CN114254377A - Public opinion evidence storage information privacy protection method based on block chain - Google Patents
Public opinion evidence storage information privacy protection method based on block chain Download PDFInfo
- Publication number
- CN114254377A CN114254377A CN202011005513.3A CN202011005513A CN114254377A CN 114254377 A CN114254377 A CN 114254377A CN 202011005513 A CN202011005513 A CN 202011005513A CN 114254377 A CN114254377 A CN 114254377A
- Authority
- CN
- China
- Prior art keywords
- information
- public opinion
- commitment
- evidence
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to the technical field of information security, and particularly relates to a public opinion evidence storage information privacy protection method based on a block chain. The invention is characterized in that the information acquired from the information subject is stored in a credible data set which is not open to the outside by the ministry of public security, the identity information related to the information subject is extracted from the credible data set, and the corresponding anonymous information subject is generated by using the identity information. The notarization department submits the commitment and the proof of the public opinion evidence information needing to be uploaded to an intelligent contract for verification by using the identity of the anonymous information main body, and after the verification is passed, the public opinion evidence information is added into a main chain of the public opinion evidence information for preservation. The invention ensures that the information main body is safely stored except the core information related to the public opinion evidence storing information is used for recording uplink, and the safety and the privacy of the main body information are ensured from the technical point.
Description
Technical Field
The invention belongs to the technical field of information security, and particularly relates to a public opinion evidence storage information privacy protection method based on a block chain.
Background
The electronic deposit certificate of public opinion information has the potential of being capable of keeping a complete evidence chain, and facilitates later maintenance and supervision. The information haul era storage mode can not only improve the compliance degree of the evidence storage platform, but also restrict the evidence storage platform to a certain degree, and guarantee the rights and interests of public opinion depositors.
However, the existing mode of storing electronic public opinion information has the characteristics of easy data modification, easy deletion and the like, so that the possibility that the stored evidence data is forged in a server with centralized storage is caused. Because the centralized certificate storage platform has a single storage mode, the certificate storage data can be uploaded to the server inside the platform after being subjected to safety certification manually. In the process, the credibility of third-party evidence storing personnel cannot be ensured, and malicious tampering before data uploading is easy to generate. In addition, more importantly, the data uploaded to the centralized server is also at risk of being stolen and attacked, and the privacy of the public opinion evidence storage information cannot be effectively protected.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a privacy protection method of public opinion evidence storing information based on a block chain, aiming at solving the technical problems that the credibility of third-party evidence storing personnel cannot be ensured, malicious tampering before data uploading is easy to generate, meanwhile, the data uploaded to a centralized server has the risks of being stolen and attacked, and the privacy of the public opinion evidence storing information cannot be effectively protected in the prior art.
The invention provides a public opinion evidence storage information privacy protection method based on a block chain, which has the following specific technical scheme:
the public opinion evidence storage information privacy protection method based on the block chain comprises the following steps:
s1, setting an information main body, wherein the information main body has an information set which needs to be uploaded, and the information set comprises core information and non-core information;
s2, the notarization department receives the information set in the step S1, and the notarization department stores the information set in the step S1 into a credible data set kept by the government department through internal signature;
s3, after the information storage is completed, extracting core information in the information set of one or more stored information main bodies, constructing an anonymous information main body, and performing public opinion evidence storage information chaining operation by using the identity of the anonymous information main body;
s4, the anonymous information subject in the step S3 possesses encrypted public opinion evidence storing information, carries out privacy encapsulation on the encrypted public opinion evidence storing information, and constructs the promise and the proof of the encrypted public opinion evidence storing information;
and S5, the intelligent contract on the blockchain takes commitment, proof and relevant input parameters from the transmission channel for verification, and after the verification is passed, the public opinion evidence information is added into the main chain of the public opinion evidence information for storage.
In some embodiments, in step S1, the sum information includes an identification number and a mobile phone number, and the non-core information includes a gender and an age.
In some embodiments, in step S2, the internal signature is a department identifier used by the notary department to sign, and after verification of the trusted data set, the internal signature is saved as information.
In some embodiments, the privacy package is to submit only commitments, proofs and related encrypted input information of the public opinion deposit while interacting with the intelligent contract on the chain in step S4.
In some embodiments, in step S4, the commitment is used for the external declaration of the anonymous information body to upload a public opinion information, the commitment is generated by hashing and splicing the specified public opinion information by adding a random blind factor through a public key of a commitment party, the certification is used for verifying the authenticity of the commitment, the certification passes through a certification key owned by the commitment party, and the acceptance is placed into a certification generating function by a private key and the random blind factor for secondary encryption packaging, so as to perform privacy verification on a blockchain without revealing specific public opinion information.
In some embodiments, in step S5, the verification is performed by using the proof transmitted by the chained commitment party, and the additionally claimed input parameters of the commitment party are verified in the verification function by using the defined verification key, so as to provide a result reflecting whether the commitment of the commitment party is valid, whether the public opinion information is correct, and not tampered.
The invention has the following beneficial effects: the invention is characterized in that the information acquired from the information subject is stored in a credible data set which is not open to the outside by the ministry of public security, the identity information related to the information subject is extracted from the credible data set, and the corresponding anonymous information subject is generated by using the identity information. The notarization department submits the commitment and the proof of the public opinion evidence information needing to be uploaded to an intelligent contract for verification by using the identity of the anonymous information main body, and after the verification is passed, the public opinion evidence information is added into a main chain of the public opinion evidence information for preservation. The invention ensures that the information main body is safely stored except the core information related to the public opinion evidence storing information is used for recording uplink, and the safety and the privacy of the main body information are ensured from the technical point.
Drawings
Fig. 1 is a flowchart of steps of a method for providing privacy protection of public opinion evidence information based on a blockchain;
fig. 2 is a flow chart of a privacy protection method for public opinion storage information based on a blockchain.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to specific embodiments and the accompanying drawings.
The invention provides a public opinion evidence storage information privacy protection method based on a block chain, which has the following specific technical scheme:
the public opinion evidence storage information privacy protection method based on the block chain comprises the following steps:
(1) defining an information subject CIS, and having an information set S ═ CIS required to be uploadedC,CIS-CTherein CISCCore information (including ID card number, mobile phone number, etc.) belonging to the information main body, CIS-CNon-core information (including sex, age, etc.) belonging to the body of the information.
(2) There is a Notary Department (ND) responsible for receiving the set S of CIS information. After receiving the information set S, the notary department will deposit it by internal signature into a trusted data set T kept by the government department. This process can be expressed as the following equation:
S→ND:Sig(S,NDid)→T
wherein NDidThe identification of the department used for signing by the notarization department is then verified by a trusted data set T, and the partial signature information is stored after the verification is passed.
(3) After the information is stored, the information sets S of the stored N information bodies are needed to be stored if necessaryiDifferent core information CIS inCiAIS (automatic identification system) for constructing anonymous information subject identity by extractioniAnd using the anonymous identity to perform a chain linking operation of public opinion evidence storage information, wherein i belongs to {1, 2. Therefore, the identity security of the information subject is ensured to a certain extent. With the anonymity of the information main body, the public opinion evidence storing information of the uplink can be protected safely.
(4) For a certain anonymous information subject AIS, the encrypted public opinion deposit evidence information m which needs to be linked up for storage is owned. In order to prevent m from being disclosed, AIS needs to perform privacy encapsulation on encrypted public opinion deposit evidence information m, that is, only submit promise Mcom, proof Mproof and related encrypted input information of the public opinion deposit evidence when interacting with on-chain contracts. Constructing the information m committed Mcom and proof Mproof about public opinion evidence, wherein the formula is as follows:
Mcom=H(m|pb|r)
the meaning of the formula is that m, pb and r are spliced and then subjected to hash operation to generate a public opinion evidence promise Mcom with a basic encryption state, so that the promise has a privacy effect, and the fact that the correct legality of m can be proved without being falsified under the condition that specific public opinion evidence information m is not disclosed later is facilitated. Pb in a calculation formula for generating commitment is a public key used when an anonymous information main body AIS submits commitment, r is a random number, and H () is characterized as a hash function for hash processing internal numerical information. The promises of the public opinion evidence-storing information are similar to the external announcements of the anonymous information main body, and represent that a piece of public opinion information is uploaded by the user.
Mproof=P(pAIS,(m,Mcom),(pr,r))
At the same time, the AIS also needs to utilize a set of private key pairs (pr, r) and a certification key p in order to verify the authenticity of the commitmentAISIn order to provide a proof to the contract for verification, Mproof. The meaning of the formula is that on the basis of the generated commitment Mcom, a proof Mproof for verification is generated, and the Mcom is subjected to secondary encryption packaging through a proof key and a private key, so that privacy verification without revealing specific public opinion information can be performed on an intelligent contract on a chain conveniently. p is a radical ofAISWill be stored in the device of the anonymous information body under the link, and the external P () function method is a certification generating function, through the assigned private key pair (pr, r) and certification key PAISTo generate proof of public sentiment information commitment Mcom to facilitate contract code verification
(5) The chain-specific intelligent contract takes the proof of promise Mproof and the associated input parameters inputs from the transmission channel and is verified by means of the verification key vk according to the following formula
result=verify(Mproof,inputs,vk)
If the verification is legal, the encrypted public opinion evidence storing information is submitted to a public opinion evidence storing information block chain for storage, so that the information is guaranteed not to be falsified, and the correct public opinion decision can be conveniently made in the future.
In summary, in the invention, the identity of the main body of the stored certificate information is anonymous, the public opinion stored certificate information is encrypted in the whole process of circulation in the system, in the process of submitting the public opinion information, the external representation is that an anonymous information main body uploads an encrypted public opinion information to the main chain of the public opinion stored certificate information, but external irrelevant personnel cannot know the specific content of the uploaded public opinion stored certificate information and also cannot know who the uploaded public opinion information is uploaded, because the real identity of the information main body is hidden before uploading, the information main body is ensured to be safely stored except for recording uplink of core information related to the public opinion stored certificate information, and the safety and privacy of the main body information are ensured from the technical point.
The above description is only for the purpose of illustrating preferred embodiments of the present invention and is not to be construed as limiting the invention, and the present invention is not limited to the above examples, and those skilled in the art should also be able to make various changes, modifications, additions or substitutions within the spirit and scope of the present invention.
Claims (6)
1. The public opinion evidence storage information privacy protection method based on the block chain is characterized by comprising the following steps:
s1, setting an information main body, wherein the information main body has an information set which needs to be uploaded, and the information set comprises core information and non-core information;
s2, the notarization department receives the information set in the step S1, and the notarization department stores the information set in the step S1 into a credible data set kept by the government department through internal signature;
s3, after the information storage is completed, extracting core information in the information set of one or more stored information main bodies, constructing an anonymous information main body, and performing public opinion evidence storage information chaining operation by using the identity of the anonymous information main body;
s4, the anonymous information subject in the step S3 possesses encrypted public opinion evidence storing information, carries out privacy encapsulation on the encrypted public opinion evidence storing information, and constructs the promise and the proof of the encrypted public opinion evidence storing information;
and S5, the intelligent contract on the blockchain takes commitment, proof and relevant input parameters from the transmission channel for verification, and after the verification is passed, the public opinion evidence information is added into the main chain of the public opinion evidence information for storage.
2. The method for protecting privacy of public opinion evidence information based on block chain as claimed in claim 1, wherein in step S1, the sum information includes identification number and mobile phone number, and the non-core information includes gender and age.
3. The method for protecting privacy of public opinion evidence information based on block chain as claimed in claim 1, wherein in step S2, the internal signature is a department identifier used by the notary department to sign, and after the trusted data set is verified, the internal signature is saved as information.
4. The method for protecting privacy of public opinion evidence information based on blockchain according to claim 1, wherein in step S4, the privacy package is to submit only commitments, proofs and related encrypted input information of public opinion evidence when interacting with intelligent contracts on the chain.
5. The method for protecting privacy of public opinion evidence information based on blockchain according to claim 1, wherein in step S4, the commitment is used for uploading a piece of public opinion information to an external declaration of an anonymous information subject, the commitment is generated by hashing specified public opinion information through a public key of a commitment party and adding a random blind factor, the attestation is used for verifying the authenticity of the commitment, the attestation passes through an attestation key owned by the commitment party, and the commitment is placed into an attestation generating function for secondary encryption and encapsulation through the private key and the random blind factor, so as to perform privacy verification without disclosure of specific public opinion information on a blockchain.
6. The method as claimed in claim 1, wherein in step S5, the verification is performed by using a certificate transmitted by a commitment party under the chain, and the input parameters claimed by the commitment party are verified in a verification function by using a defined verification key, so as to provide a result reflecting whether the commitment is valid and whether the public opinion information is correct and has not been tampered with.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011005513.3A CN114254377A (en) | 2020-09-23 | 2020-09-23 | Public opinion evidence storage information privacy protection method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011005513.3A CN114254377A (en) | 2020-09-23 | 2020-09-23 | Public opinion evidence storage information privacy protection method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114254377A true CN114254377A (en) | 2022-03-29 |
Family
ID=80788538
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011005513.3A Pending CN114254377A (en) | 2020-09-23 | 2020-09-23 | Public opinion evidence storage information privacy protection method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114254377A (en) |
-
2020
- 2020-09-23 CN CN202011005513.3A patent/CN114254377A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3451578B1 (en) | Turn-control rewritable blockchain | |
US11244054B2 (en) | Method and apparatus for trusted computing | |
Agrawal et al. | Privacy and security of Aadhaar: a computer science perspective | |
Li et al. | Eunomia: Anonymous and secure vehicular digital forensics based on blockchain | |
CN109344635A (en) | A kind of electronic evidence acquisition, preservation and verification method based on block chain | |
CN112801663B (en) | Blockchain certification method, device, system, equipment and medium | |
CN111859446A (en) | Agricultural product traceability information sharing-privacy protection method and system | |
CN112231769A (en) | Block chain-based numerical verification method and device, computer equipment and medium | |
CN112131309A (en) | Data evidence storing method and system based on block chain technology | |
CN111404692A (en) | Block chain identity information confirmation system and confirmation method based on big data | |
CN108768975A (en) | Support the data integrity verification method of key updating and third party's secret protection | |
CN113055153B (en) | Data encryption method, system and medium based on fully homomorphic encryption algorithm | |
CN113014394A (en) | Electronic data evidence storing method and system based on alliance chain | |
CN114254377A (en) | Public opinion evidence storage information privacy protection method based on block chain | |
CN110992219A (en) | Intellectual property protection method and system based on block chain technology | |
CN114125158B (en) | Anti-harassment method, device, equipment and storage medium based on trusted telephone | |
WO2023041212A1 (en) | Method of verification for machine learning models | |
CN114240399A (en) | Government affair data processing method and system based on block chain platform | |
CN113836239A (en) | Transaction data supervision method, storage medium and computer equipment | |
CN110474763B (en) | Chain-based identity protection method | |
CN114372092A (en) | Case collaborative search processing method, system, device and electronic equipment | |
CN113326527A (en) | Credible digital signature system and method based on block chain | |
CN112702159A (en) | Online expert scoring method and system based on block chain | |
CN113569275B (en) | Data processing method for proving privacy of material based on blockchain | |
CN113726740B (en) | Data storage method, protection method and system for secondary nodes of marine engineering equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |