CN113643134B - Internet of things blockchain transaction method and system based on multi-key homomorphic encryption - Google Patents

Internet of things blockchain transaction method and system based on multi-key homomorphic encryption Download PDF

Info

Publication number
CN113643134B
CN113643134B CN202110976005.8A CN202110976005A CN113643134B CN 113643134 B CN113643134 B CN 113643134B CN 202110976005 A CN202110976005 A CN 202110976005A CN 113643134 B CN113643134 B CN 113643134B
Authority
CN
China
Prior art keywords
equipment
transaction
internet
things
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110976005.8A
Other languages
Chinese (zh)
Other versions
CN113643134A (en
Inventor
黄步添
许曼迪
许浩
王海涛
何钦铭
刘振广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunxiang Network Technology Co Ltd
Original Assignee
Hangzhou Yunxiang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yunxiang Network Technology Co Ltd filed Critical Hangzhou Yunxiang Network Technology Co Ltd
Priority to CN202110976005.8A priority Critical patent/CN113643134B/en
Publication of CN113643134A publication Critical patent/CN113643134A/en
Application granted granted Critical
Publication of CN113643134B publication Critical patent/CN113643134B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application provides an Internet of things blockchain transaction method based on multi-key homomorphic encryption, which specifically comprises the following steps: in the block chain network of the Internet of things, a first device initiates an access request to a second device; the second device performs identity verification on the first device; if the identity verification is successful, generating and returning interaction information corresponding to the operation authority of the second equipment to the first equipment; the first equipment and the second equipment trigger corresponding transaction events through interaction information, and encrypt data given by the first equipment and the second equipment by using a public key by adopting a multi-key homomorphic encryption method; all transactions are carried out based on the ciphertext, and after the transactions are completed, the private key of the first equipment and the private key of the second equipment jointly decrypt the transaction result information; the full-function Internet of things equipment in the network is used as an accounting node to write the verified transaction into a local new block, wait for acquiring accounting rights and link the transaction; thus, devices in the network can conduct transactions, collaboration securely, reliably and credibly.

Description

Internet of things blockchain transaction method and system based on multi-key homomorphic encryption
Technical Field
The application relates to the technical field of blockchains, in particular to a blockchain transaction method and system of the Internet of things based on multi-key homomorphic encryption.
Background
With the penetration of the internet of things into various large fields such as consumer networks, industrial internet of things, smart cities and the like, the problem of safety and reliability of the internet of things and the problem of ensuring that all parties on the value chain of the internet of things can mutually trust and share benefits have become the main challenging problem of the deep development of the internet of things. The block chain can effectively solve the challenge problem faced in the development process of the Internet of things by providing a common knowledge mechanism of identity, data security and mutual trust, and meanwhile, the Internet of things can also guarantee the authenticity and the validity of the uplink data of the block chain from the source, and the development of the block chain and the internet of things are mutually promoted.
The full homomorphic encryption is used as a cryptography tool, and can be widely applied to various scenes such as cloud computing, the Internet of things and the like. The homomorphic encryption supports arbitrary functional operations on the encrypted information, and the decrypted result is consistent with the result of the corresponding operation performed on the plaintext. The homomorphic encryption of multiple keys is also called as homomorphic encryption of multiple keys, is a popularization of homomorphic encryption in a multi-user scene, and has important application in multiparty security calculation. The homomorphic encryption of multiple keys supports that multiple users encrypt information by respective keys, the obtained ciphertext can participate in operation together, after the operation is finished, a joint key is obtained by collecting the keys of the participants, and the result ciphertext is decrypted by using the joint key.
Although millions of participants in the Internet of things are not trustworthy, some are malicious, the verification and consensus mechanism of the blockchain is one, and the blockchain has physical security, communication security and identity security, and the other is one, and has the property that account book data cannot be tampered and maintained by multiple parties, and encryption and decryption are carried out on transaction information among multiple party user equipment in the blockchain of the Internet of things by matching with a method of adding multiple secret keys for homomorphic encryption, so that transaction fairness and privacy protection are facilitated.
Disclosure of Invention
Based on the problems set forth in the background technology, the application provides a multi-key homomorphic encryption-based block chain transaction method and system of the Internet of things.
The block chain transaction method of the Internet of things based on multi-key homomorphic encryption specifically comprises the following steps:
respectively acquiring keys and interaction information of the first equipment and the second equipment, wherein the keys comprise private keys and public keys;
based on the event triggered in the interaction information of the first equipment and the second equipment, the block chain of the Internet of things invokes and executes related intelligent contracts and accesses corresponding business of the Internet of things;
encrypting data information related to each given transaction by a public key of the first device and a public key of the second device respectively to obtain ciphertext of the transaction information;
based on the ciphertext, the first equipment and the second equipment conduct transaction to obtain a transaction result;
the transaction result is jointly decrypted through the private key of the first equipment and the private key of the second equipment, so that a plaintext of the transaction information is obtained;
verifying the transaction;
if the verification is passed, the accounting node in the block chain of the Internet of things writes the transaction which passes the verification into a new block which is assembled locally, waits for acquiring accounting rights, and links the transaction information.
Further, the blockchain functions are embedded in a plurality of terminal devices of the Internet of things to form a BOT, namely the blockchain network of the Internet of things, and all transactions among the devices are written into the network; each device in the blockchain network of the internet of things generates a pair of keys for which the system generates a public key and a private key before joining the network.
Further, the method for encrypting and decrypting adopts multi-key homomorphic encryption, which comprises the following steps:
if the first equipment/the second equipment are multiple, encrypting the data information related to the transaction given by each equipment by utilizing the public key of the equipment to generate ciphertext, wherein the operations on the related data information in the transaction are all operations on the ciphertext;
after the transaction is completed, collecting private keys of all devices participating in the transaction, and jointly decrypting ciphertext of the transaction result information by utilizing the private keys of all devices to obtain plaintext.
Further, the encryption and decryption adopts a method of homomorphic encryption of multiple keys, and further comprises the generation of public and private keys, the encryption of the public keys and the joint decryption of the private keys;
the public and private keys are generated specifically as follows: based on the security parameter lambda, the algorithm KeyGen (1 λ ) Obtaining a public key pk and a private key sk;
the public key encryption is specifically as follows: based on the plaintext m and the public key pk, obtaining a ciphertext n through an algorithm Enc (pk, m);
the private key joint decryption comprises the given ciphertext n and the private key sk of the operation participation equipment corresponding to the ciphertext 1 , sk 2 …sk N By algorithm Dec (sk 1 ,sk 2 …sk N N) to obtain the message plaintext m.
Further, the multi-key homomorphic encryption-based block chain transaction method of the Internet of things further comprises the following steps:
responding to an access request of the first device to the second device;
controlling a second device to perform identity verification on the first device or performing identity verification on the first device by the second device, wherein the verification is to verify digital certificate information of the first device contained in the access request;
if the authentication is successful, judging and determining the operation authority of the second equipment to the first equipment;
and generating interaction information corresponding to the operation authority of the second equipment and sending the interaction information to the first equipment.
Further, the judging and determining the operation authority of the second device to the first device includes the following steps:
based on the access control policy, the authentication information in the access control policy includes: allowing access to the equipment type of the equipment, the user roles corresponding to the equipment type and the operation authority of the user roles; the second device judges the device type of the first device, obtains a corresponding user role according to the device type, and determines the operation authority corresponding to the first device by the user role.
Further, in order to ensure the safety and stability of the block chain network of the Internet of things, the terminal equipment of the Internet of things is divided into full-function Internet of things equipment and function-limited Internet of things equipment; the full-function Internet of things equipment directly participates in interaction and cooperation on a network, the function-limited Internet of things equipment is connected to the network through a gateway, and indirectly participates in interaction and cooperation on an Internet of things blockchain network;
further, when the second device is controlled to carry out identity verification on the first device, the first device and the second device are the function-limited internet of things device; when the second equipment performs identity verification on the first equipment, the first equipment and the second equipment are full-function internet of things equipment.
Further, when the first device and the second device are full-function internet of things devices, the first device and the second device are set as special nodes; the limited internet of things device is set as a common node;
the actions of the special node and the common node during transaction comprise:
after the transaction is completed and verified, a special node in the network is used as an accounting node, the transaction is written into a new block assembled locally, accounting rights are waited to be obtained, and the transaction is uplink;
the common node does not participate in accounting, and synchronizes account book information according to the consensus process.
Furthermore, the consensus process is only completed by special nodes, so that the number of nodes in the consensus process is greatly reduced, and the consensus efficiency is improved.
Further, for data security of the block chain network of the internet of things, a privacy policy is further set, and the content includes:
setting a terminal device of the Internet of things with the contracted license and a terminal device of the Internet of things without the contracted license;
the device that obtains the contract's license may access and process the contract's data, while the device that does not obtain the license may store the encrypted data, but does not have the right to decrypt and use the encrypted data.
The block chain transaction system of the internet of things based on multi-key homomorphic encryption is characterized by comprising an acquisition module, a calling module, an encryption module, a transaction module, a decryption module, a verification module and a chaining module;
the acquisition module is used for respectively acquiring the secret keys and the interaction information of the first equipment and the second equipment, wherein the secret keys comprise private keys and public keys;
the calling module is used for calling and executing related intelligent contracts and accessing corresponding Internet of things business by the Internet of things blockchain based on the event triggered in the interaction information of the first equipment and the second equipment;
the encryption module is used for encrypting data information related to each given transaction through the public key of the first equipment and the public key of the second equipment respectively to obtain ciphertext of the transaction information;
the transaction module is configured to: based on the ciphertext, the first equipment and the second equipment conduct transaction to obtain a transaction result;
the decryption module is used for jointly decrypting the transaction result through the private key of the first equipment and the private key of the second equipment to obtain a plaintext of the transaction information;
the verification module is used for verifying the transaction information;
and if the verification is passed, the account recording node in the network writes the transaction which is passed through the verification into a new block which is assembled locally, waits for acquiring account recording rights, and links the transaction information.
A computer readable storage medium storing a computer program which, when executed by a processor, performs the method steps of any of the above.
A common chain code based federated chain management apparatus comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, which when executed by the processor, performs the method steps of any one of the above.
Compared with the prior art, the method has the advantages that the function of embedding the blockchain into the equipment in the Internet of things is adopted, each equipment can be used as an organization in the blockchain network of the Internet of things to conduct transactions in the network, and the access control of the equipment and the homomorphic encryption of multiple keys of data information ensure the data privacy during transactions among the equipment of the Internet of things. The internet of things and the blockchain are combined, so that connection and access of the internet of things equipment are safer, and then the encryption and decryption are carried out on transaction information among multiple user equipment in the network by matching with a multi-key homomorphic encryption method, so that the blockchain nodes of the internet of things can be mutually cooperated safely, reliably and credibly, and transactions are recorded in the chain after verification of the accounting node, thereby being beneficial to realizing transaction fairness and privacy protection of the blockchain network of the internet of things.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is an overall architecture diagram of an Internet of things blockchain network in a specific embodiment;
FIG. 2 is a flow chart of an inter-device transaction in an Internet of things blockchain network in an embodiment.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the present application will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In the description of the present specification, reference to the terms "one embodiment," "a particular embodiment," "an embodiment mode," "for example," means that a particular feature, structure, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. The order of steps involved in the embodiments is illustrative of the practice of the application, and is not limited and may be suitably modified as desired.
The technical architecture of the Internet of things mainly comprises three layers, including: a perception layer, a network layer and an application layer;
the sensing layer is used for collecting data information generated in the physical world and mainly comprises collecting and reading and writing modules of various sensors, labels and readers;
the network layer is divided into an access layer and a bearing network layer, and the network layer uploads the data information obtained by the sensing layer through the existing communication systems such as a mobile network, the Internet and the like;
the application layer consists of various application servers, and has the main task of summarizing and obtaining data information after the work of the sensing layer and the network layer is completed, reprocessing the information and further improving the comprehensive utilization rate of the information;
the application relates to a transaction problem between terminal equipment of the Internet of things, which mainly relates to a network layer.
In a specific embodiment, as shown in fig. 1, the block chain network of the internet of things is a service platform of "decentralization", and supports a plurality of entities of the internet of things, including terminal devices of the internet of things, gateways and servers of the internet of things, and the like.
One or more block chain nodes (BoT nodes) and a 'decentralizing' application (dApp) of the Internet of things can be deployed on one Internet of things entity, and the Internet of things entity is connected to the BoT node through the 'decentralizing' application so as to cooperate with each other on the block chain network of the Internet of things.
The execution of the transaction between the devices is realized by executing one or more internet of things services, and the internet of things services can be deployed on the internet of things blockchain network or outside the internet of things blockchain network, including:
when the internet of things service is deployed on the internet of things blockchain network in an intelligent contract manner, the internet of things terminal equipment can access the corresponding internet of things service by inquiring and executing the related intelligent contract manner on the internet of things blockchain network;
when the Internet of things service is deployed outside the Internet of things blockchain network, the Internet of things terminal equipment can inquire and execute related auxiliary intelligent contracts through the Internet of things blockchain network so as to obtain permission for accessing the Internet of things service, and then interact with the corresponding Internet of things service;
meanwhile, the transaction result data generated by interaction of the terminal devices participating in the transaction is required to be written into the block chain network of the Internet of things in real time.
In another embodiment, the first device and the second device are terminal devices of the internet of things in the blockchain network of the internet of things, and are all full-function devices of the internet of things. The first device is to access the second device and generate a transaction with the second device, as shown in fig. 2, the main flow includes:
s1, a first device sends an access request to a second device through an Internet of things blockchain network;
s2, the second equipment verifies the digital certificate information of the first equipment contained in the access request;
if the authentication is successful, the second device judges and determines the operation authority of the first device, generates and returns interaction information corresponding to the operation authority of the second device to the first device;
if the identity verification fails, the user cannot access the user, and the subsequent flow is terminated;
s3, the first equipment and the second equipment inquire and execute related intelligent contracts on the block chain network of the Internet of things through the events triggered in the interaction information, access corresponding Internet of things business, and encrypt data information related to transactions given by the first equipment and the second equipment by utilizing the public key of the first equipment and the public key of the second equipment respectively;
s4, the first equipment and the second equipment conduct transaction;
s5, after the transaction is completed, the private key of the first equipment and the private key of the second equipment jointly decrypt the transaction result information;
s6, the accounting node in the network, namely the full-function Internet of things equipment writes the verified transaction into a local new block, waits for obtaining accounting rights and links the transaction; other common nodes, namely the function-limited internet of things equipment, do not participate in accounting, and synchronize account book information according to a consensus process.
For encryption and joint decryption in the embodiment, a multi-key homomorphic encryption method is adopted, when a first device and a second device trade, the public key of the first device and the second device is utilized to encrypt data information related in the trade given by the device, a ciphertext is generated, and the operation on related data information in the trade is the operation on the ciphertext; after the transaction is completed, collecting private keys of the first equipment and the second equipment, and jointly decrypting ciphertext of the transaction result information by using the private keys to obtain plaintext.
The specific contents of the public and private key generation, the public key encryption and the private key joint decryption are as follows:
the generation of the public and private key comprises, given a security parameter lambda, the generation of a public and private key by an algorithm KeyGen (1 λ ) Obtaining a public key pk and a private key sk, wherein the public key and the private key of the first device are pk respectively 1 And sk 1 The public and private keys of the second equipment are pk respectively 2 And sk 2
Public key encryption includes the first device giving a plaintext m 1 、m 2 …m i And the public key pk of the first device 1 By algorithm Enc (pk 1 ,n k ) Obtaining corresponding ciphertext n k Wherein k is E (1, i);
likewise, the second device gives the plaintext u 1 、u 2 …u j And the public key pk of the second device 2 By algorithm Enc (pk 2 ,u k ) Obtain corresponding ciphertext v k Wherein k ε (1, j);
the private key joint decryption comprises that the result information ciphertext of the transaction of the first device and the second device is x, the operation participation device corresponding to the ciphertext is the first device and the second device, namely the private key of joint decryption is sk 1 And sk 2 By algorithm Dec (sk 1 ,sk 2 X) obtaining a message plaintext y of the transaction result.
In this embodiment, for data security of the blockchain network of the internet of things, a privacy policy is further set, and the content includes:
setting a terminal device of the Internet of things with the contracted license and a terminal device of the Internet of things without the contracted license;
the device that obtains the contract's license may access and process the contract's data, while the device that does not obtain the license may store the encrypted data, but does not have the right to decrypt and use the encrypted data.
Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This specification is intended to cover any variations, uses, or adaptations of the specification following, in general, the principles of the specification and including such departures from the present disclosure as come within known or customary practice within the art to which the specification pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the specification being indicated by the following claims.
It is to be understood that the present description is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present description is limited only by the appended claims.

Claims (9)

1. The block chain transaction method of the internet of things based on multi-key homomorphic encryption is characterized by comprising the following steps of:
respectively acquiring keys and interaction information of the first equipment and the second equipment, wherein the keys comprise private keys and public keys;
based on the event triggered in the interaction information of the first equipment and the second equipment, the block chain of the Internet of things invokes and executes related intelligent contracts and accesses corresponding business of the Internet of things;
encrypting data information related to each given transaction by a public key of the first device and a public key of the second device respectively to obtain ciphertext of the transaction information;
based on the ciphertext, the first equipment and the second equipment conduct transaction to obtain a transaction result;
the transaction result is jointly decrypted through the private key of the first equipment and the private key of the second equipment, so that a plaintext of the transaction information is obtained;
verifying the transaction;
if the verification is passed, writing the transaction which passes the verification into a new block which is assembled locally by an accounting node in the block chain of the Internet of things, waiting for acquiring accounting rights, and uploading transaction information;
wherein, responding to the access request of the first device to the second device;
controlling a second device to perform identity verification on the first device or performing identity verification on the first device by the second device, wherein the verification is to verify digital certificate information of the first device contained in the access request;
if the authentication is successful, judging and determining the operation authority of the second equipment to the first equipment;
and generating interaction information corresponding to the operation authority of the second equipment and sending the interaction information to the first equipment.
2. The multi-key homomorphic encryption-based blockchain transaction method of the internet of things of claim 1, wherein the encrypting and decrypting adopts a multi-key homomorphic encryption method comprising:
if the first equipment/the second equipment are multiple, encrypting the data information related to the transaction given by the equipment by utilizing the public key of each equipment to generate ciphertext, wherein the operations on the related data information in the transaction are all operations on the ciphertext;
after the transaction is completed, collecting private keys of all devices participating in the transaction, and jointly decrypting ciphertext of the transaction result information by utilizing the private keys of all devices to obtain plaintext.
3. The multi-key homomorphic encryption-based block chain transaction method of the internet of things according to claim 2, wherein the encryption and decryption adopts a multi-key homomorphic encryption method, and further comprises public-private key generation, public-key encryption and private-key joint decryption;
the public and private keys are generated specifically as follows: based on security parametersλBy an algorithmKeyGen( )Obtaining a public keypkPrivate keysk
The public key encryption is specifically as follows: based on plaintextmAnd public keypkBy an algorithmEnc(pk,m)Obtaining ciphertextn
The private key joint decryption includes, given ciphertextnAnd the private key of the operation participation device corresponding to the ciphertext,/>…/>By algorithmDec(/> ,/> /> ,n)Obtaining the plaintext of the messagem
4. The multi-key homomorphic encryption-based blockchain transaction method of the internet of things of claim 1, wherein the determining and determining the operation authority of the second device to the first device comprises the following steps:
based on the access control policy, the authentication information in the access control policy includes: allowing access to the equipment type of the equipment, the user roles corresponding to the equipment type and the operation authority of the user roles; the second device judges the device type of the first device, obtains a corresponding user role according to the device type, and determines the operation authority corresponding to the first device by the user role.
5. The multi-key homomorphic encryption-based block chain transaction method of the internet of things of claim 1, wherein when a second device is controlled to perform identity verification on a first device, the first device and the second device are function-limited internet of things devices; when the second equipment performs identity verification on the first equipment, the first equipment and the second equipment are full-function internet of things equipment.
6. The multi-key homomorphic encryption based block chain transaction method of the internet of things of claim 5, wherein the first device and the second device are special nodes when they are full-function internet of things devices; the limited internet of things device is set as a common node;
the actions of the special node and the common node during transaction comprise:
after the transaction is completed and verified, a special node in the network is used as an accounting node, the transaction is written into a new block assembled locally, accounting rights are waited to be obtained, and the transaction is uplink;
the common node does not participate in accounting, and synchronizes account book information according to the consensus process.
7. The block chain transaction system of the internet of things based on multi-key homomorphic encryption is characterized by comprising an acquisition module, a calling module, an encryption module, a transaction module, a decryption module, a verification module and a chaining module;
the acquisition module is used for respectively acquiring the secret keys and the interaction information of the first equipment and the second equipment, wherein the secret keys comprise private keys and public keys;
the calling module is used for calling and executing related intelligent contracts and accessing corresponding Internet of things business by the Internet of things blockchain based on the event triggered in the interaction information of the first equipment and the second equipment;
the encryption module is used for encrypting data information related to each given transaction through the public key of the first equipment and the public key of the second equipment respectively to obtain ciphertext of the transaction information;
the transaction module is configured to: based on the ciphertext, the first equipment and the second equipment conduct transaction to obtain a transaction result;
the decryption module is used for jointly decrypting the transaction result through the private key of the first equipment and the private key of the second equipment to obtain a plaintext of the transaction information;
the verification module is used for verifying the transaction information;
the uplink module writes the transaction after passing the verification into a new block assembled locally by a billing node in the network if the verification passes the verification, waits for acquiring billing rights, and links transaction information;
wherein, responding to the access request of the first device to the second device;
controlling a second device to perform identity verification on the first device or performing identity verification on the first device by the second device, wherein the verification is to verify digital certificate information of the first device contained in the access request;
if the authentication is successful, judging and determining the operation authority of the second equipment to the first equipment;
and generating interaction information corresponding to the operation authority of the second equipment and sending the interaction information to the first equipment.
8. A computer readable storage medium storing a computer program, which when executed by a processor implements the method of any one of claims 1 to 6.
9. An internet of things blockchain transaction device based on multi-key homomorphic encryption, comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the method of any of claims 1 to 6 when executing the computer program.
CN202110976005.8A 2021-08-24 2021-08-24 Internet of things blockchain transaction method and system based on multi-key homomorphic encryption Active CN113643134B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110976005.8A CN113643134B (en) 2021-08-24 2021-08-24 Internet of things blockchain transaction method and system based on multi-key homomorphic encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110976005.8A CN113643134B (en) 2021-08-24 2021-08-24 Internet of things blockchain transaction method and system based on multi-key homomorphic encryption

Publications (2)

Publication Number Publication Date
CN113643134A CN113643134A (en) 2021-11-12
CN113643134B true CN113643134B (en) 2023-08-25

Family

ID=78423728

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110976005.8A Active CN113643134B (en) 2021-08-24 2021-08-24 Internet of things blockchain transaction method and system based on multi-key homomorphic encryption

Country Status (1)

Country Link
CN (1) CN113643134B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115174235B (en) * 2022-07-08 2023-06-02 慧之安信息技术股份有限公司 Encryption method for revocable attribute of Internet of things based on blockchain
CN116527228A (en) * 2023-03-31 2023-08-01 苏州美趣信息科技有限公司 Big data transmission method with verification function
CN117097476B (en) * 2023-10-19 2024-01-26 浪潮云洲工业互联网有限公司 Data processing method, equipment and medium based on industrial Internet

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109889522A (en) * 2019-02-25 2019-06-14 重庆邮电大学 A kind of Internet of Things information safety protecting method based on block chain
CN110971390A (en) * 2019-11-29 2020-04-07 杭州云象网络技术有限公司 Fully homomorphic encryption method for intelligent contract privacy protection
CN111191280A (en) * 2019-12-24 2020-05-22 远光软件股份有限公司 Block chain transaction method based on encrypted data, electronic equipment and storage medium
CN111833057A (en) * 2018-09-30 2020-10-27 创新先进技术有限公司 Transaction method and device based on block chain and node equipment
CN112003832A (en) * 2020-07-29 2020-11-27 北京科技大学 Block chain-based Internet of things data privacy protection method
CN112543187A (en) * 2020-11-26 2021-03-23 齐鲁工业大学 Industrial Internet of things safety data sharing method based on edge block chain
CN112884554A (en) * 2021-03-18 2021-06-01 南通大学 Auction method of Internet of things data auction system based on alliance chain
CN113159745A (en) * 2021-03-23 2021-07-23 西安电子科技大学 Block chain transaction privacy protection method based on full homomorphism
CN113221184A (en) * 2021-03-27 2021-08-06 重庆邮电大学 Internet of things system and device based on block chain network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111833186A (en) * 2018-09-20 2020-10-27 创新先进技术有限公司 Transaction method and device based on block chain and node equipment
US11631117B2 (en) * 2019-05-10 2023-04-18 Sap Se Method, system, and non-transitory computer readable storage device for a pooling requirement while preserving privacy

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111833057A (en) * 2018-09-30 2020-10-27 创新先进技术有限公司 Transaction method and device based on block chain and node equipment
CN109889522A (en) * 2019-02-25 2019-06-14 重庆邮电大学 A kind of Internet of Things information safety protecting method based on block chain
CN110971390A (en) * 2019-11-29 2020-04-07 杭州云象网络技术有限公司 Fully homomorphic encryption method for intelligent contract privacy protection
CN111191280A (en) * 2019-12-24 2020-05-22 远光软件股份有限公司 Block chain transaction method based on encrypted data, electronic equipment and storage medium
CN112003832A (en) * 2020-07-29 2020-11-27 北京科技大学 Block chain-based Internet of things data privacy protection method
CN112543187A (en) * 2020-11-26 2021-03-23 齐鲁工业大学 Industrial Internet of things safety data sharing method based on edge block chain
CN112884554A (en) * 2021-03-18 2021-06-01 南通大学 Auction method of Internet of things data auction system based on alliance chain
CN113159745A (en) * 2021-03-23 2021-07-23 西安电子科技大学 Block chain transaction privacy protection method based on full homomorphism
CN113221184A (en) * 2021-03-27 2021-08-06 重庆邮电大学 Internet of things system and device based on block chain network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Blockchain-Driven Trusted Data Sharing With Privacy Protection in IoT Sensor Network;Zhaofeng Ma etc.;《IEEE SENSORS JOURNAL》;第25472-25479页 *

Also Published As

Publication number Publication date
CN113643134A (en) 2021-11-12

Similar Documents

Publication Publication Date Title
Yu et al. A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings
CN108418680B (en) Block chain key recovery method and medium based on secure multi-party computing technology
Deng et al. Identity-based encryption transformation for flexible sharing of encrypted data in public cloud
CN113643134B (en) Internet of things blockchain transaction method and system based on multi-key homomorphic encryption
US20190305938A1 (en) Threshold secret share authentication proof and secure blockchain voting with hardware security modules
US9065637B2 (en) System and method for securing private keys issued from distributed private key generator (D-PKG) nodes
WO2021114819A1 (en) Methods for generating and executing smart contract transaction and device
CN111431713B (en) Private key storage method and device and related equipment
CN110289968B (en) Private key recovery method, collaborative address creation method, collaborative address signature device and storage medium
CN110959163B (en) Computer-implemented system and method for enabling secure storage of large blockchains on multiple storage nodes
CN105931337A (en) Electronic lock device and system and authorizing method of electronic lock system
CN111404950B (en) Information sharing method and device based on block chain network and related equipment
US20100275015A1 (en) Anonymous register system and method thereof
JP2023500570A (en) Digital signature generation using cold wallet
WO2014114080A1 (en) Method and system for data encryption protection
CN115296838B (en) Block chain-based data sharing method, system and storage medium
Cheng An architecture for the Internet Key Exchange protocol
CN114266069A (en) House transaction electronic data sharing system and method based on block chain technology
Yang et al. Publicly verifiable outsourced data migration scheme supporting efficient integrity checking
JP4807944B2 (en) Challenge-based authentication that does not require knowledge of secret authentication data
Bagga et al. Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system
CN114500069A (en) Method and system for storing and sharing electronic contract
CN117094825A (en) Cross-chain trusted land transaction system and method based on blockchain
CN117390676A (en) Offline privacy protection prediction method, system and equipment of trusted execution environment
CN115913513B (en) Distributed trusted data transaction method, system and device supporting privacy protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant