CN112084533A - Block chain-based multi-level position information sharing method - Google Patents
Block chain-based multi-level position information sharing method Download PDFInfo
- Publication number
- CN112084533A CN112084533A CN202010831054.8A CN202010831054A CN112084533A CN 112084533 A CN112084533 A CN 112084533A CN 202010831054 A CN202010831054 A CN 202010831054A CN 112084533 A CN112084533 A CN 112084533A
- Authority
- CN
- China
- Prior art keywords
- position information
- information
- block chain
- user
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a block chain-based multi-level position information sharing method. Various problems exist with existing block chain based location sharing schemes. The method comprises the steps of firstly carrying out system initialization, then carrying out data preprocessing on a position information provider, recording position information by the position information provider, uploading the position information and verification information, sharing the position information among position information demanders, uploading an offset vector ciphertext by the position information provider when the position information is updated, decrypting by the position information demander and updating the position information by means of the offset vector. The method realizes the decentralization of the position information sharing system, the non-tampering, verifiable and multi-level privacy protection of the position information, the system has stronger robustness, the involved calculation burden is lower, and the method can be accepted by general terminal equipment.
Description
Technical Field
The invention belongs to the technical field of information sharing, and particularly relates to a block chain-based multi-level position information sharing method.
Background
With the rapid development of the intelligent wearing technology and the internet of things technology, enterprises, governments and other units and organizations can master the position information of the target object so as to meet business requirements of vehicle navigation, social games, epidemic prevention and control and the like. In order to make an epidemic situation prevention and control measure accurately, it is a significant task to grasp the location information of a case, a suspected case, and a person who is in close contact with the case.
On the other hand, the location information contains a large amount of user information, which is a valuable information resource. In the sharing process, if security events such as position information leakage, tampering, counterfeiting and the like occur, not only can the privacy of the user be seriously leaked, but also the service work of an information acquisition party is greatly and negatively influenced. How to ensure the information security and privacy protection when sharing the position information has become a problem that cannot be ignored.
First, the conventional undifferentiated information sharing has failed to meet the requirements of a large-scale location information sharing system, and a safe and efficient multi-level location information sharing method is required. In order to protect the privacy of the user as much as possible, in the process of sharing the location information, the location information with different precision is required to be obtained by the location information demanders with different levels.
Second, conventional location information data sharing schemes process and store data with a central database. In this case, if the central database is attacked, a large-scale data security problem may be caused. Moreover, even if many users in the network have corresponding data, the central database must participate in all data sharing processes, which makes the central database very burdened. In addition, the information demander often cannot perform efficient and feasible verification on the acquired data.
Furthermore, although the conventional location sharing schemes based on the blockchain achieve decentralization and non-tampering by means of the blockchain, some of the schemes have the problems of insufficient privacy protection, non-verification and incapability of providing multi-level authority access, and other schemes have the problems of high computational burden, low system robustness and requirement that an information owner is always on line. In practical applications, terminal devices providing location information often have no high computational power, and a manager cannot guarantee that the terminal devices distributed in different locations can be kept online all the time.
Disclosure of Invention
The invention aims to provide a multistage position information sharing method based on a block chain, aiming at the problems of centralization, non-verifiability, insufficient privacy protection, overhigh calculation burden and the like of the current position information sharing.
The method of the invention realizes the decentralization of the position information system and the non-falsification of the position information by using the block chain technology; verifiable multi-level location information access is achieved in a novel approach using order-preserving encryption and a merkle tree. The authenticity verification of the information of each level of position areas is realized by using order-preserving encryption and a symmetric encryption technology without changing the size order of the plain text; by utilizing a Merkle tree, a Hash binary tree which is commonly used for distributed data verification, the integrity verification of the position area information of each level is realized, and the multi-level privacy protection is realized; in addition, the invention adopts a new mode to express and share the position area, thereby limiting the times of order-preserving encryption, reducing the calculation cost and ensuring that the calculation burden of the scheme can be accepted by common terminal equipment; meanwhile, in the invention, the position information provider does not need to be always on line, can be off line after completing the specified work, and any information demander can obtain legal position information from the information sharer with the same or higher access level.
The users in the system are divided into three types, namely a position information provider, a position information demander and a full node; the position information provider is a user providing original position information, the position information demander is a user needing to obtain position information, and the whole node is a node storing and providing verification information.
The system has (N +1) class-level position information demanders, and when the position information demanders join the system, the system allocates a class identifier I to the position information demanders according to the real identity of the position information demanders, wherein I is 0,1, … and N; the smaller the grade mark is, the higher the access grade of the position information demander is; the location information demander, having a rank of 0, can determine the exact coordinates of the location information provider.
The method comprises the following specific steps:
step (1), initializing a system; the method comprises the following steps:
(1-1) the user puts forward a registration application to the system and obtains a unique identification ID number ID corresponding to the real identity information of the useri,i∈[1,n]And n represents the number of users registered in the system.
(1-2) if the user is LPiDetermining { ri 1,ri 2,...,ri N},ri 1<ri 2<...<ri N;ri IInformation about LP available to a requester of location information indicating a level identification of IiThe side length of the square position region with the highest precision, I ═ 1, 2., N; generation using a key generation algorithmIs a symmetric encryption key, LP, used in encrypting or decrypting data during the location update phaseiIndicates that the ID number is IDiThe location information provider of (1).
And (1-3) if the user is the position information demander, the system allocates a grade identifier for the user.
And (1-4) executing a public and private key pair generation algorithm by a user at the user side to generate a pair of public and private keys (PK, SK) which are stored at the user side for the user to use.
Step (2), preprocessing position information; the method comprises the following steps:
(2-1).LPiposition coordinate P ofi=(xi,yi);
First, LPiGenerating a random vector v1=(x1′,y1') satisfyDetermining a diagonal vertex as Pi L1And Pi R1Square area of
Then, LPiGenerating a random vector v2=(x2′,y2') satisfyDetermining a diagonal vertex as Pi L2And Pi R2Square area of
LPiRepeating the operation for N times to determine N square regions to obtain region information setIf q > g, the square areaCompletely covering the square areaEquivalently, a set of diagonal vertices P is obtainedi L={Pi L1,Pi L2,...,Pi LNAnd Pi R={Pi R1,Pi R2,...,Pi RN}。
(2-2).LPiUsing an order preserving encryption algorithm OPE and keysEncrypting the coordinates of the opposite angle vertex to obtain a ciphertext set of the opposite angle vertexAnd
(2-3) computing leaf nodes of Merkel Treehash (·) represents a hash function; obtaining a set of leaf nodesLPiUsing NodesiEstablishing a complete Merkel tree VermeriAnd get its root node rooti。
Step (3), recording position information; the method comprises the following steps:
LPicalculating coordinate information (x)i,yi) Hash value of (x)i||yi) Calculating a secret keyHash value of
To (x)i,yi) Carrying out order-preserving encryption to obtain an order-preserving encrypted value Andrespectively represent a pair xiAnd yiAn order-preserving encrypted value of the order-preserving encryption,calculate OPEiHas a hash value of (OPE)i);
Broadcasting Record information Record to miners' nodes in a blockchain networki;
RecordiComprises the following components: represents LPiUsing a private keyDigitally signing the information with a digital signature algorithm; miner node pair Record in block chain networkiAnd verifying, and writing the block chain into the block chain through a consensus process after the block chain passes the verification.
Uploading position information and verification information; the method comprises the following steps:
(4-1).LPibroadcast to all full nodesRepresents LPiUsing a private keyAnd digitally signing the information with a digital signature algorithm.
(4-2).LPiTo at least one LD0SendingEnc (-) denotes an asymmetric cryptographic function,represents LD0The public key of (2).
LD0Using a private keyDecryptionTo obtainCalculating (x)i′||yi') andhash value of (x)i′||yi') anddetermine whether to count on the chain respectivelyAccording to RecordiHash (x) of (1)i||yi) Andand (3) equality: if the data integrity is equal to the data integrity, the data integrity verification is completed, and the information is acceptedIf not, the data is falsified, and the information is refused to be received
Step (5), sharing position information; the method comprises the following steps:
(5-1) the ID number is IDjLocation information demander with grade mark aTo equal or higher level of accessApplication for LPiA is not less than b, j belongs to [1, n ]],l∈[1,n];Identify a direction according to its rankTransmitting location informationWherein the content of the first and second substances, is shown inThe public key of (2);
using a private keyDecryptionTo obtainIt is noted that at one point in time,applying for LD with equal or higher access level and obtaining LP by the same methodiAfter the position information of (2), can beProviding information; obviously, the initial LD is shared0Location information is provided.
(5-2).To a certain full node FnodehRequesting authentication data, FnodehIdentify a direction according to its rankSending authentication dataWherein, FnodehIndicates that the ID number is IDhAll nodes of (h ∈ [1, n ]],Representation according to leaf nodeCalculating VermeriRoot node rootiAnd other necessary node sets.
(5-3).Computing leaf nodeJoining sets of essential nodesVermer is obtained by calculationiRoot node root ofi'; calculate OPEi' andhash value hash (OPE)i') androot judgmenti′、hash(OPEi′)、Respectively with the on-chain data RecordiRoot in (1)i、 hash(OPEi)、Whether they are equal: if the data integrity is equal to the data integrity, finishing the data integrity verification; if not, the data is indicated to be tampered, and the sharing fails.
(5-4).Judgment ofAndwhether or not: if so, completing the pairing of the areasVerifying the authenticity of the card; if not, the position area information is false, and the sharing fails.
If all of the verification jobs are passed,determining LPiIn the square position areaAnd the position information is successfully shared.
Step (6), updating the position information; the method comprises the following steps:
(6-1).LPiwhen updating the position information for the p-th time, the position coordinate at this time is assumed to beNoting offset vectorLPiUsing a secret keyEncryption Vi pTo obtain a ciphertextE (-) represents a symmetric encryption algorithm.
LPiBroadcasting location update informationThe information is composed as follows, represents LPiA digital signature of the information. Miner node pairs in a blockchain networkAnd verifying, and writing the block chain into the block chain through a consensus process after the block chain passes the verification.
(6-2) having undergone information sharing procedureDiscovery on blockchainsAfter the information is given, the user can select the information,using a secret keyDecryptionTo obtain Vi p;By means of Vi pAndcan determine LPiAt diagonal vertices ofAndsquare shaped location area ofThe location information is updated successfully. Wherein the content of the first and second substances,
based on the block chain technology, the invention realizes the decentralization of the position information sharing system, the non-falsification of the position information, the multi-level privacy protection and the verification of the integrity and the authenticity of the position information at each level. The method of the invention does not have a fixed position information provider in the position information sharing process, any position information demander can obtain legal position information from the position information demander with the same or higher level, and carries out data verification by means of necessary verification data and a block chain, and the system has stronger robustness. In addition, the method has low calculation burden and can be accepted by general terminal equipment.
Drawings
FIG. 1 is a general flow chart of the process of the present invention;
FIG. 2 is an initialization flow diagram of an embodiment of the present invention;
FIG. 3 is a flow chart of location information preprocessing according to an embodiment of the present invention;
FIG. 4 is a flow chart of location information recording according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating uploading of location information and verification information according to an embodiment of the present invention;
FIG. 6 is a flow chart of location information sharing according to an embodiment of the present invention;
FIG. 7 is a flowchart illustrating location information updating according to an embodiment of the present invention;
Detailed Description
The following describes the practice of the present invention in further detail with reference to the accompanying drawings.
As shown in fig. 1, a block chain-based multi-level location information sharing method specifically includes the following steps:
step 1, initializing a system;
step 2, in order to realize the goal of multi-level privacy protection and information verifiability, a position information provider carries out data preprocessing;
step 3, the position information provider records the position information;
step 4, the position information provider uploads the position information and the verification information;
step 5, sharing the position information among the position information demanders;
and 6, when the position information is updated, the position information provider uploads the offset vector ciphertext, and the position information demander decrypts the offset vector and updates the position information by means of the offset vector.
For better understanding of the method and process of the embodiments of the present invention, a location information sharing process is described in detail. In the process, the (N +1) class level position information demanders are shared, and the position information provider LP is sharedaTwo position information sharingAnd a full node Fnoded。
The user needs to initialize when logging in the system for the first time, and the process is as shown in fig. 2, and specifically includes:
(1-1) the user puts forward a registration application to the system and respectively obtains a unique identification ID number ID corresponding to the real identity information of the usera、IDb、IDc、IDd;
(1-2) ID number is IDaLocation information provider LP ofaDeterminingAnd generated using a key generation algorithmIs a symmetric encryption key used when encrypting and decrypting data in the location update phase.
And (1-3) the system allocates corresponding grade identifications to the position information demanders. As a result of the assignment, the number of the bits is,is that the ID number is IDbAnd the position information demander with the grade mark 0,is that the ID number is IDcThe grade mark is a position information demander with m, and m is more than 0;
and (1-4) executing a public and private key pair generation algorithm by each user at a user side to respectively generate a public and private key pair The data is stored in the user side for the user to use;
step (2), preprocessing the position information, wherein the process is shown in figure 3; the method comprises the following steps:
(2-1).LPahas a position coordinate of Pa=(xa,ya)。
LPaGenerating a random vector v1=(x1′,y1') need to be satisfiedLPaA diagonal vertex can be determined asAndsquare area of
LPaGenerating a random vector v2=(x2′,y2') satisfyDetermine a diagonal vertex asAndsquare area ofWherein
LPaRepeating the above operation N times to determine N square regions and obtain region information setEquivalently, LPaObtain a set of diagonal verticesAnd
(2-2).LPausing an order preserving encryption algorithm OPE and keysEncrypting the vertex coordinates to obtain a diagonal vertex ciphertext setAnd
(2-3).LPaAccording toLaAnd RaComputing leaf nodes of a Merkel treek∈[1,N]And hash (·) denotes a hash function. LPaObtaining a set of leaf nodesLPaUsing NodesaEstablishing a complete Merkel tree VermeriAnd get its root node roota;
Step (3), recording the position information, wherein the process is shown in figure 4; the method comprises the following steps:
LPacalculating coordinate information (x)a,ya) Hash value of (x)a||ya) (ii) a Calculating a secret keyHash value ofTo (x)a,ya) Carrying out order-preserving encryption to obtainWherein And calculate OPEaHash value hash (OPE)a);
Broadcasting Record information Record to miners' nodes in a blockchain networka,RecordaThe composition is as follows: represents LPaUsing a private keyAnd digitally signing the information with a digital signature algorithm. Miner node pair Record in block chain networkaVerifying, and writing the block chain into the block chain through a consensus process after the block chain passes the verification;
step (4), uploading the position information and the verification information, wherein the process is shown in fig. 5; the method comprises the following steps:
(4-1).LPabroadcast to all full nodes Represents LPaUsing a private keyAnd digitally signing the information with a digital signature algorithm.
(4-2).LPaTo the direction ofSendingEnc (-) denotes an asymmetric cryptographic function,to representThe public key of (2).
Using a private keyDecryptionTo obtainCalculating (x)a′||ya') andhash value of (x)a′||ya') anddetermine whether to associate with the on-chain data Record, respectivelyaHash (x) of (1)a||ya) Andand (3) equality: if the data integrity is equal to the data integrity, the data integrity verification is completed, and the information is acceptedIf not, the data is falsified, and the information is refused to be received
Step (5), sharing position information, wherein the process is shown in figure 6; the method comprises the following steps:
(5-1).to the direction ofApplication for LPaThe location information of (a);according to its grade mark m, toTransmitting location informationWherein
(5-2).To full node FnodedAuthentication data is requested. FnodedTransmitting verification data according to its grade mark mWherein the content of the first and second substances,representation according to leaf nodeCalculating VermeraRoot node rootaOther necessary node sets.
(5-3).Computing leaf nodeJoining sets of essential nodesVermer is obtained by calculationaRoot node root ofa'; calculate OPEa' andhash value hash (OPE)a') androot judgmenta′、hash(OPEa′)、And on-chain data RecordaRoot in (1)a、 hash(OPEa)、Whether they are equal: if equal to each otherIf yes, finishing the data integrity verification; if not, the data is tampered, and the sharing fails.
(5-4).Judgment ofAndwhether or not: if so, completing the pairing of the areasVerifying the authenticity of the card; if not, the position area information is false, and the sharing fails.
If all of the verification jobs are passed,determining LPaIn the square position areaAnd the position information is successfully shared.
Step (6), updating the position information, wherein the process is shown in FIG. 7; the method comprises the following steps:
(6-1).LPawhen updating the position information for the p-th time, the position coordinate at this time is assumed to beNoting offset vectorLPaUsing a secret keyEncryptionObtaining a ciphertextE (-) represents a symmetric encryption algorithm. LPaBroadcasting location update informationThe information is composed as follows, represents LPaA digital signature of the information. Miner node pairs in a blockchain networkAnd verifying, and writing the block chain into the block chain through a consensus process after the block chain passes the verification.
(6-2).Discovery on blockchainsAfter the information is given, the user can select the information,using a secret keyDecryptionTo obtain By means ofAndcan determine LPaAt diagonal vertices ofAndsquare position area ofThe location information is updated successfully. Wherein the content of the first and second substances,
Claims (7)
1. a block chain based multi-level location information sharing method,
the users in the system are divided into three types, namely a position information provider, a position information demander and a full node; the position information provider is a user providing original position information, the position information demander is a user needing to obtain the position information, and the whole nodes are nodes for storing and providing verification information;
the system has (N +1) class-level position information demanders, and when the position information demanders join the system, the system allocates a class identifier I to the position information demanders according to the real identity of the position information demanders, wherein I is 0,1, … and N; the smaller the grade mark is, the higher the access grade of the position information demander is; the location information demander with the level identification of 0 can determine the precise coordinates of the location information provider; the method is characterized by comprising the following specific steps:
step (1), initializing a system;
step (2), in order to realize the goal of multi-level privacy protection and information verifiability, a position information provider carries out data preprocessing;
step (3), the position information provider records the position information;
step (4), uploading position information and verification information by a position information provider;
step (5), position information sharing is carried out among position information demanders;
and (6) when the position information is updated, the position information provider uploads the offset vector ciphertext, and the position information demander decrypts the offset vector and updates the position information by means of the offset vector.
2. The block chain-based multi-level location information sharing method according to claim 1, wherein the step (1) is specifically:
(1-1) the user puts forward a registration application to the system and obtains a unique identification ID number ID corresponding to the real identity information of the useri,i∈[1,n]N represents the number of users registered in the system;
(1-2) if the user is LPiDetermining { ri 1,ri 2,...,ri N},ri 1<ri 2<...<ri N;ri IInformation about LP available to a requester of location information having a designation of level IiThe side length of the square position region with the highest precision, I ═ 1, 2., N; generation using a key generation algorithm Is a symmetric encryption key, LP, used in encrypting or decrypting data during the location update phaseiIndicates that the ID number is IDiThe location information provider of (1);
(1-3) if the user is a position information demander, the system allocates a grade identifier for the user;
and (1-4) executing a public and private key pair generation algorithm by a user at the user side to generate a pair of public and private keys (PK, SK) stored at the user side for the user to use.
3. The blockchain-based multi-level location information sharing method according to claim 2, wherein the step (2) is specifically:
(2-1).LPiposition coordinate P ofi=(xi,yi);
First, LPiGenerating a random vector v1=(x1′,y1') satisfies x1′,Determining a diagonal vertex as Pi L1And Pi R1Square area of
Then, LPiGenerating a random vector v2=(x2′,y2') satisfies x2′,Determining a diagonal vertex as Pi L2And Pi R2Square area of
LPiRepeating the above operation N times to determine N positive valuesSquare area, obtaining area information setAnd a set of diagonal vertices Pi L={Pi L1,Pi L2,...,Pi LNAnd Pi R={Pi R1,Pi R2,...,Pi RN};
(2-2).LPiUsing an order preserving encryption algorithm OPE and keysEncrypting the diagonal vertex coordinates to obtain a diagonal vertex ciphertext setAnd
4. The blockchain-based multi-level location information sharing method according to claim 3, wherein the step (3) is specifically:
LPicalculating coordinate information (x)i,yi) Hash value of (x)i||yi) Calculating a secret keyHash value of
To (x)i,yi) Carrying out order-preserving encryption to obtain an order-preserving encrypted value Andrespectively represent a pair xiAnd yiAn order-preserving encrypted value of the order-preserving encryption,calculate OPEiHash value hash (OPE)i);
Broadcasting Record information Record to miners' nodes in a blockchain networki;
RecordiComprises the following components: represents LPiUsing a private keyDigitally signing the information with a digital signature algorithm; miner node pair Record in block chain networkiAnd verifying, and writing the block chain into the block chain through a consensus process after the block chain passes the verification.
5. The blockchain-based multi-level location information sharing method according to claim 4, wherein the step (4) is specifically:
(4-1).LPibroadcast to all full nodes Represents LPiUsing a private keyDigitally signing the information with a digital signature algorithm;
(4-2).LPito at least one LD0SendingEnc (-) denotes an asymmetric cryptographic function,represents LD0The public key of (2);
LD0using a private keyDecryptionTo obtainCalculating (x)i′||yi') andhash value of (x)i′||yi') anddetermine whether to associate with the on-chain data Record, respectivelyiHash (x) of (1)i||yi) Andand (3) equality: if the data integrity is equal to the data integrity, the data integrity verification is completed, and the information is acceptedIf not, the data is falsified, and the information is refused to be received
6. The blockchain-based multi-level location information sharing method according to claim 5, wherein the step (5) is specifically:
(5-1) the ID number is IDjLocation information demander with grade mark aTo equal or higher level of accessApplication for LPiA is not less than b, j belongs to [1, n ]],l∈[1,n];Identify a direction according to its rankTransmitting location informationWherein the content of the first and second substances, to representThe public key of (2);
(5-2).To a certain full node FnodehRequesting authentication data, FnodehIdentify a direction according to its rankSending authentication dataWherein, FnodehIndicates that the ID number is IDhAll nodes of (h ∈ [1, n ]],Representation according to leaf nodeCalculating VermeriRoot node rootiOther necessary node sets;
(5-3).Computing leaf nodeJoining sets of essential nodesVermer is obtained by calculationiRoot node root ofi'; calculate OPEi' andhash value hash (OPE)i') androot judgmenti′、hash(OPEi′)、Respectively with the on-chain data RecordiRoot in (1)i、hash(OPEi)、Whether they are equal: if the data integrity is equal to the data integrity, finishing the data integrity verification; if the data are not equal, the data are falsified, and the sharing fails;
(5-4).judgment ofAndwhether or not: if so, completing the pairing of the areasVerifying the authenticity of the card; if the position area information is false, the sharing fails;
7. The blockchain-based multi-level location information sharing method according to claim 6, wherein the step (6) is specifically:
(6-1).LPiwhen updating the position information for the p-th time, the position coordinate at this time is assumed to beNoting offset vectorLPiUsing a secret keyEncryption Vi pTo obtain a ciphertextE (-) represents a symmetric encryption algorithm;
represents LPiA digital signature on the information; miner node pairs in a blockchain networkVerifying, and writing the block chain into the block chain through a consensus process after the block chain passes the verification;
(6-2) having undergone information sharing procedureDiscovery on blockchainsAfter the information is given, the user can select the information,using a secret keyDecryptionTo obtain Vi p;By means of Vi pAndcan determine LPiAt diagonal vertices ofAndsquare position area ofThe position information is updated successfully; wherein the content of the first and second substances,
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010831054.8A CN112084533B (en) | 2020-08-18 | 2020-08-18 | Block chain-based multi-level position information sharing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010831054.8A CN112084533B (en) | 2020-08-18 | 2020-08-18 | Block chain-based multi-level position information sharing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112084533A true CN112084533A (en) | 2020-12-15 |
CN112084533B CN112084533B (en) | 2022-02-11 |
Family
ID=73729091
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010831054.8A Active CN112084533B (en) | 2020-08-18 | 2020-08-18 | Block chain-based multi-level position information sharing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112084533B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114978523A (en) * | 2022-04-13 | 2022-08-30 | 浙江安存云链数据技术有限公司 | Privacy protection geographical position proving system based on block chain computer |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109274727A (en) * | 2018-08-31 | 2019-01-25 | 中国联合网络通信集团有限公司 | Based on the meteorological data sharing method of block chain, apparatus and system |
US20190166133A1 (en) * | 2017-11-30 | 2019-05-30 | Bank Of America Corporation | Multicomputer processing for data authentication and event execution using a blockchain approach |
CN110620772A (en) * | 2019-09-20 | 2019-12-27 | 西安电子科技大学 | Block chain-based spatial crowdsourcing multi-level position privacy protection method |
US20200153627A1 (en) * | 2018-11-09 | 2020-05-14 | Ares Technologies, Inc. | Systems and methods for distributed key storage |
CN111448781A (en) * | 2019-07-11 | 2020-07-24 | 阿里巴巴集团控股有限公司 | Shared blockchain data storage |
CN111541737A (en) * | 2020-03-25 | 2020-08-14 | 广东工业大学 | AED equipment position sharing method based on block chain |
-
2020
- 2020-08-18 CN CN202010831054.8A patent/CN112084533B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190166133A1 (en) * | 2017-11-30 | 2019-05-30 | Bank Of America Corporation | Multicomputer processing for data authentication and event execution using a blockchain approach |
CN109274727A (en) * | 2018-08-31 | 2019-01-25 | 中国联合网络通信集团有限公司 | Based on the meteorological data sharing method of block chain, apparatus and system |
US20200153627A1 (en) * | 2018-11-09 | 2020-05-14 | Ares Technologies, Inc. | Systems and methods for distributed key storage |
CN111448781A (en) * | 2019-07-11 | 2020-07-24 | 阿里巴巴集团控股有限公司 | Shared blockchain data storage |
CN110620772A (en) * | 2019-09-20 | 2019-12-27 | 西安电子科技大学 | Block chain-based spatial crowdsourcing multi-level position privacy protection method |
CN111541737A (en) * | 2020-03-25 | 2020-08-14 | 广东工业大学 | AED equipment position sharing method based on block chain |
Non-Patent Citations (5)
Title |
---|
QIUYUN LYU ET AL.: "SBAC:A secure blockchain-based access control framework for information-centric networking", 《JOURNAL OF NETWORK AND COMPUTER APPLICATIONS》 * |
WANG, QH ET AL.: "SPS and DPS: Two New Grid-Based Source Location Privacy Protection Schemes in Wireless Sensor Networks", 《SENSORS》 * |
YX JI ET AL.: "BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems", 《JOURNAL OF MEDICAL SYSTEMS》 * |
姬雅娴: "基于区块链的用户位置信息安全共享方案", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
陈稼珅: "基于区块链智能合约的去中心化在线众包机制", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114978523A (en) * | 2022-04-13 | 2022-08-30 | 浙江安存云链数据技术有限公司 | Privacy protection geographical position proving system based on block chain computer |
Also Published As
Publication number | Publication date |
---|---|
CN112084533B (en) | 2022-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106548345B (en) | Method and system for realizing block chain private key protection based on key partitioning | |
CN109074434B (en) | Method and system for verifying ownership of digital assets using distributed hash tables and peer-to-peer distributed ledgers | |
CN106961336B (en) | A kind of key components trustship method and system based on SM2 algorithm | |
JP6877448B2 (en) | Methods and systems for guaranteeing computer software using distributed hash tables and blockchain | |
WO2018112946A1 (en) | Registration and authorization method, device and system | |
US6035398A (en) | Cryptographic key generation using biometric data | |
US20190295069A1 (en) | Systems and methods for integrating cryptocurrency wallet identifiers with digital certificates | |
CN112019591A (en) | Cloud data sharing method based on block chain | |
KR20190075771A (en) | Authentication System Using Block Chain Through Distributed Storage after Separating Personal Information | |
CN110197082A (en) | Data processing method, data processing equipment and computer system | |
CN106487506B (en) | Multi-mechanism KP-ABE method supporting pre-encryption and outsourcing decryption | |
JPH11506222A (en) | Multi-step digital signature method and system | |
CN110830245B (en) | Anti-quantum-computation distributed Internet of vehicles method and system based on identity secret sharing and implicit certificate | |
CN108551435B (en) | Verifiable encryption group signature method with anonymity | |
CN112801664B (en) | Intelligent contract supply chain trusted service method based on block chain | |
EP3395004B1 (en) | A method for encrypting data and a method for decrypting data | |
CN1446418A (en) | Securing arbitrary communication services | |
CN113761582A (en) | Group signature based method and system for protecting privacy of block chain transaction under supervision | |
US20220020020A1 (en) | Methods, systems, and devices for managing digital assets | |
CN110581839A (en) | Content protection method and device | |
CN112749417A (en) | Electronic academic certificate data protection and sharing system based on block chain | |
CN112470423A (en) | Computer-implemented system and method for asset blending | |
CN115552397A (en) | Multi-party and multi-purpose anti-quantum signature and key establishment | |
CN113079177B (en) | Remote sensing data sharing method based on time and decryption frequency limitation | |
CN112084533B (en) | Block chain-based multi-level position information sharing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |