CN114362961A - Block chain based account recovery method, device, equipment and storage medium - Google Patents

Block chain based account recovery method, device, equipment and storage medium Download PDF

Info

Publication number
CN114362961A
CN114362961A CN202210007340.1A CN202210007340A CN114362961A CN 114362961 A CN114362961 A CN 114362961A CN 202210007340 A CN202210007340 A CN 202210007340A CN 114362961 A CN114362961 A CN 114362961A
Authority
CN
China
Prior art keywords
account
data
public key
signature
recovered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210007340.1A
Other languages
Chinese (zh)
Other versions
CN114362961B (en
Inventor
张扬
吴飞鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Peersafe Technology Co ltd
Original Assignee
Beijing Peersafe Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Peersafe Technology Co ltd filed Critical Beijing Peersafe Technology Co ltd
Priority to CN202210007340.1A priority Critical patent/CN114362961B/en
Publication of CN114362961A publication Critical patent/CN114362961A/en
Application granted granted Critical
Publication of CN114362961B publication Critical patent/CN114362961B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses an account recovery method, device, equipment and storage medium based on a block chain, wherein the method comprises the following steps: initializing account information in a blockchain network; acquiring a hash value of a data account to be recovered and a required signature information list; based on the signature information list and the hash value, generating a certification file by adopting a zero-knowledge certification algorithm and sending the certification file to the client; acquiring transaction data of a data account to be recovered, wherein the transaction data comprises a certification file received by a client, a newly generated account public key and a corresponding account private key; verifying the certification file based on a verification logic algorithm preset in the block chain network; and after the verification is passed, storing the newly generated account public key in the spare public key so as to enable the to-be-recovered data account to perform transaction signature based on the corresponding account private key and recover the account data. According to the scheme, the data information of the account can be recovered quickly and safely, the privacy of the data of the signing party is protected, and the privacy protection of the data on the chain is realized.

Description

Block chain based account recovery method, device, equipment and storage medium
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a method, an apparatus, a device, and a storage medium for recovering an account based on a blockchain.
Background
As internet and financial technologies have been developed, the blockchain technology has been widely applied to the financial field. The block chains are cryptographically connected in series and protect the serial text records of the content, and each block chain comprises the encrypted hash of the previous block, the corresponding timestamp and the transaction data. A series of accounts exist on the blockchain, and the accounts in the blockchain generally include a pair of public key and private key, when an account initiates a transaction, the account needs to use its private key to sign the transaction, and only after the signature verification is passed, the transaction is recorded on the chain.
However, since the blockchain is a decentralized network, if the private key in the account is lost, the private key of the account cannot be obtained again, so that the data resource in the account cannot be transferred or transacted, and therefore, how to recover the data information on the account after the private key of the account is lost becomes a problem to be solved urgently by the blockchain system.
Disclosure of Invention
In view of at least one of the above drawbacks or deficiencies in the prior art, it is desirable to provide a method, an apparatus, a device, and a storage medium for recovering an account based on a blockchain, which can quickly and safely recover data information of the account after the account on the blockchain network loses a private key.
In a first aspect, the present invention provides a method for recovering an account based on a blockchain, where the method includes:
initializing account information in a block chain network, wherein the account information comprises a data account to be recovered, and a common public key and a standby public key with empty information are preset in the data account to be recovered;
acquiring the hash value of the data account to be recovered and a required signature information list;
based on the signature information list and the hash value, generating a certification file by adopting a zero-knowledge certification algorithm and sending the certification file to a client;
acquiring transaction data of a data account to be recovered, wherein the transaction data comprises the certification file received by the client, a newly generated account public key and a corresponding account private key;
verifying the certification file based on a verification logic algorithm preset in the block chain network;
and after the verification is passed, storing the newly generated account public key in the spare public key so as to enable the to-be-recovered data account to perform transaction signature based on the corresponding account private key and recover account data.
In one embodiment, the obtaining the hash value of the data account to be restored and the required signature information list includes:
acquiring account public keys corresponding to a first number of accounts in a block chain network, wherein the first number is greater than or equal to five;
constructing a Merck tree based on the account public keys corresponding to the accounts of the first quantity;
taking the root hash value of the Mercker tree as the hash value of the data account to be recovered;
and determining a signature information list required by the data account to be recovered based on the hash value.
In one embodiment, determining the list of signature information required by the data account to be restored based on the hash value includes:
sending the hash value to the accounts of the first number in the blockchain network, so that each account of the accounts of the first number signs the hash value, and generates signature information corresponding to the accounts of the first number;
acquiring signature information corresponding to a second number of accounts from the signature information corresponding to the first number of accounts, wherein the second number is greater than or equal to one half of the first number;
and generating a signature information list required by the data account to be recovered based on the signature information corresponding to the second number of accounts.
In one embodiment, generating a certification document using a zero-knowledge certification algorithm based on the signature information list and the hash value includes:
compiling a zero knowledge proof circuit by adopting a zero knowledge proof tool according to a preset verification logic algorithm;
generating a certification public key and a verification public key by adopting a generation algorithm based on the zero knowledge certification circuit;
acquiring a Mercker tree path information list and a public key information list;
and taking the signature information list, the Mercker tree path information list and the public key information list as private input parameters, taking the hash value of the account information to be recovered as a public key input parameter, and generating a certification file based on the certification public key, the private input parameters and the public input parameters.
In one embodiment, verifying the certification document based on a verification logic algorithm preset in the blockchain network includes:
verifying the uniqueness of the public key of the account in the public key information list based on the verification public key;
when the uniqueness verification of the account public key passes, verifying that the number of the signature information in the signature information list is equal to the second number;
when the number of the signature information is equal to the second number, verifying the correctness of all the signature information in the signature information list;
when the correctness verification of all the signature information passes, verifying the correctness of the Mercker tree path;
when the correctness verification of the Mercker tree path passes, determining that the certification document passes the verification.
In one embodiment, verifying the correctness of all signature data in the signature information list comprises:
determining an account public key corresponding to each signature data in the signature information list based on the public key information list;
based on the account public key, decrypting each signature data in the signature information list to obtain an information abstract corresponding to each signature data;
verifying whether the hash value is the same as the information digest corresponding to each signature data;
and when the hash value is the same as the message digest corresponding to each piece of signature data, determining that the correctness of all the signature data in the signature message list is verified.
In one embodiment, the newly generated account public key and the corresponding account private key are obtained by the client after the account data transaction to be recovered is constructed and activated.
In a second aspect, the present invention provides an account recovering apparatus based on a blockchain, including:
the device comprises an initialization module, a block chain network processing module and a recovery module, wherein the initialization module is used for initializing account information in the block chain network, the account information comprises a data account to be recovered, and a common public key and a standby public key with empty information are preset in the data account to be recovered;
the first acquisition module is used for acquiring the hash value of the data account to be recovered and a required signature information list;
the certification file generating module is used for generating a certification file by adopting a zero-knowledge certification algorithm based on the signature information list and the hash value and sending the certification file to the client;
the second acquisition module is used for acquiring transaction data of a data account to be recovered, wherein the transaction data comprises the certification file received by the client, a newly generated account public key and a corresponding account private key;
the verification module is used for verifying the certification file based on a verification logic algorithm preset in the block chain network;
and the storage module is used for storing the newly generated account public key in the standby public key after the verification is passed so as to enable the to-be-recovered data account to perform transaction signature based on the corresponding account private key and recover account data.
In a third aspect, an embodiment of the present application provides a computer device, including a memory and a processor, where the memory stores a computer program, and the processor implements the above-mentioned account recovery method based on a blockchain when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the above-mentioned account recovery method based on a blockchain.
In summary, the block chain based account recovery method, apparatus, device and storage medium provided by the present application, by initializing account information in a block chain network, the account information comprises a data account to be recovered, a common public key and a spare public key with empty information are preset in the data account to be recovered, the hash value of the data account to be recovered and a required signature information list are obtained, then based on the signature information list and the hash value, adopting a zero-knowledge proof algorithm to generate a proof file and send the proof file to the client to obtain transaction data, the transaction data comprises a certification file received by the client, a newly generated account public key and a corresponding account private key, and is based on a verification logic algorithm preset in the blockchain network, verifying the certification file, storing the newly generated account public key in the spare public key after the certification file passes the verification, so that the account of the data to be recovered performs transaction signature based on the corresponding account private key and recovers the account data. According to the technical scheme, the standby public key is preset in the account information in the initialized block chain network, so that after the account on the block chain network loses the private key, an account does not need to be newly established, and only on the basis of the original account, the standby public key is modified and updated, so that the data information of the account is quickly and safely recovered according to the account private key corresponding to the standby public key, the data information is continuously subjected to on-chain transaction, the privacy of data of a signing party is protected on the premise of verifying the safety through verifying a zero-knowledge proof algorithm, and the privacy protection of the data on the chain is realized.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a schematic structural diagram of an account recovery system based on a block chain according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an account recovery method based on a blockchain according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for generating a manifest file according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating an account recovery method based on a blockchain according to another embodiment of the present invention;
FIG. 5 is a schematic structural diagram of a Mercker tree according to an embodiment of the present invention;
fig. 6 is a schematic flowchart of an account recovery apparatus based on a blockchain according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a computer system according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings. For convenience of understanding, some technical terms related to the embodiments of the present application are explained below:
zero knowledge proves that: meaning that the prover can convince the verifier that some assertion is correct without providing the verifier with any useful information. Zero knowledge proof is essentially an agreement involving two or more parties, i.e., a series of steps that two or more parties need to take to accomplish a task. The prover proves to the verifier and convinces him that he knows or owns a certain message, but the proving process cannot reveal any information about the proven message to the verifier. The zero knowledge proof has the characteristics of completeness, reasonability, zero knowledge and the like.
As mentioned in the background, the distributed ledger technology of blockchains enables secure transactions without the need for trusted third parties, an account in a blockchain typically consists of a bank of public and private keys, where the public key of the account can be used as a unique identifier on the blockchain, the private key of the account is used to certify and authorize a transaction for a resource in the account, the user certifies its identity using the private key, and the resource in the account is transacted. However, if an unexpected situation occurs in the blockchain distributed application, for example, the private key is lost, because the blockchain is a decentralized network, the user cannot recover the data information on the account, so that the resources in the account cannot be transferred or traded.
Based on the above defects, the present application provides an account recovery method, apparatus, device and storage medium based on a block chain. Compared with the prior art, the spare public key is preset in the account information in the initialized block chain network, so that after the account on the block chain network loses the private key, an account does not need to be newly established, and only on the basis of the original account, the spare public key is modified and updated, so that the data information of the account is quickly and safely recovered according to the account private key corresponding to the spare public key, the data information is continuously subjected to on-chain transaction, the privacy of the data on the signing side is protected on the premise of verifying the safety through verifying a zero-knowledge proof algorithm, and the privacy protection of the data on the chain is realized.
It can be understood that the account recovery method based on the blockchain provided by the present application may be applied to an account recovery system based on the blockchain, for example, fig. 1 is a system structure diagram in an application scenario of the present application, and the system includes a client 10 and a blockchain network 20. Wherein a blockchain network 20 communicates with the client 10.
The client 10 may be a client used by the initiator of transaction data, which may be, for example, a transaction to recover account data.
The blockchain network 20 includes a plurality of blockchain nodes, where each two blockchain nodes can communicate with each other, and may specifically refer to a P2P network system having a distributed data storage structure and achieved by a consensus mechanism, where the ledger data in the blockchain is distributed in temporally consecutive "blocks", where the latter block may include a data summary of the former block, and achieves full data backup of all or part of the nodes according to a difference of the specific consensus mechanism (e.g., POW, POS, DPOS, or PBFT), and the ledger data in the blockchain may be stored in the blocks according to a format of a transaction. The blockchain network may include a public blockchain network, a private blockchain network, and an alliance blockchain network, which is not limited in this application.
Optionally, the client 10 may operate on a terminal device, where the terminal device may be a mobile portable terminal such as a notebook computer, a tablet computer, a desktop computer, and a smart phone, or the electronic device may be an intelligent wearable device such as smart glasses and a smart watch, and this embodiment does not specifically limit this. The block chain network 40 may be a server, a server cluster composed of a plurality of servers, or a cloud computing service center.
The client 10 is configured to initiate an account transaction, so that the blockchain network obtains a hash value of a data account to be recovered, and is configured to newly generate a pair of account public keys and corresponding account private keys to construct a transaction for recovering account data.
The blockchain network 20 is configured to initialize account information in the blockchain network, obtain a hash value of a data account to be recovered and a required signature information list, generate a certification file by using a zero-knowledge certification algorithm based on the signature information list and the hash value, send the certification file to a client, obtain transaction data, verify the certification file based on a verification logic algorithm preset in the blockchain network, and store a newly generated account public key in a standby public key after the verification is passed, so that the data account to be recovered performs transaction signature based on a corresponding account private key and recovers the account data.
The terminal equipment and the server can establish communication connection through a wired or wireless network. Optionally, the wireless network or wired network described above uses standard communication techniques and/or protocols. The Network is typically the Internet, but may be any Network including, but not limited to, a Local Area Network (LAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a mobile, wireline or wireless Network, a private Network, or any combination of virtual private networks.
For convenience of understanding and explanation, the method, the apparatus, the device, and the storage medium for recovering an account based on a blockchain according to the embodiments of the present application are described in detail below with reference to fig. 2 to 9.
Fig. 2 is a schematic flowchart of an account recovery method based on a blockchain according to an embodiment of the present application, and as shown in fig. 2, the method may be applied to a blockchain network, and the method includes:
s101, initializing account information in the block chain network, wherein the account information comprises a data account to be recovered, and a common public key and a spare public key with empty information are preset in the data account to be recovered.
Specifically, when initializing account information in the blockchain network, two pieces of public key information and one hash value may be preset in each piece of account information in the blockchain network, where the two pieces of public key information include a common public key and a standby public key, and the account information includes a to-be-recovered data account. When the account in the blockchain network is initially created, the information in the standby public key and the hash value is default to be null. And if the information in the backup public key is not empty, the common public key and the backup public key can sign the transaction by the corresponding private key.
Alternatively, a transaction may be constructed by transferring accounts between linked accounts to initialize account information in a blockchain network.
It should be noted that a zero knowledge proof verification logic may be preset in the blockchain network. The validation logic may include a public input parameter and a private input parameter of the zero-knowledge proof, wherein the public input parameter is a hash value; the private input parameters may include a list of signature information, a list of public key information, a list of merkel tree path information. The signature in the signature information list refers to the signature of the public parameter hash value in the zero-knowledge proof circuit.
In this step, the verification logic of the zero-knowledge proof may include: verifying the uniqueness of the account public key in the public key information list, verifying the number of the signature information in the signature information list, verifying the correctness of all the signature information in the signature information category one by one, verifying the correctness of the Mercker tree path, and the like.
S102, obtaining the hash value of the data account to be recovered and a required signature information list.
In this step, the client may initiate a transaction, so that the blockchain network obtains the hash value of the account to be recovered, the account public key corresponding to the first number of accounts in the blockchain network may be obtained, then the merkel tree is constructed based on the account public key corresponding to the first number of accounts, the root hash value of the merkel tree is determined, the root hash value of the merkel tree is used as the hash value of the data account to be recovered, and then the signature information list required by the data account to be recovered is determined based on the hash value. Wherein the first number is greater than or equal to five.
Optionally, the account public keys of at least five accounts may be acquired from the blockchain network, or the account public keys of at least five accounts may be acquired by importing through an external device, which is not limited in this application.
Specifically, after acquiring the account public key corresponding to the first number of accounts, a merkel tree is constructed, the determined tree root hash value of the merkel tree is used as the hash value of the data account to be restored, and then the hash value is sent to the first number of accounts in the block chain network, so that each account in the first number of accounts signs the hash value, and signature information corresponding to the first number of accounts is generated. And then, acquiring signature information corresponding to a second number of accounts from the signature information corresponding to the first number of accounts, and generating a signature information list required by the data account to be recovered based on the signature information corresponding to the second number of accounts.
It should be noted that the first quantity refers to the number of accounts for acquiring the public key of the account, the second quantity refers to the number of accounts for acquiring the signature information, and both the first quantity and the second quantity may be set in a user-defined manner according to actual requirements. Wherein the first number is greater than or equal to five, and the second number is greater than or equal to one half of the first number. Alternatively, the second number may be obtained by calculating a product of the first number and 2/3, or may be obtained by calculating a product of the first number and 0.6, and this embodiment is not limited in any way as long as the second number is greater than or equal to one half of the first number.
For example, when the number of the acquired accounts of the account public key, that is, the first number is five, the number of the accounts of the signature information, that is, the second number is at least three; and when the number of the obtained accounts of the account public key, namely the first number, is six, the number of the accounts of the signature information, namely the second number, is at least four. And when the constructed Mercker tree is generated based on the public keys of the accounts of six accounts, when the signature information list is acquired, the hash value can be sent to the six accounts in the block chain network, so that each account in the six accounts signs the hash value, the signature information of the six accounts is generated, and the signature information of the four accounts is acquired, so that the signature information list required by the data account to be recovered is generated.
Signature, among other things, is an authentication mechanism that allows the generator of a message to add a code word that acts as a signature. By calculating the hash value and encrypting the hash value with the account private keys of at least five accounts to generate a signature, the origin and integrity of the message can be guaranteed.
It should be noted that the merkel tree is also called a hashed binary tree, and is a data structure for effectively summarizing and verifying the integrity of a large data set. The system consists of a root node, a group of intermediate nodes and a group of leaf nodes. The lowest leaf node comprises stored data or hash values, each intermediate node is the hash value of the contents of two leaf nodes of the root node, and the root node also comprises the hash values of the contents of two child nodes of the root node.
And S103, generating a certification file by adopting a zero-knowledge certification algorithm based on the signature information list and the hash value, and sending the certification file to the client.
In this embodiment, the zero knowledge proof algorithm may be an algorithm preset in a zero knowledge proof tool, and after the signature information list and the hash value are obtained, the public input parameter and the private input parameter may be determined, and a proof file is generated according to the proof public key and sent to the client.
As an implementation manner, fig. 3 is a schematic flowchart of a method for generating a credential according to an embodiment of the present application. As shown in fig. 3, the method includes:
s201, according to a preset verification logic algorithm, a zero knowledge proof circuit is compiled by adopting a zero knowledge proof tool.
In this step, the zero knowledge tool may be a zkSNARK-based tool library, for example, a C + + libsnr or a golang gnark tool library, or a ZoKrates for Etherns.
Among them, gnark is a framework for zero knowledge execution and validation algorithms, which provides a high-level API, and describes circuits using Go-like DSL in the Go language. Optionally, the zero-knowledge proof circuit may be compiled by golang and gnark api according to a preset verification logic algorithm in the blockchain network.
The preset verification logic algorithm may include: verifying the uniqueness of the account public key in the public key information list, verifying the number of the signature information in the signature information list, verifying the correctness of all the signature information in the signature information category one by one, verifying the correctness of the Mercker tree path, and the like.
S202, generating a certification public key and a verification public key by adopting a generating algorithm based on the zero-knowledge certification circuit.
Specifically, after the zero knowledge proof circuit is compiled, the zero knowledge proof circuit may be compiled into a circuit file, which may be, for example, a R1CS format file, by the frontend. compiler () method provided by the gnark library. Then, by executing the setup command in the gnark library, the zero-knowledge-based proof circuit generates a proof public key provisioning key for providing the proof file proof and a verification public key verification key for verifying the proof. Wherein the verification public key corresponds to the attestation public key.
S203, acquiring a Mercker tree path information list and a public key information list.
In this step, after the merkel tree is constructed based on the account public keys of at least five accounts and the root hash value of the merkel tree is determined to be the hash value of the data account to be recovered, a merkel tree path information list and a public key information list can be obtained.
The merkel tree path information list comprises merkel tree path information, and the public key information list comprises account public keys of at least five accounts.
S204, taking the signature information list, the Mercker tree path information list and the public key information list as private input parameters, taking the hash value of the account information to be recovered as a public key input parameter, and generating a certification file based on the certification public key, the private input parameters and the public input parameters.
Specifically, after the tacle tree path information list and the public key information list are obtained, the signature information list, the tacle tree path information list and the public key information list can be used as private input parameters, the hash value of the account information to be recovered is used as a public key input parameter, and a certification file is generated by a zero-knowledge certification tool based on a certification public key, the private input parameter and a public input parameter.
Alternatively, we can use witness ← pave (R, p) in the zero knowledge proof toolkPub, private) to generate a certification document, where pk refers to a certification public key, R refers to a zero-knowledge certification circuit, pub refers to a public input parameter, private refers to a private input parameter, and witness refers to a certification document.
And S104, acquiring transaction data of the data account to be recovered, wherein the transaction data comprises a certification file received by the client, a newly generated account public key and a corresponding account private key.
In this step, after receiving the certificate, the client may newly generate a pair of an account public key and an account private key, where the account public key corresponds to the account private key, and construct a transaction for recovering account data, and then activate the newly generated account public key and the account private key, so that the newly generated account public key and the account private key have the capability of verifying data, so that the block chain network obtains the transaction data of the recovered data account.
When a transaction for recovering the account data is constructed, the transaction for the account data can be constructed based on the certificate and the newly generated account public key. In the process of activating the newly generated account public key and account private key, a transaction can be formed through a mining mechanism of the user to perform the activation processing, and the transaction can also be formed through account transfers on a block chain to perform the activation processing.
And S105, verifying the verification file based on a verification logic algorithm preset in the block chain network.
Specifically, the uniqueness of the account public key in the public key information list may be verified based on the verification public key, when the uniqueness of the account public key is verified, whether the number of the signature information in the signature information list is equal to the second number is verified, and when the uniqueness of the account public key is not verified, it is determined that the certification document is not verified; when the number of the signature information is equal to the second number, verifying the correctness of all the signature information in the signature information list, and when the number of the signature information is not equal to the second number, determining that the certification document is not verified; when the correctness of all the signature information passes the verification, verifying the correctness of the path of the Mercker tree, and when the correctness of all the signature information does not pass the verification, determining that the verification of the certification document does not pass; when the correctness verification of the Mercker tree path passes, the certification file is determined to pass, and when the correctness verification of the Mercker tree path does not pass, the certification file is determined not to pass.
When the correctness of all signature data in the signature information list is verified, an account public key corresponding to each signature data in the signature information list can be determined based on the public key information list, then each signature data in the signature information list is decrypted based on the account public key to obtain an information abstract corresponding to each signature data, whether a hash value is the same as the information abstract corresponding to each signature data is verified, and when the hash value is the same as the information abstract corresponding to each signature data, the correctness of all signature data in the signature information list is determined as passing verification; and when the hash value is different from the information digest corresponding to certain signature data, determining the correctness of all signature data in the signature information list as verification failure.
It should be noted that the above-mentioned Merckel path can be used to prove the existence of a specific transaction in thousands of transactions in a block with a large number of bytes.
And S106, after the verification is passed, storing the newly generated account public key in the standby public key so as to enable the to-be-recovered data account to perform transaction signature based on the corresponding account private key and recover the account data.
In this step, after the verification of the certification file is passed, the newly generated account public key is stored in the standby public key of the account to be recovered, so that the data account to be recovered performs transaction signature based on the account private key corresponding to the newly generated account public key, thereby recovering the account data with the lost private key and enabling the account data to continue to perform the chain transaction.
After the private key is lost in the account in the block chain in this embodiment, the data information of the account can be quickly and safely recovered, so that the chain transaction can be continued, and by presetting a standby public key in the account information of the block chain, when the data recovery is performed after the private key of the account is lost, a new account does not need to be reestablished and the information of the lost account is transferred to the new account, and only one standby public key needs to be filled in the account information of the original lost account.
Further, in the embodiment, in the transaction execution process of recovering account data information, by introducing a zero-knowledge proof technology, the privacy of the data of the signing party is protected on the premise of verifying the accuracy and the security. Meanwhile, the data of the signature party only exists in the offline zero knowledge proof stage, only five account public keys are stored in a block chain to construct the root hash value of the Mercker tree, and only the account knows the information of the five verification accounts in the whole account initialization and subsequent data recovery processes, so that the privacy of the account data is ensured.
Illustratively, referring to fig. 4, a verification logic of zero knowledge proof may be preset in the blockchain network, and the verification logic includes a public input parameter and a private input parameter, where the public input parameter includes a hash value, and the private input parameter may include: signature information list, public key information list, and Mercker tree path information list. The method comprises the steps of initializing account information, presetting two pieces of public key information and a hash value in each piece of account information in a blockchain network, initiating a transaction through a client, setting the hash value in an account, obtaining account public keys of at least five accounts in the blockchain network, constructing a Mercker tree based on the account public keys of the at least five accounts, and setting the hash value of the Mercker tree into the account information, wherein the hash value in the account information is a public input parameter of a zero-knowledge proof circuit. And determining a root hash value of the mercker tree, and using the root hash value of the mercker tree as a hash value of the data account to be restored, wherein please refer to fig. 5, fig. 5 shows a schematic structural diagram of the mercker tree, where MRoot is the root hash value of the mercker tree, hash (pk1), hash (pk2), hash (pk3), hash (pk4), and hash (pk5) are hash values of account public keys of 5 accounts, respectively, hash (pk1), hash (pk2), hash2, and hash (pk5) can be combined into a mercker tree path.
After the hash value of the data account to be recovered is determined, based on the hash value, a signature information list required by the data account to be recovered can be sent to 5 accounts in the block chain network through the hash value of the data account to be recovered in an offline manner, so that the 5 accounts use their own account private keys to sign the hash value, and signature information is generated. Then at least 3 signature information are collected and a signature information list is constructed, and the aim in the step is to provide a mechanism for centralized voting, wherein when at least 3 persons in 5 persons agree to the account to reset public key information, the voting is identified as passing verification. And a zero-knowledge proof algorithm provided by libraries such as libsnark is adopted, a signature information list, a Mercury tree path information list and a public key information list are used as private input parameters, a hash value of account information to be recovered is used as a public key input parameter, and a witness proof file is generated and sent to a client side in a Prove stage of zero-knowledge proof based on a proof public key, the private input parameters and the public input parameters.
After receiving the certification file, the client can newly generate a pair of account public key and account private key, and construct a transaction for recovering account data, where the transaction data includes the certification file, the newly generated account public key, and a corresponding account private key, then based on the certification file and the verification public key on the blockchain network, based on a verification logic algorithm preset in the blockchain network, verify the certification file, and after the verification is passed, store the newly generated account public key in the standby public key, so that the to-be-recovered data account performs transaction signature based on the corresponding account private key and recovers the account data.
The application provides an account recovery method based on a block chain, which comprises the steps of initializing account information in a block chain network, the account information comprises a data account to be recovered, a common public key and a spare public key with empty information are preset in the data account to be recovered, the hash value of the data account to be recovered and a required signature information list are obtained, then based on the signature information list and the hash value, adopting a zero-knowledge proof algorithm to generate a proof file and send the proof file to the client to obtain transaction data, the transaction data comprises a certification file received by the client, a newly generated account public key and a corresponding account private key, and is based on a verification logic algorithm preset in the blockchain network, verifying the certification file, storing the newly generated account public key in the spare public key after the certification file passes the verification, so that the account of the data to be recovered performs transaction signature based on the corresponding account private key and recovers the account data. According to the technical scheme, the standby public key is preset in the account information in the initialized block chain network, so that after the account on the block chain network loses the private key, an account does not need to be newly established, and only on the basis of the original account, the standby public key is modified and updated, so that the data information of the account is quickly and safely recovered according to the account private key corresponding to the standby public key, the data information is continuously subjected to on-chain transaction, the privacy of data of a signing party is protected on the premise of verifying the safety through verifying a zero-knowledge proof algorithm, and the privacy protection of the data on the chain is realized.
It should be noted that while the operations of the method of the present invention are depicted in the drawings in a particular order, this does not require or imply that the operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Rather, the steps depicted in the flowcharts may change the order of execution. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
On the other hand, fig. 6 is a schematic structural diagram of an account recovery apparatus based on a block chain according to an embodiment of the present application. As shown in fig. 6, the apparatus includes:
the system comprises an initialization module 10, a block chain network and a block chain management module, wherein the initialization module is used for initializing account information in the block chain network, the account information comprises a data account to be recovered, and a common public key and a standby public key with empty information are preset in the data account to be recovered;
a first obtaining module 20, configured to obtain a hash value of a data account to be recovered and a required signature information list;
the certification file generating module 30 is configured to generate a certification file by using a zero-knowledge certification algorithm based on the signature information list and the hash value, and send the certification file to the client;
the second obtaining module 40 is configured to obtain transaction data of the data account to be recovered, where the transaction data includes a certificate received by the client, a newly generated account public key, and a corresponding account private key;
the verification module 50 is configured to verify the certification file based on a verification logic algorithm preset in the blockchain network;
and the storage module 60 is configured to store the newly generated account public key in the standby public key after the verification is passed, so that the to-be-recovered data account performs transaction signature based on the corresponding account private key and recovers the account data.
Optionally, the first obtaining module 20 includes:
a first obtaining unit 201, configured to obtain account public keys corresponding to a first number of accounts in a blockchain network, where the first number is greater than or equal to five;
a constructing unit 202, configured to construct a mercker tree based on account public keys corresponding to the first number of accounts;
a first determining unit 203, configured to use a root hash value of the mercker tree as a hash value of the data account to be restored;
and a second determining unit 204, configured to determine, based on the hash value, a signature information list required by the data account to be restored.
Optionally, the second determining unit 204 is specifically configured to:
sending the hash value to a first number of accounts in the blockchain network, so that each account in the first number of accounts signs the hash value, and generating corresponding signature information of the first number of accounts;
acquiring signature information corresponding to a second number of accounts from the signature information corresponding to the first number of accounts, wherein the second number is greater than or equal to one half of the first number;
and generating a signature information list required by the data account to be recovered based on the signature information corresponding to the second number of accounts.
Optionally, the certification document generating module 30 includes:
the compiling unit 301 is used for compiling a zero knowledge proving circuit by adopting a zero knowledge proving tool according to a preset verification logic algorithm;
a first generating unit 302, configured to generate a certification public key and a verification public key by using a generating algorithm based on the zero-knowledge certification circuit;
a second obtaining unit 303, configured to obtain a mercker tree path information list and a public key information list;
the second generating unit 304 is configured to use the signature information list, the mercker tree path information list, and the public key information list as private input parameters, use the hash value of the account information to be recovered as a public key input parameter, and generate a certification file based on the certification public key, the private input parameter, and the public input parameter.
Optionally, the verification module 50 is specifically configured to:
verifying the uniqueness of the account public key in the public key information list based on the verification public key;
when the uniqueness of the account public key passes verification, verifying whether the number of the signature information in the signature information list is equal to a second number;
when the number of the signature information is equal to the second number, verifying the correctness of all the signature information in the signature information list;
when the correctness verification of all the signature information passes, verifying the correctness of the path of the Mercker tree;
when the correctness verification of the Mercker tree path passes, the certification document is determined to pass the verification.
Optionally, the verification module 50 is further configured to:
determining an account public key corresponding to each signature data in the signature information list based on the public key information list;
based on the account public key, decrypting each signature data in the signature information list to obtain an information abstract corresponding to each signature data;
verifying whether the hash value is the same as the information digest corresponding to each signature data;
and when the hash value is the same as the message digest corresponding to each piece of signature data, determining the correctness of all the signature data in the signature information list as verification passing.
Optionally, the newly generated account public key and the corresponding account private key are obtained by the client after the account data transaction to be recovered is constructed and activated.
The account recovery apparatus based on the blockchain provided in this embodiment may execute the embodiments of the method, and the implementation principle and the technical effect are similar, which are not described herein again.
Referring now to FIG. 7, shown is a block diagram of a computer system 600, which may be implemented in a server, suitable for use in implementing embodiments of the present application.
As shown in fig. 7, the computer system 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 603 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the system 600 are also stored. The CPU601, ROM602, and RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, the process described above with reference to fig. 7 may be implemented as a computer software program according to embodiments of the blockchain based account recovery method disclosed herein. For example, embodiments of the master module disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the methods of fig. 2-4. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 605 and/or installed from the removable medium 611.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of various computer systems, methods and computer program products according to the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, and may be described as: a processor comprises an initialization module, a first acquisition module, a certificate generation module, a second acquisition module, a verification module and a storage module. For example, the initialization module may be further described as "used to initialize account information in the blockchain network, where the account information includes a data account to be recovered, and the data account to be recovered is preset with a common public key and a spare public key whose information is empty".
As another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the foregoing device in the foregoing embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer-readable storage medium stores one or more programs, which are used by one or more processors to execute the account recovery method based on the blockchain described in the present application, and specifically executes:
initializing account information in a block chain network, wherein the account information comprises a data account to be recovered, and a common public key and a standby public key with empty information are preset in the data account to be recovered;
acquiring the hash value of the data account to be recovered and a required signature information list;
based on the signature information list and the hash value, generating a certification file by adopting a zero-knowledge certification algorithm and sending the certification file to a client;
acquiring transaction data of a data account to be recovered, wherein the transaction data comprises the certification file received by the client, a newly generated account public key and a corresponding account private key;
verifying the certification file based on a verification logic algorithm preset in the block chain network;
and after the verification is passed, storing the newly generated account public key in the spare public key so as to enable the to-be-recovered data account to perform transaction signature based on the corresponding account private key and recover account data.
In summary, the block chain based account recovery method, apparatus, device and storage medium provided by the present application, by initializing account information in a block chain network, the account information comprises a data account to be recovered, a common public key and a spare public key with empty information are preset in the data account to be recovered, the hash value of the data account to be recovered and a required signature information list are obtained, then based on the signature information list and the hash value, adopting a zero-knowledge proof algorithm to generate a proof file and send the proof file to the client to obtain transaction data, the transaction data comprises a certification file received by the client, a newly generated account public key and a corresponding account private key, and is based on a verification logic algorithm preset in the blockchain network, verifying the certification file, storing the newly generated account public key in the spare public key after the certification file passes the verification, so that the account of the data to be recovered performs transaction signature based on the corresponding account private key and recovers the account data. According to the technical scheme, the standby public key is preset in the account information in the initialized block chain network, so that after the account on the block chain network loses the private key, an account does not need to be newly established, and only on the basis of the original account, the standby public key is modified and updated, so that the data information of the account is quickly and safely recovered according to the account private key corresponding to the standby public key, the data information is continuously subjected to on-chain transaction, the privacy of data of a signing party is protected on the premise of verifying the safety through verifying a zero-knowledge proof algorithm, and the privacy protection of the data on the chain is realized.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Moreover, although the steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that the steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc. Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware.

Claims (10)

1. An account recovery method based on a blockchain is characterized by comprising the following steps:
initializing account information in a block chain network, wherein the account information comprises a data account to be recovered, and a common public key and a standby public key with empty information are preset in the data account to be recovered;
acquiring the hash value of the data account to be recovered and a required signature information list;
based on the signature information list and the hash value, generating a certification file by adopting a zero-knowledge certification algorithm and sending the certification file to a client;
acquiring transaction data of a data account to be recovered, wherein the transaction data comprises the certification file received by the client, a newly generated account public key and a corresponding account private key;
verifying the certification file based on a verification logic algorithm preset in the block chain network;
and after the verification is passed, storing the newly generated account public key in the spare public key so as to enable the to-be-recovered data account to perform transaction signature based on the corresponding account private key and recover account data.
2. The method of claim 1, wherein obtaining the hash value of the data account to be restored and the required list of signature information comprises:
acquiring account public keys corresponding to a first number of accounts in a block chain network, wherein the first number is greater than or equal to five;
constructing a Merck tree based on the account public keys corresponding to the accounts of the first quantity;
taking the root hash value of the Mercker tree as the hash value of the data account to be recovered;
and determining a signature information list required by the data account to be recovered based on the hash value.
3. The method of claim 2, wherein determining the list of signature information required for the data account to be restored based on the hash value comprises:
sending the hash value to the accounts of the first number in the blockchain network, so that each account of the accounts of the first number signs the hash value, and generates signature information corresponding to the accounts of the first number;
acquiring signature information corresponding to a second number of accounts from the signature information corresponding to the first number of accounts, wherein the second number is greater than or equal to one half of the first number;
and generating a signature information list required by the data account to be recovered based on the signature information corresponding to the second number of accounts.
4. The method of claim 1, wherein generating a certification document using a zero-knowledge certification algorithm based on the list of signature information and the hash value comprises:
compiling a zero knowledge proof circuit by adopting a zero knowledge proof tool according to a preset verification logic algorithm;
generating a certification public key and a verification public key by adopting a generation algorithm based on the zero knowledge certification circuit;
acquiring a Mercker tree path information list and a public key information list;
and taking the signature information list, the Mercker tree path information list and the public key information list as private input parameters, taking the hash value of the account information to be recovered as a public key input parameter, and generating a certification file based on the certification public key, the private input parameters and the public input parameters.
5. The method according to claim 4, wherein verifying the certification document based on a preset verification logic algorithm in the blockchain network comprises:
verifying the uniqueness of the public key of the account in the public key information list based on the verification public key;
when the uniqueness verification of the account public key passes, verifying whether the number of the signature information in the signature information list is equal to the second number;
when the number of the signature information is equal to the second number, verifying the correctness of all the signature information in the signature information list;
when the correctness of all the signature information in the signature information list passes verification, verifying the correctness of the Merckel tree path;
when the correctness verification of the Mercker tree path passes, determining that the certification document passes the verification.
6. The method of claim 5, wherein verifying the correctness of all signature data in the signature information list comprises:
determining an account public key corresponding to each signature data in the signature information list based on the public key information list;
based on the account public key, decrypting each signature data in the signature information list to obtain an information abstract corresponding to each signature data;
verifying whether the hash value is the same as the information digest corresponding to each signature data;
and when the hash value is the same as the message digest corresponding to each piece of signature data, determining that the correctness of all the signature data in the signature message list is verified.
7. The method of claim 1, wherein the newly generated account public key and the corresponding account private key are obtained by the client after the transaction is processed by constructing and activating account data to be restored.
8. An account recovery apparatus based on a blockchain, comprising:
the device comprises an initialization module, a block chain network processing module and a recovery module, wherein the initialization module is used for initializing account information in the block chain network, the account information comprises a data account to be recovered, and a common public key and a standby public key with empty information are preset in the data account to be recovered;
the first acquisition module is used for acquiring the hash value of the data account to be recovered and a required signature information list;
the certification file generating module is used for generating a certification file by adopting a zero-knowledge certification algorithm based on the signature information list and the hash value and sending the certification file to the client;
the second acquisition module is used for acquiring transaction data of a data account to be recovered, wherein the transaction data comprises the certification file received by the client, a newly generated account public key and a corresponding account private key;
the verification module is used for verifying the certification file based on a verification logic algorithm preset in the block chain network;
and the storage module is used for storing the newly generated account public key in the standby public key after the verification is passed so as to enable the to-be-recovered data account to perform transaction signature based on the corresponding account private key and recover account data.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1-7 when executing the program.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202210007340.1A 2022-01-04 2022-01-04 Block chain-based account recovery method, device, equipment and storage medium Active CN114362961B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210007340.1A CN114362961B (en) 2022-01-04 2022-01-04 Block chain-based account recovery method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210007340.1A CN114362961B (en) 2022-01-04 2022-01-04 Block chain-based account recovery method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114362961A true CN114362961A (en) 2022-04-15
CN114362961B CN114362961B (en) 2024-03-19

Family

ID=81106437

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210007340.1A Active CN114362961B (en) 2022-01-04 2022-01-04 Block chain-based account recovery method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114362961B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115296812A (en) * 2022-06-22 2022-11-04 国网河北省电力有限公司信息通信分公司 Block chain-based high-reliability recovery and check mechanism for electric power data storage nodes
CN116132181A (en) * 2023-02-03 2023-05-16 网易(杭州)网络有限公司 Account management method, device, equipment and storage medium based on blockchain
WO2024032209A1 (en) * 2022-08-11 2024-02-15 深圳前海环融联易信息科技服务有限公司 Block chain transaction verification method and apparatus, storage medium, and electronic device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918878A (en) * 2019-04-24 2019-06-21 中国科学院信息工程研究所 A kind of industrial internet of things equipment authentication and safety interacting method based on block chain
CN110086612A (en) * 2019-04-26 2019-08-02 山大地纬软件股份有限公司 A kind of public and private key backup of block chain and lose method for retrieving and system
CN110958110A (en) * 2019-12-09 2020-04-03 趣派(海南)信息科技有限公司 Block chain private data management method and system based on zero knowledge proof
CN111160913A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Block chain account balance deposit certificate and recovery method and device
CN111339199A (en) * 2020-02-28 2020-06-26 中国工商银行股份有限公司 Block chain key recovery method and device
WO2020142412A1 (en) * 2018-12-30 2020-07-09 Tunnel International Inc. Methods, devices, and systems for secure payments
CN113128999A (en) * 2019-12-31 2021-07-16 航天信息股份有限公司 Block chain privacy protection method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020142412A1 (en) * 2018-12-30 2020-07-09 Tunnel International Inc. Methods, devices, and systems for secure payments
CN109918878A (en) * 2019-04-24 2019-06-21 中国科学院信息工程研究所 A kind of industrial internet of things equipment authentication and safety interacting method based on block chain
CN110086612A (en) * 2019-04-26 2019-08-02 山大地纬软件股份有限公司 A kind of public and private key backup of block chain and lose method for retrieving and system
CN110958110A (en) * 2019-12-09 2020-04-03 趣派(海南)信息科技有限公司 Block chain private data management method and system based on zero knowledge proof
CN113128999A (en) * 2019-12-31 2021-07-16 航天信息股份有限公司 Block chain privacy protection method and device
CN111339199A (en) * 2020-02-28 2020-06-26 中国工商银行股份有限公司 Block chain key recovery method and device
CN111160913A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Block chain account balance deposit certificate and recovery method and device
CN112001731A (en) * 2020-04-02 2020-11-27 支付宝(杭州)信息技术有限公司 Block chain account balance deposit certificate and recovery method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115296812A (en) * 2022-06-22 2022-11-04 国网河北省电力有限公司信息通信分公司 Block chain-based high-reliability recovery and check mechanism for electric power data storage nodes
WO2024032209A1 (en) * 2022-08-11 2024-02-15 深圳前海环融联易信息科技服务有限公司 Block chain transaction verification method and apparatus, storage medium, and electronic device
CN116132181A (en) * 2023-02-03 2023-05-16 网易(杭州)网络有限公司 Account management method, device, equipment and storage medium based on blockchain

Also Published As

Publication number Publication date
CN114362961B (en) 2024-03-19

Similar Documents

Publication Publication Date Title
US20230318836A1 (en) Computer-implemented systems and methods for linking a blockchain to a digital twin
TWI723665B (en) Authentication based on a recoverd public key
CN110915164A (en) Intelligent contract operation processing blockchain data based on execution in trusted execution environment
CN114362961B (en) Block chain-based account recovery method, device, equipment and storage medium
KR20240117638A (en) System and method for authenticating off-chain data based on proof verification
CN116491098A (en) Certificate-based security using post-use quantum cryptography
CN114358782A (en) Block chain transaction auditing method, device, equipment and storage medium
CN112446039A (en) Block chain transaction processing method, device, equipment and storage medium
JP2022549070A (en) Computer-implemented methods and systems for storing authenticated data on a blockchain
CN114221972A (en) Relay blockchain system and cross-chain transaction method
CN111464315A (en) Digital signature processing method, device, computer equipment and storage medium
KR20210036700A (en) Blockchain system for supporting change of plain text data included in transaction
CN110276693B (en) Insurance claim settlement method and system
CN110827034B (en) Method and apparatus for initiating a blockchain transaction
CN118364477A (en) Data processing method and device, electronic equipment and storage medium
CN115409511A (en) Personal information protection system based on block chain
CN105049209A (en) Dynamic password generation method and apparatus
CN112565201B (en) Private key processing method and device in block chain and computer storage medium
CN112163917B (en) Bill processing method and device based on blockchain, medium and electronic equipment
CN111949738A (en) Block chain-based data storage deduplication method, terminal device and storage medium
CN112887097A (en) Signature method based on SM2 elliptic curve, related device and storage medium
CN112862483B (en) Identity verification method and device based on intelligent contract
CN116318714A (en) Block chain asset recovery method and block chain asset recovery system
CN116226932A (en) Service data verification method and device, computer medium and electronic equipment
CN117272359A (en) Account virtual resource management method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant