CN113222591A - Fair two-party negotiation method and system based on block chain - Google Patents
Fair two-party negotiation method and system based on block chain Download PDFInfo
- Publication number
- CN113222591A CN113222591A CN202011547454.2A CN202011547454A CN113222591A CN 113222591 A CN113222591 A CN 113222591A CN 202011547454 A CN202011547454 A CN 202011547454A CN 113222591 A CN113222591 A CN 113222591A
- Authority
- CN
- China
- Prior art keywords
- party
- output
- deposit
- input
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000012795 verification Methods 0.000 claims abstract description 21
- 238000004364 calculation method Methods 0.000 claims description 26
- 230000008569 process Effects 0.000 claims description 16
- 230000000977 initiatory effect Effects 0.000 claims description 6
- 238000011156 evaluation Methods 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 230000004048 modification Effects 0.000 claims description 2
- 238000012986 modification Methods 0.000 claims description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a block chain-based fair two-party negotiation method and a block chain-based fair two-party negotiation system, wherein the method comprises the following steps of: 1. an initialization stage: the first party P1 and the second party P2 negotiate a determination function f'; 2. and (3) a confusion stage: p1 constructs the function f' into the confusion circuit, and obtains the confusion circuit file, the input comparison table and the output comparison table; 3. an input stage: the first party and the second party use the input comparison table to encrypt respective input data into an obfuscated input; 4. an execution stage: the second party using the obfuscated input to execute the obfuscated circuit to obtain an obfuscated output; 5. a commitment stage: the first party calculates the commitment of the output comparison table and sends the commitment of the output comparison table to the second party; 6. the first party pays a first party deposit and publishes a verification algorithm on the blockchain, and the second party pays a second party deposit and publishes a verification algorithm on the blockchain; 7. a claiming stage; 8. a refund stage; 9. the first party and the second party respectively decrypt and confuse the output to obtain a protocol result.
Description
Technical Field
The invention relates to the field of secure multiparty computation, in particular to a block chain-based fair two-party negotiation method and system.
Background
Secure multi-party computing is an important privacy protection technique that allows multiple parties to jointly compute using their respective private data and ensures that the private data of each party is not available to other parties. The garbled circuit protocol is a classical two-way computing protocol first proposed by Yao, Andrew C in "Protocols for secure computers," 23rd annual simple on bases of computer science (sfcs 1982), IEEE, 1982. The garbled circuit protocol constructs an arbitrary algorithm as a garbled circuit from the level of the underlying logic circuit, and one part constructing the garbled circuit is called a garbled party and the other part is called an evaluator. After the confusion party constructs the confusion circuit, the two parties encrypt respective private inputs into confusion inputs; then, the evaluator executes the confusion circuit by using the confusion input to obtain the confusion output, and any information of the privacy input cannot be obtained in the calculation process; finally, both parties decrypt and confuse and output to obtain a calculation result.
Although the confusion circuit protocol can ensure privacy protection, the fairness that both parties obtain the protocol result cannot be ensured. Fairness of the protocol means that either all participants of the protocol can get the result of the protocol or none of the participants gets the result of the protocol. In the final decryption stage of the garbled circuit protocol, the two parties can decrypt independently only by acquiring the data of the other party. Then the party that first obtained the partner data may exit the protocol or provide the wrong data, thereby preventing the partner from obtaining the results of the protocol. Gao H, Ma Z, Luo S et al in Bfr-mpc: a block-based fair and robust multi-party calculation scheme [ J ]. IEEE Access, 2019, 7: 110439 and 110450, a block chain-based fair multi-party calculation scheme is proposed, fairness in a Yao's circuit protocol process is guaranteed through a block chain technology, however, the scheme still depends on a credible third party, a completely credible third party does not exist in the real world, and malicious behaviors of the third party inevitably destroy the fairness of the protocol.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a block chain-based fair two-party negotiation method, which carries out the data exchange process in the confusion circuit protocol on a block chain and punishs the behavior of a malicious damage protocol in digital currency, thereby ensuring that both parties can obtain the result of the protocol. Meanwhile, the invention also discloses a two-party negotiation system based on the block chain.
The invention is realized by at least one of the following technical schemes.
A block chain based fair two-party negotiation method, the method comprises the following steps:
step1, initialization stage: the first party P1 and the second party P2 negotiate a determining function f', P1 to prepare for entering the privacy data x of the first party1P2 prepares to input the private data x of the second party2A position array L and a characteristic value V;
step2, confusion phase: p1 constructs the garbled circuit by the function f' to obtain the garbled circuit fileInput look-up table TinAnd output look-up table Tout;
Step3, input stage: the first party P1 and the second party P2 use the input look-up table TinEncrypting respective input data into obfuscated inputs;
step 4, execution phase: the second party P2 performs the garbled circuit using the garbled input to obtain the garbled output
Step5, a commitment stage: first party P1 calculates output comparison table ToutAnd sends an output look-up table ToutTo the second party P2; second party P2 calculates the obfuscated outputAnd send the obfuscated outputTo the first party P1;
step6, deposit stage: the first party P1 pays the first party deposit q on the blockchain1And publishes verification algorithm phi1The second party P2 pays the second party deposit q on the blockchain2And publishes verification algorithm phi2;
Step7, claiming phase: first party P1 publishes output look-up table T on block chainoutSatisfies phi2(Tout) 1, thereby obtaining a second party deposit q2And executing Step 9; second party P2 publishes obfuscated outputs on blockchainsSatisfy the requirement ofThereby obtaining a first party deposit q1And executing Step 9;
step8, refund stage: in Step6, if the first party P1 has not yet published the output lookup table T within the set timeoutThe second party P2 deposits a deposit q for the second party2Retrieving; if the second party P2 has not yet published the obfuscated outputThe first party P1 deposits a first party deposit q1Retrieving;
step9, output stage: the first party P1 and the second party P2 decrypt the obfuscated output respectively to obtain a protocol result.
Preferably, the specific details of the initialization in Step1 are as follows: function f' (x)1,x2L, V) are as follows:
f′(x1,x2,L,V)=g(f(x1,x2),L,V)
f′(x1,x2l, V) first computes a first-party P1 and a second-party P2 computation function f (x)1,x2) The result is noted as y, and then the result y is transmitted into a function g, and a feature value V is inserted into y according to a position array L in the function g (y, L, V).
Preferably, Step2 hasThe body is as follows: according to the Boolean circuit corresponding to the function f', all values in an input line, an output line and an internal line in the Boolean circuit are replaced by symmetric keys which are randomly generated and are not equal to each other; each logic gate is replaced by a cipher text set, each item in the cipher text set corresponds to each item of the logic gate truth table, the cipher text obtained by encrypting the output by taking the input of the corresponding item in the logic gate truth table as a key is obtained, and finally the confusion circuit file is obtainedAt the same time, the corresponding relation between the plain text and the key on the input line is recorded in the input look-up table TinIn the method, the corresponding relation between the plaintext and the secret key on the output line is recorded in the output look-up table ToutIn (1).
Preferably, Step3 is specifically: the first party P1 and the second party P2 execute the OT protocol, the first party P1 sends an input lookup table TinProviding the second party P2 to assist the second party P2 in obtaining obfuscated inputsThe first party P1 inputs the look-up table TinTo privacy data x1Encrypting as obfuscated inputAnd sent to the second party P2, the second party P2 obtains the final obfuscated input
Preferably, Step5 specifically includes: first party P1 calculates output comparison table ToutHash value h ofTAnd sends an output look-up table ToutHash value h ofTTo the second party P2; second party P2 calculates the obfuscated outputHash value ofAnd sends the hash valueTo the first party P1.
Preferably, the specific process of Step6 is as follows:
first, a first party P1 initiates a transaction in the blockchain, the first party's spending q1And submit verification algorithm phi1Verification algorithm phi1The input of (a) is the obfuscated outputWhen the output is obfuscatedWhen the condition for verifying the correctness is satisfied,and returning to the step1, otherwise,returning to 0;
then, the second party P2 is used for a specified timeIs output in a mixed-up mannerThe cost q of the first party can be obtained1Otherwise, the first party spends q after a prescribed time1Will be returned to the first party P1; similarly, the second party P2 initiates a transaction in the blockchain, the second party's cost q2And submit verification algorithm phi2Verification algorithm phi2The input of (A) is an output comparison table ToutWhen T isoutWhen the correctness verification condition is satisfied, phi2(Tout) Return to 1, otherwise, phi2(Tout) Returning to 0;
finally, the first party P1 satisfies φ for use within a specified time2(Tout) Output look-up table T of 1outThe cost q of the second party can be obtained2Otherwise, after a timeout, the cost of the second party q2Will be returned to the second party P2.
Preferably, the specific process of Step7 is as follows: the first party P1 obtains the verification algorithm φ submitted by the second party P2 from the blockchain within a specified time after confirming the uplink of the deposit transaction of the second party P22And locally calculates phi2(Tout) If phi is2(Tout) If 1, publish the output comparison table T in the block chainoutTo obtain a second party deposit q2Otherwise, executing Step8 after time out; similarly, the second party P2 verifies the local account at a predetermined time after confirming the uplink of the deposit transaction of the first party P1Thereafter, obfuscated outputs are published in a blockchainTo obtain a first party deposit q1Otherwise, executing Step8 after time out.
Preferably, the specific process of Step9 is as follows: when step Setp 8 is performed normally, the first party P1 and the second party P2 both obtain a confounding outputOutput look-up table ToutAnd a position array L, the first party P1 and the second party P2 according to the output look-up table ToutDecrypting obfuscated outputsA plaintext output z is obtained and the eigenvalues are then removed from z according to the position array, thus obtaining a result y of the protocol.
A system for implementing the block chain based fair two-party negotiation method, the system comprising a client and a block chain, wherein the client comprises the following modules:
a request module: initiating a query and a modification two-party calculation request to a request registration contract of a block chain;
constructing a module: responsible for constructing the garbled circuit;
an evaluation module: responsible for executing the garbled circuit;
a deposit module: submitting, claiming and returning the deposit to a deposit management module of the block chain;
an output module: and decrypting to obtain a final calculation result.
Preferably, the blockchain comprises the following intelligent contracts:
request for registration of a contract: registering and recording all two-party calculation requests;
a factory contract: for each responded two-party calculation request, initiating a deposit management contract;
deposit management contracts: and processing the submission, claiming and return requests of the deposit of the two parties in the calculation process of the two parties at one time.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. the invention introduces the block chain to realize the penalty mechanism, and ensures the fairness of the protocol of the confusion circuit. Our protocol performs the steps of fairness problem in the original protocol on the block chain based on the confusing circuit protocol, and the participant is penalized with digital currency if he/she is willing to exit the protocol. Furthermore, we propose efficient, chain-executed authentication algorithms to prevent participants from providing erroneous data.
2. Compared with the traditional negotiation system, the invention realizes the two-party negotiation system and has the following advantages: a. and (4) privacy protection. The confusion circuit protocol realizes that the participants do not need to reveal the original data in the calculation process, thereby protecting the privacy of the data; b. And (4) fairness. By realizing data exchange on the block chain, the participators can obtain the final calculation result; c. and (4) decentralizing. The system does not need a centralized server to maintain data, and avoids the risk of malicious data tampering by the central server.
Drawings
FIG. 1 is a flow chart of a block chain based fairness two-party protocol according to an embodiment of the present invention;
fig. 2 is an architecture diagram of a block chain-based two-party negotiation system according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
As shown in fig. 1 and fig. 2, the embodiment of the present invention introduces a block chain technique to implement a fair two-party negotiation method based on the garbled circuit protocol. A block chain based fair two-party negotiation method comprises the following steps:
step (1a), the first party P1 and the second party P2 negotiate to determine initial parameters including the content (represented by the primitive function f) calculated together, the length m of the feature array, the deposit q of the first party P11Deposit q of the second party P22And a time limit τ;
step (1b), the first party P1 transforms the original function f into a function f ', the function f' accepts the input x of the first party P11And input x of a second party P22The position array L, the characteristic value V, f' are in f (x)1,x2) Thereafter, the feature value is inserted into the result according to the location array L, the feature value V provided by the second party P2, so that the result of the garbled circuit protocol is partially visible to the second party P2, whereby the second party P2 has a look-up table T generated to verify the first party P1outThe ability of the cell to perform. The function f' is shown in table 1.
Table 1 function f'
Step (2) -step (4) performing the garbled circuit protocol calculation f' (x) for the first party P1 and the second party P21,x2V, L). The specific process is as follows:
step (2), the first party P1 constructs the confusion circuit from the function f' to obtain the confusion circuit fileInput look-up table TinOutput the look-up table ToutAnd will beTo the second party P2;
step (3a), the first party P1 and the second party P2 execute the OT protocol, the first party P1 sends the input lookup table TinHelping the second party P2 to obtain the obfuscated input
Step (3b), the first party P1 inputs the comparison table TinTo privacy data x1Encrypting as obfuscated inputAnd sent to the second party P2;
step (4), the second party P2 uses the final obfuscated inputExecution obfuscation circuitObtaining obfuscated outputs
The steps (5) - (8) are that the first party P1 and the second party P2 exchange the output comparison table T fairlyoutAnd obfuscating the outputThe specific process is as follows:
step (5b), the first party P1 calculates ToutHash value h ofTAnd sends hTTo the second party P2.
Step (6a), the first party P1 submits a first party deposit q1First party verification algorithm phi1And verifying the conditionsWhere position i is randomly chosen from {1, 2., n } by the first party P1, the keyFor outputting the key corresponding to bit 0 in the ith entry in the look-up tableTo output the key corresponding to bit 1 in the ith entry in the look-up table,for the aliasing output in step (5a)The Ha-chi value of (c). First party authentication algorithm phi1As shown in table 2;
step (6b), the second party P2 submits the second party deposit q2Second party verification algorithm phi2And verifying the conditionsWhereinFor obfuscating the outputAt a specific position inA key array of keys, each item, h, in a specific location, i.e. location array LTFor outputting the look-up table T in step (5b)outThe hash value of (1). Second party verification algorithm phi2As shown in table 3.
Step (7a), the first party P1 verifies phi locally within tau time2(Tout) Issuing a T on a blockchain after 1outObtaining a second party deposit q2;
Step (7b), the second party P2 verifies locally within tau timePost publishing on blockchainObtaining a first party deposit q1。
Step (8a), after the time of tau, if the first party P1 does not publish ToutThe second party P2 deposits a deposit q for the second party2Retrieving;
step (8b), after the time of tau, if the second party P2 is not publishedThe first party P1 deposits a first party deposit q1And (4) retrieving.
Fair exchange T between a first party P1 and a second party P2outAndafter that, both parties have obtainedThe first party P1 and the second party P2 locally execute the step (9):
step (9) according to ToutDecrypting obfuscated outputsA plaintext output z is obtained and then the remove feature value from z is obtained according to the remove feature algorithm of table 4 to obtain the result y of the protocol.
TABLE 2 first party authentication Algorithm
TABLE 3 second party verification algorithm
TABLE 4 Decharacterization Algorithm
The specific process of the protocol of the embodiment of the invention is shown in table 5 as a fair two-party negotiation method, wherein the block chain part is detailed in table 6.
TABLE 5 Fair two-party negotiation method
TABLE 6 Block chain
An embodiment of the present invention further provides a two-party negotiation system based on a blockchain, where the system includes a client and a blockchain, as shown in fig. 2. Wherein the client comprises the following modules: a request module: initiating, inquiring and modifying a two-party calculation request to a request registration contract of a block chain; constructing a module: responsible for constructing the garbled circuit; an evaluation module: responsible for executing the garbled circuit; a deposit module: submitting, claiming and returning the deposit to a deposit management module of the block chain; an output module: and decrypting to obtain a final calculation result. The blockchain includes the following intelligent contracts: request for registration of a contract: registering and recording all two-party calculation requests; a factory contract: for each responded two-party calculation request, initiating a deposit management contract; deposit management contracts: processing the request of submitting, claiming and returning the deposit of the two parties in the calculation process of the two parties at one time.
In summary, the embodiments of the present invention are a block chain based fair two-party negotiation method and a block chain based two-party negotiation system using the same. The protocol calculates the modified function f' by operating an original (unfair) garbled circuit protocol, so that key data can be efficiently verified on a chain, a data exchange process is carried out on a block chain, and digital currency punishment is carried out on a participant who maliciously quits the protocol or publishes error data, thereby realizing the fairness of a two-party negotiation method. The two-party negotiation system based on the block chain realizes two-party calculation of privacy protection, fairness and decentralization, a user initiates or responds to a two-party calculation request on the block chain, then executes a confusion circuit protocol under the chain, obtains key intermediate data while protecting data privacy, exchanges the key data on the chain to ensure fairness, and finally obtains a final result through local calculation.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can substitute or change the technical solution and the inventive concept of the present invention within the scope of the present invention.
Claims (10)
1. A block chain based fair two-party negotiation method is characterized by comprising the following steps:
step1, initialization stage: the first party P1 and the second party P2 negotiate a determining function f', P1 to prepare for input of privacy data x of the first party1P2 prepares to input the private data x of the second party2A position array L and a characteristic value V;
step2, confusion phase: p1 constructs the garbled circuit by the function f' to obtain the garbled circuit fileInput look-up table TinAnd output look-up table Tout;
Step3, input stage: the first party P1 and the second party P2 use the input look-up table TinEncrypting respective input data into obfuscated inputs;
step 4, execution phase: the second party P2 performs the garbled circuit using the garbled input to obtain the garbled output
Step5, a commitment stage: first party P1 calculates output comparison table ToutAnd sends an output look-up table ToutTo the second party P2; second party P2 calculates the obfuscated outputAnd send the obfuscated outputTo the first party P1;
step6, deposit stage: the first party P1 pays the first party deposit q on the blockchain1And publishes verification algorithm phi1The second party P2 pays the second party deposit q on the blockchain2And publish the testAuthentication algorithm phi2;
Step7, claiming phase: first party P1 publishes output look-up table T on block chainoutSatisfies phi2(Tout) 1, thereby obtaining a second party deposit q2And executing Step 9; second party P2 publishes obfuscated outputs on blockchainsSatisfy the requirement ofThereby obtaining a first party deposit q1And executing Step 9;
step8, refund stage: in Step6, if the first party P1 has not yet published the output lookup table T within the set timeoutThe second party P2 deposits a deposit q for the second party2Retrieving; if the second party P2 has not yet published the obfuscated outputThe first party P1 deposits a first party deposit q1Retrieving;
step9, output stage: the first party P1 and the second party P2 decrypt the obfuscated output respectively to obtain a protocol result.
2. The block chain based fair two-party negotiation method of claim 1, wherein the specific details of the initialization in Step1 are as follows: function f' (x)1,x2L, V) are as follows:
f′(x1,x2,L,V)=g(f(x1,x2),L,V)
f′(x1,x2l, V) first computes a first-party P1 and a second-party P2 computation function f (x)1,x2) The result is noted as y, and then the result y is transmitted into a function g, and a feature value V is inserted into y according to a position array L in the function g (y, L, V).
3. The method of claim 2A block chain-based fair two-party negotiation method is characterized in that Step2 specifically comprises the following steps: according to the Boolean circuit corresponding to the function f', all values in an input line, an output line and an internal line in the Boolean circuit are replaced by symmetric keys which are randomly generated and are not equal to each other; each logic gate is replaced by a ciphertext set, each item in the ciphertext set corresponds to each item of the logic gate truth table, the ciphertext is obtained by encrypting the output by taking the input of the corresponding item in the logic gate truth table as a key, and finally the confusion circuit file is obtainedAt the same time, the corresponding relation between the plaintext and the key on the input line is recorded in the input look-up table TinIn the method, the corresponding relation between the plaintext and the secret key on the output line is recorded in an output comparison table ToutIn (1).
4. The block chain based fair two-party negotiation method of claim 3, wherein Step3 specifically comprises: the first party P1 and the second party P2 execute the OT protocol, the first party P1 sends an input lookup table TinProviding the second party P2 to assist the second party P2 in obtaining obfuscated inputsThe first party P1 inputs the look-up table TinTo privacy data x1Encrypting as obfuscated inputAnd sent to the second party P2, the second party P2 obtains the final obfuscated input
5. The block chain based fair two-party negotiation method of claim 4, wherein Step5 specifically comprises: first party P1 calculates output comparison table ToutHash value h ofTAnd sends an output look-up table ToutHash value h ofTTo the second party P2; second party P2 calculates the obfuscated outputHash value ofAnd sends the hash valueTo the first party P1.
6. The block chain based fair two-party negotiation method of claim 5, wherein the specific process of Step6 is as follows:
first, a first party P1 initiates a transaction in the blockchain, the first party's spending q1And submit verification algorithm phi1Verification algorithm phi1The input of (a) is the obfuscated outputWhen the output is obfuscatedWhen the condition for verifying the correctness is satisfied,and returning to the step1, otherwise,returning to 0;
then, the second party P2 is used for a specified timeIs output in a mixed-up mannerThe cost q of the first party can be obtained1Otherwise, the first party spends q after a prescribed time1Will be returned to the first party P1; similarly, the second party P2 initiates a transaction in the blockchain, the second party spending q2And submit verification algorithm phi2Verification algorithm phi2The input of (A) is an output comparison table ToutWhen T isoutWhen the correctness verification condition is satisfied, phi2(Tout) Return to 1, otherwise, phi2(Tout) Returning to 0;
finally, the first party P1 satisfies φ for use within a specified time2(Tout) Output look-up table T of 1outThe cost q of the second party can be obtained2Otherwise, after a timeout, the cost of the second party q2Will be returned to the second party P2.
7. The block chain based fair two-party negotiation method of claim 6, wherein the specific process of Step7 is as follows: the first party P1 obtains the verification algorithm phi submitted by the second party P2 from the blockchain within a prescribed time after confirming the uplink of the deposit transaction of the second party P22And locally calculates phi2(Tout) If phi is2(Tout) If 1, publish the output comparison table T in the block chainoutTo obtain a second party deposit q2Otherwise, executing Step8 after time out; similarly, the second party P2 verifies the local account at a predetermined time after confirming the uplink of the deposit transaction of the first party P1Thereafter, obfuscated outputs are published in a blockchainTo obtain a first party deposit q1Otherwise, executing Step8 after time out.
8. The block chain based fair two-party negotiation method of claim 7, wherein Step9 is performed by: when step Setp 8 is performed normally, the first party P1 and the second party P2 both obtain a confounding outputOutput look-up table ToutAnd a position array L, the first party P1 and the second party P2 according to the output look-up table ToutDecrypting obfuscated outputsA plaintext output z is obtained and the eigenvalues are then removed from z according to the position array, thus obtaining a result y of the protocol.
9. A system for implementing the block chain based fair two-party negotiation method of claim 8, wherein the system comprises a client and a block chain, and wherein the client comprises the following modules:
a request module: initiating a query and a modification two-party calculation request to a request registration contract of a block chain;
constructing a module: responsible for constructing the garbled circuit;
an evaluation module: responsible for executing the garbled circuit;
a deposit module: submitting, claiming and returning the deposit to a deposit management module of the block chain;
an output module: and decrypting to obtain a final calculation result.
10. The system of claim 9, wherein the blockchain comprises the following intelligent contracts:
request for registration of a contract: registering and recording all two-party calculation requests;
a factory contract: for each responded two-party calculation request, initiating a deposit management contract;
deposit management contracts: and processing the submission, claiming and return requests of the deposit of the two parties in the calculation process of the two parties at one time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011547454.2A CN113222591B (en) | 2020-12-23 | 2020-12-23 | Fair two-party negotiation method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011547454.2A CN113222591B (en) | 2020-12-23 | 2020-12-23 | Fair two-party negotiation method and system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113222591A true CN113222591A (en) | 2021-08-06 |
CN113222591B CN113222591B (en) | 2022-12-27 |
Family
ID=77085900
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011547454.2A Active CN113222591B (en) | 2020-12-23 | 2020-12-23 | Fair two-party negotiation method and system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113222591B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140372769A1 (en) * | 2013-06-18 | 2014-12-18 | Sap Ag | Automatic Protocol Selection in Mixed-Protocol Secure Computation |
CN109815728A (en) * | 2018-12-21 | 2019-05-28 | 暨南大学 | The fair contract with secret protection based on block chain signs method |
CN109886687A (en) * | 2019-02-28 | 2019-06-14 | 矩阵元技术(深圳)有限公司 | A kind of result verification method and system for realizing multi-party computations based on block chain |
US20200090552A1 (en) * | 2018-09-18 | 2020-03-19 | Baidu Online Network Technology (Beijing) Co., Ltd. | Secure multi-party computation method, device, apparatus and computer-readable storage medium |
-
2020
- 2020-12-23 CN CN202011547454.2A patent/CN113222591B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140372769A1 (en) * | 2013-06-18 | 2014-12-18 | Sap Ag | Automatic Protocol Selection in Mixed-Protocol Secure Computation |
US20200090552A1 (en) * | 2018-09-18 | 2020-03-19 | Baidu Online Network Technology (Beijing) Co., Ltd. | Secure multi-party computation method, device, apparatus and computer-readable storage medium |
CN109815728A (en) * | 2018-12-21 | 2019-05-28 | 暨南大学 | The fair contract with secret protection based on block chain signs method |
CN109886687A (en) * | 2019-02-28 | 2019-06-14 | 矩阵元技术(深圳)有限公司 | A kind of result verification method and system for realizing multi-party computations based on block chain |
Non-Patent Citations (1)
Title |
---|
李沓等: "委托计算下基于区块链的公平支付方案", 《通信学报》 * |
Also Published As
Publication number | Publication date |
---|---|
CN113222591B (en) | 2022-12-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9009464B2 (en) | Anonymous register system and method thereof | |
US7840813B2 (en) | Method and system with authentication, revocable anonymity and non-repudiation | |
Liu et al. | Blockchain-cloud transparent data marketing: Consortium management and fairness | |
CN112839046B (en) | Traceable anonymous crowdsourcing method and system based on block chain | |
CN113127926B (en) | Method, system, storage medium and computer for analyzing statistical correlation of privacy data | |
Xue et al. | Blockchain-based fair and fine-grained data trading with privacy preservation | |
US20230379175A1 (en) | Challenge-response protocol based on physically unclonable functions | |
GB2599404A (en) | Verification system and method | |
CN115913513B (en) | Distributed trusted data transaction method, system and device supporting privacy protection | |
GB2599416A (en) | Authentication system and method | |
Barkataki et al. | On achieving secure collaboration in supply chains | |
US20240202718A1 (en) | Blockchain based system and method | |
Shi | Quantum sealed-bid auction without a trusted third party | |
US20230362019A1 (en) | Physically unclonable functions storing response values on a data store | |
Huynh et al. | A reliability guaranteed solution for data storing and sharing | |
Tate et al. | Mobile Agent Security Through Multi-Agent Cryptographic Protocols. | |
Deepika et al. | Blockchain-based decentralized security using Crypto-Proof of Stake for securing sensitive personal health care records | |
Hou et al. | Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud | |
CN110519045B (en) | Anti-quantum computing alliance chain transaction method and system based on group asymmetric key pool | |
JP7539170B2 (en) | Method for providing oracle service of blockchain network using zero-knowledge proof and aggregator terminal using the same | |
Gunupudi et al. | Generalized non-interactive oblivious transfer using count-limited objects with applications to secure mobile agents | |
CN113222591B (en) | Fair two-party negotiation method and system based on block chain | |
CN116318901A (en) | Privacy and verifiable internet of things data aggregation method integrating blockchain | |
US20230370288A1 (en) | Physically unclonable functions storing response values on a blockchain | |
Zhong et al. | An Efficient Electronic English Auction System with a Secure On‐Shelf Mechanism and Privacy Preserving |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |