CN114254377A - Public opinion evidence storage information privacy protection method based on block chain - Google Patents

Public opinion evidence storage information privacy protection method based on block chain Download PDF

Info

Publication number
CN114254377A
CN114254377A CN202011005513.3A CN202011005513A CN114254377A CN 114254377 A CN114254377 A CN 114254377A CN 202011005513 A CN202011005513 A CN 202011005513A CN 114254377 A CN114254377 A CN 114254377A
Authority
CN
China
Prior art keywords
information
public opinion
commitment
evidence
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011005513.3A
Other languages
Chinese (zh)
Inventor
刘峰
齐佳音
李志斌
杨杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai University Of International Business And Economics
East China Normal University
Original Assignee
Shanghai University Of International Business And Economics
East China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai University Of International Business And Economics, East China Normal University filed Critical Shanghai University Of International Business And Economics
Priority to CN202011005513.3A priority Critical patent/CN114254377A/en
Publication of CN114254377A publication Critical patent/CN114254377A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of information security, and particularly relates to a public opinion evidence storage information privacy protection method based on a block chain. The invention is characterized in that the information acquired from the information subject is stored in a credible data set which is not open to the outside by the ministry of public security, the identity information related to the information subject is extracted from the credible data set, and the corresponding anonymous information subject is generated by using the identity information. The notarization department submits the commitment and the proof of the public opinion evidence information needing to be uploaded to an intelligent contract for verification by using the identity of the anonymous information main body, and after the verification is passed, the public opinion evidence information is added into a main chain of the public opinion evidence information for preservation. The invention ensures that the information main body is safely stored except the core information related to the public opinion evidence storing information is used for recording uplink, and the safety and the privacy of the main body information are ensured from the technical point.

Description

Public opinion evidence storage information privacy protection method based on block chain
Technical Field
The invention belongs to the technical field of information security, and particularly relates to a public opinion evidence storage information privacy protection method based on a block chain.
Background
The electronic deposit certificate of public opinion information has the potential of being capable of keeping a complete evidence chain, and facilitates later maintenance and supervision. The information haul era storage mode can not only improve the compliance degree of the evidence storage platform, but also restrict the evidence storage platform to a certain degree, and guarantee the rights and interests of public opinion depositors.
However, the existing mode of storing electronic public opinion information has the characteristics of easy data modification, easy deletion and the like, so that the possibility that the stored evidence data is forged in a server with centralized storage is caused. Because the centralized certificate storage platform has a single storage mode, the certificate storage data can be uploaded to the server inside the platform after being subjected to safety certification manually. In the process, the credibility of third-party evidence storing personnel cannot be ensured, and malicious tampering before data uploading is easy to generate. In addition, more importantly, the data uploaded to the centralized server is also at risk of being stolen and attacked, and the privacy of the public opinion evidence storage information cannot be effectively protected.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a privacy protection method of public opinion evidence storing information based on a block chain, aiming at solving the technical problems that the credibility of third-party evidence storing personnel cannot be ensured, malicious tampering before data uploading is easy to generate, meanwhile, the data uploaded to a centralized server has the risks of being stolen and attacked, and the privacy of the public opinion evidence storing information cannot be effectively protected in the prior art.
The invention provides a public opinion evidence storage information privacy protection method based on a block chain, which has the following specific technical scheme:
the public opinion evidence storage information privacy protection method based on the block chain comprises the following steps:
s1, setting an information main body, wherein the information main body has an information set which needs to be uploaded, and the information set comprises core information and non-core information;
s2, the notarization department receives the information set in the step S1, and the notarization department stores the information set in the step S1 into a credible data set kept by the government department through internal signature;
s3, after the information storage is completed, extracting core information in the information set of one or more stored information main bodies, constructing an anonymous information main body, and performing public opinion evidence storage information chaining operation by using the identity of the anonymous information main body;
s4, the anonymous information subject in the step S3 possesses encrypted public opinion evidence storing information, carries out privacy encapsulation on the encrypted public opinion evidence storing information, and constructs the promise and the proof of the encrypted public opinion evidence storing information;
and S5, the intelligent contract on the blockchain takes commitment, proof and relevant input parameters from the transmission channel for verification, and after the verification is passed, the public opinion evidence information is added into the main chain of the public opinion evidence information for storage.
In some embodiments, in step S1, the sum information includes an identification number and a mobile phone number, and the non-core information includes a gender and an age.
In some embodiments, in step S2, the internal signature is a department identifier used by the notary department to sign, and after verification of the trusted data set, the internal signature is saved as information.
In some embodiments, the privacy package is to submit only commitments, proofs and related encrypted input information of the public opinion deposit while interacting with the intelligent contract on the chain in step S4.
In some embodiments, in step S4, the commitment is used for the external declaration of the anonymous information body to upload a public opinion information, the commitment is generated by hashing and splicing the specified public opinion information by adding a random blind factor through a public key of a commitment party, the certification is used for verifying the authenticity of the commitment, the certification passes through a certification key owned by the commitment party, and the acceptance is placed into a certification generating function by a private key and the random blind factor for secondary encryption packaging, so as to perform privacy verification on a blockchain without revealing specific public opinion information.
In some embodiments, in step S5, the verification is performed by using the proof transmitted by the chained commitment party, and the additionally claimed input parameters of the commitment party are verified in the verification function by using the defined verification key, so as to provide a result reflecting whether the commitment of the commitment party is valid, whether the public opinion information is correct, and not tampered.
The invention has the following beneficial effects: the invention is characterized in that the information acquired from the information subject is stored in a credible data set which is not open to the outside by the ministry of public security, the identity information related to the information subject is extracted from the credible data set, and the corresponding anonymous information subject is generated by using the identity information. The notarization department submits the commitment and the proof of the public opinion evidence information needing to be uploaded to an intelligent contract for verification by using the identity of the anonymous information main body, and after the verification is passed, the public opinion evidence information is added into a main chain of the public opinion evidence information for preservation. The invention ensures that the information main body is safely stored except the core information related to the public opinion evidence storing information is used for recording uplink, and the safety and the privacy of the main body information are ensured from the technical point.
Drawings
Fig. 1 is a flowchart of steps of a method for providing privacy protection of public opinion evidence information based on a blockchain;
fig. 2 is a flow chart of a privacy protection method for public opinion storage information based on a blockchain.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to specific embodiments and the accompanying drawings.
The invention provides a public opinion evidence storage information privacy protection method based on a block chain, which has the following specific technical scheme:
the public opinion evidence storage information privacy protection method based on the block chain comprises the following steps:
(1) defining an information subject CIS, and having an information set S ═ CIS required to be uploadedC,CIS-CTherein CISCCore information (including ID card number, mobile phone number, etc.) belonging to the information main body, CIS-CNon-core information (including sex, age, etc.) belonging to the body of the information.
(2) There is a Notary Department (ND) responsible for receiving the set S of CIS information. After receiving the information set S, the notary department will deposit it by internal signature into a trusted data set T kept by the government department. This process can be expressed as the following equation:
S→ND:Sig(S,NDid)→T
wherein NDidThe identification of the department used for signing by the notarization department is then verified by a trusted data set T, and the partial signature information is stored after the verification is passed.
(3) After the information is stored, the information sets S of the stored N information bodies are needed to be stored if necessaryiDifferent core information CIS inCiAIS (automatic identification system) for constructing anonymous information subject identity by extractioniAnd using the anonymous identity to perform a chain linking operation of public opinion evidence storage information, wherein i belongs to {1, 2. Therefore, the identity security of the information subject is ensured to a certain extent. With the anonymity of the information main body, the public opinion evidence storing information of the uplink can be protected safely.
(4) For a certain anonymous information subject AIS, the encrypted public opinion deposit evidence information m which needs to be linked up for storage is owned. In order to prevent m from being disclosed, AIS needs to perform privacy encapsulation on encrypted public opinion deposit evidence information m, that is, only submit promise Mcom, proof Mproof and related encrypted input information of the public opinion deposit evidence when interacting with on-chain contracts. Constructing the information m committed Mcom and proof Mproof about public opinion evidence, wherein the formula is as follows:
Mcom=H(m|pb|r)
the meaning of the formula is that m, pb and r are spliced and then subjected to hash operation to generate a public opinion evidence promise Mcom with a basic encryption state, so that the promise has a privacy effect, and the fact that the correct legality of m can be proved without being falsified under the condition that specific public opinion evidence information m is not disclosed later is facilitated. Pb in a calculation formula for generating commitment is a public key used when an anonymous information main body AIS submits commitment, r is a random number, and H () is characterized as a hash function for hash processing internal numerical information. The promises of the public opinion evidence-storing information are similar to the external announcements of the anonymous information main body, and represent that a piece of public opinion information is uploaded by the user.
Mproof=P(pAIS,(m,Mcom),(pr,r))
At the same time, the AIS also needs to utilize a set of private key pairs (pr, r) and a certification key p in order to verify the authenticity of the commitmentAISIn order to provide a proof to the contract for verification, Mproof. The meaning of the formula is that on the basis of the generated commitment Mcom, a proof Mproof for verification is generated, and the Mcom is subjected to secondary encryption packaging through a proof key and a private key, so that privacy verification without revealing specific public opinion information can be performed on an intelligent contract on a chain conveniently. p is a radical ofAISWill be stored in the device of the anonymous information body under the link, and the external P () function method is a certification generating function, through the assigned private key pair (pr, r) and certification key PAISTo generate proof of public sentiment information commitment Mcom to facilitate contract code verification
(5) The chain-specific intelligent contract takes the proof of promise Mproof and the associated input parameters inputs from the transmission channel and is verified by means of the verification key vk according to the following formula
result=verify(Mproof,inputs,vk)
If the verification is legal, the encrypted public opinion evidence storing information is submitted to a public opinion evidence storing information block chain for storage, so that the information is guaranteed not to be falsified, and the correct public opinion decision can be conveniently made in the future.
In summary, in the invention, the identity of the main body of the stored certificate information is anonymous, the public opinion stored certificate information is encrypted in the whole process of circulation in the system, in the process of submitting the public opinion information, the external representation is that an anonymous information main body uploads an encrypted public opinion information to the main chain of the public opinion stored certificate information, but external irrelevant personnel cannot know the specific content of the uploaded public opinion stored certificate information and also cannot know who the uploaded public opinion information is uploaded, because the real identity of the information main body is hidden before uploading, the information main body is ensured to be safely stored except for recording uplink of core information related to the public opinion stored certificate information, and the safety and privacy of the main body information are ensured from the technical point.
The above description is only for the purpose of illustrating preferred embodiments of the present invention and is not to be construed as limiting the invention, and the present invention is not limited to the above examples, and those skilled in the art should also be able to make various changes, modifications, additions or substitutions within the spirit and scope of the present invention.

Claims (6)

1. The public opinion evidence storage information privacy protection method based on the block chain is characterized by comprising the following steps:
s1, setting an information main body, wherein the information main body has an information set which needs to be uploaded, and the information set comprises core information and non-core information;
s2, the notarization department receives the information set in the step S1, and the notarization department stores the information set in the step S1 into a credible data set kept by the government department through internal signature;
s3, after the information storage is completed, extracting core information in the information set of one or more stored information main bodies, constructing an anonymous information main body, and performing public opinion evidence storage information chaining operation by using the identity of the anonymous information main body;
s4, the anonymous information subject in the step S3 possesses encrypted public opinion evidence storing information, carries out privacy encapsulation on the encrypted public opinion evidence storing information, and constructs the promise and the proof of the encrypted public opinion evidence storing information;
and S5, the intelligent contract on the blockchain takes commitment, proof and relevant input parameters from the transmission channel for verification, and after the verification is passed, the public opinion evidence information is added into the main chain of the public opinion evidence information for storage.
2. The method for protecting privacy of public opinion evidence information based on block chain as claimed in claim 1, wherein in step S1, the sum information includes identification number and mobile phone number, and the non-core information includes gender and age.
3. The method for protecting privacy of public opinion evidence information based on block chain as claimed in claim 1, wherein in step S2, the internal signature is a department identifier used by the notary department to sign, and after the trusted data set is verified, the internal signature is saved as information.
4. The method for protecting privacy of public opinion evidence information based on blockchain according to claim 1, wherein in step S4, the privacy package is to submit only commitments, proofs and related encrypted input information of public opinion evidence when interacting with intelligent contracts on the chain.
5. The method for protecting privacy of public opinion evidence information based on blockchain according to claim 1, wherein in step S4, the commitment is used for uploading a piece of public opinion information to an external declaration of an anonymous information subject, the commitment is generated by hashing specified public opinion information through a public key of a commitment party and adding a random blind factor, the attestation is used for verifying the authenticity of the commitment, the attestation passes through an attestation key owned by the commitment party, and the commitment is placed into an attestation generating function for secondary encryption and encapsulation through the private key and the random blind factor, so as to perform privacy verification without disclosure of specific public opinion information on a blockchain.
6. The method as claimed in claim 1, wherein in step S5, the verification is performed by using a certificate transmitted by a commitment party under the chain, and the input parameters claimed by the commitment party are verified in a verification function by using a defined verification key, so as to provide a result reflecting whether the commitment is valid and whether the public opinion information is correct and has not been tampered with.
CN202011005513.3A 2020-09-23 2020-09-23 Public opinion evidence storage information privacy protection method based on block chain Pending CN114254377A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011005513.3A CN114254377A (en) 2020-09-23 2020-09-23 Public opinion evidence storage information privacy protection method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011005513.3A CN114254377A (en) 2020-09-23 2020-09-23 Public opinion evidence storage information privacy protection method based on block chain

Publications (1)

Publication Number Publication Date
CN114254377A true CN114254377A (en) 2022-03-29

Family

ID=80788538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011005513.3A Pending CN114254377A (en) 2020-09-23 2020-09-23 Public opinion evidence storage information privacy protection method based on block chain

Country Status (1)

Country Link
CN (1) CN114254377A (en)

Similar Documents

Publication Publication Date Title
EP3451578B1 (en) Turn-control rewritable blockchain
US11244054B2 (en) Method and apparatus for trusted computing
Agrawal et al. Privacy and security of Aadhaar: a computer science perspective
Li et al. Eunomia: Anonymous and secure vehicular digital forensics based on blockchain
CN109344635A (en) A kind of electronic evidence acquisition, preservation and verification method based on block chain
CN112801663B (en) Blockchain certification method, device, system, equipment and medium
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
CN112231769A (en) Block chain-based numerical verification method and device, computer equipment and medium
CN112131309A (en) Data evidence storing method and system based on block chain technology
CN111404692A (en) Block chain identity information confirmation system and confirmation method based on big data
CN108768975A (en) Support the data integrity verification method of key updating and third party's secret protection
CN113055153B (en) Data encryption method, system and medium based on fully homomorphic encryption algorithm
CN113014394A (en) Electronic data evidence storing method and system based on alliance chain
CN114254377A (en) Public opinion evidence storage information privacy protection method based on block chain
CN110992219A (en) Intellectual property protection method and system based on block chain technology
CN114125158B (en) Anti-harassment method, device, equipment and storage medium based on trusted telephone
WO2023041212A1 (en) Method of verification for machine learning models
CN114240399A (en) Government affair data processing method and system based on block chain platform
CN113836239A (en) Transaction data supervision method, storage medium and computer equipment
CN110474763B (en) Chain-based identity protection method
CN114372092A (en) Case collaborative search processing method, system, device and electronic equipment
CN113326527A (en) Credible digital signature system and method based on block chain
CN112702159A (en) Online expert scoring method and system based on block chain
CN113569275B (en) Data processing method for proving privacy of material based on blockchain
CN113726740B (en) Data storage method, protection method and system for secondary nodes of marine engineering equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination