CN113034138A - Privacy protection method based on block chain - Google Patents
Privacy protection method based on block chain Download PDFInfo
- Publication number
- CN113034138A CN113034138A CN202110269073.0A CN202110269073A CN113034138A CN 113034138 A CN113034138 A CN 113034138A CN 202110269073 A CN202110269073 A CN 202110269073A CN 113034138 A CN113034138 A CN 113034138A
- Authority
- CN
- China
- Prior art keywords
- block chain
- node
- transaction
- data
- hash value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 15
- 238000004806 packaging method and process Methods 0.000 claims abstract description 9
- 238000012790 confirmation Methods 0.000 claims abstract description 7
- 238000004891 communication Methods 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 5
- 238000013475 authorization Methods 0.000 abstract description 3
- 230000035515 penetration Effects 0.000 abstract description 3
- 238000012550 audit Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a privacy protection method based on a block chain, which receives inquiry transaction aiming at target privacy data initiated by an inquirer; encrypting the private data by a private key, calculating a HASH value of the private data, packaging the private data after information packaging, information confirmation and block chain consensus, bringing the private data into a block, and storing the private data at the link point of the block in a distributed manner; comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result; and under the condition that the query condition of the returned comparison result is met, reading target privacy data into the trusted execution environment of the block chain node for decryption so that the inquirer acquires corresponding decrypted data, and performing decrement update on the query quota. The existing privacy authentication mode of the invention needs to pay higher cost, but the privacy authentication authorization cost by adopting the block chain technology is almost ignored, and the penetration type supervision of the block chain system is realized.
Description
Technical Field
The invention relates to a privacy protection method based on a block chain, and belongs to the technical field of artificial intelligence.
Background
Blockchains are a term of art in information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect. Many public chain transactions exist that are publicly transparent, such as: bitcoin, etherhouse, EOS, etc. Although the public chain transaction account is anonymous, the amount of the transaction is public and transparent due to the initiator and the receiver of each transaction, the specific person of the anonymous account corresponding to the real world can be inquired in an indirect mode by searching the transaction record, and particularly, the traditional privacy authentication information is submitted to a third-party service platform in a clear text, so that privacy leakage is easily caused. Therefore, a privacy protection method based on a block chain is urgently needed to solve the problem existing in the prior art.
In order to solve the technical problems, a new technical scheme is especially provided.
Disclosure of Invention
The present invention is directed to a privacy protection method based on a block chain, so as to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a privacy protection method based on a blockchain, the method comprising the steps of:
receiving a query transaction aiming at target privacy data initiated by a query party;
encrypting the private data through a private key, calculating a HASH value of the private data, packaging and incorporating the private data into a block after information packaging, information confirmation and block chain consensus are completed, and storing the private data at the link points of the block in a distributed mode;
step three, comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result;
reading target privacy data into a trusted execution environment of the block chain node for decryption under the condition that a query condition of a returned comparison result is met, so that the inquirer acquires corresponding decrypted data, and performing decrement updating on the query quota;
step five, registering a messagebase account on the application of each connection block chain node; the messagebase is a message address;
and step six, carrying out application message communication between the same block chain nodes or message communication between different block chain nodes by adopting the registered new messagebase, wherein the content of the message communication is provided with a selective uplink chain, so that the evidence is convenient to retain.
Preferably, the first step of auditing the query transaction of the private data after the query transaction, wherein the auditing mode includes:
step 1, the auditing node decrypts and verifies the private transaction Tx-AB, signs the transaction hash value HAB after the verification is passed, and then sends the signature to A;
step 2, the node A encrypts the transaction by using the same AES key in the S1, encrypts the AES key by using the public key of the node B, and sends the encrypted private transaction, the hash value of the transaction and the encrypted AES key to the node B;
step 3, after receiving the privacy transaction Tx-AB, the node B sends confirmation information to the node A;
step 4, the node A broadcasts the hash value of Tx-AB and the signature of the auditing node;
step 5, other nodes directly pack the hash value of the privacy transaction and the signature of the auditing node into a block after receiving the hash value and the signature;
and 6, after receiving the block containing the Tx-AB, the node A and the node B decrypt the transaction, execute the transaction and update the private state.
Preferably, the step four data query condition includes that the query quota has not been exhausted.
Preferably, the information package is a complete data block combined by a data block encrypted by an asymmetric encryption algorithm and the personal signature information.
Compared with the prior art, the invention has the beneficial effects that: the existing privacy authentication mode needs to pay higher cost, but the privacy authentication authorization cost by adopting the block chain technology is almost ignored, and the penetration supervision of the block chain system is realized. The supervision node can monitor the health state of the blockchain system in real time, and audit on private transactions, private data and behaviors of other nodes is achieved.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a technical scheme that: a privacy protection method based on a blockchain, the method comprising the steps of:
receiving a query transaction aiming at target privacy data initiated by a query party;
encrypting the private data through a private key, calculating a HASH value of the private data, packaging and incorporating the private data into a block after information packaging, information confirmation and block chain consensus are completed, and storing the private data at the link points of the block in a distributed mode;
step three, comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result;
reading target privacy data into a trusted execution environment of the block chain node for decryption under the condition that a query condition of a returned comparison result is met, so that the inquirer acquires corresponding decrypted data, and performing decrement updating on the query quota;
step five, registering a messagebase account on the application of each connection block chain node; the messagebase is a message address;
and step six, carrying out application message communication between the same block chain nodes or message communication between different block chain nodes by adopting the registered new messagebase, wherein the content of the message communication is provided with a selective uplink chain, so that the evidence is convenient to retain.
Preferably, the first step of auditing the query transaction of the private data after the query transaction, wherein the auditing mode includes:
step 1, the auditing node decrypts and verifies the private transaction Tx-AB, signs the transaction hash value HAB after the verification is passed, and then sends the signature to A;
step 2, the node A encrypts the transaction by using the same AES key in the S1, encrypts the AES key by using the public key of the node B, and sends the encrypted private transaction, the hash value of the transaction and the encrypted AES key to the node B;
step 3, after receiving the privacy transaction Tx-AB, the node B sends confirmation information to the node A;
step 4, the node A broadcasts the hash value of Tx-AB and the signature of the auditing node;
step 5, other nodes directly pack the hash value of the privacy transaction and the signature of the auditing node into a block after receiving the hash value and the signature;
and 6, after receiving the block containing the Tx-AB, the node A and the node B decrypt the transaction, execute the transaction and update the private state.
Preferably, the step four data query condition includes that the query quota has not been exhausted.
Preferably, the information package is a complete data block combined by a data block encrypted by an asymmetric encryption algorithm and the personal signature information.
When the system is used, the existing privacy authentication mode needs to pay higher cost, but the privacy authentication authorization cost by adopting the block chain technology is almost ignored, and the penetration supervision of the block chain system is realized. The supervision node can monitor the health state of the blockchain system in real time, and audit on private transactions, private data and behaviors of other nodes is achieved.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (4)
1. A privacy protection method based on a blockchain, the method comprising the steps of:
receiving a query transaction aiming at target privacy data initiated by a query party;
encrypting the private data through a private key, calculating a HASH value of the private data, packaging and incorporating the private data into a block after information packaging, information confirmation and block chain consensus are completed, and storing the private data at the link points of the block in a distributed mode;
step three, comparing the HASH value of the applied privacy authentication information with the corresponding HASH value on the block chain, and returning a comparison result;
reading target privacy data into a trusted execution environment of the block chain node for decryption under the condition that a query condition of a returned comparison result is met, so that the inquirer acquires corresponding decrypted data, and performing decrement updating on the query quota;
step five, registering a messagebase account on the application of each connection block chain node; the messagebase is a message address;
and step six, carrying out application message communication between the same block chain nodes or message communication between different block chain nodes by adopting the registered new messagebase, wherein the content of the message communication is provided with a selective uplink chain, so that the evidence is convenient to retain.
2. The block chain based privacy protection method of claim 1, wherein: and after the transaction is inquired in the first step, auditing of inquiry transaction of private data is carried out, wherein the auditing mode comprises the following steps:
step 1, the auditing node decrypts and verifies the private transaction Tx-AB, signs the transaction hash value HAB after the verification is passed, and then sends the signature to A;
step 2, the node A encrypts the transaction by using the same AES key in the S1, encrypts the AES key by using the public key of the node B, and sends the encrypted private transaction, the hash value of the transaction and the encrypted AES key to the node B;
step 3, after receiving the privacy transaction Tx-AB, the node B sends confirmation information to the node A;
step 4, the node A broadcasts the hash value of Tx-AB and the signature of the auditing node;
step 5, other nodes directly pack the hash value of the privacy transaction and the signature of the auditing node into a block after receiving the hash value and the signature;
and 6, after receiving the block containing the Tx-AB, the node A and the node B decrypt the transaction, execute the transaction and update the private state.
3. The block chain based privacy protection method of claim 1, wherein: the step four data query condition comprises that the query quota is not exhausted.
4. The block chain based privacy protection method of claim 2, wherein: the information packaging is a complete data block formed by combining a data block encrypted by an asymmetric encryption algorithm and personal signature information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110269073.0A CN113034138A (en) | 2021-03-12 | 2021-03-12 | Privacy protection method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110269073.0A CN113034138A (en) | 2021-03-12 | 2021-03-12 | Privacy protection method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113034138A true CN113034138A (en) | 2021-06-25 |
Family
ID=76470123
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110269073.0A Pending CN113034138A (en) | 2021-03-12 | 2021-03-12 | Privacy protection method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113034138A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114598554A (en) * | 2022-05-09 | 2022-06-07 | 山东省计算中心(国家超级计算济南中心) | Method and system for protecting user privacy data in application program |
CN115085905A (en) * | 2022-07-15 | 2022-09-20 | 上汽通用五菱汽车股份有限公司 | Transaction data evidence checking method, device, equipment and medium based on block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109472601A (en) * | 2018-11-21 | 2019-03-15 | 北京蓝石环球区块链科技有限公司 | The block chain framework of privacy transaction can be supervised |
CN110309663A (en) * | 2019-06-25 | 2019-10-08 | 湖南搜云网络科技股份有限公司 | Privacy authenticating method and system based on block chain |
CN110365773A (en) * | 2019-07-17 | 2019-10-22 | 湖南智慧政务区块链科技有限公司 | Information communication method based on block chain message addresses |
CN111222157A (en) * | 2019-10-30 | 2020-06-02 | 支付宝(杭州)信息技术有限公司 | Method and device for inquiring block chain private data |
CN111475829A (en) * | 2019-11-08 | 2020-07-31 | 支付宝(杭州)信息技术有限公司 | Private data query method and device based on block chain account |
-
2021
- 2021-03-12 CN CN202110269073.0A patent/CN113034138A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109472601A (en) * | 2018-11-21 | 2019-03-15 | 北京蓝石环球区块链科技有限公司 | The block chain framework of privacy transaction can be supervised |
CN110309663A (en) * | 2019-06-25 | 2019-10-08 | 湖南搜云网络科技股份有限公司 | Privacy authenticating method and system based on block chain |
CN110365773A (en) * | 2019-07-17 | 2019-10-22 | 湖南智慧政务区块链科技有限公司 | Information communication method based on block chain message addresses |
CN111222157A (en) * | 2019-10-30 | 2020-06-02 | 支付宝(杭州)信息技术有限公司 | Method and device for inquiring block chain private data |
CN111475829A (en) * | 2019-11-08 | 2020-07-31 | 支付宝(杭州)信息技术有限公司 | Private data query method and device based on block chain account |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114598554A (en) * | 2022-05-09 | 2022-06-07 | 山东省计算中心(国家超级计算济南中心) | Method and system for protecting user privacy data in application program |
CN115085905A (en) * | 2022-07-15 | 2022-09-20 | 上汽通用五菱汽车股份有限公司 | Transaction data evidence checking method, device, equipment and medium based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113489733B (en) | Content center network privacy protection method based on block chain | |
CN111181720B (en) | Service processing method and device based on trusted execution environment | |
CN107425982B (en) | Method and block chain for realizing intelligent contract data encryption | |
US10491384B2 (en) | Device for secure multi-party cryptographic authorization | |
CN107911216A (en) | A kind of block chain transaction method for secret protection and system | |
CN114499895B (en) | Data trusted processing method and system fusing trusted computing and block chain | |
CN103107995B (en) | A kind of cloud computing environment date safety storing system and method | |
Li et al. | Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage | |
CN113988863B (en) | Supervision-capable online payment privacy protection method and device and electronic equipment | |
CN109561110B (en) | Cloud platform audit log protection method based on SGX | |
US20110161671A1 (en) | System and method for securing data | |
US9215070B2 (en) | Method for the cryptographic protection of an application | |
CN114866323B (en) | User-controllable privacy data authorization sharing system and method | |
CN111274599A (en) | Data sharing method based on block chain and related device | |
US20230362002A1 (en) | Systems and methods for block data security for digital communications from a physical device | |
CN102299793A (en) | Certificate authentication system based on trusted computing password support platform | |
CN113034138A (en) | Privacy protection method based on block chain | |
US11783091B2 (en) | Executing entity-specific cryptographic code in a cryptographic coprocessor | |
CN111159257A (en) | Tax certification query method and system based on block chain | |
Kroll et al. | Secure protocols for accountable warrant execution | |
CN109995715A (en) | Private data encipher-decipher method, device, equipment and the storage medium of block chain | |
CN111327419A (en) | Method and system for resisting quantum computation block chain based on secret sharing | |
CN114866289B (en) | Privacy credit data security protection method based on alliance chain | |
CN112364370B (en) | Privacy protection cloud auditing method based on block chain | |
CN113326529A (en) | Decentralized architecture unifying method based on trusted computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210625 |