CN113472534A - Block chain data encryption method, equipment and storage medium - Google Patents

Block chain data encryption method, equipment and storage medium Download PDF

Info

Publication number
CN113472534A
CN113472534A CN202110837980.0A CN202110837980A CN113472534A CN 113472534 A CN113472534 A CN 113472534A CN 202110837980 A CN202110837980 A CN 202110837980A CN 113472534 A CN113472534 A CN 113472534A
Authority
CN
China
Prior art keywords
block chain
quantum
encrypting
node
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110837980.0A
Other languages
Chinese (zh)
Inventor
江漫滔
古莹莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Tanhong Information Technology Co ltd
Original Assignee
Xiamen Tanhong Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Tanhong Information Technology Co ltd filed Critical Xiamen Tanhong Information Technology Co ltd
Priority to CN202110837980.0A priority Critical patent/CN113472534A/en
Publication of CN113472534A publication Critical patent/CN113472534A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a block chain data encryption method, equipment and a storage medium, and belongs to the technical field of block chain data encryption. The method comprises the following steps: encrypting the block chain data by using a quantum encryption protocol to generate a quantum key; wherein at least one node in the block chain is a quantum computer. The block chain data storage safety problem can be completely solved, and meanwhile, the throughput can be improved.

Description

Block chain data encryption method, equipment and storage medium
Technical Field
The present invention relates to the field of block chain data encryption technologies, and in particular, to a block chain data encryption method, device, and storage medium.
Background
Existing cloud service providers may offer a basic cryptographic key scheme to protect cloud-based application development and services, or they may decide to give these protective measures to the cloud user. When a cloud service provider provides a scheme for supporting robust key management to develop, more work needs to be done to overcome the obstacle of adopting a key management technology; the protection key store must be protected just as well for other sensitive data. Protection is necessary in storage, transmission and backup. Improper key storage may compromise all encrypted data; access to the key store, which must be restricted to only certain entities that need a separate key, and associated policies to manage the key store, use role separation to facilitate access control: the entity using a given key cannot be the entity storing the key; finally, it is key backup and recovery, and losing keys undoubtedly means that the data protected by these keys is lost. Although this is an effective process of destroying data, accidental loss of keys protecting mission-critical data destroys a business, and so must implement secure backup and recovery solutions, which are security problems and solutions in cloud environments, there is no "fully secure" solution in the market today.
When data encryption, private key encryption and other conditions are involved in the block chain technology, the block chain technology is realized by adopting a technical means of combining symmetric encryption and asymmetric encryption, particularly, a Hash algorithm is used for solving the problem, which is one of core technologies for ensuring that block chain data cannot be tampered, but the Hash encryption algorithm has the great problems of low encryption and decryption speed and long time; in addition, due to the different choices of the consensus algorithm, if the POW algorithm is selected, the calculation power is high, and the consensus process takes long time, which finally results in that a block takes longer time to form, and particularly, when the uplink data is larger and the application occasion has a requirement on throughput, the problem is more prominent; this is also one of the factors limiting the spread of the block chain technology.
Disclosure of Invention
1. Technical problem to be solved by the invention
In order to overcome the technical problems, the invention provides a block chain data encryption method, a block chain data encryption device and a block chain data encryption storage medium, which can completely solve the problem of block chain data storage safety and can improve the throughput.
2. Technical scheme
In order to solve the problems, the technical scheme provided by the invention is as follows:
a method of blockchain data encryption, comprising: encrypting the block chain data by using a quantum encryption protocol to generate a quantum key; wherein at least one node in the block chain is a quantum computer.
Optionally, the block chain data is an API interface address.
Optionally, the block chain node further includes any one or more of a satellite, a 5G base station, a fog computing node, a cloud computing center node, and an edge computing node.
Optionally, the two or more parties participating in the blockchain data communication include: any one or more of a quantum computer, a satellite, a 5G base station, a fog computing node, a cloud computing center node, an edge computing node and a terminal.
Optionally, the API interface address is a gateway interface address.
Optionally, the API interface address is a fragmented network interface address.
Optionally, the block chain data is encrypted by using a quantum encryption protocol to generate a quantum key; further comprises the following steps: and encrypting the block chain data and the time stamp of the time service center by using a quantum encryption protocol to generate a quantum key.
Optionally, the broadcast relay in the block chain includes a satellite or a 5G base station.
Furthermore, the present invention provides an apparatus comprising: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Accordingly, the present invention provides a storage medium storing a computer program which, when executed by a processor, implements a method as claimed in any one of the above.
3. Advantageous effects
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
when at least one node in the block chain is an optical quantum switch, namely a quantum computer is used as one of the nodes of the block chain, the ultra-low access loss of the quantum computer can be utilized to realize that the quantum computer is used as one of the nodes, and the block chain is formed by networking, wherein the networking mode can refer to the networking mode of the existing block chain system, and the block chain system applied by the Chinese invention patent with the application number of 202010392197.3 can also be adopted for networking; compared with the traditional encryption method, the block chain data is encrypted by using the quantum encryption protocol, and the method has the following advantages: 1. compared with Hash encryption, the encryption process is high in speed, and time spent on block chain data encryption is greatly reduced; 2. compared with the traditional algorithm such as RSA public key cryptography, the probability of being cracked is very low; 3. due to the characteristics of the quantum secret communication network, when the quantum key is distributed to two parties or multiple parties participating in the block chain data communication by using a quantum key distribution protocol, if an eavesdropper exists, the quantum state changes, so that the error rate of the quantum key received by the two parties or the multiple parties participating in the block chain data communication is improved, and the eavesdropping behavior of the eavesdropper is easy to detect, so that the safety of the encrypted block chain data can be improved; 4. because the quantum key is distributed between two parties or multiple parties participating in block chain data communication, if any party accidentally loses the key, the block chain data can be retrieved by other communication parties, and the condition of destroying one service cannot occur; 5. after the quantum computer is added into the block chain as a node, due to the super-strong computing power, the super-fast data transmission performance and the efficient time division multiplexing function, the defects of slow block data chaining, slow consensus, low throughput and the like can be overcome, and the application occasion and the range of the block chain are expanded; in the case of occasions with huge data volume, high safety requirement and high throughput requirement, such as live broadcasting and the like, no pressure is applied at all.
Drawings
FIG. 1 is a schematic diagram of an apparatus according to the present invention.
Fig. 2 is a flowchart of a block chain data encryption method according to an embodiment of the present invention.
Detailed Description
For a further understanding of the present invention, reference will now be made in detail to the embodiments illustrated in the drawings.
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. The terms first, second, and the like in the present invention are provided for convenience of describing the technical solution of the present invention, and have no specific limiting effect, but are all generic terms, and do not limit the technical solution of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings. The technical scheme of the embodiment of the application is that the Chinese patent application numbers are as follows: 202010551115.5, 202010392197.3 and 202010737059.4, the partial names and concepts are the same as, similar to or similar to those of the above patent application, and the meanings are the same.
Example 1
The present embodiment provides a method for encrypting blockchain data, as shown in fig. 2, including: encrypting the block chain data by using a quantum encryption protocol to generate a quantum key; wherein at least one node in the block chain is a quantum computer.
The quantum computer is an important component device of a quantum secret communication network, realizes physical switching of optical signal transmission links, completes optical fiber quantum channel link cross connection, and realizes networking and efficient time-sharing multiplexing functions of quantum key generation equipment. The optical quantum switch is one of quantum computers, has ultralow access loss, and ensures that the rate of key generation is not interfered; the switching speed is high, the system link establishment time is reduced, and the user experience is improved; high integration software, stiffness and structural design.
The block chain is composed of a plurality of nodes, at least one node in the block chain is an optical quantum switch, namely when a quantum computer is used as one of the nodes of the block chain, the quantum computer can be used as one of the nodes by utilizing the ultra-low access loss of the quantum computer, and the block chain is formed by networking; compared with the traditional encryption method, the block chain data is encrypted by using the quantum encryption protocol, and the method has the following advantages: 1. compared with Hash encryption, the encryption process is high in speed, and time spent on block chain data encryption is greatly reduced; 2. compared with the traditional algorithm such as RSA public key cryptography, the probability of being cracked is very low; 3. due to the characteristics of the quantum secret communication network, when the quantum key is distributed to two parties or multiple parties participating in the block chain data communication by using a quantum key distribution protocol, if an eavesdropper exists, the quantum state changes, so that the error rate of the quantum key received by the two parties or the multiple parties participating in the block chain data communication is improved, and the eavesdropping behavior of the eavesdropper is easy to detect, so that the safety of the encrypted block chain data can be improved; 4. because the quantum key is distributed between two parties or multiple parties participating in block chain data communication, if any party accidentally loses the key, the block chain data can be retrieved by other communication parties, and the condition of destroying one service cannot occur; 5. after the quantum computer is added into the block chain as a node, due to the super-strong computing power, the super-fast data transmission performance and the high-efficiency time division multiplexing function, the defects of slow block data chaining, slow consensus, low throughput and the like can be overcome, and the application occasion and the range of the block chain are expanded; in the case of large data volume, high safety requirement and high throughput requirement, no pressure is applied at all.
The blockchain data refers to various data transmitted, exchanged and stored in the blockchain, and includes but is not limited to blockchain account addresses, transactions, blocks, intelligent contracts and various messages; the blockchain data format is not limited and includes, but is not limited to, voice, text, picture, video, audio, and the like. The block chain data belongs to classical bit data in the existing network, and before the block chain data is encrypted by using a quantum encryption protocol, the classical bit data needs to be converted into quantum bit data so as to carry out quantum encryption, so that the block chain data is convenient to transmit in a quantum communication network; accordingly, after decryption, the qubit data needs to be converted into classical bit data in order to transmit the blockchain data content corresponding to the decrypted classical bit data in the existing network.
The quantum encryption protocol comprises: quantum key distribution protocol SARG04, Ekert91 protocol, MDI-QKD protocol, BB84 protocol, BBM92 protocol, measurement device independent quantum key distribution, or twin dual field quantum key distribution protocol (TF-QKD).
The quantum key distribution protocol SARG04 has a short transmission distance, has a very low influence on photon transmission due to environmental conditions such as noise, can encrypt a wireless channel, and is more adaptive to the IEEE802 standard protocol of the conventional network when passing through a conversion unit.
Three groups of basis vectors are used for measurement in the Ekert91 protocol, and two groups of non-orthogonal bases are used for measurement in the BBM92 protocol, so that the key generation efficiency is improved in comparison. In addition, unlike the Ekert91 protocol which uses the bell inequality to check for the presence of Eve eavesdropping, the BBM92 protocol uses a data post-processing method similar to the BB84 protocol to remove errors in the original key and information that may be revealed to Eve, resulting in a consistent security key string. The security of the BBM92 protocol is also independent of the entanglement source, since the operation of Eve on the entanglement source can be equivalently regarded as the interference on the channel caused by Eve in the entanglement source distribution process, and such a disturbance can be eliminated through the detection of error code discovery and the privacy amplification process. Furthermore, if the entanglement source and Alice's detector are put together to be the light source of Alice, then different measurements at different measurement basis vectors produce different BB84 states, and conversely any BB84 state can be produced by the above process. Thus, it appears to the outside that the light source is not different from Alice's single-photon source in the BB84 protocol. And the basis vector alignment process and the data post-processing process are the same as the BB84 protocol. Thus the BBM92 protocol is essentially equivalent to the BB84 protocol, and BBM92 can be considered an entangled version of the BB84 protocol.
As an optional implementation manner of this embodiment, the blockchain data is an API interface address. The API interface address is used as an interface address and exists between block chain subnets, between intelligent contracts, between a main network and a subnet, between side chains, between the main chain and the side chains and various storage spaces, between various virtual or physical devices and the like. When executing a transaction, there may be another program invoked through the API interface address, including but not limited to a smart contract, side chain, backbone, main network, subnet, etc. Especially, in some cases with high requirements on data confidentiality and large data volume, the possibility of uplink data leakage, monitoring and stealing can be prevented.
As an optional implementation manner of this embodiment, the block chain node further includes any one or any several of a satellite, a 5G base station, a fog computing node, a cloud computing center node, and an edge computing node. The satellite can be a black satellite, a quantum satellite and the like, the satellite is used as one of the nodes of the block chain, the satellite-ground integrated network is fused with the block chain, the block chain is formed by networking together, and the problems that the block chain and the existing network architecture cannot cover relatively far areas and data transmission is slow are solved.
The 5G base station is used as one of the nodes of the block chain, and the problem of too high loss in the quantum transmission process can be solved by utilizing the advantages of lossless transmission and high speed of a 5G transmission network.
The cloud computing center node and the edge computing nodes can play respective advantages, so that the coverage area of the block chain is large, the data storage capacity is large, and the throughput is high.
As an optional implementation manner of this embodiment, the two or more parties participating in the blockchain data communication include: any one or more of a quantum computer, a satellite, a 5G base station, a fog computing node, a cloud computing center node, an edge computing node and a terminal.
The terminal can be various devices such as a computer, a personal computer, a mobile phone, a PAD and the like, so that the application range and the application area are expanded, and the terminal is more popular.
As an optional implementation manner of this embodiment, the API interface address is a gateway interface address. Encrypting the gateway interface address by using a quantum encryption protocol to generate a quantum key, and distributing the quantum key to two parties or multiple parties accessing the gateway interface address by using a quantum key distribution protocol; the safety isolation of a main network and a side network, the safety isolation of a public chain and a private chain and the safety isolation between the main chain and the side chain as well as between the main chain and the parallel chain can be realized.
As an optional implementation manner of this embodiment, the API interface address is a fragmented network interface address. Encrypting the address of the fragmentation network interface by using a quantum encryption protocol to generate a quantum key, and distributing the quantum key to two parties or multiple parties accessing the address of the fragmentation network interface by using a quantum key distribution protocol; the safety isolation between the fragmentation networks of the ad hoc network and the safety isolation between the fragmentation networks and other networks can be realized.
As an optional implementation manner of this embodiment, the block chain data is encrypted by using a quantum encryption protocol to generate a quantum key; further comprises the following steps: and encrypting the block chain data and the time stamp of the time service center by using a quantum encryption protocol to generate a quantum key. And the uniqueness of the timestamp of the time service center is utilized to further improve the data security of the block chain.
As an optional implementation manner of this embodiment, the broadcast relay in the block chain includes a satellite or a 5G base station. The technical problem of large transmission loss of quantum communication is solved by utilizing the broadcasting capability and the transmission performance of a satellite or a 5G base station.
The method for encrypting blockchain data provided by any technical scheme in this embodiment can be applied to the networking described in the chinese patent application with application number 202010392197.3. In an embodiment, the blockchain encryption may be applied to a blockchain system in the chinese patent application with application number 202010392197.3, where a root chain layer in a three-layer network architecture is applied, and the blockchain data encryption is faster by using advantages of strong capacity expansion, large throughput, small delay, fast transmission speed, and the like.
Hardware, namely a quantum computer and the like, required in quantum computing is taken as one of nodes in the networking described in the Chinese patent application with the application number of 202010392197.3, the advantages of hardware conditions such as edge computing, fog computing and the like are carried, conditions of virtual network resources are utilized, unified architecture, unified interfaces and unified management can be adopted to the maximum extent with cloud computing, and all software and hardware resources are taken as unified resources to be managed, scheduled and purchased and sold. The requirement of large bandwidth, large connection and low time delay at the terminal side cannot be met by changing centralized cloud deployment. By combining the concept of edge computing, cloud computing is inevitably developed to the next technical stage, namely the capability of cloud computing is expanded to an edge side closer to a terminal, the sinking of cloud computing service is realized through the unified management and control of cloud edge ends, and end-to-end cloud service is provided; therefore, the networking policy described in the chinese patent application with application number 202010392197.3 provides a basis for the block chain data encryption method in any of the schemes in the embodiments of the present application.
Example 2
This embodiment provides a block chain data encryption device, the device includes: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Furthermore, the present embodiment provides a storage medium storing a computer program that, when executed by a processor, implements the method as described in embodiment 1 above.
Fig. 1 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 1, as another aspect, the present application also provides an apparatus including one or more Central Processing Units (CPUs) 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data necessary for the operation of the apparatus are also stored. The CPU501, ROM502, and RAM503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to embodiments disclosed herein, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method described in any of the embodiments above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. A method for encrypting blockchain data, comprising: encrypting the block chain data by using a quantum encryption protocol to generate a quantum key; at least one node in the block chain is a quantum computer.
2. A method for encrypting blockchain data according to claim 1, wherein: the block chain data is an API interface address.
3. A method for encrypting blockchain data according to claim 1, wherein: the block chain node further comprises any one or more of a satellite, a 5G base station, a fog computing node, a cloud computing center node and an edge computing node.
4. A method for encrypting blockchain data according to claim 1, wherein: the two or more parties participating in the blockchain data communication include: any one or more of a quantum computer, a satellite, a 5G base station, a fog computing node, a cloud computing center node, an edge computing node and a terminal.
5. A method for encrypting blockchain data according to claim 2, wherein: the API interface address is a gateway interface address.
6. A method for encrypting blockchain data according to claim 2, wherein: the API interface address is a fragment network interface address.
7. A method for encrypting blockchain data according to any one of claims 1 to 6, wherein: encrypting the block chain data by using a quantum encryption protocol to generate a quantum key; further comprises the following steps:
and encrypting the block chain data and the time stamp of the time service center by using a quantum encryption protocol to generate a quantum key.
8. A method for encrypting blockchain data according to claim 7, wherein: the broadcast relays in the blockchain include satellites or 5G base stations.
9. A blockchain data encryption device, the device comprising:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-8.
10. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-8.
CN202110837980.0A 2021-07-23 2021-07-23 Block chain data encryption method, equipment and storage medium Pending CN113472534A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110837980.0A CN113472534A (en) 2021-07-23 2021-07-23 Block chain data encryption method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110837980.0A CN113472534A (en) 2021-07-23 2021-07-23 Block chain data encryption method, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113472534A true CN113472534A (en) 2021-10-01

Family

ID=77882195

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110837980.0A Pending CN113472534A (en) 2021-07-23 2021-07-23 Block chain data encryption method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113472534A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499857A (en) * 2022-03-03 2022-05-13 矩阵时光数字科技有限公司 Method for realizing data correctness and consistency in big data quantum encryption and decryption
CN117113199A (en) * 2023-10-23 2023-11-24 浙江星汉信息技术股份有限公司 File security management system and method based on artificial intelligence

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3477527A1 (en) * 2017-10-31 2019-05-01 Twinpeek Privacy management
CN110086626A (en) * 2019-04-22 2019-08-02 如般量子科技有限公司 Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair
CN111339116A (en) * 2020-02-29 2020-06-26 中央财经大学 Block chain-based method for sharing open bank data
CN111612466A (en) * 2020-01-17 2020-09-01 厦门潭宏信息科技有限公司 Consensus and resource transmission method, device and storage medium
CN112822251A (en) * 2020-12-31 2021-05-18 中电科新型智慧城市研究院有限公司 City group perception system
CN112822010A (en) * 2021-01-28 2021-05-18 成都信息工程大学 Removable storage medium management method based on quantum key and block chain
CN113132094A (en) * 2019-12-31 2021-07-16 科大国盾量子技术股份有限公司 Decentralized digital authentication method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3477527A1 (en) * 2017-10-31 2019-05-01 Twinpeek Privacy management
CN110086626A (en) * 2019-04-22 2019-08-02 如般量子科技有限公司 Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair
CN113132094A (en) * 2019-12-31 2021-07-16 科大国盾量子技术股份有限公司 Decentralized digital authentication method and system
CN111612466A (en) * 2020-01-17 2020-09-01 厦门潭宏信息科技有限公司 Consensus and resource transmission method, device and storage medium
CN111339116A (en) * 2020-02-29 2020-06-26 中央财经大学 Block chain-based method for sharing open bank data
CN112822251A (en) * 2020-12-31 2021-05-18 中电科新型智慧城市研究院有限公司 City group perception system
CN112822010A (en) * 2021-01-28 2021-05-18 成都信息工程大学 Removable storage medium management method based on quantum key and block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114499857A (en) * 2022-03-03 2022-05-13 矩阵时光数字科技有限公司 Method for realizing data correctness and consistency in big data quantum encryption and decryption
CN114499857B (en) * 2022-03-03 2023-09-01 矩阵时光数字科技有限公司 Method for realizing data correctness and consistency in encryption and decryption of large data quanta
CN117113199A (en) * 2023-10-23 2023-11-24 浙江星汉信息技术股份有限公司 File security management system and method based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN113596135B (en) Block chain system, data processing method and equipment thereof and storage medium
Cao et al. KaaS: Key as a service over quantum key distribution integrated optical networks
Sasaki et al. Quantum photonic network: concept, basic tools, and future issues
WO2008143652A1 (en) Distributed encryption authentication methods and systems
KR20090067221A (en) Group-wise secret key generation
WO2008127318A2 (en) Distributed encryption methods and systems
CN113472534A (en) Block chain data encryption method, equipment and storage medium
CN102164125A (en) System and method for safety communication based on ASGK A protocol
CN107666491B (en) Data transmission method of air-ground integrated network based on symmetric encryption
EP2186252A2 (en) Method for distributing cryptographic keys in a communication network
Savva et al. Network coding-based routing and spectrum allocation in elastic optical networks for enhanced physical layer security
JP2023546427A (en) Quantum cryptographic key distribution method and device
Mehic et al. Modern trends in quantum key distribution networks
Zia-Ul-Mustafa et al. Quantum key distribution for visible light communications: A review
Bhatt et al. Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks
CN117375862A (en) Message forwarding method, system, network device, storage medium and program product
Nosouhi et al. Towards quantum‐secure software defined networks
Zhang et al. Security-aware device-to-device communications underlaying cellular networks
CN114362939A (en) Trusted relay quantum secret communication network-based dynamic routing forwarding method, storage device and intelligent terminal
Tayade et al. Quantum based flexible secure authentication protocol (SAP) for device to device (D2D) communication
Divya et al. A survery on platform of Secured Routing Algorithm
Ye et al. Improving wireless security through network diversity
Peev Why do I believe that quantum key distribution (QKD) is finally about to reach telecom markets and grow out of its present exotic standing?
Jain et al. Quantum key distribution for data center security--a feasibility study
US20240283780A1 (en) Method and apparatus for dynamic data encryption in a communication system with forward secrecy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination