CN111008385A - Method, device and medium for constructing privacy transaction in block chain super account book - Google Patents

Method, device and medium for constructing privacy transaction in block chain super account book Download PDF

Info

Publication number
CN111008385A
CN111008385A CN201911151081.4A CN201911151081A CN111008385A CN 111008385 A CN111008385 A CN 111008385A CN 201911151081 A CN201911151081 A CN 201911151081A CN 111008385 A CN111008385 A CN 111008385A
Authority
CN
China
Prior art keywords
data
private
user
white list
encrypting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911151081.4A
Other languages
Chinese (zh)
Inventor
宋明明
庞松涛
商广勇
王伟兵
马岩堂
赵树林
姜鑫
陶鑫
李佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Shandong ICity Information Technology Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong ICity Information Technology Co., Ltd. filed Critical Shandong ICity Information Technology Co., Ltd.
Priority to CN201911151081.4A priority Critical patent/CN111008385A/en
Publication of CN111008385A publication Critical patent/CN111008385A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a method, equipment and a medium for constructing privacy transactions in a block chain super account book, which comprise the following steps: acquiring information of a plurality of users in the super account book according to the correlation of the private data to establish an authorized white list; encrypting the private data by using a symmetric key generated randomly to generate first data; encrypting the symmetric key of the first data by using the public key of each user in the authorization white list to generate second data; writing the second data in the super account book and broadcasting; and the user in the authorization white list receives the second data and decrypts the second data by using the private key of the user to acquire the private data so as to solidify the privacy protection rule into a virtual channel, and the user does not need to authorize each private transaction data by a single user and automatically authorizes the transaction data in the virtual channel through the virtual channel.

Description

Method, device and medium for constructing privacy transaction in block chain super account book
Technical Field
The application relates to the technical field of block chain privacy transactions, in particular to a method, equipment and medium for constructing privacy transactions in a block chain super account book.
Background
The Channel is a very important concept in the super ledger, and is essentially a private atomic broadcast Channel divided and managed by a sequencing node, and the purpose is to isolate information of the Channel, so that an entity outside the Channel cannot access the information in the Channel, and thus privacy of transaction is realized. When creating a blockchain network, typically one channel is created per topic, and a user may subscribe to multiple channels and only access transactions on the subscribed channels. For privacy transactions with a small number of users, the cost of isolation using native channels can become prohibitive.
Disclosure of Invention
The embodiment of the specification provides a method, equipment and a medium for constructing a private transaction in a block chain super account book, which are used for solving the following technical problems in the prior art: for privacy transactions with a small number of users, a plurality of authorization white lists (a virtual channel is formed after rules are solidified) are established, the propagation range of data is controlled, effective cooperation in the virtual channel is met, and meanwhile business secrets are protected.
The embodiment of the specification adopts the following technical scheme:
a method for constructing privacy transactions in a blockchain super account book comprises the following steps:
acquiring information of a plurality of users in the super account book according to the correlation of the private data to establish an authorized white list;
encrypting the private data by using a symmetric key generated randomly to generate first data;
encrypting the symmetric key of the first data by using the public key of each user in the authorization white list to generate second data;
writing the second data in the super account book and broadcasting;
and the user in the authorized white list receives the second data and decrypts the second data by using a private key of the user to obtain the private data.
In one example, further comprising:
receiving transaction data, and judging whether the transaction data is privacy data;
if so, performing the method of claim 1.
In one example, the obtaining information of a plurality of users in a super ledger according to the correlation of the privacy data to establish an authorized white list includes:
judging parameters according to the transaction main body in the privacy data and preset correlation;
judging the interest relationship between the transaction main body and each user in the super ledger book;
and establishing a plurality of types of authorized white lists according to the types of the interests.
In one example, the interest relationship includes: debt relationships, relatives, and contractual relationships documented in the blockchain.
In one example, the encrypting the private data using a randomly generated symmetric key to generate first data includes:
classifying the private data according to the type of the authorized white list, and encrypting the classified private data respectively to generate a plurality of first data.
In one example, the privacy data is encrypted using a randomly generated symmetric key, the encrypting of (1) comprising: a symmetric encryption algorithm, the symmetric encryption algorithm comprising: AES, SM 4.
In one example, the encrypting of the symmetric key for the first data using the public key of each of the users in the authorization whitelist comprises an asymmetric encryption algorithm comprising: SM2, RSA.
In one example, further comprising: determining whether the user receives the second data,
and if so, sending a prompt message to the communication terminal of the user.
An apparatus for building private transactions in a blockchain superbugs, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring information of a plurality of users in the super account book according to the correlation of the private data to establish an authorized white list;
encrypting the private data by using a symmetric key generated randomly to generate first data;
encrypting the symmetric key of the first data by using the public key of each user in the authorization white list to generate second data;
writing the second data in the super account book and broadcasting;
and the user in the authorized white list receives the second data and decrypts the second data by using a private key of the user to obtain the private data.
A non-volatile computer storage medium for private transactions in building blockchain superbugs, storing computer-executable instructions configured to:
acquiring information of a plurality of users in the super account book according to the correlation of the private data to establish an authorized white list;
encrypting the private data by using a symmetric key generated randomly to generate first data;
encrypting the symmetric key of the first data by using the public key of each user in the authorization white list to generate second data;
writing the second data in the super account book and broadcasting;
and the user in the authorized white list receives the second data and decrypts the second data by using a private key of the user to obtain the private data.
The embodiment of the specification adopts at least one technical scheme which can achieve the following beneficial effects:
(1) and the private data in the channel is encrypted by using a symmetric encryption algorithm, and the private data in the super ledger channel is sufficiently refined and isolated.
(2) And sending the encrypted symmetric key of the private data to an authorized user in a safe sending mode to realize accurate authorization of the private transaction data. The safe sending mode is that the public key of the asymmetric key of the authorized person is used for encryption, and only the private key of the authorized person can be unlocked, so that the privacy of data is protected.
(3) The privacy protection rules are solidified into the virtual channels, the user does not need to authorize each piece of privacy transaction data by a single user, and the automatic authorization of the transaction data in the virtual channels is automatically realized through the virtual channels.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a schematic flow chart of a method provided by an embodiment of the present invention;
FIG. 2 is a schematic diagram of an encryption logic provided in accordance with an embodiment of the present invention;
FIG. 3 is a schematic diagram of a rule-hardened virtual channel according to an embodiment of the present invention;
fig. 4 is a schematic diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present disclosure more apparent, the technical solutions of the present disclosure will be clearly and completely described below with reference to the specific embodiments of the present disclosure and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person skilled in the art without making any inventive step based on the embodiments in the description belong to the protection scope of the present application.
Hyperledger Fabric (Hyperhedgehog Fabric) is an allowed blockchain framework. It provides a modular framework to serve nodes in the framework, execution of intelligent contracts, and configurable consensus and membership.
The channel is created already at the time the blockchain network is created, and after creation the channel is relatively fixed. If the privacy transaction is only opened for some specific users in the Channel, the Channel (Channel) needs to be isolated again, and the specific user group in the Channel is solidified into a virtual Channel by using an encryption technology. The transaction in the virtual channel is encrypted by using a symmetric encryption algorithm, and a symmetric key is encrypted by using public keys of all users in the virtual channel, and the symmetric key can be unlocked only by using a private key of the user in the virtual channel. Therefore, although other users in the Channel (Channel) can get the transaction data in the virtual Channel, the symmetric encryption key used by the virtual Channel which cannot be reached cannot open the transaction data in the virtual Channel. The embodiment of the invention aims to provide a method for constructing privacy transactions in a block chain super account book, so as to solve the problem that multiple channels of the super account book cannot be sufficiently refined and isolated.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic flow chart of a method provided in an embodiment of the present invention, and as shown in fig. 1, the method includes:
s101, acquiring information of a plurality of users in the super account book according to the correlation of the private data to establish an authorized white list;
s102, encrypting the private data by using a symmetric key generated randomly to generate first data;
s103, encrypting the symmetric key of the first data by using the public key of each user in the authorization white list to generate second data;
s104, writing the second data into the super ledger book and broadcasting;
s105, the user in the authorized white list receives the second data and uses the private key of the user for decryption to obtain the private data.
According to a specific embodiment of the present invention, the method further comprises: receiving transaction data, and judging whether the transaction data is privacy data; if yes, the method of steps S101-S105 is executed.
Specifically, in step S01, the native channel of the super book can only achieve privacy for users outside the channel, but the transaction data in the native channel is fully open to all users joining the channel. The basis of the virtual channel is a symmetric encryption algorithm and an asymmetric encryption algorithm, the transaction content of the virtual channel must be encrypted by using the symmetric encryption algorithm, and the virtual channel is a theoretical basis for the establishment of the virtual channel of the super account book. The key of the symmetric encryption algorithm is randomly generated, and only the user who takes the symmetric key can unlock the privacy encrypted transaction data. The construction of the privacy channel is realized by constructing an authorized white list, and the general steps are as follows:
judging parameters according to the transaction main body in the privacy data and preset correlation;
judging the interest relationship between the transaction main body and each user in the super ledger book; wherein the interest relationship comprises: debt relationships, relatives, and contractual relationships documented in the blockchain.
And establishing a plurality of types of authorized white lists according to the types of the interests.
Fig. 2 is a schematic diagram of an encryption logic provided in an embodiment of the present invention, and as shown in fig. 2, the privacy data are classified according to the type of the authorized white list, and the classified privacy data are respectively encrypted to generate a plurality of first data.
The private transaction data (for convenience of description, hereinafter referred to as private data) is encrypted by using a symmetric key to obtain first data, assuming that the symmetric key is K, all users in a channel of the super ledger, except an encryptor, can only obtain the first data (corresponding to ciphertext data in fig. 2, hereinafter referred to as first data) but cannot decrypt and read the private data, because they do not obtain the symmetric key K. If the owner of the encrypted file wants to authorize a user A in the channel of the super ledger to read the encrypted file, the user A only needs to be given the symmetric key K in a secure manner.
Public keys of asymmetric encryption keys of all users in a channel of the super account book are public, and when the symmetric key K is to be sent to the user A safely, the symmetric key K only needs to be encrypted by the public key of the user A to obtain K1. Only the private key of user a can decrypt K1 to obtain the symmetric key K, and others cannot recover K without the private key of user a even if they obtain K1. So we can attach K1 directly after encrypting K with user a's public key to the first data to form the second data (corresponding to the privacy ciphertext transaction data in fig. 2) and identify to which user this K1 belongs. If the encrypted private data is to be authorized for multiple users simultaneously, such as user B and user C, only K2 and K3 encrypted with K using the public keys of user B and user C need be added after the private data, thus generating an authorization white list for the private transaction.
In some preferred embodiments of the invention, the privacy data is encrypted using a randomly generated symmetric key, wherein the encrypting comprises: a symmetric encryption algorithm, the symmetric encryption algorithm comprising: AES, SM 4. The encrypting the symmetric key of the first data by using the public key of each user in the authorized white list comprises an asymmetric encryption algorithm, and the asymmetric encryption algorithm comprises: SM2, RSA.
The directional authorization of the user is realized by constructing the authorization white list. For the user group, an authorized white list can be solidified into a virtual channel, and the group members add all private transactions to the virtual channel, so that privacy protection with finer granularity than that of a super account book is realized. Fig. 3 is a schematic diagram of a rule-solidified virtual channel provided in an embodiment of the present invention, and as shown in fig. 3, a specific implementation process is as follows:
firstly, a virtual channel is generated in a super account book, and a virtual machine channel unique identification number is randomly distributed to the virtual channel. Which users in the virtual channel are public to all users will attach the symmetric encryption public keys of all users in the virtual channel to the virtual channel.
When a user generates a privacy transaction, a symmetric key K is firstly generated, the transaction is encrypted by using the symmetric key K, and meanwhile, a virtual channel to which the privacy transaction is added needs to be specified.
The user does not need to asymmetrically encrypt the symmetric key K, the intelligent dating point of the super ledger encrypts the symmetric key K according to the user list in the virtual channel to be sent, and the public key of the user in the virtual channel is used for encrypting the symmetric key K so as to generate K1, K2 and K3., and the K1, the K2 and the K3. are attached to the privacy transaction.
After the user in the virtual channel obtains the private transaction data, the user can use the private key of the user to find and unlock own Kn to obtain a symmetric key K, and the user can use the K to decrypt the private data and then read the original text of the transaction data. Users outside the virtual channel can also obtain the private transaction information, and the private transaction number cannot be read even if the private transaction number is obtained because the private transaction information cannot be decrypted by using the private key of the user to obtain the symmetric key K.
According to the specific embodiment of the invention, the intelligent contract detects and judges whether the user receives the second data, namely the encrypted data, and if so, sends a prompt message to the communication terminal of the user. Generally speaking, the transaction related in the privacy data may involve monetary transaction in the family members, and the risk of fraud among the family members can be effectively reduced by means of reminding, and loss can be stopped in time.
In conclusion, the method disclosed in the embodiment of the invention can encrypt the private data in the channel by using a symmetric encryption algorithm, and can sufficiently refine and isolate the private data in the super ledger channel; the symmetric key of the encrypted private data is sent to an authorized user in a safe sending mode, so that accurate authorization of the private transaction data is realized. The safe sending mode is that the public key of the asymmetric key of the authorized person is used for encryption, and only the private key of the authorized person can be unlocked, so that the privacy of data is protected; by solidifying the privacy protection rule into the virtual channel, the user does not need to carry out single user authorization on each piece of privacy transaction data, and the automatic authorization of the transaction data in the virtual channel is automatically realized through the virtual channel.
Based on the same idea, some embodiments of the present application further provide a device and a non-volatile computer storage medium corresponding to the above method.
Fig. 4 is a schematic diagram of an apparatus provided in an embodiment of the present invention, where the apparatus includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring information of a plurality of users in the super account book according to the correlation of the private data to establish an authorized white list;
encrypting the private data by using a symmetric key generated randomly to generate first data;
encrypting the symmetric key of the first data by using the public key of each user in the authorization white list to generate second data;
writing the second data in the super account book and broadcasting;
and the user in the authorized white list receives the second data and decrypts the second data by using a private key of the user to obtain the private data.
Some embodiments of the present application provide a non-volatile computer storage medium corresponding to fig. 1 for private transactions in a building blockchain superback, storing computer-executable instructions configured to:
acquiring information of a plurality of users in the super account book according to the correlation of the private data to establish an authorized white list;
encrypting the private data by using a symmetric key generated randomly to generate first data;
encrypting the symmetric key of the first data by using the public key of each user in the authorization white list to generate second data;
writing the second data in the super account book and broadcasting;
and the user in the authorized white list receives the second data and decrypts the second data by using a private key of the user to obtain the private data.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and media embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference may be made to some descriptions of the method embodiments for relevant points.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is directed to methods, apparatus (systems), and computer program products according to embodiments of the present invention
A flowchart and/or block diagram of an article. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for constructing privacy transactions in a blockchain super account book is characterized by comprising the following steps:
acquiring information of a plurality of users in the super account book according to the correlation of the private data to establish an authorized white list;
encrypting the private data by using a symmetric key generated randomly to generate first data;
encrypting the symmetric key of the first data by using the public key of each user in the authorization white list to generate second data;
writing the second data in the super account book and broadcasting;
and the user in the authorized white list receives the second data and decrypts the second data by using a private key of the user to obtain the private data.
2. The method of claim 1, further comprising:
receiving transaction data, and judging whether the transaction data is privacy data;
if so, performing the method of claim 1.
3. The method of claim 1, wherein obtaining information of a plurality of users in a super ledger according to the correlation of the privacy data to establish an authorized white list comprises:
judging parameters according to the transaction main body in the privacy data and preset correlation;
judging the interest relationship between the transaction main body and each user in the super ledger book;
and establishing a plurality of types of authorized white lists according to the types of the interests.
4. The method of claim 3, wherein the interest relationship comprises: debt relationships, relatives, and contractual relationships documented in the blockchain.
5. The method of claim 3, wherein encrypting the private data using a randomly generated symmetric key to generate the first data comprises:
classifying the private data according to the type of the authorized white list, and encrypting the classified private data respectively to generate a plurality of first data.
6. The method of claim 1, wherein encrypting the private data using a randomly generated symmetric key comprises: a symmetric encryption algorithm, the symmetric encryption algorithm comprising: AES, SM 4.
7. The method of claim 1, wherein the encrypting the symmetric key of the first data using the public key of each of the users in the authorized whitelist comprises an asymmetric encryption algorithm, and wherein the asymmetric encryption algorithm comprises: SM2, RSA.
8. The method of claim 1, further comprising: determining whether the user receives the second data,
and if so, sending a prompt message to the communication terminal of the user.
9. An apparatus for private transactions in building blockchain superbugs, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring information of a plurality of users in the super account book according to the correlation of the private data to establish an authorized white list;
encrypting the private data by using a symmetric key generated randomly to generate first data;
encrypting the symmetric key of the first data by using the public key of each user in the authorization white list to generate second data;
writing the second data in the super account book and broadcasting;
and the user in the authorized white list receives the second data and decrypts the second data by using a private key of the user to obtain the private data.
10. A non-volatile computer storage medium for private transactions in building blockchain superbugs, storing computer-executable instructions configured to:
acquiring information of a plurality of users in the super account book according to the correlation of the private data to establish an authorized white list;
encrypting the private data by using a symmetric key generated randomly to generate first data;
encrypting the symmetric key of the first data by using the public key of each user in the authorization white list to generate second data;
writing the second data in the super account book and broadcasting;
and the user in the authorized white list receives the second data and decrypts the second data by using a private key of the user to obtain the private data.
CN201911151081.4A 2019-11-21 2019-11-21 Method, device and medium for constructing privacy transaction in block chain super account book Pending CN111008385A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911151081.4A CN111008385A (en) 2019-11-21 2019-11-21 Method, device and medium for constructing privacy transaction in block chain super account book

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911151081.4A CN111008385A (en) 2019-11-21 2019-11-21 Method, device and medium for constructing privacy transaction in block chain super account book

Publications (1)

Publication Number Publication Date
CN111008385A true CN111008385A (en) 2020-04-14

Family

ID=70113778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911151081.4A Pending CN111008385A (en) 2019-11-21 2019-11-21 Method, device and medium for constructing privacy transaction in block chain super account book

Country Status (1)

Country Link
CN (1) CN111008385A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111612458A (en) * 2020-04-30 2020-09-01 深圳壹账通智能科技有限公司 Method and device for processing block chain data and readable storage medium
CN112685789A (en) * 2021-03-12 2021-04-20 卓尔智联(武汉)研究院有限公司 Method and device for processing engineering cost data and alliance chain system
CN115034897A (en) * 2022-03-01 2022-09-09 中国科学院计算技术研究所 Interoperation system and working method among multiple channels under block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111612458A (en) * 2020-04-30 2020-09-01 深圳壹账通智能科技有限公司 Method and device for processing block chain data and readable storage medium
WO2021217939A1 (en) * 2020-04-30 2021-11-04 深圳壹账通智能科技有限公司 Data processing method and apparatus for blockchain, and readable storage medium
CN112685789A (en) * 2021-03-12 2021-04-20 卓尔智联(武汉)研究院有限公司 Method and device for processing engineering cost data and alliance chain system
CN115034897A (en) * 2022-03-01 2022-09-09 中国科学院计算技术研究所 Interoperation system and working method among multiple channels under block chain
CN115034897B (en) * 2022-03-01 2024-07-19 中国科学院计算技术研究所 Interoperation system and working method among multiple human channels under blockchain

Similar Documents

Publication Publication Date Title
CN110033258B (en) Service data encryption method and device based on block chain
CN108564353B (en) Payment system and method based on block chain
CN108632292B (en) Data sharing method and system based on alliance chain
CN1939028B (en) Accessing protected data on network storage from multiple devices
CN111008385A (en) Method, device and medium for constructing privacy transaction in block chain super account book
CN111475829A (en) Private data query method and device based on block chain account
CN109729041B (en) Method and device for issuing and acquiring encrypted content
WO2021088728A1 (en) Data encryption method, data decryption method, data sharing method, device, system, and storage medium
CN111475827A (en) Private data query method and device based on down-link authorization
CN106650482A (en) Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system
CN111475850A (en) Private data query method and device based on intelligent contract
CN104022869A (en) Fine-grained data access control method based on fragmenting of secret keys
CN108092768A (en) Data fusion method and system
CN112651049B (en) Privacy data sharing method and system based on block chain
CN105653986A (en) Micro SD card-based data protection method and device
CN111931195A (en) User private key management method, device and medium based on block chain
CN110717190A (en) Distributed data storage method and device and data storage equipment
CN110995419A (en) Symmetric encryption and decryption method, device and medium based on data on link
KR20210058313A (en) Data access control method and system using attribute-based password for secure and efficient data sharing in cloud environment
Liu et al. A blockchain-based secure cloud files sharing scheme with fine-grained access control
US6370251B1 (en) Traffic key access method and terminal for secure communication without key escrow facility
CN113037764B (en) System, method and device for executing service
CN111008386A (en) Method, device and medium for managing household registration based on block chain
Manjusha et al. Comparative study of attribute based encryption techniques in cloud computing
CN115828300A (en) Block chain-based government affair information processing method and system with privacy protection function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20200729

Address after: Floor S01, Inspur Science Park, 1036 Inspur Road, hi tech Zone, Jinan City, Shandong Province

Applicant after: Inspur cloud Information Technology Co.,Ltd.

Address before: Room 3110, S01 building, Langchao building, No. 1036, Langchao Road, high tech Zone, Jinan City, Shandong Province 250101

Applicant before: Shandong Aicheng Network Information Technology Co.,Ltd.

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination