CN112822255B - Block chain-based mail processing method, mail sending end, receiving end and equipment - Google Patents

Block chain-based mail processing method, mail sending end, receiving end and equipment Download PDF

Info

Publication number
CN112822255B
CN112822255B CN202011640195.8A CN202011640195A CN112822255B CN 112822255 B CN112822255 B CN 112822255B CN 202011640195 A CN202011640195 A CN 202011640195A CN 112822255 B CN112822255 B CN 112822255B
Authority
CN
China
Prior art keywords
mail
target
exclusive
key
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011640195.8A
Other languages
Chinese (zh)
Other versions
CN112822255A (en
Inventor
王健宗
瞿晓阳
李佳琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202011640195.8A priority Critical patent/CN112822255B/en
Publication of CN112822255A publication Critical patent/CN112822255A/en
Priority to PCT/CN2021/096703 priority patent/WO2022142112A1/en
Application granted granted Critical
Publication of CN112822255B publication Critical patent/CN112822255B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

The invention is applied to the field of block chain technology and cloud storage, and discloses a block chain-based mail processing method, a mail sending end, a mail receiving end and computer equipment. The method comprises the following steps: acquiring mail content and exclusive information of a mail sender, and generating an exclusive key; encrypting the mail content of the mail through the special key to obtain a mail encryption file, and storing the mail encryption file to a first cloud server; acquiring a storage index address corresponding to the mail encryption file and acquiring a public key of a mail receiver; encrypting the cloud storage index and the exclusive key according to the public key of the mail receiver to obtain a target encryption message; determining a target blockchain network for storing the target encrypted message; and storing the target encrypted message in the target block chain network, and sending the storage position information of the target encrypted message in the target block chain network to the mail receiving end so that the mail receiving end acquires the mail content according to the storage position information of the target encrypted message.

Description

Block chain-based mail processing method, mail sending end, receiving end and equipment
Technical Field
The present invention relates to the field of block chain technologies, and in particular, to a method, a sending end, a receiving end, and a device for processing a block chain mail.
Background
The conventional e-mail system is composed of a user agent (MUA), a Mail Transfer Agent (MTA), and a Mail Delivery Agent (MDA). When a mail is sent from a MUA, it is sent to an MTA and then forwarded through a series of MTAs until it reaches the final destination.
The inventor finds that when a traditional electronic mail system sends a mail, the identity authentication is simply carried out according to a user name and a password, and the mail needs to pass through a plurality of MTAs when being transmitted from a sending end to a receiving end, so that a malicious actor can acquire sensitive information in a mailbox by using a vulnerability in the mail service, and the mail can be intercepted in the transmission process, so that the mail is read randomly, important information in the mail is stolen, and the mail security is low.
Disclosure of Invention
The embodiment of the invention provides a block chain-based mail processing method, a mail sending end, a mail receiving end and equipment, and aims to solve the problem of low mail safety.
A mail processing method based on a block chain is applied to a mail sending end, and the method comprises the following steps:
when the mail sender finishes editing the mail, acquiring the mail content and the exclusive information of the mail sender, and generating an exclusive key according to the exclusive information of the mail sender;
encrypting the mail content of the mail through the exclusive key to obtain a mail encryption file, and storing the mail encryption file to a first cloud server;
acquiring a cloud storage index address corresponding to the mail encryption file fed back by the first cloud server, and acquiring a public key of a mail receiver;
encrypting the cloud storage index address and the exclusive key according to the public key of the mail receiver to obtain a target encryption message;
determining a target blockchain network for storing the target encrypted message;
and storing the target encrypted message in the target block chain network, and sending storage position information of the target encrypted message in the target block chain network to a mail receiving end so that the mail receiving end acquires the mail content according to the storage position information of the target encrypted message.
A mail processing method based on block chain is applied to a mail receiving end, and the method comprises the following steps:
receiving storage position information of a target encryption message sent by a mail sending end in a target block chain network, wherein the target encryption message is obtained by encrypting a cloud storage index address and an exclusive key by the mail sending end according to a public key of a mail receiver, the cloud storage index address is a storage index corresponding to the mail sending end when the mail sending end encrypts the mail content of a mail required to be sent by the mail sender through the exclusive key and stores a mail encryption file in a first cloud service end, and the exclusive key is generated by the mail sending end according to the exclusive information of the mail sender;
reading the target encrypted message from the target block chain network according to the storage position information of the target encrypted message;
decrypting the target encrypted message through a private key of the mail receiver to obtain the cloud storage index address and an exclusive key;
reading the mail encryption file from a first cloud server through the cloud storage index address;
and decrypting the mail encrypted file by using the exclusive key to obtain the mail content.
A mail sender, comprising:
the first acquisition module is used for acquiring the mail content and the exclusive information of the mail sender when the mail sender finishes editing the mail;
the generating module is used for generating an exclusive key according to the exclusive information of the mail sender;
the first encryption module is used for encrypting the mail content of the mail through the exclusive key to obtain a mail encryption file;
the storage module is used for storing the mail encrypted file to a first cloud server;
the second acquisition module is used for acquiring the cloud storage index address corresponding to the mail encryption file fed back by the first cloud server and acquiring a public key of a mail receiver;
the second encryption module is used for encrypting the cloud storage index address and the exclusive key according to the public key of the mail receiver to obtain a target encryption message;
a determining module for determining a target blockchain network for storing the target encrypted message;
and the sending module is used for storing the target encrypted message in the target block chain network and sending the storage location information of the target encrypted message in the target block chain network to a mail receiving end so that the mail receiving end can obtain the mail content according to the storage location information of the target encrypted message.
A mail receiving end comprising:
the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving storage position information of a target encryption message sent by a mail sending end in a target block chain network, the target encryption message is obtained by encrypting a cloud storage index address and an exclusive key by the mail sending end according to a public key of a mail receiver, the cloud storage index address is a storage index corresponding to the mail sending end when the mail sending end encrypts mail content through the exclusive key and stores a mail encryption file in a first cloud service end, and the exclusive key is generated by the mail sending end according to the exclusive information of the mail sender;
the first reading module is used for reading the target encrypted message from the target block chain network according to the storage position information of the target encrypted message;
the first decryption module is used for decrypting the target encrypted message through a private key of the mail receiver to obtain the cloud storage index address and an exclusive key;
the second reading module is used for reading the mail encrypted file from the first cloud server through the cloud storage index address;
and the second decryption module is used for decrypting the mail encrypted file by using the exclusive key so as to obtain the mail content.
A computer device includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the steps of the mail sending end or the mail receiving end in the above-mentioned block chain based mail processing method.
A computer-readable storage medium, which stores a computer program, which, when executed by a processor, implements the steps of a mail sending end or a mail receiving end in the above-mentioned block chain-based mail processing method.
In the scheme, the private key and the storage address index of the cloud storage are obtained by decrypting the target encrypted message through the private key of the mail receiver, so that even if the target encrypted message is intercepted, the mail content cannot be obtained due to the fact that the private key of the mail receiver does not exist, the mail is obtained from the cloud storage through the index, the mail is decrypted through the private key, and the mail content sent by the mail sending end is obtained. The combination of an encryption algorithm and an electronic mail technology in the whole scheme process can effectively solve the problem of potential safety hazard in the traditional electronic mail, because a sender and a receiver can be indicated in the mail, the identity authentication of the sender and the receiver is bound with personal biological characteristics and cannot be forged, the mail content is encrypted by using a special secret key of the sender and is stored in public cloud storage, and a public key of the mail receiver is encrypted and stored in a block chain, so that the mail receiver can accurately receive the mail, all information involved in the process is encrypted, and compared with the traditional electronic mail transmission mode which is not encrypted and is forwarded by multiple parties, the safety of the electronic mail is fundamentally ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is an interaction diagram of a block chain-based mail processing method according to an embodiment of the present invention;
FIG. 2 is another schematic interaction diagram of a block chain-based mail processing method according to an embodiment of the present invention;
FIG. 3 is a flow chart illustrating a process of obtaining a dedicated key according to an embodiment of the present invention;
FIG. 4 is a flow diagram of obtaining a public key and a private key of a mail recipient in an embodiment of the invention;
fig. 5 is a schematic structural diagram of a mail sender in the embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a mail receiving end in the embodiment of the present invention;
FIG. 7 is a schematic diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The mail processing system provided by the scheme comprises a mail sending end, a mail receiving end, a cloud server (the scheme mainly relates to a first cloud server end and a second cloud server end) and a blockchain network, the mail processing method is realized based on the mail processing system, four concepts are introduced for facilitating understanding, namely a mail sender, the mail sending end, a mail receiver and the mail receiving end, wherein the mail sending end and the mail receiving end refer to clients with mail receiving and sending functions, the clients are installed in terminal equipment such as a mobile phone, a tablet personal computer and the like, the mail sender refers to a user who edits and sends mails through the mail sending end, and the mail receiver refers to a user who receives mails through the mail receiving end. The terminal device can be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices. The cloud server may be implemented by a stand-alone server or a server cluster composed of a plurality of servers.
Referring to fig. 1-2, the method for processing mails according to the present invention is described in terms of multiple ends for easy understanding, and mainly includes the following steps:
s10: when the mail sender finishes editing the mail, the mail sending end acquires the mail content and the exclusive information of the mail sender, and generates an exclusive key according to the exclusive information.
It can be understood that the mail sending end may refer to a client installed in a mobile phone, a computer, or the like and having a mail sending function, and when a mail sender needs to send a mail to a mail receiver, the mail sender may edit the desired mail at the mail sending end. The mail content corresponding to the mail comprises text information, mail attachments, an addressee mail address and the like.
In some embodiments, when the sender of the mail finishes editing the mail, the sender of the mail obtains the content of the mail. As an example, the mail sender may first cache the corresponding mail content locally, that is, the mail sender is local, so as to facilitate subsequent encryption processing.
The specific information of the mail sender refers to information related to the mail sender, and for example, the specific information may refer to unique specific biological information of the mail sender, such as fingerprint information, face information, and identification card information of the mail sender; as another example, the dedicated information may refer to dedicated account information of the mail sender, and the specific scheme is not limited. In some application scenarios, the mail sending end may instruct the mail sender to enter the exclusive information to be stored locally, and associate the exclusive information with the mail login account of the mail sender, so that the mail sending end can conveniently obtain the exclusive information of the sender according to the login account after the mail sender successfully logs in the mail and edits the mail.
And after the mail sending end acquires the exclusive information, generating an exclusive key by using the exclusive information.
S20: and the mail sending end encrypts the mail content of the mail through the special key to obtain a mail encryption file.
S30: and the mail sending end stores the mail encryption file to the first cloud server.
After the exclusive key is generated according to the exclusive information, the mail sending end locally extracts the mail content from the mail sending end, encrypts the mail content through the exclusive key to obtain a mail encryption file, and then sends a mail encryption file storage request to the first cloud service end, wherein the mail encryption file storage request carries the mail encryption file, the first cloud service end receives the mail encryption file storage request and stores the mail encryption file carried by the mail encryption file storage request, so that the process of uploading the mail encryption file to the first cloud service end is completed.
It should be noted that, when the first cloud server stores the encrypted mail, the first cloud server records the storage index address of the encrypted mail file by mail. The cloud storage index address is a storage address corresponding to the mail encryption file stored in the first cloud server, and the mail encryption file corresponding to the storage index address can be found in the first cloud server through the cloud storage index address.
S40: the mail sending end obtains a cloud storage index address corresponding to a mail encryption file fed back by the first cloud server.
S50: and obtains the public key of the mail recipient.
After the mail sending end stores the mail encryption file in the first cloud server, the first cloud server feeds back the cloud storage index address corresponding to the mail encryption file to the mail sending end, and the mail sending end needs to further obtain the public key of the mail receiver.
As an example, the mail receiver has a private key and a private key, and uploads the private key to the second cloud server, and the second cloud server stores the public key of the mail receiver in association with the second cloud server according to the mail address of the mail receiver, so as to publish the public key of the mail receiver. For the email sending end, the public key of the email recipient may be obtained from the shared cloud server through the email address of the email recipient, where in an embodiment, the second cloud server and the first cloud server are different cloud servers.
It should be noted that, in some application scenarios, the first cloud server and the second cloud server may refer to the same shared cloud server, so that the processes of uploading the encrypted email file and acquiring the public key of the email recipient may be performed together, and the processes of sending the storage request and acquiring the public key request for multiple times are reduced.
S60: and the mail sending end encrypts the cloud storage index address and the exclusive key according to the public key of the mail receiver to obtain a target encryption message.
After the mail sending end obtains the public key of the mail receiver, the cloud storage index address and the exclusive secret key are encrypted according to the public key of the mail receiver to obtain a target encryption message.
When encrypting, the mail sending end may use RSA, elgamal, knapsack algorithm, rabin, diffie-Hellman, ECC (elliptic curve cryptography), etc. and encrypt the cloud storage index and the dedicated key by using the public key of the mail receiver to obtain the target encrypted message, which is not limited in this scheme.
S70: and the mail sending end determines a target block chain network for storing the target encrypted message.
S80: and the mail sending end stores the target encrypted message in the target block chain network.
The mail sending end stores the target encrypted message in the target block chain network after determining the target block chain network for storing the target encrypted message. It is emphasized that, in order to further ensure the privacy and security of the target encrypted message, the target encrypted message may also be stored in a node of a blockchain network.
It should be noted that the blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
S90: and the mail sending end sends the storage position information of the target encrypted message in the target block chain network to the mail receiving end.
After the mail sending end stores the target encrypted message in the target block chain network, the target encrypted message has corresponding storage position information on the block chain network, and the mail sending end sends the storage position information to the mail receiving end.
S100: and the mail receiving end reads the target encrypted message from the target block chain network according to the storage position information of the target encrypted message.
S110: and the mail receiving end decrypts the target encrypted message through a private key of a mail receiver to obtain the cloud storage index address and the exclusive key.
S120: and the mail receiving end reads the mail encryption file from the first cloud server through the cloud storage index address.
S130: and the mail receiving end decrypts the mail encrypted file by using the special key to obtain the mail content.
For steps S90 to S120, after the mail receiving end reads the target encrypted message from the target block chain network according to the storage location information of the target encrypted message, and decrypts the target encrypted message by using the private key corresponding to the public key of the mail receiver, so as to obtain the cloud storage index address and the private key. At this time, after the mail receiving end obtains the cloud storage index, the mail encryption file corresponding to the cloud storage index address is obtained from the first cloud server, and then the obtained exclusive key is used for decrypting the mail encryption file to obtain the mail content, so that the mail content edited by the mail sender through the mail sending end is received by the mail receiving end.
The method comprises the steps that when a mail sending end sends a mail, the mail content is encrypted by using a special key, and the encrypted mail content is stored in a first cloud server; the method comprises the steps of encrypting a cloud storage index address and an exclusive secret key of a mail encryption file again by using a public key of a mail receiver to obtain a target encryption message and storing the target encryption message in a block chain network, and finally sending storage position information of the target encryption message to a mail receiving end.
As an example, in S10, that is, the dedicated key is generated according to the dedicated information, as shown in fig. 3, the method specifically includes the following steps:
s11: carrying out hash calculation on the exclusive information of the mail sender to obtain an exclusive hash value of the mail sender, and randomly generating two first random numbers according to the exclusive hash value of the mail sender, wherein the two first random numbers are different.
The hash calculation is a process of converting an input of an arbitrary length into an output hash value of a fixed length by a hash algorithm. In this step, the dedicated information may be subjected to hash calculation by using MD4, MD5, SHA-1, and other hash algorithms to obtain a dedicated hash value, which is referred to as a dedicated hash value in this scheme. After the exclusive hash value is obtained, random number generation processing is performed on the exclusive hash value by using a random number algorithm, two random numbers are generated randomly, and the random number is called as a first random number in the scheme. The two first random numbers generated by the random number algorithm are different, which is helpful for generating the required exclusive key subsequently.
S12: and encrypting the two first random numbers by taking the exclusive information of the mail sender as a key of a target symmetric encryption algorithm so as to correspondingly obtain two first helper data.
S13: and respectively carrying out XOR processing on the two first auxiliary data and the corresponding first random numbers to obtain two first target numbers.
Symmetric encryption algorithm refers to an encryption algorithm that uses the same key for encryption and decryption, that is, the encryption key can be derived from the decryption key, and the decryption key can also be derived from the encryption key. In this embodiment, after obtaining two first random numbers, the dedicated information may be used as a key of a target symmetric encryption algorithm to encrypt the two first random numbers, so as to correspondingly obtain two first helper data.
Specifically, in this scheme, an Advanced Encryption Standard (AES) algorithm may be used as a target symmetric Encryption algorithm, and the dedicated information is used as a key to encrypt the two first random numbers, so as to obtain two corresponding first helper data. For example, assuming the AES encryption function is E, C = E (K, P), where P is plaintext, i.e., a random number; k is a secret key, namely exclusive information; and C is a ciphertext, namely the first helper data. That is, the encryption function E outputs the ciphertext C by inputting the plaintext P and the key K as parameters of the encryption function. Of course, other symmetric encryption algorithms may also be adopted as the target symmetric encryption algorithm in the present solution, and the present solution is not particularly limited.
After the two first help data are obtained, the two first help data are respectively subjected to exclusive or processing with the corresponding first random numbers to obtain two first target numbers.
S14: and respectively generating two first target numbers by a large prime number generating algorithm to obtain two first large prime numbers p1 and q1.
S15: first target products n1= p1q1, and Φ (n 1) = (p 1-1) (q 1-1) are calculated, and first target integers e1 satisfying 1-straw e1< Φ (n 1) and gcd (Φ (n 1), e 1) =1 are selected.
Where φ (n 1) is the Euler function, gcd (φ (n 1), e 1) represents the greatest common factor of the non-negative integers φ (n 1) and e1.
S16: a second target integer d1 satisfying e1d1=1mod Φ (n 1) is calculated.
e1d1=1mod Φ (n 1) for calculating the modulo element d1 of e1 for Φ (n 1), which is called the second target integer.
S17: and encapsulating the first target integer and the first target product into a private key of the mail sender, and encapsulating the second target integer and the first target product into a public key of the mail sender.
S18: and randomly selecting a private key or a public key of the mail receiver as a special key.
After the first target integer and the second target integer are obtained respectively, the product of the first target integer and the first target integer can be packaged into a public key of the mail sender, and the product of the second target integer and the first target integer can be packaged into a private key of the mail sender. Namely: { e1, n1} is the public key of the mail recipient, and { d1, n1} is the private key of the mail recipient. Randomly using { e1, n1} or { d1, n1}, the mail content of the mail can be encrypted to obtain a mail encrypted file.
It should be noted that, as an example, before the mail sending end obtains the public key of the mail receiver, the mail receiver may publish the public key of the mail receiver through the mail receiving end and need to generate the public key and the private key of the mail receiver before decrypting the target encrypted message by using the private key of the mail receiver, specifically, the present solution also provides a way of generating the public key and the private key of the mail receiver, and is applicable to the mail receiving end, specifically, as shown in fig. 4, the method includes the following steps:
s100: and carrying out hash calculation on the exclusive information of the mail receiver to obtain an exclusive hash value of the mail receiver, and randomly generating two second random numbers according to the exclusive hash value of the mail receiver, wherein the two second random numbers are different.
S101: and encrypting the two second random numbers by taking the exclusive information of the mail receiver as a key of a target symmetric encryption algorithm so as to correspondingly obtain two second help data.
S102: and performing exclusive-or processing on the two second helper data and the corresponding second random numbers respectively to obtain two second target numbers.
S103: and respectively generating two second target numbers by a large prime number generation algorithm to obtain two second large prime numbers p2 and q2.
S104: a second target product n2= p2q2, and Φ (n 2) = (p 2-1) (q 2-1) are calculated, and a third target integer e2 satisfying 1-straw e2< Φ (n 2) and gcd (Φ (n 1), e 2) =1 is selected.
Where φ (n 2) is the Euler function, gcd (φ (n 2), e 2) represents the greatest common factor of the non-negative integers φ (n 2) and e2.
S105: a fourth target integer d2 satisfying e2d2=1mod Φ (n 2) is calculated.
e2d2=1mod Φ (n 2) for calculating the modulo element d2 of e2 for Φ (n 2), which scheme is referred to as the fourth target integer.
S106: and encapsulating the third target integer and the second target product into a private key of the mail receiver, and encapsulating the fourth target integer and the second target product into a public key of the mail receiver.
S107: and storing the private key of the mail receiver locally, and storing the public key of the mail receiver and the mail address in a second cloud server in an associated manner.
After the third target integer and the fourth target integer are obtained, the product of the third target integer and the second target integer can be packaged into a public key of the mail receiver, and the product of the fourth target integer and the second target integer can be packaged into a private key of the mail receiver. Namely: { e2, n2} is the public key of the mail recipient, and { d2, n2} is the private key of the mail recipient. And storing the private key of the mail receiver locally, and storing the public key of the mail receiver and the mail address in a second cloud server in an associated manner.
It should be noted that the process of obtaining the public key and the private key of the mail receiver may refer to the process of obtaining the private key of the mail sender, and the explanation of each step is not repeated here.
As an example, in S50, that is, the mail sender determines a target blockchain network for storing the target encrypted message, the method includes:
s51: the mail sending end judges whether the mail sending end and the mail receiving end are in the same block chain network.
S52: the mail sending end judges whether the mail sending end and the mail receiving end are in the same block chain network.
S53: and when the mail sending end and the mail receiving end are not in the same block chain network, determining the block chain network where the mail receiving end is located as a target block chain network.
S54: and when the mail sending end and the mail receiving end are in the same block chain network, determining the block chain network where the mail sending end is located as a target block chain network.
It should be noted that the mail sending end and the mail receiving end may be deployed in the same blockchain network, but in practical applications, in order to reduce the deployment cost, and because the number of users is large, in order to improve the scalability of the system, most of the mail sending end and the mail receiving end are different in the blockchain network. Therefore, different processing logics are correspondingly arranged according to different block chain networks where the mail sending end and the mail receiving end are located. In the scheme, when the mail sending end sends the mail, the mail sending end is firstly judged whether the mail sending end and the mail receiving end are in the same block chain network. When the mail sending end and the mail receiving end are not in the same blockchain network, the blockchain network where the mail receiving end is located is determined to be the target blockchain network, that is, the mail sending end sends the target encrypted message to the blockchain network where the mail receiving end is located for storage, and sends the storage location information of the target encrypted message in the blockchain network where the mail receiving end is located to the mail receiving end, so that the mail receiving end can read the target encrypted message from the blockchain network where the mail receiving end is located.
On the other hand, when the mail sending end and the mail receiving end are in the same blockchain network, the blockchain network where the mail sending end is located is directly determined as the target blockchain network, that is, the mail sending end sends the target encrypted message to the blockchain network where the mail sending end is located for storage, and sends the storage location information of the target encrypted message in the blockchain network where the mail sending end is located to the mail receiving end, so that the mail receiving end reads the target encrypted message from the blockchain network where the mail sending end is located.
In one example, the process of sending the target encrypted message to the target blockchain network storage at the mail sender is as follows: firstly, a storage request carrying a target encryption message is sent to a block chain processing end, the storage request carrying the target encryption message, after the block chain processing end receives the storage request carrying the target encryption message, the block chain processing end generates a block by using the target encryption message and stores the block into a block chain where a mail receiving end is located, and a chaining process is completed.
As an example, in S60, that is, sending the target encrypted message to the mail receiving end at the storage location information of the target blockchain network, the method includes:
s61: the mail sending end generates a mail text according to the storage position information, and the mail text comprises the storage position information;
s62: the mail sending end sends the mail text containing the storage position information to the mail receiving end in a mail form, so that the mail receiving end can obtain the storage position information of the target encrypted message through the mail text.
It is worth emphasizing that the storage location information can be sent out in the form of a common mail in the process, but the possibility of information leakage risk is extremely low, even if the common mail is intercepted, a thief can only obtain the storage location information, and even if the thief reads the target encryption message from the block chain network according to the storage location information, the target encryption message is encrypted, and the thief cannot crack the encrypted information.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
In an embodiment, a mail sending end is provided, and the mail sending ends correspond to the mail sending ends of the mail processing method in the foregoing embodiment one to one. As shown in fig. 5, the sender of the mail includes a first obtaining module 101, a generating module 102, a first encrypting module 103, a storing module 104, a second obtaining module 105, a second encrypting module 106, a determining module 107 and a sending module 108. The functional modules are explained in detail as follows:
a first obtaining module 101, configured to obtain mail content and exclusive information of a mail sender when the mail sender finishes editing a mail;
a generating module 102, configured to generate an exclusive key according to the exclusive information of the mail sender;
the first encryption module 103 is configured to encrypt the mail content of the mail through the dedicated key to obtain a mail encryption file;
the storage module 104 is configured to store the mail encrypted file to a first cloud server;
a second obtaining module 105, configured to obtain a cloud storage index address corresponding to the email encryption file fed back by the first cloud server, and obtain a public key of an email receiver;
the second encryption module 106 is configured to encrypt the cloud storage index address and the dedicated key according to the public key of the mail recipient to obtain a target encryption message;
a determining module 107, configured to determine a target blockchain network for storing the target encrypted message;
the sending module 108 is configured to store the target encrypted message in the target block chain network, and send storage location information of the target encrypted message in the target block chain network to a mail receiving end, so that the mail receiving end obtains the mail content according to the storage location information of the target encrypted message.
In an embodiment, the generating module 102 is specifically configured to:
carrying out hash calculation on the exclusive information of the mail sender to obtain an exclusive hash value of the mail sender, and randomly generating two first random numbers according to the exclusive hash value of the mail sender, wherein the two first random numbers are different;
taking the exclusive information of the mail sender as a key of a target symmetric encryption algorithm, and encrypting the two first random numbers to correspondingly obtain two first helper data;
performing exclusive or processing on the two first auxiliary data and the corresponding first random numbers respectively to obtain two first target numbers;
generating the two first target numbers respectively through a large prime number generation algorithm to obtain two first large prime numbers p1 and q1;
calculating a first target product n1= p1q1, and Φ (n 1) = (p 1-1) (q 1-1), and selecting a first target integer e1 satisfying 1-straw e1< Φ (n 1) and gcd (Φ (n 1), e 1) = 1;
calculating a second target integer d1 satisfying e1d1=1mod Φ (n 1);
encapsulating the first target integer and the first target product into a private key of the mail sender, and encapsulating the second target integer and the first target product into a public key of the mail sender;
and randomly selecting a private key or a public key of the mail sender as the exclusive key.
In an embodiment, the determining module 107 is specifically configured to:
judging whether the mail sending end and the mail receiving end are in the same block chain network or not;
when the mail sending end and the mail receiving end are not in the same block chain network, determining the block chain network where the mail receiving end is located as the target block chain network;
and when the mail sending end and the mail receiving end are in the same block chain network, determining the block chain network where the mail sending end is located as the target block chain network.
In an embodiment, the sending module 108 is specifically configured to:
generating a mail body according to the storage position information, wherein the mail body comprises the storage position information;
and sending the mail body containing the storage position information to the mail receiving end in a mail form, so that the mail receiving end can acquire the storage position information through the mail body.
In an embodiment, the second obtaining module 105 is specifically configured to:
acquiring a mail address of the mail receiver;
and acquiring the public key of the mail receiver from a second cloud server, wherein the first cloud server and the first cloud server are different cloud servers.
In an embodiment, a mail receiving end is provided, and the mail receiving end corresponds to the mail receiving end of the mail processing method in the above embodiment one to one. As shown in fig. 6, the mail receiving end includes a receiving module 201, a first reading module 202, a first decryption module 203, a second reading module 204, and a second decryption module 205. The functional modules are explained in detail as follows:
the receiving module 201 is configured to receive storage location information of a target encrypted message sent by a mail sending end in a target block chain network, where the target encrypted message is obtained by encrypting a cloud storage index address and an exclusive key by the mail sending end according to a public key of a mail receiver, the cloud storage index address is a storage index corresponding to the mail sending end when the mail sending end encrypts mail content through the exclusive key and stores a mail encrypted file in a first cloud service end, and the exclusive key is generated by the mail sending end according to the exclusive information of the mail sender;
a first reading module 202, configured to read the target encrypted message from the target blockchain network according to the storage location information of the target encrypted message;
the first decryption module 203 is configured to decrypt the target encrypted message through a private key of the mail receiver to obtain the cloud storage index address and an exclusive key;
the second reading module 204 is configured to read the mail encrypted file from the first cloud server through the cloud storage index address;
the second decryption module 205 is configured to decrypt the encrypted mail file with the dedicated key to obtain the mail content.
In one embodiment, the public key and the private key of the mail receiver are obtained by the mail receiving end in the following way:
carrying out hash calculation on the exclusive information of the mail receiver to obtain an exclusive hash value of the mail receiver, and randomly generating two second random numbers according to the exclusive hash value of the mail receiver, wherein the two second random numbers are different;
taking the exclusive information of the mail receiver as a key of a target symmetric encryption algorithm, and encrypting the two second random numbers to correspondingly obtain two second help data;
performing exclusive or processing on the two second helper data and the corresponding second random numbers respectively to obtain two second target numbers;
generating two second target numbers respectively through a large prime number generation algorithm to obtain two second large prime numbers p2 and q2;
calculating a second target product n2= p2q2, and
Figure BDA0002879823100000201
and is selected to satisfy
Figure BDA0002879823100000202
And is
Figure BDA0002879823100000203
E2;
computing satisfaction
Figure BDA0002879823100000204
D2;
encapsulating the third target integer and the second target product into a private key of the mail recipient and encapsulating the fourth target integer and the second target product into a public key of the mail recipient;
and storing the private key of the mail receiver locally, and storing the public key of the mail receiver and the mail address in a second cloud server in an associated manner.
For specific limitations of the mail sending end or the mail receiving end, reference may be made to the above limitations of the mail sending end or the mail receiving end in the mail processing method, which is not described herein again. All or part of the modules in the mail sending end or the mail receiving end can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a mail sending end or a mail receiving end, and its internal structure diagram may be as shown in fig. 7. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a storage medium and an internal memory. The storage medium stores an operating system and a computer program. The storage medium includes a nonvolatile storage medium and a volatile storage medium, and the internal memory provides an environment for an operating system and a computer program in the nonvolatile storage medium to run. The network interface of the computer device is used for connecting and communicating with external servers (such as the first cloud server or the second cloud server and the target block chain network) through a network. The computer program is executed by a processor to implement the steps or functions of a mail sending end or a mail receiving end in a block chain based mail processing method.
In one embodiment, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
when the mail sender finishes editing the mail, acquiring the mail content and the exclusive information of the mail sender, and generating an exclusive key according to the exclusive information of the mail sender;
encrypting the mail content of the mail through the exclusive key to obtain a mail encryption file, and storing the mail encryption file to a first cloud server;
acquiring a cloud storage index address corresponding to the mail encryption file fed back by the first cloud server, and acquiring a public key of a mail receiver;
encrypting the cloud storage index address and the exclusive key according to the public key of the mail receiver to obtain a target encryption message;
determining a target blockchain network for storing the target encrypted message;
and storing the target encrypted message in the target block chain network, and sending storage position information of the target encrypted message in the target block chain network to a mail receiving end so that the mail receiving end acquires the mail content according to the storage position information of the target encrypted message.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
when the mail sender finishes editing the mail, acquiring the mail content and the exclusive information of the mail sender, and generating an exclusive key according to the exclusive information of the mail sender;
encrypting the mail content of the mail through the exclusive key to obtain a mail encryption file, and storing the mail encryption file to a first cloud server;
acquiring a cloud storage index address corresponding to the mail encryption file fed back by the first cloud server, and acquiring a public key of a mail receiver;
encrypting the cloud storage index address and the exclusive key according to the public key of the mail receiver to obtain a target encryption message;
determining a target blockchain network for storing the target encrypted message;
and storing the target encrypted message in the target block chain network, and sending storage position information of the target encrypted message in the target block chain network to a mail receiving end so that the mail receiving end acquires the mail content according to the storage position information of the target encrypted message.
In one embodiment, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
receiving storage position information of a target encryption message sent by a mail sending end in a target block chain network, wherein the target encryption message is obtained by encrypting a cloud storage index and an exclusive key by the mail sending end according to a public key of a mail receiver, the cloud storage index address is a storage index corresponding to the mail sending end when the mail sending end encrypts mail content of a mail required to be sent by the mail sender through the exclusive key and stores a mail encryption file in a first cloud service end, and the exclusive key is generated by the mail sending end according to the exclusive information of the mail sender;
reading the target encrypted message from the target block chain network according to the storage position information of the target encrypted message;
decrypting the target encrypted message through a private key of the mail receiver to obtain the cloud storage index address and an exclusive key;
reading the mail encryption file from a first cloud server through the cloud storage index address;
and decrypting the mail encrypted file by using the exclusive key to obtain the mail content.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving storage position information of a target encryption message sent by a mail sending end in a target block chain network, wherein the target encryption message is obtained by encrypting a cloud storage index and an exclusive key by the mail sending end according to a public key of a mail receiver, the cloud storage index address is a storage index corresponding to the mail sending end when the mail sending end encrypts mail content of a mail required to be sent by the mail sender through the exclusive key and stores a mail encryption file in a first cloud service end, and the exclusive key is generated by the mail sending end according to the exclusive information of the mail sender;
reading the target encrypted message from the target block chain network according to the storage position information of the target encrypted message;
decrypting the target encrypted message through a private key of the mail receiver to obtain the cloud storage index address and an exclusive key;
reading the mail encryption file from a first cloud server through the cloud storage index address;
and decrypting the mail encrypted file by using the exclusive key to obtain the mail content.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by hardware instructions of a computer program, which may be stored in a non-volatile computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; although the present invention has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A mail processing method based on a block chain is characterized in that the method is applied to a mail sending end, and the method comprises the following steps:
when the mail sender finishes editing the mail, acquiring the mail content and the exclusive information of the mail sender, and generating an exclusive key according to the exclusive information of the mail sender;
encrypting the mail content of the mail through the exclusive key to obtain a mail encryption file, and storing the mail encryption file to a first cloud server;
acquiring a cloud storage index address corresponding to the mail encryption file fed back by the first cloud server, and acquiring a public key of a mail receiver;
encrypting the cloud storage index address and the exclusive key according to the public key of the mail receiver to obtain a target encryption message;
determining a target blockchain network for storing the target encrypted message;
storing the target encryption message in the target block chain network, and sending storage location information of the target encryption message in the target block chain network to a mail receiving end, so that the mail receiving end analyzes the cloud storage index address and the exclusive key according to the storage location information of the target encryption message, and reads the mail encryption file from a first cloud service end through the analyzed cloud storage index address; and then, the analyzed exclusive key is used for decrypting the mail encrypted file to obtain the mail content.
2. The method as claimed in claim 1, wherein the generating a specific key according to the specific information of the mail sender comprises:
carrying out hash calculation on the exclusive information of the mail sender to obtain an exclusive hash value of the mail sender, and randomly generating two first random numbers according to the exclusive hash value of the mail sender, wherein the two first random numbers are different;
taking the exclusive information of the mail sender as a key of a target symmetric encryption algorithm, and encrypting the two first random numbers to correspondingly obtain two first helper data;
performing exclusive or processing on the two first auxiliary data and the corresponding first random numbers respectively to obtain two first target numbers;
generating the two first target numbers respectively through a large prime number generation algorithm to obtain two first large prime numbers p1 and q1;
calculating a first target product n1= p1q1, and Φ (n 1) = (p 1-1) (q 1-1), and selecting a first target integer e1 satisfying 1- <e1< Φ (n 1) and gcd (Φ (n 1), e 1) = 1;
calculating a second target integer d1 satisfying e1d1=1mod Φ (n 1);
encapsulating the first target integer and the first target product into a private key of the mail sender, and encapsulating the second target integer and the first target product into a public key of the mail sender;
and randomly selecting a private key or a public key of the mail sender as the exclusive key.
3. The blockchain-based mail processing method of claim 1, wherein the determining a target blockchain network for storing the target encrypted message includes:
judging whether the mail sending end and the mail receiving end are in the same block chain network or not;
when the mail sending end and the mail receiving end are not in the same block chain network, determining the block chain network where the mail receiving end is located as the target block chain network;
and when the mail sending end and the mail receiving end are in the same block chain network, determining the block chain network where the mail sending end is located as the target block chain network.
4. The blockchain-based mail processing method according to claim 1, wherein the sending the target encrypted message to a mail receiving end at a storage location information of the target blockchain network comprises:
generating a mail body according to the storage position information, wherein the mail body comprises the storage position information;
and sending the mail text containing the storage position information to the mail receiving end in a mail form, so that the mail receiving end can acquire the storage position information through the mail text.
5. The blockchain-based mail processing method according to any one of claims 1 to 4, wherein the acquiring of the public key of the mail receiver includes:
acquiring a mail address of the mail receiver;
and acquiring the public key of the mail receiver from a second cloud server, wherein the second cloud server and the first cloud server are different cloud servers.
6. A mail processing method based on a block chain is characterized in that the method is applied to a mail receiving end and comprises the following steps:
receiving storage position information of a target encryption message sent by a mail sending end in a target block chain network, wherein the target encryption message is obtained by encrypting a cloud storage index and an exclusive key by the mail sending end according to a public key of a mail receiver, a cloud storage index address is a storage index corresponding to the mail sending end when the mail sending end encrypts mail content of a mail required to be sent by the mail sender through the exclusive key and stores a mail encryption file in a first cloud service end, and the exclusive key is generated by the mail sending end according to the exclusive information of the mail sender;
reading the target encrypted message from the target block chain network according to the storage position information of the target encrypted message;
decrypting the target encrypted message through a private key of the mail receiver to obtain the cloud storage index address and an exclusive key;
reading the mail encryption file from a first cloud server through the cloud storage index address;
and decrypting the mail encrypted file by using the exclusive key to obtain the mail content.
7. The blockchain-based mail processing method of claim 6, wherein the public key and the private key of the mail recipient are obtained by:
carrying out hash calculation on the exclusive information of the mail receiver to obtain an exclusive hash value of the mail receiver, and randomly generating two second random numbers according to the exclusive hash value of the mail receiver, wherein the two second random numbers are different;
taking the exclusive information of the mail receiver as a key of a target symmetric encryption algorithm, and encrypting the two second random numbers to correspondingly obtain two second help data;
performing XOR processing on the two second helper data and the corresponding second random numbers respectively to obtain two second target numbers;
generating two second target numbers respectively through a large prime number generation algorithm to obtain two second large prime numbers p2 and q2;
calculating a second target product n2= p2q2, and Φ (n 2) = (p 2-1) (q 2-1), and selecting a third target integer e2 satisfying 1-straw e2< Φ (n 2) and gcd (Φ (n 1), e 2) = 1;
calculating a fourth target integer d2 satisfying e2d2=1mod Φ (n 2);
encapsulating the third target integer and the second target product into a private key of the mail recipient and encapsulating the fourth target integer and the second target product into a public key of the mail recipient;
and storing the private key of the mail receiver locally, and storing the public key of the mail receiver and the mail address in a second cloud server in an associated manner.
8. A mail sender, comprising:
the first acquisition module is used for acquiring the mail content and the exclusive information of the mail sender when the mail sender finishes editing the mail;
the generating module is used for generating an exclusive key according to the exclusive information of the mail sender;
the first encryption module is used for encrypting the mail content of the mail through the exclusive key to obtain a mail encryption file;
the storage module is used for storing the mail encrypted file to a first cloud server;
the second acquisition module is used for acquiring the cloud storage index address corresponding to the mail encryption file fed back by the first cloud server and acquiring a public key of a mail receiver;
the second encryption module is used for encrypting the cloud storage index address and the exclusive key according to the public key of the mail receiver to obtain a target encryption message;
a determining module for determining a target blockchain network for storing the target encrypted message;
the sending module is used for storing the target encryption message in the target block chain network, sending storage location information of the target encryption message in the target block chain network to a mail receiving end, so that the mail receiving end analyzes the cloud storage index address and the exclusive key according to the storage location information of the target encryption message, and reads the mail encryption file from a first cloud service end through the analyzed cloud storage index address; and then, the analyzed exclusive key is used for decrypting the mail encrypted file to obtain the mail content.
9. A mail receiving end, comprising:
the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving storage position information of a target encryption message sent by a mail sending end in a target block chain network, the target encryption message is obtained by encrypting a cloud storage index address and an exclusive key by the mail sending end according to a public key of a mail receiver, the cloud storage index address is a storage index corresponding to the mail sending end when the mail sending end encrypts mail content through the exclusive key and stores a mail encryption file in a first cloud service end, and the exclusive key is generated by the mail sending end according to the exclusive information of the mail sender;
the first reading module is used for reading the target encrypted message from the target block chain network according to the storage position information of the target encrypted message;
the first decryption module is used for decrypting the target encrypted message through a private key of the mail receiver to obtain the cloud storage index address and an exclusive key;
the second reading module is used for reading the mail encryption file from the first cloud server side through the cloud storage index address;
and the second decryption module is used for decrypting the mail encrypted file by using the exclusive key so as to obtain the mail content.
10. A computer arrangement comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor realizes the steps of the method for processing blockchain based mail according to any of claims 1 to 7 when executing the computer program.
CN202011640195.8A 2020-12-31 2020-12-31 Block chain-based mail processing method, mail sending end, receiving end and equipment Active CN112822255B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011640195.8A CN112822255B (en) 2020-12-31 2020-12-31 Block chain-based mail processing method, mail sending end, receiving end and equipment
PCT/CN2021/096703 WO2022142112A1 (en) 2020-12-31 2021-05-28 Blockchain-based mail processing method, and mail sending end, mail receiving end and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011640195.8A CN112822255B (en) 2020-12-31 2020-12-31 Block chain-based mail processing method, mail sending end, receiving end and equipment

Publications (2)

Publication Number Publication Date
CN112822255A CN112822255A (en) 2021-05-18
CN112822255B true CN112822255B (en) 2023-02-28

Family

ID=75858095

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011640195.8A Active CN112822255B (en) 2020-12-31 2020-12-31 Block chain-based mail processing method, mail sending end, receiving end and equipment

Country Status (2)

Country Link
CN (1) CN112822255B (en)
WO (1) WO2022142112A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112822255B (en) * 2020-12-31 2023-02-28 平安科技(深圳)有限公司 Block chain-based mail processing method, mail sending end, receiving end and equipment
CN115426331B (en) * 2022-08-30 2024-03-22 中国工商银行股份有限公司 Mail transmission method, mail transmission device, computer equipment and storage medium
CN116132166A (en) * 2023-02-03 2023-05-16 网易(杭州)网络有限公司 Communication method, device, equipment and storage medium based on block chain
CN116805078A (en) * 2023-06-14 2023-09-26 深圳市易联锋达科技有限公司 Logistics information platform data intelligent management system and method based on big data
CN116484413B (en) * 2023-06-25 2023-09-29 上海联鼎软件股份有限公司 Unstructured data-oriented efficient cross-cloud intelligent security layout construction method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6931532B1 (en) * 1999-10-21 2005-08-16 International Business Machines Corporation Selective data encryption using style sheet processing
CN102340455A (en) * 2010-07-16 2012-02-01 汉达精密电子(昆山)有限公司 Transmission method of E-mail encrypted by fingerprint data and receiving method thereof
CN103188271A (en) * 2013-04-19 2013-07-03 国家电网公司 Secure mail client local data storage and identification methods and devices
CN103281312A (en) * 2013-05-10 2013-09-04 金硕澳门离岸商业服务有限公司 Information filtering method
CN103457932A (en) * 2013-08-15 2013-12-18 中电长城网际系统应用有限公司 Data safety storage method and system under cloud computing environment
CN106453612A (en) * 2016-11-10 2017-02-22 华中科技大学 Data storage and sharing system
CN107508806A (en) * 2017-08-11 2017-12-22 北京理工大学 Internet financial electronic data safety system and method based on block chain
CN108038128A (en) * 2017-11-08 2018-05-15 平安科技(深圳)有限公司 A kind of search method, system, terminal device and storage medium for encrypting file
CN110719167A (en) * 2019-10-16 2020-01-21 郑州师范学院 Block chain-based signcryption method with timeliness
CN111541678A (en) * 2020-04-17 2020-08-14 上海朝夕网络技术有限公司 Block chain-based proxy re-encryption method, system and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248488B (en) * 2013-05-14 2017-04-19 顾纯祥 Identity-based key generation method and identity-based authentication method
KR101628009B1 (en) * 2015-04-20 2016-06-13 주식회사 코인플러그 System for dealing a digital currency with block chain
US10305833B1 (en) * 2017-07-23 2019-05-28 Turing Technology, Inc. Blockchain based email procedures
CN108259169B (en) * 2018-01-09 2021-07-20 北京大学深圳研究生院 File secure sharing method and system based on block chain cloud storage
CN111464494A (en) * 2020-02-26 2020-07-28 北京十安赛恩科技有限公司 E-mail encryption method, first client and block chain system
CN112822255B (en) * 2020-12-31 2023-02-28 平安科技(深圳)有限公司 Block chain-based mail processing method, mail sending end, receiving end and equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6931532B1 (en) * 1999-10-21 2005-08-16 International Business Machines Corporation Selective data encryption using style sheet processing
CN102340455A (en) * 2010-07-16 2012-02-01 汉达精密电子(昆山)有限公司 Transmission method of E-mail encrypted by fingerprint data and receiving method thereof
CN103188271A (en) * 2013-04-19 2013-07-03 国家电网公司 Secure mail client local data storage and identification methods and devices
CN103281312A (en) * 2013-05-10 2013-09-04 金硕澳门离岸商业服务有限公司 Information filtering method
CN103457932A (en) * 2013-08-15 2013-12-18 中电长城网际系统应用有限公司 Data safety storage method and system under cloud computing environment
CN106453612A (en) * 2016-11-10 2017-02-22 华中科技大学 Data storage and sharing system
CN107508806A (en) * 2017-08-11 2017-12-22 北京理工大学 Internet financial electronic data safety system and method based on block chain
CN108038128A (en) * 2017-11-08 2018-05-15 平安科技(深圳)有限公司 A kind of search method, system, terminal device and storage medium for encrypting file
CN110719167A (en) * 2019-10-16 2020-01-21 郑州师范学院 Block chain-based signcryption method with timeliness
CN111541678A (en) * 2020-04-17 2020-08-14 上海朝夕网络技术有限公司 Block chain-based proxy re-encryption method, system and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于区块链的数字资产存证系统设计与实现";张亚伟;《中国优秀硕士学位论文全文数据库 信息科技辑》;20190930;全文 *

Also Published As

Publication number Publication date
WO2022142112A1 (en) 2022-07-07
CN112822255A (en) 2021-05-18

Similar Documents

Publication Publication Date Title
US10595201B2 (en) Secure short message service (SMS) communications
CN112822255B (en) Block chain-based mail processing method, mail sending end, receiving end and equipment
US11233658B2 (en) Digital transaction signing for multiple client devices using secured encrypted private keys
JP4593533B2 (en) System and method for updating keys used for public key cryptography
CN110868301B (en) Identity authentication system and method based on state cryptographic algorithm
CN111010367B (en) Data storage method and device, computer equipment and storage medium
US11546348B2 (en) Data service system
KR20180114182A (en) Secure personal devices using elliptic curve cryptography for secret sharing
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN111294203B (en) Information transmission method
CN111080295A (en) Block chain-based electronic contract processing method and equipment
US20180288018A1 (en) Email attachment security system and method using out-of-band authentication
CN110597836B (en) Information inquiry request response method and device based on block chain network
WO2016122646A1 (en) Systems and methods for providing data security services
JP2022521525A (en) Cryptographic method for validating data
US20220014354A1 (en) Systems, methods and devices for provision of a secret
CN112804217B (en) Block chain technology-based evidence storing method and device
CN112632574A (en) Multi-mechanism data processing method and device based on alliance chain and related equipment
US20140237239A1 (en) Techniques for validating cryptographic applications
Kumar A novel privacy preserving HMAC algorithm based on homomorphic encryption and auditing for cloud
CN110086627B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and time stamp
CN110401535B (en) Digital certificate generation, secure communication and identity authentication method and device
CN115426331B (en) Mail transmission method, mail transmission device, computer equipment and storage medium
US20230353548A1 (en) Hybrid Content Protection Architecture for Email
CN112738008B (en) Information synchronous changing method, device, computer and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40045446

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant