CN114119021A - Image file security multi-party calculation method and system - Google Patents

Image file security multi-party calculation method and system Download PDF

Info

Publication number
CN114119021A
CN114119021A CN202111446594.5A CN202111446594A CN114119021A CN 114119021 A CN114119021 A CN 114119021A CN 202111446594 A CN202111446594 A CN 202111446594A CN 114119021 A CN114119021 A CN 114119021A
Authority
CN
China
Prior art keywords
calculation
party
block chain
transaction
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111446594.5A
Other languages
Chinese (zh)
Inventor
罗强
裴磊
曾钊创
黄文韬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202111446594.5A priority Critical patent/CN114119021A/en
Publication of CN114119021A publication Critical patent/CN114119021A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing

Abstract

The invention provides a secure multi-party computing method and a secure multi-party computing system for image files, which are suitable for a block chain network, relate to the field of data sharing, and can be applied to the financial field and other fields, wherein the method comprises the following steps: receiving a multiparty secure computing transaction request provided by a user, and assembling a request transaction message according to the multiparty secure transaction request; broadcasting the request transaction message to the block chain network, analyzing the request transaction message by a block chain link point in the block chain network to obtain a corresponding contract identifier, and obtaining a corresponding calculation parameter in the block chain network according to the contract identifier; transmitting the calculation parameters to other multi-party calculation nodes, and performing combined calculation on the calculation parameters through a content perception algorithm by each multi-party calculation node to obtain a calculation result; providing the computation result to the blockchain node, and providing the computation result to the blockchain network consensus record by the blockchain node.

Description

Image file security multi-party calculation method and system
Technical Field
The invention relates to the field of data sharing, which can be applied to the financial field and other fields, in particular to a secure multi-party computing method and system for image files.
Background
In a traditional distributed system, all parties participating in the system need to perform data interaction around a regional central system, business processes among cross-institutions in all the systems need to be subjected to circulation processing through the central system, data processing is limited by processing timeliness of the central system, and timeliness is low; in addition, each participant in the system is reluctant to share internal data maliciously in consideration of data privacy, business interests and the like, and even if the leaked private picture files are found, the participant can not trace back and ask for the right. This results in that a data island is easily formed in a multi-centralized operation system, a cross-subject and cross-scene joint operation mode is difficult to form, and a service development mode is limited.
The decentralized, non-tamper and traceable characteristics of the block chain system provide a good solution for solving the problems encountered by centralized operation, but in practical application, some problems to be solved in the aspect of data privacy protection still exist. Although the blockchain has a relatively safe operating environment, the data is not private in nature, a user creates the data, but the data cannot be guaranteed to be owned by the user without a data control right and a tracing means, one of the values of the blockchain is that the data cannot be tampered and the ownership cannot be confirmed, and once the data is taken away on a blockchain system, an individual cannot have the unique ownership of the data. In addition, due to the existence of a physical channel data isolation mechanism in the block chain, data among channels are not visible, and the application of cross-scene and cross-mechanism trusted data transfer of the mechanism on the block chain is limited to a certain extent.
Disclosure of Invention
The invention aims to provide an image file security multi-party computing method and system, which improve the privacy data protection capability of the image file by combining a block chain and a multi-party security computing technology, solve the problem of decentralized data privacy protection and the problem of data ownership by combining the block chain, a digital identity and multi-party security computing (MPC), and provide a search basis for the possible malicious spread of privacy data in the future.
To achieve the above object, the present invention provides a secure multi-party image file computing method, which is applicable to a blockchain network, and the method includes: receiving a multiparty secure computing transaction request provided by a user, and assembling a request transaction message according to the multiparty secure transaction request; broadcasting the request transaction message to the block chain network, analyzing the request transaction message by a block chain link point in the block chain network to obtain a corresponding contract identifier, and obtaining a corresponding calculation parameter in the block chain network according to the contract identifier; transmitting the calculation parameters to other multi-party calculation nodes, and performing combined calculation on the calculation parameters through a content perception algorithm by each multi-party calculation node to obtain a calculation result; providing the computation result to the blockchain node, and providing the computation result to the blockchain network consensus record by the blockchain node.
In the above image file secure multiparty computation method, preferably, before receiving a multiparty secure computation transaction request provided by a user, the method further includes: acquiring a multiparty security calculation intelligent contract deployment request, and generating a corresponding contract unique identifier and a transaction unique identifier for contract deployment transaction according to the intelligent contract deployment request; generating a deployment transaction message according to the contract unique identifier, the transaction unique identifier and the intelligent contract deployment request; and broadcasting the deployment transaction message to each block chain node in the block chain network, and deploying the corresponding intelligent contract by each block chain node according to the deployment transaction message.
In the foregoing image file security multiparty computation method, preferably, performing joint computation by a content-aware algorithm to obtain a computation result includes: generating digital watermarks of all parties of the image data in the multi-party secure computation transaction request according to the computation parameters; adding the digital watermark into the image data and converting the image data into image data with a preset size through a low-pass filter; and converting the pixel matrix of the picture data by utilizing Fourier series, extracting a characteristic vector, and compressing the characteristic vector to obtain a calculation result.
In the foregoing image file security multiparty calculation method, preferably, extracting the feature vector after converting the pixel matrix of the picture data by using fourier series further includes: and generating a public and private key pair according to the feature vector, and encrypting and decrypting the calculation result through the public and private key pair by the multi-party calculation node and the block chain node.
In the foregoing image file security multiparty computation method, preferably, the providing, by the blockchain node, the computation result to the blockchain network consensus record further includes: and carrying out evaluation similarity verification on the calculation result, and providing the calculation result to the block chain network consensus record according to the verification result.
In the foregoing image file security multiparty computation method, preferably, the evaluating similarity verification of the computation result includes: verifying the calculation results of each multi-party calculation node according to the public and private key pair; and after the verification is passed, analyzing the similarity of each calculation result by using zero knowledge proof to obtain a similarity verification result.
The invention also provides an image file security multi-party computing system, which comprises a client access layer, a multi-party security computing network formed by a plurality of multi-party computing nodes and a block chain network comprising a plurality of block chain nodes; the client access layer comprises a plurality of clients, and the clients are used for receiving a multiparty secure computing transaction request provided by a user and providing the multiparty secure transaction request to an associated multiparty computing node; the multi-party computing node is used for assembling a transaction message according to the received multi-party safe transaction request and broadcasting the transaction message to the block chain network; transmitting the received calculation parameters to other multi-party calculation nodes, performing joint calculation on the calculation parameters by each multi-party calculation node to obtain a calculation result, and providing the calculation result to the block chain node; the block chain node is used for acquiring the transaction message broadcasted in the block chain network, analyzing the transaction message to acquire a corresponding contract identifier, and acquiring a corresponding calculation parameter in the block chain network according to the contract identifier; providing the computing parameters to the associated multi-party computing nodes; and providing the received calculation result to the block chain network consensus record.
In the image file security multiparty computing system, preferably, the block nodes include a transaction processing module, and the transaction processing module is configured to obtain a multiparty security computing intelligent contract deployment request, and generate a corresponding contract unique identifier and a transaction unique identifier for deploying contract transaction according to the intelligent contract deployment request; generating a deployment transaction message according to the contract unique identifier, the transaction unique identifier and the intelligent contract deployment request; and broadcasting the deployment transaction message to each block chain node in the block chain network, and deploying the corresponding intelligent contract by each block chain node according to the deployment transaction message.
In the above image file secure multiparty computing system, preferably, the multiparty computing node includes a secure computing module, and the secure computing module is configured to generate digital watermarks of all parties of image data in the multiparty secure computing transaction request according to the computing parameters; adding the digital watermark into the image data and converting the image data into image data with a preset size through a low-pass filter; and converting the pixel matrix of the picture data by utilizing Fourier series, extracting a characteristic vector, and compressing the characteristic vector to obtain a calculation result.
In the above image file secure multi-party computing system, preferably, the multi-party computing node further includes a ciphertext processing module, the ciphertext processing module is configured to generate a public and private key pair according to the feature vector, and the multi-party computing node and the block chain node encrypt and decrypt the computing result through the public and private key pair.
In the above image file security multiparty computing system, preferably, the block chain node further includes a consensus verification module, where the consensus verification module is configured to perform evaluation similarity verification on the computation result, and provide the computation result to the block chain network consensus record according to the verification result.
In the above image file security multiparty computing system, preferably, the consensus verification module further comprises: verifying the calculation results of each multi-party calculation node according to the public and private key pair; and after the verification is passed, analyzing the similarity of each calculation result by using zero knowledge proof to obtain a similarity verification result.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method when executing the computer program.
The present invention also provides a computer-readable storage medium storing a computer program for executing the above method.
The invention has the beneficial technical effects that: aiming at pain points of difficult tracking, difficult evidence demonstration, high cost, low efficiency and the like of a user data file in block chain + multi-party security calculation, the traditional centralized operation mode is broken through, and a solution for block chain digital identity image file security multi-party calculation is provided; the semantic perception hash algorithm is embedded into the block chain and multi-party security computing technology, the problems of content tracking and operation of the digital file are effectively solved, and the method can be widely applied to business scenes such as security data sharing, financial business and the like.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the principles of the invention. In the drawings:
FIG. 1 is a flow chart illustrating a method for multi-party secure computing of image files according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an intelligent contract deployment process provided by an embodiment of the invention;
FIG. 3 is a diagram of an intelligent contract deployment application provided by an embodiment of the invention;
FIG. 4 is a flow diagram illustrating multi-party security computation according to an embodiment of the present invention;
FIG. 5 is a flow chart illustrating joint computation according to an embodiment of the present invention;
FIG. 6 is a flow chart of multi-party computing according to an embodiment of the present invention;
FIG. 7 is a flowchart illustrating a query of a computation result according to an embodiment of the present invention;
FIG. 8 is a block diagram of an image file secure multi-party computing system according to an embodiment of the present invention;
FIG. 9 is a block diagram of a multi-party computing node according to an embodiment of the invention;
fig. 10 is a schematic structural diagram of a blockchain node according to an embodiment of the present invention;
FIG. 11 is a schematic diagram illustrating an exemplary image file secure multi-party computing system according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention will be provided with reference to the drawings and examples, so that how to apply the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented. It should be noted that, unless otherwise specified, the embodiments and features of the embodiments of the present invention may be combined with each other, and the technical solutions formed are within the scope of the present invention.
Additionally, the steps illustrated in the flow charts of the figures may be performed in a computer system such as a set of computer-executable instructions and, although a logical order is illustrated in the flow charts, in some cases, the steps illustrated or described may be performed in an order different than here.
Referring to fig. 1, a method for multi-party secure computation of an image file according to the present invention is applicable to a block chain network, and the method includes:
s101, receiving a multi-party secure computing transaction request provided by a user, and assembling a request transaction message according to the multi-party secure transaction request;
s102, broadcasting the transaction request message to the block chain network, analyzing the transaction request message by a block chain link point in the block chain network to obtain a corresponding contract identifier, and obtaining a corresponding calculation parameter in the block chain network according to the contract identifier;
s103, transmitting the calculation parameters to other multi-party calculation nodes, and performing combined calculation on the calculation parameters through a content perception algorithm by each multi-party calculation node to obtain a calculation result;
s104 provides the calculation result to the blockchain node, and the blockchain node provides the calculation result to the blockchain network consensus record.
In the above embodiment, a multi-party security computing (MPC) is an encryption protocol, and performs data computation in a distributed system, and each party cannot know data of other parties in the computation process. Secure, confidential computation of data can be performed without the need for each participant to disclose or upload the data. Digital Identities (DID) adopt a public-private key mechanism, a private key is kept by an entity (or is managed by an agent), and a public key is issued to a block chain and is disclosed in the whole network, so that double functions of data encryption and identity authentication are realized. Block chains, digital identities and multiple parties are combined safely, and attributes of traceable and selective disclosure are given to private data by providing private data digital identity authentication and certain computing power, so that barriers that channel data cannot be used are broken, and the value of the private data on the block chains is improved; the implementation principle of the above embodiment provided by the invention mainly lies in that: the sender may be multiple agents responsible for the authenticity of the transaction data and the reliability of the access object, first multiple agents (assuming a, a ═ a { (a })iI belongs to N), then determining a receiver of the data (assumed to be B), encrypting the data by using the ID of B, packaging the encrypted data into a message and transmitting the message to a block chain, decrypting the encrypted data obtained by B through the block chain by using a private key, and then verifying the signature in batch by using the public key of A. In a blockchain network, all blocknodes, users have a digital identity DID, formalized as:
DID={id|did:method:Did-Identifier};
the DID is the identity ID of the node and the user in the blockchain network, is synchronized to the common identification billing node through the blockchain network, and is stored in the block. The blockchain network provides an intelligent contract to provide query services for visitors, and the specific implementation will be described in the following embodiments, which will not be described in detail herein.
Referring to fig. 2, in an embodiment of the present invention, before receiving a request for a secure multi-party computing transaction provided by a user, the method further includes:
s201, acquiring a multiparty security calculation intelligent contract deployment request, and generating a corresponding contract unique identifier and a transaction unique identifier for contract deployment transaction according to the intelligent contract deployment request;
s202, generating a deployment transaction message according to the contract unique identifier, the transaction unique identifier and the intelligent contract deployment request;
s203, broadcasting the deployment transaction message to each block chain node in the block chain network, and deploying the corresponding intelligent contract by each block chain node according to the deployment transaction message.
The embodiment is mainly used for deploying intelligent contracts, and the actual operation flow of the embodiment can be shown in fig. 3: s301: an operator on any node initiates an intelligent contract deployment request of multi-party security calculation to the node through a client, and a block link point receives the deployment request; s302: the transaction processing module generates a unique identifier of contract transaction and a unique identifier of an intelligent contract after receiving the intelligent contract deployment request, and then assembles the unique identifier of the transaction, the unique identifier of the contract, an intelligent contract code, related parameters and the like into a message. S303: the transaction processing module of the blockchain node calls the communication module to broadcast the message assembled in the step S302 to other blockchain nodes in the blockchain system; s304: each node receives the contract deployment request message, and begins to analyze the request message, if the node is involved, the node begins to compile an intelligent contract code, and starts an intelligent contract execution environment; s305: the block link node returns the deployment success status to the operator's client. The multi-party secure computing transaction may then be performed, as shown in FIG. 4: s401: after the nodes involved in the transaction are deployed with the intelligent contract, the client starts to issue a multi-party security computing transaction request, and relevant computing parameters and a unique identifier of the multi-party security computing intelligent contract are specified in the transaction request; s402: a communication module of the multi-party safety computing node receives a multi-party safety computing transaction request and assembles a transaction message; s403: encrypting the transaction message, and broadcasting a transaction request to the blockchain system through the communication module; and the system is responsible for encrypting and decrypting the multi-party security calculation message and executing a content perception algorithm. The content perception algorithm comprises two steps of generating a feature vector and evaluating similarity, wherein the step of generating the feature vector comprises the following steps of: preprocessing, characteristic generation and post-processing; the similarity evaluation includes 4 steps of calculating the similarity, transmitting information, responding to a request, and checking the similarity, and the detailed flow will be described in the following embodiments one by one, and will not be described in detail herein.
Referring to fig. 5, in an embodiment of the present invention, the obtaining of the calculation result by performing the joint calculation through the content-aware algorithm includes:
s501, generating digital watermarks of all parties of image data in the multi-party secure computation transaction request according to the computation parameters;
s502, adding the digital watermark into the image data and converting the image data into image data with a preset size through a low-pass filter;
s503, extracting a characteristic vector after the pixel matrix of the picture data is converted by Fourier series, and compressing the characteristic vector to obtain a calculation result.
Specifically, the calculation result is mainly the above feature vector, and the generation flow of the feature vector in actual work is as follows:
(1) pretreatment: an image owner digital watermark is generated. Let DID of image owner A be DidADid is processed by Hash algorithmAHash code HDid converted into 256 bitsAI.e., a digital watermark, and further extended to a m × n sparse matrix R as follows:
R=Sprand(m,n,HDidA);
the spread represents a sparse matrix function, the mxn represents sparse matrix rows and columns, and the scale is equal to the size of the long and wide pixel points of the original image.
Let I be the original picture of m × n, add the digital watermark of A to I as follows:
I=I×R;
the picture or text is converted to a fixed size picture (e.g., 512x512 pixels) by a low pass filter. Let I (x, y) denote the pixel matrix, which is converted into polar form I (ρ, θ) using fourier series.
(2) And (3) feature generation: selecting m groups of feature sets { gammaj}j∈[m]Selecting rho epsilon gammajFor unique (non-repeating) feature variables in the picture pixel matrix, a random number β is chosen for each ρρCorresponding to it. The feature vector of the image is represented as h1,h2,...,hmAnd (c) the step of (c) in which,
Figure BDA0003384110480000071
i (ρ, θ) is the polar form of pixel I (x, y).
(3) And (3) post-treatment: the feature vectors are quantized and compressed, and the distribution function is applied to the compression process, which is not described herein.
In an embodiment of the present invention, extracting the feature vector after transforming the pixel matrix of the picture data by using fourier series may further include: and generating a public and private key pair according to the feature vector, and encrypting and decrypting the calculation result through the public and private key pair by the multi-party calculation node and the block chain node. The specific process can refer to fig. 6, where S601: each block chain node receives a multi-party safety calculation transaction request, analyzes the message, acquires the unique identifier of the intelligent contract, transmits the related information to the corresponding intelligent contract, is processed by the intelligent contract module, executes the business logic of the intelligent contract and performs data processing; s602: acquiring data required by the multi-party secure computing transaction from a block link data database according to the intelligent contract service logic, and then delivering the data to the multi-party secure computing node; s603: receiving transaction report by multi-party safety computing nodeThe message data is encrypted by using the transaction message data acquired by the encryption module; s604: the data after encryption processing is transmitted to other nodes in the system by the communication module, and the transmission message comprises a calculation factor, a random number, a data ciphertext and the like; s605: each node uses a ciphertext processing module in the multi-party safe computing node to carry out combined computation on the ciphertext obtained by communication; s606: the final result of the joint calculation of the multiparty security calculation cryptograph processing module is returned to the intelligent contract node; s607: the intelligent contract of each block chain link point verifies the transaction result of the multi-party safety calculation through a block chain consensus mechanism certificate, finally achieves consensus and records the consensus into a block chain account book; and the intelligent contract is responsible for executing the intelligent contract to form a joint calculation result, and verifying and evaluating a similarity result. Wherein the public-private key pair is primarily used to produce beta during feature vector generationρAnd selecting rho epsilon gammaj. The calculation formula is as follows:
Figure BDA0003384110480000081
in an embodiment of the present invention, providing, by the blockchain node, the calculation result to the blockchain network consensus record further comprises: and carrying out evaluation similarity verification on the calculation result, and providing the calculation result to the block chain network consensus record according to the verification result. Wherein the evaluating the similarity verification of the calculation result comprises: verifying the calculation results of each multi-party calculation node according to the public and private key pair; and after the verification is passed, analyzing the similarity of each calculation result by using zero knowledge proof to obtain a similarity verification result. Specifically, in actual work, the calculation of the similarity includes calculation of two ends (a client and a blockchain node), and a client calculation model is represented as:
Figure BDA0003384110480000082
wherein the content of the first and second substances,
Figure BDA0003384110480000083
in the above-mentioned formula, the compound of formula,
Figure BDA0003384110480000084
representing the use of a public key pair betaρ,jAs a result of the encryption, u represents the size of the vector space, N represents a large prime number, and ρ ∈ ΓjAs a unique (non-repeating) feature vector in the picture pixel matrix, cpRepresents the sum of the square roots of the polar axes separated by k angles (< pi).
And the block chain node needs to decrypt the characteristic vector and then compresses the characteristic vector by adopting the operation similar to the post-processing stage.
The analysis flow for the above zero knowledge proof is as follows:
the client user needs to prove that he is able to provide the vector:
[cρ]∈ZN(forρ=1,...,u);
thereby satisfying:
Figure BDA0003384110480000091
the standard zero knowledge proof procedure was used as follows:
the client calculates:
for each value rρR ZNAnd calculating:
Figure BDA0003384110480000092
b block link point transmission random number:
the block chain node sends a random number to the client: e is an element ofR ZN
C, client response:
the client side responds to the message: sρ=rρ+ecρmod N;
In the above formula, rρR ZNIs an integer less than N, e ∈R ZNThe random number is sent by the server to the client.
D, checking the block link points:
checking the block chain nodes:
Figure BDA0003384110480000093
if the two sides are equal, the similarity is close, otherwise, the similarity is not similar.
And finally, determining whether to perform consensus or not according to the similarity serving as a verification result.
On the basis, when any operator needs to query the multi-party security calculation result, reference may be made to fig. 7, where S701: the operator B sends a multi-party safety calculation result query request through the client; s702: the block chain node acquires a multi-party security joint calculation result by executing intelligent contract inquiry transaction; s703: and returning the joint calculation result to the client to finish the transaction.
The invention also provides an image file security multi-party computing system, which comprises a client access layer, a multi-party security computing network formed by a plurality of multi-party computing nodes and a block chain network comprising a plurality of block chain nodes; the client access layer comprises a plurality of clients, and the clients are used for receiving a multiparty secure computing transaction request provided by a user and providing the multiparty secure transaction request to an associated multiparty computing node; the multi-party computing node is used for assembling a transaction message according to the received multi-party safe transaction request and broadcasting the transaction message to the block chain network; transmitting the received calculation parameters to other multi-party calculation nodes, performing joint calculation on the calculation parameters by each multi-party calculation node to obtain a calculation result, and providing the calculation result to the block chain node; the block chain node is used for acquiring the transaction message broadcasted in the block chain network, analyzing the transaction message to acquire a corresponding contract identifier, and acquiring a corresponding calculation parameter in the block chain network according to the contract identifier; providing the computing parameters to the associated multi-party computing nodes; and providing the received calculation result to the block chain network consensus record. Specifically, please refer to fig. 8, which shows a structure including a client 1, an MPC node 2, and a block link point 3. The client side 1: the system is mainly responsible for initiating an intelligent contract deployment request, a multi-party secure computation transaction request, a multi-party secure computation query request and the like. MPC node 2: the system is responsible for receiving a multi-party safe transaction request, performing multi-party safe calculation, and storing transaction information to a block link point. The client A and the client B of the invention are respectively accessed into the MPC node, and will issue a safe multi-party calculation request through the MPC node and receive a safe multi-party calculation result. And the block chain node 3 is a node for finishing functions of transaction broadcasting, transaction execution, transaction verification, consensus, storage and the like. Having the general characteristics of a blockchain. The client initiates the joint calculation and query of the multi-party security calculation, and meanwhile, the transaction records after the intelligent contract of the multi-party security calculation is executed are also stored on the block chain.
In an embodiment of the present invention, the multi-party computing node includes a secure computing module, and the secure computing module is configured to generate digital watermarks of all parties of image data in the multi-party secure computing transaction request according to the computing parameters; adding the digital watermark into the image data and converting the image data into image data with a preset size through a low-pass filter; and converting the pixel matrix of the picture data by utilizing Fourier series, extracting a characteristic vector, and compressing the characteristic vector to obtain a calculation result. Furthermore, the multi-party computing node may further include a ciphertext processing module, where the ciphertext processing module is configured to generate a public and private key pair according to the feature vector, and the multi-party computing node and the block chain node encrypt and decrypt the computation result through the public and private key pair. Specifically, referring to fig. 9, in actual operation, the MPC node includes a communication module 21, a ciphertext processing module 22, and a security calculation module 23. The communication module 21: and the system is responsible for establishing a security channel for the multi-party security computing node 2 and realizing the receiving and sending of multi-party security computing messages. The ciphertext processing module 22: the main module is responsible for encrypting and decrypting the multi-party security calculation message and executing the content perception algorithm. The content perception algorithm comprises two steps of generating a feature vector and evaluating similarity, and the generation of the special function vector comprises the following steps: preprocessing, characteristic generation and post-processing; evaluating the similarity comprises 4 steps of calculating the similarity, transmitting information, responding to a request and checking the similarity; the detailed implementation of the generating feature vector and the evaluating similarity are described in detail in the foregoing embodiments, and will not be described in detail herein.
In an embodiment of the present invention, the block link node includes a transaction processing module, and the transaction processing module is configured to obtain a multiparty security computation intelligent contract deployment request, and generate a corresponding contract unique identifier and a transaction unique identifier for deploying contract transaction according to the intelligent contract deployment request; generating a deployment transaction message according to the contract unique identifier, the transaction unique identifier and the intelligent contract deployment request; and broadcasting the deployment transaction message to each block chain node in the block chain network, and deploying the corresponding intelligent contract by each block chain node according to the deployment transaction message. Further, the block chain node may further include a consensus verification module, where the consensus verification module is configured to perform similarity evaluation verification on the calculation result, and provide the calculation result to the block chain network consensus record according to the verification result. Wherein the consensus verification module further comprises: verifying the calculation results of each multi-party calculation node according to the public and private key pair; and after the verification is passed, analyzing the similarity of each calculation result by using zero knowledge proof to obtain a similarity verification result. Specifically, referring to fig. 10, in practical operation, the technical structure of the blockchain node 3 includes: the system comprises a communication module 31, a transaction processing module 32, an intelligent contract module 33 and a consensus verification module 34. The communication module 31: the system is responsible for communication interaction among all nodes and completes general block link node communication information including transaction information broadcast, consensus related information, block synchronization information, network state information and the like. The transaction processing module 32: the system is responsible for receiving a transaction request, generating a transaction unique identifier, assembling the transaction unique identifier, the contract unique identifier and the calling parameter into a transaction, and broadcasting the transaction to other nodes of the block chain. Intelligent contract module 33: the communication module 22 receives the transaction request, obtains a calculation result through multi-party security calculation, judges according to a preset service logic, and submits a final transaction instruction to the transaction processing module 21 through the communication module 22 for execution. The consensus verification module 34: the intelligent contract module 23 is used for carrying out consensus processing on the received transaction request, if the consensus is achieved, the intelligent contract module is called to execute the intelligent contract, and finally a record is formed for future audit and tracing or verification. And the intelligent contract is responsible for executing the intelligent contract to form a joint calculation result, and verifying and evaluating a similarity result.
In summary, the multi-party computing system for image file security provided by the present invention can be implemented as shown in fig. 11, which mainly includes a client access layer 41, a multi-party secure computing network 42, and a block chain network 43. The client access layer 41: the client software which is responsible for providing the access of the operator is convenient for initiating the multiparty security calculation request and receiving the multiparty security calculation result. The client can issue a chain code on the blockchain platform, after the client generates the behavior data, the client can call the chain code to initiate a transaction request, link the behavior data and submit the behavior data to channels corresponding to all scenes according to the using scenes of the client (the client can directly upload the behavior data of the client without processing, and the specific data processing logic can be executed by a scene provider). The supplier can also issue chain codes, can inquire the data belonging to the channel of the supplier, and can process and analyze the data of the channel of the supplier. Multi-party secure computing network 42: and the system is responsible for configuring learned parameters, data, service logic and the like through the multi-party security computation logic according to the computation request submitted by the client, simultaneously encrypting to form a secure multi-party computation message, and broadcasting the secure multi-party computation message to the block chain network 43. The scene provider can also issue a joint operation chain code, the MPC service is called through the chain code, each block chain node has a corresponding MPC service, and the chain code can specify which MPC services are required to perform joint calculation. The scene provider initiates a joint calculation request through the chain code, originally, the data of the providers of other channels cannot be accessed mutually, and joint query calculation can be carried out through the MPC under the condition that the respective data are not leaked. Block chain network 43: and the system is responsible for receiving and decrypting the safe multi-party computing message, triggering preset intelligent contract logic and forming a safe multi-party computing result. Blockchain networks may provide hosted nodes and local node deployments for capable providers. Each scene provider has its own channel on the block chain, and the scene provider cannot acquire data information of other channels, that is, other providers.
The invention has the beneficial technical effects that: aiming at pain points of difficult tracking, difficult evidence demonstration, high cost, low efficiency and the like of a user data file in block chain + multi-party security calculation, the traditional centralized operation mode is broken through, and a solution for block chain digital identity image file security multi-party calculation is provided; the semantic perception hash algorithm is embedded into the block chain and multi-party security computing technology, the problems of content tracking and operation of the digital file are effectively solved, and the method can be widely applied to business scenes such as security data sharing, financial business and the like.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method when executing the computer program.
The present invention also provides a computer-readable storage medium storing a computer program for executing the above method.
As shown in fig. 12, the electronic device 600 may further include: communication module 110, input unit 120, audio processing unit 130, display 160, power supply 170. It is noted that the electronic device 600 does not necessarily include all of the components shown in fig. 12; furthermore, the electronic device 600 may also comprise components not shown in fig. 12, which may be referred to in the prior art.
As shown in fig. 12, the central processor 100, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, the central processor 100 receiving input and controlling the operation of the various components of the electronic device 600.
The memory 140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 100 may execute the program stored in the memory 140 to realize information storage or processing, etc.
The input unit 120 provides input to the cpu 100. The input unit 120 is, for example, a key or a touch input device. The power supply 170 is used to provide power to the electronic device 600. The display 160 is used to display an object to be displayed, such as an image or a character. The display may be, for example, an LCD display, but is not limited thereto.
The memory 140 may be a solid state memory such as Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 140 may also be some other type of device. Memory 140 includes buffer memory 141 (sometimes referred to as a buffer). The memory 140 may include an application/function storage section 142, and the application/function storage section 142 is used to store application programs and function programs or a flow for executing the operation of the electronic device 600 by the central processing unit 100.
The memory 140 may also include a data store 143, the data store 143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by the electronic device. The driver storage portion 144 of the memory 140 may include various drivers of the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging application, address book application, etc.).
The communication module 110 is a transmitter/receiver 110 that transmits and receives signals via an antenna 111. The communication module (transmitter/receiver) 110 is coupled to the central processor 100 to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 110 is also coupled to a speaker 131 and a microphone 132 via an audio processor 130 to provide audio output via the speaker 131 and receive audio input from the microphone 132 to implement general telecommunications functions. Audio processor 130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, an audio processor 130 is also coupled to the central processor 100, so that recording on the local can be enabled through a microphone 132, and so that sound stored on the local can be played through a speaker 131.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (14)

1. A secure multi-party computing method for image files, which is applicable to a block chain network, is characterized by comprising the following steps:
receiving a multiparty secure computing transaction request provided by a user, and assembling a request transaction message according to the multiparty secure transaction request;
broadcasting the request transaction message to the block chain network, analyzing the request transaction message by a block chain link point in the block chain network to obtain a corresponding contract identifier, and obtaining a corresponding calculation parameter in the block chain network according to the contract identifier;
transmitting the calculation parameters to other multi-party calculation nodes, and performing combined calculation on the calculation parameters through a content perception algorithm by each multi-party calculation node to obtain a calculation result;
providing the computation result to the blockchain node, and providing the computation result to the blockchain network consensus record by the blockchain node.
2. The image file secure multi-party computing method according to claim 1, wherein receiving a user-provided multi-party secure computing transaction request further comprises:
acquiring a multiparty security calculation intelligent contract deployment request, and generating a corresponding contract unique identifier and a transaction unique identifier for contract deployment transaction according to the intelligent contract deployment request;
generating a deployment transaction message according to the contract unique identifier, the transaction unique identifier and the intelligent contract deployment request;
and broadcasting the deployment transaction message to each block chain node in the block chain network, and deploying the corresponding intelligent contract by each block chain node according to the deployment transaction message.
3. The image file security multiparty computation method of claim 1, wherein performing joint computation through a content-aware algorithm to obtain computation results comprises:
generating digital watermarks of all parties of the image data in the multi-party secure computation transaction request according to the computation parameters;
adding the digital watermark into the image data and converting the image data into image data with a preset size through a low-pass filter;
and converting the pixel matrix of the picture data by utilizing Fourier series, extracting a characteristic vector, and compressing the characteristic vector to obtain a calculation result.
4. The image file security multiparty calculation method according to claim 3, wherein extracting feature vectors after transforming the pixel matrix of the picture data using Fourier series further comprises:
and generating a public and private key pair according to the feature vector, and encrypting and decrypting the calculation result through the public and private key pair by the multi-party calculation node and the block chain node.
5. The method of claim 4, wherein providing the computation result to the blockchain network consensus record by the blockchain node further comprises:
and carrying out evaluation similarity verification on the calculation result, and providing the calculation result to the block chain network consensus record according to the verification result.
6. The image file security multiparty computation method of claim 5, wherein the evaluating similarity validation of the computation results comprises:
verifying the calculation results of each multi-party calculation node according to the public and private key pair;
and after the verification is passed, analyzing the similarity of each calculation result by using zero knowledge proof to obtain a similarity verification result.
7. The image file safety multi-party computing system is characterized by comprising a client access layer, a multi-party safety computing network formed by a plurality of multi-party computing nodes and a block chain network comprising a plurality of block chain nodes;
the client access layer comprises a plurality of clients, and the clients are used for receiving a multiparty secure computing transaction request provided by a user and providing the multiparty secure transaction request to an associated multiparty computing node;
the multi-party computing node is used for assembling a transaction message according to the received multi-party safe transaction request and broadcasting the transaction message to the block chain network; transmitting the received calculation parameters to other multi-party calculation nodes, performing joint calculation on the calculation parameters by each multi-party calculation node to obtain a calculation result, and providing the calculation result to the block chain node;
the block chain node is used for acquiring the transaction message broadcasted in the block chain network, analyzing the transaction message to acquire a corresponding contract identifier, and acquiring a corresponding calculation parameter in the block chain network according to the contract identifier; providing the computing parameters to the associated multi-party computing nodes; and providing the received calculation result to the block chain network consensus record.
8. The image file security multiparty computing system according to claim 7, wherein the block link node comprises a transaction processing module, the transaction processing module is configured to obtain a multiparty security computing intelligent contract deployment request, and generate a corresponding contract unique identifier and a transaction unique identifier for deploying a contract transaction according to the intelligent contract deployment request; generating a deployment transaction message according to the contract unique identifier, the transaction unique identifier and the intelligent contract deployment request; and broadcasting the deployment transaction message to each block chain node in the block chain network, and deploying the corresponding intelligent contract by each block chain node according to the deployment transaction message.
9. The image file secure multi-party computing system according to claim 7, wherein the multi-party computing node comprises a secure computing module, the secure computing module is configured to generate digital watermarks of all parties of image data in the multi-party secure computing transaction request according to the computing parameters; adding the digital watermark into the image data and converting the image data into image data with a preset size through a low-pass filter; and converting the pixel matrix of the picture data by utilizing Fourier series, extracting a characteristic vector, and compressing the characteristic vector to obtain a calculation result.
10. The image file security multi-party computing system of claim 9, wherein the multi-party computing nodes further comprise a ciphertext processing module, the ciphertext processing module is configured to generate a public and private key pair according to the feature vector, and the multi-party computing nodes and the blockchain nodes encrypt and decrypt the computation results through the public and private key pair.
11. The image file security multi-party computing system of claim 10, wherein the blockchain node further comprises a consensus verification module, the consensus verification module is configured to perform an evaluation similarity verification on the computation result, and provide the computation result to the blockchain network consensus record according to the verification result.
12. The image file secure multi-party computing system of claim 11, wherein the consensus verification module further comprises: verifying the calculation results of each multi-party calculation node according to the public and private key pair; and after the verification is passed, analyzing the similarity of each calculation result by using zero knowledge proof to obtain a similarity verification result.
13. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1 to 6 when executing the computer program.
14. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the method of any one of claims 1 to 6 by a computer.
CN202111446594.5A 2021-11-30 2021-11-30 Image file security multi-party calculation method and system Pending CN114119021A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111446594.5A CN114119021A (en) 2021-11-30 2021-11-30 Image file security multi-party calculation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111446594.5A CN114119021A (en) 2021-11-30 2021-11-30 Image file security multi-party calculation method and system

Publications (1)

Publication Number Publication Date
CN114119021A true CN114119021A (en) 2022-03-01

Family

ID=80368768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111446594.5A Pending CN114119021A (en) 2021-11-30 2021-11-30 Image file security multi-party calculation method and system

Country Status (1)

Country Link
CN (1) CN114119021A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114430326A (en) * 2022-04-07 2022-05-03 中国工商银行股份有限公司 Block chain based information confirmation method and device, electronic equipment and storage medium
CN114584513A (en) * 2022-03-10 2022-06-03 中国工商银行股份有限公司 Content perception method and system combining block chain and safety multi-party technology
CN114726611A (en) * 2022-04-01 2022-07-08 网银在线(北京)科技有限公司 Multiparty privacy set intersection method, system and device
CN115242409A (en) * 2022-09-21 2022-10-25 环球数科集团有限公司 Privacy calculation method and system based on zero-knowledge proof

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114584513A (en) * 2022-03-10 2022-06-03 中国工商银行股份有限公司 Content perception method and system combining block chain and safety multi-party technology
CN114726611A (en) * 2022-04-01 2022-07-08 网银在线(北京)科技有限公司 Multiparty privacy set intersection method, system and device
CN114430326A (en) * 2022-04-07 2022-05-03 中国工商银行股份有限公司 Block chain based information confirmation method and device, electronic equipment and storage medium
CN115242409A (en) * 2022-09-21 2022-10-25 环球数科集团有限公司 Privacy calculation method and system based on zero-knowledge proof
CN115242409B (en) * 2022-09-21 2022-11-25 环球数科集团有限公司 Privacy calculation method and system based on zero-knowledge proof

Similar Documents

Publication Publication Date Title
CN111970129B (en) Data processing method and device based on block chain and readable storage medium
CN111949953B (en) Identity authentication method, system and device based on block chain and computer equipment
CN114119021A (en) Image file security multi-party calculation method and system
KR101985179B1 (en) Blockchain based id as a service
CN111556120A (en) Data processing method and device based on block chain, storage medium and equipment
CN111767569A (en) Access authorization method and node of block chain
KR20210139344A (en) Methods and devices for performing data-driven activities
CN113743939A (en) Identity authentication method, device and system based on block chain
CN113014379B (en) Three-party authentication and key agreement method, system and computer storage medium supporting cross-cloud domain data sharing
CN112787812A (en) Block chain-based calculation job processing method, device and system
CN114430326B (en) Block chain based information confirmation method and device, electronic equipment and storage medium
EP3627361B1 (en) Media content control
CN113365264B (en) Block chain wireless network data transmission method, device and system
CN111709053B (en) Operation method and operation device based on loose coupling transaction network
CN116886718A (en) Data storage method and device based on transaction weight
CN116112185A (en) Private data sharing method based on blockchain and zero knowledge proof
US20230188330A1 (en) System and method for identity-based key agreement for secure communication
CN113535852A (en) File processing method, file access method, device and system based on block chain
CN111552950A (en) Software authorization method and device and computer readable storage medium
CN116743377B (en) Data processing method, device, equipment and storage medium based on blockchain key
CN114826720B (en) Data storage method, data storage device, computer readable storage medium and electronic equipment
CN112202552B (en) Method, device, medium and electronic equipment for monitoring quality of block chain data
CN116506227B (en) Data processing method, device, computer equipment and storage medium
CN114765595B (en) Chat message display method, chat message sending device, electronic equipment and media
CN116962444A (en) Data storage method and device based on state channel

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination