CN113538140A - Data transaction method based on trusted execution environment and threshold signature - Google Patents

Data transaction method based on trusted execution environment and threshold signature Download PDF

Info

Publication number
CN113538140A
CN113538140A CN202110756383.5A CN202110756383A CN113538140A CN 113538140 A CN113538140 A CN 113538140A CN 202110756383 A CN202110756383 A CN 202110756383A CN 113538140 A CN113538140 A CN 113538140A
Authority
CN
China
Prior art keywords
data
transaction
buyer
seller
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110756383.5A
Other languages
Chinese (zh)
Inventor
滕海明
程希冀
陈柏臻
罗骁
赵刚
周丹丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Vastchain Technology Co ltd
Original Assignee
Hangzhou Vastchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Vastchain Technology Co ltd filed Critical Hangzhou Vastchain Technology Co ltd
Priority to CN202110756383.5A priority Critical patent/CN113538140A/en
Publication of CN113538140A publication Critical patent/CN113538140A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • G06F16/24573Query processing with adaptation to user needs using data annotations, e.g. user-defined metadata
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/023Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] the neutral party being a clearing house
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Library & Information Science (AREA)
  • Computational Linguistics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a data transaction method based on a trusted execution environment and a threshold signature, wherein a data buyer checks seller data, selects target data and initiates a transaction through a metadata market, a public key address and a private key address of the transaction are generated through the trusted execution environment, key fragmentation is carried out, the key fragmentation is sent to a platform service provider, the data buyer and a data seller through a trusted channel, the target data is sent to the data buyer, the data buyer and the data seller carry out signature check and confirmation, and after the signatures are aggregated, the data seller receives a token transferred by a bank account to complete the transaction. Compared with the traditional method for generating transaction information by a trusted third party, the method disclosed by the invention is combined with the block chain technology, adopts a mode of combining the threshold signature with the trusted execution environment, and has the advantages that the condition of revealing the private key of the threshold signature is avoided, and the anonymity is better.

Description

Data transaction method based on trusted execution environment and threshold signature
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a data transaction method based on a trusted execution environment and a threshold signature.
Background
Data is an important production factor of digital economy, and the value of the data can be fully exerted only by effective configuration and circulation. There are two main approaches to entity trading (data sharing) on data markets: one scheme is multiple sign, when a buyer purchases data, a multiple sign address (2-of-3 multiple sign address) is generated according to public keys of a platform, the buyer and a seller, the buyer sends the price (token) of the data to the multiple sign address according to agreement, the seller sends the data to the buyer, the buyer checks the received data, after confirming the receipt, the buyer and the seller can respectively sign the transfer from the multiple sign address to the seller address, and the seller receives the data sharing income. The advantage of multiple signatures is that the income of the buyer and the seller can be guaranteed when disputes occur, but the multiple signatures reveal who signs the multiple-signature address. In another scheme, a threshold signature mode is adopted, participated users cooperate with each other or generate a pair of public and private keys in a trusted third party mode, and meanwhile, a secret key fragment (t-of-n) is sent to each operation participator, when data transaction occurs, a buyer, a seller and a platform can sign account transfer related to the transaction, and when transaction disputes occur, the platform can be used as an arbitrator to resolve the disputes. Based on the data transaction of the multi-sign mode, the specific person who signs the transaction can be obtained from the signature, the anonymity is not good, and when a multi-sign address is generated, all parties need to be ensured to be online; the threshold signature is adopted, but a trusted execution environment is not utilized to generate a public key and a private key and fragment the private key, so that the possibility of revealing the private key and the private key fragment exists.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a data transaction method based on a trusted execution environment and a threshold signature combined with a block chain technology.
The purpose of the invention is realized by the following technical scheme: a data transaction method based on a trusted execution environment and a threshold signature specifically comprises the following steps:
(1) the data buyer looks at the data of the data seller through the metadata market, selects the target data and initiates a transaction; the metadata market is a metadata information set uploaded by data providers such as data sellers and data buyers; the target data is selected data viewed by a data buyer through a metadata trading market;
(2) the platform service provider generates a blockchain account address and a private key address related to the transaction by using a blockchain through a trusted execution environment, and records a transaction user, transaction time and target data selected in the step (1);
(3) 2-of-3 key fragmentation is carried out on a private key address of a transaction in a trusted execution environment;
(4) sending the key fragments obtained in the step (3) to a platform service provider, a data buyer and a data seller through a trusted channel;
(5) transferring accounts of the transaction account generated in the step (2) to the data buyer;
(6) the data seller sends the target data selected in the step (1) to the data buyer;
(7) the data buyer checks and confirms the target data after receiving the target data sent in the step (6); checking the hash of the target data and whether the data content of the target data is consistent with the metadata market;
(8) if the step (7) checks that the target data has no problem, the data buyer signs the transfer transaction from the block chain account address generated in the step (2) to the account address of the data seller through the intelligent contract by using the key fragment obtained in the step (3), the key fragment of the data seller signs the transfer transaction through the intelligent contract, and the seller receives the transfer token after the signatures of the two are aggregated; if the buyer finds data problems while reviewing the target data, the platform intervenes to arbitrate.
Further, in the step (3), it is preferable that the shamir method is used for key fragmentation.
Further, the platform intervention in step (8) performs arbitration, specifically:
if the platform finds no data problem after arbitration, the platform generates an initiated transfer of the blockchain account address to the seller address by using the key fragment obtained in the step (4) and signs the transaction in the intelligent contract; the data seller signs the transaction in the intelligent contract by using the key fragment obtained in the step (4); after the signatures of the two are aggregated, the data seller receives the transfer token;
if the platform finds that the data is in a problem after arbitration, the platform initiates the transaction from the transaction address in the step (2) to the buyer address in the intelligent contract by using the key fragment obtained in the step (4) and carries out signature; and (4) the data is sliced by the key obtained in the step (4), the transaction is signed in the intelligent contract, and after the signatures of the two are aggregated, the data buyer receives the returned token.
The invention has the beneficial effects that:
(1) compared with the traditional method for generating transaction information by a trusted third party, the method has the advantage that the condition of revealing the private key of the threshold signature is avoided.
(2) The invention adopts a threshold signature mode, does not reveal a signing party for signing the transaction, and has better anonymity.
(3) According to the invention, after the key fragment of the transaction is transmitted through the trusted channel of the trusted execution environment, the key fragment keeps an encryption state when each participant falls off the disk, and thus, the risk of collusion does not exist. In addition, the signature is carried out in a trusted execution environment through the intelligent contract, so that the key fragment has no leakage risk and has good data security.
Drawings
FIG. 1 is a flow chart of the present invention;
fig. 2 is a block schematic of the present invention.
Detailed Description
The main purpose of the invention is to adopt a way of combining a trusted execution environment and a threshold signature. When a transaction occurs, a public key and a private key and an address of the transaction are generated in the trusted execution environment, and each participant acquires the private key fragment by establishing trusted connection with the trusted execution environment. Therefore, the public and private keys related to the transaction can be prevented from being acquired by the platform service provider, and the safety of private key fragmentation can be ensured. The invention is plaintext in the trusted execution environment, and the other is ciphertext, so as to prevent the key fragmentation from leaking and colluding.
As shown in fig. 1, which is a flowchart of the present invention, a data transaction method based on a trusted execution environment and a threshold signature specifically includes the following steps:
(1) the data buyer looks at the data of the data seller through the metadata market, selects the target data and initiates a transaction; the metadata market is a metadata information set uploaded by various data providers such as a data buyer and the like, such as data information of data description, data number, data hash value and the like; the target data is selected data viewed by a data buyer through a metadata trading market;
(2) the platform facilitator generates a blockchain account and a private key address related to the transaction by using the blockchain through the trusted execution environment, for example, the private key and the account address are generated through the BIP32, the private key is generally generated randomly, and the account address is generated after hash processing of the public key. Recording the transaction user, the transaction time and the target data selected by the data buyer in the step (1);
(3) in the embodiment, a 2-of-3 key fragmentation mode is adopted, a 1(t-1) order polynomial is constructed, three parties related to the transaction, a platform service provider, a data seller and a data buyer are involved, and any two parties can perform account transfer operation on a transaction account after the 2-of-3 key fragmentation;
(4) sending the key fragments obtained in the step (3) to a platform service provider, a data buyer and a data seller through a trusted channel;
(5) transferring accounts of the transaction account generated in the step (2) to the data buyer;
(6) the data seller sends the target data selected in the step (1) to the data buyer;
(7) the data buyer checks and confirms the target data after receiving the target data sent in the step (6); such as checking whether the hash of the target data is consistent with the metadata market offer, the number of pieces of the target data, the existence of the defect and the obvious error of the target data;
(8) if the step (7) checks that the target data has no problem, the data buyer initiates the transfer transaction from the account address generated in the step (2) to the transaction address of the data seller, the transaction is signed by using the key fragment obtained in the step (4) in the intelligent contract, the data seller also signs the transfer transaction by using the key fragment obtained in the step (4) through the intelligent contract, and the seller receives the token for transfer after the signatures of the two are aggregated; if the buyer finds data problems while reviewing the target data, the platform intervenes to arbitrate.
If the platform finds no data problem after arbitration, the platform initiates the transfer transaction from the account generated in the step (2) to the address of the seller by using the key fragment of the platform and signs the transaction in the intelligent contract; the data seller also signs the transaction within the intelligent contract using its own key shard; after aggregating the signatures, the data seller receives the transfer token.
If the platform finds that the data is in a problem after arbitration, the platform initiates the transaction from the account generated in the step (2) to the buyer address in the intelligent contract by using the secret key fragment of the platform, and carries out signature; and (4) the data buyer obtains the key fragment by using the step (4), signs the transaction in the intelligent contract, and after the signatures of the two are aggregated, the data buyer receives the returned token.
The invention adopts the mode of combining the threshold signature and the trusted execution environment, the private key generated by the transaction is a plaintext only in the trusted execution environment, and the other private keys are in a ciphertext form, so that the condition of revealing the private key of the threshold signature does not exist. The invention is also in the trusted execution environment when signing through the intelligent contract, so that the key fragment has no leakage risk and has good data security.

Claims (3)

1. A data transaction method based on a trusted execution environment and a threshold signature is characterized by specifically comprising the following steps:
(1) the data buyer looks at the data of the data seller through the metadata market, selects the target data and initiates a transaction; the metadata market is a metadata information set uploaded by data providers such as data sellers and data buyers; the target data is selected data viewed by a data buyer through a metadata trading market;
(2) the platform service provider generates a blockchain account address and a private key address related to the transaction by using a blockchain through a trusted execution environment, and records a transaction user, transaction time and target data selected in the step (1);
(3) 2-of-3 key fragmentation is carried out on a private key address of a transaction in a trusted execution environment;
(4) sending the key fragments obtained in the step (3) to a platform service provider, a data buyer and a data seller through a trusted channel;
(5) transferring accounts of the transaction account generated in the step (2) to the data buyer;
(6) the data seller sends the target data selected in the step (1) to the data buyer;
(7) the data buyer checks and confirms the target data after receiving the target data sent in the step (6); checking the hash of the target data and whether the data content of the target data is consistent with the metadata market;
(8) if the step (7) checks that the target data has no problem, the data buyer signs the transfer transaction from the block chain account address generated in the step (2) to the account address of the data seller through the intelligent contract by using the key fragment obtained in the step (3), the key fragment of the data seller signs the transfer transaction through the intelligent contract, and the seller receives the transfer token after the signatures of the two are aggregated; if the buyer finds data problems while reviewing the target data, the platform intervenes to arbitrate.
2. The data transaction method based on the trusted execution environment and the threshold signature as claimed in claim 1, wherein in the step (3), a shamir method is preferably used for key fragmentation.
3. The data transaction method based on the trusted execution environment and the threshold signature as claimed in claim 1, wherein the platform intervention in step (8) performs arbitration, specifically:
if the platform finds no data problem after arbitration, the platform generates an initiated transfer of the blockchain account address to the seller address by using the key fragment obtained in the step (4) and signs the transaction in the intelligent contract; the data seller signs the transaction in the intelligent contract by using the key fragment obtained in the step (4); after the signatures of the two are aggregated, the data seller receives the transfer token;
if the platform finds that the data is in a problem after arbitration, the platform initiates the transaction from the transaction address in the step (2) to the buyer address in the intelligent contract by using the key fragment obtained in the step (4) and carries out signature; and (4) the data is sliced by the key obtained in the step (4), the transaction is signed in the intelligent contract, and after the signatures of the two are aggregated, the data buyer receives the returned token.
CN202110756383.5A 2021-07-05 2021-07-05 Data transaction method based on trusted execution environment and threshold signature Pending CN113538140A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110756383.5A CN113538140A (en) 2021-07-05 2021-07-05 Data transaction method based on trusted execution environment and threshold signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110756383.5A CN113538140A (en) 2021-07-05 2021-07-05 Data transaction method based on trusted execution environment and threshold signature

Publications (1)

Publication Number Publication Date
CN113538140A true CN113538140A (en) 2021-10-22

Family

ID=78097754

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110756383.5A Pending CN113538140A (en) 2021-07-05 2021-07-05 Data transaction method based on trusted execution environment and threshold signature

Country Status (1)

Country Link
CN (1) CN113538140A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038578A (en) * 2017-04-19 2017-08-11 浙江数秦科技有限公司 Multi-signature exchange information processing method in data trade platform based on block chain
CN110135819A (en) * 2019-05-21 2019-08-16 福建航誉大数据服务有限公司 A kind of third party's trust data transaction system and method based on block chain
CN110720102A (en) * 2017-06-09 2020-01-21 区块链控股有限公司 Block chains for general purpose computing
CN110880972A (en) * 2019-11-26 2020-03-13 复旦大学 Block chain key management system based on safe multiparty calculation
CN110993044A (en) * 2019-11-28 2020-04-10 周口师范学院 Lightweight dynamic autonomous cross-link interaction method for medical alliance link
CN111178880A (en) * 2019-12-07 2020-05-19 江苏通付盾数字化技术有限公司 Secure data circulation method for zero trust and protecting data privacy
CN111737724A (en) * 2020-08-26 2020-10-02 腾讯科技(深圳)有限公司 Data processing method and device, intelligent equipment and storage medium
CN112288431A (en) * 2020-11-03 2021-01-29 上海阿吉必信息技术有限公司 Transaction method and device based on threshold signature
CN112560073A (en) * 2021-02-19 2021-03-26 支付宝(杭州)信息技术有限公司 Method, device and system for verifying data source reliability
CN112711774A (en) * 2021-03-25 2021-04-27 腾讯科技(深圳)有限公司 Data processing method, device, equipment and storage medium
US20210158342A1 (en) * 2017-12-15 2021-05-27 nChain Holdings Limited Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038578A (en) * 2017-04-19 2017-08-11 浙江数秦科技有限公司 Multi-signature exchange information processing method in data trade platform based on block chain
CN110720102A (en) * 2017-06-09 2020-01-21 区块链控股有限公司 Block chains for general purpose computing
US20210158342A1 (en) * 2017-12-15 2021-05-27 nChain Holdings Limited Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords
CN110135819A (en) * 2019-05-21 2019-08-16 福建航誉大数据服务有限公司 A kind of third party's trust data transaction system and method based on block chain
CN110880972A (en) * 2019-11-26 2020-03-13 复旦大学 Block chain key management system based on safe multiparty calculation
CN110993044A (en) * 2019-11-28 2020-04-10 周口师范学院 Lightweight dynamic autonomous cross-link interaction method for medical alliance link
CN111178880A (en) * 2019-12-07 2020-05-19 江苏通付盾数字化技术有限公司 Secure data circulation method for zero trust and protecting data privacy
CN111737724A (en) * 2020-08-26 2020-10-02 腾讯科技(深圳)有限公司 Data processing method and device, intelligent equipment and storage medium
CN112288431A (en) * 2020-11-03 2021-01-29 上海阿吉必信息技术有限公司 Transaction method and device based on threshold signature
CN112560073A (en) * 2021-02-19 2021-03-26 支付宝(杭州)信息技术有限公司 Method, device and system for verifying data source reliability
CN112711774A (en) * 2021-03-25 2021-04-27 腾讯科技(深圳)有限公司 Data processing method, device, equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张亮;刘百祥;张如意;江斌鑫;刘一江;: "区块链技术综述", 计算机工程, no. 05, pages 7 - 18 *
汤敏;: "汤敏:物联网+区块链助力供应链金融智能化", 中国储运, no. 06, pages 34 - 36 *

Similar Documents

Publication Publication Date Title
CN111095332B (en) Method and system for protecting private social media advertisements
TWI701623B (en) Logistics information transmission method, system and device based on blockchain
CN107180350B (en) Method, device and system for multi-party sharing transaction metadata based on block chain
US10609010B2 (en) System, methods and software application for sending secured messages on decentralized networks
CN110135819B (en) Block chain-based third-party trusted data transaction system and method
US11481375B2 (en) Point-to-point distributed decentralized system
US11483161B2 (en) Method for information processing and non-transitory computer readable storage medium
EP3928276A1 (en) Trusted tokenized transactions in a blockchain system
CN107666388A (en) Block chain information encryption method based on complete homomorphic cryptography method
CN110020543B (en) Data processing method and device based on block chain
CN116204912B (en) Data processing method and device based on isomorphic encryption
CN110336779B (en) Block chain construction method and device and electronic equipment
Ray et al. A fair-exchange e-commerce protocol with automated dispute resolution
WO2023098294A1 (en) Heterogeneous data processing method and apparatus, and electronic device
WO2020221292A1 (en) Network transaction verification method based on plurality of nodes, and system therefor and storage medium
CN109377220B (en) Block chain-based media data transaction method and system and computer storage medium
CN110599342A (en) Block chain-based identity information authorization method and device
CN112801778A (en) Federated bad asset blockchain
WO2021134897A1 (en) Blockchain supply chain transaction hidden dynamic supervision system and method
CN115203749A (en) Data transaction method and system based on block chain
CN116545773A (en) Method, medium and electronic equipment for processing privacy data
CN116743376A (en) Multiparty secret sharing data privacy comparison method based on efficient ciphertext confusion technology
CN110519045B (en) Anti-quantum computing alliance chain transaction method and system based on group asymmetric key pool
CN113746621B (en) Multi-chain architecture information sharing system based on block chain technology
CN113538140A (en) Data transaction method based on trusted execution environment and threshold signature

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination