CN111784338A - Information processing method, device, system and storage medium - Google Patents

Information processing method, device, system and storage medium Download PDF

Info

Publication number
CN111784338A
CN111784338A CN201910283890.4A CN201910283890A CN111784338A CN 111784338 A CN111784338 A CN 111784338A CN 201910283890 A CN201910283890 A CN 201910283890A CN 111784338 A CN111784338 A CN 111784338A
Authority
CN
China
Prior art keywords
node
signature
ciphertext
key
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910283890.4A
Other languages
Chinese (zh)
Inventor
张�林
黄海泉
孙海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wodong Tianjun Information Technology Co Ltd
Original Assignee
Beijing Wodong Tianjun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wodong Tianjun Information Technology Co Ltd filed Critical Beijing Wodong Tianjun Information Technology Co Ltd
Priority to CN201910283890.4A priority Critical patent/CN111784338A/en
Publication of CN111784338A publication Critical patent/CN111784338A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides an information processing method, an information processing device, an information processing system and a storage medium, wherein the method comprises the following steps: completing uplink storage of transaction contents through the first node; a blind signature protocol is executed between the second node and the third node to obtain a corresponding signature, and uplink storage of the signature is completed; the second node encrypts transaction content through a signature to obtain a signature ciphertext and completes uplink storage of the signature ciphertext; the first node acquires a signature ciphertext from an account book formed after uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending the processing result to the second node. The invention encrypts and records the information of the transaction process through the block chain and the encryption algorithm, so that the transaction information can be traced and cannot be tampered; and the information leakage of the trader can be avoided, and the information safety of the auction player is ensured.

Description

Information processing method, device, system and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to an information processing method, apparatus, system, and storage medium.
Background
Information processing is an important application of electronic commerce, and with the development of network technology and the improvement of security systems, the transaction mode gradually shifts from the traditional mode to the network-based electronic mode.
At present, in order to ensure fairness in a transaction information processing process, a unified platform generally manages information such as personnel information, transaction content and price related to a transaction, and then the unified platform publishes a corresponding result.
However, in this way, the transaction information of the trader is leaked or tampered, so that the fairness of the transaction is affected, and the trader is lost.
Disclosure of Invention
The invention provides an information processing method, device, system and storage medium, which encrypt and record the information of a transaction process through a block chain and an encryption algorithm, so that the transaction information can be traced and cannot be tampered; and the information leakage of the trader can be avoided, and the information safety of the trader is ensured.
In a first aspect, an embodiment of the present invention provides an information processing method, which is applied in a blockchain network including a plurality of nodes; the blockchain network comprises: a first node, a second node, and a third node; the method comprises the following steps:
the first node completes the uplink storage of the transaction content; the transaction content comprises: a first temporary public key, information to be analyzed and an expiration date; the first temporary public key is obtained by calculation through a first temporary private key;
a blind signature protocol is executed between the second node and the third node to obtain a corresponding signature, and uplink storage of the signature is completed;
the second node encrypts transaction contents through the signature to obtain a signature ciphertext and completes uplink storage of the signature ciphertext;
the first node acquires a signature ciphertext from an account book formed after uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending a processing result to the second node.
In one possible design, a blind signature protocol is executed between the second node and the third node, and the obtaining of the corresponding signature includes:
and a signature is generated between the second node and the third node by adopting an elliptic curve signature algorithm.
In one possible design, the second node encrypts transaction content through the signature to obtain a signature ciphertext, and completes uplink storage of the signature ciphertext, including:
the second node acquires a first session key of key exchange through the second temporary private key and the first temporary public key;
calculating a signature ciphertext through the signature and the first session key;
the signature ciphertext is subjected to chain storage to obtain an account book containing the signature ciphertext;
the second temporary public key is stored in an uplink mode, and a transaction request is sent to the first node; wherein the second temporary public key is calculated by a second temporary private key.
In one possible design, the acquiring, by the first node, a signature ciphertext from an account book formed after the uplink storage, and decrypting and verifying the signature ciphertext includes:
the first node acquires a second session key of key exchange through the first temporary private key and the second temporary public key;
decrypting the signature ciphertext through the second session key;
verifying the decrypted signature ciphertext through the signature; if the verification is passed, analyzing the transaction information of the second node; the transaction information includes: and (6) carrying out auction price.
In one possible design, the network node further includes: a fourth node;
after sending the processing result to the second node, the method further comprises:
after the second node finishes the uplink storage of the second temporary private key, initiating an arbitration request to a fourth node;
the fourth node acquires a first session key of key exchange through the second temporary private key and the first temporary public key;
decrypting the signature ciphertext through the first session key;
verifying the decrypted signature ciphertext through the signature; if the verification is passed, determining that the processing result is valid; and if the verification is not passed, determining that the processing result is invalid.
In a second aspect, an embodiment of the present invention provides an information processing apparatus, which is applied in a blockchain network including a plurality of nodes; the blockchain network comprises: a first node, a third node, a second node; the device comprises:
the transaction initiating module is used for controlling the first node to finish the uplink storage of the transaction content; the transaction content comprises: a first temporary public key, information to be analyzed and an expiration date; the first temporary public key is obtained by calculation through a first temporary private key;
the signature module is used for controlling a blind signature protocol to be executed between a second node and the third node, obtaining a corresponding signature and finishing uplink storage of the signature;
the encryption module is used for controlling the second node to encrypt the transaction content through the signature to obtain a signature ciphertext and finishing uplink storage of the signature ciphertext;
the verification module is used for controlling the first node to acquire a signature ciphertext from an account book formed after uplink storage, and decrypting and verifying the signature ciphertext; and if the verification is passed, sending a processing result to the second node.
In one possible design, the signature module is specifically configured to:
and controlling the second node and the third node to generate a signature by adopting an elliptic curve signature algorithm.
In one possible design, the encryption module is specifically configured to:
controlling the second node to obtain a first session key of key exchange through the second temporary private key and the first temporary public key;
calculating a signature ciphertext through the signature and the first session key;
the signature ciphertext is subjected to chain storage to obtain an account book containing the signature ciphertext;
the second temporary public key is stored in an uplink mode, and a transaction request is sent to the first node; wherein the second temporary public key is calculated by a second temporary private key.
In one possible design, the verification module is specifically configured to:
controlling the first node to obtain a second session key of key exchange through the first temporary private key and the second temporary public key;
decrypting the signature ciphertext through the second session key;
verifying the decrypted signature ciphertext through the signature; if the verification is passed, analyzing the transaction information of the second node; the transaction information includes: and (6) carrying out auction price.
In one possible design, the network node further includes: a fourth node;
the device further comprises:
the arbitration module is used for initiating an arbitration request to the fourth node after the second node finishes the uplink storage of the second temporary private key;
controlling the fourth node to obtain a first session key of key exchange through the second temporary private key and the first temporary public key;
decrypting the signature ciphertext through the first session key;
verifying the decrypted signature ciphertext through the signature; if the verification is passed, determining that the processing result is valid; and if the verification is not passed, determining that the processing result is invalid.
In a third aspect, an embodiment of the present invention provides an information processing system, including:
a memory for storing a program;
a processor for executing the program stored by the memory, the processor being configured to perform the method of any of the first aspects when the program is executed.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, including: computer program, which, when run on a computer, causes the computer to perform the method of the first aspect.
The invention provides an information processing method, a device, a system and a storage medium, which are applied to a block chain network comprising a plurality of nodes; the block chain network comprises a first node, a second node and a third node; wherein: the first node completes the uplink storage of the transaction content; the transaction content comprises: a first temporary public key, information to be analyzed and an expiration date; a blind signature protocol is executed between the second node and the third node to obtain a corresponding signature, and uplink storage of the signature is completed; the second node encrypts transaction contents through the signature to obtain a signature ciphertext and completes uplink storage of the signature ciphertext; the first node acquires a signature ciphertext from an account book formed after uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending a processing result to the second node. The invention encrypts and records the information of the transaction process through the block chain and the encryption algorithm, so that the transaction information can be traced and cannot be tampered; and the information leakage of the trader can be avoided, and the information safety of the trader is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an application scenario provided in an embodiment of the present invention;
fig. 2 is a flowchart of an information processing method according to an embodiment of the present invention;
fig. 3 is a flowchart of an information processing method according to a second embodiment of the present invention;
fig. 4 is a schematic structural diagram of an information processing apparatus according to a third embodiment of the present invention;
fig. 5 is a schematic structural diagram of an information processing apparatus according to a fourth embodiment of the present invention;
fig. 6 is a schematic structural diagram of an information processing system according to a fifth embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
In the following, some terms in the present application are explained to facilitate understanding by those skilled in the art:
1) the Block chain (Block chain) is a brand new distributed infrastructure and computing mode which utilizes a Block chain type data structure to verify and store data, utilizes a distributed node consensus algorithm to generate and update data, utilizes a cryptographic mode to ensure the safety of data transmission and access, and utilizes an intelligent contract composed of automatic script codes to program and operate data.
2) ED25519 blind signature algorithm
The ED25519 blind signature algorithm is based on an efficient elliptic curve signature algorithm, namely the ED25519 signature algorithm. In the ED25519 blind signature algorithm, let E (F)p) Denotes the Curve E { (x, y) ∈ F of Curve25519p×Fp:-x2+x2=1+dx2y2In prime number field FpThe base point of the group is denoted as B, and the number of group elements is # E (F)p)=l2cWherein d is-121665/121666 ∈ Fp,p=2255-19,l=2252+2774231777737235353585193779088364849 is a large prime number, c is 3, the main operation stage of the ED25519 blind signature algorithm is as follows, mainly involving three participants, namely a signer, a receiver and a signer, and since there are several rounds of protocol interaction between the signer and the receiver, it can also be called blind signature protocol:
1. and a key generation stage: the signer uses the key generation algorithm to generate a public and private key pair, and generates s-H for randomly generating 256-bit-long k as a private key0,…,255(k) That is, the first 256 bits of the output of H are taken as the s value, where H is the SHA512 hash algorithm, and the total length of the output is 512 bits. Let A equalsB acts as the public key of the signer. The signer's public-private key pair is thus (k, a).
2. A session initiation phase: the receiver sends a message Init to the signer to initiate a blind signature request, where Init contains some information of the publicly requested service.
3. A commitment generation stage: the signer generates a commitment value R ═ rB, where R ═ H (H)256,…,511(k) | Init) and sends the commitment value R to the recipient.
4. A challenge generation phase: the receiver randomly selects two 256-bit strings a and b as a blinding factor, and calculates a final commitment value T-R-aB-bA. Then, the challenge value e ═ H (T | | | a | | | M) and the blinded challenge value e '═ e + b mod l are calculated, and the blinded challenge value e' is sent to the signer.
5. A signature generation stage: the signer computes a blinded signature term S '═ r-e' S mod l, where S ═ H0,…,255(k) And sends the blinded signature item S' to the recipient.
6. Signature blindness removal stage: the receiver calculates the signature term S' -a mod l after blinding, and outputs (T, S) as the final signature result.
7. And (3) signature verification stage: the signer takes the signature result (T, S), the message M and the public key A of the signer as input to verify whether 2 is satisfiedcSB=2cT+2cH (T | | A | | M) A, to determine whether the signature is valid.
Fig. 1 is a schematic structural diagram of an application scenario provided in an embodiment of the present invention, and as shown in fig. 1, the present invention is applied in a blockchain network including a plurality of nodes, where the blockchain network 20 includes: a first node 21, a third node 22, a second node 23, a fourth node 24, etc. Data between nodes in the blockchain network 20 may be stored in the blockchain after the network-wide consensus is completed and the consensus passes. In this embodiment, this process is referred to as uplink storage for short, and the account book 10 formed after uplink storage stores data passing through consensus among nodes, which is traceable and not falsifiable.
The first node 21 first completes the uplink storage of the transaction contents, which include: the first temporary public key, the information to be analyzed and the expiration date, wherein the first temporary public key is obtained by calculation through the first temporary private key. Then, the second node 23 and the third node 22 execute a blind signature protocol to obtain a corresponding signature, and complete the uplink storage of the signature. Then, the second node 23 encrypts the transaction content through the signature to obtain a signature ciphertext, and completes uplink storage of the signature ciphertext. The first node 21 acquires a signature ciphertext from the account book 10 formed by uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending the processing result to the second node. If the second node 23 disagrees with the processing result, the second node 23 initiates an arbitration request to the fourth node 24 after completing the uplink storage of the second temporary private key. The fourth node 24 obtains the first session key of the key exchange through the second temporary private key and the first temporary public key, and decrypts the signature ciphertext through the first session key. Finally, the fourth node 24 verifies the decrypted signature ciphertext through the signature; if the verification is passed, determining that the processing result is valid; and if the verification is not passed, determining that the processing result is invalid.
It should be noted that the number of network nodes is not limited in this embodiment, and those skilled in the art may increase or decrease the number of network nodes according to actual situations. That is, the first node, the second node, and the like may be plural, and plural second nodes may participate in the transaction of the same item, or the same node may participate in the transaction of plural items. In particular, the method can be applied to the field of electronic auction.
By applying the method, the information of the transaction process can be encrypted and recorded through the block chain and the encryption algorithm, so that the transaction information can be traced and cannot be tampered; and the information leakage of the auction participants can be avoided, and the information safety of the auction participants is ensured.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of an information processing method according to an embodiment of the present invention, and as shown in fig. 2, the method in this embodiment may include:
s101, the first node completes the uplink storage of the transaction content.
In this embodiment, the transaction content includes: a first temporary public key X, information to be analyzed (e.g., auction item information), an expiration date; the first temporary public key is calculated from the first temporary private key x. After obtaining the transaction content, the first node may broadcast the transaction content information to other nodes in the network node for the other network nodes to obtain the electronic transaction information and the first temporary public key.
Specifically, a 256-bit long character string X is randomly selected as a Diffie-Hellman temporary private key, where X ═ xB is a base point of a group, B is a Diffie-Hellman temporary public key, and X is used as a Diffie-Hellman temporary public key, and a block chain transaction is initiated to an authenticator (with a first temporary public key X and an expiration time as transaction contents). The transaction can be started after the transaction is confirmed in the uplink.
S102, a blind signature protocol is executed among the second node and the third node to obtain corresponding signatures, and uplink storage of the signatures is completed.
In this embodiment, a blind signature protocol is executed between the second node and the third node to obtain a corresponding signature, and optionally, an elliptic curve signature algorithm is used between the second node and the third node to generate the signature.
Specifically, an auction player randomly selects a character string Y with the length of 256 bits, calculates Y as yB, and takes (Y, Y) as a Diffie-Hellman temporary public and private key pair; and then as a receiver, initiating a blind signature with an authenticator ED25519 by taking M as a plaintext to be signed from a 1 st stage to a 6 th stage to obtain a signature (T, S), wherein the plaintext to be signed M is str | | Y | | | data, str is a random string of a specified length randomly selected by an auction player, and the data is transaction information including contents such as auction money amount and the like.
S103, the second node encrypts the transaction content through the signature to obtain a signature ciphertext and completes uplink storage of the signature ciphertext.
In this embodiment, the second node obtains the first session key of the key exchange through the second temporary private key and the first temporary public key; calculating a signature ciphertext through the signature and the first session key; completing the uplink storage of the signature ciphertext; after the second node finishes the uplink storage of the second temporary public key, a transaction request is sent to the first node; wherein the second temporary public key is calculated by the second temporary private key.
Specifically, the first session key sk ═ H '(yX) of the Diffie-Hellman key exchange is calculated using the second ephemeral private key y and the first ephemeral public key X, where H' is a hash function; then calculating signature ciphertext
Figure BDA0002022613960000081
And then, the signature ciphertext C is used as transaction content, uplink storage of the signature ciphertext is completed, and the second node is informed. After the deadline time for submitting the transaction information, the auction participants take the second temporary public key Y as the transaction content and initiate the block chain transaction to the second node.
S104, the first node acquires a signature ciphertext from the account book formed after the uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending the processing result to the second node.
In this embodiment, the first node obtains a second session key of the key exchange through the first temporary private key and the second temporary public key; decrypting the signature ciphertext through the second session key; verifying the decrypted signature ciphertext through the signature; if the verification is passed, the transaction information of the second node is analyzed; the transaction information includes: and (6) carrying out auction price.
Specifically, the second node queries the account book to calculate the second session key sk ═ H' (xY) of Diffie-Hellman key exchange, and then decrypts the signature ciphertext to obtain the signature ciphertext
Figure BDA0002022613960000091
The (T, S) signature result is then verified to be indeed M based on the authenticator' S public key. If the verification is passed, analyzing the M to obtain transaction information; collecting effective transaction information, finally deciding the winner and publishing the processing result.
The present embodiment is applied to a blockchain network including a plurality of nodes; the block chain network comprises a first node, a second node and a third node; wherein: the first node completes the uplink storage of the transaction content; the transaction content comprises: a first temporary public key, information to be analyzed and an expiration date; the first temporary public key is obtained by calculation through the first temporary private key; a blind signature protocol is executed between the second node and the third node to obtain a corresponding signature, and uplink storage of the signature is completed; the second node encrypts the transaction content through the signature to obtain a signature ciphertext and completes uplink storage of the signature ciphertext; the first node acquires a signature ciphertext from an account book formed after uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending the processing result to the second node. The invention encrypts and records the information of the transaction process through the block chain and the encryption algorithm, so that the transaction information can be traced and cannot be tampered; and the information leakage of the trader can be avoided, and the information safety of the auction player is ensured.
Fig. 3 is a flowchart of an information processing method according to a second embodiment of the present invention, and as shown in fig. 3, the method in this embodiment may include:
s201, the first node completes the uplink storage of the transaction content.
S202, a blind signature protocol is executed among the second node and the third node to obtain a corresponding signature, and uplink storage of the signature is completed.
S203, the second node encrypts the transaction content through the signature to obtain a signature ciphertext and completes uplink storage of the signature ciphertext.
S204, the first node acquires a signature ciphertext from the account book formed after the uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending the processing result to the second node.
For the technical principle and the specific implementation process of steps S201 to S204 in this embodiment, reference is made to the related description of steps S101 to S104 in the method shown in fig. 2, and details are not repeated here.
S205, after the second node finishes the uplink storage of the second temporary private key, an arbitration request is sent to the fourth node.
In this embodiment, if the auction participants disagree with the processing result, the complaint private key (i.e., the temporary private key) y is used as the transaction content to initiate the blockchain transaction for the arbitrator, and then the complaint private key y is submitted to the uplink.
S206, the fourth node verifies the decrypted signature ciphertext; if the verification is passed, determining that the processing result is valid; and if the verification is not passed, determining that the processing result is invalid.
In this embodiment, the fourth node obtains the first session key H' (yX) of the key exchange through the second temporary private key y and the first temporary public key X; decrypting the signature ciphertext through the first session key; verifying the decrypted signature ciphertext through the signature; if the verification is passed, determining that the processing result is valid; and if the verification is not passed, determining that the processing result is invalid.
Specifically, the fourth node calculates the first session key sk ═ H' (yX), and then obtains
Figure BDA0002022613960000101
Figure BDA0002022613960000102
And (4) determining that the transaction information of the complaining bidder is valid by verifying the signature, and finally performing arbitration according to a processing result. Thereby ensuring the fairness and justice of transaction information processing.
The present embodiment is applied to a blockchain network including a plurality of nodes; the block chain network comprises a first node, a second node and a third node; wherein: the first node completes the uplink storage of the transaction content; the transaction content comprises: a first temporary public key, information to be analyzed and an expiration date; the first temporary public key is obtained by calculation through the first temporary private key; a blind signature protocol is executed between the second node and the third node to obtain a corresponding signature, and uplink storage of the signature is completed; the second node encrypts the transaction content through the signature to obtain a signature ciphertext and completes uplink storage of the signature ciphertext; the first node acquires a signature ciphertext from an account book formed after uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending the processing result to the second node. The invention encrypts and records the information of the transaction process through the block chain and the encryption algorithm, so that the transaction information can be traced and cannot be tampered; and the information leakage of the trader can be avoided, and the information safety of the auction player is ensured.
In addition, this embodiment further includes: and a fourth node. After the processing result is sent to the second node and the second node finishes the uplink storage of the second temporary private key, an arbitration request is sent to the fourth node; the fourth node verifies the decrypted signature ciphertext and judges whether the processing result is valid or not, thereby ensuring fairness and justice of transaction information processing.
Fig. 4 is a schematic structural diagram of an information processing apparatus according to a third embodiment of the present invention, as shown in fig. 4, the apparatus is applied in a blockchain network including a plurality of nodes; the blockchain network comprises: a first node, a third node, a second node; the apparatus in this embodiment may include:
a transaction initiation module 31, configured to control the first node to complete uplink storage of transaction content; the transaction content comprises: a first temporary public key, information to be analyzed and an expiration date; the first temporary public key is obtained by calculation through the first temporary private key;
the signature module 32 is configured to control a blind signature protocol to be executed between the second node and the third node, obtain a corresponding signature, and complete uplink storage of the signature;
the encryption module 33 is configured to control the second node to encrypt the transaction content through the signature to obtain a signature ciphertext, and complete uplink storage of the signature ciphertext;
the verification module 34 is configured to control the first node to obtain a signature ciphertext from an account book formed after the uplink storage, and decrypt and verify the signature ciphertext; and if the verification is passed, sending the processing result to the second node.
In one possible design, the signature module 32 is specifically configured to:
and controlling the second node and the third node to generate the signature by adopting an elliptic curve signature algorithm.
In one possible design, the encryption module 33 is specifically configured to:
controlling the second node to obtain a first session key of key exchange through the second temporary private key and the first temporary public key;
calculating a signature ciphertext through the signature and the first session key;
the signature ciphertext is linked and stored to obtain an account book containing the signature ciphertext;
the second temporary public key is stored in an uplink mode, and the first node initiates a transaction request; wherein the second temporary public key is calculated by the second temporary private key.
In one possible design, the verification module 34 is specifically configured to:
controlling the first node to obtain a second session key of key exchange through the first temporary private key and the second temporary public key;
decrypting the signature ciphertext through the second session key;
verifying the decrypted signature ciphertext through the signature; if the verification is passed, the transaction information of the second node is analyzed; the transaction information includes: and (6) carrying out auction price.
The transaction information processing apparatus of this embodiment may execute the technical solution in the method shown in fig. 2, and for the specific implementation process and technical principle, reference is made to the related description in the method shown in fig. 2, and details are not repeated here.
The present embodiment is applied to a blockchain network including a plurality of nodes; the block chain network comprises a first node, a second node and a third node; wherein: the first node completes the uplink storage of the transaction content; the transaction content comprises: a first temporary public key, information to be analyzed and an expiration date; the first temporary public key is obtained by calculation through the first temporary private key; a blind signature protocol is executed between the second node and the third node to obtain a corresponding signature, and uplink storage of the signature is completed; the second node encrypts the transaction content through the signature to obtain a signature ciphertext and completes uplink storage of the signature ciphertext; the first node acquires a signature ciphertext from an account book formed after uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending the processing result to the second node. The invention encrypts and records the information of the transaction process through the block chain and the encryption algorithm, so that the transaction information can be traced and cannot be tampered; and the information leakage of the trader can be avoided, and the information safety of the auction player is ensured.
Fig. 5 is a schematic structural diagram of an information processing apparatus according to a fourth embodiment of the present invention, and as shown in fig. 5, a network node further includes: the fourth node, the apparatus in this embodiment, based on the apparatus shown in fig. 4, may further include:
an arbitration module 35, configured to initiate an arbitration request to the fourth node after the second node completes uplink storage of the second temporary private key;
controlling the fourth node to obtain a first session key of key exchange through the second temporary private key and the first temporary public key;
decrypting the signature ciphertext through the first session key;
verifying the decrypted signature ciphertext through the signature; if the verification is passed, determining that the processing result is valid; and if the verification is not passed, determining that the processing result is invalid.
The information processing apparatus of this embodiment may execute the technical solutions in the methods shown in fig. 2 and fig. 3, and the specific implementation process and technical principle of the technical solutions refer to the related descriptions in the methods shown in fig. 2 and fig. 3, which are not described herein again.
The present embodiment is applied to a blockchain network including a plurality of nodes; the block chain network comprises a first node, a second node and a third node; wherein: the first node completes the uplink storage of the transaction content; the transaction content comprises: a first temporary public key, information to be analyzed and an expiration date; the first temporary public key is obtained by calculation through the first temporary private key; a blind signature protocol is executed between the second node and the third node to obtain a corresponding signature, and uplink storage of the signature is completed; the second node encrypts the transaction content through the signature to obtain a signature ciphertext and completes uplink storage of the signature ciphertext; the first node acquires a signature ciphertext from an account book formed after uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending the processing result to the second node. The invention encrypts and records the information of the transaction process through the block chain and the encryption algorithm, so that the transaction information can be traced and cannot be tampered; and the information leakage of the auction participants can be avoided, and the information safety of the auction participants is ensured.
In addition, this embodiment further includes: and a fourth node. After the processing result is sent to the second node and the second node finishes the uplink storage of the second temporary private key, an arbitration request is sent to the fourth node; the fourth node verifies the decrypted signature ciphertext and judges whether the processing result is valid or not, thereby ensuring fairness and justice of transaction information processing.
Fig. 6 is a schematic structural diagram of an information processing system according to a fifth embodiment of the present invention, and as shown in fig. 6, a transaction information processing system 40 in this embodiment includes: a processor 41 and a memory 42;
a memory 42 for storing computer programs (such as application programs, functional modules, etc. implementing the information processing methods described above), computer instructions, etc., which may be stored in one or more of the memories 42 in a partitioned manner. And the above-mentioned computer program, computer instructions, data, etc. can be called by the processor 41.
A processor 41 for executing the computer program stored in the memory 42 to implement the steps of the method according to the above embodiments. Reference may be made in particular to the description relating to the preceding method embodiment. The memory 42 and the processor 41 may be coupled by a bus 43.
The present embodiment may implement the technical solutions in the methods shown in fig. 2 and fig. 3, and the implementation process and the technical effects are similar to those of the above methods, and are not described herein again.
In addition, embodiments of the present application further provide a computer-readable storage medium, in which computer-executable instructions are stored, and when at least one processor of the user equipment executes the computer-executable instructions, the user equipment performs the above-mentioned various possible methods.
Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in user equipment. Of course, the processor and the storage medium may reside as discrete components in a communication device.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (12)

1. An information processing method is applied to a block chain network comprising a plurality of nodes; the blockchain network comprises: a first node, a second node, and a third node; the method comprises the following steps:
the first node completes the uplink storage of the transaction content; the transaction content comprises: a first temporary public key, information to be analyzed and an expiration date;
a blind signature protocol is executed between the second node and the third node to obtain a corresponding signature, and uplink storage of the signature is completed;
the second node encrypts transaction contents through the signature to obtain a signature ciphertext and completes uplink storage of the signature ciphertext;
the first node acquires a signature ciphertext from an account book formed after uplink storage, and decrypts and verifies the signature ciphertext; and if the verification is passed, sending a processing result to the second node.
2. The method of claim 1, wherein a blind signature protocol is performed between the second node and the third node to obtain the corresponding signature, and the blind signature protocol comprises:
and a signature is generated between the second node and the third node by adopting an elliptic curve signature algorithm.
3. The method of claim 1, wherein the second node encrypts the transaction content by the signature to obtain a signature ciphertext, and completes uplink storage of the signature ciphertext, comprising:
the second node acquires a first session key of key exchange through the second temporary private key and the first temporary public key;
calculating a signature ciphertext through the signature and the first session key;
the signature ciphertext is subjected to chain storage to obtain an account book containing the signature ciphertext;
the second temporary public key is stored in an uplink mode, and a transaction request is sent to the first node; wherein the second temporary public key is calculated by a second temporary private key.
4. The method of claim 3, wherein the first node obtains the signature ciphertext from the ledger formed after the uplink storage, and decrypts and verifies the signature ciphertext, comprising:
the first node acquires a second session key of key exchange through the first temporary private key and the second temporary public key;
decrypting the signature ciphertext through the second session key;
verifying the decrypted signature ciphertext through the signature; if the verification is passed, analyzing the transaction information of the second node; the transaction information includes: and (6) carrying out auction price.
5. The method of claim 3, wherein the network node further comprises: a fourth node;
after sending the processing result to the second node, the method further comprises:
after the second node finishes the uplink storage of the second temporary private key, initiating an arbitration request to a fourth node;
the fourth node acquires a first session key of key exchange through the second temporary private key and the first temporary public key;
decrypting the signature ciphertext through the first session key;
verifying the decrypted signature ciphertext through the signature; if the verification is passed, determining that the processing result is valid; and if the verification is not passed, determining that the processing result is invalid.
6. An information processing apparatus, applied in a blockchain network including a plurality of nodes; the blockchain network comprises: a first node, a third node, a second node; the device comprises:
the transaction initiating module is used for controlling the first node to finish the uplink storage of the transaction content; the transaction content comprises: a first temporary public key, information to be analyzed and an expiration date;
the signature module is used for controlling a blind signature protocol to be executed between a second node and the third node, obtaining a corresponding signature and finishing uplink storage of the signature;
the encryption module is used for controlling the second node to encrypt the transaction content through the signature to obtain a signature ciphertext and finishing uplink storage of the signature ciphertext;
the verification module is used for controlling the first node to acquire a signature ciphertext from an account book formed after the uplink storage, and decrypting and verifying the signature ciphertext; and if the verification is passed, sending a processing result to the second node.
7. The apparatus according to claim 6, wherein the signature module is specifically configured to:
and controlling the second node and the third node to generate a signature by adopting an elliptic curve signature algorithm.
8. The apparatus according to claim 6, wherein the encryption module is specifically configured to:
controlling the second node to obtain a first session key of key exchange through the second temporary private key and the first temporary public key;
calculating a signature ciphertext through the signature and the first session key;
the signature ciphertext is subjected to chain storage to obtain an account book containing the signature ciphertext;
the second temporary public key is stored in an uplink mode, and a transaction request is sent to the first node; wherein the second temporary public key is calculated by a second temporary private key.
9. The apparatus of claim 8, wherein the verification module is specifically configured to:
controlling the first node to obtain a second session key of key exchange through the first temporary private key and the second temporary public key;
decrypting the signature ciphertext through the second session key;
verifying the decrypted signature ciphertext through the signature; if the verification is passed, analyzing the transaction information of the second node; the transaction information includes: and (6) carrying out auction price.
10. The apparatus of claim 8, wherein the network node further comprises: a fourth node;
the device further comprises:
the arbitration module is used for initiating an arbitration request to the fourth node after the second node finishes the uplink storage of the second temporary private key;
controlling the fourth node to obtain a first session key of key exchange through the second temporary private key and the first temporary public key;
decrypting the signature ciphertext through the first session key;
verifying the decrypted signature ciphertext through the signature; if the verification is passed, determining that the processing result is valid; and if the verification is not passed, determining that the processing result is invalid.
11. An information processing system, comprising:
a memory for storing a program;
a processor for executing the program stored by the memory, the processor being configured to perform the method of any of claims 1-5 when the program is executed.
12. A computer-readable storage medium, comprising: computer program, which, when run on a computer, causes the computer to perform the method according to any of claims 1-5.
CN201910283890.4A 2019-04-10 2019-04-10 Information processing method, device, system and storage medium Pending CN111784338A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910283890.4A CN111784338A (en) 2019-04-10 2019-04-10 Information processing method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910283890.4A CN111784338A (en) 2019-04-10 2019-04-10 Information processing method, device, system and storage medium

Publications (1)

Publication Number Publication Date
CN111784338A true CN111784338A (en) 2020-10-16

Family

ID=72755274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910283890.4A Pending CN111784338A (en) 2019-04-10 2019-04-10 Information processing method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN111784338A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112767147A (en) * 2020-12-31 2021-05-07 山东数字能源交易中心有限公司 Creditor right information processing method and device
WO2024119308A1 (en) * 2022-12-05 2024-06-13 华为技术有限公司 Communication method, node, communication system, and mobile carrier

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090182667A1 (en) * 2006-05-05 2009-07-16 Parkes David C Practical secrecy-preserving, verifiably correct and trustworthy auctions
CN102387019A (en) * 2011-10-19 2012-03-21 西安电子科技大学 Certificateless partially blind signature method
CN106789019A (en) * 2016-12-27 2017-05-31 深圳大学 A kind of Certificateless partially blind signature method and device
CN107666388A (en) * 2016-07-28 2018-02-06 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
WO2018137316A1 (en) * 2017-01-24 2018-08-02 上海亿账通区块链科技有限公司 Secure transaction method based on block chain, electronic device, system, and storage medium
CN108650077A (en) * 2018-05-17 2018-10-12 深圳前海微众银行股份有限公司 Information transferring method, terminal, equipment based on block chain and readable storage medium storing program for executing
CN108898031A (en) * 2018-07-17 2018-11-27 济南浪潮高新科技投资发展有限公司 A kind of block chain design method of the Proxy Signature based on ECC algorithm

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090182667A1 (en) * 2006-05-05 2009-07-16 Parkes David C Practical secrecy-preserving, verifiably correct and trustworthy auctions
CN102387019A (en) * 2011-10-19 2012-03-21 西安电子科技大学 Certificateless partially blind signature method
CN107666388A (en) * 2016-07-28 2018-02-06 郑珂威 Block chain information encryption method based on complete homomorphic cryptography method
CN106789019A (en) * 2016-12-27 2017-05-31 深圳大学 A kind of Certificateless partially blind signature method and device
WO2018137316A1 (en) * 2017-01-24 2018-08-02 上海亿账通区块链科技有限公司 Secure transaction method based on block chain, electronic device, system, and storage medium
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN108650077A (en) * 2018-05-17 2018-10-12 深圳前海微众银行股份有限公司 Information transferring method, terminal, equipment based on block chain and readable storage medium storing program for executing
CN108898031A (en) * 2018-07-17 2018-11-27 济南浪潮高新科技投资发展有限公司 A kind of block chain design method of the Proxy Signature based on ECC algorithm

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112767147A (en) * 2020-12-31 2021-05-07 山东数字能源交易中心有限公司 Creditor right information processing method and device
CN112767147B (en) * 2020-12-31 2023-03-28 山东数字能源交易有限公司 Creditor right information processing method and device
WO2024119308A1 (en) * 2022-12-05 2024-06-13 华为技术有限公司 Communication method, node, communication system, and mobile carrier

Similar Documents

Publication Publication Date Title
US11842317B2 (en) Blockchain-based authentication and authorization
JP6724249B2 (en) System and method for information protection
JP6841911B2 (en) Information protection systems and methods
US11601407B2 (en) Fast oblivious transfers
EP4340295A2 (en) Computer implemented method and system for transferring access to a digital asset
CN110289968B (en) Private key recovery method, collaborative address creation method, collaborative address signature device and storage medium
CN111819827A (en) Method and system for controlling access and integrity of resources on a blockchain
JP2020500458A (en) Information protection system and method
CN111162912B (en) Verification method and device suitable for block chain and storage medium
CN109861956B (en) Data verification system, method, device and equipment based on state channel
CN111080296B (en) Verification method and device based on blockchain system
CN111784338A (en) Information processing method, device, system and storage medium
CN114710504A (en) Rotation method of common nodes in block chain system, nodes and block chain system
US20240179211A1 (en) Computer-implemented system and method for controlling processing steps of a distributed system
CN110363528B (en) Collaborative address generation method, collaborative address generation device, transaction signature method, transaction signature device and storage medium
CN111769945B (en) Auction processing method based on block chain and block chain link point
CN111861462A (en) Financial product transaction method and device based on block chain
WO2020258125A1 (en) Private key recovery method and apparatus, collaborative address creation method and apparatus, collaborative address signing method and apparatus, and storage medium
WO2020258126A1 (en) Generation method and device for collaborative address, transaction signing method and device for collaborative address, and storage medium
CN115174067A (en) Transaction processing method, blockchain node and blockchain network
CN118211965A (en) Transaction verification method, device and storage medium
KR20170031482A (en) System and Method for Providing Tripartite Multiple Certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination