CN113034135A - Block chain-based information processing method, apparatus, device, medium, and product - Google Patents

Block chain-based information processing method, apparatus, device, medium, and product Download PDF

Info

Publication number
CN113034135A
CN113034135A CN202110181162.XA CN202110181162A CN113034135A CN 113034135 A CN113034135 A CN 113034135A CN 202110181162 A CN202110181162 A CN 202110181162A CN 113034135 A CN113034135 A CN 113034135A
Authority
CN
China
Prior art keywords
transaction
information
node
encryption
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110181162.XA
Other languages
Chinese (zh)
Inventor
江洪
苏恒
陈杭
林嘉文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110181162.XA priority Critical patent/CN113034135A/en
Publication of CN113034135A publication Critical patent/CN113034135A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present disclosure provides a block chain-based information processing method, apparatus, device, medium, and product, which can be used in the block chain field and the financial field. The information processing method is executed by any first node in a first block chain network, the any first node is associated with at least one second node in a second block chain network, and the information processing method comprises the following steps: acquiring transaction information sent by the associated second node; encrypting the transaction information by adopting a first preset encryption algorithm to obtain first encryption information; sending the first encryption information to the associated first node so that the second blockchain network performs consensus verification on the transaction indicated by the transaction information based on the first encryption information; generating an anonymous transaction verification message aiming at the transaction information by adopting a second preset encryption algorithm; and broadcasting the anonymous transaction verification message to other first nodes except any first node in the first block chain network so as to perform transaction verification on the transaction indicated by the transaction information.

Description

Block chain-based information processing method, apparatus, device, medium, and product
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to the field of blockchains and the field of finance, and more particularly, to a method, an apparatus, a device, a medium, and a product for processing information based on blockchains.
Background
The block chain technology is a distributed internet database technology, has a plurality of inherent advantages such as decentralization, distrust, non-falsification, autonomy and the like, can establish credible value transfer from a starting point to a point between strange nodes under the condition of not depending on a third-party credible organization, and has the main advantages of obviously reducing the credible cost and improving the interaction efficiency. The block chain does not depend on a specific central node, and each block chain node in the system independently stores data and processes data respectively, so that single-point failure is effectively avoided.
In order to achieve public verification, a global account book of a block chain is public in a network, and under the condition that a trusted digital infrastructure and a unified security standard do not exist, the guarantee level of the block chain is limited, an effective privacy protection scheme is lacked, and the like, so that the problem of on-chain data privacy protection of the block chain is brought. Since each participating node in the blockchain platform is equal and has a global shared account book and data, the data privacy protection of the blockchain platform cannot protect the private data by controlling the access authority. This has severely impacted the use of blockchain technology in government, enterprise, financial, etc. application scenarios with privacy protection requirements.
Disclosure of Invention
In view of the foregoing, the present disclosure provides methods, apparatus, devices, media and products for enabling on-chain data privacy protection for blockchains.
According to a first aspect of the present disclosure, there is provided a blockchain-based information processing method performed by any first node in a first blockchain network, the any first node being associated with at least one second node in a second blockchain network. The information processing method includes: receiving transaction information sent by the associated second node; encrypting the transaction information by adopting a first preset encryption algorithm to obtain first encryption information; sending first encryption information to an associated second node to enable a second blockchain network to carry out consensus verification on a transaction indicated by the transaction information based on the first encryption information; generating an anonymous transaction verification message aiming at the transaction information by adopting a second preset encryption algorithm; and broadcasting the anonymous transaction verification message to other first nodes except any first node in the first block chain network so as to perform transaction verification on the transaction indicated by the transaction information.
A second aspect of the present disclosure provides an information processing method based on a blockchain, the information processing method being performed by any second node in a second blockchain network, the any second node being associated with one first node in a first blockchain network. The information processing method includes: in response to receiving a transaction initiation request, extracting transaction information in the transaction initiation request; sending transaction information to an associated first node; receiving first encryption information sent by an associated first node, wherein the first encryption information is obtained by encrypting transaction information by a first preset encryption algorithm; generating a consensus verification message based on the first encryption information; and broadcasting the consensus verification message to other second nodes except any second node in the second block chain network so as to perform consensus verification on the transaction indicated by the transaction information.
A third aspect of the present disclosure provides a blockchain-based information processing apparatus that is provided at any first node in a first blockchain network, the any first node being associated with at least one second node in a second blockchain network. The information processing apparatus includes: the transaction information acquisition module is used for acquiring the transaction information sent by the associated second node; the first encryption module is used for encrypting the transaction information by adopting a first preset encryption algorithm to obtain first encryption information; the encrypted information sending module is used for sending first encrypted information to the associated second node so that the second blockchain network performs consensus verification on the transaction indicated by the transaction information based on the first encrypted information; the anonymous message generating module is used for generating an anonymous transaction verification message aiming at the transaction information by adopting a second preset encryption algorithm; and the anonymous message broadcasting module is used for broadcasting the anonymous transaction verification message to other first nodes except any first node in the first block chain network so as to perform transaction verification on the transaction shown by the transaction information.
A fourth aspect of the present disclosure provides a blockchain-based information processing apparatus that is provided at any one of second nodes in a second blockchain network, the any one of the second nodes being associated with one of first nodes in a first blockchain network. The information processing apparatus includes: the transaction information extraction module is used for responding to the received transaction initiation request and extracting the transaction information in the transaction initiation request; the transaction information sending module is used for sending transaction information to the associated first node; the encrypted information receiving module is used for receiving first encrypted information sent by a related first node, and the first encrypted information is obtained by encrypting the transaction information through a first preset encryption algorithm; the consensus message generation module is used for generating a consensus verification message based on the first encryption information; and the consensus message broadcasting module is used for broadcasting the consensus verification message to other second nodes except any second node in the second block chain network so as to perform consensus verification on the transaction indicated by the transaction information.
A fifth aspect of the present disclosure provides an electronic device, comprising: one or more processors; a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the above block chain based information processing method.
The sixth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions, which, when executed by a processor, cause the processor to perform the above-mentioned block chain-based information processing method.
A seventh aspect of the present disclosure also provides a computer program product including a computer program, which when executed by a processor implements the above block chain-based information processing method.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, which proceeds with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario diagram of a block chain based information processing method, apparatus, device, medium, and product according to an embodiment of the present disclosure;
fig. 2 schematically shows a flow chart of a block chain based information processing method according to an embodiment of the present disclosure;
fig. 3 schematically shows a flow chart of a block chain based information processing method according to another embodiment of the present disclosure;
FIG. 4 schematically illustrates a schematic diagram of generating an anonymous transaction verification message for transaction information using a second predetermined encryption algorithm, according to an embodiment of the present disclosure;
FIG. 5 schematically illustrates a schematic diagram of generating zero knowledge proof information for transaction information using a zero knowledge proof algorithm, according to an embodiment of the disclosure;
FIG. 6 schematically illustrates a schematic diagram of transaction verification by a first blockchain network according to an embodiment of the present disclosure;
FIG. 7 schematically illustrates a key relationship architecture diagram for encrypting transaction information according to an embodiment of the disclosure;
fig. 8 schematically illustrates a structural architecture diagram of any first node in a first blockchain network according to an embodiment of the present disclosure;
fig. 9 schematically illustrates a schematic diagram of data interaction between a first blockchain network and a second blockchain network during a transaction according to an embodiment of the disclosure;
fig. 10 schematically illustrates a functional block diagram of any first node in a first blockchain network according to an embodiment of the present disclosure;
fig. 11 schematically shows a block diagram of a block chain-based information processing apparatus according to an embodiment of the present disclosure;
fig. 12 is a block diagram schematically illustrating a structure of a block chain-based information processing apparatus according to another embodiment of the present disclosure; and
fig. 13 schematically shows a block diagram of an electronic device adapted to implement a blockchain-based information processing method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
The embodiment of the disclosure provides an information processing method based on a block chain, which is executed by any first node in a first block chain network, wherein any first node is associated with at least one second node in a second block chain network, and the information processing method comprises an encryption process, an information sending process, a message generation process and a message broadcasting process. In the encryption process, any one first node acquires the transaction information sent by the associated second node, and encrypts the transaction information by adopting a first preset encryption algorithm to obtain first encryption information. In the information sending process, the any first node sends first encryption information to the associated first node, so that the second blockchain network performs consensus verification on the transaction indicated by the transaction information based on the first encryption information. In the message generating process, any one first node generates an anonymous transaction verification message aiming at the transaction information by adopting a second preset encryption algorithm. In the message broadcasting process, the first node broadcasts anonymous transaction verification messages to other first nodes in the first block chain network so as to perform transaction verification on transactions indicated by the transaction information.
An application scenario of the method and apparatus provided by the present disclosure will be described below with reference to fig. 1.
Fig. 1 schematically illustrates an application scenario diagram of a block chain based information processing method, apparatus, device, medium, and product according to an embodiment of the present disclosure.
As shown in FIG. 1, the application scenario 100 of this embodiment may include one or more servers 111-113, a first blockchain network 120 and a second blockchain network 130.
The first block chain network 120 is provided with a plurality of first nodes 121 to 123, and the second block chain network 130 is provided with a plurality of second nodes 131 to 133. One second node corresponds uniquely to one first node, and one first node may correspond uniquely to the first second node or may correspond to a plurality of second nodes. Each of the one or more servers 111-113 can be communicatively coupled to one or more second nodes in the second blockchain network 130 to initiate a transaction request to the communicatively coupled one or more second nodes. The first nodes 121-123 are in communication connection with each other to realize transaction verification of the transaction request. The plurality of second nodes 131-133 are communicatively coupled to each other to enable consensus verification of the transaction request. The first node is in communication connection with the corresponding second node to realize information transmission.
For example, the server may be a server resource owned by an organization and organization participating in the blockchain transaction, and the server may invoke an interface service provided externally by an application layer of a second node in the second blockchain network in the process of interfacing with the second blockchain network, and initiate a transaction request to the second node in the second blockchain network 130. The call interface service may be implemented, for example, by calling a state transfer style representative api (restful api) or software program development kit (SDK) provided by the second node. In an actual application deployment process, according to a difference in the form of the blockchain, the second node in the second blockchain network may also play a role of a server, that is, the second node calls an interface service provided by the second blockchain network application where the second node is located.
Illustratively, the second node in the second blockchain network mainly refers to a node participating in consensus, i.e., a consensus node. The consensus node can completely participate in the transaction process, which generally includes receiving a transaction request, executing a transaction, broadcasting the transaction, performing a transaction consensus, verifying the transaction, and performing an uplink transaction. In this embodiment, the second node is mainly responsible for receiving and executing the transaction request, broadcasting the transaction request in the second blockchain network, and performing consensus verification on the transaction requests broadcast by other second nodes to determine whether the transaction is the same transaction, and packaging the transaction information passing the verification as a block to be added to the blockchain.
Illustratively, in general, a first node in a first blockchain network corresponds to a second node one to one. In the process that a second node in a second blockchain network carries out transaction in response to a transaction request, on one hand, the corresponding first node can provide data privacy protection capability and privacy data verification capability for the second node, and on the other hand, related data on the second node chain can be stored in a specific mode, so that when the second node is abnormal and recovered, data recovery is carried out through the data stored in the first node. For example, a first node may perform transaction propagation and consensus verification operations during an anonymous transaction and provide the results of the transaction verification to a corresponding second node. Each second node in the second blockchain network may perform anonymous transactions in the same way as normal transactions.
In one embodiment, as illustrated in fig. 1, the application scenario 100 may further include a firewall 140 and a router 150. When the server initiates a transaction request, the transaction request may be white list filtered by the firewall 140, and then load balanced by the router 150 after the filtering is passed, so as to be routed to any second node in the second blockchain network 130. Any of the second nodes is configured to respond to and process the transaction request.
In one embodiment, as shown in fig. 1, the application scenario 100 may further provide a database server 160 storing data, and the database server 160 may include one or more servers (e.g., including a server 161 and a server 162). The first node and the second node may access the database server 160, for example, over a network. For example, the first node and the second node may archive data on the chain in database server 160, e.g., after processing a new transaction or on a regular basis. Through the arrangement of the database server 160, the integrity and the availability of data can be ensured, the consumption of disks in the first node and the second node is reduced, and the utilization rate of disk resources is improved.
It should be noted that the information processing method based on the blockchain provided by the present disclosure may be executed in part by a first node in a first blockchain network and in part by a second node in a second blockchain network, for example. Accordingly, the information processing apparatus based on the blockchain provided by the present disclosure may be partially disposed in a first node in a first blockchain network and partially disposed in a second node in a second blockchain network.
It is understood that the numbers and types of servers 111-113, first blockchain network 120, second blockchain network 130, firewall 140, router 150, and database server 160 depicted in fig. 1 are by way of example only to facilitate an understanding of the present disclosure. There may be any number and type of servers 111-113, first blockchain network 120, second blockchain network 130, firewall 140, router 150, and database server 160, depending on the actual needs.
The block chain based information processing method performed by the first node in the first block chain network of the disclosed embodiment will be described in detail below with reference to fig. 2 based on the scenario described in fig. 1.
Fig. 2 schematically shows a flowchart of a block chain based information processing method according to an embodiment of the present disclosure.
As shown in fig. 2, the block chain-based information processing method 200 of this embodiment may include operations S210 to S250. The information processing method 200 may be performed, for example, by any first node in a first blockchain network that is associated with at least one second node in a second blockchain network.
In operation S210, transaction information transmitted by an associated second node is received.
The transaction information may be extracted from the received transaction request, for example, by the associated second node based on an agreement with the first node. The received transaction information may include, for example, identification information of the transaction initiator and the transaction recipient, amount of transaction resources, and other privacy data that needs to be protected in the transaction request. The received transaction information is in a plaintext form, so that the first node can store the private data to the local, and the second node can recover the data according to the data stored in the first node after the second node generates an exception and recovers the exception.
In one embodiment, the associated second node may send the transaction information via the SDK provided by any of the first nodes. For example, any first node may be provided with a Software Development Kit (SDK) and an associated second node communicates with the any first node by invoking the SDK to send transaction information to the any first node.
In operation S220, the transaction information is encrypted using a first predetermined encryption algorithm to obtain first encrypted information.
Illustratively, the first predetermined encryption algorithm may be, for example, a hash algorithm or a homomorphic encryption algorithm, so as to ensure that the encrypted first encryption information is not easy to crack, and ensure the security of the transaction information. And when the first preset encryption algorithm is a hash algorithm, the obtained first encryption information is a hash field. And when the first preset encryption algorithm is a homomorphic encryption algorithm, the obtained first encryption information is ciphertext data.
For example, in the case that the transaction information is plaintext and includes more information, the embodiment may extract information of a specific field from the transaction information and encrypt the information of the specific field.
In an embodiment, after the transaction information is received, for example, information of a specific field in plain text may be extracted, and the information of the specific field is packaged into information of a predetermined data structure and then stored and cached.
In an embodiment, the first predetermined encryption algorithm may be implemented based on a cryptographic algorithm, for example. For example, when the first predetermined encryption algorithm is a homomorphic encryption algorithm, a combination of the SM2 algorithm (elliptic curve public key cryptography algorithm released by the national cryptology authority on 12.17.2010) and the ElGamal (ElGamal) algorithm may be employed. The ElGamal algorithm is an asymmetric encryption algorithm based on Diffie-Hellman key exchange. When the first predetermined encryption algorithm is a hash algorithm, the SM3 algorithm (a cryptographic hash function standard issued by the national crypto authority on 12/17/2010) may be used. By realizing the first preset encryption algorithm based on the national encryption algorithm, the uncontrollable security factor of the encryption algorithm can be avoided, and the operation stability of the information processing method provided by the disclosure can be improved.
In operation S230, the first encryption information is sent to the associated second node, so that the second blockchain network performs consensus verification on the transaction indicated by the transaction information based on the first encryption information.
According to the embodiment of the present disclosure, after receiving the first encryption information, the associated second node may broadcast the consensus verification message to other second nodes in the second blockchain system, for example, by using the first encryption information as message information in the consensus verification message, so as to perform the consensus verification. The any first node may responsively return the encrypted hash field or ciphertext data to the associated second node, e.g., via the SDK. The consensus verification may be used to verify the integrity of the transaction, via which it may be determined whether the transaction indicated by the transaction information is a duplicate transaction or whether the consensus verification has timed out, etc.
In an embodiment, while sending the hash field or the ciphertext data to the associated second node, any first node may also store the hash field or the ciphertext data in its own ledger, for example.
In operation S240, an anonymous transaction verification message for the transaction information is generated using a second predetermined encryption algorithm.
According to an embodiment of the present disclosure, the second predetermined encryption algorithm may comprise, for example, a homomorphic encryption algorithm or a zero knowledge proof of knowledge algorithm, or the like. It is understood that the second predetermined encryption algorithm is not limited in the present disclosure, as long as the identity information of both parties of the transaction in the transaction information can be hidden after the processing by the second predetermined encryption algorithm.
For example, if the second predetermined encryption algorithm is a homomorphic encryption algorithm, the anonymous transaction verification message may include ciphertext data generated after processing by the homomorphic encryption algorithm. If the second predetermined encryption algorithm is a zero knowledge proof algorithm, the anonymous transaction verification message may include a transaction proof generated by the zero knowledge proof algorithm.
In operation S250, the anonymous transaction verification packet is broadcast to other first nodes except any first node in the first blockchain network, so as to perform transaction verification on the transaction indicated by the transaction information.
After generating the anonymous transaction verification message, the transaction verification message may be broadcast to other first nodes in the first blockchain network. After receiving the anonymous transaction verification message, the other first nodes can verify the transaction indicated by the transaction information so as to verify whether the two parties of the transaction are reasonable, whether the transaction is illegal, and the like. After the transaction is verified, the second node corresponding to the two transaction parties in the second block chain network can process the transaction according to the transaction information to complete the transaction.
According to the embodiment of the disclosure, when performing transaction verification on a transaction indicated by transaction information, for example, a predetermined consensus mechanism may be adopted to implement, and in the process of verifying the consensus mechanism, whether the transaction is correct may be determined according to ciphertext data or a transaction certificate encapsulated in an anonymous transaction verification message. By the mode, verification can be completed without decrypting ciphertext data and a transaction certificate in the transaction verification process, so that the transaction information can be prevented from being disclosed, and the privacy protection of the transaction information is ensured.
According to the embodiment of the disclosure, the first node associated with the second node is adopted to generate the anonymous transaction verification message, and the transaction verification is carried out, so that the protection of privacy such as identity information of both parties of the transaction can be realized. Furthermore, the related first node encrypts the transaction information and returns the encrypted transaction information to the second node, so that the second node does not need to provide plaintext data to other nodes when performing consensus verification, and privacy protection of the transaction information and the like can be realized. Therefore, the method of the embodiment of the disclosure can realize dual protection of identity privacy and data privacy on the chain.
According to embodiments of the present disclosure, any first node may be provided with, for example, a software development kit. Similarly, a second node in the second blockchain network may communicate with an associated first node by invoking a software development kit during which the first node communicates with the associated second node. By providing the software development kit for communication, high aggregation and low coupling between the first blockchain network and the second blockchain network can be achieved, and compared with the technical scheme that the privacy protection logic is arranged in the second node serving as the consensus node, the invasion of the privacy protection logic to the first blockchain network can be reduced. In an embodiment, the first node in the first blockchain system may be further constructed, for example, by using a micro-service architecture, so as to implement pluggable setting of the privacy protection logic in the first node, and implement flexible deployment of the privacy protection logic.
According to an embodiment of the present disclosure, after the transaction is verified, the blockchain-based information processing method 200 may, for example, send verification-passing information to the associated second node, so that the associated second node packages the first transaction information as blocks and stores the blocks onto the blockchain, that is, performs an uplink operation on the transaction information.
Illustratively, the first node may actively transmit when transmitting the verification-passed information. Alternatively, an anonymous transaction verification request may be initiated by the associated second node, and the authentication pass information is sent by any of the first nodes in response to the transaction verification request.
A detailed description of the information processing method based on the blockchain executed by the second node in the second blockchain network will be provided by fig. 3 in conjunction with fig. 1.
Fig. 3 schematically shows a flowchart of a block chain based information processing method according to another embodiment of the present disclosure.
As shown in fig. 3, the block chain-based information processing method 300 of this embodiment may include operations S310 to S350. The information processing method 300 may be performed, for example, by any second node in the second blockchain network that is associated with a first node in the first blockchain network.
In operation S310, in response to receiving a transaction initiation request, transaction information in the transaction initiation request is extracted.
In accordance with embodiments of the present disclosure, a transaction initiation request may be initiated by any institution or organization participating in a blockchain transaction via its own server resources and sent to any second node in communication with its own server resources. The transaction initiation request may be, for example, a transfer request, a foreign exchange request, or the like.
According to the embodiment of the disclosure, after a transaction initiation request is received, the plaintext data in the transaction initiation request can be analyzed and identified, and transaction information is extracted from a predetermined position. The transaction information may include, for example, identification information of the transaction initiator and the transaction recipient, amount of transaction resources, and other private data that needs to be protected in the transaction request. The transaction information may be configured according to a function provided by the first blockchain network, which is not limited by this disclosure.
In operation S320, transaction information is transmitted to the associated first node. The second node may upload the transaction information by invoking the SDK provided by the associated first node to send the transaction information to the first node.
In operation S330, first encryption information transmitted by an associated first node is received, and the first encryption information is obtained by encrypting transaction information by a first predetermined encryption algorithm. The first encryption information is obtained by encrypting through the first predetermined encryption algorithm described above, and is not described herein again.
In operation S340, a consensus verification message is generated based on the first encryption information.
In operation S350, the consensus verification packet is broadcast to other second nodes except any second node in the second blockchain network, so as to perform consensus verification on the transaction indicated by the transaction information.
According to the embodiment of the disclosure, after the first encryption information is received, the first encryption information and other information except the transaction information in the transaction initiation request can be encapsulated to obtain the consensus verification message. After the consensus verification message is obtained, the consensus verification message may be broadcasted to a specific second node or to second nodes of the entire network in the second blockchain network according to a consensus mechanism configured in the second blockchain network.
After other second nodes receive the consensus verification message, the first encryption information in the consensus verification message can be extracted for consensus according to the configured consensus mechanism, and whether the transaction is a repeated transaction or whether the transaction is overtime is determined.
It is to be understood that, the above methods for generating, broadcasting, and performing consensus can adopt any method in the related art, and the disclosure is not limited thereto.
According to the embodiment of the disclosure, after passing the consensus verification, the information processing method based on the blockchain executed by the second node may also send an anonymous transaction verification request to the associated first node, for example, to verify the transaction by the associated second node, to confirm whether both parties of the transaction are reasonable, whether the transaction is an illegal transaction, and the like. Accordingly, after receiving the anonymous transaction verification request, the associated first node may first determine whether the anonymous transaction verification packet has been generated by the method described above, and complete the transaction verification. And if the transaction verification is completed, sending verification passing information to the second node. Similarly, an anonymous transaction verification request is also sent to the associated first node after the other second nodes in the second blockchain network complete consensus verification. And after the first nodes associated with other second nodes complete the transaction verification, sending verification passing information to the other second nodes.
For example, the any second node may, in response to receiving the verification pass message, pack the previously received first encryption information into blocks for storage on the block chain. After receiving the verification passing information, the other second nodes may pack the first encryption information in the received consensus verification message into blocks and store the blocks onto the local block chain.
According to the embodiment of the disclosure, the second nodes only perform consensus verification, and the associated first nodes complete transaction verification, so that the invasion to the second nodes can be reduced while the plaintext is not required to be linked.
Fig. 4 schematically illustrates a schematic diagram of generating an anonymous transaction verification message for transaction information using a second predetermined encryption algorithm, according to an embodiment of the disclosure.
According to an embodiment of the present disclosure, when generating an anonymous transaction verification message, the embodiment 400 may encrypt the anonymous transaction verification message according to a private key of the temporary key pair, and add a public key summarized by the temporary key pair to the anonymous transaction verification message. Therefore, the risk that data such as the identity information of both transaction parties encrypted in the existing anonymous transaction verification message and the like are cracked by other first nodes by adopting the fixed key is avoided.
Illustratively, as shown in fig. 4, this embodiment may first generate a temporary key pair 410 using a random number generation mechanism. An encryption key 430 is then generated using elliptic curve cryptography based on the private key in the ephemeral key pair 410 (i.e., ephemeral private key 411) and the unique public key 420. The unique public key may be, for example, a public key of a key pair unique to the first node to which the sender of the transaction corresponds, the unique key pair being private information with respect to the other first nodes. An integrated encryption Scheme (ECIES) may generate encryption key 430 and a MAC key based on the unique public key 420 and the ephemeral private key. The encryption key 430 is used to encrypt the transaction information 440 as plaintext resulting in second encrypted information 450. The first node corresponding to the transaction receiver may decrypt the second encrypted information 450 according to the unique private key after the transaction verification is passed, so as to complete the transaction. In order to ensure privacy of the transaction, when encrypting the transaction information, the encryption key 430 needs to encrypt at least transaction sensitive information such as resource amount of the transaction.
Illustratively, in generating the anonymous transaction verification message, the transaction information may also be encrypted using a second predetermined encryption algorithm 460, resulting in third encryption information 470. This third encryption information 470 may be used, for example, as a basis for transaction verification. When the transaction information is encrypted by using the second predetermined encryption algorithm 460, for example, all transaction information may be encrypted, or part of the transaction information may be encrypted according to a predetermined rule, and the part of the transaction information may include, for example, identity information of both parties of the transaction.
Illustratively, after obtaining the second encryption information 450 and the third encryption information 470, the public key (i.e., the temporary public key 412) of the second encryption information 450, the third encryption information 470 and the temporary key pair 410 may be packaged as a message, resulting in the anonymous transaction verification message 480. Therefore, after the anonymous transaction verification message is received by other first nodes, transaction verification can be performed according to the third encryption information 470. After the first node corresponding to the transaction receiver determines that the transaction verification passes, the second encrypted information 450 may be decrypted according to the temporary public key 412 and the unique private key in the anonymous transaction verification message, so as to obtain sensitive information such as the resource amount of the transaction.
According to the embodiment of the present disclosure, in generating the temporary key pair, the temporary key pair may be generated, for example, by using an asymmetric key algorithm in a cryptographic algorithm. Thereby, the uncontrollable safety privacy of the cryptographic algorithm is avoided. For example, SM2 may be employed to generate a temporary key pair.
According to the embodiment of the disclosure, the first node may be constructed with an independent key system based on, for example, the cryptographic algorithms SM2, SM3, etc. in combination with the ECIES, etc., and the key system can ensure that the key has randomness during use, so as to hide the identity information of both parties of the transaction in the transaction information.
According to an embodiment of the present disclosure, after generating the MAC key, for example, a tag of the second encrypted information may be generated using the MAC key, and the second encrypted information may be signed according to the tag.
According to an embodiment of the present disclosure, the second predetermined algorithm may comprise, for example, a homomorphic encryption algorithm. The homomorphic encryption algorithm may support homomorphic addition, for example. A homomorphic encryption algorithm may be used to homomorphically encrypt the amount of resources transacted (e.g., the amount of a check) and the amount of resources corresponding to the indicia of the transaction (e.g., the amount of money corresponding to the indicia of a check). Thus, after the anonymous transaction verification message is received by other first nodes, for example, the amount of the check in the third encrypted information may be compared with the amount corresponding to the check mark, and if the two are consistent, the transaction is determined to be correct, and the transaction verification is completed.
In an embodiment, the second predetermined algorithm may be implemented based on a cryptographic algorithm, for example. For example, the homomorphic encryption algorithm may be based on the SM2 algorithm and implemented using the ElGamal algorithm. Thereby, the uncontrollable safety factor of the cryptographic algorithm is avoided.
In one embodiment, the resource hash value and the resource tag hash value for the transaction indicated by the transaction information may be encrypted simultaneously. The third encrypted information obtained by encryption comprises the resource hash value and the resource mark hash value of the transaction indicated by the transaction information, so that other first nodes can compare the resource hash value with the global resource hash value list conveniently, and compare the resource mark hash value with the global resource mark hash value, thereby completing transaction verification.
According to an embodiment of the present disclosure, the second predetermined algorithm may comprise, for example, a zero knowledge proof of knowledge algorithm. The principle of encrypting transaction information using the zero-knowledge proof algorithm will be described below with reference to fig. 5.
Fig. 5 schematically illustrates a schematic diagram of generating zero knowledge proof information for transaction information using a zero knowledge proof algorithm according to an embodiment of the disclosure.
As shown in fig. 5, when the transaction information is encrypted by using the zero-knowledge proof algorithm, the operation flow 500 may include an operation S501 of verifying logic, an operation S502 of equivalence transformation, and an operation S503 of generating parameters. Finally, the generated problem to be proved is used as zero knowledge evidence information as third encryption information, and is added into the anonymous transaction verification message and sent to the whole network, and the operation S504 of generating the transaction and the operation S505 of verifying the whole network are completed. The zero Knowledge proof algorithm can be implemented based on a zero Knowledge concise Non-interactive proof of Knowledge (zk-SNARK) technology.
First, in operation S501, the problem to be verified in the verification transaction may be broken down into individual logical verification steps, and these steps may be broken down into an arithmetic circuit composed of addition, subtraction, multiplication, and division. Subsequently, in operation S502, the arithmetic circuit is first converted into a first-order constraint system (R1CS), which is a mathematical conversion process, and thus the conversion is equivalent. R1CS is then converted to a polynomial to convert the problem to be proven to a Quadratic Assignment Problem (QAP).
After the QAP is obtained by the conversion, a resource hash value and a resource stamp hash value of the transaction indicated by the transaction information may be generated according to the transaction information in operation S503. Specifically, a hash algorithm may be used to calculate the hash value of the resource amount in the transaction information and the hash value of the resource mark uniquely corresponding to the resource amount in the transaction information. Subsequently, the resource hash value and the resource tag hash value are used as input for generating a transaction proof (i.e. zero Knowledge proof information), and the transaction proof is generated by using techniques such as homomorphic hiding, Coefficient Knowledge Assumption (KCA), and the like. The generated transaction credential is the third encrypted information. The third encryption information is added into the message packaged with the temporary public key and the second encryption information, so that an anonymous transaction verification message can be obtained and broadcasted, and the transaction is verified by a first node or a specific first node of the whole network in the first block chain network.
By the method, the transaction information (such as resources and resource marks) is used as input to generate the transaction certificate by adopting the zero-knowledge certificate algorithm, so that the verification of the transaction validity can be completed by other first nodes on the premise that specific transaction details and information of a transaction party are not disclosed.
According to the embodiment of the disclosure, when other first nodes are verification nodes, the transaction validity verification can be performed according to the third transaction information in the received anonymous transaction verification message. When the other first nodes are corresponding to the transaction receiver, for example, the second encrypted information needs to be decrypted after the transaction verification is completed, and the clear text information of the transaction is obtained by using the second encrypted information to process the transaction.
The operation principle of each first node in the first blockchain network in performing transaction verification will be described in detail with reference to fig. 6.
Fig. 6 schematically illustrates a schematic diagram of transaction verification by a first blockchain network according to an embodiment of the disclosure.
As shown in fig. 6, as any of the first nodes corresponding to the transaction initiator, the flow described in fig. 4 may be adopted to generate an anonymous transaction verification message. The detailed description is as follows.
In operation S601, the first node corresponding to the transaction initiator first obtains the temporary key pair tempsk/temppk, and generates the symmetric key enc 603 for encrypting the transmission packet by using the integrated encryption scheme with the transfer key ptk 601 and the temporary private key tempsk 602.
In operation S602, the first node corresponding to the transaction initiator may encrypt plaintext information (plain 604) by using the key enc 603, use the second encrypted information (encrypted 605) generated by encryption as a specific field of the to-be-transmitted packet, and put the temporary public key temppk 606 and the hash value (hash 607) of the plaintext information into the to-be-transmitted packet at the same time, so as to obtain an anonymous transaction verification packet. After the anonymous transaction verification message is subjected to transaction signature, the first node corresponding to the transaction initiator may broadcast the signed anonymous transaction verification message to other first nodes in the first block chain network. Wherein, after broadcasting the anonymous transaction verification message, the first node corresponding to the transaction initiator may send the unique private key itk 608 of the unique key pair to the first node corresponding to the transaction recipient.
In operation S603, after receiving the anonymous transaction verification packet, the first node corresponding to the transaction verifier and the first node corresponding to the transaction receiver may extract a hash value (hash 607) of plaintext information from the anonymous transaction verification packet, and perform consensus verification according to the hash.
In operation S604, for the first node corresponding to the receiving party, in addition to verifying the transaction, a temporary public key temppk 606 may be extracted from the anonymous transaction verification message. The encryption key enc 603 described above is then generated using an integrated encryption scheme based on the received unique private key itk 608 and the temporary public key temppk 606.
In operation S605, after obtaining the encryption key enc 603, the first node corresponding to the receiving party may decrypt the second encrypted information (encrypted 605) in the anonymous transaction verification message, so as to obtain the plaintext information (plain 604), so as to complete the transaction according to the plaintext information. After the plaintext information is obtained, the decrypted plaintext information can be subjected to deserialization, and the information obtained through deserialization is stored locally.
The logical relationship of the keys used in the first predetermined algorithm and the second predetermined algorithm in the foregoing description will be described below with reference to fig. 7.
Fig. 7 schematically illustrates a key relationship architecture diagram for encrypting transaction information according to an embodiment of the disclosure.
As shown in FIG. 7, the unique private key itk used in the previous description may be derived from apk and nk using the HMAC mechanism. The HMAC is a mechanism for performing message authentication by using a hash function in cryptography, and the message authentication provided by the HMAC includes message integrity authentication and source identity authentication. apk is a public key mapped by auk on the elliptic curve corresponding to the SM2, auk is a key derived by the SM3 algorithm, and uk is a transaction key corresponding to the transaction indicated by the transaction information. nk is nfk a key derived by the SM3 algorithm for generating a resource token. nfk is a key derived by the SM3 algorithm from uk.
As shown in fig. 7, the temporary public key temppk and the temporary private key tempsk may be randomly generated by the random number generation source rand. The encryption key enc may be generated from the temporary public key temppk and the unique private key itk, or may be generated from the temporary private key tempsk and the unique public key ptk. The unique public key ptk is a key used for online confidential transaction transmission. When generating the encryption key enc, a shared key may be generated according to the unique public key ptk and the temporary private key tempsk, and then an SM4 algorithm (packet data algorithm of the wlan standard defined by the national crypto authority) may be used to generate the encryption key, so as to encrypt the transaction information.
In order to protect the identity information of the user, for example, the asymmetric public key addrPub may be used to encrypt the account information in the identity information of both parties of the transaction. addrKey is an asymmetric private key paired with addrPub. The asymmetric public key addrPub may be used to generate a user account address (i.e., encrypted information from encrypting account information).
To sign a transaction, embodiments of the present disclosure may also be provided with a temporary signing key signKey. And simultaneously, providing a key signPub matched with the signKey for verifying the transaction signature.
The structure of the first node will be described below in conjunction with fig. 8 to facilitate a better understanding of the principles of the first node performing transaction verification.
Fig. 8 schematically shows a structural architecture diagram of any first node in the first blockchain network according to an embodiment of the present disclosure.
As shown in fig. 8, in this embodiment, any first node 800 in the first blockchain network may be provided with an interface layer 810, a data storage layer 820, a core algorithm layer 830 and a cryptographic algorithm layer 840.
The interface layer 810 relates to applications of the GRPC protocol and the HTTP/HTTPS protocol. The interface layer 810 is responsible for receiving a transaction initiation request sent by a server corresponding to a transaction participant, processing a received request message, and assembling the received request message to obtain a message to be transmitted.
The data storage layer 820 supports three types of database architectures, namely rocksdb, sqlite and mysql, and is used for storing transaction information, on-chain data, first encryption information and the like. In one embodiment, the data store layer may maintain account information for the node, a network-wide user routing address, a hash list of network-wide unconsumed resources, a hash list of network-wide resource tags. The user routing address mainly reserves the virtual ip address of all users in the network, and the virtual ip address can be generated by adopting the asymmetric public key addrPub described above, so that the transaction verification message and the like can be conveniently broadcast. The hash list of network-wide unconsumed resources and the hash list of network-wide resource tags can be used as the basis for transaction verification.
The core algorithm layer 830 integrates ECIES, zk-SNARK and ElGamal algorithms to provide homomorphic encryption, zero-knowledge proof, and plaintext encryption.
The cryptographic algorithm layer 840 mainly integrates algorithms such as Elliptic Curve mathematics-based public key Cryptography (ECC), SHA256, national key SM2, national key SM3, and national key SM4 to provide cryptographic algorithms to the core algorithm layer.
The interaction between a first node and an associated second node during a transaction process will be described with respect to fig. 9 in conjunction with the structure of fig. 8 to provide a thorough understanding of the transaction process.
Fig. 9 schematically illustrates a schematic diagram of data interaction between a first blockchain network and a second blockchain network during a transaction according to an embodiment of the disclosure.
As shown in fig. 9, the transaction flow generally includes transaction generation, transaction propagation, transaction consensus, transaction verification, and transaction uplink. And a second node in the second block chain network is provided with an intelligent contract layer and an information verification layer, and a global account book is maintained.
During the transaction, the second node may receive the transaction initiation request first, and before performing the anonymous transaction, the second node may perform operation S901 to send the required transaction information to the first node according to the SDK provided by the associated first node. For example, the transaction information in the received transaction initiation request may be assembled and sent to the interface layer of the first node in the clear text.
After receiving the transaction information, the first node may perform operation S902, and assemble the fields in the transaction information in the plaintext form into data of a data structure specified by the first node, and then store or cache the data. Then, operation S903 is executed to perform hash processing on the assembled data to obtain a hash value, or perform encryption by using a homomorphic encryption algorithm to obtain encrypted ciphertext data. And then, the obtained hash value or ciphertext data is used as first encryption information to be returned to the second node through the interface layer.
After receiving the hash value or the ciphertext data, the second node performs operation S904, places the hash value or the ciphertext data in a request message to be consensus-broadcasted, and sends a consensus verification message to a specific second node or all second nodes in the second block chain network according to a configured consensus mechanism, so as to perform consensus verification.
After the first node sends the hash value or the ciphertext data, operation S905 is performed, and an anonymous transaction verification packet is generated by using the method described above, where the anonymous transaction verification packet generally includes the ciphertext data generated after the homomorphic encryption algorithm processing or a transaction certificate generated by a zero-knowledge certification algorithm. And then broadcasting the generated anonymous transaction verification message to other first nodes.
After receiving the consensus verification message, the other second node may extract a hash value or ciphertext data from the consensus verification message, and perform operation S906, where the hash value or ciphertext data is sent to the associated first node via the SDK provided by the associated first node, so as to initiate an anonymous transaction verification request to the associated first node.
After receiving the anonymous transaction verification request sent by the associated second node, the first node may first check whether an anonymous transaction verification packet has been received, and complete the transaction verification. If the transaction verification is completed and the verification is passed, operation S907 is executed to send verification pass information to the associated second node. If the transaction verification is not completed, operation S907 is executed after the transaction verification is completed.
After the second node receives the verification pass message, operation S908 may be performed to uplink the obtained hash value or ciphertext data and store the uplink hash value or ciphertext data in the uplink ledger.
The architecture of each functional module in the first node in the first blockchain network will be described in detail below with reference to fig. 10.
Fig. 10 schematically shows a functional block diagram of any first node in a first blockchain network according to an embodiment of the present disclosure.
As shown in fig. 10, the first node 1000 may include, for example, a generic module 1010, an identity information protection module 1020, and a data privacy protection module 1030.
The generic module 1010 includes a key system sub-module 1011, a data storage sub-module 1012, and a signature verification sub-module 1013.
The key system sub-module 1011 is primarily used to derive a key used in the transaction process using ECIES based on the unique private key and a temporary key generated using the SM2 algorithm, which may be, for example, the encryption key described above.
The data storage sub-module 1012 is configured to maintain the account information of the node, the user routing address of the entire network, the hash list of the unconsumed resources of the entire network, and the hash list of the label of the resources of the entire network, which are described above. The data storage sub-module 1012 may act as the data storage layer as described previously.
The signature and signature verification sub-module 1013 is configured to perform transaction signature on the anonymous transaction verification message. In each transaction, the key used in the transaction signing may be, for example, a temporarily generated key, and the key is not persisted.
The identity information protection module 1020 includes an account sub-module 1021 and an anonymous transaction sub-module 1022.
The account submodule 1021 is configured to implement conversion between Transaction information in an account/balance mode and Transaction information in a UTXO (Unspent Transaction Output) mode, and mainly performs conversion in two scenarios. In a scenario of transmitting transaction information, the account sub-module 1021 is configured to convert the transaction information in the account/balance mode into transaction information represented in the UTXO mode, and store the transaction information in the UTXO mode in the data storage sub-module. In a scenario where the participating party queries account information, the account sub-module 1021 may be configured to convert the transaction information represented by the UTXO mode into transaction information in an account/balance mode, and meanwhile, after summarizing the historical transaction information of the account, feed the summarized information back to the participating party in a plaintext form.
The anonymous trading sub-module 1022 is used to hide the identity information of the two parties in the trade. For example, the anonymous transaction submodule 1022 may randomly generate a key pair during each transaction using the key system submodule 1011, and then sign the transaction so that the fixed public key is not exposed, thereby hiding the identity of the initiator of the transaction. The anonymous transaction submodule 1022 may encrypt the transaction, and reserve the resource hash value and the resource tag hash value generated by the transaction, and through a specific algorithm, only the receiving party can decrypt and completely receive the resource information generated in the transaction, and other nodes only receive the hash value in the message and cannot decrypt the transaction information, and in the process of consensus verification, only the resource hash value and the resource tag hash value participate in consensus, so as to hide the identity information of the transaction receiving party. In addition, a random number mechanism is added in the key system, so that the accounts corresponding to the resources are different in each transaction process, and the information of a transaction receiver is further hidden.
The data privacy protection module 1030 includes a homomorphic encryption sub-module 1031, a zero knowledge proof sub-module 1032, and a data encryption sub-module 1033.
The homomorphic encryption sub-module 1031 is a component that provides homomorphic encryption function in the transaction process. The homomorphic encryption sub-module 1031 supports homomorphic addition, is mainly based on the SM2 algorithm, and applies the ElGamal algorithm to perform homomorphic encryption. The homomorphic encryption sub-module 1031 may be used in the transaction verification process, the first node corresponding to the transaction initiator performs homomorphic encryption on the specific resource amount and the resource amount in the resource mark, and the first node corresponding to the transaction verifier determines the correctness of the transaction by verifying whether the specific resource amount and the resource amount in the resource mark are consistent.
The zero knowledge proof sub-module 1032 is a core algorithmic component that provides proof of the transaction, the zero knowledge proof sub-module 1032 enabling the transaction initiator to convince the verifier that the current transaction is legitimate without providing any useful information to the verifier.
The data encryption sub-module 1033 encrypts and transmits the transaction based on the key and the encryption algorithm provided by the key system sub-module 1011, and sends a specific decryption key to the first node corresponding to the transaction receiver, and after the first node corresponding to the transaction receiver agrees with the transaction, the first node decrypts the transaction information by using the decryption key, and updates the data in its local data storage sub-module.
According to the method and the device, through the framework of the first node and the interaction between the first node and the second node, the transaction information can be collected in the whole transaction process and transmitted and stored in a ciphertext mode, and privacy protection of the identity information can be achieved through technical means such as homomorphic encryption and zero knowledge proof. Furthermore, the password system is constructed by combining the national password algorithm, so that the uncontrollable safety factor of the password algorithm can be avoided. Finally, the first node adopts a one-to-one distributed deployment scheme with the second node, so that the transaction conversion, the anonymous key pair generation and the transaction data encryption and decryption in the operation process of the block chain can be independently completed by the first node, and the second node only needs to exchange data through a corresponding SDK, so that the invasion of the first node to the second node can be reduced, and the flexible access of the anonymous transaction function is realized.
Fig. 11 schematically shows a block diagram of a block chain-based information processing apparatus according to an embodiment of the present disclosure.
As shown in fig. 11, the block chain based information processing apparatus 1100 of this embodiment may be provided at any one of the first nodes in the first block chain network. Any first node is associated with at least one second node in the second blockchain network. The blockchain-based information processing apparatus 1100 may include a transaction information acquisition module 1110, a first encryption module 1120, an encrypted information transmission module 1130, an anonymous message generation module 1140, and an anonymous message broadcasting module 1150.
The transaction information obtaining module 1110 is configured to obtain the transaction information sent by the associated second node. In an embodiment, the transaction information obtaining module 1110 may be configured to perform the operation S210 described above, for example, and will not be described herein again.
The first encryption module 1120 is configured to encrypt the transaction information using a first predetermined encryption algorithm to obtain first encrypted information. In an embodiment, the first encryption module 1120, for example, can be used to perform the operation S220 described above, and is not described herein again.
The encryption information sending module 1130 is configured to send the first encryption information to the associated second node, so that the second blockchain network performs consensus verification on the transaction indicated by the transaction information based on the first encryption information. In an embodiment, the encryption information sending module 1130 may be configured to perform the operation S230 described above, for example, and is not described herein again.
The anonymous message generating module 1140 is configured to generate an anonymous transaction verification message for the transaction information using a second predetermined encryption algorithm. In an embodiment, the anonymous packet generation module 1140 may be configured to perform the operation S240 described above, for example, and will not be described herein again.
The anonymous message broadcasting module 1150 is configured to broadcast an anonymous transaction verification message to other first nodes except any first node in the first blockchain network, so as to perform transaction verification on the transaction indicated by the transaction information. In an embodiment, the anonymous message broadcasting module 1150 may be configured to perform the operation S250 described above, for example, and will not be described herein again.
According to an embodiment of the present disclosure, the above block chain based information processing apparatus 1100 may further include, for example, an authentication information transmission module configured to transmit authentication passing information to the associated second node in response to receiving an anonymous transaction authentication request transmitted by the associated second node in a case where it is determined that the authentication passes.
According to an embodiment of the present disclosure, the anonymous message generation module 1140 may include, for example, a key generation submodule, a first encryption submodule, a second encryption submodule, and a message generation submodule. And the key generation submodule is used for generating an encryption key by adopting an integrated encryption scheme based on a private key and a unique public key in the temporary key pair. The first encryption submodule is used for encrypting the transaction information by adopting the encryption key to obtain second encryption information. The second encryption submodule is used for encrypting the transaction information by adopting a second preset encryption algorithm to obtain third encryption information. And the message generation submodule is used for obtaining an anonymous transaction verification message aiming at the transaction information according to the second encryption information, the third encryption information and the public key in the temporary key pair.
According to an embodiment of the present disclosure, the second encryption sub-module may be specifically configured to generate third encryption information for the transaction information using a homomorphic encryption algorithm.
According to an embodiment of the present disclosure, the second encryption submodule may include, for example, a hash value generation unit and an evidence information generation unit. The hash value generating unit is used for generating a resource hash value and a resource mark hash value of the transaction indicated by the transaction information according to the transaction information. The evidence information generating unit is used for generating zero-knowledge evidence information aiming at the transaction information by adopting a zero-knowledge proof algorithm based on the resource hash value and the resource mark hash value.
According to an embodiment of the present disclosure, the above-mentioned blockchain-based information processing apparatus 1100 may further include, for example, a private key transmission module configured to transmit a unique private key to a first node in the first blockchain network, which is associated with a second node in the second blockchain network that receives the transaction, to decrypt the second encrypted information, wherein the unique private key is a private key paired with the unique public key.
According to an embodiment of the present disclosure, the above block chain-based information processing apparatus 1100 may further include, for example, a private key receiving module, a key generating module, and a decryption module. The private key receiving module is used for receiving the unique private keys sent by other first nodes except any first node in the first block chain network. And the key generation module is used for generating an encryption key by adopting an integrated encryption scheme according to the unique private key and the public key in the received anonymous transaction verification message. The decryption module is used for decrypting the second encrypted information by adopting the encryption key so as to complete the transaction according to the transaction information obtained by decryption.
According to the embodiment of the disclosure, the temporary key pair is generated by using an asymmetric key algorithm in a cryptographic algorithm.
According to an embodiment of the present disclosure, any one of the first nodes is provided with a software development kit, and the second node in the second blockchain network communicates with the associated first node by calling the software development kit.
According to an embodiment of the present disclosure, the first predetermined encryption algorithm and the second predetermined encryption algorithm are implemented based on a cryptographic algorithm.
Fig. 12 schematically shows a block diagram of a block chain-based information processing apparatus according to another embodiment of the present disclosure.
As shown in fig. 12, the block chain based information processing apparatus 1200 of this embodiment may be provided at any second node in the second block chain network. Any second node is associated with a first node in the first blockchain network. The block chain-based information processing apparatus 1200 may include a transaction information extraction module 1210, a transaction information transmission module 1220, an encryption information reception module 1230, a consensus message generation module 1240, and a consensus message broadcasting module 1250.
The transaction information extraction module 1210 is configured to extract transaction information in a transaction initiation request in response to receiving the transaction initiation request. In an embodiment, the transaction information extraction module 1210 may be configured to perform the operation S310 described above, for example, and will not be described herein again.
The transaction information sending module 1220 is configured to send transaction information to an associated first node. In an embodiment, the transaction information sending module 1220 may be configured to perform the operation S320 described above, for example, and will not be described herein again.
The encryption information receiving module 1230 is configured to receive first encryption information sent by an associated first node, where the first encryption information is obtained by encrypting transaction information with a first predetermined encryption algorithm. In an embodiment, the encryption information receiving module 1230, for example, may be configured to perform the operation S330 described above, and is not described herein again.
The consensus message generating module 1240 is configured to generate a consensus verification message based on the first encryption information. In an embodiment, the consensus message generating module 1240 may be configured to perform the operation S340 described above, for example, and is not described herein again.
The consensus packet broadcasting module 1250 is configured to broadcast a consensus verification packet to other second nodes in the second blockchain network except for any second node, so as to perform consensus verification on the transaction indicated by the transaction information. In an embodiment, the consensus message broadcasting module 1250 may be configured to perform the operation S350 described above, for example, and will not be described herein again.
According to an embodiment of the present disclosure, the above block chain-based information processing apparatus 1200 may further include an authentication request transmission module and an information packaging module. The authentication request sending module is configured to send an anonymous transaction authentication request to the associated first node. The information packaging module is used for packaging the first encryption information into blocks and storing the blocks into a block chain in response to receiving authentication passing information sent by the associated first node in response to the anonymous transaction authentication request.
According to the embodiment of the present disclosure, any plurality of the transaction information obtaining module 1110, the first encryption module 1120, the encrypted information sending module 1130, the anonymous message generating module 1140 and the anonymous message broadcasting module 1150, or any plurality of the transaction information extracting module 1210, the transaction information sending module 1220, the encrypted information receiving module 1230, the consensus message generating module 1240 and the consensus message broadcasting module 1250 may be combined in one module to be implemented, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the transaction information acquisition module 1110, the first encryption module 1120, the encrypted information transmission module 1130, the anonymous message generation module 1140 and the anonymous message broadcasting module 1150, or at least one of the transaction information extraction module 1210, the transaction information transmission module 1220, the encryption information reception module 1230, the consensus message generation module 1240 and the consensus message broadcast module 1250 may be at least partially implemented as a hardware circuit, such as Field Programmable Gate Arrays (FPGAs), Programmable Logic Arrays (PLAs), systems on a chip, systems on a substrate, systems on a package, Application Specific Integrated Circuits (ASICs), or may be implemented in hardware or firmware in any other reasonable way of integrating or packaging circuits, or in any one of three implementations, software, hardware and firmware, or in any suitable combination of any of them. Alternatively, at least one of the transaction information obtaining module 1110, the first encryption module 1120, the encrypted information sending module 1130, the anonymous message generating module 1140 and the anonymous message broadcasting module 1150, or at least one of the transaction information extracting module 1210, the transaction information sending module 1220, the encrypted information receiving module 1230, the consensus message generating module 1240 and the consensus message broadcasting module 1250 may be at least partially implemented as a computer program module, which may perform corresponding functions when executed.
Fig. 13 schematically shows a block diagram of an electronic device adapted to implement a blockchain-based information processing method according to an embodiment of the present disclosure.
As shown in fig. 13, an electronic device 1300 according to an embodiment of the present disclosure includes a processor 1301 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)1302 or a program loaded from a storage section 1308 into a Random Access Memory (RAM) 1303. The processor 1301 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 1301 may also include onboard memory for caching purposes. Processor 1301 may include a single processing unit or multiple processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 1303, various programs and data necessary for the operation of the electronic apparatus 1300 are stored. The processor 1301, the ROM 1302, and the RAM 1303 are connected to each other via a bus 1304. The processor 1301 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 1302 and/or the RAM 1303. Note that the programs may also be stored in one or more memories other than the ROM 1302 and RAM 1303. The processor 1301 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 1300 may also include input/output (I/O) interface 1305, which is also connected to bus 1304, according to an embodiment of the present disclosure. The electronic device 1300 may also include one or more of the following components connected to the I/O interface 1305: an input portion 1306 including a keyboard, a mouse, and the like; an output section 1307 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 1308 including a hard disk and the like; and a communication section 1309 including a network interface card such as a LAN card, a modem, or the like. The communication section 1309 performs communication processing via a network such as the internet. A drive 1310 is also connected to the I/O interface 1305 as needed. A removable medium 1311 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1310 as necessary, so that a computer program read out therefrom is mounted into the storage portion 1308 as necessary.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include one or more memories other than the ROM 1302 and/or the RAM 1303 and/or the ROM 1302 and the RAM 1303 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated in the flow chart. When the computer program product runs in a computer system, the program code is used for causing the computer system to realize the item recommendation method provided by the embodiment of the disclosure.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 1301. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted in the form of a signal on a network medium, distributed, downloaded and installed via communications component 1309, and/or installed from removable media 1311. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such embodiments, the computer program may be downloaded and installed from a network via communications component 1309 and/or installed from removable media 1311. The computer program, when executed by the processor 1301, performs the functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (17)

1. A blockchain-based information processing method, wherein the method is performed by any first node in a first blockchain network, the any first node being associated with at least one second node in a second blockchain network; the method comprises the following steps:
receiving transaction information sent by the associated second node;
encrypting the transaction information by adopting a first preset encryption algorithm to obtain first encryption information;
sending the first encryption information to the associated second node to cause the second blockchain network to perform consensus verification on the transaction indicated by the transaction information based on the first encryption information;
generating an anonymous transaction verification message aiming at the transaction information by adopting a second preset encryption algorithm; and
and broadcasting the anonymous transaction verification message to other first nodes except any first node in the first block chain network so as to perform transaction verification on the transaction indicated by the transaction information.
2. The method of claim 1, further comprising, upon determining that the transaction verification passes:
in response to receiving an anonymous transaction verification request sent by the associated second node, sending verification pass information to the associated second node.
3. The method of claim 1, wherein generating an anonymous transaction verification message for the transaction information using a second predetermined encryption algorithm comprises:
generating an encryption key by adopting an integrated encryption scheme based on a private key and a unique public key in the temporary key pair;
encrypting the transaction information by adopting the encryption key to obtain second encryption information;
encrypting the transaction information by adopting the second preset encryption algorithm to obtain third encryption information; and
and obtaining an anonymous transaction verification message aiming at the transaction information according to the second encryption information, the third encryption information and the public key in the temporary key pair.
4. A method according to any one of claims 1 to 3, wherein said encrypting said transaction information using said second predetermined encryption algorithm to obtain third encrypted information comprises:
and generating third encryption information aiming at the transaction information by adopting a homomorphic encryption algorithm.
5. A method according to any one of claims 1 to 3, wherein encrypting the transaction information using the second predetermined encryption algorithm comprises:
according to the transaction information, generating a resource hash value and a resource mark hash value of the transaction indicated by the transaction information; and
and generating zero knowledge evidence information aiming at the transaction information by adopting a zero knowledge proof algorithm based on the resource hash value and the resource mark hash value.
6. The method of claim 3, further comprising:
transmitting a unique private key to a first node in the first blockchain network associated with a second node in the second blockchain network that receives a transaction to decrypt the second encrypted information,
wherein the unique private key is a private key paired with the unique public key.
7. The method of claim 6, further comprising:
receiving a unique private key sent by other first nodes except the any first node in the first blockchain network;
generating the encryption key by adopting the integrated encryption scheme according to the unique private key and a public key in the received anonymous transaction verification message; and
and decrypting the second encrypted information by adopting the encryption key so as to complete the transaction according to the transaction information obtained by decryption.
8. The method of claim 3, wherein the temporary key pair is generated using an asymmetric key algorithm of a national key algorithm.
9. The method of claim 1, wherein any first node is provided with a software development kit, and a second node in the second blockchain network communicates with the associated first node by invoking the software development kit.
10. The method of claim 1, wherein the first predetermined encryption algorithm and the second predetermined encryption algorithm are implemented based on a cryptographic algorithm.
11. A blockchain-based information processing method, wherein the information processing method is performed by any second node in a second blockchain network, the any second node being associated with one first node in a first blockchain network; the method comprises the following steps:
in response to receiving a transaction initiation request, extracting transaction information in the transaction initiation request;
sending the transaction information to an associated first node;
receiving first encryption information sent by the associated first node, wherein the first encryption information is obtained by encrypting the transaction information through a first preset encryption algorithm;
generating a consensus verification message based on the first encryption information; and
and broadcasting the consensus verification message to other second nodes except the any second node in the second block chain network so as to perform consensus verification on the transaction indicated by the transaction information.
12. The method of claim 11, further comprising, if the consensus verification passes:
sending an anonymous transaction verification request to the associated first node;
and in response to receiving authentication passing information sent by the associated first node in response to the anonymous transaction authentication request, packaging the first encryption information into blocks and storing the blocks on a block chain.
13. An information processing device based on a block chain is arranged at any first node in a first block chain network, and the any first node is associated with at least one second node in a second block chain network; the device comprises:
the transaction information acquisition module is used for acquiring the transaction information sent by the associated second node;
the first encryption module is used for encrypting the transaction information by adopting a first preset encryption algorithm to obtain first encryption information;
an encrypted information sending module, configured to send the first encrypted information to the associated second node, so that the second blockchain network performs consensus verification on the transaction indicated by the transaction information based on the first encrypted information;
the anonymous message generating module is used for generating an anonymous transaction verification message aiming at the transaction information by adopting a second preset encryption algorithm; and
and the anonymous message broadcasting module is used for broadcasting the anonymous transaction verification message to other first nodes except any one first node in the first block chain network so as to perform transaction verification on the transaction shown by the transaction information.
14. An information processing device based on a block chain is arranged at any second node in a second block chain network, and the any second node is associated with a first node in a first block chain network; the device comprises:
the transaction information extraction module is used for responding to the received transaction initiation request and extracting the transaction information in the transaction initiation request;
the transaction information sending module is used for sending the transaction information to the associated first node;
the encrypted information receiving module is used for receiving first encrypted information sent by the associated first node, and the first encrypted information is obtained by encrypting the transaction information through a first preset encryption algorithm;
the consensus message generation module is used for generating a consensus verification message based on the first encryption information; and
a consensus message broadcasting module, configured to broadcast the consensus verification message to other second nodes in the second blockchain network except the any second node, so as to perform consensus verification on the transaction indicated by the transaction information.
15. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-10, and/or the method of any of claims 11-12.
16. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1 to 10, and/or the method of any of claims 11 to 12.
17. A computer program product comprising a computer program which, when executed by a processor, implements a method according to any one of claims 1 to 10, and/or a method according to any one of claims 11 to 12.
CN202110181162.XA 2021-02-08 2021-02-08 Block chain-based information processing method, apparatus, device, medium, and product Pending CN113034135A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110181162.XA CN113034135A (en) 2021-02-08 2021-02-08 Block chain-based information processing method, apparatus, device, medium, and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110181162.XA CN113034135A (en) 2021-02-08 2021-02-08 Block chain-based information processing method, apparatus, device, medium, and product

Publications (1)

Publication Number Publication Date
CN113034135A true CN113034135A (en) 2021-06-25

Family

ID=76460830

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110181162.XA Pending CN113034135A (en) 2021-02-08 2021-02-08 Block chain-based information processing method, apparatus, device, medium, and product

Country Status (1)

Country Link
CN (1) CN113034135A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113379421A (en) * 2021-07-13 2021-09-10 北京京东乾石科技有限公司 Block chain based information processing and block chain network composition method and device
CN113592688A (en) * 2021-07-30 2021-11-02 工银科技有限公司 Diagnosis and treatment information processing method and device based on block chain and electronic equipment
CN114338047A (en) * 2022-03-08 2022-04-12 科大天工智能装备技术(天津)有限公司 Block chain industrial data encryption method and device based on state cipher and storage medium
CN114465830A (en) * 2022-04-14 2022-05-10 北京理工大学 Cross-chain data encryption method, device, equipment and storage medium
WO2023040527A1 (en) * 2021-09-17 2023-03-23 华为技术有限公司 Blockchain-based network node control method and system and consensus node
CN116405327A (en) * 2023-06-08 2023-07-07 天津市津能工程管理有限公司 Data processing method and device, electronic equipment and storage medium
CN116633548A (en) * 2023-04-03 2023-08-22 北京熠智科技有限公司 Encryption process supervision method, device, system and storage medium
TWI841097B (en) * 2021-12-11 2024-05-01 財團法人國家實驗研究院 A design of multi-party system in qap-based homomorphic encryption

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256859A (en) * 2018-01-02 2018-07-06 中国工商银行股份有限公司 Financial product transaction common recognition method, node and system based on block chain
CN109495249A (en) * 2018-11-23 2019-03-19 全链通有限公司 A kind of date storage method of block catenary system, node and block catenary system
CN109756582A (en) * 2019-03-15 2019-05-14 腾讯科技(深圳)有限公司 Information recording method, device, node and storage medium in block chain network
CN109767220A (en) * 2019-01-15 2019-05-17 中国联合网络通信集团有限公司 Method of commerce based on block chain and the transaction system based on block chain
CN110335043A (en) * 2019-07-03 2019-10-15 中国银行股份有限公司 A kind of transaction method for secret protection, equipment and system based on block catenary system
CN110838063A (en) * 2019-09-30 2020-02-25 远光软件股份有限公司 Transaction processing method based on block chain, electronic device and storage medium
WO2020199703A1 (en) * 2019-04-01 2020-10-08 杜晓楠 Method, device and system for blockchain transaction
CN112231731A (en) * 2020-10-23 2021-01-15 中国工商银行股份有限公司 Loosely coupled blockchain transaction method and blockchain link point

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256859A (en) * 2018-01-02 2018-07-06 中国工商银行股份有限公司 Financial product transaction common recognition method, node and system based on block chain
CN109495249A (en) * 2018-11-23 2019-03-19 全链通有限公司 A kind of date storage method of block catenary system, node and block catenary system
CN109767220A (en) * 2019-01-15 2019-05-17 中国联合网络通信集团有限公司 Method of commerce based on block chain and the transaction system based on block chain
CN109756582A (en) * 2019-03-15 2019-05-14 腾讯科技(深圳)有限公司 Information recording method, device, node and storage medium in block chain network
WO2020199703A1 (en) * 2019-04-01 2020-10-08 杜晓楠 Method, device and system for blockchain transaction
CN110335043A (en) * 2019-07-03 2019-10-15 中国银行股份有限公司 A kind of transaction method for secret protection, equipment and system based on block catenary system
CN110838063A (en) * 2019-09-30 2020-02-25 远光软件股份有限公司 Transaction processing method based on block chain, electronic device and storage medium
CN112231731A (en) * 2020-10-23 2021-01-15 中国工商银行股份有限公司 Loosely coupled blockchain transaction method and blockchain link point

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113379421A (en) * 2021-07-13 2021-09-10 北京京东乾石科技有限公司 Block chain based information processing and block chain network composition method and device
CN113379421B (en) * 2021-07-13 2023-09-26 北京京东振世信息技术有限公司 Information processing and block chain network composition method and device based on block chain
CN113592688A (en) * 2021-07-30 2021-11-02 工银科技有限公司 Diagnosis and treatment information processing method and device based on block chain and electronic equipment
WO2023040527A1 (en) * 2021-09-17 2023-03-23 华为技术有限公司 Blockchain-based network node control method and system and consensus node
TWI841097B (en) * 2021-12-11 2024-05-01 財團法人國家實驗研究院 A design of multi-party system in qap-based homomorphic encryption
CN114338047A (en) * 2022-03-08 2022-04-12 科大天工智能装备技术(天津)有限公司 Block chain industrial data encryption method and device based on state cipher and storage medium
CN114465830A (en) * 2022-04-14 2022-05-10 北京理工大学 Cross-chain data encryption method, device, equipment and storage medium
CN114465830B (en) * 2022-04-14 2022-06-24 北京理工大学 Cross-link data encryption method, device, equipment and storage medium
CN116633548A (en) * 2023-04-03 2023-08-22 北京熠智科技有限公司 Encryption process supervision method, device, system and storage medium
CN116405327A (en) * 2023-06-08 2023-07-07 天津市津能工程管理有限公司 Data processing method and device, electronic equipment and storage medium
CN116405327B (en) * 2023-06-08 2023-08-22 天津市津能工程管理有限公司 Data processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
EP3610405B1 (en) Program execution and data proof scheme using multiple key pair signatures
US11323276B2 (en) Mutual authentication of confidential communication
US11108565B2 (en) Secure communications providing forward secrecy
US10903991B1 (en) Systems and methods for generating signatures
CN113034135A (en) Block chain-based information processing method, apparatus, device, medium, and product
JP2020528224A (en) Secure execution of smart contract operations in a reliable execution environment
JP2019533384A (en) Data transmission method, apparatus and system
US11870891B2 (en) Certificateless public key encryption using pairings
JP2007049708A (en) System and method for updating keys used for public key cryptography
CN112910660B (en) Certificate issuing method, adding method and transaction processing method of blockchain system
US20230188325A1 (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
CN114697040B (en) Electronic signature method and system based on symmetric key
CN111080299B (en) Anti-repudiation method for transaction information, client and server
US20240097894A1 (en) Threshold key exchange
CN113159767A (en) Transfer processing method, device and system based on block chain
CN113315749A (en) User data uplink, user data using method, anonymous system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination