CN111343150A - Transaction data transmission method and system based on block chain and related components - Google Patents

Transaction data transmission method and system based on block chain and related components Download PDF

Info

Publication number
CN111343150A
CN111343150A CN202010081686.7A CN202010081686A CN111343150A CN 111343150 A CN111343150 A CN 111343150A CN 202010081686 A CN202010081686 A CN 202010081686A CN 111343150 A CN111343150 A CN 111343150A
Authority
CN
China
Prior art keywords
transaction data
receiving end
data receiving
annotation
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010081686.7A
Other languages
Chinese (zh)
Other versions
CN111343150B (en
Inventor
孙开磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Onething Technology Co Ltd
Original Assignee
Shenzhen Onething Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Onething Technology Co Ltd filed Critical Shenzhen Onething Technology Co Ltd
Priority to CN202010081686.7A priority Critical patent/CN111343150B/en
Publication of CN111343150A publication Critical patent/CN111343150A/en
Application granted granted Critical
Publication of CN111343150B publication Critical patent/CN111343150B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a transaction data transmission method based on a block chain, which is applied to a transaction data sending end and comprises the steps of receiving a privacy transaction request and determining a plurality of transaction data receiving ends corresponding to the privacy transaction request; determining the corresponding transaction data of each transaction data receiving end, and generating annotation information for each transaction data; determining an encryption key corresponding to each transaction data receiving end, and performing encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext; and sending the transaction data and the annotation ciphertext to the corresponding transaction data receiving end so that the transaction data receiving end can return a response message to the transaction data sending end by using the address information obtained by decryption. According to the method and the device, the annotation information can be transmitted to the multiple transaction receiving ends on the premise that the annotation information is not leaked. The application also discloses a transaction data transmission system based on the block chain, an electronic device and a storage medium, and the transaction data transmission system, the electronic device and the storage medium have the beneficial effects.

Description

Transaction data transmission method and system based on block chain and related components
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and a system for transmitting transaction data based on a blockchain, an electronic device, and a storage medium.
Background
The privacy-class blockchain is one of the mainstream blockchain items at present, and in the privacy-class blockchain technology, transaction information, sending end information and receiving end information can be hidden. For the privacy-class blockchain, the receiving end cannot acquire the address of the transmitting end from the privacy transaction, so that the transmitting end needs an additional channel to inform the receiving end in the actual transaction. To solve this problem, the related art delivers additional information by annotating information. However, in the above-mentioned method of transferring additional information by using annotation information, only one piece of annotation information can be attached to each transaction, and in a scenario with multiple receiving terminals, the annotation information cannot be transferred to multiple transaction data receiving terminals on the premise of ensuring that the annotation information is not leaked.
Therefore, how to deliver the annotation information to multiple transaction receiving ends on the premise of ensuring that the annotation information is not leaked is a technical problem that needs to be solved by those skilled in the art at present.
Disclosure of Invention
The application aims to provide a transaction data transmission method and system based on a block chain, an electronic device and a storage medium, which can transmit annotation information to a plurality of transaction receiving ends on the premise of ensuring that the annotation information is not leaked.
In order to solve the above technical problem, the present application provides a block chain-based transaction data transmission method, which is applied to a transaction data sending end, and the transaction data transmission method includes:
receiving a privacy transaction request and determining a plurality of transaction data receiving ends corresponding to the privacy transaction request;
determining the corresponding transaction data of each transaction data receiving end, and generating annotation information for each transaction data; wherein the annotation information includes address information of the data transmitting end;
determining an encryption key corresponding to each transaction data receiving end through non-interactive key agreement, and performing encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext;
and sending the transaction data and the comment ciphertext to a corresponding transaction data receiving end so that the transaction data receiving end decrypts the comment ciphertext after receiving the transaction data and returns a response message to the transaction data sending end by using address information obtained by decryption.
Optionally, determining the encryption key corresponding to each transaction data receiving end through non-interactive key agreement includes:
generating a public and private key pair corresponding to the transaction data receiving end;
analyzing the address information of the transaction data receiving end to obtain a target public key of the transaction data receiving end;
setting a hash value of a product of a private key of the public and private key pair and the target public key as an intermediate key;
and calculating the hash value of the intermediate key, and setting the hash value of the intermediate key as the encryption key.
Optionally, the method further includes:
and sending the public key of the public and private key pair to a corresponding transaction data receiving end so that the transaction data receiving end can execute decryption operation on the annotation ciphertext according to the public key of the public and private key pair.
Optionally, the annotation information further includes source information of the transaction data and/or usage description information of the transaction data.
Optionally, the method further includes:
and when receiving the response message sent by the transaction data receiving end, generating prompt information of successful transmission of the transaction data.
Optionally, the transaction data and the annotation ciphertext are sent to a corresponding transaction data receiving end:
and performing packing operation on the transaction data and the annotation ciphertext to obtain a data packet to be transmitted, and transmitting the data packet to be transmitted to a corresponding transaction data receiving end.
The application also provides a transaction data transmission system based on the block chain, which is applied to a transaction data sending end, and the transaction data transmission system comprises:
the receiving end determining module is used for receiving the privacy transaction request and determining a plurality of transaction data receiving ends corresponding to the privacy transaction request;
the annotation information generation module is used for determining the transaction data corresponding to each transaction data receiving end and generating annotation information for each transaction data; wherein the annotation information includes address information of the data transmitting end;
the encryption module is used for determining an encryption key corresponding to each transaction data receiving end through non-interactive key agreement and performing encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext;
and the data transmission module is used for transmitting the transaction data and the annotation ciphertext to a corresponding transaction data receiving end, so that the transaction data receiving end decrypts the annotation ciphertext after receiving the transaction data and returns a response message to the transaction data transmitting end by using address information obtained by decryption.
Optionally, the encryption module includes:
a public and private key pair generating unit, configured to generate a public and private key pair corresponding to the transaction data receiving end;
the target public key analyzing unit is used for analyzing the address information of the transaction data receiving end to obtain a target public key of the transaction data receiving end;
an intermediate key determining unit, configured to set a hash value of a product of a private key of the public-private key pair and the target public key as an intermediate key;
and the encryption key determining unit is used for calculating the hash value of the intermediate key and setting the hash value of the intermediate key as the encryption key.
And the annotation encryption unit is used for performing encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext.
The present application also provides a storage medium having a computer program stored thereon, which when executed, implements the steps performed by the above block chain based transaction data transmission method.
The application also provides an electronic device, which comprises a memory and a processor, wherein the memory is stored with a computer program, and the processor realizes the steps executed by the transaction data transmission method based on the block chain when calling the computer program in the memory.
The application provides a transaction data transmission method based on a block chain, which is applied to a transaction data sending end and comprises the steps of receiving a privacy transaction request and determining a plurality of transaction data receiving ends corresponding to the privacy transaction request; determining the corresponding transaction data of each transaction data receiving end, and generating annotation information for each transaction data; wherein the annotation information includes address information of the data transmitting end; determining an encryption key corresponding to each transaction data receiving end through non-interactive key agreement, and performing encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext; and sending the transaction data and the comment ciphertext to a corresponding transaction data receiving end so that the transaction data receiving end decrypts the comment ciphertext after receiving the transaction data and returns a response message to the transaction data sending end by using address information obtained by decryption.
The method and the device for processing the transaction data determine transaction data receiving ends needing to send the transaction data when receiving the privacy transaction request, and generate corresponding annotation information for each transaction data after determining the transaction data corresponding to each transaction data receiving end, wherein the annotation information comprises address information of a transaction data sending end. The application also determines an encryption key corresponding to each transaction data receiving end through non-interactive key agreement, and encrypts corresponding annotation information by using the encryption key to obtain an annotation ciphertext. Because different transaction data receiving ends all have the corresponding encryption keys, the encryption keys of the annotation ciphertext sent by the different transaction data receiving ends are different, only the correct transaction data receiving end can decrypt the annotation ciphertext to obtain the address information of the transaction data sending end, and response information is returned based on the address information. After the transaction data are sent to the transaction data receiving end, the transaction data receiving end cannot check the address information of the transaction data sending end when analyzing the transaction data, and can also return response information according to the annotation information, so that the sending of the response information is not influenced, and the address information of the transaction data sending end cannot be directly exposed in the transaction data. According to the method and the device, the annotation information can be transmitted to the multiple transaction receiving ends on the premise that the annotation information is not leaked. The application also provides a transaction data transmission system based on the block chain, an electronic device and a storage medium, which have the beneficial effects and are not repeated herein.
Drawings
In order to more clearly illustrate the embodiments of the present application, the drawings needed for the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained by those skilled in the art without inventive effort.
Fig. 1 is a flowchart of a transaction data transmission method based on a blockchain according to an embodiment of the present disclosure;
fig. 2 is a flowchart of an encryption method for annotation information disclosed in an embodiment of the present application;
fig. 3 is a flowchart of another data transmission method disclosed in the embodiments of the present application;
fig. 4 is a schematic structural diagram of a transaction data transmission system based on a blockchain according to an embodiment of the present disclosure;
fig. 5 is a block diagram of an electronic device disclosed in an embodiment of the present application;
fig. 6 is a block diagram of another electronic device disclosed in the embodiments of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating a transaction data transmission method based on a blockchain according to an embodiment of the present disclosure.
The specific steps may include:
s101: receiving a privacy transaction request and determining a plurality of transaction data receiving ends corresponding to the privacy transaction request;
the execution main body of this embodiment may be a transaction data sending end in a blockchain network, and the transaction data sending end may be an electronic device such as a server, a communication terminal, or a personal computer. The device corresponding to the transaction data sending end is a transaction data receiving end, the transaction data receiving end is a terminal used for receiving transaction data, and as an available application scene, one electronic device can be the transaction data sending end and also can be the transaction data receiving end. In a blockchain scenario, both the transaction data sending end and the transaction data receiving end may be nodes in a blockchain network.
The privacy transaction request is a transaction request of a privacy-class blockchain transaction, the privacy transaction request may be used to request a transaction data sending end to send transaction data information, and the privacy transaction request may be information sent by a transaction data receiving end, or information sent by a third-party management end other than the transaction data receiving end and the transaction data sending end, which is not limited herein. After receiving the private transaction request, the transaction data sending end may analyze the private transaction request to obtain the number or address information of the transaction data receiving end, so as to send the data. The number of the transaction data receiving ends is not limited in this embodiment, and the transaction data sending end may send data to any number of transaction data receiving ends.
S102: determining the corresponding transaction data of each transaction data receiving end, and generating annotation information for each transaction data;
when the transaction data needs to be sent to a plurality of transaction data receiving ends, the transaction data that needs to be sent to each transaction data end may be different, so that the transaction data corresponding to each transaction data receiving end is determined in this step, so that the transaction data is sent to the corresponding transaction data receiving end. Specifically, in this embodiment, the transaction data corresponding to each transaction data receiving end may be determined by analyzing the private transaction request received in S101.
In this embodiment, corresponding annotation information may be generated for each transaction data, and the annotation information may include address information of the transaction data sending end, so that after the transaction data receiving end receives the transaction data and the annotation information, response information may be returned according to the address information stored in the annotation information. As a possible implementation manner, the annotation information may further include information uniquely corresponding to the transaction data, for example, the annotation information may include source information of the transaction data, usage description information of the transaction data, and source information and usage description information of the transaction data. The source information is description of the transaction data source, and the application specification information is description of the transaction data source. Of course, the annotation information may also include other information that is not to be tampered, and is not limited herein.
S103: determining an encryption key corresponding to each transaction data receiving end through non-interactive key agreement, and performing encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext;
the transaction data sending end can respectively perform non-interactive key negotiation with each transaction data receiving end to obtain the encryption key corresponding to each transaction data receiving end. And then, the encryption key is used for carrying out encryption operation on the annotation information corresponding to the same transaction data receiving end to obtain an annotation ciphertext. For example, there are three transaction data receivers A, B, C, the encryption key corresponding to the transaction data receiver a is a1, the annotation information corresponding to the transaction data receiver a is a2, the encryption key corresponding to the transaction data receiver B is B1, the annotation information corresponding to the transaction data receiver B is B2, the encryption key corresponding to the transaction data receiver C is C1, and the annotation information corresponding to the transaction data receiver C is C2, so that the annotation information can be encrypted based on the correspondence relationship among the transaction data receiver, the encryption key a1 for encrypting the annotation information a2, the encryption key B1 for encrypting the annotation information B2, and the encryption key C1 for encrypting the annotation information C2.
S104: and sending the transaction data and the comment ciphertext to a corresponding transaction data receiving end so that the transaction data receiving end decrypts the comment ciphertext after receiving the transaction data and returns a response message to the transaction data sending end by using the address information obtained by decryption.
It can be understood that, in the block chain network, sending the transaction data and the annotation ciphertext to the corresponding transaction data receiving end means that the transaction data and the annotation ciphertext can be sent to the block chain network by the transaction data sending end, and are packaged into a block by a block outlet node in the block chain network and broadcast, and the transaction data and the annotation ciphertext are analyzed from the transaction data receiving end after the transaction data receiving end is synchronized to the latest block.
In this step, the transaction data and the corresponding annotation ciphertext may be bound to send the transaction data and the annotation ciphertext to the transaction data receiving end. Of course, the data packet to be transmitted may also be obtained by performing a packing operation on the transaction data and the annotation ciphertext, and the data packet to be transmitted is sent to the corresponding transaction data receiving terminal. The transaction data receiving end can store the transaction data after receiving the transaction data and the annotation ciphertext, decrypt the annotation ciphertext to obtain annotation information, further obtain address information stored in the annotation information, and return response information to the transaction data sending end by using the address information so as to inform the data sending end that the transaction data is received. Further, when the transaction data sending end receives the response message sent by the data receiving end, a prompt message indicating that the transaction data is successfully sent can be generated.
In this embodiment, when a privacy transaction request is received, transaction data receiving ends that need to send transaction data are determined, and after the transaction data corresponding to each transaction data receiving end is determined, corresponding annotation information is generated for each transaction data in this embodiment, where the annotation information includes address information of a transaction data sending end. In this embodiment, an encryption key corresponding to each transaction data receiving end is determined through non-interactive key agreement, and the corresponding annotation information is encrypted by using the encryption key to obtain an annotation ciphertext. Because different transaction data receiving ends all have the corresponding encryption keys, the encryption keys of the annotation ciphertext sent by the different transaction data receiving ends are different, only the correct transaction data receiving end can decrypt the annotation ciphertext to obtain the address information of the transaction data sending end, and response information is returned based on the address information. In this embodiment, after the transaction data is sent to the transaction data receiving end, the transaction data receiving end cannot check the address information of the transaction data sending end when analyzing the transaction data, and the transaction data receiving end can also return the response information according to the annotation information, so that the sending of the response information is not affected, and the address information of the transaction data sending end is not directly exposed in the transaction data. The embodiment can transmit the annotation information to a plurality of transaction receiving ends on the premise of ensuring that the annotation information is not leaked.
Referring to fig. 2, fig. 2 is a flowchart of an encryption method for annotation information disclosed in an embodiment of the present application, where this embodiment further describes S103 in the embodiment corresponding to fig. 1, and a more preferred implementation may be obtained by combining this embodiment with the embodiment corresponding to fig. 1, where this embodiment may include the following steps:
s201: generating a public and private key pair corresponding to each transaction data receiving end;
in this step, a unique corresponding public and private key pair may be generated for each transaction data receiving end in a random generation manner. When a privacy transaction request is received, the address information of a transaction data receiving end can be determined according to the privacy transaction request, and in the step, an encryption key can be generated according to a private key in a randomly generated public and private key pair and the address information of the transaction data receiving end. The public and private key pair can be randomly generated by the transaction data sending end, and a plurality of transaction data receiving ends can share the same public and private key pair.
S202: analyzing the address information of the transaction data receiving end to obtain a target public key of the transaction data receiving end;
s203: setting a hash value of a product of a private key of a public and private key pair and a target public key as an intermediate key;
s204: calculating the hash value of the intermediate key, and setting the hash value of the intermediate key as the encryption key.
The address information of the transaction data receiving end can include a target public key, and the hash value of the product of the randomly generated public and private key pair and the target public key is used as an intermediate key, so that the intermediate key is determined through non-interactive negotiation. In order to improve the security of the intermediate key, the present embodiment performs the hash process on the intermediate key again, and takes the hash value of the intermediate key as the encryption key that is finally used to encrypt the comment information.
S205: and performing encryption operation on the annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext.
And further, the public key of the public and private key pair is sent to a corresponding transaction data receiving end, so that the transaction data receiving end can execute decryption operation on the annotation ciphertext according to the public key of the public and private key pair. Specifically, the process of decrypting the annotation information by the transaction data receiving end may be that a product of a target private key corresponding to a target public key stored by the transaction data receiving end and a private key of a public and private key pair sent by the data sending end is determined, a hash value of the product is used as a temporary encryption key, a hash value of the temporary encryption key is used as an encryption key for decrypting the annotation information, and finally, information stored in the annotation information is obtained.
Referring to fig. 3, fig. 3 is a flowchart of another data transmission method disclosed in the embodiment of the present application, where the embodiment specifically describes a data transmission process between a data sending end and a data receiving end, and the embodiment may include the following operations:
s301: the transaction data sending end receives the privacy transaction request and determines a plurality of transaction data receiving ends corresponding to the privacy transaction request.
S302: the transaction data sending end determines the transaction data corresponding to each transaction data receiving end and generates annotation information for each transaction data.
S303: and the transaction data sending end generates a public and private key pair corresponding to each transaction data receiving end.
S304: the transaction data sending end analyzes the address information of the transaction data receiving end to obtain a target public key of the transaction data receiving end.
S305: and the transaction data sending end sets the hash value of the product of the private key of the public and private key pair and the target public key as an intermediate key.
S306: and the transaction data sending end calculates the hash value of the intermediate key and sets the hash value of the intermediate key as an encryption key.
S307: and the transaction data sending end utilizes the encryption key to carry out encryption operation on the annotation information corresponding to the same transaction data receiving end to obtain an annotation ciphertext.
S308: the transaction data sending end sends the transaction data and the annotation ciphertext to the corresponding transaction data receiving end, so that the transaction data receiving end decrypts the annotation ciphertext after receiving the transaction data and returns a response message to the transaction data sending end by using the address information obtained by decryption.
S309: when a data packet to be transmitted sent by the transaction data sending end is received, the transaction data receiving end analyzes the data packet to be transmitted to obtain the transaction data and the annotation ciphertext corresponding to the transaction data, and stores the target data.
S310: and the transaction data receiving end determines the address information of the transaction data transmitting end according to the decrypted annotation ciphertext.
S311: the transaction data receiving end returns response information to the data sending end according to the address information; the response information is prompt information used for describing that the target data is received.
The flow described in the above embodiment is explained below by an annotation information delivery scheme for privacy transaction data in practical applications. For example, in a privacy-class blockchain (such as menlo currency), since the transaction data receiving end cannot acquire the address of the transaction data sending end from the privacy transaction, in an actual transaction, the transaction data sending end needs an additional channel to notify the transaction data receiving end of the address of the transaction data sending end. To solve this problem, the present embodiment delivers additional information through the comment information. The encrypted comment information is added in the privacy transaction, and only a receiver can decrypt the original information, so that the receiver can distinguish a transaction data sending end in the transaction, and the method comprises the following specific steps:
step (1): the transaction data sender (i.e. the above data sender) selects the address of the transaction data receiver (i.e. the above data receiver) of the transaction, which is respectively marked as R0, R1, …, and RN (N is greater than or equal to 0). Where Ri ═ (SPKi, VPKi) (0 ≦ i ≦ N), indicates that Ri contains the Spending Public Key (SPKi) and the target public key (VPKi) information, where the target public key (VPKi) is the view public key.
Step (2): and (3) filling annotation information (namely the annotation text) Mi (i is more than or equal to 0 and less than or equal to N) by the transaction data transmitting terminal aiming at the address Ri (i is more than or equal to 0 and less than or equal to N) of the transaction data receiving terminal in the step (1). The length of the annotation information is not limited in this step.
And (3): a transaction data sender randomly generates a pair of public and private keys (SK, PK), wherein SK is a private key and PK is a public key. The public-private key pair will be used for non-interactive negotiation of encryption keys.
And (4): and (4) based on the private key SK generated in the step (3), the transaction data sending end and the transaction data receiving end Ri (i is more than or equal to 0 and less than or equal to N) in the step (1) carry out non-interactive negotiation, and an encryption key EKi (i is more than or equal to 0 and less than or equal to N) is calculated. The calculation formula is EKi ═ H (SK × VPKi, i), where H is the hash function.
And (5): and (4) calculating an encryption key EKi' by using the encryption key EKi (0 is less than or equal to 0 and less than or equal to N) in the step (4). The calculation formula is EKi ' ═ H ' (EKi), where H ' is a hash function.
And (6): and (3) encrypting the annotation information Mi filled in the step (2) by using the encryption key EKi '(i is more than or equal to 0 and less than or equal to N) in the step (5) to obtain encrypted annotation information Mi'. This step does not limit the encryption algorithm used.
And (7): and (3) combining all the information by the transaction data sending end to generate an effective transaction T, wherein the effective transaction T comprises the public key PK randomly generated in the step (3) and the encrypted annotation information Mi' in the step (6). And then sending the transaction T to the block link point, verifying the transaction T to pass by the node, and packaging the transaction into a block B.
And (8): and (2) synchronizing the transaction data receiving end Ri (i is more than or equal to 0 and less than or equal to N) in the step (1) to the block B in the step (7) from the node, then analyzing the transaction T, and filtering the encrypted annotation information Mi' and the random public key PK sent to the transaction data receiving end Ri and the random public key PK.
And (9): and (2) the transaction data receiving terminal Ri (i is more than or equal to 0 and less than or equal to N) in the step (1) acquires a view private key VSKi corresponding to the view public key VPKi from the local wallet.
Step (10): and (4) performing non-interactive negotiation on the basis of the random public key PK obtained in the step (8) and the view private key VSKi obtained in the step (9) at the transaction data receiving end Ri (i is more than or equal to 0 and less than or equal to N) in the step (1) to calculate an encryption key EKi (i is more than or equal to 0 and less than or equal to N). The formula is calculated as EKi ″ ═ H (VSKi × PK, i). Wherein H is the hash algorithm used in step (4).
Step (11): and (2) calculating an encryption key EKi '(i is more than or equal to 0 and less than or equal to N) by using the encryption key EKi' (i is more than or equal to 0 and less than or equal to N) in the step (10) and the transaction data receiving end Ri (i is more than or equal to 0 and less than or equal to N) in the step (1). The formula is calculated as EKi '″ ═ H' (EKi "). Wherein H' is the hash algorithm used in step (5).
Step (12): and (3) decrypting the encrypted annotation information Mi 'in the step (8) by using the encryption key EKi' ″ in the step (10) and the transaction data receiving end Ri (i is more than or equal to 0 and less than or equal to N) in the step (1) to finally obtain the annotation information Mi. Wherein, the decryption algorithm is reciprocal to the encryption algorithm in the step (6).
Through the scheme, the UTXO (Unspent Transaction Output) Output corresponding to each Transaction data receiving end can contain annotation information, and the annotation information is bound with the UTXO. Because of the binding of the annotation information to the UTXO, additional information may be stored in the annotation information that is appended to the check. This may derive some functionality, for example: the description of the source of the UTXO, or the description of the use of the UTXO, or to store some non-tampered information, etc. The embodiment does not limit the length of the annotation information, so that the privacy transaction can support more application scenarios. By applying the embodiment, all transaction data receiving ends in the privacy transaction can add annotation information, and the requirement of multi-party transfer can be met.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a transaction data transmission system based on a blockchain according to an embodiment of the present disclosure;
the system may include:
the application also provides a transaction data transmission system based on the block chain, which is applied to a transaction data sending end, and the transaction data transmission system comprises:
a receiving end determining module 100, configured to receive a privacy transaction request and determine a plurality of transaction data receiving ends corresponding to the privacy transaction request;
the annotation information generation module 200 is configured to determine transaction data corresponding to each of the transaction data receiving ends, and generate annotation information for each of the transaction data; wherein the annotation information includes address information of the data transmitting end;
the encryption module 300 is configured to determine an encryption key corresponding to each transaction data receiving end through non-interactive key agreement, and perform an encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext;
the data transmission module 400 is configured to send the transaction data and the annotation ciphertext to a corresponding transaction data receiving end, so that the transaction data receiving end decrypts the annotation ciphertext after receiving the transaction data and returns a response message to the transaction data sending end by using address information obtained by decryption.
In this embodiment, when a privacy transaction request is received, transaction data receiving ends that need to send transaction data are determined, and after the transaction data corresponding to each transaction data receiving end is determined, corresponding annotation information is generated for each transaction data in this embodiment, where the annotation information includes address information of a transaction data sending end. In this embodiment, an encryption key corresponding to each transaction data receiving end is determined through non-interactive key agreement, and the corresponding annotation information is encrypted by using the encryption key to obtain an annotation ciphertext. Because different transaction data receiving ends all have the corresponding encryption keys, the encryption keys of the annotation ciphertext sent by the different transaction data receiving ends are different, only the correct transaction data receiving end can decrypt the annotation ciphertext to obtain the address information of the transaction data sending end, and response information is returned based on the address information. In this embodiment, after the transaction data is sent to the transaction data receiving end, the transaction data receiving end cannot check the address information of the transaction data sending end when analyzing the transaction data, and the transaction data receiving end can also return the response information according to the annotation information, so that the sending of the response information is not affected, and the address information of the transaction data sending end is not directly exposed in the transaction data. The embodiment can transmit the annotation information to a plurality of transaction receiving ends on the premise of ensuring that the annotation information is not leaked.
Further, the encryption module 300 includes:
a public and private key pair generating unit, configured to generate a public and private key pair corresponding to the transaction data receiving end;
the target public key analyzing unit is used for analyzing the address information of the transaction data receiving end to obtain a target public key of the transaction data receiving end;
an intermediate key determining unit, configured to set a hash value of a product of a private key of the public-private key pair and the target public key as an intermediate key;
and the encryption key determining unit is used for calculating the hash value of the intermediate key and setting the hash value of the intermediate key as the encryption key.
And the annotation encryption unit is used for performing encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext.
Further, the method also comprises the following steps:
and the public key sending module is used for sending the public key of the public and private key pair to a corresponding transaction data receiving end so that the transaction data receiving end can execute decryption operation on the annotation ciphertext according to the public key of the public and private key pair.
Further, the annotation information further includes source information of the transaction data and/or usage description information of the transaction data.
Further, the method also comprises the following steps:
and the prompt module is used for generating prompt information of successful transaction data transmission when receiving the response message transmitted by the transaction data receiving end.
Further, the data transmission module is specifically a module for performing a packing operation on the transaction data and the annotation ciphertext to obtain a data packet to be transmitted, and sending the data packet to be transmitted to a corresponding transaction data receiving end.
Since the embodiment of the system part corresponds to the embodiment of the method part, the embodiment of the system part is described with reference to the embodiment of the method part, and is not repeated here.
The application also provides an electronic device, which can be a PC (Personal Computer), and also can be a smartphone, a tablet Computer, a palmtop Computer, a portable Computer, an intelligent router, an ore machine, a network storage device (playing guest cloud) terminal device. The electronic device may be a node constituting a CDN network or a blockchain network.
Referring to fig. 5, fig. 5 is a block diagram of an electronic device disclosed in the embodiment of the present application, and as shown in fig. 5, the electronic device may include a memory 11, a processor 12, and a bus 13.
The memory 11 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 11 may in some embodiments be an internal storage unit of the electronic device, for example a hard disk of the electronic device. The memory 11 may also be an external storage device of the electronic device in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a flash Card (FlashCard), and the like, which are provided on the electronic device. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device. The memory 11 may be used not only to store application software for installing the electronic device and various types of data, such as a code of the data transmission program 01, but also to temporarily store data that has been output or is to be output.
The processor 12 may be a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor or other data Processing chip in some embodiments, and is configured to execute the program codes or process data stored in the memory 11, and implement the data transmission method provided in any of the above embodiments, for example, execute the data transmission program 01.
The bus 13 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 5, but this is not intended to represent only one bus or type of bus.
On the basis of the above embodiment, as a preferred implementation, referring to fig. 6, the electronic device further includes:
and the input interface 14 is used for acquiring computer programs, parameters and instructions imported from the outside, and controlling and storing the computer programs, the parameters and the instructions into the memory 11 through the processor 12. The input interface 14 may be connected to an input device for receiving parameters or instructions manually input by a user. The input device may be a touch layer covered on a display screen, a button, a trackball or a touch pad arranged on a terminal housing, a Keyboard (Keyboard), a touch pad or a mouse.
A display unit 15 for displaying data processed by the processor 12 and for displaying a visualized user interface. The display unit 15 may be an LED display, a liquid crystal display, a touch-controlled liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, and the like.
And a network port 16 for performing communication connection with each external terminal device. The communication technology adopted by the communication connection can be a wired communication technology or a wireless communication technology, such as a mobile high definition link (MHL) technology, a Universal Serial Bus (USB), a High Definition Multimedia Interface (HDMI), a wireless fidelity (WiFi), a bluetooth communication technology, a low power consumption bluetooth communication technology, an ieee802.11 s-based communication technology, and the like.
Fig. 6 shows only an electronic device with components 11-16 and a data transfer program 01, and it will be understood by those skilled in the art that the structure shown in fig. 6 does not constitute a limitation of the electronic device, and may include fewer or more components than those shown, or some components in combination, or a different arrangement of components.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A transaction data transmission method based on a block chain is characterized in that the method is applied to a transaction data sending end and comprises the following steps:
receiving a privacy transaction request and determining a plurality of transaction data receiving ends corresponding to the privacy transaction request;
determining the corresponding transaction data of each transaction data receiving end, and generating annotation information for each transaction data; wherein the annotation information includes address information of the data transmitting end;
determining an encryption key corresponding to each transaction data receiving end through non-interactive key agreement, and performing encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext;
and sending the transaction data and the comment ciphertext to a corresponding transaction data receiving end so that the transaction data receiving end decrypts the comment ciphertext after receiving the transaction data and returns a response message to the transaction data sending end by using address information obtained by decryption.
2. The transaction data transmission method of claim 1, wherein determining the encryption key corresponding to each transaction data receiving end through non-interactive key agreement comprises:
generating a public and private key pair corresponding to the transaction data receiving end;
analyzing the address information of the transaction data receiving end to obtain a target public key of the transaction data receiving end;
setting a hash value of a product of a private key of the public and private key pair and the target public key as an intermediate key;
and calculating the hash value of the intermediate key, and setting the hash value of the intermediate key as the encryption key.
3. The transaction data transmission method of claim 2, further comprising:
and sending the public key of the public and private key pair to a corresponding transaction data receiving end so that the transaction data receiving end can execute decryption operation on the annotation ciphertext according to the public key of the public and private key pair.
4. The transaction data transmission method according to claim 1, wherein the annotation information further includes source information of the transaction data and/or usage specification information of the transaction data.
5. The transaction data transmission method of claim 1, further comprising:
and when receiving the response message sent by the transaction data receiving end, generating prompt information of successful transmission of the transaction data.
6. The transaction data transmission method according to claim 1, wherein sending the transaction data and the annotation ciphertext to a corresponding transaction data receiving end comprises:
and performing packing operation on the transaction data and the annotation ciphertext to obtain a data packet to be transmitted, and transmitting the data packet to be transmitted to a corresponding transaction data receiving end.
7. The transaction data transmission system based on the block chain is applied to a transaction data sending end and comprises the following components:
the receiving end determining module is used for receiving the privacy transaction request and determining a plurality of transaction data receiving ends corresponding to the privacy transaction request;
the annotation information generation module is used for determining the transaction data corresponding to each transaction data receiving end and generating annotation information for each transaction data; wherein the annotation information includes address information of the data transmitting end;
the encryption module is used for determining an encryption key corresponding to each transaction data receiving end through non-interactive key agreement and performing encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext;
and the data transmission module is used for transmitting the transaction data and the annotation ciphertext to a corresponding transaction data receiving end, so that the transaction data receiving end decrypts the annotation ciphertext after receiving the transaction data and returns a response message to the transaction data transmitting end by using address information obtained by decryption.
8. The transaction data transmission system of claim 7, wherein the encryption module comprises:
a public and private key pair generating unit, configured to generate a public and private key pair corresponding to the transaction data receiving end;
the target public key analyzing unit is used for analyzing the address information of the transaction data receiving end to obtain a target public key of the transaction data receiving end;
an intermediate key determining unit, configured to set a hash value of a product of a private key of the public-private key pair and the target public key as an intermediate key;
an encryption key determination unit configured to calculate a hash value of the intermediate key and set the hash value of the intermediate key as the encryption key;
and the annotation encryption unit is used for performing encryption operation on annotation information corresponding to the same transaction data receiving end by using the encryption key to obtain an annotation ciphertext.
9. An electronic device comprising a memory having a computer program stored therein and a processor that when invoked on the computer program in the memory implements the steps of the blockchain based transaction data transmission method of any of claims 1 to 6.
10. A storage medium having stored thereon computer-executable instructions which, when loaded and executed by a processor, carry out the steps of the blockchain based transaction data transmission method according to any one of claims 1 to 6.
CN202010081686.7A 2020-02-06 2020-02-06 Transaction data transmission method and system based on block chain and related components Active CN111343150B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010081686.7A CN111343150B (en) 2020-02-06 2020-02-06 Transaction data transmission method and system based on block chain and related components

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010081686.7A CN111343150B (en) 2020-02-06 2020-02-06 Transaction data transmission method and system based on block chain and related components

Publications (2)

Publication Number Publication Date
CN111343150A true CN111343150A (en) 2020-06-26
CN111343150B CN111343150B (en) 2022-11-29

Family

ID=71188055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010081686.7A Active CN111343150B (en) 2020-02-06 2020-02-06 Transaction data transmission method and system based on block chain and related components

Country Status (1)

Country Link
CN (1) CN111343150B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723390A (en) * 2020-06-28 2020-09-29 天津理工大学 Commercial data protection method and system based on supply chain management

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010046296A1 (en) * 2000-01-12 2001-11-29 Murata Kikai Kabushiki Kaisha Encryption method and cryptographic communication method
CN107248994A (en) * 2017-06-26 2017-10-13 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN109064324A (en) * 2018-06-15 2018-12-21 重庆金融资产交易所有限责任公司 Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
CN109508552A (en) * 2018-11-09 2019-03-22 江苏大学 The method for secret protection of distributed cloud storage system
CN109981639A (en) * 2019-03-23 2019-07-05 西安电子科技大学 Distributed trusted network connection method based on block chain
CN110135175A (en) * 2019-04-26 2019-08-16 平安科技(深圳)有限公司 Information processing, acquisition methods, device, equipment and medium based on block chain
CN110225016A (en) * 2019-05-31 2019-09-10 北京理工大学 A kind of data hiding transmission method based on block chain network
CN110519059A (en) * 2019-09-29 2019-11-29 四川师范大学 A kind of block chain dual key concealment address processing method based on bilinear map

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010046296A1 (en) * 2000-01-12 2001-11-29 Murata Kikai Kabushiki Kaisha Encryption method and cryptographic communication method
CN107248994A (en) * 2017-06-26 2017-10-13 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN109064324A (en) * 2018-06-15 2018-12-21 重庆金融资产交易所有限责任公司 Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
CN109508552A (en) * 2018-11-09 2019-03-22 江苏大学 The method for secret protection of distributed cloud storage system
CN109981639A (en) * 2019-03-23 2019-07-05 西安电子科技大学 Distributed trusted network connection method based on block chain
CN110135175A (en) * 2019-04-26 2019-08-16 平安科技(深圳)有限公司 Information processing, acquisition methods, device, equipment and medium based on block chain
CN110225016A (en) * 2019-05-31 2019-09-10 北京理工大学 A kind of data hiding transmission method based on block chain network
CN110519059A (en) * 2019-09-29 2019-11-29 四川师范大学 A kind of block chain dual key concealment address processing method based on bilinear map

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杜瑞颖: "适用于空间 DTN 的非交互式密钥交换协议", 《计算机工程》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723390A (en) * 2020-06-28 2020-09-29 天津理工大学 Commercial data protection method and system based on supply chain management
CN111723390B (en) * 2020-06-28 2023-04-07 天津理工大学 Commercial data protection method and system based on supply chain management

Also Published As

Publication number Publication date
CN111343150B (en) 2022-11-29

Similar Documents

Publication Publication Date Title
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN110290108B (en) Data processing method, system and related equipment in block chain network
US8185476B2 (en) Digital rights management system protecting consumer privacy
CN110071940A (en) Software package encipher-decipher method, server, user equipment and storage medium
CN110335043B (en) Transaction privacy protection method, device and system based on blockchain system
CN110400164B (en) Data determining method and device, storage medium and electronic device
KR101668033B1 (en) An improved implementation of robust and secure content protection in a system-on-a-chip apparatus
CN110912920A (en) Data processing method, apparatus and medium
CN113572743B (en) Data encryption and decryption methods and devices, computer equipment and storage medium
CN112822177B (en) Data transmission method, device, equipment and storage medium
CN113742709B (en) Information processing method and device, readable medium and electronic equipment
CN106161472A (en) A kind of method of data encryption, Apparatus and system
CN109995876A (en) Document transmission method, device, system and computer storage medium
CN114465803A (en) Object authorization method, device, system and storage medium
CN107872315B (en) Data processing method and intelligent terminal
CN110705985B (en) Method and apparatus for storing information
CN106789008B (en) Method, device and system for decrypting sharable encrypted data
CN109510711B (en) Network communication method, server, client and system
US20160210596A1 (en) Method, device and system for controlling presentation of application
CN111343150B (en) Transaction data transmission method and system based on block chain and related components
CN117560150A (en) Key determination method, device, electronic equipment and computer readable storage medium
US9473471B2 (en) Method, apparatus and system for performing proxy transformation
EP3021516A1 (en) Method and server for providing transaction keys
CN110287733B (en) File tamper-proofing method and device
CN107948213A (en) A kind of encryption and authentication method, system, device and computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant