CN112766943A - Anonymous computing block chain data processing method, system, medium, device and application - Google Patents

Anonymous computing block chain data processing method, system, medium, device and application Download PDF

Info

Publication number
CN112766943A
CN112766943A CN202110065285.7A CN202110065285A CN112766943A CN 112766943 A CN112766943 A CN 112766943A CN 202110065285 A CN202110065285 A CN 202110065285A CN 112766943 A CN112766943 A CN 112766943A
Authority
CN
China
Prior art keywords
user
transaction
supervisor
block chain
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110065285.7A
Other languages
Chinese (zh)
Inventor
刘明哲
付铭
马立川
谢朝阳
裴庆祺
张锐
袁昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Xidian Lianrong Technology Co ltd
Xidian University
Original Assignee
Xi'an Xidian Lianrong Technology Co ltd
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Xidian Lianrong Technology Co ltd, Xidian University filed Critical Xi'an Xidian Lianrong Technology Co ltd
Priority to CN202110065285.7A priority Critical patent/CN112766943A/en
Publication of CN112766943A publication Critical patent/CN112766943A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention belongs to the technical field of block chain and multi-party safety calculation application, and discloses a method, a system, a medium, equipment and application for processing anonymous calculation block chain data, wherein a supervisor node carries out user authorization; the exchange node provides money purchasing service; a user initiates a transfer transaction; initiating a contract transaction; the user checks the state of blocks, transactions and the like in the system; the supervisor supervises the information in the system. The core objective of the anonymous computing block chain system is to ensure the balance of multi-party rights and interests, balance the value fair distribution of each participant in a data ecosystem, balance the current income and potential risks in each value exchange and establish a positive feedback data cycle. By attracting more participants to spontaneously join the data ecosystem, the private data can be shared in a compliance controlled manner, reasonable rights and interests can be obtained, and unnecessary risks can be avoided. Finally achieving efficient fusion innovation and continuous benign growth of data value.

Description

Anonymous computing block chain data processing method, system, medium, device and application
Technical Field
The invention belongs to the technical field of block chain and multi-party safe computing application, and particularly relates to a method, a system, a medium, equipment and application for processing anonymous computing block chain data.
Background
Blockchain originated in 2008, while this wisdom was in its paper bitcoin: a point-to-point electronic cash system is first proposed. The bitcoin is the first point-to-point electronic cash system independent of a centralized mechanism, and uses cryptography to ensure the safety of transmission and access, thereby realizing a distributed account book which is uniformly stored, cannot be tampered and is difficult to be repudiated. In 2014, the concept of the intelligent contract is provided by the ether house, so that a user can conveniently program and release applications on the block chain, the programmability of the block chain is improved, and the applications can be used in various fields such as finance, energy, judicial and the like. Etherhouses push blockchains from the electronic cash domain to various other domains.
With the continued development of blockchain technology, more and more organizations and enterprises introduce blockchains into the system revolution. In 2016, 11 organizations such as the middle certificate price reporting and the like jointly initiate a China distributed general ledger foundation protocol alliance (China Ledger); in 2017, the EtherFang alliance (EEA) of the enterprise is formally established, and the Morgan Datong, Microsoft, Intel and the like are added. The block chain technology is used for enabling entity economy and accelerating landing application, and the block chain application is also spread in various industries and various scenes such as finance, payment, securities, judicial expertise, traceability and the like.
When applied to real business, block chains currently present a problem in privacy protection:
(1) the transaction details are publicly transparent. As a new distributed book technology, the blockchain stores transaction records and privacy data among users, and has the characteristics of openness, transparency, incapability of changing the transaction records, traceable sources and the like. Industry pain points are solved by combining the block chain technology in industries such as Internet of things, finance and medical treatment, so that the block chain is developed very quickly, and the industry scale is larger and larger. However, the data on the blockchain is public to the nodes of the whole network, and the updating operation of the data is also transparent, which leaves a space for hackers to attack and leads to leakage of user information. The transaction data on the blockchain, including transaction addresses, money amounts, transaction time and the like, are publicly and transparently inquired, and any attacker can acquire all transaction information. In the financial field and the supply chain, the public transparency of the block chain enables a user to obtain all transaction information and material supply information, including money amount, contract content and the like. The data is a key point of profit of the financial institution and is also a supply chain service confidential object, and competitive enterprises or individuals obtain benefits by analyzing transaction data and directly damage the benefits of companies. In the field of the internet of things, point-to-point transaction can be realized among equipment, and sensitive information such as energy transmission can be revealed by a blockchain system under the condition, so that personal safety and national safety are threatened. Therefore, when the blockchain technology is used, the problem of privacy disclosure existing in the blockchain needs to be solved, and the information security of the user is ensured.
(2) The identity of both parties to the transaction is exposed. The data in the account book is analyzed and sorted, an attacker can obtain all transactions corresponding to any one account, and can analyze a transaction relation map among different accounts. Even if the user uses different accounts to conduct transactions, the attacker can also analyze different accounts belonging to the same user by using an address clustering technology. And since each transaction performed by the user is permanently recorded in the blockchain, once a certain historical transaction is named, the identity information of the trader in all relevant transaction records is revealed.
Through the above analysis, the problems and defects of the prior art are as follows:
(1) the blockchain system now lacks concealment of sensitive data.
(2) The current blockchain system has a high probability of exposing the user identity information.
The difficulty in solving the above problems and defects is: the key to protecting data and user privacy on the blockchain lies in how to ensure that the transaction is written into the blockchain system without revealing the specific content and both parties of the transaction, and meanwhile, the operation convenience is improved as much as possible and the transaction reliability on the system is ensured. The difficulty to solve the above problems is how to protect the privacy of data on the blockchain system and ensure the validity and correctness of the transaction, so that the user can complete a valid and effective transaction and record the valid and effective transaction in the blockchain system on the premise that the personal identity and the transaction data are hidden.
The significance of solving the problems and the defects is as follows: the range of applications that can integrate privacy protection on a blockchain is extremely wide. In the era of the rapid development of current information technology, the advanced data acquisition and transmission technologies such as 5G, the Internet of things and the like will bring data streams with richer contents, stronger timeliness and larger volume, wherein countless private data are wrapped. In the era of the flood of data, whether the individual user is safe to enjoy the service or the enterprise explores an emerging business model, it is important to implement privacy protection. The method can deeply analyze and understand by combining with the block chain trust exchange network and privacy protection, legally and synergetically explore the value in the data, avoid the risk in the data, and possibly create a new round of explosive growth which is small enough to cause the informatization industry and a good prospect which is big enough to promote the human society to enter the information era in advance. In the process, the development of the privacy protection technology is the key for balancing value income and privacy risks and realizing pareto optimal and sustainable development.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a method, a system, a medium, a device and an application for processing anonymous computing block chain data.
The invention is realized in this way, a method for processing anonymous computing block chain data, the method for processing anonymous computing block chain data comprises:
1 supervisor node for user authorization
The anonymous computation chain is an authorization chain, and each participating node in the blockchain system is permitted. Unlicensed nodes may not be accessible to the system. The system provides an interface and a method for user registration, and in the process of user registration, the user sends the hash of the public key to a 'supervisor' node. The authorization has the advantages that only the user authorized by the supervisor can be added into the blockchain network, the risk of malicious action of the nodes in the blockchain is reduced, and the user has backup information at the supervisor, so that the supervision is convenient, and the user can trace the malicious action in case.
2 exchange node providing money purchasing service
The user obtains the initial digital currency by way of a purchase from the issuer before the transfer transaction is conducted. The exchange node in the system will check the identity of the user before the user purchases the money, and if authorized, the money will be sold to the user.
3 user initiates transfer transaction
And transferring accounts among users, wherein an initiator provides a private key, and a payee provides a public key, so that the transfer process is completed.
4 initiating contract transactions
The user views the status of blocks, transactions, etc. in the system: each node in the anonymous calculation chain system is a service end of an RPC network, and a user queries a block and performs transaction by using a network protocol of http/post through the nodes of the block chain network
And 5, the supervisor supervises the information in the system.
The user transaction data on the anonymous computing chain is encrypted by the public key of the supervisor, and the supervisor can decrypt the transaction by using the private key of the supervisor to obtain the user identity information, the transaction amount and other data.
Further, the user registration of the anonymous computing block chain data processing method is carried out according to the following steps:
(1) a user locally generates a public key and a private key;
(2) the user sends the data of the hash of the public key of the user to a supervisor node of the system under the scene;
(3) the supervisor examines the identity of the user, and after authentication, the hash of the public key of the supervisor is reserved and stored in a public key hash pool of the supervisor node;
(4) the supervisor returns to the user identification information of the pass.
Further, the user purchasing currency of the anonymous computing block chain data processing method is carried out according to the following steps:
(1) the user sends the public key hash of the user and the token quantity hash required to be purchased to the exchange node;
(2) the exchange node sends a request to the supervisor node, verifies whether the public key hash of the user passes the registration authorization and stores the public key hash in the public key hash pool of the supervisor;
(3) if the hash of the public key of the user fails to be verified, returning an error; if the transaction is verified, the exchange node collects the user fee in an online or offline mode;
(4) the exchange node calculates the number of the tokens in the block chain system under the scene according to the money purchasing amount of the user;
(5) the exchange node generates a random number and a homomorphic encryption ciphertext for the token number;
(6) the exchange node generates an ID for the homomorphic encrypted ciphertext;
(7) the exchange node is the ID identification and homomorphic encrypted ciphertext signature of the data;
(8) the exchange node returns the random number and the homomorphic encrypted ciphertext to the user;
(9) the exchange node packs the random number, the homomorphic encrypted ciphertext, the random number and the ID into a transaction format;
(10) the exchange node issues the money purchase transaction to the blockchain network through RPC communication;
(11) when other nodes synchronize to the transaction, verifying whether the signature of the exchange of the other nodes is correct;
(12) if the transaction is verified, the money purchase transaction is packaged into blocks and recorded in the blockchain system.
Further, the account transfer transaction is carried out among users of the anonymous computing block chain data processing method according to the following steps:
(1) the user generates a homomorphic encrypted ciphertext related to the account transfer through a cryptology module of the system according to the transfer amount of the two parties, the public key of the two parties and the ciphertext data of the original amount;
(2) the user generates zero knowledge proof data through the calculation of a cryptography module of the system;
(3) a user issues transfer transactions to a block chain network through RPC ports of nodes and zero knowledge proof data and homomorphic encryption ciphertexts;
(4) when other nodes synchronize to the transaction, zero knowledge proof is made to verify the validity of the transaction;
(5) if the transaction is validated, the transfer transaction is packaged into blocks and recorded in the blockchain system.
Further, the step of authorizing the user to send a transaction by the system of the anonymous computing blockchain data processing method comprises the following steps:
(1) a user locally generates a public key and a private key through a system;
(2) a user sends an https request to a supervisor node and registers an account of the user;
(3) after the supervisor node verifies the identity information of the user, the public key hash of the user is stored on the system, and the user can access the chain and conduct transaction;
(4) in the process, only a supervisor can know which public keys in the public key hash pool have the hash of the public keys, and the addition operation is carried out on the public key hash pool. Only the exchange node accesses the database of the supervisor node to know whether the user public key is in the public key hash pool;
the step of providing the money purchasing service by the exchange node comprises the following steps:
(1) initiating a currency exchange request to a transaction exchange by a user;
(2) the exchange node obtains the hash of the user public key, verifies whether the user public key is in the hash pool of the public key or not to the supervisor node, and can go downwards if the verification is passed; if the verification is not passed, rejecting the request;
(3) the exchange node generates a zero-knowledge proof ciphertext for the equivalent virtual currency and the account of the user;
(4) the exchange signs the encrypted information;
(5) the exchange issues the encrypted information into the blockchain in the form of a coin purchase transaction.
Further, the step of initiating a transfer transaction by a user of the anonymous computing blockchain data processing method comprises:
(1) the user generates zero knowledge proof ciphertext according to the information of the transfer transaction and the identity information of both transaction parties through the system;
(2) a user sends transaction information containing a zero-knowledge proof ciphertext to a system through an RPC port of a distributed block chain network;
(3) after the nodes in the system are identified, the transaction is packaged into a block, and the transaction is stored in the block of the block chain of each node in the system;
the step of the user initiating a transfer transaction includes:
(1) a user creates an intelligent contract on the block chain;
(2) a user calls an intelligent contract on the block chain;
the step of the user viewing the status of blocks, transactions, etc. in the system includes:
(1) reading unstructured weblog data from a distributed file system by a user through an RPC port of a distributed block chain network;
(2) the user obtains structured data through system analysis, wherein the structured data comprises selectable block number, transaction number and transaction zero-knowledge proof ciphertext;
the step of the supervisor supervising the information in the system comprises the following steps:
(1) a supervisor reads unstructured weblog data from a distributed file system through an RPC port of a distributed block chain network;
(2) the supervisor obtains structured data through system analysis, wherein the structured data comprise selectable block number, transaction number and transaction zero-knowledge proof ciphertext;
(3) the supervisor decrypts the zero-knowledge proof ciphertext through the secret key of the supervisor to supervise the flow direction of the transaction.
It is a further object of the invention to provide a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
the supervisor node performs user authorization; the exchange node provides money purchasing service;
a user initiates a transfer transaction; initiating a contract transaction;
the user checks the state of blocks, transactions and the like in the system;
a supervisor supervises the information in the system;
it is another object of the present invention to provide a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
the supervisor node performs user authorization; the exchange node provides money purchasing service;
a user initiates a transfer transaction; initiating a contract transaction;
the user checks the state of blocks, transactions and the like in the system;
a supervisor supervises the information in the system;
another object of the present invention is to provide an information data processing terminal, which is used for implementing the anonymous computing blockchain data processing method; the information data processing terminal includes: 5G data acquisition terminal, thing networking data acquisition terminal.
Another object of the present invention is to provide an anonymous computing blockchain data processing system implementing the anonymous computing blockchain data processing method, the anonymous computing blockchain data processing system including:
the bank note purchasing transaction module is used for realizing the registration of the identity of the user in the blockchain network and the authorization of the user to enter the blockchain network;
the system comprises a coin purchasing transaction module, a coin purchasing module and a coin purchasing module, wherein the coin purchasing transaction module is used for receiving a coin purchasing request of a user by the system, and the user obtains certain assets in a block chain network;
the transfer transaction module is used for transferring a part of assets of the user to the assets of another user after the system receives a transfer request of the user;
the block chain basic network module is used for constructing a distributed shared account book and a database and correlating a string of data blocks generated by using a cryptography method;
and the application layer module is used for adapting to different personalized scenes to build different applications by using the system, and common developers support Dapp, H5, applets, clients and intelligent chips in block chain service of small and medium enterprises on the platform.
By combining all the technical schemes, the invention has the advantages and positive effects that: the invention uses zero knowledge to prove that transaction details and identities of both parties of the transaction are hidden, so that the system has the function of protecting the privacy of users; when the system is used again, the credible party can be defined as an exchange and a supervisor by self, judicial supervision is facilitated, and illegal persons can be effectively prevented from doing illegal crimes by utilizing the hidden characteristic of the block chain.
The core objective of the anonymous computing block chain system is to ensure the balance of multi-party rights and interests, balance the value fair distribution of each participant in a data ecosystem, balance the current income and potential risks in each value exchange and establish a positive feedback data cycle. By attracting more participants to spontaneously join the data ecosystem, the private data can be shared in a compliance controlled manner, reasonable rights and interests can be obtained, and unnecessary risks can be avoided. Finally achieving efficient fusion innovation and continuous benign growth of data value.
The anonymous computing block chain system adheres to a design concept of science and technology focus humanity, fully considers the appetizing appeal of each participant in a scene, and provides instant and available development and integration experience. As a preliminary exploration of the capability of an open privacy protection technology, an anonymous computing chain can accommodate more diversified service scenes and expand richer privacy protection service requirements in the future. The system truly realizes the public and verifiable privacy protection effect through scientific and technological means, legally and suitably stimulates commercial innovation while returning the privacy to the owner, forms positive feedback of value transfer, constructs multi-party balance of a data ecosystem, and finally realizes fair income allocation and optimal resource allocation of all participants.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained from the drawings without creative efforts.
Fig. 1 is a flowchart of an anonymous computing block chain data processing method according to an embodiment of the present invention.
FIG. 2 is a block diagram of an embodiment of an anonymous computing blockchain data processing system;
in fig. 2: 1. a user registration and authentication module; 2. a money purchase transaction module; 3. a transfer transaction module; 4. a blockchain infrastructure network; 5. and (5) an application layer.
Fig. 3 is a schematic diagram of an anonymous computing blockchain data processing system according to an embodiment of the present invention.
Fig. 4 is a flowchart of user registration according to an embodiment of the present invention.
Fig. 5 is a flow chart of the user purchasing coins according to the embodiment of the present invention.
FIG. 6 is a flow diagram of a transfer transaction between users provided by an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
For solving the problems in the prior art, the invention provides a method, a system, a medium, a device and an application for processing anonymous computing block chain data, and the invention is described in detail with reference to the accompanying drawings.
As shown in fig. 1, the anonymous computing block chain data processing method provided by the present invention includes the following steps:
s101: a supervisor node in the system performs user authorization; the exchange node provides a money purchase service.
S102: a user in the system initiates a transfer transaction; a contract transaction is initiated.
S103: the user in the system views the status of blocks, transactions, etc. in the system.
S104: the supervisor in the system supervises the information in the system.
Those skilled in the art can also implement the anonymous computing block chain data processing method provided by the present invention by using other steps, and the anonymous computing block chain data processing method provided by the present invention in fig. 1 is only a specific example.
As shown in fig. 2, the anonymous computing blockchain data processing system provided by the present invention comprises:
and the money purchasing transaction module 1 is used for realizing the registration of the identity of the user in the blockchain network and authorizing the user to enter the blockchain network.
And the coin purchasing transaction module 2 is used for the system to receive a coin purchasing request of a user, and the user obtains certain assets in the block chain network.
And the transfer transaction module 3 is used for transferring a part of assets of the user to the assets of another user after the system receives a transfer request of the user.
The block chain basic network module 4 is used for constructing a distributed shared account book and a database, a string of data blocks generated by correlating by using a cryptography method is used, each data block contains information of a batch of network transactions and is used for verifying the validity (anti-counterfeiting) of the information and generating the next block, and the block chain basic network module has the characteristics of decentralization, non-tampering, whole-course trace retaining, traceability, collective maintenance, public transparency and the like, ensures the honesty and transparency of a block chain, creates trust, solves the problem of information asymmetry, realizes the cooperative trust and consistent action among a plurality of main bodies, and is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like.
And the application layer module 5 is used for adapting to different personalized scenes to build different applications by using the system, and common developers can support Dapp, H5, applets, clients, intelligent chips and the like in connection with block chain services of small and medium enterprises on a platform.
The technical solution of the present invention is further described with reference to the following specific examples.
Example 1
As shown in fig. 4, the user registration will proceed as follows:
(1) the user locally generates a public and private key.
(2) And the user sends the data of the hash of the public key of the user to the supervisor node of the system under the scene.
(3) The supervisor examines the identity of the user, and after authentication, the hash of the public key of the supervisor is reserved and stored in a public key hash pool of the supervisor node.
(4) The supervisor returns to the user identification information of the pass.
Example 2
As shown in fig. 5, the user purchases coins according to the following steps:
(1) the user sends its public key hash and the number of tokens to be purchased to the exchange node.
(2) The exchange node sends a request to the supervisor node to verify whether the user's public key hash has been authorized by the registration and stored in the supervisor's public key hash pool.
(3) If the hash of the public key of the user fails to be verified, returning an error; if the verification is passed, the exchange node charges the user in an online or offline manner.
(4) And the exchange node calculates the number of the tokens in the blockchain system under the scene according to the money purchasing amount of the user.
(5) The exchange node generates a random number and a homomorphic encryption cryptogram for the number of tokens.
(6) And the exchange node generates an ID for the homomorphic encrypted ciphertext.
(7) And the exchange node identifies the ID of the data and encrypts a ciphertext signature in a homomorphic way.
(8) And the exchange node returns the random number and the homomorphic encrypted ciphertext to the user.
(9) And the exchange node packs the random number, the homomorphic encrypted ciphertext, the random number and the ID into a transaction format.
(10) The exchange node issues the money purchase transaction into the blockchain network via RPC communication.
(11) The other nodes verify that the signature of their exchange is correct when synchronized to the transaction.
(12) If the transaction is verified, the money purchase transaction is packaged into blocks and recorded in the blockchain system.
Example 3
As shown in fig. 6, the transfer transaction between users is performed according to the following steps:
(1) and the user generates a homomorphic encrypted ciphertext related to the account transfer through a cryptology module of the system according to the transfer amount of the two parties, the public key of the two parties and the ciphertext data of the original amount.
(2) The user generates zero knowledge proof data through the calculation of a cryptology module of the system.
(3) And the user issues the transfer transaction to the block chain network through the RPC port of the node by using the zero-knowledge proof data and the homomorphic encryption ciphertext.
(4) And when other nodes synchronize to the transaction, zero knowledge proof is made to verify the validity of the transaction.
(5) If the transaction is validated, the transfer transaction is packaged into blocks and recorded in the blockchain system.
Example 4
The system of the invention is a distributed system, and can be composed of a plurality of nodes, and the nodes can be distinguished as follows: 1. a supervisor node; 2. an exchange node; 3. and (4) common user nodes.
The supervisor node of the system is defined as: the node with the supervision function can check the plaintext corresponding to the ciphertext on the chain when necessary, and a user can participate in the system only by registering at a supervisor.
The exchange node of the system is defined as: the exchange node issues the general certificates in the system, and the common user needs to use the certificates circulated in the exchange chain.
The common user node of the system is defined as: the nodes of the common users participate in the blockchain system and have all functions of the common blockchain.
The system of the invention is realized in such a way that the functions contained in it are:
a supervisor node in the system performs user authorization.
The exchange node in the system provides a money order service.
A user in the system initiates a transfer transaction.
A user in the system initiates a contract transaction.
The user in the system views the status of blocks, transactions, etc. in the system.
The supervisor in the system supervises the information in the system.
Further, the step of the system authorizing the user to send the transaction includes:
(1) the user generates the public and private keys locally through the system.
(2) And the user sends an https request to the supervisor node and registers the own account.
(3) After the supervisor node verifies the identity information of the user, the public key hash of the user is stored in the system, and the user can access the chain and conduct transaction.
(4) In the process, only a supervisor can know which public keys in the public key hash pool have the hash of the public keys, and the addition operation is carried out on the public key hash pool. Only the exchange node can access the database of the supervisor node to know whether the user public key is in the public key hash pool.
Further, the step of providing money purchasing service by the exchange node in the system comprises the following steps:
(1) the user initiates a currency conversion request to the transaction exchange.
(2) The exchange node obtains the hash of the user public key, verifies whether the user public key is in the public key hash pool or not from the supervisor node, and can perform downward verification if the verification is passed. And if the verification is not passed, rejecting the request.
(3) The exchange node generates a zero-knowledge proof cryptogram for the equivalent virtual currency and the account of the user.
(4) The exchange signs the encrypted information.
(5) The exchange issues the encrypted information into the blockchain in the form of a coin purchase transaction.
Further, the step of a user in the system initiating a transfer transaction includes:
(1) and the user generates a zero-knowledge proof ciphertext according to the information of the transfer transaction and the identity information of the two transaction parties through the system.
(2) And the user sends the transaction information containing the zero-knowledge proof ciphertext to the system through the RPC port of the distributed block chain network.
(3) The nodes in the system are cognizant and pack transactions into blocks, with the transactions being stored in blocks of the block chain for each node in the system.
Further, the step of a user in the system initiating a transfer transaction includes:
(1) and the user creates an intelligent contract on the block chain.
(2) The user invokes the intelligent contract on the blockchain.
Further, the step of the user in the system viewing the status of the blocks, transactions, etc. in the system comprises:
(1) and reading the unstructured weblog data from the distributed file system by a user through an RPC port of the distributed block chain network.
(2) The user obtains structured data through system analysis, wherein the structured data comprises selectable block number, transaction zero-knowledge proof ciphertext and the like.
Further, the step of supervising the information in the system by the supervisor in the system comprises:
(1) and reading the unstructured weblog data from the distributed file system through an RPC port of the distributed block chain network by a supervisor.
(2) The supervisor obtains the structured data through the analysis of the system, wherein the structured data comprise selectable block number, transaction number, zero-knowledge proof ciphertext of the transaction and the like.
(3) The supervisor decrypts the zero-knowledge proof ciphertext through the secret key of the supervisor to supervise the flow direction of the transaction.
And the Internet distributed crawler blockchain network node extracts, converts and loads the picture characteristic information data and the weblog data from the distributed blockchain network storage module, integrates the picture characteristic information data and the weblog data into a data tuple, and stores the data tuple by using a star model.
It should be noted that the embodiments of the present invention can be realized by hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided on a carrier medium such as a disk, CD-or DVD-ROM, programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier, for example. The apparatus and its modules of the present invention may be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., or by software executed by various types of processors, or by a combination of hardware circuits and software, e.g., firmware.
The above description is only for the purpose of illustrating the present invention and the appended claims are not to be construed as limiting the scope of the invention, which is intended to cover all modifications, equivalents and improvements that are within the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. An anonymous computing block chain data processing method, characterized in that the anonymous computing block chain data processing method comprises:
the supervisor node performs user authorization; the exchange node provides money purchasing service;
a user initiates a transfer transaction; initiating a contract transaction;
the user views the blocks and the transaction state in the system;
the supervisor supervises the information in the system.
2. The anonymous computing blockchain data processing method of claim 1, wherein user registration of the anonymous computing blockchain data processing method is performed by:
(1) a user locally generates a public key and a private key;
(2) the user sends the data of the hash of the public key of the user to a supervisor node of the system under the scene;
(3) the supervisor examines the identity of the user, and after authentication, the hash of the public key of the supervisor is reserved and stored in a public key hash pool of the supervisor node;
(4) the supervisor returns to the user identification information of the pass.
3. The anonymous computing blockchain data processing method as set forth in claim 1, wherein a user of the anonymous computing blockchain data processing method purchases money according to the following steps:
(1) the user sends the public key hash of the user and the token quantity hash required to be purchased to the exchange node;
(2) the exchange node sends a request to the supervisor node, verifies whether the public key hash of the user passes the registration authorization and stores the public key hash in the public key hash pool of the supervisor;
(3) if the hash of the public key of the user fails to be verified, returning an error; if the transaction is verified, the exchange node collects the user fee in an online or offline mode;
(4) the exchange node calculates the number of the tokens in the block chain system under the scene according to the money purchasing amount of the user;
(5) the exchange node generates a random number and a homomorphic encryption ciphertext for the token number;
(6) the exchange node generates an ID for the homomorphic encrypted ciphertext;
(7) the exchange node is the ID identification and homomorphic encrypted ciphertext signature of the data;
(8) the exchange node returns the random number and the homomorphic encrypted ciphertext to the user;
(9) the exchange node packs the random number, the homomorphic encrypted ciphertext, the random number and the ID into a transaction format;
(10) the exchange node issues the money purchase transaction to the blockchain network through RPC communication;
(11) when other nodes synchronize to the transaction, verifying whether the signature of the exchange of the other nodes is correct;
(12) if the transaction is verified, the money purchase transaction is packaged into blocks and recorded in the blockchain system.
4. The anonymous computing blockchain data processing method as set forth in claim 1, wherein transfer transactions between users of the anonymous computing blockchain data processing method are performed by the steps of:
(1) the user generates a homomorphic encrypted ciphertext related to the account transfer through a cryptology module of the system according to the transfer amount of the two parties, the public key of the two parties and the ciphertext data of the original amount;
(2) the user generates zero knowledge proof data through the calculation of a cryptography module of the system;
(3) a user issues transfer transactions to a block chain network through RPC ports of nodes and zero knowledge proof data and homomorphic encryption ciphertexts;
(4) when other nodes synchronize to the transaction, zero knowledge proof is made to verify the validity of the transaction;
(5) if the transaction is validated, the transfer transaction is packaged into blocks and recorded in the blockchain system.
5. The anonymous computing blockchain data processing method of claim 1, wherein the step of authorizing a user to send a transaction by the system of the anonymous computing blockchain data processing method comprises:
(1) a user locally generates a public key and a private key through a system;
(2) a user sends an https request to a supervisor node and registers an account of the user;
(3) after the supervisor node verifies the identity information of the user, the public key hash of the user is stored on the system, and the user can access the chain and conduct transaction;
(4) in the process, only the supervisor can know which public keys are hashed in the public key pool, the public key hash pool is subjected to increasing operation, and only the exchange node accesses the database of the supervisor node to know whether the user public key is in the public key hash pool;
the step of providing the money purchasing service by the exchange node comprises the following steps:
(1) initiating a currency exchange request to a transaction exchange by a user;
(2) the exchange node obtains the hash of the user public key, verifies whether the user public key is in the hash pool of the public key or not to the supervisor node, and can go downwards if the verification is passed; if the verification is not passed, rejecting the request;
(3) the exchange node generates a zero-knowledge proof ciphertext for the equivalent virtual currency and the account of the user;
(4) the exchange signs the encrypted information;
(5) the exchange issues the encrypted information into the blockchain in the form of a coin purchase transaction.
6. The anonymous computing blockchain data processing method as set forth in claim 1, wherein the step of initiating a transfer transaction by a user of the anonymous computing blockchain data processing method includes:
(1) the user generates zero knowledge proof ciphertext according to the information of the transfer transaction and the identity information of both transaction parties through the system;
(2) a user sends transaction information containing a zero-knowledge proof ciphertext to a system through an RPC port of a distributed block chain network;
(3) after the nodes in the system are identified, the transaction is packaged into a block, and the transaction is stored in the block of the block chain of each node in the system;
the step of the user initiating a transfer transaction includes:
(1) a user creates an intelligent contract on the block chain;
(2) a user calls an intelligent contract on the block chain;
the step of the user viewing the status of blocks, transactions, etc. in the system includes:
(1) reading unstructured weblog data from a distributed file system by a user through an RPC port of a distributed block chain network;
(2) the user obtains structured data through system analysis, wherein the structured data comprises selectable block number, transaction number and transaction zero-knowledge proof ciphertext;
the step of the supervisor supervising the information in the system comprises the following steps:
(1) a supervisor reads unstructured weblog data from a distributed file system through an RPC port of a distributed block chain network;
(2) the supervisor obtains structured data through system analysis, wherein the structured data comprise selectable block number, transaction number and transaction zero-knowledge proof ciphertext;
(3) the supervisor decrypts the zero-knowledge proof ciphertext through the secret key of the supervisor to supervise the flow direction of the transaction.
7. A computer device, characterized in that the computer device comprises a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to carry out the steps of:
the supervisor node performs user authorization; the exchange node provides money purchasing service;
a user initiates a transfer transaction; initiating a contract transaction;
the user checks the state of blocks, transactions and the like in the system;
the supervisor supervises the information in the system.
8. A computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
the supervisor node performs user authorization; the exchange node provides money purchasing service;
a user initiates a transfer transaction; initiating a contract transaction;
the user checks the state of blocks, transactions and the like in the system;
the supervisor supervises the information in the system.
9. An information data processing terminal, characterized in that the information data processing terminal is used for realizing the anonymous computing block chain data processing method of any one of claims 1 to 6; the information data processing terminal includes: 5G data acquisition terminal, thing networking data acquisition terminal.
10. An anonymous computing blockchain data processing system implementing the anonymous computing blockchain data processing method according to any one of claims 1 to 6, wherein the anonymous computing blockchain data processing system comprises:
the bank note purchasing transaction module is used for realizing the registration of the identity of the user in the blockchain network and the authorization of the user to enter the blockchain network;
the system comprises a coin purchasing transaction module, a coin purchasing module and a coin purchasing module, wherein the coin purchasing transaction module is used for receiving a coin purchasing request of a user by the system, and the user obtains certain assets in a block chain network;
the transfer transaction module is used for transferring a part of assets of the user to the assets of another user after the system receives a transfer request of the user;
the block chain basic network module is used for constructing a distributed shared account book and a database and correlating a string of data blocks generated by using a cryptography method;
and the application layer module is used for adapting to different personalized scenes to build different applications by using the system, and common developers support Dapp, H5, applets, clients and intelligent chips in block chain service of small and medium enterprises on the platform.
CN202110065285.7A 2021-01-18 2021-01-18 Anonymous computing block chain data processing method, system, medium, device and application Pending CN112766943A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110065285.7A CN112766943A (en) 2021-01-18 2021-01-18 Anonymous computing block chain data processing method, system, medium, device and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110065285.7A CN112766943A (en) 2021-01-18 2021-01-18 Anonymous computing block chain data processing method, system, medium, device and application

Publications (1)

Publication Number Publication Date
CN112766943A true CN112766943A (en) 2021-05-07

Family

ID=75703013

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110065285.7A Pending CN112766943A (en) 2021-01-18 2021-01-18 Anonymous computing block chain data processing method, system, medium, device and application

Country Status (1)

Country Link
CN (1) CN112766943A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113268760A (en) * 2021-07-19 2021-08-17 浙江数秦科技有限公司 Distributed data fusion platform based on block chain
CN113328863A (en) * 2021-08-03 2021-08-31 北京电信易通信息技术股份有限公司 Mobile equipment data acquisition method and system based on zero-knowledge proof
CN113507513A (en) * 2021-06-30 2021-10-15 电子科技大学 Zk-snark-based ubiquitous power Internet of things transaction data management method
CN113570458A (en) * 2021-07-16 2021-10-29 东北大学秦皇岛分校 Block chain payment channel supervision method based on proxy re-encryption
CN113627910A (en) * 2021-09-03 2021-11-09 杭州复杂美科技有限公司 Block chain anonymous red packet sending method, equipment and storage medium
CN113918645A (en) * 2021-09-02 2022-01-11 上海柚子工道物联技术有限公司 Heterogeneous asset transaction system and method based on block chain and computer device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108764874A (en) * 2018-05-17 2018-11-06 深圳前海微众银行股份有限公司 Anonymous refund method, system and storage medium based on block chain
CN109347878A (en) * 2018-11-30 2019-02-15 西安电子科技大学 The data verification of decentralization and data safety transaction system and method
CN110225023A (en) * 2019-06-06 2019-09-10 湖南大学 A kind of traceable anonymous authentication method and system
CN111008836A (en) * 2019-11-15 2020-04-14 哈尔滨工业大学(深圳) Privacy safe transfer payment method, device and system based on monitorable block chain and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108764874A (en) * 2018-05-17 2018-11-06 深圳前海微众银行股份有限公司 Anonymous refund method, system and storage medium based on block chain
CN109347878A (en) * 2018-11-30 2019-02-15 西安电子科技大学 The data verification of decentralization and data safety transaction system and method
CN110225023A (en) * 2019-06-06 2019-09-10 湖南大学 A kind of traceable anonymous authentication method and system
CN111008836A (en) * 2019-11-15 2020-04-14 哈尔滨工业大学(深圳) Privacy safe transfer payment method, device and system based on monitorable block chain and storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113507513A (en) * 2021-06-30 2021-10-15 电子科技大学 Zk-snark-based ubiquitous power Internet of things transaction data management method
CN113570458A (en) * 2021-07-16 2021-10-29 东北大学秦皇岛分校 Block chain payment channel supervision method based on proxy re-encryption
CN113570458B (en) * 2021-07-16 2023-09-26 东北大学秦皇岛分校 Blockchain payment channel supervision method based on proxy re-encryption
CN113268760A (en) * 2021-07-19 2021-08-17 浙江数秦科技有限公司 Distributed data fusion platform based on block chain
CN113268760B (en) * 2021-07-19 2021-11-02 浙江数秦科技有限公司 Distributed data fusion platform based on block chain
CN113328863A (en) * 2021-08-03 2021-08-31 北京电信易通信息技术股份有限公司 Mobile equipment data acquisition method and system based on zero-knowledge proof
CN113918645A (en) * 2021-09-02 2022-01-11 上海柚子工道物联技术有限公司 Heterogeneous asset transaction system and method based on block chain and computer device
CN113627910A (en) * 2021-09-03 2021-11-09 杭州复杂美科技有限公司 Block chain anonymous red packet sending method, equipment and storage medium

Similar Documents

Publication Publication Date Title
KR102054410B1 (en) Method for providing reward for delegating computing power for blockchain service management
Li et al. A blockchain privacy protection scheme based on ring signature
Yuan et al. Shadoweth: Private smart contract on public blockchain
Zhao et al. Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems
CN112766943A (en) Anonymous computing block chain data processing method, system, medium, device and application
CN111046352B (en) Identity information security authorization system and method based on block chain
JP2020528222A (en) Handling of transaction activities based on smart contracts in blockchain Caution Methods and devices for protecting data
Li et al. BCSE: Blockchain-based trusted service evaluation model over big data
Gür et al. Blockchain based metering and billing system proposal with privacy protection for the electric network
Zhu et al. Hybrid blockchain design for privacy preserving crowdsourcing platform
CN108876669A (en) Course notarization system and method applied to multi-platform shared education resources
Heo et al. Efficient and secure blockchain system for digital content trading
CN112232828A (en) Power grid data transaction method and system
Aggarwal et al. History of blockchain-blockchain 1.0: Currency
Xu et al. An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption
CN115277122A (en) Cross-border data flow and supervision system based on block chain
CN112419021A (en) Electronic invoice verification method, system, storage medium, computer equipment and terminal
Zhang et al. OBBC: A blockchain-based data sharing scheme for open banking
Muftic et al. Overview and analysis of the concept and applications of virtual currencies
CN115147224A (en) Transaction data sharing method and device based on alliance chain
Wang et al. A Fair and Privacy‐Preserving Image Trading System Based on Blockchain and Group Signature
Islam A privacy-preserving transparent central bank digital currency system based on consortium blockchain and unspent transaction outputs
Mohammed et al. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
Knapp et al. Pay-per-use sensor data exchange between IoT devices by blockchain and smart contract based data and encryption key management
Buccafurri et al. Ethereum Transactions and Smart Contracts among Secure Identities.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an

Applicant after: XIDIAN University

Applicant after: Xi'an Lianrong Technology Co., Ltd

Address before: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an

Applicant before: XIDIAN University

Applicant before: Xi'an Xidian Lianrong Technology Co., Ltd

CB02 Change of applicant information