CN110971390A - Fully homomorphic encryption method for intelligent contract privacy protection - Google Patents

Fully homomorphic encryption method for intelligent contract privacy protection Download PDF

Info

Publication number
CN110971390A
CN110971390A CN201911200486.2A CN201911200486A CN110971390A CN 110971390 A CN110971390 A CN 110971390A CN 201911200486 A CN201911200486 A CN 201911200486A CN 110971390 A CN110971390 A CN 110971390A
Authority
CN
China
Prior art keywords
intelligent contract
private key
user
homomorphic encryption
fully homomorphic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911200486.2A
Other languages
Chinese (zh)
Inventor
黄步添
罗春凤
周伟华
刘振广
陈建海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunxiang Network Technology Co Ltd
Original Assignee
Hangzhou Yunxiang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yunxiang Network Technology Co Ltd filed Critical Hangzhou Yunxiang Network Technology Co Ltd
Priority to CN201911200486.2A priority Critical patent/CN110971390A/en
Publication of CN110971390A publication Critical patent/CN110971390A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention discloses a fully homomorphic encryption method for intelligent contract privacy protection, which comprises the following steps: (1) all users jointly make an intelligent contract to form an electronic commitment; (2) generating a public key and a private key, dividing the private key into n parts, and acquiring the public key and one private key of the n parts of private keys by a user through registration; (3) carrying out fully homomorphic encryption on the intelligent contract, carrying out digital signature on the fully homomorphic encrypted intelligent contract, and transmitting the signed intelligent contract into a block chain network; (4) the user operates on the intelligent contract which is encrypted in a fully homomorphic way, and respective privacy content is supplemented; (5) and the operated intelligent contract is diffused through the network and stored in each node of the block chain, and all users jointly manage and execute the intelligent contract. The invention reduces the calculation amount of the intelligent contract fully homomorphic algorithm by a secret key sharing method, thereby realizing the privacy protection of the intelligent contract.

Description

Fully homomorphic encryption method for intelligent contract privacy protection
Technical Field
The invention belongs to the technical field of block chain intelligent contract encryption, and particularly relates to a fully homomorphic encryption method for intelligent contract privacy protection.
Background
The cryptologist Szabo defined in 1995 that the smart contract was a computable transaction agreement that executed the terms of the contract, and since there was no suitable execution platform, the definition of the smart contract was proposed, and the smart contract technology was not appreciated. With the rise of bit currency and blockchain platforms, intelligent contracts are increasingly researched and applied due to the fact that the intelligent contracts can improve the efficiency of transaction or affair execution, for example, the intelligent contracts are applied to the fields of digital payment, financial asset handling, multiple signature contracts, cloud computing, internet of things, sharing economy and the like, with the increasing of the types of the intelligent contracts, the intelligent contract risk management and crisis handling scenes are not complete, and some intelligent contract execution relates to the privacy protection problem.
The four core concepts contained by an intelligent contract include: digital identity, digital assets and intellectual property, contract arbitration platform, digital asset hosting. The intelligent contract needs enhanced privacy protection problems seen from four major core concepts of the intelligent contract, firstly, digital identity means that a digital identity authentication service is constructed, once the identity authentication problems are involved, the privacy protection problems are involved, secondly, digital assets and intelligent properties comprise decentralized digital contract rights and assets and intelligent properties embedded with hardware reconstruction, the assets and the property problems relate to user information, and finally, various asset properties are kept by means of a block chain technology, the hosting problem belongs to a third party due to the fact that the hosting party involved belongs to the third party, and when the untrusted third party is involved, the privacy protection problems need to be considered, so that the user privacy information is prevented from being leaked out or being utilized maliciously. In fact, the users involved in the intelligent contracts of the blockchain are not completely anonymous, and the intelligent contracts and the individual accounts are all transmitted on the blockchain network through an address identifier, such as an ethernet public and private key address. However, when the user interacts with a real-world transaction, such as a digital money wallet agent, the address identifier of the user may become a network code (e.g., a network name of a forum), and although the specific identity of the user is still unknown, any data and behavior related to the user can be linked to the code, and with the development of an anti-anonymous identity screening technology, it is difficult to ensure the anonymity of the intelligent contract user. And the data on the block chain is public and transparent, a plurality of addresses can be mutually related through various data mining technologies, and once the real identity information is disclosed, all the information of the user is disclosed. Therefore, the privacy protection problem of the intelligent contract is extremely worthy of attention.
At present, Beijing university of science and technology proposes a method for protecting privacy of intelligent contracts by using a zero-knowledge proof method, matrix element technology limited company discloses a patent of the method for protecting privacy of intelligent contracts, and the technical scheme is as follows: privacy data in the block chain is encrypted homomorphically using the addition, and a non-interactive zero-knowledge proof is generated during the transaction to prove the validity of the transaction. In addition, the problem of privacy protection of intelligent contracts has not been greatly researched due to the lack of practically feasible fully homomorphic encryption technology.
It is recognized that homomorphic encryption means that any computation can be performed on ciphertext even without using a key, i.e., there is a property f (Enc (m)) Enc (f (m)) for any valid computation algorithm f and plaintext m. Gentry first constructed a fully homomorphic encryption scheme in 2009. Key technologies for the gradually developing fully homomorphic encryption construction include: homomorphic decryption, key exchange and modular exchange.
The block chain utilizes the intelligent contract to automatically execute various transactions and affairs, but because the intelligent contract code relates to a plurality of user privacy, the hidden danger of privacy disclosure exists, and the privacy protection requirements of some institutions, such as banks, copyright trading centers and other institutions, can not be met, and the protection problem of identity information and transaction contents of trading users is needed. The fully homomorphic encryption algorithm can be used for operating the intelligent contract under the condition of not knowing the content of the intelligent contract, so that the privacy of the intelligent contract is protected, but the fully homomorphic encryption method has huge calculation amount and seriously influences the execution efficiency of the intelligent contract.
Disclosure of Invention
Based on the background and the problems in the prior art, the invention proposes a fully homomorphic encryption method for intelligent contract privacy protection, which can carry out privacy protection on intelligent contracts. It is still another object of the present invention to improve the efficiency of homomorphic encryption and decryption of smart contracts by a method of sharing a secret key, so as to improve the efficiency of executing the smart contracts.
To achieve these objects and other advantages in accordance with the purpose of the invention, a fully homomorphic encryption method for privacy protection of intelligent contracts is provided, which comprises the following steps:
(1) all users jointly make an intelligent contract, the made intelligent contract is programmed after the contents related to the privacy part of each user are reserved, and an electronic commitment is made;
(2) generating a public key and a private key, dividing the private key into n parts, acquiring the public key and one private key of the n parts of private keys by registering on a block chain by a user, and acquiring the complete private key by the user in a shared computing mode when the complete private key is needed to decrypt an intelligent contract;
(3) the intelligent contract is subjected to homomorphic encryption, the part related to the privacy of each user is automatically supplemented by each user on the homomorphic encrypted intelligent contract, the homomorphic encrypted intelligent contract is subjected to digital signature, and the signed intelligent contract is transmitted into a block chain network;
(4) the user operates on the intelligent contract which carries out the homomorphic encryption algorithm, and supplements the respective private content (the content which is reserved in the step (1) and relates to the private part of each user), and the user can not learn the content of the intelligent contract which relates to the private information without decrypting the intelligent contract;
(5) the operated intelligent contract is diffused through the network and stored in each node of the block chain, and all participant nodes (all users U) manage and execute the intelligent contract together.
Preferably, the step (1) further includes that, for a certain event that needs to be executed together, the commonly-established intelligent contract of the present invention can be used in various types of blockchains, such as a public chain, a federation chain, or a private chain. In a alliance chain, an intelligent contract is also called a chain code and relates to interfaces and trigger settings for executing various transactions by each party; in public chains, such as an ethernet house, all nodes in the whole network are involved, so that the intelligent contract is made considering privacy protection issues, such as how to make it impossible for any party to search or investigate the address of any party involved in the intelligent contract by tracing the address, because once the address of a certain node is known, the node (user) can be searched.
The object of the present invention can be further achieved by the method of step (2) through sharing secret key, such that G1、G2Are two cyclic groups (including addition and multiplication) of order prime q, let e: g1⊙G1→G2Where e is the bilinear mapping algorithm, ⊙ denotes the multiplication or addition process, and G is G1Sig (m) represents the signature of the smart contract, H represents the Hash function and Hash operation. The method comprises the following steps:
1.1, dividing the private key S into n shares (the process of equally dividing the private key may generate repeated sub-shares, namely, the sub-shares of the private key included in n have repeated parts), wherein the number n is set according to the number of users, the complete private key can be formed only by the aggregation of at least t private keys, and then the intelligent contract m can be operated, and t represents the number of the complete private key which is not repeatedly divided into the sub-shares. Because the private key is divided into n parts, the memory space for storing each part of the private key is much smaller than the total private key;
1.2 user registration, choosing own private key siAcquiring a public key and storing the private key and the public key;
1.3 user computing user private key generating element for obtaining private key
Figure BDA0002295755930000041
And will be
Figure BDA0002295755930000042
Sharing to other users.
Preferably, in the step (3), r is setiRepresenting a user UiThe specific steps of homomorphic encryption of the intelligent contract are as follows:
2.1 obtaining the public key by the registration in the step (2), obtaining other private keys by a sharing mode, and calculating the private key
Figure BDA0002295755930000051
2.2, the intelligent contract is homomorphically encrypted into a ciphertext by using the public key and output;
2.3 the user uses S to operate the encrypted intelligent contract m';
and 2.4, the user outputs the intelligent contract ciphertext m 'after the operation is finished to perform consensus verification, and the consensus m' is written into the block chain account book.
Preferably, the step (3) of digitally signing the encrypted smart contract includes the following specific steps:
3.1 the user obtains the public key k and the private key siAnd homomorphic encrypted intelligent contracts m';
3.2 pairs of
Figure BDA0002295755930000052
M' is subjected to Hash operation to obtain
Figure BDA0002295755930000053
And H (m'), then digitally signed
Figure BDA0002295755930000054
And sig2(H(m’));
3.3 will
Figure BDA0002295755930000055
And sig2(H (m')) sent to the full network and written to the block chain ledger.
Further, in the steps (3) and (4), the homomorphic encryption algorithm of the intelligent contract specifically performs fully homomorphic encryption on the intelligent contract related to the privacy part, and according to the property of the fully homomorphic encryption, namely, the operation is performed on the encrypted intelligent contract ciphertext, which is equivalent to the operation on the intelligent contract plaintext, such an arrangement enables the intelligent contract to be operated even under the condition that the content of the whole intelligent contract is not known, so that the purpose of performing privacy protection on the intelligent contract is achieved.
Further, in the consensus process, the verification node encapsulates the Hash value of the intelligent contract into a block structure and rapidly diffuses the block structure to the whole network, each node receiving the intelligent contract performs validity verification that the private key signature is matched with the account on each intelligent contract by using a shared private key, and the intelligent contract is finally written into a block chain account book after the verification is passed.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention.
The invention at least comprises the following beneficial effects:
1. the privacy protection of the intelligent contract is carried out by using fully homomorphic encryption, so that the privacy information of the intelligent contract is not leaked back;
2. the private key is distributed and shared by using a secret key sharing method, so that the calculation amount of secret key exchange in a homomorphic encryption scheme is reduced, and the efficiency of a fully homomorphic algorithm is improved;
3. by combining the advantages of the block chain technology and the privacy protection measures of the invention, the privacy protection of the intelligent contracts is further realized.
Drawings
FIG. 1 is an overall flow chart of the present invention;
FIG. 2 is a schematic flow chart of the key sharing distribution based on the fully homomorphic encryption of the present invention;
fig. 3 is a mechanism for implementing fully homomorphic encryption of smart contracts according to the present invention.
Detailed Description
In order to clearly illustrate the present invention and make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, so that those skilled in the art can implement the technical solutions in reference to the description text. The technology of the present invention will be described in detail below with reference to the accompanying drawings in conjunction with specific embodiments.
1. Fig. 1 shows an implementation form of the present invention, and shows an overall flowchart of implementation of the present invention, and provides a fully homomorphic encryption method for intelligent contract privacy protection, which includes the following specific implementation steps:
(1) all users U together formulate an intelligent contract m, the formulated intelligent contract is programmed after the contents related to the privacy part of each user are reserved, and an electronic commitment is formulated;
(2) generating a public key and a private key, dividing the private key into n parts, and acquiring the public key K and one private key s of the n parts of private keys by a user through registration on a block chainiWhen the intelligent contract needs to be decrypted by the complete private key S, the user UiAcquiring a complete private key S in a shared calculation mode;
(3) encrypting the intelligent contract m by using a fully homomorphic encryption algorithm, wherein the part related to the privacy of each user is automatically supplemented by each user on the fully homomorphic encrypted intelligent contract, digitally signing the fully homomorphic encrypted intelligent contract m', and transmitting the signed intelligent contract into a block chain network;
(4) user UiThe method comprises the steps of operating on the intelligent contract which is encrypted in a fully homomorphic mode, supplementing respective private contents, and enabling a user to be incapable of obtaining the intelligent contract contents related to private information under the condition that the intelligent contract is not decrypted;
(5) the operated intelligent contract m 'is diffused through the network and stored in each node of the block chain, and all participant nodes (all users U) jointly manage and execute the intelligent contract m'.
2. Fig. 2 is a schematic flow chart of the key sharing distribution based on the homomorphic encryption of the present invention. The adoption of the scheme has the advantages of reducing the calculation amount of key exchange in the fully homomorphic encryption scheme and improving the efficiency of the fully homomorphic algorithm. And this is just one preferred exampleIt is clear, but not limited thereto. When the invention is implemented, the implementation mode modification according to the requirement of a user is within the protection scope of the invention. In the step (2), let G1、G2Are two cyclic groups (including addition and multiplication) of order prime q, let e: g1⊙G1→G2Where e denotes a bilinear mapping algorithm, ⊙ denotes a multiplication or addition process, and G is G1Sig (m) represents the signature of the smart contract, H represents the Hash function and Hash operation. The method comprises the following steps:
step 1: dividing the private key into n parts (the process of equally dividing the private key may generate repeated sub-shares, that is, the sub-shares of the private key included in n have repeated parts), wherein the number n is set according to the number of users, for example, z users exist, so that n is z or 0.5z is less than n and less than z, at least t private keys are aggregated to form a complete private key S, for example, 0.5n is less than t and less than n, the intelligent contract can be calculated, t represents the number of the complete private key which is divided into the sub-shares without being repeated, because the private key is divided into n parts, the memory space occupied by storing each private key is much smaller than the total private key;
step 2: user registration, selecting own private key siObtaining the public key K and saving K and si
And 3, step 3: user computing user private key generating element for obtaining private key
Figure BDA0002295755930000081
And will be
Figure BDA0002295755930000082
Sharing to other users;
and 4, step 4: obtaining other private keys in a sharing mode, and calculating the private key
Figure BDA0002295755930000083
3. One implementation manner of the steps (3) and (4) in the above scheme is shown in fig. 3, which is an implementation mechanism for fully homomorphic encryption of an intelligent contract according to the present invention, and the intelligent contract is represented by a symbol m. The protection by adopting the scheme can achieve the advantage of protecting the privacy of the intelligent contracts. The method comprises the following concrete implementation steps:
step 1: encrypting the intelligent contract into a ciphertext in a fully homomorphic way by using a public key K and outputting the ciphertext;
step 2: user UjAcquiring an intelligent contract m' after full homomorphic encryption;
and 3, step 3: to pair
Figure BDA0002295755930000084
M' is subjected to Hash operation to obtain
Figure BDA0002295755930000085
And H (m'), then digitally signed
Figure BDA0002295755930000086
And sig (H (m'));
and 4, step 4: will be provided with
Figure BDA0002295755930000087
And sig (H (m')) are sent to the whole network and written into a block chain book;
and 5, step 5: the U uses the S to operate the encrypted intelligent contract m';
and 6, step 6: u shapeiAnd outputting the intelligent contract ciphertext m ' after the operation is finished, and performing consensus verification to achieve consensus m ' and writing the consensus m ' into the block chain account book.
The specific embodiment is as follows:
for example, in a public chain ethernet community, the commonly agreed intelligent contract means that any node can be added into a block chain at any time, a series of transactions are executed by the intelligent contract, homomorphic encryption is to mask the content of the intelligent contract related to privacy, and the operation of the intelligent contract with the masked content (homomorphic encryption) is equivalent to the operation of the original intelligent contract; for the alliance chain, the commonly negotiated intelligent contracts are operated after encrypting the contents related to the privacy by adopting a homomorphic encryption method, so that the condition that other people except the user can not obtain the privacy information of the user is ensured.
In the process of consensusThe verification node packages the Hash value of the intelligent contract into a block structure and rapidly spreads the Hash value to the whole network, and each node receiving the intelligent contract adopts a shared private key siPrivate key signature sig (H(s) is made to each contracti) Verification of validity of the matching with the account, and finally writing the intelligent contract into the block chain account book after the verification is passed.
The number of modules and the processing scale described herein are intended to simplify the description of the invention. Applications, modifications and variations of the present invention employing fully homomorphic encryption and key sharing schemes will be apparent to those skilled in the art. As described above, according to the present invention, since the calculation amount of the fully homomorphic encryption is reduced by adopting the key sharing method, the fully homomorphic encryption can be applied to the privacy protection of the smart contract, and thus, the present invention has an effect of protecting the privacy of the smart contract.
The embodiments described above are presented to enable a person having ordinary skill in the art to make and use the invention. It will be readily apparent to those skilled in the art that various modifications to the above-described embodiments may be made, and the generic principles defined herein may be applied to other embodiments without the use of inventive faculty. Therefore, the present invention is not limited to the above embodiments, and those skilled in the art should make improvements and modifications to the present invention based on the disclosure of the present invention within the protection scope of the present invention.

Claims (7)

1. A fully homomorphic encryption method for intelligent contract privacy protection, comprising:
(1) all users jointly make an intelligent contract, and the intelligent contract is programmed after the contents related to the privacy part of each user are reserved, and an electronic commitment is made;
(2) generating a public key and a private key, dividing the private key into n parts, acquiring the public key and one private key of the n parts of private keys by registering on a block chain by a user, and acquiring the complete private key by the user in a shared computing mode when the complete private key is needed to decrypt an intelligent contract;
(3) the intelligent contract is subjected to homomorphic encryption, the part related to the privacy of each user is automatically supplemented by each user on the homomorphic encrypted intelligent contract, the homomorphic encrypted intelligent contract is subjected to digital signature, and the signed intelligent contract is transmitted into a block chain network;
(4) the user operates on the intelligent contract which is encrypted in the same state, and respective privacy contents are supplemented;
(5) and the operated intelligent contract is diffused through the network and stored in each node of the block chain, and all users jointly manage and execute the intelligent contract.
2. The fully homomorphic encryption method for intelligent contract privacy protection as claimed in claim 1, wherein the specific content in step (1) further comprises: and for the events needing to be executed together, jointly establishing an intelligent contract, wherein the jointly established intelligent contract can be used for a public chain, a alliance chain and a private chain.
3. The fully homomorphic encryption method for intelligent contract privacy protection as claimed in claim 1, wherein in step (2), G is set1、G2Are two cyclic groups of prime order q, there being e: g1⊙G1→G2E is bilinear mapping algorithm, ⊙ denotes multiplication or addition process, G is G1The generator of (1), sig (m) represents the signature of the intelligent contract, and H represents the hash function and the hash operation, and the specific implementation steps are as follows:
1.1, dividing the private key S into n parts, and only forming a complete private key by the aggregation of at least t private keys so as to operate an intelligent contract m;
1.2 user registration, choosing own private key siAcquiring a public key and storing the private key and the public key;
1.3 user computing user private key generating element for obtaining private key
Figure FDA0002295755920000021
And will be
Figure FDA0002295755920000022
Sharing to other users.
4. The fully homomorphic encryption method for intelligent contract privacy protection as claimed in claim 1, wherein in step (3), r is setiRepresenting a user UiThe specific steps of homomorphic encryption of the intelligent contract are as follows:
2.1 obtaining the public key by the registration in the step (2), obtaining other private keys by a sharing mode, and calculating the private key
Figure FDA0002295755920000023
2.2, the intelligent contract is homomorphically encrypted into a ciphertext by using the public key and output;
2.3 the user uses S to operate the homomorphic encrypted intelligent contract m';
and 2.4, the user outputs the intelligent contract ciphertext m 'after the operation is finished to perform consensus verification, and the consensus m' is written into the block chain account book.
5. The fully homomorphic encryption method for intelligent contract privacy protection as claimed in claim 1, wherein the step (3) of digitally signing the homomorphic encrypted intelligent contract comprises the following specific steps:
3.1 the user obtains the public key k and the private key siAnd homomorphic encrypted intelligent contracts m';
3.2 pairs of
Figure FDA0002295755920000024
M' is subjected to Hash operation to obtain
Figure FDA0002295755920000025
And H (m'), then digitally signed
Figure FDA0002295755920000026
And sig2(H(m’));
3.3 will
Figure FDA0002295755920000027
And sig2(H (m')) sent to the full network and written to the block chain ledger.
6. A fully homomorphic encryption method for intelligent contract privacy protection according to claim 1, 4 or 5, characterized in that in the steps (3) and (4), the homomorphic encryption algorithm of the intelligent contract particularly performs fully homomorphic encryption on the intelligent contract related to the privacy part.
7. The fully homomorphic encryption method for intelligent contract privacy protection as claimed in claim 1, wherein in the consensus process, the verification node encapsulates the hash value of the intelligent contract into a block structure and rapidly spreads the block structure to the whole network, each node receiving the intelligent contract uses the shared private key to perform validity verification of matching the private key signature and the account on each intelligent contract, and the intelligent contract is finally written into the block chain ledger after the verification is passed.
CN201911200486.2A 2019-11-29 2019-11-29 Fully homomorphic encryption method for intelligent contract privacy protection Pending CN110971390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911200486.2A CN110971390A (en) 2019-11-29 2019-11-29 Fully homomorphic encryption method for intelligent contract privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911200486.2A CN110971390A (en) 2019-11-29 2019-11-29 Fully homomorphic encryption method for intelligent contract privacy protection

Publications (1)

Publication Number Publication Date
CN110971390A true CN110971390A (en) 2020-04-07

Family

ID=70032181

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911200486.2A Pending CN110971390A (en) 2019-11-29 2019-11-29 Fully homomorphic encryption method for intelligent contract privacy protection

Country Status (1)

Country Link
CN (1) CN110971390A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111629057A (en) * 2020-05-27 2020-09-04 广西师范大学 Block chain based Internet of things access control method with privacy protection function
CN111681002A (en) * 2020-06-10 2020-09-18 浙江工商大学 Fair data transaction method and system based on block chain
CN111861336A (en) * 2020-07-23 2020-10-30 中国联合网络通信集团有限公司 Logistics monitoring method, device and system
CN112199649A (en) * 2020-09-28 2021-01-08 扬州大学 Anonymous identity verification method under moving edge calculation based on block chain
CN112540957A (en) * 2020-12-03 2021-03-23 齐鲁工业大学 File secure storage and sharing system based on mixed block chain and implementation method
CN112766965A (en) * 2021-01-25 2021-05-07 天津理工大学 Privacy protection data sharing method based on intelligent contract
CN113055172A (en) * 2021-03-31 2021-06-29 北京金山云网络技术有限公司 Key negotiation method, device, electronic equipment and storage medium
CN113051618A (en) * 2021-04-28 2021-06-29 电子科技大学 Intelligent contract privacy data processing system and method for block chain
CN113393238A (en) * 2021-06-16 2021-09-14 福建师范大学 Intelligent contract model for protecting privacy and implementation method thereof
CN113468570A (en) * 2021-07-15 2021-10-01 湖北央中巨石信息技术有限公司 Private data sharing method based on intelligent contract
CN113643134A (en) * 2021-08-24 2021-11-12 杭州云象网络技术有限公司 Internet of things block chain transaction method and system based on multi-key homomorphic encryption
CN113726767A (en) * 2021-08-27 2021-11-30 交通银行股份有限公司 Block chain based distributed multi-party privacy computing system and method
CN114363013A (en) * 2021-12-15 2022-04-15 武汉大学 Supervision-friendly block chain content privacy protection system, message sending method and query method
CN114363013B (en) * 2021-12-15 2024-04-26 武汉大学 Supervision-friendly blockchain content privacy protection system, message sending and query method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106559211A (en) * 2016-11-22 2017-04-05 中国电子科技集团公司第三十研究所 Secret protection intelligence contract method in a kind of block chain
CN106982205A (en) * 2017-03-01 2017-07-25 中钞信用卡产业发展有限公司北京智能卡技术研究院 Digital asset treating method and apparatus based on block chain
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data
US20170344988A1 (en) * 2016-05-24 2017-11-30 Ubs Ag System and method for facilitating blockchain-based validation
CN108809652A (en) * 2018-05-21 2018-11-13 安徽航天信息有限公司 A kind of block chain encryption account book based on privacy sharing
CN109495465A (en) * 2018-11-05 2019-03-19 河南师范大学 Privacy set intersection method based on intelligent contract
CN109615378A (en) * 2019-01-24 2019-04-12 上海点融信息科技有限责任公司 Multi-party computations method, apparatus and readable storage medium storing program for executing based on block chain
CN109685501A (en) * 2018-12-04 2019-04-26 暨南大学 Based on secret protection deep learning platform construction method auditable under block chain incentive mechanism
CN109840770A (en) * 2019-01-31 2019-06-04 北京瑞卓喜投科技发展有限公司 A kind of intelligence contract execution method and intelligent contract execute system
CN110138802A (en) * 2019-06-02 2019-08-16 四川虹微技术有限公司 User's characteristic information acquisition methods, device, block chain node and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170344988A1 (en) * 2016-05-24 2017-11-30 Ubs Ag System and method for facilitating blockchain-based validation
CN106559211A (en) * 2016-11-22 2017-04-05 中国电子科技集团公司第三十研究所 Secret protection intelligence contract method in a kind of block chain
CN106982205A (en) * 2017-03-01 2017-07-25 中钞信用卡产业发展有限公司北京智能卡技术研究院 Digital asset treating method and apparatus based on block chain
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data
CN108809652A (en) * 2018-05-21 2018-11-13 安徽航天信息有限公司 A kind of block chain encryption account book based on privacy sharing
CN109495465A (en) * 2018-11-05 2019-03-19 河南师范大学 Privacy set intersection method based on intelligent contract
CN109685501A (en) * 2018-12-04 2019-04-26 暨南大学 Based on secret protection deep learning platform construction method auditable under block chain incentive mechanism
CN109615378A (en) * 2019-01-24 2019-04-12 上海点融信息科技有限责任公司 Multi-party computations method, apparatus and readable storage medium storing program for executing based on block chain
CN109840770A (en) * 2019-01-31 2019-06-04 北京瑞卓喜投科技发展有限公司 A kind of intelligence contract execution method and intelligent contract execute system
CN110138802A (en) * 2019-06-02 2019-08-16 四川虹微技术有限公司 User's characteristic information acquisition methods, device, block chain node and storage medium

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111629057A (en) * 2020-05-27 2020-09-04 广西师范大学 Block chain based Internet of things access control method with privacy protection function
CN111681002A (en) * 2020-06-10 2020-09-18 浙江工商大学 Fair data transaction method and system based on block chain
CN111681002B (en) * 2020-06-10 2023-05-02 浙江工商大学 Fair data transaction method and system based on blockchain
CN111861336A (en) * 2020-07-23 2020-10-30 中国联合网络通信集团有限公司 Logistics monitoring method, device and system
CN111861336B (en) * 2020-07-23 2023-10-17 中国联合网络通信集团有限公司 Logistics monitoring method, device and system
CN112199649A (en) * 2020-09-28 2021-01-08 扬州大学 Anonymous identity verification method under moving edge calculation based on block chain
CN112199649B (en) * 2020-09-28 2021-06-18 扬州大学 Anonymous identity verification method under moving edge calculation based on block chain
CN112540957B (en) * 2020-12-03 2022-06-24 齐鲁工业大学 File secure storage and sharing system based on mixed block chain and implementation method
CN112540957A (en) * 2020-12-03 2021-03-23 齐鲁工业大学 File secure storage and sharing system based on mixed block chain and implementation method
CN112766965A (en) * 2021-01-25 2021-05-07 天津理工大学 Privacy protection data sharing method based on intelligent contract
CN113055172B (en) * 2021-03-31 2022-11-04 北京金山云网络技术有限公司 Key negotiation method, device, electronic equipment and storage medium
CN113055172A (en) * 2021-03-31 2021-06-29 北京金山云网络技术有限公司 Key negotiation method, device, electronic equipment and storage medium
CN113051618A (en) * 2021-04-28 2021-06-29 电子科技大学 Intelligent contract privacy data processing system and method for block chain
CN113393238A (en) * 2021-06-16 2021-09-14 福建师范大学 Intelligent contract model for protecting privacy and implementation method thereof
CN113468570A (en) * 2021-07-15 2021-10-01 湖北央中巨石信息技术有限公司 Private data sharing method based on intelligent contract
CN113643134A (en) * 2021-08-24 2021-11-12 杭州云象网络技术有限公司 Internet of things block chain transaction method and system based on multi-key homomorphic encryption
CN113643134B (en) * 2021-08-24 2023-08-25 杭州云象网络技术有限公司 Internet of things blockchain transaction method and system based on multi-key homomorphic encryption
CN113726767A (en) * 2021-08-27 2021-11-30 交通银行股份有限公司 Block chain based distributed multi-party privacy computing system and method
CN113726767B (en) * 2021-08-27 2023-09-12 交通银行股份有限公司 Distributed multi-party privacy computing system and method based on blockchain
CN114363013A (en) * 2021-12-15 2022-04-15 武汉大学 Supervision-friendly block chain content privacy protection system, message sending method and query method
CN114363013B (en) * 2021-12-15 2024-04-26 武汉大学 Supervision-friendly blockchain content privacy protection system, message sending and query method

Similar Documents

Publication Publication Date Title
CN110971390A (en) Fully homomorphic encryption method for intelligent contract privacy protection
JP7292365B2 (en) Cryptographic methods and systems for secure extraction of data from blockchains
Ma et al. An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain
Zhao et al. Machine learning based privacy-preserving fair data trading in big data market
CN111008836B (en) Privacy security transfer payment method, device, system and storage medium
CN104685826B (en) Method and system for the input consistency desired result of both sides' secure function evaluation
CN108989047A (en) A kind of communicating pair collaboration endorsement method and system based on SM2 algorithm
CN106961336A (en) A kind of key components trustship method and system based on SM2 algorithms
CN107483198A (en) A kind of block catenary system supervised and method
CN114143080A (en) Block chain data privacy protection and sharing method based on zero knowledge proof
CN111064734B (en) Block chain system user identity anonymity and traceable method, corresponding storage medium and electronic device
Williamson The aztec protocol
Yuan et al. Blockchain with accountable CP-ABE: How to effectively protect the electronic documents
CN113674077A (en) Consumption credit risk prevention method, system, equipment and storage medium
CN113626852A (en) Safe and efficient method, system and application for anonymizing chain elements of unlicensed blocks
CN114175028B (en) Cryptographic pseudonym mapping method, computer system, computer program and computer-readable medium
Han et al. An efficient multi-signature wallet in blockchain using bloom filter
Alharbi et al. Survey on homomorphic encryption and address of new trend
Engelmann et al. SwapCT: Swap confidential transactions for privacy-preserving multi-token exchanges
Yang et al. Practical escrow protocol for bitcoin
Zhang et al. Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare
Chen et al. Blockchain/abe-based fusion solution for e-government data sharing and privacy protection
Wu et al. The survey on the development of secure multi-party computing in the blockchain
Pei et al. Smart contract based multi-party computation with privacy preserving and settlement addressed
US20220345312A1 (en) Zero-knowledge contingent payments protocol for granting access to encrypted assets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination