CN111523894A - Data delay publishing method, device and storage medium - Google Patents

Data delay publishing method, device and storage medium Download PDF

Info

Publication number
CN111523894A
CN111523894A CN202010373079.8A CN202010373079A CN111523894A CN 111523894 A CN111523894 A CN 111523894A CN 202010373079 A CN202010373079 A CN 202010373079A CN 111523894 A CN111523894 A CN 111523894A
Authority
CN
China
Prior art keywords
transaction
delayed
publishing
root
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010373079.8A
Other languages
Chinese (zh)
Inventor
马登极
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN202010373079.8A priority Critical patent/CN111523894A/en
Publication of CN111523894A publication Critical patent/CN111523894A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data delay publishing method, a device and a storage medium, wherein the method comprises the following steps: receiving a delayed publishing original transaction; when the original transaction can be packed into a block, public keys of a plurality of nodes are selected, and a secret key and a Merkel root are generated according to the public keys; encrypting the original text by using the secret key to generate a first ciphertext, and generating a delayed publishing encryption transaction according to the first ciphertext; replacing the encrypted transaction with the original transaction; respectively generating data sets of the selected nodes; respectively sending each data set to each corresponding node; and when the verification transaction is executed, calculating to obtain a second Merkel root according to the public key and the Merkel root path in the executed verification transaction, wherein the second Merkel root is the same as the Merkel root recorded by the corresponding delayed publishing encryption transaction, and the secret key of the corresponding encryption transaction is restored when the public key in each verification transaction which is executed successfully is enough to restore the secret key of the corresponding encryption transaction. The application realizes automatic delay of publishing information.

Description

Data delay publishing method, device and storage medium
Technical Field
The present application relates to the field of block chaining technologies, and in particular, to a data delay publishing method, device, and storage medium.
Background
The delayed public of some information in society has certain requirements, such as decryption of detailed contents of some thesis, and some commercial information can firstly publish some abstracts to attract the requirements of consumers, such as obtaining the detailed information, paying or waiting for a certain time and then decrypting freely as a public purpose; the existing delayed publishing method is to encrypt the information to be delayed published to generate encrypted information, break up the encrypted information, record the broken encrypted information to a block chain step by step after a period of time, and collect the broken encrypted information and decrypt and restore the information by a user. In the mechanism, the information is restored seriously by manual decryption, and automatic decryption cannot be realized; when the broken encrypted information is published, if the incorrect broken encrypted information is recorded on the block chain, the user cannot restore the information according to the collected broken encrypted information.
Disclosure of Invention
In view of the above-mentioned drawbacks and deficiencies of the prior art, it is desirable to provide a data delay publishing method, apparatus, and storage medium that automatically delays publishing information.
In a first aspect, the present invention provides a data delay publishing method suitable for a blockchain node, where the method includes:
receiving a first delayed publishing original transaction, and storing the first delayed publishing original transaction in a transaction pool; the first delayed publishing original transaction comprises a first original text and first delayed information;
when the mining right of the first block with the first block height is obtained and the first delay publication original transaction can be packaged into the first block, sequentially executing the following steps:
randomly selecting public keys of a first number of block chain nodes, and generating a first secret key according to each public key and a preset secret key generation rule;
generating a first Merkel root according to each public key;
symmetrically encrypting the first original text by using a first secret key to generate a first ciphertext, and generating a first delayed publishing encryption transaction according to the first ciphertext, the first delayed information and the first Merkel root;
replacing the first delayed publishing original transaction with the first delayed publishing encrypted transaction, packaging the first delayed publishing encrypted transaction into a first block, and recording a first ciphertext, first delay information and a first Meckel root on a block chain when the first delayed publishing encrypted transaction is executed;
respectively generating a first data set of each selected block chain node; the first data set comprises a Merker root path of a public key of a corresponding block chain node when generating a first Merker root, a first transaction hash of a first delayed publishing encryption transaction and first delay information;
respectively sending each first data set to each corresponding block chain node so as to determine a second block height according to the first block height and the first delay information, and generating a first verification transaction according to the second data set and broadcasting the first verification transaction to other block chain nodes when the block height reaches the second block height; wherein the second data set comprises the held public key, the received Merkel root path in the first data set and the first transaction hash;
when the verification transaction is executed, calculating to obtain a second Merkel root according to the public key and the Merkel root path in the executed verification transaction, and judging whether the second Merkel root is the same as the Merkel root recorded by the delayed publishing encryption transaction corresponding to the executed verification transaction:
if yes, judging whether the public key in each verification transaction which is successfully executed is enough to restore the corresponding secret key of the delayed publishing encryption transaction:
if yes, restoring a corresponding secret key for delayed publishing encrypted transaction according to the public key in each successfully executed verification transaction, and recording the restored secret key to the block chain;
the restored secret key is used for the user side of each user to decrypt the corresponding delayed publishing encryption transaction so as to obtain the corresponding original text.
In a second aspect, the present invention provides a data delay publishing method suitable for a blockchain node, where the method includes:
receiving a first delayed publishing original transaction, and storing the first delayed publishing original transaction in a transaction pool; the first delayed publishing original transaction comprises a first original text and first delayed information;
when the mining right of the first block with the first block height is obtained and the first delay publication original transaction can be packaged into the first block, sequentially executing the following steps:
randomly selecting public keys of a first number of block chain nodes, and generating a first secret key according to each public key and a preset secret key generation rule;
generating a first Merkel root according to each public key;
symmetrically encrypting the first original text by using a first secret key to generate a first ciphertext, and generating a first delayed publishing encryption transaction according to the first ciphertext, the first delayed information and the first Merkel root;
replacing the first delayed publishing original transaction with the first delayed publishing encrypted transaction, packaging the first delayed publishing encrypted transaction into a first block, and recording a first ciphertext, first delay information and a first Meckel root on a block chain when the first delayed publishing encrypted transaction is executed;
respectively generating a first data set of each selected block chain node; the first data set comprises a Merker root path of a public key of a corresponding block chain node when generating a first Merker root, a first transaction hash of a first delayed publishing encryption transaction and first delay information;
respectively sending each first data set to each corresponding block chain node so as to determine a second block height according to the first block height and the first delay information, and generating a first verification transaction according to the second data set and broadcasting the first verification transaction to other block chain nodes when the block height reaches the second block height; wherein the second data set comprises the held public key, the received Merkel root path in the first data set and the first transaction hash;
when the verification transaction is executed, calculating to obtain a second Merkel root according to the public key and the Merkel root path in the executed verification transaction, and judging whether the second Merkel root is the same as the Merkel root recorded by the delayed publishing encryption transaction corresponding to the executed verification transaction:
if yes, recording the verification transaction which is successfully executed on the blockchain;
wherein, each user's user end still is used for:
judging whether the public key in each verification transaction which is successfully executed is enough to restore the corresponding secret key of the delayed publishing encryption transaction: if yes, restoring the key of the corresponding delayed publishing encrypted transaction according to the public key in each successfully executed verification transaction, and decrypting the corresponding delayed publishing encrypted transaction according to the restored key to obtain the corresponding original text.
In a third aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a data delay publishing method provided according to embodiments of the present invention.
In a fourth aspect, the present invention further provides a storage medium storing a computer program, where the computer program makes a computer execute the data delay publishing method provided in accordance with the embodiments of the present invention.
The data delay publishing method, the data delay publishing device and the data delay publishing storage medium provided by the embodiments of the invention publish the original transaction by receiving the delay; when the original transaction can be packed into a block, public keys of a plurality of nodes are selected, and a secret key and a Merkel root are generated according to the public keys; encrypting the original text by using the secret key to generate a first ciphertext, and generating a delayed publishing encryption transaction according to the first ciphertext; replacing the encrypted transaction with the original transaction; respectively generating data sets of the selected nodes; respectively sending each data set to each corresponding node; and when the verification transaction is executed, calculating to obtain a second Merkel root according to the public key and the Merkel root path in the executed verification transaction, wherein the second Merkel root is the same as the Merkel root recorded by the corresponding delayed publishing encryption transaction, and the public key in each successfully executed verification transaction is enough to restore the secret key of the corresponding encryption transaction, thereby realizing the method for restoring the secret key of the corresponding encryption transaction and realizing the automatic delayed publishing of information.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a data delay publishing method according to an embodiment of the present invention.
Fig. 2 is a flowchart of another data delay publishing method according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of a data delay publishing method according to an embodiment of the present invention. As shown in fig. 1, in this embodiment, the present invention provides a data delay publishing method applicable to a blockchain node, where the method includes:
s11: receiving a first delayed publishing original transaction, and storing the first delayed publishing original transaction in a transaction pool; the first delayed publishing original transaction comprises a first original text and first delayed information;
when the mining right of the first block with the first block height is obtained and the first delay publication original transaction can be packaged into the first block, sequentially executing the following steps:
s121: randomly selecting public keys of a first number of block chain nodes, and generating a first secret key according to each public key and a preset secret key generation rule;
s122: generating a first Merkel root according to each public key;
s123: symmetrically encrypting the first original text by using a first secret key to generate a first ciphertext, and generating a first delayed publishing encryption transaction according to the first ciphertext, the first delayed information and the first Merkel root;
s124: replacing the first delayed publishing original transaction with the first delayed publishing encrypted transaction, packaging the first delayed publishing encrypted transaction into a first block, and recording a first ciphertext, first delay information and a first Meckel root on a block chain when the first delayed publishing encrypted transaction is executed;
s125: respectively generating a first data set of each selected block chain node; the first data set comprises a Merker root path of a public key of a corresponding block chain node when generating a first Merker root, a first transaction hash of a first delayed publishing encryption transaction and first delay information;
s126: respectively sending each first data set to each corresponding block chain node so as to determine a second block height according to the first block height and the first delay information, and generating a first verification transaction according to the second data set and broadcasting the first verification transaction to other block chain nodes when the block height reaches the second block height; wherein the second data set comprises the held public key, the received Merkel root path in the first data set and the first transaction hash;
s131: when the verification transaction is executed, calculating to obtain a second Merkel root according to the public key and the Merkel root path in the executed verification transaction, and judging whether the second Merkel root is the same as the Merkel root recorded by the delayed publishing encryption transaction corresponding to the executed verification transaction:
if yes, go to step S132: judging whether the public key in each verification transaction which is successfully executed is enough to restore the corresponding secret key of the delayed publishing encryption transaction:
if yes, go to step S1321: restoring a corresponding secret key for delayed publishing encrypted transaction according to the public key in each successfully executed verification transaction, and recording the restored secret key to the block chain;
the restored secret key is used for the user side of each user to decrypt the corresponding delayed publishing encryption transaction so as to obtain the corresponding original text.
Specifically, determining whether the public key in each successfully executed verification transaction is sufficient to restore the corresponding key of the delayed publishing encryption transaction includes determining whether a third number of successfully executed verification transactions is equal to a fourth number, where the fourth number is a number of public keys used to generate a michael root recorded by the corresponding delayed publishing encryption transaction; the delay information is offset height; the pre-configured secret key generation rule is that all the selected public keys are connected in series to generate a secret key as an example;
assuming that A obtains the mining right of block (100), the first quantity is 3, and the public key of the 3 block chain nodes selected by A is the public key pub _ B, pub _ C, pub _ D of B, C, D; the offset height is 1000;
taking the current node as a:
step S11 is executed, the original transaction tx1_ ori is received and published in a delayed mode, and tx1_ ori is stored in a transaction pool; tx1_ ori includes plaintext and 1000;
when a obtains the cut right of block (100) and tx1_ ori can be packed into block (100), a performs in sequence:
a executes step S121, selecting B, C, D public key pub _ B, pub _ C, pub _ D, and generating a first key (pwd ═ pub _ B + pub _ C + pub _ D) according to pub _ B, pub _ C, pub _ D and a preconfigured key generation rule;
a, executing the step S122, and generating Merkel root merkleothorash according to pub _ B, pub _ C, pub _ D;
step S123 is executed, the original text is symmetrically encrypted by pwd to generate a ciphertext, and a first delayed publishing encryption transaction tx1_ enc is generated according to the ciphertext, 1000 and merkleothash;
step S124 is executed, tx1_ enc is used for replacing tx1_ ori, tx1_ enc is packaged into block (100), and ciphertext, 1000 and merkleroothash are recorded on a block chain when tx1_ enc is executed;
a executes step S125 to generate data set dataset _ D of data set dataset _ C, D of data set dataset _ B, C of B;
dataset _ B includes path _ B (path _ B is the merkel root path of pub _ B when merklerooth ash is generated), transaction hash of tx1_ enc (hash (tx1_ enc), 1000;
dataset _ C comprises path _ C (path _ C is the Merkel root path of pub _ C when merklerooth ash is generated), hash (tx1_ enc), 1000;
dataset _ D comprises path _ D (path _ D is the Merkel root path of pub _ D when merklerooth ash is generated), hash (tx1_ enc), 1000;
step S126 is executed by A, and dataset _ B, dataset _ C and dataset _ D are transmitted to B, C and D respectively;
b determines a second block height 1100 according to 100 and 1000, and generates a verification transaction tx _ ve r _ B according to Pub _ B, path _ B and hash (tx1_ enc) when the block height reaches 1100;
c determining a second block height 1100 according to 100 and 1000, and generating a verification transaction tx _ ve r _ C according to Pub _ C, path _ C and hash (tx1_ enc) when the block height reaches 1100;
d determining a second block height 1100 according to 100 and 1000, and generating a verification transaction tx _ ve r _ D according to Pub _ D, path _ D and hash (tx1_ enc) when the block height reaches 1100;
suppose a receives each verification transaction in the order of tx _ ver _ B, tx _ ver _ C, tx _ ver _ D and tx _ ver _ B, tx _ ver _ C, tx _ ver _ D can both execute successfully (indicating that the meikerr root of tx _ ver _ B, tx _ ver _ C, tx _ ver _ D is the same as the meikerr root recorded for the deferred publishing encrypted transaction corresponding to the executed verification transaction);
step S131 is executed, Merkel root merkleothorash 'is obtained through calculation according to pub _ B and path _ B when tx _ ver _ B is executed, and whether merkleothorash' is the same as merkleothorash is judged:
if yes, go to step S132: judging whether the public key in each verification transaction which is successfully executed is enough to restore the corresponding secret key of the delayed publishing encryption transaction:
since only 1 (tx _ ver _ B), less than 3, successfully performed authentication transaction is not enough to restore pwd of tx1_ enc;
step S131 is executed, Merkel root merkleothorash is obtained through calculation according to pub _ C and path _ C when tx _ ver _ C is executed, and whether merkleothorash' is the same as merkleothorash is judged:
if yes, go to step S132: judging whether the public key in each verification transaction which is successfully executed is enough to restore the corresponding secret key of the delayed publishing encryption transaction:
since there are only 2 (tx _ ver _ B, tx _ ver _ C), less than 3, verification transactions that were successfully performed, it is not enough to restore pwd for tx1_ enc;
step S131 is executed, Merkel root merklerooth '″ is obtained through calculation according to pub _ D and path _ D when tx _ ver _ D is executed, and whether merklerooth' ″ is the same as merklerooth is judged:
if yes, go to step S132: judging whether the public key in each verification transaction which is successfully executed is enough to restore the corresponding secret key of the delayed publishing encryption transaction:
since there are 3 (tx _ ver _ B, tx _ ver _ C, tx _ v er _ D) authentication transactions successfully performed, which are the same as the number (3) of public keys used to generate the mekerr root recorded by tx1_ enc, step S1321 is performed: restoring pwd of tx1_ e nc according to pub _ B, pub _ C, pub _ D, and recording the restored pwd of tx1_ enc on a block chain;
the pwd of the restored tx1_ enc is used for the user side of each user to decrypt the tx1_ enc to obtain the corresponding original text.
In more embodiments, the delay information may be configured to a certain fixed block height according to actual requirements, so that the same technical effect can be achieved.
In further embodiments, the preconfigured key generation rule may also be configured according to actual requirements, for example, configured to concatenate the selected public keys, and perform a hash operation on the concatenated strings to generate the key, so as to achieve the same technical effect.
In more embodiments, since the verification transaction needs to be sent after being signed by the node, and the necessary step of transaction execution is to perform signature verification, the public key held by the node sending the verification transaction can be acquired in the process of signature verification, so that the parameter of the held public key can not be included in the verification transaction, and the same technical effect can be achieved.
In further embodiments, the first number may also be configured according to actual requirements, for example, configured as 4, and the same technical effect may be achieved.
In further embodiments, an operation when the second mekerr root is different from the mekerr root recorded in the delayed publishing encryption exchange corresponding to the executed verification exchange may be further configured according to actual requirements, for example, configured to: updating the number of abnormal transmissions of the block link points that generated the executed validation transaction; or, configured to: updating the abnormal sending times of the blockchain node generating the executed verification transaction, and shielding other transactions generated by the blockchain node generating the executed verification transaction when the abnormal sending times reach a pre-configured numerical value; the same technical effect can be achieved.
The above-described embodiments enable automatic deferred publication of information.
Preferably, generating the first meikerr root from the respective public keys comprises:
generating a second number of error correcting codes according to the Reed Solomon coding rule and each public key, and generating a first Meckel root according to each public key and each error correcting code;
generating a first delayed publishing encryption transaction according to the first ciphertext, the first delay information and the first Meckel root comprises the following steps:
generating a first delayed publishing encryption transaction according to the first ciphertext, the first delay information, the first Meckel root and each error correcting code;
recording the first ciphertext, the first delay information, and the first Merkel root onto the blockchain when performing the first delayed publishing encryption transaction comprises:
recording a first ciphertext, first delay information, a first Meckel root and each error correction code on a block chain when executing a first delayed publishing encryption transaction;
the step of restoring the corresponding key of the delayed publishing encryption transaction according to the public key in each successfully executed verification transaction comprises the following steps:
and restoring the secret key of the corresponding delayed publishing encryption transaction according to the public key in each successfully executed verification transaction and each error correcting code of the corresponding delayed publishing encryption transaction.
In the method shown in fig. 1, if a blockchain node does not receive any of tx _ ver _ B, tx _ ver _ C, tx _ ver _ D to verify a transaction, or a blockchain node receives tx _ ver _ B, tx _ ver _ C, tx _ ver _ D, but any of merkleothash ', merkleothiash' ″ is different from merkleothash, then the blockchain node cannot restore pwd of tx1_ enc;
the problems that may arise with the mechanism of FIG. 1 are solved according to the steps shown in the preferred embodiment described above;
take the second number as 2 for example;
in step S122, a generates 2 error correction codes code _1, code _2 according to Reed Solomon encoding rules and pub _ B, pub _ C, pub _ D, and generates merkleroothash according to pub _ B, pub _ C, pub _ D and code _1, code _ 2;
in step S123, a symmetrically encrypts the plaintext with pwd to generate a ciphertext, and generates a first delayed post encrypted transaction tx1_ enc according to the ciphertext, 1000, merklerooth, code1 and code 2;
in the execution step S124, a replaces tx1_ ori with tx1_ enc, packs tx1_ enc into block (100), and records ciphertext, 1000, merklerooth and code1, and code2 on the block chain when tx1_ enc is executed;
in the B, C, D, executing step "recovering the corresponding key of the deferred publishing encryption transaction according to the public key in each successfully executed verification transaction", where the number of successfully executed verification transactions is not less than 1, B, C, D may recover the key of tx1_ enc according to the public key in each successfully executed verification transaction, code1, and code 2;
in further embodiments, the second number may also be configured according to actual requirements, for example, configured as 1, and the same technical effect may be achieved.
In more embodiments, the Reed Solomon encoding rule can be replaced by other encoding rules according to actual requirements, for example, the Reed Solomon encoding rule is configured as a BCH encoding rule, and the same technical effect can be achieved.
The above embodiment increases the probability of successfully reducing pwd of tx1_ enc.
Preferably, the determining whether the public key in each successfully executed verification transaction is sufficient to recover the key of the corresponding deferred publishing encryption transaction includes:
determining whether the third number of successfully executed validation transactions is equal to the fourth number; and the fourth quantity is the quantity of the public keys of the Merkel root recorded for generating the corresponding delayed publishing encryption exchange.
The data delay publishing principle of the above embodiment can refer to the method shown in fig. 1, and is not described herein again.
Preferably, the calculating the second meikern root according to the public key and the meikern root path in the executed verification transaction when executing the verification transaction includes:
determining the height of a third block according to the height of the block corresponding to the packaging of the delayed publishing encrypted transaction and the delay information in the corresponding delayed publishing encrypted transaction;
judging whether the block height when receiving the verification transaction is not less than the third block height:
if yes, a second Merkel root is calculated according to the public key and the Merkel root path in the executed verification transaction when the verification transaction is executed.
In further embodiments, the operation when the block height when receiving the verification transaction is smaller than the third block height may be configured according to actual requirements, for example, configured to: updating the number of abnormal transmissions of the block link points that generated the executed validation transaction; or, configured to: updating the abnormal sending times of the blockchain node generating the executed verification transaction, and shielding other transactions generated by the blockchain node generating the executed verification transaction when the abnormal sending times reach a pre-configured numerical value; the same technical effect can be achieved.
Preferably, randomly selecting the public keys of the first number of block link points comprises:
sending PING messages to a plurality of block chain nodes;
and randomly selecting public keys of the first number of block chain link points in each block chain node returning the PONG message.
The above embodiment increases the probability of successfully reducing pwd of tx1_ enc.
Fig. 2 is a flowchart of another data delay publishing method according to an embodiment of the present invention. As shown in fig. 2, in this embodiment, the present invention provides a data delay publishing method suitable for a blockchain node, where the method includes:
s31: receiving a first delayed publishing original transaction, and storing the first delayed publishing original transaction in a transaction pool; the first delayed publishing original transaction comprises a first original text and first delayed information;
when the mining right of the first block with the first block height is obtained and the first delay publication original transaction can be packaged into the first block, sequentially executing the following steps:
s321: randomly selecting public keys of a first number of block chain nodes, and generating a first secret key according to each public key and a preset secret key generation rule;
s322: generating a first Merkel root according to each public key;
s323: symmetrically encrypting the first original text by using a first secret key to generate a first ciphertext, and generating a first delayed publishing encryption transaction according to the first ciphertext, the first delayed information and the first Merkel root;
s324: replacing the first delayed publishing original transaction with the first delayed publishing encrypted transaction, packaging the first delayed publishing encrypted transaction into a first block, and recording a first ciphertext, first delay information and a first Meckel root on a block chain when the first delayed publishing encrypted transaction is executed;
s325: respectively generating a first data set of each selected block chain node; the first data set comprises a Merker root path of a public key of a corresponding block chain node when generating a first Merker root, a first transaction hash of a first delayed publishing encryption transaction and first delay information;
s326: respectively sending each first data set to each corresponding block chain node so as to determine a second block height according to the first block height and the first delay information, and generating a first verification transaction according to the second data set and broadcasting the first verification transaction to other block chain nodes when the block height reaches the second block height; wherein the second data set comprises the held public key, the received Merkel root path in the first data set and the first transaction hash;
s331: when the verification transaction is executed, calculating to obtain a second Merkel root according to the public key and the Merkel root path in the executed verification transaction, and judging whether the second Merkel root is the same as the Merkel root recorded by the delayed publishing encryption transaction corresponding to the executed verification transaction:
if yes, go to step S332: recording the verification transaction which is successfully executed on the blockchain;
wherein, each user's user end still is used for:
judging whether the public key in each verification transaction which is successfully executed is enough to restore the corresponding secret key of the delayed publishing encryption transaction: if yes, restoring the key of the corresponding delayed publishing encrypted transaction according to the public key in each successfully executed verification transaction, and decrypting the corresponding delayed publishing encrypted transaction according to the restored key to obtain the corresponding original text.
In further embodiments, an operation that the second mekeral root is not synchronized with the mekeral root recorded by the executed verification exchange corresponding to the delayed publishing encryption exchange may be further configured according to actual requirements, for example, configured to: recording the verification transaction which fails to be executed on the blockchain; or, configured to: the same technical effect can be achieved without recording the verification transaction that fails to execute on the blockchain.
The method shown in fig. 2 is different from the method shown in fig. 1 in that in the method shown in fig. 2, the blockchain node does not need to calculate the key of the corresponding delayed publishing encrypted transaction by itself and record the key to the blockchain; when the public key in each successfully executed verification transaction is enough to restore the corresponding key of the delayed publishing encryption transaction, the user side of the user needs to restore the corresponding key of the delayed publishing encryption transaction according to the public key in each successfully executed verification transaction, and decrypt the corresponding delayed publishing encryption transaction according to the restored key to obtain the corresponding original text.
Preferably, generating the first meikerr root from the respective public keys comprises:
generating a second number of error correcting codes according to the Reed Solomon coding rule and each public key, and generating a first Meckel root according to each public key and each error correcting code;
generating a first delayed publishing encryption transaction according to the first ciphertext, the first delay information and the first Meckel root comprises the following steps:
generating a first delayed publishing encryption transaction according to the first ciphertext, the first delay information, the first Meckel root and each error correcting code;
recording the first ciphertext, the first delay information, and the first Merkel root onto the blockchain when performing the first delayed publishing encryption transaction comprises:
recording a first ciphertext, first delay information, a first Meckel root and each error correction code on a block chain when executing a first delayed publishing encryption transaction;
the step of restoring the corresponding key of the delayed publishing encryption transaction according to the public key in each successfully executed verification transaction comprises the following steps:
and restoring the secret key of the corresponding delayed publishing encryption transaction according to the public key in each successfully executed verification transaction and each error correcting code in the corresponding delayed publishing encryption transaction.
Preferably, the determining whether the public key in each successfully executed verification transaction is sufficient to recover the key of the corresponding delayed publishing transaction includes:
determining whether the third number of successfully executed validation transactions is equal to the fourth number; and the fourth quantity is the quantity of the public keys used for generating the Merkel root recorded by the corresponding delayed publishing transaction.
Preferably, the calculating the second meikern root according to the public key and the meikern root path in the executed verification transaction when executing the verification transaction includes:
determining the height of a third block according to the height of the block corresponding to the packaging of the delayed publishing encrypted transaction and the delay information in the corresponding delayed publishing encrypted transaction;
judging whether the block height when receiving the verification transaction is not less than the third block height:
if yes, a second Merkel root is calculated according to the public key and the Merkel root path in the executed verification transaction when the verification transaction is executed.
Preferably, randomly selecting the public keys of the first number of block link points comprises:
sending PING messages to a plurality of block chain nodes;
and randomly selecting public keys of the first number of block chain link points in each block chain node returning the PONG message.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present invention. As shown in fig. 3, as another aspect, the present application also provides an apparatus 400 including one or more Central Processing Units (CPUs) 401 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the device 400 are also stored. The CPU401, ROM402, and RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
In particular, according to an embodiment of the present disclosure, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing any of the methods described above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 409, and/or installed from the removable medium 411.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (12)

1. A data delay publishing method is applied to a blockchain node, and comprises the following steps:
receiving a first delayed publishing original transaction, and storing the first delayed publishing original transaction in a transaction pool; the first delayed publishing original transaction comprises a first original text and first delayed information;
when the mining right of the first block with the first block height is obtained and the first delay publishes that the original transaction can be packaged into the first block, sequentially executing the following steps:
randomly selecting public keys of a first number of block chain nodes, and generating a first secret key according to each public key and a preset secret key generation rule;
generating a first Meckel root according to each public key;
symmetrically encrypting the first original text by using the first secret key to generate a first ciphertext, and generating a first delayed publishing encryption transaction according to the first ciphertext, the first delayed information and the first Merkel root;
replacing the first delayed publishing original transaction with the first delayed publishing encrypted transaction, packaging the first delayed publishing encrypted transaction into the first block, and recording the first ciphertext, the first delay information and the first Merkel root on a block chain when the first delayed publishing encrypted transaction is executed;
respectively generating a first data set of each selected block chain node; the first data set comprises a Merker root path of a public key of the corresponding blockchain node when the first Merker root is generated, a first transaction hash of the first delayed publishing encryption transaction and the first delay information;
respectively sending each first data set to each corresponding block chain node so as to determine a second block height according to the first block height and the first delay information, and generating a first verification transaction according to the second data set and broadcasting the first verification transaction to other block chain nodes when the block height reaches the second block height; wherein the second data set comprises the held public key, the received Merkel root path in the first data set, and the first transaction hash;
when the verification transaction is executed, calculating to obtain a second Merkel root according to a public key and a Merkel root path in the executed verification transaction, and judging whether the second Merkel root is the same as the Merkel root recorded by a delayed publishing encryption transaction corresponding to the executed verification transaction:
if yes, judging whether the public key in each verification transaction which is successfully executed is enough to restore the corresponding secret key of the delayed publishing encryption transaction:
if yes, restoring a corresponding secret key for delayed publishing encrypted transaction according to the public key in each successfully executed verification transaction, and recording the restored secret key to the block chain;
the restored secret key is used for the user side of each user to decrypt the corresponding delayed publishing encryption transaction so as to obtain the corresponding original text.
2. The method of claim 1, wherein generating a first Meckel root from each of the public keys comprises:
generating a second number of error correcting codes according to a Reed Solomon coding rule and each public key, and generating a first Meckel root according to each public key and each error correcting code;
the generating of the first delayed publishing encryption transaction according to the first ciphertext, the first delay information and the first meiker root comprises:
generating a first delayed publishing encryption transaction according to the first ciphertext, the first delay information, the first Meckel root and each error correcting code;
the recording the first ciphertext, the first latency information, and the first Merkel root onto a blockchain when performing the first delayed publishing encryption transaction comprises:
recording the first ciphertext, the first latency information, the first Merkel root, and each error correction code onto a blockchain when the first delayed disclosure encryption transaction is performed;
the recovering of the corresponding key of the delayed publishing encryption transaction according to the public key in each successfully executed verification transaction comprises:
and restoring the secret key of the corresponding delayed publishing encryption transaction according to the public key in each successfully executed verification transaction and each error correcting code of the corresponding delayed publishing encryption transaction.
3. The method of claim 1, wherein determining whether the public key in each successfully performed authentication transaction is sufficient to recover the key of the corresponding deferred publication encrypted transaction comprises:
determining whether the third number of successfully executed validation transactions is equal to the fourth number; and the fourth quantity is the quantity of the public keys of the Merkel root recorded for generating the corresponding delayed publishing encryption exchange.
4. The method of claim 1, wherein computing the second mekeral root from the public key and the mekeral root path in the performed authentication transaction when performing the authentication transaction comprises:
determining the height of a third block according to the height of the block corresponding to the packaging of the delayed publishing encrypted transaction and the delay information in the corresponding delayed publishing encrypted transaction;
judging whether the block height when receiving the verification transaction is not less than the third block height:
if yes, a second Merkel root is calculated according to the public key and the Merkel root path in the executed verification transaction when the verification transaction is executed.
5. The method of claim 1, wherein said randomly choosing the public key for the first number of block link points comprises:
sending PING messages to a plurality of block chain nodes;
and randomly selecting public keys of the first number of block chain link points in each block chain node returning the PONG message.
6. A data delay publishing method is applied to a blockchain node, and comprises the following steps:
receiving a first delayed publishing original transaction, and storing the first delayed publishing original transaction in a transaction pool; the first delayed publishing original transaction comprises a first original text and first delayed information;
when the mining right of the first block with the first block height is obtained and the first delay publishes that the original transaction can be packaged into the first block, sequentially executing the following steps:
randomly selecting public keys of a first number of block chain nodes, and generating a first secret key according to each public key and a preset secret key generation rule;
generating a first Meckel root according to each public key;
symmetrically encrypting the first original text by using the first secret key to generate a first ciphertext, and generating a first delayed publishing encryption transaction according to the first ciphertext, the first delayed information and the first Merkel root;
replacing the first delayed publishing original transaction with the first delayed publishing encrypted transaction, packaging the first delayed publishing encrypted transaction into the first block, and recording the first ciphertext, the first delay information and the first Merkel root on a block chain when the first delayed publishing encrypted transaction is executed;
respectively generating a first data set of each selected block chain node; the first data set comprises a Merker root path of a public key of the corresponding blockchain node when the first Merker root is generated, a first transaction hash of the first delayed publishing encryption transaction and the first delay information;
respectively sending each first data set to each corresponding block chain node so as to determine a second block height according to the first block height and the first delay information, and generating a first verification transaction according to the second data set and broadcasting the first verification transaction to other block chain nodes when the block height reaches the second block height; wherein the second data set comprises the held public key, the received Merkel root path in the first data set, and the first transaction hash;
when the verification transaction is executed, calculating to obtain a second Merkel root according to a public key and a Merkel root path in the executed verification transaction, and judging whether the second Merkel root is the same as the Merkel root recorded by a delayed publishing encryption transaction corresponding to the executed verification transaction:
if yes, recording the verification transaction which is successfully executed on the blockchain; wherein, each user's user end still is used for:
judging whether the public key in each verification transaction which is successfully executed is enough to restore the corresponding secret key of the delayed publishing encryption transaction: if yes, restoring the key of the corresponding delayed publishing encrypted transaction according to the public key in each successfully executed verification transaction, and decrypting the corresponding delayed publishing encrypted transaction according to the restored key to obtain the corresponding original text.
7. The method of claim 6, wherein generating a first Meckel root from each of the public keys comprises:
generating a second number of error correcting codes according to a Reed Solomon coding rule and each public key, and generating a first Meckel root according to each public key and each error correcting code;
the generating of the first delayed publishing encryption transaction according to the first ciphertext, the first delay information and the first meiker root comprises:
generating a first delayed publishing encryption transaction according to the first ciphertext, the first delay information, the first Meckel root and each error correcting code;
the recording the first ciphertext, the first latency information, and the first Merkel root onto a blockchain when performing the first delayed publishing encryption transaction comprises:
recording the first ciphertext, the first latency information, the first Merkel root, and each error correction code onto a blockchain when the first delayed disclosure encryption transaction is performed;
the recovering of the corresponding key of the delayed publishing encryption transaction according to the public key in each successfully executed verification transaction comprises:
and restoring the secret key of the corresponding delayed publishing encryption transaction according to the public key in each successfully executed verification transaction and each error correcting code in the corresponding delayed publishing encryption transaction.
8. The method of claim 6, wherein determining whether the public key in each successfully performed verification transaction is sufficient to recover the corresponding key of the deferred publication transaction comprises:
determining whether the third number of successfully executed validation transactions is equal to the fourth number; and the fourth quantity is the quantity of the public keys of the Merkel root for generating the corresponding delay publishing transaction order record.
9. The method of claim 6, wherein computing the second Merkel root from the public key and the Merkel root path in the performed authentication transaction when performing the authentication transaction comprises:
determining the height of a third block according to the height of the block corresponding to the packaging of the delayed publishing encrypted transaction and the delay information in the corresponding delayed publishing encrypted transaction;
judging whether the block height when receiving the verification transaction is not less than the third block height:
if yes, a second Merkel root is calculated according to the public key and the Merkel root path in the executed verification transaction when the verification transaction is executed.
10. The method of claim 9, wherein said randomly choosing the public key for the first number of block link points comprises:
sending PING messages to a plurality of block chain nodes;
and randomly selecting public keys of the first number of block chain link points in each block chain node returning the PONG message.
11. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-10.
12. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-10.
CN202010373079.8A 2020-05-06 2020-05-06 Data delay publishing method, device and storage medium Pending CN111523894A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010373079.8A CN111523894A (en) 2020-05-06 2020-05-06 Data delay publishing method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010373079.8A CN111523894A (en) 2020-05-06 2020-05-06 Data delay publishing method, device and storage medium

Publications (1)

Publication Number Publication Date
CN111523894A true CN111523894A (en) 2020-08-11

Family

ID=71908398

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010373079.8A Pending CN111523894A (en) 2020-05-06 2020-05-06 Data delay publishing method, device and storage medium

Country Status (1)

Country Link
CN (1) CN111523894A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111985922A (en) * 2020-08-26 2020-11-24 冒炜 Information distribution method based on block chain offline payment and digital financial service platform
CN112381543A (en) * 2020-12-09 2021-02-19 杭州复杂美科技有限公司 Multiple signature transaction method, device and storage medium
WO2022121348A1 (en) * 2020-12-09 2022-06-16 杭州复杂美科技有限公司 Delayed transaction generation method, delayed transaction execution method, and device and storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100185863A1 (en) * 2006-12-01 2010-07-22 Rabin Michael O Method and apparatus for time-lapse cryptography
CN108009810A (en) * 2017-12-27 2018-05-08 光载无限(北京)科技有限公司 A kind of Trusted Digital transaction in assets method
WO2018115567A1 (en) * 2016-12-19 2018-06-28 Nokia Technologies Oy Method and apparatus for private data transfer between parties
KR101924026B1 (en) * 2017-11-10 2018-11-30 부산대학교 산학협력단 System and method for blockchain using hash-based signature scheme
CN109598506A (en) * 2018-11-02 2019-04-09 克洛斯比尔有限公司 Block chain accurately postpones the method for encryption, system, calculates equipment and computer readable storage medium
CA3040601A1 (en) * 2018-11-27 2019-04-18 Alibaba Group Holding Limited System and method for information protection
CN110009334A (en) * 2018-11-07 2019-07-12 阿里巴巴集团控股有限公司 A kind of building Mei Keer tree, simple payment verification method and device
CN110175840A (en) * 2019-04-19 2019-08-27 华中科技大学 Method, client, alliance's chain and the system of light wallet mechanism are realized in alliance's chain
CN110300173A (en) * 2019-06-28 2019-10-01 杭州复杂美科技有限公司 Decentralization date storage method, verification method, equipment and storage medium
US20200013025A1 (en) * 2018-07-06 2020-01-09 International Business Machines Corporation Conditional deferred transactions for blockchain
WO2020022599A1 (en) * 2018-07-27 2020-01-30 박기업 Node group managing device and computing device for configuring group key-based dual signature transaction structure in blockchain network
CN110930157A (en) * 2019-11-14 2020-03-27 杭州复杂美科技有限公司 Delayed transaction processing method, device and storage medium
CN110992009A (en) * 2019-12-04 2020-04-10 杭州复杂美科技有限公司 Delayed transaction advanced processing method, device and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100185863A1 (en) * 2006-12-01 2010-07-22 Rabin Michael O Method and apparatus for time-lapse cryptography
WO2018115567A1 (en) * 2016-12-19 2018-06-28 Nokia Technologies Oy Method and apparatus for private data transfer between parties
KR101924026B1 (en) * 2017-11-10 2018-11-30 부산대학교 산학협력단 System and method for blockchain using hash-based signature scheme
CN108009810A (en) * 2017-12-27 2018-05-08 光载无限(北京)科技有限公司 A kind of Trusted Digital transaction in assets method
US20200013025A1 (en) * 2018-07-06 2020-01-09 International Business Machines Corporation Conditional deferred transactions for blockchain
WO2020022599A1 (en) * 2018-07-27 2020-01-30 박기업 Node group managing device and computing device for configuring group key-based dual signature transaction structure in blockchain network
CN109598506A (en) * 2018-11-02 2019-04-09 克洛斯比尔有限公司 Block chain accurately postpones the method for encryption, system, calculates equipment and computer readable storage medium
CN110009334A (en) * 2018-11-07 2019-07-12 阿里巴巴集团控股有限公司 A kind of building Mei Keer tree, simple payment verification method and device
CA3040601A1 (en) * 2018-11-27 2019-04-18 Alibaba Group Holding Limited System and method for information protection
CN110175840A (en) * 2019-04-19 2019-08-27 华中科技大学 Method, client, alliance's chain and the system of light wallet mechanism are realized in alliance's chain
CN110300173A (en) * 2019-06-28 2019-10-01 杭州复杂美科技有限公司 Decentralization date storage method, verification method, equipment and storage medium
CN110930157A (en) * 2019-11-14 2020-03-27 杭州复杂美科技有限公司 Delayed transaction processing method, device and storage medium
CN110992009A (en) * 2019-12-04 2020-04-10 杭州复杂美科技有限公司 Delayed transaction advanced processing method, device and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111985922A (en) * 2020-08-26 2020-11-24 冒炜 Information distribution method based on block chain offline payment and digital financial service platform
CN112381543A (en) * 2020-12-09 2021-02-19 杭州复杂美科技有限公司 Multiple signature transaction method, device and storage medium
WO2022121348A1 (en) * 2020-12-09 2022-06-16 杭州复杂美科技有限公司 Delayed transaction generation method, delayed transaction execution method, and device and storage medium

Similar Documents

Publication Publication Date Title
CN109756582B (en) Information recording method, device, node and storage medium in block chain network
CN109087101B (en) Transaction verification method and device, storage medium and electronic equipment
CN111523894A (en) Data delay publishing method, device and storage medium
US20240259328A1 (en) Verification of data processes in a network of computing resources
CN111159306B (en) Information publishing method and device based on block chain and computer equipment
JP5368637B1 (en) Time authentication system and time authentication program
US11899647B2 (en) Documenting timestamps within a blockchain
EP3260979B1 (en) Verification of data processes in a network of computing resources
D’Anvers et al. The impact of error dependencies on Ring/Mod-LWE/LWR based schemes
US8806214B2 (en) Communication with non-repudiation and blind signatures
EP3234792A1 (en) Verification of data processes in a network of computing resources
EP3057079A1 (en) Secret parallel processing device, secret parallel processing method, and program
US11750403B2 (en) Robust state synchronization for stateful hash-based signatures
EP3812997B1 (en) Blockchain-based data processing method and apparatus, and server
US11722313B2 (en) State synchronization for post-quantum signing facilities
CN114726517A (en) Method, system and consensus node for generating random number seeds on block chain
CN114640451A (en) Method, system and consensus node for realizing distributed key generation on block chain
CN110516463B (en) Method and apparatus for generating information
US12072760B2 (en) Methods and apparatus to control execution of tasks in a computing system
CN114780982A (en) Flow business circulation method, device and system
CN113794706A (en) Data processing method and device, electronic equipment and readable storage medium
CN111524012A (en) Data delay publishing method, device and storage medium
CN113132078B (en) Block chain privacy protection method and block chain system based on homomorphism promise
US20230379146A1 (en) Securing network communications using dynamically and locally generated secret keys
US10116439B2 (en) Encrypted data computation system, device, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200811

WD01 Invention patent application deemed withdrawn after publication