CN112261015A - Block chain based information sharing method, platform, system and electronic equipment - Google Patents
Block chain based information sharing method, platform, system and electronic equipment Download PDFInfo
- Publication number
- CN112261015A CN112261015A CN202011085361.2A CN202011085361A CN112261015A CN 112261015 A CN112261015 A CN 112261015A CN 202011085361 A CN202011085361 A CN 202011085361A CN 112261015 A CN112261015 A CN 112261015A
- Authority
- CN
- China
- Prior art keywords
- information
- platform
- shared
- encrypted
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 100
- 238000006243 chemical reaction Methods 0.000 claims abstract description 95
- 230000015654 memory Effects 0.000 claims description 21
- 230000000694 effects Effects 0.000 description 14
- 230000008569 process Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 11
- 238000013475 authorization Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000004590 computer program Methods 0.000 description 4
- 230000009466 transformation Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the application provides an information sharing method, a platform, a system, electronic equipment and a storage medium based on a block chain, which relate to the field of the Internet and the block chain, and comprise the following steps: the method comprises the steps that a first platform receives information of a primary account sent by a second platform, the primary account is one account of a preset block chain, the primary account is used for storing information to be shared after encryption by the second platform, the first platform conducts re-encryption conversion on the encrypted information to be shared according to the information of the primary account, the first platform stores the information to be shared after re-encryption conversion to a target account, and the target account is the other account of the block chain.
Description
Technical Field
The embodiment of the application relates to the field of internet and block chains, in particular to an information sharing method, a platform, a system, electronic equipment and a storage medium based on a block chain.
Background
The blockchain technology has the characteristics of being non-falsifiable and traceable, and therefore, the blockchain technology is gradually and widely applied to various fields, for example, in order to solve the trust problem, the blockchain technology is applied to the security service of information.
In the prior art, after the information to be shared is encrypted and linked up by the information provider, the information provider performs sharing authorization on the information sharing party, the information sharing party can decrypt the encrypted information to be shared based on the decryption information, and the analysis information includes a private key of the information provider and a public key of the information sharing party.
In the process of implementing the present application, the inventor finds that at least the following problems exist in the prior art: how to avoid the disclosure of the private key of the information provider becomes a problem to be solved urgently.
Disclosure of Invention
The embodiment of the application provides an information sharing method, a platform, a system, electronic equipment and a storage medium based on a block chain, and aims to solve the problem of privacy disclosure of an information provider.
In one aspect, an embodiment of the present application provides an information sharing method based on a block chain, which is applied to a first platform, and the method includes:
receiving information of a primary account sent by a second platform, wherein the primary account is an account preset in a block chain and is used for storing information to be shared after the second platform is encrypted;
carrying out re-encryption conversion on the encrypted information to be shared according to the information of the primary account;
storing the information to be shared after the re-encryption conversion to a target account, wherein the target account is another account of the block chain;
and sending the information of the target account to a third platform, wherein the information of the target account is used for sharing the information to be shared.
In this embodiment, by introducing the first platform (which is equivalent to introducing the intermediate platform), and performing re-encryption processing on the encrypted information to be shared provided by the second platform through the first platform, and performing transfer, so that the third platform shares the information to be shared based on the transferred information (i.e., the information of the target account), the drawback that the private key of the second platform may be leaked due to the fact that the second platform needs to share the private key of the second platform with the third platform in the related art is avoided, thereby ensuring the security of the private key of the second platform in the information sharing process, and improving the flexibility and diversity of information sharing.
In some embodiments, performing re-encryption conversion on the encrypted information to be shared according to the information of the primary account includes:
locating the primary account in the blockchain according to the information of the primary account;
acquiring encrypted information to be shared from the primary account;
and carrying out re-encryption conversion on the encrypted information to be shared.
In this embodiment, the first platform determines the primary account through information based on the primary account, obtains the encrypted information to be shared from the primary account, and performs re-encryption conversion, and the encrypted information to be shared is invisible to the first platform, so that leakage of the information to be shared is avoided, and the technical effect of improving the security of the information to be shared is achieved.
In some embodiments, the method further comprises:
receiving a re-encryption key sent by the second platform;
and carrying out re-encryption conversion on the encrypted information to be shared according to the information of the primary account, wherein the re-encryption conversion comprises the following steps: and performing re-encryption conversion on the encrypted information to be shared according to the information of the primary account and the re-encryption key.
In some embodiments, the re-encryption key is generated based on a private key of the second platform and a public key of the third platform.
In this embodiment, the re-encryption key generated based on the private key of the second platform and the public key of the third platform can enable the third platform to share the information to be shared after re-encryption conversion based on the public key of the third platform, thereby achieving the technical effects of flexibility and convenience of information sharing.
In some embodiments, performing re-encryption conversion on the encrypted information to be shared according to the information of the primary account and the re-encryption key includes:
acquiring encrypted information to be shared according to the information of the primary account;
and encrypting the encrypted information to be shared according to the re-encryption key to obtain the re-encrypted and converted information to be shared which is decrypted based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
In this embodiment, by generating a key pair in the form of a bilinear pair, the reliability of encryption can be improved, thereby providing the technical effect of security of information sharing.
In another aspect, an embodiment of the present application provides an information sharing method based on a block chain, which is applied to a second platform, and the method includes:
storing the encrypted information to be shared to a preset initial account of the block chain;
and sending the information of the primary account to a first platform, wherein the information of the primary account is used for carrying out re-encryption conversion on the encrypted information to be shared and storing the information to a target account of the block chain, and the information of the target account is used for sharing the information to be shared.
In some embodiments, the information of the primary account is used to locate the primary account in the blockchain and obtain encrypted information to be shared from the primary account.
In some embodiments, the method further comprises:
and sending a re-encryption key to the first platform, wherein the re-encryption key is used for performing re-encryption conversion on the encrypted information to be shared.
In some embodiments, the method further comprises:
receiving a sharing request sent by a third platform, wherein the sharing request comprises a public key of the third platform;
and generating the re-encryption key according to the private key of the second platform and the public key of the third platform.
In some embodiments, the performing re-encryption conversion on the encrypted information to be shared includes: and encrypting the encrypted information to be shared according to the re-encryption key to obtain the re-encrypted and converted information to be shared which is decrypted based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
In some embodiments, the encrypted information to be shared is information obtained by encrypting the ticket information based on the public key of the second platform.
In another aspect, an embodiment of the present application provides an information sharing method based on a block chain, which is applied to a third platform, and the method includes:
receiving information of a target account sent by a first platform, wherein the target account is one account of a preset block chain;
acquiring information to be shared after re-encryption conversion according to the information of the target account, wherein the information to be shared after re-encryption conversion is obtained by performing re-encryption conversion on the encrypted information to be shared in the primary account and storing the information to be shared to the target account;
and decrypting the information to be shared after the re-encryption conversion to obtain the information to be shared.
In some embodiments, the re-encrypted information to be converted is generated by performing re-encryption conversion on the encrypted information to be shared based on a re-encryption key.
In some embodiments, the re-encryption key is generated based on a private key of the second platform and a public key of the third platform.
In some embodiments, the re-encrypted and converted information to be shared is the information to be shared, which is obtained by encrypting the encrypted information to be shared according to the re-encryption key and decrypting the encrypted information to be shared based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
In some embodiments, the encrypted information to be shared is information obtained by encrypting the ticket information based on a public key of the second platform.
In some embodiments, the information to be shared after the re-encryption conversion is generated by positioning the primary account according to the information of the primary account, acquiring the encrypted information to be shared from the primary account, and performing the re-encryption conversion on the encrypted information to be shared.
In another aspect, an embodiment of the present application provides a platform based on a block chain, where the platform includes:
the receiving module is used for receiving information of a primary account sent by a second platform, wherein the primary account is an account preset in a block chain and is used for storing information to be shared after the second platform is encrypted;
the re-encryption module is used for performing re-encryption conversion on the encrypted information to be shared according to the information of the primary account;
the unloading module is used for storing the information to be shared after the re-encryption conversion to a target account, wherein the target account is another account of the block chain;
and the first sending module is used for sending the information of the target account to a third platform, and the information of the target account is used for sharing the information to be shared.
In some embodiments, the re-encryption module is configured to locate the primary account in the block chain according to the information of the primary account, obtain the encrypted information to be shared from the primary account, and perform re-encryption conversion on the encrypted information to be shared.
In some embodiments, the receiving module is configured to receive a re-encryption key sent by the second platform;
and the re-encryption module is used for performing re-encryption conversion on the encrypted information to be shared according to the information of the primary account and the re-encryption key.
In some embodiments, the re-encryption key is generated based on a private key of the second platform and a public key of the third platform.
In some embodiments, the re-encryption module is configured to obtain the encrypted information to be shared according to the information of the primary account, encrypt the encrypted information to be shared according to the re-encryption key, and obtain the re-encrypted and converted information to be shared, which is decrypted based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
In some embodiments, the encrypted information to be shared is information obtained by encrypting the ticket information based on the public key of the second platform.
In another aspect, an embodiment of the present application provides a platform based on a block chain, where the platform includes:
the storage module is used for storing the encrypted information to be shared to a preset primary account of the block chain;
and the second sending module is used for sending the information of the primary account to the first platform, wherein the information of the primary account is used for carrying out re-encryption conversion on the encrypted information to be shared and storing the information to a target account of the block chain, and the information of the target account is used for sharing the information to be shared.
In some embodiments, the information of the primary account is used to locate the primary account in the blockchain and obtain encrypted information to be shared from the primary account.
In some embodiments, the second sending module is configured to send a re-encryption key to the first platform, where the re-encryption key is used to perform re-encryption conversion on the encrypted information to be shared.
In some embodiments, the platform further comprises:
a first receiving module, configured to receive a sharing request sent by a third platform, where the sharing request includes a public key of the third platform;
and the generating module is used for generating the re-encryption key according to the private key of the second platform and the public key of the third platform.
In some embodiments, the re-encryption key is used to encrypt the encrypted information to be shared, and obtain re-encrypted and converted information to be shared, which is decrypted based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
In some embodiments, the encrypted information to be shared is information obtained by encrypting the ticket information based on the public key of the second platform.
In another aspect, an embodiment of the present application provides a platform based on a block chain, where the platform includes:
the second receiving module is used for receiving information of a target account sent by the first platform, wherein the target account is one account of a preset block chain;
the acquisition module is used for acquiring the information to be shared after the re-encryption conversion according to the information of the target account, and the information to be shared after the re-encryption conversion is generated by performing the re-encryption conversion on the encrypted information to be shared;
and the decryption module is used for decrypting the information to be shared after the re-encryption conversion to obtain the information to be shared.
In some embodiments, the re-encrypted information to be converted is generated by performing re-encryption conversion on the encrypted information to be shared based on a re-encryption key.
In some embodiments, the re-encryption key is generated based on a private key of the second platform and a public key of the third platform.
In some embodiments, the re-encrypted and converted information to be shared is the information to be shared, which is obtained by encrypting the encrypted information to be shared according to the re-encryption key and decrypting the encrypted information to be shared based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
In some embodiments, the encrypted information to be shared is information obtained by encrypting the ticket information based on a public key of the second platform.
In another aspect, an embodiment of the present application provides an information sharing system based on a block chain, including: the platform of any of the above embodiments.
In another aspect, an embodiment of the present application provides an electronic device, including: a memory, a processor;
a memory; a memory for storing the processor-executable instructions;
wherein the processor is configured to: a method as in any one of the embodiments above is performed.
In another aspect, the present application provides a computer-readable storage medium, in which computer-executable instructions are stored, and when executed by a processor, the computer-executable instructions are used to implement the method according to any one of the above embodiments.
The block chain-based information sharing method, platform, system, electronic device and storage medium provided by the embodiment of the application include: the first platform receives information of a primary account sent by the second platform, the primary account is one account of a preset block chain, the primary account is used for storing the information to be shared after the encryption of the second platform, the first platform carries out re-encryption conversion on the encrypted information to be shared according to the information of the primary account, the first platform stores the information to be shared after the re-encryption conversion to a target account, the target account is the other account of the block chain, by introducing the first platform so as to enable the third platform to share the information to be shared provided by the second platform by means of the first platform, on the one hand, the problem of the related art is avoided, the second platform needs to share the private key of the second platform with the third platform, which causes the disadvantage that the private key of the second platform may be revealed, therefore, the safety of the private key of the second platform is ensured in the information sharing process, and the technical effects of flexibility and diversity of information sharing are improved; on the other hand, the disadvantage that the encryption resource consumption is large due to the fact that the public key of the third platform is encrypted for the second time when the second platform receives the request of the third platform for sharing the information to be shared can be avoided, and therefore the computing power of the second platform is released, namely the technical effects that the computing resource of the second platform can be saved, the load of the second platform is reduced, and the operation performance (such as operation efficiency) of the second platform is improved can be achieved; on the other hand, in the process of re-encryption conversion and unloading of the first platform, the information to be shared is in an encrypted state and is invisible to the first platform, so that the technical effects of safety and reliability in the process of sharing the information to be shared can be ensured.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a schematic diagram of an application scenario of an information sharing method based on a block chain according to an embodiment of the present application;
FIG. 2 is a schematic diagram according to a first embodiment of the present application;
FIG. 3 is a schematic view of a second embodiment according to the present application;
FIG. 4 is a schematic view of a third embodiment according to the present application;
FIG. 5 is a schematic view of a fourth embodiment according to the present application;
FIG. 6 is a schematic illustration according to a fifth embodiment of the present application;
FIG. 7 is a schematic illustration according to a sixth embodiment of the present application;
FIG. 8 is a schematic view of a seventh embodiment according to the present application;
FIG. 9 is a schematic view of an eighth embodiment according to the present application;
with the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terms referred to in the embodiments of the present application are explained as follows:
block chains: refers to a database with data "hash validation" functionality. The blocks are data blocks, the data blocks are combined into a chain structure according to the time sequence, and the reliability of the database is maintained collectively in a distributed accounting mode by using a cryptographic algorithm; all data blocks are connected in time sequence, thereby forming a block chain.
Secret key: in cryptography, a key (also commonly referred to as a key) refers to a secret information used to perform cryptographic applications such as encryption, decryption, integrity verification, etc.
Private key: refers to a private key, i.e., a key known only to itself.
Public key: refers to a public key.
Key pair: it is meant that the private key and the public key generally occur in pairs, and thus a combination including both the private key and the public key may be referred to as a key pair.
The embodiment of the present application provides an information sharing method based on a block chain (hereinafter referred to as an information sharing method), which can be applied to the sharing of information between two different entities. For example, the sharing of information between two different enterprises; or, information sharing between different departments of the same enterprise; or the sharing of information between two different users, etc., and are not listed here.
Referring to fig. 1, an application scenario of the information sharing method according to the embodiment of the present application is exemplarily described by taking two different entities as two different enterprises as an example. Fig. 1 is a schematic view of an application scenario of an information sharing method based on a block chain according to an embodiment of the present application.
Illustratively, the two different enterprises are enterprise a and enterprise B, respectively, and as shown in fig. 1, the platform corresponding to enterprise a may be referred to as platform a, and the platform corresponding to enterprise B may be referred to as platform B.
The platform a and the platform B may be cloud service platforms, and may also be platforms provided with local servers, which is not limited in this embodiment.
In the application scenario shown in fig. 1, a platform a is a provider of information to be shared, and a platform B is a receiver of the information to be shared, that is, the platform B shares the information to be shared provided by the platform a.
As can be seen from fig. 1, the platform a may upload information to be shared to the block chain, and the platform B may obtain the information to be shared from the block chain, so that the platform B may share the information to be shared provided by the platform a.
It should be noted that the above example is only used for exemplary illustration, and the application scenario to which the information sharing method according to the embodiment of the present application may be applied is not to be understood as a limitation to the application scenario to which the information sharing method according to the embodiment of the present application is applied, for example, the application scenario to which the information sharing method according to the embodiment of the present application may also be an application scenario that the same enterprise cannot be divided, and the like, which are set forth in the above example; and cannot be understood as a limitation to elements in an application scenario of the information sharing method in the embodiment of the present application, for example, in a possible implementation scheme, the platform B may be a provider of information to be shared, and the platform a is a receiver of the information to be shared; for another example, in another possible implementation scheme, platform C may be added, so as to implement sharing of information to be shared by three parties, and the like.
In the related art, in order to avoid leakage of information to be shared, a sharing party platform (such as the platform a in the above example) is usually implemented by encrypting information to be shared, and in order to avoid leakage of a private key used for encrypting information to be shared, it is implemented by using a secondary encryption method.
However, the sharing platform in the related art adopts a secondary encryption manner to avoid leakage of the information to be shared and a private key used for encrypting the information to be shared, which may cause the disadvantage of large consumption of encryption resources of the sharing platform.
The inventor of the application obtains the inventive concept of the application through creative work: and introducing an intermediate platform, converting and transferring the information to be shared by the intermediate platform, and sending the information after being transferred to the sharing party, so that the sharing party shares the information to be shared based on the information after being transferred.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a schematic diagram according to a first embodiment of the present application, and as shown in fig. 2, the method for sharing information based on a block chain according to the present embodiment includes:
s101: the first platform receives information of a primary account sent by the second platform, wherein the primary account is an account preset in the block chain and used for storing the encrypted information to be shared by the second platform.
For example, the execution subject of this embodiment may be a first platform, and the first platform may be a server, a terminal device, a processor, a chip, and the like, which is not limited in this embodiment.
When the block chain-based information sharing method according to the embodiment of the present application is applied to the application scenario shown in fig. 1, the second platform is equivalent to a platform a providing information to be shared, and the first platform is used as an intermediate platform (not shown in the figure) assisting a platform B to obtain information to be shared.
That is to say, the second platform may encrypt the information to be shared, and store the encrypted information to be shared into an account of the block chain, where the account may be referred to as an initial account.
Illustratively, the block chain is formed by linking blocks which can be used for storing information, and therefore, the information of the primary account can be understood as related information of a specific block of the primary account in the block chain, and the block is used for storing related information of encrypted information to be shared, such as an address and the like.
That is, the first platform receives the information related to the account storing the encrypted information to be shared in an account (i.e., the primary account) of the blockchain.
S102: and the first platform performs re-encryption conversion on the encrypted information to be shared according to the information of the primary account.
Illustratively, the re-encryption conversion can be used for characterizing and encrypting the encrypted information to be shared again.
That is, this step can be understood as: when the first platform receives the encrypted information to be shared, the encrypted information to be shared may be encrypted again.
S103: and the first platform stores the information to be shared after the re-encryption conversion to a target account, wherein the target account is another account of the block chain.
For example, the description of the target account may be referred to in the above example, and the description of the primary account is not repeated here.
That is, this step can be understood as: and the first platform encrypts the encrypted information to be shared again and stores the encrypted information to another account (namely the target account) different from the primary account.
S104: and the first platform sends the information of the target account to the third platform, and the information of the target account is used for sharing the information to be shared.
For example, the description of the information about the target account may refer to the description of the information about the primary account, and is not repeated here.
Illustratively, the third platform is a platform for sharing information to be shared, and in the application scenario shown in fig. 1, the third platform corresponds to platform B.
That is, this step can be understood as: after the information to be shared after the re-encryption conversion is stored in the target account, the first platform may send the information of the target account to the third platform, so that the third platform reads the information to be shared after the re-encryption conversion from the target account based on the information of the target account, thereby implementing the sharing of the information to be shared by the third platform.
Based on the above analysis, this embodiment provides an information sharing method based on a block chain, where the method includes: the first platform receives information of a primary account sent by the second platform, the primary account is one account of a preset block chain, the primary account is used for storing the information to be shared after the encryption of the second platform, the first platform carries out re-encryption conversion on the encrypted information to be shared according to the information of the primary account, the first platform stores the information to be shared after the re-encryption conversion to a target account, the target account is the other account of the block chain, by introducing the first platform so as to enable the third platform to share the information to be shared provided by the second platform by means of the first platform, it is possible, on the one hand, the method can avoid the defect that the private key of the second platform is possibly revealed because the second platform needs to share the private key of the second platform with the third platform in the related technology, therefore, the safety of the private key of the second platform is ensured in the information sharing process, and the technical effects of flexibility and diversity of information sharing are improved; on the other hand, the disadvantage that the encryption resource consumption is large due to the fact that the public key of the third platform is encrypted for the second time when the second platform receives the request of the third platform for sharing the information to be shared can be avoided, and therefore the computing power of the second platform is released, namely the technical effects that the computing resource of the second platform can be saved, the load of the second platform is reduced, and the operation performance (such as operation efficiency) of the second platform is improved can be achieved; on the other hand, in the process of re-encryption conversion and unloading of the first platform, the information to be shared is in an encrypted state and is invisible to the first platform, so that the technical effects of safety and reliability in the process of sharing the information to be shared can be ensured.
For the reader to more deeply understand the information sharing method based on the block chain in the embodiment of the present application, the information sharing method based on the block chain in the embodiment of the present application is now described in more detail with reference to fig. 3.
Fig. 3 is a schematic diagram according to a second embodiment of the present application, and as shown in fig. 3, a block chain-based information sharing method includes:
s201: and the second platform encrypts the information to be shared by adopting the public key of the second platform.
Illustratively, the second platform may be understood as a provider of information to be shared, e.g., the second platform is platform a shown in fig. 1.
That is to say, the second platform may store a key pair of the second platform, where the key pair of the second platform includes a public key of the second platform and a private key of the second platform, and the second platform stores information to be shared, and in order to implement sharing of information to be shared by other platforms (such as a third platform in the following text), and avoid leakage of the information to be shared in an information sharing process, the second platform encrypts the information to be shared based on the public key of the second platform.
S202: and the second platform stores the encrypted information to be shared to a preset primary account of the block chain.
For the description of the primary account, reference may be made to the above embodiments, and details are not described herein.
S203: and the third platform sends a sharing request to the second platform, wherein the sharing request is used for requesting to share the information to be shared, and the sharing request carries the public key of the third platform.
Similarly, the third platform stores a private key pair of the third platform, and the private key pair of the third platform includes a public key of the third platform and a private key of the third platform.
That is, when the third platform needs to share the information to be shared, a sharing request may be sent to the second platform and carries the public key of the third platform.
For example, if the third platform sends the sharing request to the second platform for the first time, the public key of the third platform may be carried in the sharing request, and if the third platform does not send the sharing request to the second platform for the first time, the public key of the third platform may not be carried. For example, when the second platform receives the sharing request sent by the third platform for the first time, the public key of the third platform in the sharing request may be extracted and stored.
S204: the second platform determines whether to grant authorization to the third platform to share the information to be shared, if so (that is, the second platform grants the third platform to share the information to be shared), S205 is executed; if not (i.e., the second platform rejects the sharing of the information to be shared by the third platform), S214 is executed.
Illustratively, the sharing request may carry an identifier of the third platform, which is used to distinguish from other platforms. When the second platform receives the sharing request, it may determine whether to agree to authorize the third platform to share the information to be shared based on a black list and/or a white list set in advance by the identifier, and the setting of the black list and/or the white list may be set by the second platform based on a requirement, a history record, and the like, which is not limited in this embodiment.
For example, the second platform is set as a black list: when receiving a sharing request sent by the third platform, determining whether the third platform is a platform in a blacklist according to the identifier, if so, determining that the second platform rejects authorization, and if not, determining that the second platform agrees to authorization.
As another example, the white list set by the second platform is taken as an example: when receiving a sharing request sent by the third platform, determining whether the third platform is a platform in a white list according to the identifier, if so, determining that the second platform agrees with authorization, and if not, determining that the second platform rejects authorization.
As another example, the second platform is set as a black and white list: when receiving a sharing request sent by the third platform, the third platform may be determined to be a platform in a blacklist or a platform in a whitelist according to the identifier, if the third platform may be identified to be a platform in a whitelist, the second platform may determine to approve the authorization, and if the third platform may be identified to be a platform in a blacklist, the second platform may determine to reject the authorization.
It is worth noting that in the embodiment, the dynamic authorization of the second platform to the sharing request can be realized. For example, in the related art, when the second platform stores the encrypted information to be shared into the block chain, a platform authorized to share the information to be shared needs to be set by the second platform, and in this embodiment, the third platform dynamically determines the platform sending the sharing request, so as to achieve the technical effects of flexibility and diversity in sharing.
S205: the second platform generates a re-encrypted key according to the private key of the second platform and the public key of the third platform.
Illustratively, the re-encrypted keys may be used for the characterization, the second platform converts one ciphertext into a key for another ciphertext, and the third platform may decrypt the converted another ciphertext based on a private key of the third platform.
In this embodiment, if the second platform is platform a, the private key of the second platform is a1, the third platform is platform B, the public key of the third platform is B2, and g is a generator of the elliptic curve group, the re-encryption key rk may be generated based on equation 1A→BFormula 1:
rkA→B=(ga1b2)。
s206: and the second platform sends the information of the primary account and the re-encryption key to the first platform.
For an exemplary description of the information about the primary account, reference may be made to the above embodiments, and details are not repeated here. In addition, in combination with the above embodiments, the first platform may be understood as an intermediate platform, and is used to support the third platform to share the information to be shared provided by the first platform.
That is to say, after the second platform stores the encrypted information to be shared to the primary account in the block chain and generates the re-encryption key, both the information of the primary account and the re-encryption key may be sent to the first platform, so that the first platform can learn the information of the primary account, and then perform subsequent re-encryption conversion operations based on the re-encryption key.
Based on the above example, if the third platform sends the sharing request to the second platform for the first time, the public key of the third platform may be carried in the request, and if the third platform does not send the sharing request to the second platform for the first time, the public key of the third platform may not be carried. Similarly, for example, if the second platform receives the sharing request sent by the third platform for the first time, the second platform may generate a re-encryption key based on the public key of the third platform and the private key of the second platform, and send the re-encryption key to the first platform, and accordingly, the first platform may store the re-encryption key, and if the second platform does not receive the sharing request sent by the third platform for the first time, the third platform may send the information of the primary account to the first platform without calculating the re-encryption key again.
S207: and the first platform determines the primary account in the blockchain according to the information of the primary account.
Illustratively, the first platform determines the position of the primary account in the blockchain according to the information of the primary account, and positions the primary account based on the position.
S208: and the first platform extracts the encrypted information to be shared from the primary account and performs re-encryption conversion on the encrypted information to be shared according to the re-encryption key.
For example, a re-encryption transformation may be used to characterize that a ciphertext provided by one platform is re-encrypted with a re-encryption key, the ciphertext is transformed into another ciphertext, and the other ciphertext may be decrypted by another platform based on a private key of another platform.
For example, if the first platform is platform C, the first platform may perform re-encryption transformation based on equation 2, where equation 2:
cA*fC*(ga1b2)。
in the formula 2, cAFor encrypted information to be shared, fCIs a preset coefficient of the first platform.
It is worth mentioning that in the process of performing re-encryption conversion by the first platform, the encrypted information to be shared, on which the re-encryption conversion is performed, is invisible to the first platform, so that leakage of the encrypted information to be shared can be avoided, and the technical effect of ensuring the security of the encrypted information to be shared is achieved.
S209: and the first platform stores the information to be shared after the re-encryption conversion to the target account.
For example, the description of the target account may refer to the above example, and is not repeated here.
S210: the first platform sends information of the target account to the third platform.
For example, the description of the information about the target account may refer to the above example, and is not described herein again.
S211: and the third platform determines the target account in the blockchain according to the information of the target account.
Illustratively, the third platform determines the position of the target account in the blockchain according to the information of the target account, and positions the target account based on the position.
S212: and the third platform acquires the information to be shared after the re-encryption conversion from the target account.
S213: and the third platform decrypts the information to be shared after the re-encryption and the conversion according to the private key of the third platform to obtain the information to be shared.
Illustratively, based on the above example, the re-encryption transformation can be understood as: the first platform re-encrypts the encrypted to-be-shared information of the second platform based on the re-encryption key to generate information that can be analyzed by the third platform based on the private key of the third platform, so that in this embodiment, when the third platform obtains the re-encrypted and converted to-be-shared information, the re-encrypted and converted to-be-shared information can be decrypted based on the private key of the third platform to obtain the to-be-shared information.
In some embodiments, the key pair of the second platform is a key pair in the form of a bilinear pair.
Exemplarily, the private key of the second platform is in the form of (a1, a2) and the public key of the second platform is in the form ofWherein a1 and a2 are random numbers, g is a generator of a preset elliptic curve group, and Z represents e (g, g) operation.
Similarly, in some embodiments, the key pair of the third platform is a key pair in the form of a bilinear pair.
Illustratively, the private key of the third platform is in the form of (b1, b2) and the public key of the third platform is in the form ofWherein b1 and b2 are random numbers, g is a generator of a preset elliptic curve group, and Z represents e (g, g) operation.
It should be noted that, by setting the key pair (including the key pair of the first platform and the key pair of the second platform) as a key pair in a bilinear form, the technical effects of security and reliability of the encryption and decryption process can be improved.
S214: the second platform sends a message denying authorization to the third platform.
Fig. 4 is a schematic diagram according to a third embodiment of the present application, and as shown in fig. 4, the information sharing method based on a block chain provided in this embodiment includes:
s301: and the second platform stores the encrypted information to be shared to a preset primary account of the block chain.
For example, in combination with the description of the above example, the second platform may be a platform for providing information to be shared, and for the description of the primary account, reference may be made to the above example, and details are not described here.
S302: and sending the information of the primary account to the first platform, wherein the information of the primary account is used for carrying out re-encryption conversion on the encrypted information to be shared and storing the encrypted information to a target account of the block chain, and the information of the target account is used for sharing the information to be shared.
For example, as can be seen from the above example, the first platform may be an intermediary platform, and reference may be made to the above example for the description of the primary account information, the target account, and the target account information, which is not described herein again.
By way of example, the present embodiment may be understood as: after encrypting the information to be shared, the second platform stores the encrypted information to be shared into an account (namely, a primary account) of the block chain, the encrypted information to be shared is stored into the block chain, the encrypted information to be shared can be prevented from being tampered, and the technical effects of safety and reliability of the encrypted information to be shared are improved, the second platform sends information (such as address information and the like) of the primary account (namely, the account storing the information to be shared in the block chain) to the first platform, so that the first platform can re-encrypt the encrypted information to be shared and transfer the information (namely, a target account in the block chain) to share the information to be shared through the information of the target account, and the encrypted information to be shared in the primary account is invisible to the first platform, so that the encrypted information to be shared can be prevented from being leaked, and the sharing of the information to be shared is realized through the account information based on the target account without adopting a private key of the second platform, so that the leakage of the private key of the second platform can be avoided, and compared with the related technology, the second platform does not need to be encrypted for multiple times, thereby realizing the technical effects of ensuring the safety of the private key of the second platform, reducing the load of the second platform and improving the operating efficiency of the second platform.
In some embodiments, when sending the information of the primary account to the first platform, the second platform may send a re-encryption key to the first platform, where the re-encryption key is used to perform re-encryption conversion on the encrypted information to be shared.
That is to say, in this embodiment, on the basis of the above example, a re-encryption key is added, that is, after the second platform stores the encrypted information to be shared into the primary account, both the information of the primary account and the re-encryption key are sent to the first platform, so that the first platform obtains the encrypted information to be shared stored in the primary account according to the information of the primary account, and performs re-encryption conversion on the encrypted information to be shared based on the re-encryption key.
In some embodiments, based on the above example, the second platform receives a sharing request sent by the third platform, where the sharing request includes a public key of the third platform, and generates the re-encrypted key according to a private key of the second platform and the public key of the third platform.
That is, the re-encrypted key generated by the second platform is generated based on the private key of the second platform and the public key of the third platform.
In some embodiments, the information of the primary account is used to locate the primary account in the blockchain and obtain encrypted information to be shared from the primary account.
In some embodiments, on the basis of the above example, the re-encryption transformation may be understood as: and encrypting the encrypted information to be shared according to the re-encryption key to obtain the re-encrypted and converted information to be shared which is decrypted based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on a public key of the second platform, and the public key of the second platform and a private key of the second platform are a key pair based on a bilinear pair form.
In some embodiments, the encrypted information to be shared is information obtained by encrypting the ticket information based on a public key of the second platform.
Wherein the ticket information includes information of a ticket generated based on online shopping or the like.
Fig. 5 is a schematic diagram according to a fourth embodiment of the present application, and as shown in fig. 5, the information sharing method based on a block chain provided in this embodiment includes:
s401: and the third platform receives the information of the target account sent by the first platform, wherein the target account is one account of a preset block chain.
For example, the third platform may be a platform for sharing information to be shared, and reference may be made to the above example for the information about the target account and the description of the target account, which is not described herein again.
S402: and the third platform acquires the information to be shared after the re-encryption conversion according to the information of the target account, wherein the information to be shared after the re-encryption conversion is the encrypted information to be shared in the primary account and is subjected to the re-encryption conversion and is stored to the target account.
S403: and decrypting the information to be shared after the re-encryption conversion to obtain the information to be shared.
For example, in this embodiment, it can be understood that, after receiving the information of the target account sent by the first platform, the third platform may determine the target account in the block chain based on the information of the target account, extract the re-encrypted and converted information to be shared from the target account, and decrypt the extracted re-encrypted and converted information to be shared to obtain the information to be shared, and in the process of obtaining the information to be shared by the third platform, it is not necessary to obtain the private key of the second platform in advance, and the private key of the second platform may be prevented from being leaked.
In some embodiments, the re-encryption of the information to be converted is generated by performing re-encryption conversion on the encrypted information to be shared based on the re-encryption key.
In some embodiments, the re-encryption key is generated based on a private key of the second platform and a public key of the third platform.
In some embodiments, the re-encrypted and converted information to be shared is the information to be shared, which is obtained by encrypting the encrypted information to be shared according to the encryption key and decrypting the encrypted information to be shared based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on a public key of the second platform, and the public key of the second platform and a private key of the second platform are a key pair based on a bilinear pair form.
In some embodiments, the encrypted information to be shared is information obtained by encrypting the ticket information based on a public key of the second platform.
In some embodiments, the information to be shared after the re-encryption conversion is generated by positioning the primary account according to the information of the primary account, acquiring the encrypted information to be shared from the primary account, and performing the re-encryption conversion on the encrypted information to be shared.
Fig. 6 is a schematic diagram according to a fifth embodiment of the present application, and as shown in fig. 6, an information sharing platform based on a block chain (corresponding to a platform corresponding to the first embodiment, i.e., a first platform) provided in this embodiment is configured to execute a method corresponding to the first embodiment, e.g., the method shown in fig. 2, and includes:
a receiving module 11, configured to receive information of a primary account sent by a second platform, where the primary account is an account preset in a block chain, and the primary account is used to store information to be shared after the second platform is encrypted;
the re-encryption module 12 is configured to perform re-encryption conversion on the encrypted information to be shared according to the information of the primary account;
the unloading module 13 is configured to store the re-encrypted and converted information to be shared to a target account, where the target account is another account of the block chain;
the first sending module 14 is configured to send the information of the target account to a third platform, where the information of the target account is used for sharing information to be shared.
In some embodiments, the re-encryption module 12 is configured to locate the primary account in the block chain according to the information of the primary account, obtain the encrypted information to be shared from the primary account, and perform re-encryption conversion on the encrypted information to be shared.
In some embodiments, the receiving module 11 is configured to receive a re-encryption key sent by the second platform;
and the re-encryption module 12 is configured to perform re-encryption conversion on the encrypted information to be shared according to the information of the primary account and the re-encryption key.
In some embodiments, the re-encryption key is generated based on a private key of the second platform and a public key of the third platform.
In some embodiments, the re-encryption module 12 is configured to obtain the encrypted information to be shared according to the information of the primary account, encrypt the encrypted information to be shared according to the re-encryption key, and obtain the re-encrypted and converted information to be shared, which is decrypted based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
In some embodiments, the encrypted information to be shared is information obtained by encrypting the ticket information based on the public key of the second platform.
Fig. 7 is a schematic diagram according to a sixth embodiment of the present application, and as shown in fig. 7, an information sharing platform based on a block chain (corresponding to a platform corresponding to the third embodiment, that is, a second platform) provided in this embodiment is configured to execute a method corresponding to the third embodiment, for example, the method shown in fig. 4, and includes:
the storage module 21 is configured to store the encrypted information to be shared to a preset primary account of the block chain;
the second sending module 22 is configured to send the information of the primary account to the first platform, where the information of the primary account is used to perform re-encryption conversion on the encrypted information to be shared and store the information to a target account of the block chain, and the information of the target account is used to share the information to be shared.
In some embodiments, the information of the primary account is used to locate the primary account in the blockchain and obtain encrypted information to be shared from the primary account.
In some embodiments, the second sending module 22 is configured to send, to the first platform, a re-encryption key, where the re-encryption key is used to perform re-encryption conversion on the encrypted information to be shared.
As can be appreciated in conjunction with fig. 7, in some embodiments, the platform further comprises:
a first receiving module 23, configured to receive a sharing request sent by a third platform, where the sharing request includes a public key of the third platform;
a generating module 24, configured to generate the re-encryption key according to the private key of the second platform and the public key of the third platform.
In some embodiments, the re-encryption key is used to encrypt the encrypted information to be shared, and obtain re-encrypted and converted information to be shared, which is decrypted based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
In some embodiments, the encrypted information to be shared is information obtained by encrypting the ticket information based on the public key of the second platform.
Fig. 8 is a schematic diagram according to a seventh embodiment of the present application, and as shown in fig. 8, an information sharing platform based on a block chain (corresponding to a platform corresponding to the fourth embodiment, that is, a third platform) provided in this embodiment is configured to execute a method corresponding to the fourth embodiment, for example, the method shown in fig. 5, and includes:
a second receiving module 31, configured to receive information of a target account sent by the first platform, where the target account is an account of a preset block chain;
the obtaining module 32 is configured to obtain, according to the information of the target account, re-encrypted and converted information to be shared, where the re-encrypted and converted information to be shared is obtained by performing re-encryption conversion on the encrypted information to be shared in the primary account and storing the re-encrypted information to the target account;
and the decryption module 33 is configured to decrypt the to-be-shared information after the re-encryption conversion, so as to obtain the to-be-shared information.
In some embodiments, the re-encrypted information to be converted is generated by performing re-encryption conversion on the encrypted information to be shared based on a re-encryption key.
In some embodiments, the re-encryption key is generated based on a private key of the second platform and a public key of the third platform.
In some embodiments, the re-encrypted and converted information to be shared is the information to be shared, which is obtained by encrypting the encrypted information to be shared according to the re-encryption key and decrypting the encrypted information to be shared based on the private key of the third platform.
In some embodiments, the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
In some embodiments, the encrypted information to be shared is information obtained by encrypting the ticket information based on a public key of the second platform.
In some embodiments, the information to be shared after the re-encryption conversion is generated by positioning the primary account according to the information of the primary account, acquiring the encrypted information to be shared from the primary account, and performing the re-encryption conversion on the encrypted information to be shared.
According to another aspect of the embodiments of the present application, there is also provided an information sharing system based on a block chain, including: the platform according to the fifth embodiment (i.e., the first platform), the platform according to the sixth embodiment (i.e., the second platform), and the platform according to the seventh embodiment (i.e., the third platform).
That is, the present embodiment provides a method including: an intermediary platform for executing the first embodiment, a provider platform for executing the information to be shared of the third embodiment, and a sharer platform for executing the information to be shared of the fourth embodiment.
Fig. 9 is a schematic diagram according to an eighth embodiment of the present application, and fig. 9 is a block diagram of an electronic device for implementing the method for sharing information based on a blockchain according to the present embodiment, such as the method for implementing any of the second to fifth embodiments.
Electronic devices are intended to represent, among other things, various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 9, the electronic apparatus includes: one or more processors 101, memory 102, and interfaces for connecting the various components, including high-speed interfaces and low-speed interfaces. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). Fig. 9 illustrates an example of one processor 101.
The memory 102 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the electronic device, and the like. Further, the memory 102 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 102 may optionally include memory located remotely from processor 101, which may be connected to an electronic device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device may further include: an input device 103 and an output device 104. The processor 101, the memory 102, the input device 103, and the output device 104 may be connected by a bus or other means, and the bus connection is exemplified in fig. 9.
The input device 103 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic apparatus, such as a touch screen, keypad, mouse, track pad, touch pad, pointer stick, one or more mouse buttons, track ball, joystick, or other input device. The output devices 104 may include a display device, auxiliary lighting devices (e.g., LEDs), and haptic feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (27)
1. A block chain-based information sharing method is applied to a first platform and comprises the following steps:
receiving information of a primary account sent by a second platform, wherein the primary account is an account preset in a block chain and is used for storing information to be shared after the second platform is encrypted;
carrying out re-encryption conversion on the encrypted information to be shared according to the information of the primary account;
storing the information to be shared after the re-encryption conversion to a target account, wherein the target account is another account of the block chain;
and sending the information of the target account to a third platform, wherein the information of the target account is used for sharing the information to be shared.
2. The method of claim 1, wherein the performing of the re-encryption conversion on the encrypted information to be shared according to the information of the primary account comprises:
locating the primary account in the blockchain according to the information of the primary account;
acquiring encrypted information to be shared from the primary account;
and carrying out re-encryption conversion on the encrypted information to be shared.
3. The method of claim 1, wherein the method further comprises:
receiving a re-encryption key sent by the second platform;
and carrying out re-encryption conversion on the encrypted information to be shared according to the information of the primary account, wherein the re-encryption conversion comprises the following steps: and performing re-encryption conversion on the encrypted information to be shared according to the information of the primary account and the re-encryption key.
4. The method of claim 3, wherein the re-encrypted key is generated based on a private key of the second platform and a public key of the third platform.
5. The method of claim 4, wherein performing re-encryption conversion on the encrypted information to be shared according to the information of the primary account and the re-encryption key comprises:
acquiring encrypted information to be shared according to the information of the primary account;
and encrypting the encrypted information to be shared according to the re-encryption key to obtain the re-encrypted and converted information to be shared which is decrypted based on the private key of the third platform.
6. The method of claim 5, wherein,
the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pairing form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
7. The method according to any one of claims 1 to 6, wherein the encrypted information to be shared is information obtained by encrypting ticket information based on a public key of the second platform.
8. A block chain-based information sharing method is applied to a second platform and comprises the following steps:
storing the encrypted information to be shared to a preset initial account of the block chain;
and sending the information of the primary account to a first platform, wherein the information of the primary account is used for carrying out re-encryption conversion on the encrypted information to be shared and storing the information to a target account of the block chain, and the information of the target account is used for sharing the information to be shared.
9. The method of claim 8, wherein the information of the primary account is used for locating the primary account in the blockchain and obtaining encrypted information to be shared from the primary account.
10. The method of claim 9, wherein the method further comprises:
and sending a re-encryption key to the first platform, wherein the re-encryption key is used for performing re-encryption conversion on the encrypted information to be shared.
11. The method of claim 10, wherein the method further comprises:
receiving a sharing request sent by a third platform, wherein the sharing request comprises a public key of the third platform;
and generating the re-encryption key according to the private key of the second platform and the public key of the third platform.
12. The method of claim 11, wherein the re-encryption converting the encrypted information to be shared comprises: and encrypting the encrypted information to be shared according to the re-encryption key to obtain the re-encrypted and converted information to be shared which is decrypted based on the private key of the third platform.
13. The method of claim 12, wherein the public key of the third platform and the private key of the third platform are key pairs based on a bilinear pair form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
14. The method according to any one of claims 8 to 13, wherein the encrypted information to be shared is information obtained by encrypting ticket information based on a public key of the second platform.
15. A block chain-based information sharing method is applied to a third platform and comprises the following steps:
receiving information of a target account sent by a first platform, wherein the target account is one account of a preset block chain;
acquiring information to be shared after re-encryption conversion according to the information of the target account, wherein the information to be shared after re-encryption conversion is obtained by performing re-encryption conversion on the encrypted information to be shared in the primary account and storing the information to be shared to the target account;
and decrypting the information to be shared after the re-encryption conversion to obtain the information to be shared.
16. The method according to claim 15, wherein the re-encrypted information to be converted is generated by performing re-encryption conversion on the encrypted information to be shared based on a re-encryption key.
17. The method of claim 16, wherein the re-encrypted key is generated based on a private key of a second platform and a public key of the third platform.
18. The method according to claim 17, wherein the re-encrypted and converted information to be shared is obtained by encrypting the encrypted information to be shared according to the re-encryption key and decrypting the encrypted information to be shared based on a private key of the third platform.
19. The method of claim 18, wherein,
the public key of the third platform and the private key of the third platform are a key pair based on a bilinear pairing form;
the encrypted information to be shared is information encrypted based on the public key of the second platform, and the public key of the second platform and the private key of the second platform are a key pair based on a bilinear pair form.
20. The method according to any one of claims 15 to 19, wherein the encrypted information to be shared is information obtained by encrypting the ticket information based on a public key of the second platform.
21. The method according to any one of claims 15 to 19, wherein the information to be shared after re-encryption conversion is generated by locating the primary account according to the information of the primary account, acquiring the encrypted information to be shared from the primary account, and performing re-encryption conversion on the encrypted information to be shared.
22. A platform for blockchain-based information sharing, the platform comprising:
the receiving module is used for receiving information of a primary account sent by a second platform, wherein the primary account is an account preset in a block chain and is used for storing information to be shared after the second platform is encrypted;
the re-encryption module is used for performing re-encryption conversion on the encrypted information to be shared according to the information of the primary account;
the unloading module is used for storing the information to be shared after the re-encryption conversion to a target account, wherein the target account is another account of the block chain;
and the first sending module is used for sending the information of the target account to a third platform, and the information of the target account is used for sharing the information to be shared.
23. A platform for blockchain-based information sharing, the platform comprising:
the storage module is used for storing the encrypted information to be shared to a preset primary account of the block chain;
and the second sending module is used for sending the information of the primary account to the first platform, wherein the information of the primary account is used for carrying out re-encryption conversion on the encrypted information to be shared and storing the information to a target account of the block chain, and the information of the target account is used for sharing the information to be shared.
24. A platform for blockchain-based information sharing, the platform comprising:
the second receiving module is used for receiving information of a target account sent by the first platform, wherein the target account is one account of a preset block chain;
the acquisition module is used for acquiring the information to be shared after the re-encryption conversion according to the information of the target account, and the information to be shared after the re-encryption conversion is generated by performing the re-encryption conversion on the encrypted information to be shared;
and the decryption module is used for decrypting the information to be shared after the re-encryption conversion to obtain the information to be shared.
25. A blockchain-based information sharing system, comprising:
the platform of claim 22;
the platform of claim 23;
the platform of claim 24.
26. An electronic device, comprising: a memory, a processor;
a memory; a memory for storing the processor-executable instructions;
wherein the processor is configured to: performing the method of any one of claims 1 to 7; or,
performing the method of any one of claims 8 to 14; or,
performing the method of any one of claims 15 to 21.
27. A computer readable storage medium having stored therein computer executable instructions for implementing the method of any one of claims 1 to 7 when executed by a processor; or,
the computer executable instructions when executed by a processor are for implementing the method of any one of claims 8 to 14; or,
the computer executable instructions when executed by a processor are for implementing the method of any one of claims 15 to 21.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011085361.2A CN112261015B (en) | 2020-10-12 | 2020-10-12 | Information sharing method, platform, system and electronic equipment based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011085361.2A CN112261015B (en) | 2020-10-12 | 2020-10-12 | Information sharing method, platform, system and electronic equipment based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112261015A true CN112261015A (en) | 2021-01-22 |
CN112261015B CN112261015B (en) | 2023-05-12 |
Family
ID=74242809
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011085361.2A Active CN112261015B (en) | 2020-10-12 | 2020-10-12 | Information sharing method, platform, system and electronic equipment based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112261015B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114153630A (en) * | 2021-11-23 | 2022-03-08 | 国网黑龙江省电力有限公司双鸭山供电公司 | Power information sharing method based on alliance chain |
CN114221967A (en) * | 2021-12-14 | 2022-03-22 | 建信金融科技有限责任公司 | Resource sharing platform and resource sharing method based on block chain network |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150043735A1 (en) * | 2012-03-28 | 2015-02-12 | Kabushiki Kaisha Toshiba | Re-encrypted data verification program, re-encryption apparatus and re-encryption system |
CN109144961A (en) * | 2018-08-22 | 2019-01-04 | 矩阵元技术(深圳)有限公司 | Authority sharing method and device |
WO2019127265A1 (en) * | 2017-12-28 | 2019-07-04 | 深圳前海达闼云端智能科技有限公司 | Blockchain smart contract-based data writing method, device and storage medium |
US20190215157A1 (en) * | 2017-03-03 | 2019-07-11 | Tencent Technology (Shenzhen) Company Limited | Information storage method, device, and computer-readable storage medium |
JP2020010267A (en) * | 2018-07-12 | 2020-01-16 | コニカミノルタ株式会社 | Distributed medical information sharing system, medical information provision server, and program |
CN111191288A (en) * | 2019-12-30 | 2020-05-22 | 中电海康集团有限公司 | Block chain data access authority control method based on proxy re-encryption |
CN111222155A (en) * | 2020-01-08 | 2020-06-02 | 湖南智慧政务区块链科技有限公司 | Method and system for combining re-encryption and block link |
CN111385301A (en) * | 2020-03-06 | 2020-07-07 | 湖南智慧政务区块链科技有限公司 | Block chain data sharing encryption and decryption method, equipment and storage medium |
CN111404895A (en) * | 2020-03-06 | 2020-07-10 | 湖南智慧政务区块链科技有限公司 | Method, equipment and storage medium for distributing and recovering readable permission of shared data |
WO2020176975A1 (en) * | 2019-03-01 | 2020-09-10 | Zeu Crypto Networks Inc. | Blockchain-based secure email system |
CN111654514A (en) * | 2019-12-09 | 2020-09-11 | 武汉空心科技有限公司 | File sharing management method of work platform for packet |
-
2020
- 2020-10-12 CN CN202011085361.2A patent/CN112261015B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150043735A1 (en) * | 2012-03-28 | 2015-02-12 | Kabushiki Kaisha Toshiba | Re-encrypted data verification program, re-encryption apparatus and re-encryption system |
US20190215157A1 (en) * | 2017-03-03 | 2019-07-11 | Tencent Technology (Shenzhen) Company Limited | Information storage method, device, and computer-readable storage medium |
WO2019127265A1 (en) * | 2017-12-28 | 2019-07-04 | 深圳前海达闼云端智能科技有限公司 | Blockchain smart contract-based data writing method, device and storage medium |
JP2020010267A (en) * | 2018-07-12 | 2020-01-16 | コニカミノルタ株式会社 | Distributed medical information sharing system, medical information provision server, and program |
CN109144961A (en) * | 2018-08-22 | 2019-01-04 | 矩阵元技术(深圳)有限公司 | Authority sharing method and device |
WO2020176975A1 (en) * | 2019-03-01 | 2020-09-10 | Zeu Crypto Networks Inc. | Blockchain-based secure email system |
CN111654514A (en) * | 2019-12-09 | 2020-09-11 | 武汉空心科技有限公司 | File sharing management method of work platform for packet |
CN111191288A (en) * | 2019-12-30 | 2020-05-22 | 中电海康集团有限公司 | Block chain data access authority control method based on proxy re-encryption |
CN111222155A (en) * | 2020-01-08 | 2020-06-02 | 湖南智慧政务区块链科技有限公司 | Method and system for combining re-encryption and block link |
CN111385301A (en) * | 2020-03-06 | 2020-07-07 | 湖南智慧政务区块链科技有限公司 | Block chain data sharing encryption and decryption method, equipment and storage medium |
CN111404895A (en) * | 2020-03-06 | 2020-07-10 | 湖南智慧政务区块链科技有限公司 | Method, equipment and storage medium for distributing and recovering readable permission of shared data |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114153630A (en) * | 2021-11-23 | 2022-03-08 | 国网黑龙江省电力有限公司双鸭山供电公司 | Power information sharing method based on alliance chain |
CN114153630B (en) * | 2021-11-23 | 2022-11-18 | 国网黑龙江省电力有限公司双鸭山供电公司 | Power information sharing method based on alliance chain |
CN114221967A (en) * | 2021-12-14 | 2022-03-22 | 建信金融科技有限责任公司 | Resource sharing platform and resource sharing method based on block chain network |
CN114221967B (en) * | 2021-12-14 | 2023-06-02 | 建信金融科技有限责任公司 | Resource sharing platform and resource sharing method based on block chain network |
Also Published As
Publication number | Publication date |
---|---|
CN112261015B (en) | 2023-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3916604B1 (en) | Method and apparatus for processing privacy data of block chain, device, storage medium and computer program product | |
CN108632284B (en) | User data authorization method, medium, device and computing equipment based on block chain | |
CN111222165B (en) | Multi-party computing method, device, equipment and medium based on block chain | |
CN111737366B (en) | Private data processing method, device, equipment and storage medium of block chain | |
KR102678262B1 (en) | Non-archival tools for building distributed computer applications | |
US10142107B2 (en) | Token binding using trust module protected keys | |
CN111310216B (en) | Block chain data processing method and device, electronic equipment and medium | |
CN111352996B (en) | Data sharing method, device, equipment and medium based on block chain network | |
US20170310479A1 (en) | Key Replacement Direction Control System and Key Replacement Direction Control Method | |
EP3934295A2 (en) | Key protection processing method, apparatus, device and storage medium | |
CN111464297B (en) | Transaction processing method, device, electronic equipment and medium based on block chain | |
KR102258215B1 (en) | Security System and Method Thereof Using Both KMS and HSM | |
CN114584307A (en) | Trusted key management method and device, electronic equipment and storage medium | |
CN113612597A (en) | Data calculation method, device and system and electronic equipment | |
CN110610101A (en) | Data storage method, device, equipment and storage medium | |
CN112261015B (en) | Information sharing method, platform, system and electronic equipment based on block chain | |
CN112822177A (en) | Data transmission method, device, equipment and storage medium | |
CN112966287A (en) | Method, system, device and computer readable medium for acquiring user data | |
Yadav et al. | Mobile cloud computing issues and solution framework | |
CN114584299B (en) | Data processing method, device, electronic equipment and storage medium | |
CN111125788B (en) | Encryption calculation method, computer equipment and storage medium | |
KR101812311B1 (en) | User terminal and data sharing method of user terminal based on attributed re-encryption | |
Lagesse | Challenges in securing the interface between the cloud and pervasive systems | |
CN102780812B (en) | Method and system for achieving safe input by using mobile terminal | |
CN112400295A (en) | Managing central private keys of multiple user devices associated with a single public key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |