CN114124347A - Safe multi-party computing method and system based on block chain - Google Patents

Safe multi-party computing method and system based on block chain Download PDF

Info

Publication number
CN114124347A
CN114124347A CN202111346700.2A CN202111346700A CN114124347A CN 114124347 A CN114124347 A CN 114124347A CN 202111346700 A CN202111346700 A CN 202111346700A CN 114124347 A CN114124347 A CN 114124347A
Authority
CN
China
Prior art keywords
module
decryption
calculation
ciphertext
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111346700.2A
Other languages
Chinese (zh)
Inventor
王伟兵
冷静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Inspur Cloud Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Cloud Information Technology Co Ltd filed Critical Inspur Cloud Information Technology Co Ltd
Priority to CN202111346700.2A priority Critical patent/CN114124347A/en
Publication of CN114124347A publication Critical patent/CN114124347A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)

Abstract

The invention discloses a safe multi-party computing method and a safe multi-party computing system based on a block chain, belonging to the field of block chain and safe multi-party computing; the S1 utilizes the multi-party cooperation calculation aggregation public key to carry out security setting; s2 private data encryption write chain, multiple users write the private data encrypted by the aggregation public key into the block chain; s3 ciphertext calculation, using ciphertext homomorphism characteristic to program limited function in intelligent contract; s4, multiple decryption, namely, the plaintext share collection and share aggregation are completed in the block chain transaction process to obtain the plaintext; s5, performing security audit, recording the decryption behavior of the time by a block chain, and forming an audit log on the chain; the invention encrypts each private input of the secure multi-party calculation respectively and writes the chain, so that a developer can realize the same effect of the secure multi-party calculation as long as the developer knows the intelligent contract programming and the homomorphic ciphertext calculation, thereby reducing the learning threshold of the secure multi-party calculation and promoting the popularization of the privacy calculation technology.

Description

Safe multi-party computing method and system based on block chain
Technical Field
The invention discloses a safe multi-party computing method and system based on a block chain, and relates to the technical field of block chains and safe multi-party computing.
Background
The architecture of secure multiparty computing, which is one of the core techniques of privacy computing, is complex, and the design and programming thresholds are high, so that the secure multiparty computing is difficult to popularize. The block chain technology is mature, many block chains support various traditional programming languages, and it is easy for a developer to find the block chain technology. The invention combines homomorphic encryption and secure multiparty computation, replaces the customized part of the secure multiparty computation with an intelligent contract programming containing homomorphic encryption algorithm, performs distributed ciphertext computation in the intelligent contract, and finally decrypts the distributed ciphertext into plaintext through a universal threshold homomorphic decryption algorithm.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a safe multi-party computing method and system based on a block chain, and the adopted technical scheme is as follows: a safe multiparty computing method based on a block chain comprises the following specific steps:
s1, utilizing the multi-party cooperation to calculate the aggregation public key to carry out security setting;
s2 private data encryption write chain, multiple users write the private data encrypted by the aggregation public key into the block chain;
s3 ciphertext calculation, using ciphertext homomorphism characteristic to program limited function in intelligent contract;
s4, multiple decryption, namely, the plaintext share collection and share aggregation are completed in the block chain transaction process to obtain the plaintext;
and S5, performing security audit, and recording the decryption behavior of the block chain to form an audit log on the chain.
The S1 utilizes the multi-party cooperative computing aggregation public key to perform security setting, that is, the security setting is realized by building an ElGamal multiple decryption algorithm program in each endorsement node.
The specific steps of calculating the ciphertext of the S3 and performing limited function programming by using the homomorphic characteristic of the ciphertext in the intelligent contract are as follows:
s301, performing homomorphic calculation on the intelligent contract codes;
s302, limited customized function operation is carried out by utilizing homomorphism characteristics of the selective encryption algorithm.
The step S4 of multiple decryption, which completes the plaintext share collection and share aggregation in the blockchain transaction process, is as follows:
s401, embedding an ElGamal multiple decryption algorithm SDK into the bottom layer of the endorsement node;
s402, explicitly calling a bottom decryption program through an intelligent contract;
s403, carrying out decryption calculation on the ciphertext by using an ElGamal multiple decryption algorithm SDK and using a private key of the SDK;
s404 generates a plaintext share and a zero knowledge proof and returns the plaintext share and the zero knowledge proof to the intelligent contract.
A safe multi-party computing system based on a block chain specifically comprises a safety setting module, a data writing module, a ciphertext computing module, a multiple decryption module and a safety audit module:
a safety setting module: utilizing a multi-party cooperation calculation aggregation public key to carry out security setting;
a data writing module: the private data encryption writing chain is used for writing the private data encrypted by using the aggregation public key into the block chain by a plurality of users;
the ciphertext calculation module: limited function programming is carried out in the intelligent contract by utilizing the homomorphic characteristic of the ciphertext;
multiple decryption module: in the block chain transaction process, plaintext share collection is completed and plaintext is aggregated from shares;
a security audit module: and recording the decryption behavior of the time by the block chain to form an audit log on the chain.
The security setting module utilizes a multi-party cooperative computing aggregation public key to carry out security setting, namely, the security setting is realized by internally arranging an ElGamal multiple decryption algorithm program in each endorsement node.
The ciphertext calculation module specifically comprises a homomorphic calculation module and a function operation module:
a homomorphic calculation module: homomorphic calculation is carried out on the intelligent contract codes;
a function operation module: and performing limited customized function operation by utilizing homomorphism characteristics of the selective encryption algorithm.
The multiple decryption module specifically comprises an algorithm embedding module, a program calling module, a decryption calculation module and a certification returning module:
an algorithm embedding module: embedding an ElGamal multiple decryption algorithm SDK into the bottom layer of the endorsement node;
a program calling module: explicitly invoking the underlying decryption program through the smart contract;
a decryption calculation module: carrying out decryption calculation on the ciphertext by using an ElGamal multiple decryption algorithm SDK and using a private key of the SDK;
a certification return module: and generating a plaintext share and a zero knowledge proof and returning the plaintext share and the zero knowledge proof to the intelligent contract.
The invention has the beneficial effects that: the invention encrypts each private input of the safe multiparty computation respectively and writes the chain, replaces the function computation part of the safe multiparty computation with the ciphertext computation coded in the intelligent contract, and reveals the ciphertext settlement result by multiple decryption, so that a developer can realize the same effect of the safe multiparty computation as long as knowing the intelligent contract programming and homomorphic ciphertext computation, thereby reducing the learning threshold of the safe multiparty computation and promoting the popularization of the privacy computation technology.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of the method of the present invention; fig. 2 is a schematic diagram of the system of the present invention.
Detailed Description
The present invention is further described below in conjunction with the following figures and specific examples so that those skilled in the art may better understand the present invention and practice it, but the examples are not intended to limit the present invention.
First, some of the terms used in the present invention will be explained:
1) secure multiparty computing
Secure Multiparty Computing (SMC) is a powerful and interesting tool in the field of cryptography that allows untrusted parties to cooperate to jointly perform the Computation of a function; specifically, assume that the function has n inputs x1, x2, …, xn, respectively held in different participants; for each participant Pi (i e {1, 2., n }), the input xi that it grasps is his private information; the safe multi-party calculation is realized by completing the calculation of a function f on the premise of ensuring the privacy of input of each participant; after the calculation is finished, each participant can not obtain any other information except the predefined function output;
the secure multi-party computation can be divided into two types, namely secure multi-party computation based on secret sharing and secure multi-party computation based on threshold homomorphic encryption; in secret sharing-based secure multi-party computation, the protocol is that the input and most intermediate results of the protocol based on a linear secret sharing scheme are shared among the participants and participate in computation in a sharing mode; in the safe multi-party calculation based on the threshold homomorphic encryption, the protocol is that the input and most intermediate results of the protocol based on a public key encryption scheme with homomorphism are in an encryption state, and a private key which participates in the operation in a ciphertext mode and is used for decryption is shared among all participants in a threshold secret sharing mode;
2) homomorphic encryption
Homomorphic Encryption (Homomorphic Encryption) is a type of Encryption method with special natural attributes, and the concept is proposed by Rivest et al in the seventies of the last century; compared with a common encryption algorithm, homomorphic encryption can realize basic encryption operation and also can realize various calculation functions among ciphertexts, namely calculation before decryption can be equivalent to calculation after decryption; this property is of great importance for securing information: by utilizing the homomorphic encryption technology, a plurality of ciphertexts can be decrypted after being calculated, and the high calculation cost caused by decryption of each cipher text is not needed; the homomorphic encryption technology can be used for realizing the calculation of a cipher text by a non-key party, and the calculation of the cipher text does not need to pass through a key party, thereby not only reducing the communication cost, but also transferring the calculation task, and balancing the calculation cost of each party; by using the homomorphic encryption technology, the decryption party can only obtain the final result but cannot obtain the message of each ciphertext, so that the safety of the information can be improved;
the key of homomorphic decryption is a private key, and who holds the private key can decrypt the encrypted data; when the private key is held by multiple parties, the decryption behavior becomes a safe multiparty computing paradigm, and the ciphertext can be decrypted into the plaintext only by cooperation of the multiple parties; when the private key is held by n parties, each participant holds a private key share, and the plaintext can be recovered only by the cooperation of the parties exceeding t (t is less than or equal to n), which is called as (t, n) threshold cryptographic algorithm;
the intelligent contract language is generally complete in graphic and can be used for transplanting a homomorphic encryption algorithm into an intelligent contract to be executed so as to form a block chain + safe multiparty computing fusion framework;
3) block chain and ElGamal multiple decryption
Multiple decryption is a special case of (t, n) threshold decryption, i.e., t ═ n; the threshold decryption means that n participants participate in the decryption process, and as long as t or more than t participants successfully complete the protocol, the ciphertext can be decrypted into plaintext; multiple decryption, which means that all n participants can successfully complete the protocol and then can decrypt the ciphertext into the plaintext; ElGamal is a common encryption algorithm and has an addition homomorphism characteristic under an elliptic curve;
the invention designs an ElGamal multiple decryption method realized by using a block chain endorsement mechanism; the method allows multiple endorsement nodes to perform ElGamal multiple decryption using their own private keys as key shares, multiple decryption (threshold decryption) capability for block chaining to privately compute one of the key capabilities; the block chain user can encrypt private data of the user through an ElGamal algorithm and then write the encrypted data into the block chain, and the encrypted public key adopts an aggregated public key of endorsement nodes, so that a ciphertext can be decrypted only by cooperation of a plurality of endorsement nodes, and the privacy of the user is protected; meanwhile, the ElGamal algorithm under the elliptic curve has the homomorphic characteristic of addition, so that ciphertext of a plurality of users can be decrypted after being added, and more application scenes can be brought to ElGamal multiple decryption of data on a chain;
the first embodiment is as follows:
a safe multiparty computing method based on a block chain comprises the following specific steps:
s1, utilizing the multi-party cooperation to calculate the aggregation public key to carry out security setting;
s2 private data encryption write chain, multiple users write the private data encrypted by the aggregation public key into the block chain; assuming each participant Pi, the private data owned by each participant is zi; the ElGamal encryption algorithm is a function Enc (public, plain), and then the algorithm for Pi to encrypt the private data Zi to the ciphertext Zi is
Figure BDA0003354259980000051
Each private data owner converts the private data of the owner into an ElGamal ciphertext and writes the ElGamal ciphertext; the invention replaces the complicated multi-party concurrent communication in the safe multi-party calculation process by the encrypted write chain of private data, which is one of the key characteristics of the invention;
s3 ciphertext calculation, using ciphertext homomorphism characteristic to program limited function in intelligent contract;
s4, multiple decryption, namely, the plaintext share collection and share aggregation are completed in the block chain transaction process to obtain the plaintext;
s5, performing security audit, recording the decryption behavior of the time by a block chain, and forming an audit log on the chain; the method of the invention leaves marks on the block chain for both the intermediate result and the final decryption behavior of the secure multi-party calculation, thereby improving the auditability and the security of the secure multi-party calculation;
furthermore, each endorsement node of S1 needs to be internally provided with an ElGamal multiple decryption algorithm program, and performs security setting; assuming that n endorsement nodes participate in homomorphic encryption calculation and multiple decryption calculation, each endorsement node Pi publishes its own public key share Xi, and calculates an aggregated public key
Figure BDA0003354259980000052
Further, the S3 ciphertext computation, the specific steps of using the ciphertext homomorphism feature to perform limited function programming in the intelligent contract are as follows:
s301, performing homomorphic calculation on the intelligent contract codes;
s302, performing limited customized function operation by using homomorphism characteristics of a selective encryption algorithm;
some asymmetric encryption algorithms (ElGamal) have homomorphic properties, such as:
Enc(a+b)=Enc(a)Enc(b)
enc (a + a +. + a) ═ Enc (n × a) ═ Enc (a) n (n × a is n a additions)
By utilizing the homomorphism characteristics, some ciphertext functions can be calculated; the specific supported algorithm is related to the selection of the encryption algorithm; for example, the ElGamal encryption algorithm under the elliptic curve has an addition homomorphic property, and may calculate the sum of private data of multiple participants, i.e., Zsum ═ Enc (Z1+. Zn) ═ Enc (Z1) +.. + Enc (Zn) · Z1+.. + Zn; the plaintext Zsum is obtained from Zsum by multiple decryptions (threshold decryptions); the invention allows the homomorphic calculation of intelligent contract coding, and utilizes the homomorphic characteristic of the selective encryption algorithm to carry out finite customized function operation, thereby avoiding the conversion of the function to a confusion circuit and reducing the technical threshold; the second feature of the present invention is to replace the garbled circuit with homomorphic function operation with limited capability;
further, the step of multiple decryption at S4 to complete plaintext share collection and share aggregation during blockchain transaction is as follows:
s401, embedding an ElGamal multiple decryption algorithm SDK into the bottom layer of the endorsement node;
s402, explicitly calling a bottom decryption program through an intelligent contract;
s403, carrying out decryption calculation on the ciphertext by using an ElGamal multiple decryption algorithm SDK and using a private key of the SDK;
s404, generating a plaintext share and a zero knowledge proof and returning the plaintext share and the zero knowledge proof to the intelligent contract;
the eLGAMAL SDK can be embedded into the bottom layer implementation of the endorsement node, the intelligent contract can explicitly call a bottom layer decryption program, and the parameters are ciphertext (A and B); the bottom-layer program of the endorsement node Pi utilizes an ElGamal multiple decryption algorithm SDK to decrypt the ciphertext (A, B) by utilizing the private key xi of the bottom-layer program, generates a plaintext share Mi and zero knowledge proofs ri, Ni, Mi and Ni, and returns the plaintext share Mi and the zero knowledge proofs ri, Ni, Mi and Ni to the intelligent contract; (for specific algorithms reference is made to another patent application "an ElGamal multiple decryption algorithm"); the intelligent contract returns the plaintext share Mi and the zero knowledge proofs ri, Ni, Mi and Ni to the block chain client;
the client verifies the zero knowledge proof corresponding to each plaintext share to ensure the validity of the plaintext shares, namely, the verification equation
Figure BDA0003354259980000061
And
Figure BDA0003354259980000062
whether the result is true or not;
after the client collects all n plaintext shares mi, calculate
Figure BDA0003354259980000063
m is a plaintext, and decryption is completed; returning the plaintext m to the application program;
no matter the private data encryption writing chain or the multiple decryption after the ciphertext calculation is realized by using the intelligent contract, the calling of the intelligent contract can write the chain and leave marks on the chain, and the evidence which can not be forged and repudiated is left on the block chain and becomes an audit log, so that the safety of the safe multiparty calculation is further improved.
Example two:
a safe multi-party computing system based on a block chain specifically comprises a safety setting module, a data writing module, a ciphertext computing module, a multiple decryption module and a safety audit module:
a safety setting module: utilizing a multi-party cooperation calculation aggregation public key to carry out security setting;
a data writing module: the private data encryption writing chain is used for writing the private data encrypted by using the aggregation public key into the block chain by a plurality of users;
the ciphertext calculation module: limited function programming is carried out in the intelligent contract by utilizing the homomorphic characteristic of the ciphertext;
multiple decryption module: in the block chain transaction process, plaintext share collection is completed and plaintext is aggregated from shares;
a security audit module: the block chain records the decryption behavior at this time to form an audit log on the chain;
further, the security setting module performs security setting by using a multi-party cooperative computing aggregation public key, namely, the security setting is realized by internally arranging an ElGamal multiple decryption algorithm program in each endorsement node;
further, the ciphertext calculation module specifically includes a homomorphic calculation module and a function operation module:
a homomorphic calculation module: homomorphic calculation is carried out on the intelligent contract codes;
a function operation module: performing limited customized function operation by using homomorphism characteristics of a selective encryption algorithm;
still further, the multiple decryption module specifically comprises an algorithm embedding module, a program calling module, a decryption calculation module and a certification returning module:
an algorithm embedding module: embedding an ElGamal multiple decryption algorithm SDK into the bottom layer of the endorsement node;
a program calling module: explicitly invoking the underlying decryption program through the smart contract;
a decryption calculation module: carrying out decryption calculation on the ciphertext by using an ElGamal multiple decryption algorithm SDK and using a private key of the SDK;
a certification return module: and generating a plaintext share and a zero knowledge proof and returning the plaintext share and the zero knowledge proof to the intelligent contract.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. A safe multiparty computing method based on a block chain is characterized by comprising the following specific steps:
s1, utilizing the multi-party cooperation to calculate the aggregation public key to carry out security setting;
s2 private data encryption write chain, multiple users write the private data encrypted by the aggregation public key into the block chain;
s3 ciphertext calculation, using ciphertext homomorphism characteristic to program limited function in intelligent contract;
s4, multiple decryption, namely, the plaintext share collection and share aggregation are completed in the block chain transaction process to obtain the plaintext;
and S5, performing security audit, and recording the decryption behavior of the block chain to form an audit log on the chain.
2. The method as claimed in claim 1, wherein the S1 is implemented by building ElGamal multiple decryption algorithm program in each endorsement node by using multi-party cooperative computing aggregate public key for security setup.
3. The method as claimed in claim 2, wherein said S3 ciphertext computation, the finite function programming using ciphertext homomorphism in the intelligent contract comprises the following steps:
s301, performing homomorphic calculation on the intelligent contract codes;
s302, limited customized function operation is carried out by utilizing homomorphism characteristics of the selective encryption algorithm.
4. The method as claimed in claim 3, wherein said step of S4 multiple decryption, the specific steps of complete plaintext share collection and share aggregation during blockchain transaction are as follows:
s401, embedding an ElGamal multiple decryption algorithm SDK into the bottom layer of the endorsement node;
s402, explicitly calling a bottom decryption program through an intelligent contract;
s403, carrying out decryption calculation on the ciphertext by using an ElGamal multiple decryption algorithm SDK and using a private key of the SDK;
s404 generates a plaintext share and a zero knowledge proof and returns the plaintext share and the zero knowledge proof to the intelligent contract.
5. A safe multi-party computing system based on a block chain is characterized by specifically comprising a safety setting module, a data writing module, a ciphertext computing module, a multiple decryption module and a safety audit module:
a safety setting module: utilizing a multi-party cooperation calculation aggregation public key to carry out security setting;
a data writing module: the private data encryption writing chain is used for writing the private data encrypted by using the aggregation public key into the block chain by a plurality of users;
the ciphertext calculation module: limited function programming is carried out in the intelligent contract by utilizing the homomorphic characteristic of the ciphertext;
multiple decryption module: in the block chain transaction process, plaintext share collection is completed and plaintext is aggregated from shares;
a security audit module: and recording the decryption behavior of the time by the block chain to form an audit log on the chain.
6. The system as claimed in claim 5, wherein the security setup module utilizes a multi-party cooperative computing aggregation public key to perform security setup by building an ElGamal multiple decryption algorithm program in each endorsement node.
7. The system as claimed in claim 6, wherein the ciphertext computation module comprises a homomorphic computation module and a function operation module:
a homomorphic calculation module: homomorphic calculation is carried out on the intelligent contract codes;
a function operation module: and performing limited customized function operation by utilizing homomorphism characteristics of the selective encryption algorithm.
8. The system according to claim 7, wherein said multiple decryption modules comprise an algorithm embedding module, a program calling module, a decryption computation module and a proof return module:
an algorithm embedding module: embedding an ElGamal multiple decryption algorithm SDK into the bottom layer of the endorsement node;
a program calling module: explicitly invoking the underlying decryption program through the smart contract;
a decryption calculation module: carrying out decryption calculation on the ciphertext by using an ElGamal multiple decryption algorithm SDK and using a private key of the SDK;
a certification return module: and generating a plaintext share and a zero knowledge proof and returning the plaintext share and the zero knowledge proof to the intelligent contract.
CN202111346700.2A 2021-11-15 2021-11-15 Safe multi-party computing method and system based on block chain Pending CN114124347A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111346700.2A CN114124347A (en) 2021-11-15 2021-11-15 Safe multi-party computing method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111346700.2A CN114124347A (en) 2021-11-15 2021-11-15 Safe multi-party computing method and system based on block chain

Publications (1)

Publication Number Publication Date
CN114124347A true CN114124347A (en) 2022-03-01

Family

ID=80395276

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111346700.2A Pending CN114124347A (en) 2021-11-15 2021-11-15 Safe multi-party computing method and system based on block chain

Country Status (1)

Country Link
CN (1) CN114124347A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115242370A (en) * 2022-05-23 2022-10-25 华数云科技有限公司 Monitoring system and method based on block chain trusted security multi-party calculation
CN115941230A (en) * 2022-01-11 2023-04-07 浪潮云信息技术股份公司 Supervision method and system for protecting privacy based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495465A (en) * 2018-11-05 2019-03-19 河南师范大学 Privacy set intersection method based on intelligent contract
WO2020034755A1 (en) * 2018-08-14 2020-02-20 阿里巴巴集团控股有限公司 Multiparty secure computing method, device, and electronic device
CN113193948A (en) * 2021-03-24 2021-07-30 西安电子科技大学 Multi-party united privacy data statistical analysis method and information data processing terminal
CN113393238A (en) * 2021-06-16 2021-09-14 福建师范大学 Intelligent contract model for protecting privacy and implementation method thereof
CN113645020A (en) * 2021-07-06 2021-11-12 北京理工大学 Alliance chain privacy protection method based on safe multi-party computing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020034755A1 (en) * 2018-08-14 2020-02-20 阿里巴巴集团控股有限公司 Multiparty secure computing method, device, and electronic device
CN109495465A (en) * 2018-11-05 2019-03-19 河南师范大学 Privacy set intersection method based on intelligent contract
CN113193948A (en) * 2021-03-24 2021-07-30 西安电子科技大学 Multi-party united privacy data statistical analysis method and information data processing terminal
CN113393238A (en) * 2021-06-16 2021-09-14 福建师范大学 Intelligent contract model for protecting privacy and implementation method thereof
CN113645020A (en) * 2021-07-06 2021-11-12 北京理工大学 Alliance chain privacy protection method based on safe multi-party computing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱岩;宋晓旭;薛显斌;秦博涵;刘国伟;: "基于安全多方计算的区块链智能合约执行系统", 密码学报, no. 02 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115941230A (en) * 2022-01-11 2023-04-07 浪潮云信息技术股份公司 Supervision method and system for protecting privacy based on block chain
CN115242370A (en) * 2022-05-23 2022-10-25 华数云科技有限公司 Monitoring system and method based on block chain trusted security multi-party calculation
CN115242370B (en) * 2022-05-23 2024-04-12 华数云科技有限公司 Supervision system and method based on block chain trusted security multiparty calculation

Similar Documents

Publication Publication Date Title
CN110008717B (en) Decision tree classification service system and method supporting privacy protection
CN112906030B (en) Data sharing method and system based on multi-party homomorphic encryption
CN112380565A (en) Secure multi-party computing method based on trusted hardware and block chain
CN114219483B (en) Method, equipment and storage medium for sharing block chain data based on LWE-CPBE
CN101399660B (en) Method and device for negotiating group cipher
Hassan et al. An efficient outsourced privacy preserving machine learning scheme with public verifiability
KR20060052556A (en) Methods, devices and systems for generating anonymous public keys in a secure communication system
CN108462573A (en) A kind of flexible quantum safety moving communication means
CN114124347A (en) Safe multi-party computing method and system based on block chain
US20230361993A1 (en) Redistribution of secret sharings
CN113643134B (en) Internet of things blockchain transaction method and system based on multi-key homomorphic encryption
CN115001651A (en) Multi-party computing method based on fully homomorphic encryption and suitable for semi-honest model
CN116011014A (en) Privacy computing method and privacy computing system
CN115906172A (en) Method for protecting federated learning data
CN111355587A (en) Authenticated encryption secure communication system and method based on countermeasure network
CN117353912A (en) Three-party privacy set intersection base number calculation method and system based on bilinear mapping
CN117675210A (en) Method for safely calculating inner product of two-party holding vectors based on grid
Hsu et al. Non‐interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks
CN116861484A (en) Two-side transverse federal learning method and device for Chinese address word segmentation
CN116527358A (en) Time sensitive access control method and device based on CP-ABE edge calculation
CN107294972B (en) Identity-based generalized multi-receiver anonymous signcryption method
CN111614456B (en) Multi-party collaborative encryption method for SM4 algorithm
CN114844635A (en) Method for safely carrying out Shuffle on data
CN114944934A (en) Federated learning method and system, first privacy computing platform and second privacy computing platform
Hsu et al. Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination