment of the present application, the transmission module 302 is specifically configured to:
and after the output addresses received by the K wheel are forwarded, all the output addresses received by the K wheel are sent to the preset management node.
Based on the above, further, in an embodiment of the block link point disclosed in the embodiment of the present application, the output module 303 is specifically configured to:
and after the preset management node constructs output address vectors according to the received output addresses in a random sequence and sends the output address vectors to the nodes, the local resource data are sent to the output addresses corresponding to the local node numbers in the output address vectors.
Based on the above, further, in an embodiment of the block link point disclosed in the embodiment of the present application, the output module 303 is specifically configured to:
judging whether the output address of the local resource data appears in the output address vector or not; and if so, sending the local resource data to an output address corresponding to the local node number in the output address vector.
On the basis of the above, further, in a specific implementation manner of the block chain node disclosed in the embodiment of the present application, the output module 303 is specifically configured to:
constructing output address vectors by using the received output addresses in a random sequence at the preset management node, signing the output address vectors, sending the signed output address vectors to each node, and verifying the signature abstract value of the preset management node; and if the verification is successful, sending the local resource data to the corresponding output address sent by the preset management node.
On the basis of the above, further, in a specific implementation manner of the block chain node disclosed in the embodiment of the present application, the output module 303 is further configured to: and after sending the local resource data to the output address sent by the preset management node, sending a transmission completion check message to other nodes.
Further, the present application also discloses a computer-readable storage medium, in which a computer program is stored, and the computer program is used for implementing the steps of any one of the resource data transmission methods described above when being executed by a processor.
For the details of the computer-readable storage medium, reference may be made to the foregoing detailed description of the resource data transmission method, and details will not be repeated here.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the equipment disclosed by the embodiment, the description is relatively simple because the equipment corresponds to the method disclosed by the embodiment, and the relevant parts can be referred to the method part for description.
It is further noted that, throughout this document, relational terms such as "first" and "second" are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Furthermore, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The technical solutions provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, without departing from the principle of the present application, several improvements and modifications can be made to the present application, and these improvements and modifications also fall into the protection scope of the present application.

Claims (10)

1. A resource data transmission method for enhancing privacy in a block chain is applied to a block chain node and comprises the following steps:
determining a node set, wherein the node set comprises N nodes with the same resource data; n is a natural number;
sending the output address of the local resource data to M other nodes selected randomly; m is a natural number less than N;
sending the received output address to the M other nodes randomly selected again;
sending all the output addresses received in history to preset management nodes in the node set;
and after the preset management node randomly sends each received output address to each corresponding node, sending local resource data to the corresponding output address sent by the preset management node.
2. The method according to claim 1, wherein the sending the output address of the local resource data to M other nodes randomly selected comprises:
and based on the public key of the preset management node, encrypting the output address of the local resource data and then sending the encrypted output address to M other nodes selected randomly in a ciphertext mode.
3. The method according to claim 1, wherein the sending the output addresses received in the history to preset management nodes in the node set comprises:
and after the output addresses received by the K wheel are forwarded, all the output addresses received by the K wheel are sent to the preset management node.
4. The method according to claim 1, wherein after the sending the local resource data to the corresponding output address sent by the preset management node, the method further comprises:
and sending a transmission completion check message to other nodes except the current node in the node set.
5. The method according to any one of claims 1 to 4, wherein the sending the local resource data to the corresponding output address sent by the preset management node after the preset management node randomly sends each received output address to the corresponding node comprises:
and after the preset management node constructs output address vectors of the received output addresses in a random sequence and sends the output address vectors to the nodes, local resource data are sent to the output addresses corresponding to the local node numbers in the output address vectors.
6. The method according to claim 5, wherein the sending the local resource data to the output address corresponding to the local node number in the output address vector comprises:
judging whether an output address of local resource data appears in the output address vector or not;
if yes, starting a step of sending local resource data to an output address corresponding to the local node number in the output address vector.
7. The resource data transmission method according to claim 5, wherein the preset management node constructs output address vectors from the received output addresses in a random order and sends the output address vectors to the nodes, and the method comprises:
and the preset management node constructs output address vectors according to the received output addresses in a random sequence, and the output address vectors are signed and then are sent to the nodes.
8. The method for transmitting resource data according to claim 7, wherein the sending the local resource data to the output address sent by the preset management node includes:
verifying the signature abstract value of the preset management node;
and if the verification is successful, starting a step of sending the local resource data to the corresponding output address sent by the preset management node.
9. A block link point, comprising:
a determining module, configured to determine a node set, where the node set includes N nodes having the same resource data; n is a natural number;
the transmission module is used for sending the output address of the local resource data to M other nodes selected randomly; m is a natural number less than N; sending the received output address to the M other nodes randomly selected again; sending all the output addresses received in history to preset management nodes in the node set;
and the output module is used for sending the local resource data to the corresponding output address sent by the preset management node after the preset management node randomly sends each received output address to each corresponding node.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the resource data transmission method according to any one of claims 1 to 8.
CN201910667324.3A 2019-07-23 2019-07-23 Resource data transmission method for enhancing privacy in block chain Active CN110381066B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910667324.3A CN110381066B (en) 2019-07-23 2019-07-23 Resource data transmission method for enhancing privacy in block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910667324.3A CN110381066B (en) 2019-07-23 2019-07-23 Resource data transmission method for enhancing privacy in block chain

Publications (2)

Publication Number Publication Date
CN110381066A CN110381066A (en) 2019-10-25
CN110381066B true CN110381066B (en) 2021-07-06

Family

ID=68255146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910667324.3A Active CN110381066B (en) 2019-07-23 2019-07-23 Resource data transmission method for enhancing privacy in block chain

Country Status (1)

Country Link
CN (1) CN110381066B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106936833A (en) * 2017-03-15 2017-07-07 广东工业大学 A kind of content center network method for secret protection based on Hybrid Encryption and anonymous group
WO2017176093A1 (en) * 2016-04-07 2017-10-12 주식회사 라이프시맨틱스 System, method, and program for blockchain-based medical data transmission
CN109491591A (en) * 2018-09-17 2019-03-19 广东工业大学 A kind of information diffusion method suitable for cloudy storage system
CN109995781A (en) * 2019-03-29 2019-07-09 腾讯科技(深圳)有限公司 Transmission method, device, medium and the equipment of data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017176093A1 (en) * 2016-04-07 2017-10-12 주식회사 라이프시맨틱스 System, method, and program for blockchain-based medical data transmission
CN106936833A (en) * 2017-03-15 2017-07-07 广东工业大学 A kind of content center network method for secret protection based on Hybrid Encryption and anonymous group
CN109491591A (en) * 2018-09-17 2019-03-19 广东工业大学 A kind of information diffusion method suitable for cloudy storage system
CN109995781A (en) * 2019-03-29 2019-07-09 腾讯科技(深圳)有限公司 Transmission method, device, medium and the equipment of data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"区块链技术及其在信息安全领域的研究进展";刘敖迪等;《软件学报》;20180427;全文 *

Also Published As

Publication number Publication date
CN110381066A (en) 2019-10-25

Similar Documents

Publication Publication Date Title
US8122487B2 (en) Method and apparatus for checking proximity between devices using hash chain
US7698556B2 (en) Secure spontaneous associations between networkable devices
JP5877623B2 (en) Transmission terminal, reception terminal, and information distribution system
CN110011987B (en) System and method for binding mobile phone program and intelligent hardware
CN110311787B (en) Authorization management method, system, device and computer readable storage medium
US20200313879A1 (en) Apparatus and method for quantum direct communication using single qubits
US20200295917A1 (en) Data encryption and decryption
CN112989426B (en) Authorization authentication method and device, and resource access token acquisition method
KR20110031752A (en) Method and apparatus for detecting sybil attack node using localization information and hash chain in ubiquitous sensor networks
CN109729000B (en) Instant messaging method and device
CN111404664A (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
US10122755B2 (en) Method and apparatus for detecting that an attacker has sent one or more messages to a receiver node
CN114760056B (en) Secure communication method and device for dynamically updating key
JPH05347617A (en) Communication method for radio communication system
CN116488919B (en) Data processing method, communication node and storage medium
CN110868246B (en) Information transmission method and system
CN110381066B (en) Resource data transmission method for enhancing privacy in block chain
CN109302442B (en) Data storage proving method and related equipment
CN109547202A (en) The method, apparatus and system of quantum key recycling
Lestari et al. Digital signature method to overcome sniffing attacks on LoRaWAN network
CN113497827B (en) Information sharing method and equipment
CN112469035B (en) Safe activation and control method and communication system of remote equipment of Internet of things
CN115913521A (en) Method for identity authentication based on quantum key
CN105722080B (en) Bluetooth pairing method, master intelligent terminal and slave intelligent terminal
CN101425925A (en) Method, system and apparatus for providing authentication of data communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant