CN112149165A - Block chain-based social system and method with incentive mechanism and symptom matching function - Google Patents
Block chain-based social system and method with incentive mechanism and symptom matching function Download PDFInfo
- Publication number
- CN112149165A CN112149165A CN202011013850.7A CN202011013850A CN112149165A CN 112149165 A CN112149165 A CN 112149165A CN 202011013850 A CN202011013850 A CN 202011013850A CN 112149165 A CN112149165 A CN 112149165A
- Authority
- CN
- China
- Prior art keywords
- social
- requester
- block chain
- symptom
- incentive mechanism
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 208000024891 symptom Diseases 0.000 title claims abstract description 79
- 230000007246 mechanism Effects 0.000 title claims abstract description 41
- 238000000034 method Methods 0.000 title claims abstract description 24
- 201000010099 disease Diseases 0.000 claims abstract description 18
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 claims abstract description 18
- 230000008901 benefit Effects 0.000 claims description 12
- 125000004122 cyclic group Chemical group 0.000 claims description 9
- 239000000654 additive Substances 0.000 claims description 6
- 230000000996 additive effect Effects 0.000 claims description 6
- 239000011159 matrix material Substances 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 4
- 239000007983 Tris buffer Substances 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 claims description 2
- 230000008569 process Effects 0.000 description 3
- 239000000243 solution Substances 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 208000032023 Signs and Symptoms Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013399 early diagnosis Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Economics (AREA)
- Data Mining & Analysis (AREA)
- Medical Informatics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical field of matched safety and privacy protection, and discloses a social system and a social method with incentive mechanism symptom matching based on a block chain, wherein the social system comprises the following steps: the social contact member location end is used for encrypting the keywords of the symptoms by using the attribute key to generate a keyword ciphertext, uploading the keyword ciphertext to the block chain under the condition that the keywords are verified to be real, and pricing disease related data of the social contact member based on an incentive mechanism in a preset intelligent contract; and the requester is located and used for sending a search gate to the block chain to realize matching search of similar symptoms, obtaining pricing of a social member with similar symptoms matched with the symptoms corresponding to the disease-related data expected to be viewed by the requester when the social member with similar symptoms is searched, and viewing the disease-related data of the social member when payment is made for the price corresponding to the pricing. The invention can encourage more users to participate in the system, and simultaneously enable the users to pay and access data fairly.
Description
Technical Field
The invention relates to the technical field of matched safety and privacy protection, in particular to a social system and a social method with incentive mechanism symptom matching based on a block chain.
Background
With the rapid development of communication technology, more and more people want to find users with similar disease symptoms on the internet to share their experiences and support each other. For an average person, she/he likes to hand friends with similar topics of interest. For a patient, she/he wants to find a patient with the same symptoms, exchange experiences, broaden the understanding of the symptoms, help the patient to get early diagnosis and better treatment in time, based on which the matching of patient data has been receiving more and more attention from many research institutes in recent years. Since the matched data is personal privacy information, data security and privacy protection are crucial to matching. However, some private information such as disease status, religious preferences, sexual orientation, reputation and welfare may be revealed at any time during the pairing process. There is a need to develop a private matching scheme without revealing personal information.
In order to solve the above problems, the following solutions have been proposed: the system comprises a scheme for protecting user sensitive information based on cloud data sharing, matching, calculating and storing, a novel scheme for cloud-assisted privacy protection contour matching under multiple keys based on proxy re-encryption and a homomorphic encryption algorithm depending on a third party, a scalable friend matching and recommendation scheme which does not reveal personal data of a user to a cloud end, a safe and effective data sharing and contour matching scheme and a scheme for an attribute-based conditional data re-encryption structure. Although these solutions make use of cryptographic algorithms and cloud computing to achieve privacy protection and data security, the cloud is a semi-trusted center, which is honest but curious about data, inevitably with some security risks, and in addition, the above solutions face the risk of a single point of failure. In addition, if the cloud server is attacked, the privacy information of the user can be revealed.
Disclosure of Invention
The invention provides a social system and a method with incentive mechanism symptom matching based on a block chain, which are used for realizing safe symptom matching and privacy protection based on a block chain technology and an intelligent contract, and the incentive mechanism can encourage more users to participate in the system and simultaneously enable the users to pay and access data fairly.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention also provides a social system with incentive mechanism symptom matching based on the blockchain, which comprises the following components: the social contact member location end is used for encrypting the keywords of the symptoms by using the attribute key to generate a keyword ciphertext, uploading the keyword ciphertext to the block chain under the condition that the keywords are verified to be real, and pricing disease-related data of the social contact member based on an incentive mechanism in a preset intelligent contract; and the requester is located and used for sending a search gate to the block chain to realize matching search of similar symptoms, obtaining pricing of a social member with similar symptoms matched with the symptoms corresponding to the disease-related data expected to be viewed by the requester when the social member with similar symptoms is searched, and viewing the disease-related data of the social member when payment is completed and the cost corresponding to the pricing is completed.
In addition, the invention also provides a social method with incentive mechanism symptom matching based on the blockchain, which uses the social system with incentive mechanism symptom matching based on the blockchain, and the social method with incentive mechanism symptom matching based on the blockchain comprises the following steps: step 1, initializing the social system with incentive mechanism symptom matching based on the block chain; step 2, the side where the social member is located generates a keyword ciphertext corresponding to the symptom of the social member; step 3, the end where the requester is located generates a search trapdoor corresponding to data which the requester expects to view; step 4, finding out similar symptoms matched with the symptoms corresponding to the data which the requester desires to view and corresponding social members from the keyword ciphertext by the end where the requester is located through the search trapdoor; step 5, setting pricing based on an incentive mechanism by the located group of the found social members; and step 6, when the end where the requester is located pays the fee corresponding to the pricing, checking the disease related data of the social member.
Preferably, the method of step 1 comprises: step 11, given a security parameter λ, the Attribute Authority (AA) selects a bilinear mapG1And G2Is an addition cycle group in which two prime numbers q are the same, where GTIs a multiplicative cyclic group of prime numbers q, P1Is an additive cyclic group G1Is generated from P2Is an additive cyclic group G2A generator of (2); step 12, AA selects a Hash function:and randomly select mu1,μ2, Representing a property space in a system, let m be the size of a bit array of a Bloom Filter (BF), and k be the number of hash functions associated with the BF; AA selectionRandom group element h1,h2,...,hU∈G1And generates k hash functions H1'(),H'2(),...,H'k() Mapping random group elements to [1, m]At a certain position within the range of the mobile terminal,MSK=(μ1,μ2,θi) (ii) a Wherein, MPK is the master public key, MSK is the master secret key; step 13, the AA generates an attribute key (N, ρ) upon registration of the requester, which is configured to have a Linear Secret Sharing Scheme (LSSS) access structure, where N is an l × N matrix, TrIs a set of different attributes within N,ρ is a function that maps the rows of matrix N to attributes; selecting a random vectorWherein the random vectorWill be used to share μ1For 1. ltoreq. i.ltoreq.l, calculateWherein N isiIs the ith row of N, and continues to selectCalculation of Ai=λP2i+θρ(i)σiP2,Bi=σiP2,Ei,b=θbσiP2,ak=(Ai,Bi,Ei,b) Where ak is the private key.
Preferably, the step 2 includes: step 21, the Social Members (SM Social Members) select random valuesAnd calculates a keyword cipher text cw={I1,Iz,I2In which I1=χP1,Iz=θzχP1,z∈Att,Step 22, ifThe keyword is verified as being untrue and transmission of the keyword ciphertext c is deniedwOtherwise, the key word is verified as true, and the SM sends a key word ciphertext cwTo the blockchain, storing W by deploying BF in a Verification Smart Contract (VSC), where W is a keyword and W is a preset set of keywords.
Preferably, the step 3 comprises: step 31, obtaining the private key ak of the requester (JR, Joining requests) ═ ai,Bi,Ei,b) (ii) a Step 32, selecting a random vectorThe vectorWill be used to share μ2(ii) a Step 33, calculateSelectingCalculating T1,i=ηiH1(W)P2+θiσiP2,T2,i=iBi,T3,i,b=Ei,bTo obtain search trapdoors Tw=(T1,i,T2,i,T3,i,b) Wherein, in the step (A),
preferably, the step 4 comprises: step 41, determine whether the following equation holds, e (I)1,∑i∈Iπi(T1,i+∑z∈Δ/ρ(i)T3,i,z))=e(∑z∈ΔIz,∑i∈IπiT2,i)·I2(ii) a Step 42, if yes, the keyword cipher text c is processedw={I1,Iz,I2The corresponding symptom is treated as a similar symptom that matches the symptom that the requestor desires to view the data.
Preferably, said step 5 is configured to set pricing based on the optimal pricing mechanism of the Stackelberg game, wherein: requester benefit Ur(xj,pj)=fjajQ-xjpjWherein x isjThe access volume of the requester of social member j, the access unit price of the social member is pj,fjExpressed as a small amount of charge to be paid as a reward, ajIs the access willingness of the requester; membership benefit Uj(xj,pj)=sjxjpj-xjcjWherein c isjUnit cost, s, set for social Member jjA reputation score for a social member, the reputation score configured to be dynamically related to feedback of a requester; the maximum value of the benefit of the requester and the social member is configured as a balance point (x)* j,p* j)。
Compared with the prior art, the social system with incentive mechanism symptom matching based on the block chain encrypts the keywords by using the attribute key encryption algorithm, so that the privacy of data is protected from being leaked, the existence of the keywords can be determined by verifying the authenticity of the keywords, and in addition, in order to encourage more users to participate in the system, a fair payment mode is set by the system, so that the matching of safe symptoms is realized, the privacy of the users is also protected, the usability and the fluency of data are improved, and the development trend of data matching under the current value Internet background is met.
Additional features and advantages of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate an embodiment of the invention and, together with the description, serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a block diagram of a blockchain-based symptom matching social system with incentive mechanism of the present invention; and
FIG. 2 is a flow chart of a blockchain-based social method with incentive mechanism symptom matching according to the present invention; and
FIG. 3 is a block diagram of the working modules of the block chain-based symptom matching social system with incentive mechanism of the present invention.
Description of reference numerals:
1. social member location end 2 and requester location end
3. Block chain
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present invention, are given by way of illustration and explanation only, not limitation.
The characteristics of decentralization, transparency, anonymity, autonomy and the like of the block chain 3 are beneficial to realizing safe symptom matching, and meanwhile, the validity of the key words is verified by utilizing an intelligent contract. The incentive mechanism encourages more users to actively participate in the system, and the fairness is also embodied. At present, a cloud data sharing system in the prior art has a risk of privacy leakage single-point failure.
Fig. 1 and 3 illustrate a block chain 3-based social system with incentive mechanism symptom matching according to the present invention, and as shown in fig. 1 and 3, the block chain 3-based social system with incentive mechanism symptom matching includes: the social contact member location end 1 is used for encrypting keywords of symptoms by using an attribute key to generate a keyword ciphertext, uploading the keyword ciphertext to a block chain 3 under the condition that the keywords of the symptoms are verified to be real, pricing disease-related data of the social contact member based on an incentive mechanism in a preset intelligent contract, and is a client terminal which is connected with an attribute center and the block chain 3, is used for receiving initialization parameters of the attribute center and is used for subsequent steps of encryption, uploading and pricing; and the requester-located end 2 is used for sending a search gate to the block chain 3 to realize matching search of similar symptoms, acquiring pricing of a social member with similar symptoms matched with the symptoms corresponding to the disease-related data expected to be viewed by the requester when the social member with similar symptoms is searched, and viewing the disease-related data of the social member when payment is completed and the price corresponds to the pricing.
In addition, fig. 2 is a block chain 3-based social method with incentive mechanism symptom matching according to the present invention, and as shown in fig. 2, the present invention further provides a block chain 3-based social method with incentive mechanism symptom matching according to the present invention, where the block chain 3-based social system with incentive mechanism symptom matching is used, the block chain 3-based social method with incentive mechanism symptom matching includes:
In practice, the initialization process is to write parameters, reduce the attribute authority, set up functions, set up public keys, and register keys. Specifically, the initialization process includes:
step 11, given a security parameter λ, the Attribute Authority (AA) selects a bilinear mapG1And G2Is an addition cycle group in which two prime numbers q are the same, where GTIs a multiplicative cyclic group of prime numbers q, P1Is an additive cyclic group G1Is generated from P2Is an additive cyclic group G2A generator of (2);
step 12, AA selects a Hash function:and randomly select mu1,μ2, Representing a property space in a system, let m be the size of a bit array of a Bloom Filter (BF), and k be the number of hash functions associated with the BF; AA selectionRandom group element h1,h2,...,hU∈G1And generates k hash functions H1'(),H'2(),...,H'k() Mapping random group elements to [1, m]At a certain position within the range of the mobile terminal,
MSK=(μ1,μ2,θi);
wherein, MPK is the master public key, MSK is the master secret key;
at the registration of the requester, the AA generates an attribute key (N, p) configured to have a Linear Secret Sharing Scheme (LSSS) access structure, step 13, wherein,
n is a matrix of l × N, TrIs a set of different attributes within N,
the function p maps the rows of the matrix N to attributes, selecting a random vectorWherein the random vectorWill be used to share μ1For 1. ltoreq. i.ltoreq.l, calculateWherein N isiIs the ith row of N, and continues to selectCalculation of Ai=λP2i+θρ(i)σiP2,Bi=σiP2,Ei,b=θbσiP2,ak=(Ai,Bi,Ei,b) Where ak is the private key.
The method comprises the following specific steps:
step 21, SM selection is followedMachine valueKey word ciphertext I of calculation symptom1=χP1,Iz=θzχP1,z∈Att,
Step 22, SM sends cwTo blockchain 3, share their medical experience symptoms and signs. To verify that the security index is a W selected from a predefined set of keys, the W is stored by deploying the BF in a smart contract (VSC). If it is notThen 0 is returned, otherwise it returns the ciphertext c of 1, SMwIs sent to the blockchain 3, where W is a keyword and W is a preset set of keywords.
And 3, the end 2 where the requester is located generates a search trapdoor corresponding to the data which the requester expects to view.
Specifically, the steps are as follows:
step 31, obtaining the private key ak of the requester (JR, Joining requests) ═ ai,Bi,Ei,b);
SelectingCalculating T1,i=ηiH1(W)P2+θiσiP2,T2,i=iBi,T3,i,b=Ei,bTo obtain search trapdoors Tw=(T1,i,T2,i,T3,i,b) Wherein, in the step (A),
and 4, finding out similar symptoms matched with the symptoms corresponding to the data which the requester desires to view and corresponding social members of the similar symptoms from the keyword ciphertext by the terminal 2 where the requester is located through the search trapdoor.
Step 41, determining whether the following equation is true,
e(I1,∑i∈Iπi(T1,i+∑z∈Δ/ρ(i)T3,i,z))=e(∑z∈ΔIz,∑i∈IπiT2,i)·I2;
step 42, if yes, the keyword cipher text c is processedw={I1,Iz,I2The corresponding symptom is treated as a similar symptom that matches the symptom that the requestor desires to view the data.
And step 5, setting pricing by the found social member terminal 1 based on an incentive mechanism.
In particular, said step 5 is configured to set pricing based on the optimal pricing mechanism of the Stackelberg game, wherein:
requester benefit Ur(xj,pj)=fjajQ-xjpjWherein x isjThe access volume of the requester of social member j, the access unit price of the social member is pj,fjExpressed as a small amount of charge to be paid as a reward, ajIs the access willingness of the requester;
membership benefit Uj(xj,pj)=sjxjpj-xjcjWherein c isjUnit cost, s, set for social Member jjScoring a reputation of a social member, the reputationThe score is configured to be dynamically related to the feedback of the requestor;
the maximum value of the benefit of the requester and the social member is configured as a balance point (x)* j,p* j). At this time, the maximum benefit of the requester is:
Ur(x* j,p* j)=fjajQ-x* jp* j;
the maximum benefit of the member is:
Uj(x* j,p* j)=sjx* jp* j-x* jcj;
the incentive mechanism promotes active participation of social members in experience sharing. If the balance between the requestor and the social members is broken, some contradictions and conflicts in interests may arise.
And 6, when the terminal 2 where the requester is located pays the fee corresponding to the pricing, checking disease related data of the social member, wherein the disease related data comprise medical experience symptoms and physical signs and are mainly used for communication among patients.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (7)
1. A blockchain-based social system having incentive scheme symptom matching, the blockchain-based social system having incentive scheme symptom matching comprising:
the social contact member location end is used for encrypting the keywords of the symptoms by using the attribute key to generate a keyword ciphertext, uploading the keyword ciphertext to the block chain under the condition that the keywords are verified to be real, and pricing disease-related data of the social contact member based on an incentive mechanism in a preset intelligent contract; and
the requester is located at the end and used for sending a search gate to the block chain to realize matching search of similar symptoms, obtaining pricing of a social member with similar symptoms matched with the symptoms corresponding to the disease-related data expected to be viewed by the requester when the social member with similar symptoms is searched, and viewing the disease-related data of the social member when payment is completed and the price is corresponding to the pricing.
2. A block chain-based social method with incentive mechanism symptom matching using the block chain-based social system with incentive mechanism symptom matching according to claim 1, wherein the block chain-based social method with incentive mechanism symptom matching comprises:
step 1, initializing the social system with incentive mechanism symptom matching based on the block chain;
step 2, the side where the social member is located generates a keyword ciphertext corresponding to the symptom of the social member;
step 3, the end where the requester is located generates a search trapdoor corresponding to data which the requester expects to view;
step 4, finding out similar symptoms matched with the symptoms corresponding to the data which the requester desires to view and corresponding social members from the keyword ciphertext by the end where the requester is located through the search trapdoor;
step 5, setting pricing based on an incentive mechanism by the located group of the found social members; and
and 6, checking the disease related data of the social member when the end where the requester is located pays the fee corresponding to the pricing.
3. The block chain based symptom matching social method with incentive mechanism according to claim 2, wherein the method of step 1 comprises:
step 11, given a security parameter λ, the Attribute Authority (AA) selects a bilinear mapG1And G2Is an addition cycle group in which two prime numbers q are the same, where GTIs a multiplicative cyclic group of prime numbers q, P1Is an additive cyclic group G1Is generated from P2Is an additive cyclic group G2A generator of (2);
step 12, AA selects a Hash function:and randomly select Representing a property space in a system, let m be the size of a bit array of a Bloom Filter (BF), and k be the number of hash functions associated with the BF; AA selectionRandom group element h1,h2,...,hU∈G1And generates k hash functions H'1(),H'2(),...,H'k() Mapping random group elements to [1, m]At a certain position within the range of the mobile terminal,
MSK=(μ1,μ2,θi);
wherein, MPK is the master public key, MSK is the master secret key;
at the registration of the requester, the AA generates an attribute key (N, p) configured to have a Linear Secret Sharing Scheme (LSSS) access structure, step 13, wherein,
n is a matrix of l × N, TrIs a set of different attributes within N,
ρ is a function that maps the rows of matrix N to attributes;
selecting a random vectorWherein the random vectorWill be used to share μ1For 1. ltoreq. i.ltoreq.l, calculateWherein N isiIs the ith row of N, and continues to select
4. The block chain based symptom matching social method with incentive mechanism according to claim 3, wherein the step 2 comprises:
step 21, the Social Members (SM Social Members) select random valuesAnd calculates a keyword cipher text cw={I1,Iz,I2In which I1=χP1,Iz=θzχP1,z∈Att,
Step 22, ifThe keyword is verified as being untrue and transmission of the keyword ciphertext c is deniedwOtherwise, the key word is verified as true, and the SM sends a key word ciphertext cwAnd storing W by deploying BF in a smart contract (VSC) to the blockchain, wherein the W is a keyword and the W is a preset keyword set.
5. The block chain based symptom matching social method with incentive mechanism according to claim 4, wherein the step 3 comprises:
step 31, obtaining the private key ak of the requester (JR, Joining requests) ═ ai,Bi,Ei,b);
6. the block chain based symptom matching social method with incentive mechanism according to claim 5, wherein the step 4 comprises:
step 41, determining whether the following equation is true,
e(I1,∑i∈Iπi(T1,i+∑z∈Δ/ρ(i)T3,i,z))=e(∑z∈ΔIz,∑i∈IπiT2,i)·I2;
step 42, if yes, the keyword cipher text c is processedw={I1,Iz,I2The corresponding symptom is treated as a similar symptom that matches the symptom that the requestor desires to view the data.
7. The blockchain-based social method having incentive scheme symptom matching according to claim 6, wherein the step 5 is configured to set pricing based on an optimal pricing scheme of a Stackelberg game, wherein:
requester benefit Ur(xj,pj)=fjajQ-xjpjWherein x isjThe access volume of the requester of social member j, the access unit price of the social member is pj,fjExpressed as a small amount of charge to be paid as a reward, ajIs the access willingness of the requester;
membership benefit Uj(xj,pj)=sjxjpj-xjcjWherein c isjUnit cost, s, set for social Member jjReputation for social membersA score configured to dynamically correlate to feedback of a requester;
the maximum value of the benefit of the requester and the social member is configured as a balance point (x)* j,p* j)。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011013850.7A CN112149165B (en) | 2020-09-24 | 2020-09-24 | Blockchain-based symptom matching social system and method with incentive mechanism |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011013850.7A CN112149165B (en) | 2020-09-24 | 2020-09-24 | Blockchain-based symptom matching social system and method with incentive mechanism |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112149165A true CN112149165A (en) | 2020-12-29 |
CN112149165B CN112149165B (en) | 2024-01-23 |
Family
ID=73896463
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011013850.7A Active CN112149165B (en) | 2020-09-24 | 2020-09-24 | Blockchain-based symptom matching social system and method with incentive mechanism |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112149165B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114827212A (en) * | 2022-06-27 | 2022-07-29 | 浙江省邮电工程建设有限公司 | Vehicle communication management method for intelligent traffic |
CN115134136A (en) * | 2022-06-24 | 2022-09-30 | 蚂蚁区块链科技(上海)有限公司 | System, method and device for social contact based on block chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190303867A1 (en) * | 2018-03-28 | 2019-10-03 | Vinod Nair | Blockchain based crowdsourcing medical billing for medical insurance claims processing |
CN110378143A (en) * | 2019-04-26 | 2019-10-25 | 杭州数焓科技有限公司 | A kind of EHR based on block chain can search for encryption method |
US20190354693A1 (en) * | 2018-05-17 | 2019-11-21 | International Business Machines Corporation | Blockchain for managing access to medical data |
CN110599147A (en) * | 2019-09-17 | 2019-12-20 | 福州大学 | Ciphertext retrieval fair payment method and system based on block chain |
CN110688673A (en) * | 2019-09-19 | 2020-01-14 | 安徽师范大学 | Medical data sharing method, device and system based on cloud server and block chain |
CN110889120A (en) * | 2019-10-10 | 2020-03-17 | 深圳创链数据科技有限公司 | System and method for big health data based on block chain technology |
CN110929292A (en) * | 2019-12-10 | 2020-03-27 | 清华大学 | Medical data searching method and device |
-
2020
- 2020-09-24 CN CN202011013850.7A patent/CN112149165B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190303867A1 (en) * | 2018-03-28 | 2019-10-03 | Vinod Nair | Blockchain based crowdsourcing medical billing for medical insurance claims processing |
US20190354693A1 (en) * | 2018-05-17 | 2019-11-21 | International Business Machines Corporation | Blockchain for managing access to medical data |
CN110378143A (en) * | 2019-04-26 | 2019-10-25 | 杭州数焓科技有限公司 | A kind of EHR based on block chain can search for encryption method |
CN110599147A (en) * | 2019-09-17 | 2019-12-20 | 福州大学 | Ciphertext retrieval fair payment method and system based on block chain |
CN110688673A (en) * | 2019-09-19 | 2020-01-14 | 安徽师范大学 | Medical data sharing method, device and system based on cloud server and block chain |
CN110889120A (en) * | 2019-10-10 | 2020-03-17 | 深圳创链数据科技有限公司 | System and method for big health data based on block chain technology |
CN110929292A (en) * | 2019-12-10 | 2020-03-27 | 清华大学 | Medical data searching method and device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115134136A (en) * | 2022-06-24 | 2022-09-30 | 蚂蚁区块链科技(上海)有限公司 | System, method and device for social contact based on block chain |
CN115134136B (en) * | 2022-06-24 | 2024-03-29 | 蚂蚁区块链科技(上海)有限公司 | System, method, device, storage medium and computing device for socializing based on blockchain |
CN114827212A (en) * | 2022-06-27 | 2022-07-29 | 浙江省邮电工程建设有限公司 | Vehicle communication management method for intelligent traffic |
CN114827212B (en) * | 2022-06-27 | 2022-09-16 | 浙江省邮电工程建设有限公司 | Vehicle communication management method for intelligent traffic |
Also Published As
Publication number | Publication date |
---|---|
CN112149165B (en) | 2024-01-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11277412B2 (en) | System and method for storing and distributing consumer information | |
RU2652443C1 (en) | Voters votes quantity collected by electronic voting determining system and method | |
Zyskind et al. | Decentralizing privacy: Using blockchain to protect personal data | |
KR101843340B1 (en) | Privacy-preserving collaborative filtering | |
CN108173805B (en) | Block chain-based distributed anonymous area collaborative construction method with privacy preservation function | |
Zhou et al. | PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributedm-healthcare cloud computing system | |
CN111986755A (en) | Data sharing system based on block chain and attribute-based encryption | |
ES2558169T3 (en) | Method to control a user's personal data access | |
JP2008503966A (en) | Anonymous certificate for anonymous certificate presentation | |
Sun et al. | A searchable personal health records framework with fine-grained access control in cloud-fog computing | |
CN112149165B (en) | Blockchain-based symptom matching social system and method with incentive mechanism | |
CN106656997A (en) | Mobile social network based agent proxy re-encryption cross-domain friend-making privacy protection method | |
EP4152197A1 (en) | Methods and systems for managing user data privacy | |
US20240143795A1 (en) | Method and device for intersecting unbalanced private sets | |
Shahraki et al. | Attribute-based data access control for multi-authority system | |
Adams | Achieving non‐transferability in credential systems using hidden biometrics | |
Xue et al. | Blockchain-based fair and fine-grained data trading with privacy preservation | |
Khasim et al. | An improved fast and secure CAMEL based authenticated key in smart health care system | |
Xie et al. | Privacy-preserving mobile roaming authentication with security proof in global mobility networks | |
Ali et al. | Anonymous aggregate fine-grained cloud data verification system for smart health | |
CA3050487A1 (en) | System and method for storing and distributing consumer information | |
Zhang et al. | A blockchain-based anonymous attribute-based searchable encryption scheme for data sharing | |
Peng et al. | A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain. | |
CN111447058B (en) | Book resource access control method based on Chinese remainder theorem | |
CN107231230A (en) | Cross-domain dynamic anonymity authentication group key management method and system based on illness |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |