CN114500069A - Method and system for storing and sharing electronic contract - Google Patents

Method and system for storing and sharing electronic contract Download PDF

Info

Publication number
CN114500069A
CN114500069A CN202210123470.1A CN202210123470A CN114500069A CN 114500069 A CN114500069 A CN 114500069A CN 202210123470 A CN202210123470 A CN 202210123470A CN 114500069 A CN114500069 A CN 114500069A
Authority
CN
China
Prior art keywords
electronic contract
access
contract
electronic
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210123470.1A
Other languages
Chinese (zh)
Inventor
斯雪明
赵海鸿
谭焕明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Fulian Technology Co ltd
Original Assignee
Fujian Fulian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Fulian Technology Co ltd filed Critical Fujian Fulian Technology Co ltd
Priority to CN202210123470.1A priority Critical patent/CN114500069A/en
Publication of CN114500069A publication Critical patent/CN114500069A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for storing and sharing electronic contracts; according to the invention, a signing terminal sets an access control rule for an electronic contract according to a user request; a signing end generates a public and private key pair, encrypts an electronic contract through the public and private key pair and uploads the electronic contract to a block chain network; the signing end receives an access request which is sent by the access end and contains the public key of the access end and identity information, judges whether the identity information accords with an access control rule, generates a re-encryption key according to the public key of the access end and a self public and private key if the identity information accords with the access control rule, and sends the re-encryption key to an agent intelligent contract of the block chain network end; according to the re-encryption key, the agent intelligent contract of the block chain network end re-encrypts the electronic contract and returns the electronic contract to the access end, and the access end decrypts the electronic contract according to the private key of the access end to obtain the electronic contract; the access control to the electronic contract is better and automatically realized, the electronic contract is encrypted and transmitted all the time, and the safety is higher.

Description

Method and system for storing and sharing electronic contract
Technical Field
The invention relates to the technical field of electronic contracts, in particular to a method and a system for storing and sharing electronic contracts.
Background
In the era of high degree of informatization today, privacy of data is becoming of particular importance. However, most centralized storage adopted by electronic contracts is vulnerable to attack, content is subject to tampering and the like; and the signing party of the electronic contract does not have the dominant right and cannot know that the electronic contract can be viewed by those.
The concept of blockchains was first proposed by a scholarly named the middle minder in a paper published by him on bitcoin. The distributed account book is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, is cryptographically guaranteed to be non-falsifiable and non-counterfeitable, and has the characteristics of decentralization, non-falsification, data traceability and the like. Therefore, an effective solution to the above problems is provided by means of the block chain technology.
However, the existing storage scheme related to the electronic contract lacks an access control strategy, and cannot perform fine-grained access control on the electronic contract uploaded to the block chain. Authentication and approval of the visitor is required to be performed down-link, and there are ambiguity and security issues.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the method and the system for storing and sharing the electronic contract are provided, the access control of the electronic contract is better realized, and the security is higher.
In order to solve the technical problems, the invention adopts the technical scheme that:
a method for storing and sharing electronic contracts comprises the following steps:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a system for storing and sharing electronic contracts, comprising a signing end and a blockchain network end, wherein the signing end comprises a first processor, a first memory and a first computer program stored in the first memory and operable on the first processor, the blockchain network end comprises a second processor, a second memory and a second computer program stored in the second memory and operable on the second processor, and the first processor implements the following steps when executing the first computer program:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
The invention has the beneficial effects that: the invention carries out encryption storage on the electronic contract, and can carry out verification on the identity of the access terminal by configuring the access control rule, thereby better and automatically realizing the access control on the electronic contract, the agent intelligent contract is constructed in the block chain network, the electronic contract is re-encrypted by the agent intelligent contract only after the verification is passed, the electronic contract can be obtained only by the access terminal passing the identity verification while the decentralization is ensured, and the electronic contract is always encrypted and transmitted, thereby having higher safety.
Drawings
FIG. 1 is a flow chart of a method for storing and sharing electronic contracts according to an embodiment of the present invention;
FIG. 2 is a block diagram of a system for electronic contract storage and sharing according to an embodiment of the present invention;
fig. 3 is a schematic data flow diagram of a method for storing and sharing electronic contracts according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating an embodiment of a method for storing and sharing electronic contracts;
description of reference numerals:
1. a system for storing and sharing electronic contracts; 2. signing end; 3. a first processor; 4. a first memory; 5. a block chain network end; 6. a second processor; 7. a second memory.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Intelligent contract: a smart contract, chainocode, also known as chain code, is a piece of program code deployed on a blockchain. The intelligent contract is a core part of a block chain, the promissory commitment is digitalized according to business logic, and once a preset condition is triggered, the intelligent contract can be automatically executed accurately, so that human errors or falsification are avoided.
Proxy re-encryption: in proxy re-encryption, the data visitor Bob sends an access request to the data owner Alice and sends its own public key. And Alice generates an agent re-encryption key by the private key of Alice and the public key of Bob, and sends the agent re-encryption key and the ciphertext to the semi-trusted agent. And the semi-trusted agent performs re-encryption operation and sends the generated re-encrypted ciphertext to the visitor. The visitor can decrypt the ciphertext by using the private key of the visitor, and therefore data sharing is achieved under the condition that the agent does not know the plaintext.
Referring to fig. 1, fig. 3 and fig. 4, a method for storing and sharing an electronic contract includes the steps of:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
From the above description, the beneficial effects of the present invention are: the invention carries out encryption storage on the electronic contract, and can carry out verification on the identity of the access terminal by configuring the access control rule, thereby better and automatically realizing the access control on the electronic contract, the agent intelligent contract is constructed in the block chain network, the electronic contract is re-encrypted by the agent intelligent contract only after the verification is passed, the electronic contract can be obtained only by the access terminal passing the identity verification while the decentralization is ensured, and the electronic contract is always encrypted and transmitted, thereby having higher safety.
Further, the step S1 is specifically:
the signing end sets an access control rule for the electronic contract according to a user request and calculates a first hash value of the electronic contract;
the step S2 specifically includes:
a signing end generates a public and private key pair, encrypts the electronic contract through the public and private key pair, and uploads the encrypted electronic contract and the first hash value to a block chain network;
the step S4 is followed by the step of:
s5, the check intelligent contract of the blockchain network end receives the electronic contract check request sent by the access end, checks the electronic contract according to the first hash value, and returns the check result to the access end.
As can be seen from the above description, the signing end also calculates the hash value of the electronic contract and uploads the hash value to the blockchain network, and if the access end has a doubt about the authenticity of the contract after acquiring the electronic contract, the access end can send a verification request to the blockchain network, and the blockchain network verifies the authenticity of the contract according to the first hash value.
Further, the step S5 is specifically:
and the verification intelligent contract of the block chain network end receives an electronic contract verification request of the access end containing a second hash value, compares and verifies the first hash value and the second hash value, and returns a verification result to the access end, wherein the second hash value is obtained by performing hash calculation on the electronic contract by the access end.
According to the description, if the access terminal doubts the authenticity of the electronic contract, the hash value of the electronic contract is calculated, the hash value and the verification request are sent to the blockchain network together, and the block chain network verifies the authenticity and effectiveness of the contract through hash value comparison, so that the method is faster and more accurate.
Further, the identity information of the access terminal includes name, gender and company.
According to the description, the identity information of the access terminal comprises the name, the gender and the company, so that the identity of the user at the access terminal can be effectively identified.
Referring to fig. 2, a system for storing and sharing an electronic contract includes a signing end and a blockchain network end, where the signing end includes a first processor, a first memory, and a first computer program stored in the first memory and executable on the first processor, the blockchain network end includes a second processor, a second memory, and a second computer program stored in the second memory and executable on the second processor, and the first processor implements the following steps when executing the first computer program:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
From the above description, the beneficial effects of the present invention are: the invention carries out encryption storage on the electronic contract, and can carry out verification on the identity of the access terminal by configuring the access control rule, thereby better and automatically realizing the access control on the electronic contract, the agent intelligent contract is constructed in the block chain network, the electronic contract is re-encrypted by the agent intelligent contract only after the verification is passed, the electronic contract can be obtained only by the access terminal passing the identity verification while the decentralization is ensured, and the electronic contract is always encrypted and transmitted, thereby having higher safety.
Further, when the first processor executes the first computer program, the step S1 specifically includes:
setting an access control rule for the electronic contract according to a user request, and calculating a first hash value of the electronic contract;
the step S2 specifically includes:
generating a public and private key pair, encrypting the electronic contract through the public and private key pair, and uploading the encrypted electronic contract and the first hash value to a block chain network;
the second processor executing the second computer program further comprises, after the step S4, the steps of:
and S5, receiving the electronic contract verification request sent by the access terminal by the verification intelligent contract, verifying the electronic contract according to the first hash value, and returning the verification result to the access terminal.
As can be seen from the above description, the signing end further calculates the hash value of the electronic contract and uploads the hash value to the blockchain network, and if the access end doubts the authenticity of the electronic contract after acquiring the electronic contract, the access end may send a verification request to the blockchain network, and the blockchain network verifies the authenticity of the contract according to the first hash value.
Further, when the second processor executes the second computer program, the step S5 specifically includes:
and the verification intelligent contract receives an electronic contract verification request containing a second hash value at the access terminal, compares and verifies the first hash value and the second hash value, and returns a verification result to the access terminal, wherein the second hash value is obtained by performing hash calculation on the electronic contract at the access terminal.
According to the description, if the access terminal doubts the authenticity of the electronic contract, the hash value of the electronic contract is calculated, the hash value and the verification request are sent to the block chain network together, and the authenticity and effectiveness of the contract are verified through hash value comparison by the block chain network, so that the method is faster and more accurate.
Further, the identity information of the access terminal includes name, gender and company.
According to the description, the identity information of the access terminal comprises the name, the gender and the company, so that the identity of the user at the access terminal can be effectively identified.
The method and the system for storing and sharing the electronic contract are suitable for scenes that the electronic contract needs to be shared, and meanwhile, the confidentiality of the electronic contract and management and control on personnel accessing the electronic contract are guaranteed.
Referring to fig. 1, fig. 3 and fig. 4, a first embodiment of the present invention is:
in this embodiment, a blockchain environment is built based on the hyper-ridger Fabric, so that basic functional requirements of the electronic contract can be provided, and functions of chain loading and verification, chain inquiry, safe sharing, contract verification and the like of the electronic contract are realized. The program is divided into three functional modules according to functions:
(1) electronic contract cochain module
The signing party of the contract sets access control rules for the electronic contract according to the attributes, and only users meeting the set requirements can access the electronic contract. And then, randomly generating a symmetric key to encrypt the electronic contract and uploading the electronic contract ciphertext to a block chain network for chain loading and certificate storage, so that the electronic contract is guaranteed to be not falsifiable.
(2) Electronic contract sharing module
The intelligent contract of the block chain is combined with the agent re-encryption algorithm to realize safe sharing, and the role of the agent intelligent contract is constructed to realize the function of a semi-trusted agent in the traditional agent re-encryption process. The signing party of the contract generates a re-encryption key by using the public and private key pair of the signing party and the public key of the visitor, and then sends the re-encryption key to the agent intelligent contract. And the agent intelligent contract is automatically triggered after receiving the re-encryption key, calls the electronic contract ciphertext uploaded to the block chain by the owner for re-encryption operation, and returns the re-encrypted ciphertext to the visitor.
(3) Checking and verifying module
After receiving the re-encrypted electronic contract ciphertext, the visitor can use the private key of the visitor to decrypt and obtain the electronic contract plaintext. Through the verification function of the system, whether the received electronic contract is consistent with the electronic contract stored on the block chain or not can be verified, and the authenticity of the electronic contract is verified.
The three functional modules jointly realize a method for storing and sharing the electronic contract, which comprises the following steps:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
the step S1 specifically includes:
and the signing terminal sets an access control rule for the electronic contract according to the user request and calculates a first hash value of the electronic contract.
In this embodiment, each user in the system has its own attributes, such as name, gender, company, etc. And the signing end of the electronic contract sets an access control rule for the electronic contract according to the attribute information, and then performs hash operation on the electronic contract to obtain a hash value of the contract.
S2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
the step S2 specifically includes:
and generating a public and private key pair, encrypting the electronic contract through the public and private key pair, and uploading the encrypted electronic contract and the first hash value to a block chain network.
In this embodiment, the signing end of the electronic contract randomly generates a symmetric key k to encrypt the electronic contract to obtain an electronic contract ciphertext, and finally uploads the hash value and the electronic contract ciphertext to the block chain network. The symmetric key includes a private key and a public key.
S3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and the self public and private key, and sends the re-encryption key to the agent intelligent contract of the block chain network terminal.
In this embodiment, if the access terminal wants to access the electronic contract, the access terminal needs to apply for accessing the electronic contract to the signing terminal of the electronic contract. And judging whether the access control strategy is met by the signing end, if the access control strategy is met, generating a re-encryption key for the visitor by using the public and private key pair of the signing end and the public key of the visitor, and sending the re-encryption key to the agent intelligent contract.
And S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
In this embodiment, the agent intelligent contract in the block chain network is automatically triggered after receiving the re-encryption key, and according to the re-encryption key, the electronic contract ciphertext uploaded to the block chain by the signing terminal is called to perform re-encryption operation, so as to generate a re-encrypted ciphertext, and the re-encrypted ciphertext is returned to the access terminal. And after the access terminal receives the re-encrypted ciphertext, the electronic contract ciphertext can be decrypted by using the private key of the access terminal, the plaintext information of the electronic contract is obtained, and the sharing process of the electronic contract is finished.
In the conventional proxy re-encryption process, a semi-trusted proxy role is required, and this requirement is contradictory to the decentralized nature of the blockchain. Therefore, the sending text is combined with the intelligent contract to construct an agent intelligent contract, and the safe sharing of data can be realized in a decentralized mode.
The step S4 is followed by the step of:
s5, receiving an electronic contract verification request sent by the access terminal by the verification intelligent contract, verifying the electronic contract according to the first hash value, and returning a verification result to the access terminal;
the step S5 specifically includes:
and the verification intelligent contract of the block chain network end receives an electronic contract verification request of the access end containing a second hash value, compares and verifies the first hash value and the second hash value, and returns a verification result to the access end, wherein the second hash value is obtained by performing hash calculation on the electronic contract by the access end.
In this embodiment, if the access terminal suspects the decrypted electronic contract, the hash operation may be performed on the plaintext of the electronic contract to obtain a hash value, and the authenticity of the electronic contract is verified by verifying that the intelligent contract is compared with the hash value stored in the block chain.
Referring to fig. 2, the second embodiment of the present invention is:
referring to fig. 2, a system for storing and sharing electronic contracts includes a signing peer 2 and a blockchain network peer 5, where the signing peer 2 includes a first processor 3, a first memory 4 and a first computer program stored in the first memory 4 and operable on the first processor 3, the blockchain network peer 5 includes a second processor 6, a second memory 7 and a second computer program stored in the second memory 7 and operable on the second processor 6, the first processor 2 implements the steps performed by the signing peer 2 according to the above embodiment when executing the first computer program, and the second processor 6 implements the steps performed by the blockchain network peer 5 according to the above embodiment when executing the second computer program.
The main principle of the method and the system for storing and sharing the electronic contract is that the access sharing of the electronic contract is realized by utilizing the block chain, and meanwhile, the electronic contract is ensured not to be modified or leaked and the access of the electronic contract is controlled by combining the access control rule, the proxy re-encryption and the intelligent contract.
In summary, according to the method and system for storing and sharing an electronic contract provided by the present invention, the electronic contract is stored in an encrypted manner, and the identity of the access terminal can be verified by configuring the access control rule, so that the access control of the electronic contract is better and automatically realized.
The above description is only an embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent modifications made by the present invention and the contents of the accompanying drawings, which are directly or indirectly applied to the related technical fields, are included in the scope of the present invention.

Claims (8)

1. A method for storing and sharing electronic contracts is characterized by comprising the following steps:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
2. The method for storing and sharing electronic contracts according to claim 1, wherein the step S1 specifically comprises:
the signing end sets an access control rule for the electronic contract according to a user request and calculates a first hash value of the electronic contract;
the step S2 specifically includes:
a signing end generates a public and private key pair, encrypts the electronic contract through the public and private key pair, and uploads the encrypted electronic contract and the first hash value to a block chain network;
the step S4 is followed by the step of:
s5, the check intelligent contract of the blockchain network end receives the electronic contract check request sent by the access end, checks the electronic contract according to the first hash value, and returns the check result to the access end.
3. The method for storing and sharing electronic contracts according to claim 2, wherein the step S5 specifically comprises:
and the verification intelligent contract of the block chain network end receives an electronic contract verification request of the access end containing a second hash value, compares and verifies the first hash value and the second hash value, and returns a verification result to the access end, wherein the second hash value is obtained by performing hash calculation on the electronic contract by the access end.
4. The method for storing and sharing electronic contracts according to claim 1, wherein the identity information of the access terminal comprises name, gender and company.
5. A system for storing and sharing electronic contracts, comprising a signing end and a blockchain network end, wherein the signing end comprises a first processor, a first memory and a first computer program stored in the first memory and executable on the first processor, and the blockchain network end comprises a second processor, a second memory and a second computer program stored in the second memory and executable on the second processor, and wherein the first processor implements the following steps when executing the first computer program:
s1, the signing terminal sets an access control rule for the electronic contract according to the user request;
s2, a signing end generates a public and private key pair, and the electronic contract is encrypted through the public and private key pair and uploaded to a block chain network;
s3, the signing terminal receives an access request containing an access terminal public key and identity information sent by an access terminal, judges whether the identity information accords with the access control rule, if so, generates a re-encryption key according to the access terminal public key and a self public and private key, and sends the re-encryption key to an agent intelligent contract of the block chain network terminal;
and S4, the agent intelligent contract of the block chain network terminal re-encrypts the electronic contract according to the re-encryption key and then returns the electronic contract to the access terminal, and the access terminal decrypts the electronic contract according to the private key of the access terminal to obtain the electronic contract.
6. The system according to claim 5, wherein the step S1 when the first processor executes the first computer program is specifically as follows:
setting an access control rule for the electronic contract according to a user request, and calculating a first hash value of the electronic contract;
the step S2 specifically includes:
generating a public and private key pair, encrypting the electronic contract through the public and private key pair, and uploading the encrypted electronic contract and the first hash value to a block chain network;
the second processor executing the second computer program further comprises, after the step S4, the steps of:
and S5, receiving the electronic contract verification request sent by the access terminal by the verification intelligent contract, verifying the electronic contract according to the first hash value, and returning the verification result to the access terminal.
7. The system according to claim 6, wherein the step S5 when the second processor executes the second computer program is specifically:
and the verification intelligent contract receives an electronic contract verification request containing a second hash value at the access terminal, compares and verifies the first hash value and the second hash value, and returns a verification result to the access terminal, wherein the second hash value is obtained by performing hash calculation on the electronic contract at the access terminal.
8. The system for storing and sharing electronic contracts according to claim 5, wherein the identity information of the access terminal comprises name, gender and company.
CN202210123470.1A 2022-02-10 2022-02-10 Method and system for storing and sharing electronic contract Pending CN114500069A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210123470.1A CN114500069A (en) 2022-02-10 2022-02-10 Method and system for storing and sharing electronic contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210123470.1A CN114500069A (en) 2022-02-10 2022-02-10 Method and system for storing and sharing electronic contract

Publications (1)

Publication Number Publication Date
CN114500069A true CN114500069A (en) 2022-05-13

Family

ID=81477843

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210123470.1A Pending CN114500069A (en) 2022-02-10 2022-02-10 Method and system for storing and sharing electronic contract

Country Status (1)

Country Link
CN (1) CN114500069A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115033645A (en) * 2022-07-06 2022-09-09 贵州电网有限责任公司 Electric power data storage method and system based on block chain technology
CN117009933A (en) * 2023-06-25 2023-11-07 上海朗晖慧科技术有限公司 Information security approval monitoring system and method based on Internet of things
CN117574414A (en) * 2024-01-16 2024-02-20 支付宝(杭州)信息技术有限公司 Electronic contract signing processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109120639A (en) * 2018-09-26 2019-01-01 众安信息技术服务有限公司 A kind of data cloud storage encryption method and system based on block chain
CN111541678A (en) * 2020-04-17 2020-08-14 上海朝夕网络技术有限公司 Block chain-based proxy re-encryption method, system and storage medium
CN112861157A (en) * 2021-03-01 2021-05-28 北京欧凯联创网络科技有限公司 Data sharing method based on decentralized identity and proxy re-encryption
CN113556363A (en) * 2021-09-18 2021-10-26 中国人民解放军国防科技大学 Data sharing method and system based on decentralized and distributed proxy re-encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109120639A (en) * 2018-09-26 2019-01-01 众安信息技术服务有限公司 A kind of data cloud storage encryption method and system based on block chain
CN111541678A (en) * 2020-04-17 2020-08-14 上海朝夕网络技术有限公司 Block chain-based proxy re-encryption method, system and storage medium
CN112861157A (en) * 2021-03-01 2021-05-28 北京欧凯联创网络科技有限公司 Data sharing method based on decentralized identity and proxy re-encryption
CN113556363A (en) * 2021-09-18 2021-10-26 中国人民解放军国防科技大学 Data sharing method and system based on decentralized and distributed proxy re-encryption

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHAO H, ZHU Z, PAN C, ET AL: "A New Electronic Contract System Model Based on Blockchain", INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, 1 January 2022 (2022-01-01), pages 1 - 11 *
张勇: "基于区块链技术的数字版权隐私性研究", 信息与电脑, no. 3, 15 February 2019 (2019-02-15), pages 1 - 2 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115033645A (en) * 2022-07-06 2022-09-09 贵州电网有限责任公司 Electric power data storage method and system based on block chain technology
CN115033645B (en) * 2022-07-06 2023-11-21 贵州电网有限责任公司 Power data storage method and system based on block chain technology
CN117009933A (en) * 2023-06-25 2023-11-07 上海朗晖慧科技术有限公司 Information security approval monitoring system and method based on Internet of things
CN117009933B (en) * 2023-06-25 2024-03-29 上海朗晖慧科技术有限公司 Information security approval monitoring system and method based on Internet of things
CN117574414A (en) * 2024-01-16 2024-02-20 支付宝(杭州)信息技术有限公司 Electronic contract signing processing method and device

Similar Documents

Publication Publication Date Title
CN111191286B (en) HyperLegger Fabric block chain private data storage and access system and method thereof
CN112836229B (en) Trusted data access control scheme for attribute-based encryption and block chaining
CN110417750B (en) Block chain technology-based file reading and storing method, terminal device and storage medium
JP5562687B2 (en) Securing communications sent by a first user to a second user
CN109067528B (en) Password operation method, work key creation method, password service platform and equipment
CN112825520B (en) User privacy data processing method, device, system and storage medium
CN109450843B (en) SSL certificate management method and system based on block chain
US20220014367A1 (en) Decentralized computing systems and methods for performing actions using stored private data
CN114500069A (en) Method and system for storing and sharing electronic contract
JP2023500570A (en) Digital signature generation using cold wallet
CN111274599A (en) Data sharing method based on block chain and related device
CN110505055B (en) External network access identity authentication method and system based on asymmetric key pool pair and key fob
CN110138548B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and DH protocol
CN104158827A (en) Cryptograph data sharing method and device, inquiring server and data uploading client terminal
CN110445840B (en) File storage and reading method based on block chain technology
CN114239046A (en) Data sharing method
CN112487443A (en) Energy data fine-grained access control method based on block chain
CN111917711B (en) Data access method and device, computer equipment and storage medium
CN114679340B (en) File sharing method, system, device and readable storage medium
CN113726772A (en) Method, device, equipment and storage medium for realizing on-line inquiry session
CN113328860A (en) Block chain-based user privacy data security providing method
Luo et al. Accountable data sharing scheme based on blockchain and SGX
CN114662073B (en) Verification method and device for LED system, computer equipment and medium
US20240193255A1 (en) Systems and methods of protecting secrets in use with containerized applications
CN110401535B (en) Digital certificate generation, secure communication and identity authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination