CN113222591A - Fair two-party negotiation method and system based on block chain - Google Patents

Fair two-party negotiation method and system based on block chain Download PDF

Info

Publication number
CN113222591A
CN113222591A CN202011547454.2A CN202011547454A CN113222591A CN 113222591 A CN113222591 A CN 113222591A CN 202011547454 A CN202011547454 A CN 202011547454A CN 113222591 A CN113222591 A CN 113222591A
Authority
CN
China
Prior art keywords
party
output
deposit
input
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011547454.2A
Other languages
Chinese (zh)
Other versions
CN113222591B (en
Inventor
詹茁
曾兵
金茁
李东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN202011547454.2A priority Critical patent/CN113222591B/en
Publication of CN113222591A publication Critical patent/CN113222591A/en
Application granted granted Critical
Publication of CN113222591B publication Critical patent/CN113222591B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a block chain-based fair two-party negotiation method and a block chain-based fair two-party negotiation system, wherein the method comprises the following steps of: 1. an initialization stage: the first party P1 and the second party P2 negotiate a determination function f'; 2. and (3) a confusion stage: p1 constructs the function f' into the confusion circuit, and obtains the confusion circuit file, the input comparison table and the output comparison table; 3. an input stage: the first party and the second party use the input comparison table to encrypt respective input data into an obfuscated input; 4. an execution stage: the second party using the obfuscated input to execute the obfuscated circuit to obtain an obfuscated output; 5. a commitment stage: the first party calculates the commitment of the output comparison table and sends the commitment of the output comparison table to the second party; 6. the first party pays a first party deposit and publishes a verification algorithm on the blockchain, and the second party pays a second party deposit and publishes a verification algorithm on the blockchain; 7. a claiming stage; 8. a refund stage; 9. the first party and the second party respectively decrypt and confuse the output to obtain a protocol result.

Description

Fair two-party negotiation method and system based on block chain
Technical Field
The invention relates to the field of secure multiparty computation, in particular to a block chain-based fair two-party negotiation method and system.
Background
Secure multi-party computing is an important privacy protection technique that allows multiple parties to jointly compute using their respective private data and ensures that the private data of each party is not available to other parties. The garbled circuit protocol is a classical two-way computing protocol first proposed by Yao, Andrew C in "Protocols for secure computers," 23rd annual simple on bases of computer science (sfcs 1982), IEEE, 1982. The garbled circuit protocol constructs an arbitrary algorithm as a garbled circuit from the level of the underlying logic circuit, and one part constructing the garbled circuit is called a garbled party and the other part is called an evaluator. After the confusion party constructs the confusion circuit, the two parties encrypt respective private inputs into confusion inputs; then, the evaluator executes the confusion circuit by using the confusion input to obtain the confusion output, and any information of the privacy input cannot be obtained in the calculation process; finally, both parties decrypt and confuse and output to obtain a calculation result.
Although the confusion circuit protocol can ensure privacy protection, the fairness that both parties obtain the protocol result cannot be ensured. Fairness of the protocol means that either all participants of the protocol can get the result of the protocol or none of the participants gets the result of the protocol. In the final decryption stage of the garbled circuit protocol, the two parties can decrypt independently only by acquiring the data of the other party. Then the party that first obtained the partner data may exit the protocol or provide the wrong data, thereby preventing the partner from obtaining the results of the protocol. Gao H, Ma Z, Luo S et al in Bfr-mpc: a block-based fair and robust multi-party calculation scheme [ J ]. IEEE Access, 2019, 7: 110439 and 110450, a block chain-based fair multi-party calculation scheme is proposed, fairness in a Yao's circuit protocol process is guaranteed through a block chain technology, however, the scheme still depends on a credible third party, a completely credible third party does not exist in the real world, and malicious behaviors of the third party inevitably destroy the fairness of the protocol.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a block chain-based fair two-party negotiation method, which carries out the data exchange process in the confusion circuit protocol on a block chain and punishs the behavior of a malicious damage protocol in digital currency, thereby ensuring that both parties can obtain the result of the protocol. Meanwhile, the invention also discloses a two-party negotiation system based on the block chain.
The invention is realized by at least one of the following technical schemes.
A block chain based fair two-party negotiation method, the method comprises the following steps:
step1, initialization stage: the first party P1 and the second party P2 negotiate a determining function f', P1 to prepare for entering the privacy data x of the first party1P2 prepares to input the private data x of the second party2A position array L and a characteristic value V;
step2, confusion phase: p1 constructs the garbled circuit by the function f' to obtain the garbled circuit file
Figure BDA0002856083170000021
Input look-up table TinAnd output look-up table Tout
Step3, input stage: the first party P1 and the second party P2 use the input look-up table TinEncrypting respective input data into obfuscated inputs;
step 4, execution phase: the second party P2 performs the garbled circuit using the garbled input to obtain the garbled output
Figure BDA0002856083170000022
Step5, a commitment stage: first party P1 calculates output comparison table ToutAnd sends an output look-up table ToutTo the second party P2; second party P2 calculates the obfuscated output
Figure BDA0002856083170000023
And send the obfuscated output
Figure BDA0002856083170000024
To the first party P1;
step6, deposit stage: the first party P1 pays the first party deposit q on the blockchain1And publishes verification algorithm phi1The second party P2 pays the second party deposit q on the blockchain2And publishes verification algorithm phi2
Step7, claiming phase: first party P1 publishes output look-up table T on block chainoutSatisfies phi2(Tout) 1, thereby obtaining a second party deposit q2And executing Step 9; second party P2 publishes obfuscated outputs on blockchains
Figure BDA0002856083170000026
Satisfy the requirement of
Figure BDA0002856083170000025
Thereby obtaining a first party deposit q1And executing Step 9;
step8, refund stage: in Step6, if the first party P1 has not yet published the output lookup table T within the set timeoutThe second party P2 deposits a deposit q for the second party2Retrieving; if the second party P2 has not yet published the obfuscated output
Figure BDA0002856083170000027
The first party P1 deposits a first party deposit q1Retrieving;
step9, output stage: the first party P1 and the second party P2 decrypt the obfuscated output respectively to obtain a protocol result.
Preferably, the specific details of the initialization in Step1 are as follows: function f' (x)1,x2L, V) are as follows:
f′(x1,x2,L,V)=g(f(x1,x2),L,V)
f′(x1,x2l, V) first computes a first-party P1 and a second-party P2 computation function f (x)1,x2) The result is noted as y, and then the result y is transmitted into a function g, and a feature value V is inserted into y according to a position array L in the function g (y, L, V).
Preferably, Step2 hasThe body is as follows: according to the Boolean circuit corresponding to the function f', all values in an input line, an output line and an internal line in the Boolean circuit are replaced by symmetric keys which are randomly generated and are not equal to each other; each logic gate is replaced by a cipher text set, each item in the cipher text set corresponds to each item of the logic gate truth table, the cipher text obtained by encrypting the output by taking the input of the corresponding item in the logic gate truth table as a key is obtained, and finally the confusion circuit file is obtained
Figure BDA0002856083170000028
At the same time, the corresponding relation between the plain text and the key on the input line is recorded in the input look-up table TinIn the method, the corresponding relation between the plaintext and the secret key on the output line is recorded in the output look-up table ToutIn (1).
Preferably, Step3 is specifically: the first party P1 and the second party P2 execute the OT protocol, the first party P1 sends an input lookup table TinProviding the second party P2 to assist the second party P2 in obtaining obfuscated inputs
Figure RE-GDA0003149302610000026
The first party P1 inputs the look-up table TinTo privacy data x1Encrypting as obfuscated input
Figure RE-GDA0003149302610000027
And sent to the second party P2, the second party P2 obtains the final obfuscated input
Figure RE-GDA0003149302610000028
Preferably, Step5 specifically includes: first party P1 calculates output comparison table ToutHash value h ofTAnd sends an output look-up table ToutHash value h ofTTo the second party P2; second party P2 calculates the obfuscated output
Figure BDA0002856083170000031
Hash value of
Figure BDA0002856083170000032
And sends the hash value
Figure BDA0002856083170000033
To the first party P1.
Preferably, the specific process of Step6 is as follows:
first, a first party P1 initiates a transaction in the blockchain, the first party's spending q1And submit verification algorithm phi1Verification algorithm phi1The input of (a) is the obfuscated output
Figure BDA0002856083170000034
When the output is obfuscated
Figure BDA0002856083170000035
When the condition for verifying the correctness is satisfied,
Figure BDA0002856083170000036
and returning to the step1, otherwise,
Figure BDA0002856083170000037
returning to 0;
then, the second party P2 is used for a specified time
Figure BDA0002856083170000038
Is output in a mixed-up manner
Figure BDA0002856083170000039
The cost q of the first party can be obtained1Otherwise, the first party spends q after a prescribed time1Will be returned to the first party P1; similarly, the second party P2 initiates a transaction in the blockchain, the second party's cost q2And submit verification algorithm phi2Verification algorithm phi2The input of (A) is an output comparison table ToutWhen T isoutWhen the correctness verification condition is satisfied, phi2(Tout) Return to 1, otherwise, phi(Tout) Returning to 0;
finally, the first party P1 satisfies φ for use within a specified time(Tout) Output look-up table T of 1outThe cost q of the second party can be obtained2Otherwise, after a timeout, the cost of the second party q2Will be returned to the second party P2.
Preferably, the specific process of Step7 is as follows: the first party P1 obtains the verification algorithm φ submitted by the second party P2 from the blockchain within a specified time after confirming the uplink of the deposit transaction of the second party P22And locally calculates phi2(Tout) If phi is2(Tout) If 1, publish the output comparison table T in the block chainoutTo obtain a second party deposit q2Otherwise, executing Step8 after time out; similarly, the second party P2 verifies the local account at a predetermined time after confirming the uplink of the deposit transaction of the first party P1
Figure BDA00028560831700000310
Thereafter, obfuscated outputs are published in a blockchain
Figure BDA00028560831700000311
To obtain a first party deposit q1Otherwise, executing Step8 after time out.
Preferably, the specific process of Step9 is as follows: when step Setp 8 is performed normally, the first party P1 and the second party P2 both obtain a confounding output
Figure BDA00028560831700000312
Output look-up table ToutAnd a position array L, the first party P1 and the second party P2 according to the output look-up table ToutDecrypting obfuscated outputs
Figure BDA00028560831700000313
A plaintext output z is obtained and the eigenvalues are then removed from z according to the position array, thus obtaining a result y of the protocol.
A system for implementing the block chain based fair two-party negotiation method, the system comprising a client and a block chain, wherein the client comprises the following modules:
a request module: initiating a query and a modification two-party calculation request to a request registration contract of a block chain;
constructing a module: responsible for constructing the garbled circuit;
an evaluation module: responsible for executing the garbled circuit;
a deposit module: submitting, claiming and returning the deposit to a deposit management module of the block chain;
an output module: and decrypting to obtain a final calculation result.
Preferably, the blockchain comprises the following intelligent contracts:
request for registration of a contract: registering and recording all two-party calculation requests;
a factory contract: for each responded two-party calculation request, initiating a deposit management contract;
deposit management contracts: and processing the submission, claiming and return requests of the deposit of the two parties in the calculation process of the two parties at one time.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. the invention introduces the block chain to realize the penalty mechanism, and ensures the fairness of the protocol of the confusion circuit. Our protocol performs the steps of fairness problem in the original protocol on the block chain based on the confusing circuit protocol, and the participant is penalized with digital currency if he/she is willing to exit the protocol. Furthermore, we propose efficient, chain-executed authentication algorithms to prevent participants from providing erroneous data.
2. Compared with the traditional negotiation system, the invention realizes the two-party negotiation system and has the following advantages: a. and (4) privacy protection. The confusion circuit protocol realizes that the participants do not need to reveal the original data in the calculation process, thereby protecting the privacy of the data; b. And (4) fairness. By realizing data exchange on the block chain, the participators can obtain the final calculation result; c. and (4) decentralizing. The system does not need a centralized server to maintain data, and avoids the risk of malicious data tampering by the central server.
Drawings
FIG. 1 is a flow chart of a block chain based fairness two-party protocol according to an embodiment of the present invention;
fig. 2 is an architecture diagram of a block chain-based two-party negotiation system according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
As shown in fig. 1 and fig. 2, the embodiment of the present invention introduces a block chain technique to implement a fair two-party negotiation method based on the garbled circuit protocol. A block chain based fair two-party negotiation method comprises the following steps:
step (1a), the first party P1 and the second party P2 negotiate to determine initial parameters including the content (represented by the primitive function f) calculated together, the length m of the feature array, the deposit q of the first party P11Deposit q of the second party P22And a time limit τ;
step (1b), the first party P1 transforms the original function f into a function f ', the function f' accepts the input x of the first party P11And input x of a second party P22The position array L, the characteristic value V, f' are in f (x)1,x2) Thereafter, the feature value is inserted into the result according to the location array L, the feature value V provided by the second party P2, so that the result of the garbled circuit protocol is partially visible to the second party P2, whereby the second party P2 has a look-up table T generated to verify the first party P1outThe ability of the cell to perform. The function f' is shown in table 1.
Table 1 function f'
Figure BDA0002856083170000041
Figure BDA0002856083170000051
Step (2) -step (4) performing the garbled circuit protocol calculation f' (x) for the first party P1 and the second party P21,x2V, L). The specific process is as follows:
step (2), the first party P1 constructs the confusion circuit from the function f' to obtain the confusion circuit file
Figure BDA0002856083170000052
Input look-up table TinOutput the look-up table ToutAnd will be
Figure BDA0002856083170000053
To the second party P2;
step (3a), the first party P1 and the second party P2 execute the OT protocol, the first party P1 sends the input lookup table TinHelping the second party P2 to obtain the obfuscated input
Figure RE-GDA0003149302610000054
Step (3b), the first party P1 inputs the comparison table TinTo privacy data x1Encrypting as obfuscated input
Figure BDA0002856083170000055
And sent to the second party P2;
step (4), the second party P2 uses the final obfuscated input
Figure RE-GDA0003149302610000061
Execution obfuscation circuit
Figure RE-GDA0003149302610000062
Obtaining obfuscated outputs
Figure RE-GDA0003149302610000063
The steps (5) - (8) are that the first party P1 and the second party P2 exchange the output comparison table T fairlyoutAnd obfuscating the output
Figure BDA0002856083170000065
The specific process is as follows:
step (5a), second party P2 calculation
Figure BDA0002856083170000066
Hash value of
Figure BDA0002856083170000067
And transmit
Figure BDA0002856083170000068
To the first party P1;
step (5b), the first party P1 calculates ToutHash value h ofTAnd sends hTTo the second party P2.
Step (6a), the first party P1 submits a first party deposit q1First party verification algorithm phi1And verifying the conditions
Figure BDA0002856083170000069
Where position i is randomly chosen from {1, 2., n } by the first party P1, the key
Figure BDA00028560831700000610
For outputting the key corresponding to bit 0 in the ith entry in the look-up table
Figure BDA00028560831700000611
To output the key corresponding to bit 1 in the ith entry in the look-up table,
Figure BDA00028560831700000612
for the aliasing output in step (5a)
Figure BDA00028560831700000613
The Ha-chi value of (c). First party authentication algorithm phi1As shown in table 2;
step (6b), the second party P2 submits the second party deposit q2Second party verification algorithm phi2And verifying the conditions
Figure BDA00028560831700000614
Wherein
Figure BDA00028560831700000615
For obfuscating the output
Figure BDA00028560831700000616
At a specific position inA key array of keys, each item, h, in a specific location, i.e. location array LTFor outputting the look-up table T in step (5b)outThe hash value of (1). Second party verification algorithm phi2As shown in table 3.
Step (7a), the first party P1 verifies phi locally within tau time2(Tout) Issuing a T on a blockchain after 1outObtaining a second party deposit q2
Step (7b), the second party P2 verifies locally within tau time
Figure BDA00028560831700000617
Post publishing on blockchain
Figure BDA00028560831700000618
Obtaining a first party deposit q1
Step (8a), after the time of tau, if the first party P1 does not publish ToutThe second party P2 deposits a deposit q for the second party2Retrieving;
step (8b), after the time of tau, if the second party P2 is not published
Figure BDA00028560831700000619
The first party P1 deposits a first party deposit q1And (4) retrieving.
Fair exchange T between a first party P1 and a second party P2outAnd
Figure BDA00028560831700000620
after that, both parties have obtained
Figure BDA00028560831700000621
The first party P1 and the second party P2 locally execute the step (9):
step (9) according to ToutDecrypting obfuscated outputs
Figure BDA00028560831700000622
A plaintext output z is obtained and then the remove feature value from z is obtained according to the remove feature algorithm of table 4 to obtain the result y of the protocol.
TABLE 2 first party authentication Algorithm
Figure BDA0002856083170000061
Figure BDA0002856083170000071
TABLE 3 second party verification algorithm
Figure BDA0002856083170000072
Figure BDA0002856083170000081
TABLE 4 Decharacterization Algorithm
Figure BDA0002856083170000082
The specific process of the protocol of the embodiment of the invention is shown in table 5 as a fair two-party negotiation method, wherein the block chain part is detailed in table 6.
TABLE 5 Fair two-party negotiation method
Figure RE-GDA0003149302610000091
Figure BDA0002856083170000101
TABLE 6 Block chain
Figure BDA0002856083170000102
Figure BDA0002856083170000111
An embodiment of the present invention further provides a two-party negotiation system based on a blockchain, where the system includes a client and a blockchain, as shown in fig. 2. Wherein the client comprises the following modules: a request module: initiating, inquiring and modifying a two-party calculation request to a request registration contract of a block chain; constructing a module: responsible for constructing the garbled circuit; an evaluation module: responsible for executing the garbled circuit; a deposit module: submitting, claiming and returning the deposit to a deposit management module of the block chain; an output module: and decrypting to obtain a final calculation result. The blockchain includes the following intelligent contracts: request for registration of a contract: registering and recording all two-party calculation requests; a factory contract: for each responded two-party calculation request, initiating a deposit management contract; deposit management contracts: processing the request of submitting, claiming and returning the deposit of the two parties in the calculation process of the two parties at one time.
In summary, the embodiments of the present invention are a block chain based fair two-party negotiation method and a block chain based two-party negotiation system using the same. The protocol calculates the modified function f' by operating an original (unfair) garbled circuit protocol, so that key data can be efficiently verified on a chain, a data exchange process is carried out on a block chain, and digital currency punishment is carried out on a participant who maliciously quits the protocol or publishes error data, thereby realizing the fairness of a two-party negotiation method. The two-party negotiation system based on the block chain realizes two-party calculation of privacy protection, fairness and decentralization, a user initiates or responds to a two-party calculation request on the block chain, then executes a confusion circuit protocol under the chain, obtains key intermediate data while protecting data privacy, exchanges the key data on the chain to ensure fairness, and finally obtains a final result through local calculation.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can substitute or change the technical solution and the inventive concept of the present invention within the scope of the present invention.

Claims (10)

1. A block chain based fair two-party negotiation method is characterized by comprising the following steps:
step1, initialization stage: the first party P1 and the second party P2 negotiate a determining function f', P1 to prepare for input of privacy data x of the first party1P2 prepares to input the private data x of the second party2A position array L and a characteristic value V;
step2, confusion phase: p1 constructs the garbled circuit by the function f' to obtain the garbled circuit file
Figure FDA0002856083160000011
Input look-up table TinAnd output look-up table Tout
Step3, input stage: the first party P1 and the second party P2 use the input look-up table TinEncrypting respective input data into obfuscated inputs;
step 4, execution phase: the second party P2 performs the garbled circuit using the garbled input to obtain the garbled output
Figure FDA0002856083160000012
Step5, a commitment stage: first party P1 calculates output comparison table ToutAnd sends an output look-up table ToutTo the second party P2; second party P2 calculates the obfuscated output
Figure FDA0002856083160000017
And send the obfuscated output
Figure FDA0002856083160000018
To the first party P1;
step6, deposit stage: the first party P1 pays the first party deposit q on the blockchain1And publishes verification algorithm phi1The second party P2 pays the second party deposit q on the blockchain2And publish the testAuthentication algorithm phi2
Step7, claiming phase: first party P1 publishes output look-up table T on block chainoutSatisfies phi2(Tout) 1, thereby obtaining a second party deposit q2And executing Step 9; second party P2 publishes obfuscated outputs on blockchains
Figure FDA0002856083160000013
Satisfy the requirement of
Figure FDA0002856083160000014
Thereby obtaining a first party deposit q1And executing Step 9;
step8, refund stage: in Step6, if the first party P1 has not yet published the output lookup table T within the set timeoutThe second party P2 deposits a deposit q for the second party2Retrieving; if the second party P2 has not yet published the obfuscated output
Figure FDA0002856083160000015
The first party P1 deposits a first party deposit q1Retrieving;
step9, output stage: the first party P1 and the second party P2 decrypt the obfuscated output respectively to obtain a protocol result.
2. The block chain based fair two-party negotiation method of claim 1, wherein the specific details of the initialization in Step1 are as follows: function f' (x)1,x2L, V) are as follows:
f′(x1,x2L,V)=g(f(x1,x2),L,V)
f′(x1,x2l, V) first computes a first-party P1 and a second-party P2 computation function f (x)1,x2) The result is noted as y, and then the result y is transmitted into a function g, and a feature value V is inserted into y according to a position array L in the function g (y, L, V).
3. The method of claim 2A block chain-based fair two-party negotiation method is characterized in that Step2 specifically comprises the following steps: according to the Boolean circuit corresponding to the function f', all values in an input line, an output line and an internal line in the Boolean circuit are replaced by symmetric keys which are randomly generated and are not equal to each other; each logic gate is replaced by a ciphertext set, each item in the ciphertext set corresponds to each item of the logic gate truth table, the ciphertext is obtained by encrypting the output by taking the input of the corresponding item in the logic gate truth table as a key, and finally the confusion circuit file is obtained
Figure FDA0002856083160000016
At the same time, the corresponding relation between the plaintext and the key on the input line is recorded in the input look-up table TinIn the method, the corresponding relation between the plaintext and the secret key on the output line is recorded in an output comparison table ToutIn (1).
4. The block chain based fair two-party negotiation method of claim 3, wherein Step3 specifically comprises: the first party P1 and the second party P2 execute the OT protocol, the first party P1 sends an input lookup table TinProviding the second party P2 to assist the second party P2 in obtaining obfuscated inputs
Figure RE-FDA0002999605200000021
The first party P1 inputs the look-up table TinTo privacy data x1Encrypting as obfuscated input
Figure RE-FDA0002999605200000022
And sent to the second party P2, the second party P2 obtains the final obfuscated input
Figure RE-FDA0002999605200000023
5. The block chain based fair two-party negotiation method of claim 4, wherein Step5 specifically comprises: first party P1 calculates output comparison table ToutHash value h ofTAnd sends an output look-up table ToutHash value h ofTTo the second party P2; second party P2 calculates the obfuscated output
Figure FDA0002856083160000024
Hash value of
Figure FDA0002856083160000025
And sends the hash value
Figure FDA0002856083160000026
To the first party P1.
6. The block chain based fair two-party negotiation method of claim 5, wherein the specific process of Step6 is as follows:
first, a first party P1 initiates a transaction in the blockchain, the first party's spending q1And submit verification algorithm phi1Verification algorithm phi1The input of (a) is the obfuscated output
Figure FDA0002856083160000027
When the output is obfuscated
Figure FDA00028560831600000213
When the condition for verifying the correctness is satisfied,
Figure FDA0002856083160000028
and returning to the step1, otherwise,
Figure FDA0002856083160000029
returning to 0;
then, the second party P2 is used for a specified time
Figure FDA00028560831600000210
Is output in a mixed-up manner
Figure FDA00028560831600000214
The cost q of the first party can be obtained1Otherwise, the first party spends q after a prescribed time1Will be returned to the first party P1; similarly, the second party P2 initiates a transaction in the blockchain, the second party spending q2And submit verification algorithm phi2Verification algorithm phi2The input of (A) is an output comparison table ToutWhen T isoutWhen the correctness verification condition is satisfied, phi2(Tout) Return to 1, otherwise, phi2(Tout) Returning to 0;
finally, the first party P1 satisfies φ for use within a specified time2(Tout) Output look-up table T of 1outThe cost q of the second party can be obtained2Otherwise, after a timeout, the cost of the second party q2Will be returned to the second party P2.
7. The block chain based fair two-party negotiation method of claim 6, wherein the specific process of Step7 is as follows: the first party P1 obtains the verification algorithm phi submitted by the second party P2 from the blockchain within a prescribed time after confirming the uplink of the deposit transaction of the second party P22And locally calculates phi2(Tout) If phi is2(Tout) If 1, publish the output comparison table T in the block chainoutTo obtain a second party deposit q2Otherwise, executing Step8 after time out; similarly, the second party P2 verifies the local account at a predetermined time after confirming the uplink of the deposit transaction of the first party P1
Figure FDA00028560831600000211
Thereafter, obfuscated outputs are published in a blockchain
Figure FDA00028560831600000212
To obtain a first party deposit q1Otherwise, executing Step8 after time out.
8. The block chain based fair two-party negotiation method of claim 7, wherein Step9 is performed by: when step Setp 8 is performed normally, the first party P1 and the second party P2 both obtain a confounding output
Figure FDA00028560831600000217
Output look-up table ToutAnd a position array L, the first party P1 and the second party P2 according to the output look-up table ToutDecrypting obfuscated outputs
Figure FDA00028560831600000216
A plaintext output z is obtained and the eigenvalues are then removed from z according to the position array, thus obtaining a result y of the protocol.
9. A system for implementing the block chain based fair two-party negotiation method of claim 8, wherein the system comprises a client and a block chain, and wherein the client comprises the following modules:
a request module: initiating a query and a modification two-party calculation request to a request registration contract of a block chain;
constructing a module: responsible for constructing the garbled circuit;
an evaluation module: responsible for executing the garbled circuit;
a deposit module: submitting, claiming and returning the deposit to a deposit management module of the block chain;
an output module: and decrypting to obtain a final calculation result.
10. The system of claim 9, wherein the blockchain comprises the following intelligent contracts:
request for registration of a contract: registering and recording all two-party calculation requests;
a factory contract: for each responded two-party calculation request, initiating a deposit management contract;
deposit management contracts: and processing the submission, claiming and return requests of the deposit of the two parties in the calculation process of the two parties at one time.
CN202011547454.2A 2020-12-23 2020-12-23 Fair two-party negotiation method and system based on block chain Active CN113222591B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011547454.2A CN113222591B (en) 2020-12-23 2020-12-23 Fair two-party negotiation method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011547454.2A CN113222591B (en) 2020-12-23 2020-12-23 Fair two-party negotiation method and system based on block chain

Publications (2)

Publication Number Publication Date
CN113222591A true CN113222591A (en) 2021-08-06
CN113222591B CN113222591B (en) 2022-12-27

Family

ID=77085900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011547454.2A Active CN113222591B (en) 2020-12-23 2020-12-23 Fair two-party negotiation method and system based on block chain

Country Status (1)

Country Link
CN (1) CN113222591B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140372769A1 (en) * 2013-06-18 2014-12-18 Sap Ag Automatic Protocol Selection in Mixed-Protocol Secure Computation
CN109815728A (en) * 2018-12-21 2019-05-28 暨南大学 The fair contract with secret protection based on block chain signs method
CN109886687A (en) * 2019-02-28 2019-06-14 矩阵元技术(深圳)有限公司 A kind of result verification method and system for realizing multi-party computations based on block chain
US20200090552A1 (en) * 2018-09-18 2020-03-19 Baidu Online Network Technology (Beijing) Co., Ltd. Secure multi-party computation method, device, apparatus and computer-readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140372769A1 (en) * 2013-06-18 2014-12-18 Sap Ag Automatic Protocol Selection in Mixed-Protocol Secure Computation
US20200090552A1 (en) * 2018-09-18 2020-03-19 Baidu Online Network Technology (Beijing) Co., Ltd. Secure multi-party computation method, device, apparatus and computer-readable storage medium
CN109815728A (en) * 2018-12-21 2019-05-28 暨南大学 The fair contract with secret protection based on block chain signs method
CN109886687A (en) * 2019-02-28 2019-06-14 矩阵元技术(深圳)有限公司 A kind of result verification method and system for realizing multi-party computations based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李沓等: "委托计算下基于区块链的公平支付方案", 《通信学报》 *

Also Published As

Publication number Publication date
CN113222591B (en) 2022-12-27

Similar Documents

Publication Publication Date Title
US9009464B2 (en) Anonymous register system and method thereof
US7840813B2 (en) Method and system with authentication, revocable anonymity and non-repudiation
Liu et al. Blockchain-cloud transparent data marketing: Consortium management and fairness
CN112839046B (en) Traceable anonymous crowdsourcing method and system based on block chain
CN113127926B (en) Method, system, storage medium and computer for analyzing statistical correlation of privacy data
Xue et al. Blockchain-based fair and fine-grained data trading with privacy preservation
US20230379175A1 (en) Challenge-response protocol based on physically unclonable functions
GB2599404A (en) Verification system and method
CN115913513B (en) Distributed trusted data transaction method, system and device supporting privacy protection
GB2599416A (en) Authentication system and method
Barkataki et al. On achieving secure collaboration in supply chains
US20240202718A1 (en) Blockchain based system and method
Shi Quantum sealed-bid auction without a trusted third party
US20230362019A1 (en) Physically unclonable functions storing response values on a data store
Huynh et al. A reliability guaranteed solution for data storing and sharing
Tate et al. Mobile Agent Security Through Multi-Agent Cryptographic Protocols.
Deepika et al. Blockchain-based decentralized security using Crypto-Proof of Stake for securing sensitive personal health care records
Hou et al. Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud
CN110519045B (en) Anti-quantum computing alliance chain transaction method and system based on group asymmetric key pool
JP7539170B2 (en) Method for providing oracle service of blockchain network using zero-knowledge proof and aggregator terminal using the same
Gunupudi et al. Generalized non-interactive oblivious transfer using count-limited objects with applications to secure mobile agents
CN113222591B (en) Fair two-party negotiation method and system based on block chain
CN116318901A (en) Privacy and verifiable internet of things data aggregation method integrating blockchain
US20230370288A1 (en) Physically unclonable functions storing response values on a blockchain
Zhong et al. An Efficient Electronic English Auction System with a Secure On‐Shelf Mechanism and Privacy Preserving

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant