CN114692198A - Anonymous network expert review method and system based on block chain - Google Patents

Anonymous network expert review method and system based on block chain Download PDF

Info

Publication number
CN114692198A
CN114692198A CN202210256870.XA CN202210256870A CN114692198A CN 114692198 A CN114692198 A CN 114692198A CN 202210256870 A CN202210256870 A CN 202210256870A CN 114692198 A CN114692198 A CN 114692198A
Authority
CN
China
Prior art keywords
review
expert
evaluation
public key
manager
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210256870.XA
Other languages
Chinese (zh)
Inventor
史红周
余孙婕
曹萌
梁英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Computing Technology of CAS
Original Assignee
Institute of Computing Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Computing Technology of CAS filed Critical Institute of Computing Technology of CAS
Priority to CN202210256870.XA priority Critical patent/CN114692198A/en
Publication of CN114692198A publication Critical patent/CN114692198A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Medical Informatics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides an anonymous network expert review method and system based on a block chain, wherein a review manager stores contents to be reviewed and related parameters into corresponding blocks of the block chain, and signs a public key of a review expert after blinding; the evaluation expert obtains the signature of the public key of the evaluation expert from the evaluation manager by performing anti-blinding processing on the obtained signature of the public key blinded by the evaluation manager; and the evaluation expert acquires a key for reading the content to be evaluated by using the public key of the evaluation expert, the signature of the evaluation manager on the public key of the evaluation expert and the public key of the evaluation manager and stores the evaluation opinions of the content to be evaluated into the corresponding blocks of the block chain. In the scheme, the evaluation manager can only correspond the blind public key to the evaluation experts, but cannot correspond the evaluation opinions to the evaluation experts one by one, so that anonymization of the evaluation experts is realized, and the safety of the evaluation process is improved.

Description

Anonymous network expert review method and system based on block chain
Technical Field
The invention relates to an expert review information system and privacy protection, in particular to an anonymous network expert review method and system based on a block chain.
Background
Expert review is an important means for ensuring scientific, reasonable and fair academic rewards, academic publishing and scientific research resource allocation. In the process of expert review, the detailed evaluation contents of the review expert on other experts, prize-reporting materials, academic papers, academic institutions, project suggestions and the like are generally involved, and from the perspective of avoiding unnecessary contradictions and benefit conflicts, anonymous protection is provided for the review expert in the review link, which becomes a key requirement in the review process. Most of the existing network expert review systems protect the privacy of the review expert and/or the reviewer by making the review expert anonymous to the reviewer during the review activity or making both the review expert and the reviewer anonymous.
Disclosure of Invention
However, the inventor finds that the existing network expert review system is not complete in anonymization of review experts in the process of researching the network expert review system, and has a great security risk. For example, the review experts, review conclusions, etc. often do not appear anonymous to the review manager during the actual review process, and thus there may still be privacy disclosure by the review manager. And the structure of the centralized system based on the review system and the review manager also has the risk that the privacy of the review experts and the review comments are attacked and tampered.
In order to solve the above problems, embodiments of the present application provide a controllable anonymous network expert review system based on a block chain, so that even though a review manager can master the information of the review expert and guide the review activity to proceed, the review administrator cannot correspond the review opinions to the review experts one to one, thereby implementing complete anonymization of the review expert.
According to a first aspect of the embodiments of the present invention, there is provided an anonymous network expert review method based on a blockchain, including: step S1), the review manager stores the content to be evaluated and the related parameters into the corresponding block of the block chain, wherein the parameters at least comprise the review expert list of the content to be evaluated, the key for reading the content to be evaluated, the review time limit and the public key and signature of the review manager; step S2) the public key of the review expert is processed in a blinding way, and the blinded public key and the authentication request are sent to the review manager so as to obtain the signature of the blinded public key by the review manager; step S3), the obtained signature of the public key blinded by the review administrator is processed by the review expert in a counter-blinding way so as to obtain the signature of the public key of the review administrator to the review expert; and step S4) obtaining a key for reading the content to be evaluated by the evaluation expert by using the public key of the evaluation expert, the signature of the evaluation manager on the public key of the evaluation expert and the public key of the evaluation manager, and storing the evaluation opinions of the content to be evaluated into the corresponding block of the block chain.
In some embodiments, step S1) may include: and verifying the validity of the review administrator by using the public key and the signature of the review administrator, if the verification is passed, creating a corresponding block for the content to be evaluated in the block chain, and storing the content to be evaluated and related parameters thereof in the created block.
In some embodiments, step S2) may further include: and the evaluation manager responds to the blind public key and the authentication request from the evaluation expert, verifies the identity of the evaluation expert, signs the blind public key of the evaluation expert by using the private key of the evaluation manager, and returns the generated signature to the evaluation expert.
In some embodiments, the step S4) may include: verifying the validity of the evaluation expert by using the public key of the evaluation expert, the signature of the evaluation administrator on the public key of the evaluation expert and the public key of the evaluation administrator, and executing one of the following steps if the verification is passed: returning a key for reading the contents to be evaluated to the evaluation expert; or verifying the validity of the review opinions of the contents to be reviewed from the review expert, and if the verification is passed, storing the review opinions of the contents to be reviewed by the review expert into the corresponding block of the block chain.
In some embodiments, wherein verifying the legitimacy of the review comment from the review expert for the content to be reviewed comprises decrypting the signature of the review comment for the review expert using the public key of the review expert and matching the decrypted review comment with the review comment received from the review expert, and if the two are in agreement, the verification passes.
In some embodiments, the method may further comprise: in response to the uplink of the review opinions of the review experts on the content to be reviewed, returning a submission certification to the review experts; and sending the submission certification and the acquired signature of the public key blinded by the review manager to the review manager by the review expert so that the review manager can count the review condition.
According to a second aspect of the embodiments of the present invention, an anonymous network expert review system based on a block chain is provided, the system includes an authentication module and a review management module, the authentication module and the review management module are loaded in the block chain in an intelligent contract manner, and a review manager and a review expert as users of the block chain respectively access the system through corresponding intelligent contract interfaces and communicate with each other based on the system; wherein: the authentication module is used for registering and verifying the identity of the evaluation manager and the evaluation expert and generating and distributing corresponding public keys and private keys for the evaluation manager and the evaluation expert. The review management module is used for: receiving the contents to be evaluated and related parameters from an evaluation manager, and storing the contents to be evaluated and the related parameters to corresponding blocks of a block chain, wherein the parameters at least comprise an evaluation expert list of the contents to be evaluated, a key for reading the contents to be evaluated, evaluation time limit, and a public key and a signature of the evaluation manager; in response to receiving the public key and the authentication request of the evaluation expert, blinding the public key of the evaluation expert, and sending the blinded public key and the authentication request to an evaluation manager; in response to receiving the signature of the public key of the review manager on the review expert after blinding, performing anti-blinding processing on the public key, and sending the signature of the public key of the review expert obtained after processing to the review expert; and sending the key for reading the content to be evaluated to the review expert in response to the public key of the review expert, the signature of the public key of the review expert by the review manager and the public key of the review manager received from the review expert, and saving the review opinions of the content to be evaluated from the review expert into the corresponding block of the block chain.
In some embodiments, the review management module may be configured to: and verifying the validity of the review administrator by using the public key and the signature of the review administrator, if the verification is passed, creating a corresponding block for the content to be evaluated in the block chain, and storing the content to be evaluated and related parameters thereof in the created block.
In some embodiments, the review manager, in response to receiving the blinded public key and the authentication request from the review expert, verifies the identity of the review expert via the authentication module, signs the blinded public key of the review expert using the private key of the review manager, and returns the generated signature to the review expert.
In some embodiments, the review management module may be configured to: verifying the validity of the evaluation expert by using the public key of the evaluation expert, the signature of the evaluation administrator on the public key of the evaluation expert and the public key of the evaluation administrator, and executing one of the following steps if the verification is passed: returning a key for reading the content to be evaluated to the evaluation expert; or verifying the validity of the review opinions of the contents to be reviewed from the review expert, and if the verification is passed, storing the review opinions of the contents to be reviewed by the review expert into the corresponding block of the block chain.
Compared with the existing network expert review system, the scheme of the application realizes a complete anonymization review mechanism of the review expert, and efficiently and automatically executes review activities while guaranteeing privacy safety of the review expert and preventing review contents from being tampered, so that the review system has higher safety and more effective automatic execution efficiency.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort. In the drawings:
fig. 1 shows a functional block diagram of a controllable anonymous network expert review system based on a block chain according to one embodiment of the present invention.
Fig. 2 shows a flow diagram of a block chain based controllable anonymous network expert review method according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail by embodiments with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations or operations have not been shown or described in detail to avoid obscuring aspects of the invention.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
Most of the existing network expert review systems adopt a single anonymous review mechanism, namely, in the review activity, the review expert is anonymous to the reviewed person, and the flow is simply summarized as follows:
(1) after the review manager finishes the review content, a plurality of suitable review experts are selected, and the review invitation is sent by mails. If the evaluation expert does not reply after overdue, the evaluation manager sends an email to urge for 1-2 times; if the multiple review experts reject the review invitation of the review manager, the review manager will reselect the appropriate review expert.
(2) After all the evaluation experts accept the evaluation invitation, the evaluation experts log in the evaluation system by the identity of the evaluation experts through the account and the password in the mail and carry out evaluation activities. Before the review expert reviews, review articles need to be read, and the system prompts the review deadline.
(3) And the evaluation expert submits the scoring condition and the evaluation opinion on the evaluation system.
(4) After collecting the review opinions, the review manager makes a final judgment according to the opinions of all the review experts. If the opinions of the review experts are the same or slightly divergent, the review manager will make a decision according to the opinions of the review experts. However, if the divergence of the review experts is large, the review manager will re-invite the new review experts to perform arbitration.
It can be seen that in such a single anonymous review mechanism, although the review expert is anonymous, and the privacy security of the review expert is protected to some extent, the review expert and the review conclusion and the like are not anonymous to the review manager during the specific review process, so that there may be privacy disclosure by the review manager. And the system structure based on the centralized management of the review system and the review manager also increases the risk of privacy disclosure of the review experts and attack and tampering of the review opinions on the network.
Therefore, in the embodiment of the present application, a controllable anonymous network expert review system (hereinafter, may be referred to as a system or a review system) based on a blockchain is provided, which is configured above the blockchain, and guarantees that content to be reviewed and review comments are not tampered through the blockchain, thereby avoiding security risks caused by attacks received by a central system and hidden privacy leakage risks of the central system itself. The controllable anonymity means that although the review manager can master the information of the review experts and guide the progress of the review activities, the review manager cannot correspond the review opinions to the review experts one by one, so that privacy disclosure caused by the review manager is avoided.
The system includes at least two types of roles: a review administrator and a review expert. Each review administrator may initiate one or more review activities. Each of the review activities corresponds to one content to be reviewed, and the review manager selects a plurality of suitable review experts for each content to be reviewed and provides a review invitation to the review experts. After accepting the review invitation, each review expert accesses the access interface provided in the review invitation and used for performing the review activity to determine the review qualification, access the content to be evaluated and submit the review opinions. In yet another embodiment, the system may also include another type of role, a system administrator, for managing the initial configuration of the entire review system and managing multiple review administrators. For example, when a review activity is initiated, the identity of the review manager initiating the review activity is authenticated by the system manager, which is more beneficial to enhancing the safety and reliability of the review system. In the embodiment of the present application, the system is configured on a blockchain system, so that each role is a user account of the blockchain, and the accounts can interact with each other through the blockchain. Each account is provided with a corresponding public key and a corresponding private key, the public key is used for encrypting the original data, and only the corresponding private key can unlock the original data, so that the original data can be transmitted in a network and can not be stolen, and the privacy is protected; and the private key is used for generating a signature for the original data, and only the corresponding public key can verify that the signature is matched with the original data, so that the receiver can confirm the identity of the sender of the information.
The system is loaded in a blockchain in the form of intelligent contracts to ensure the automation of online review activities. An intelligent contract may be understood as a piece of code written on a blockchain that executes automatically upon an event triggering a term in the contract. For example, an intelligent contract related to a disease insurance service only links information such as a policy and a medical record form, and when a condition is met, the execution of claim settlement terms is automatically triggered through the intelligent contract. In the embodiment of the application, the preset process related to the review activity is loaded into the blockchain in the form of the intelligent contract, and a review manager access interface and a review expert access interface associated with the intelligent contract are set. The processes associated with the review activity can include, for example: verifying the identity of the review manager, verifying the review qualification of the review expert, providing the qualified review expert with the content to be reviewed, collecting the review comments, monitoring and reminding the review time limit, verifying the validity of the review comments of the review expert, distributing the review remuneration to the review expert, and the like. When the review manager and the review expert respectively link the relevant parameters or information through the review manager access interface and the review expert access interface, the execution of the corresponding terms in the intelligent contract is automatically triggered. For example, when the review manager uploads the content to be evaluated and the corresponding parameters (e.g., the corresponding review expert list, the key required for reading the content to be evaluated, the review time limit, etc.) through the review manager access interface, the intelligent contract may be triggered to verify the identity of the review manager, and if the verification is passed, the content is saved in the block chain. For another example, when the review expert submits relevant parameters such as a public key and a signature thereof to the blockchain through the review expert access interface, the intelligent contract may be triggered to verify the qualification of the review expert, and after the verification is passed, the content to be reviewed and/or the key for reading the content to be reviewed may be returned. For another example, if the review expert submits the review comments and parameters such as the public key and signature to the blockchain, the smart contract may be triggered to verify its identity and chain the review comments, return the submission to the review expert, issue the review reward, and so on. When the evaluation activity end time is reached, the evaluation manager can traverse the block content on the chain, gather the evaluation result and publish the evaluation result.
The following briefly introduces an execution flow of the system in conjunction with a specific example, wherein it is assumed that the system includes a system administrator M and a review administrator a, which initiates a review activity and selects a review expert set B ═ B for the content to be reviewed0,b1,b2,b3,b4}. The system administrator M has a private key SKMAnd corresponding public key PKM(ii) a Review administrator A has private key SKAAnd corresponding public key PKA. The example process includes:
(A) system administrator M verifies the identity of review administrator A and checks the PKASignature derivation cM->A=signature(PKA) Returning the signature c to the review managerM->A。It should be understood that the system administrator is an optional role, and thus in some embodiments, this step may be omitted, and the qualification of the review administrator may also be accomplished in the blockchain using the public and private keys of the review administrator.
(B) The evaluation manager A sets an evaluation expert list, an evaluation opinion list committed _ list (initially empty list) and a key t for reading the contents to be evaluated for the contents to be evaluatedASubmitting time and other parameters, submitting the content to be evaluated and related parameters thereof and the public key PK of the evaluation manager through the access interface of the evaluation managerAAnd the signature c generated by the system administrator M for the review administratorM->ASmart contract Pass (PK)A,cM->A,PKM) And after the qualification of the evaluation manager is verified, chaining the information. In embodiments that do not include the role of a system administrator, the review administrator may submit his signature and public key, and the smart contract is passed through the reviewThe signature and public key of the review manager can verify the qualification of the review manager.
(C) For each review expert, with review expert b0For example, it has a private key SK0And corresponding public key PK0. In an embodiment of the present invention, the review expert b is a member of the review manager's privacy0Instead of issuing its public key directly, the public key PK is processed by a blinding function0To generate a blinded public key PK'0. The blinded public key is provided to the review administrator along with the authentication request. The evaluation manager A checks the evaluation expert b0After the identity of (4), using the private key SKABlinded public key PK 'to the received review expert'0Signing is carried out to generate a pair PK'0C 'of signature'A->0=signature(PK’0) (may be abbreviated as blind signature) and the blind signature name c'A->0Is transmitted back to the evaluation expert b0. Evaluation expert b0Review manager A vs PK 'through anti-blind function'0C's blind signature'A->0Conversion to review manager A vs PK0Signature c ofA->0Then, the expert b is reviewed0Will (PK)0,cA->0) Submitting to Block chain, Smart contracts Pass (PK)0,cA->0,PKA) Verification and evaluation expert b0If the verification is successful, returning to read the key t of the content to be evaluatedAAnd/or content to be assessed;
(D) evaluation expert b0By means of a secret key tAThe content to be reviewed can be read and the review opinion m is given. Evaluation expert b0Using its private key SK0Signing m to generate m' and accessing the interface through the review specialist (PK)0,cA->0M, m') are uploaded to the blockchain network; intelligent contract Pass (PK)0,cA->0,PKA) Verification review expert b0Qualification of by (PK)0M, m') verifies that m is a review expert b0And after the submitted legal review is verified to be qualified, adding m into a review comment list committed _ list corresponding to the content to be reviewed, and returning and submitting to a review expertII of cross certification0And to a review expert b0Issuing a reward. Evaluation expert b0Blinded public key and commit certificate (PK'00) Provided to review administrator a.
(E) Review manager A may blind the public key and the proof of submission (PK'00) And determining which evaluation experts finish evaluation and which evaluation experts do not finish evaluation, and reminding the evaluation experts which do not finish evaluation within the set reminding time limit. When the review deadline is reached, the review manager a reads the review comment list of the content to be reviewed from the blockchain to count the review result.
In the above embodiment, the review manager may obtain all the review opinions about the content to be reviewed, and may also know which review experts have finished reviewing through the received submission proofs, but the review manager cannot correspond the review opinions to the review experts one by one, and related data in the review process is recorded in the block chain, thereby avoiding the risks that the privacy of the review experts is revealed and the review opinions are tampered.
Fig. 1 is a schematic diagram of functional modules of a controllable anonymous network expert review system based on a block chain according to an embodiment of the present invention. The review system is loaded in a blockchain in an intelligent contract manner, and the review manager and the review expert can access the review system through corresponding intelligent contract interfaces (such as a review manager access interface and a review expert access interface). For example, the review administrator accesses the review system through the review administrator access interface, and the review expert accesses the review system through the review expert access interface. The interface may be presented in the form of, for example, a link code, a web site link, a page, a function call, an application software interface, and the like, which is not limited herein. An initial block associated with the review system is created at system initialization to store relevant configuration information and parameters, and data involved in subsequent review processes is stored in a block chain starting with the initial block. The review system comprises an authentication module and a review management module, wherein the authentication module is used for registration and identity verification of a review manager and a review expert, generation and distribution of corresponding public keys and private keys for the review manager and the review expert and the like. And the review management module is used for controlling and managing the review process.
When a review manager wants to initiate a review activity on a content to be reviewed, setting parameters related to the content to be reviewed through a review management access interface; for example, a plurality of review experts are selected or designated for the content to be evaluated. In one example, one or more review experts may be selected for content to be assessed from a pre-configured review expert library through a review management access interface. In yet another example, the review manager may set or add one or more review experts to the content to be reviewed with the review manager access interface. In order to protect the security of the content to be evaluated, the review manager also sets a key for reading the content to be evaluated. In one embodiment, the parameters related to the content to be evaluated may include a review expert list, a review comment list (initialized to empty, subsequently used to store the review comments submitted by the review experts), a key for encrypting and decrypting the content to be evaluated, a review expiration time, a review reminder time, and the like. And submitting the content to be evaluated and the related parameters thereof, the public key of the evaluation manager, the signature of the evaluation manager on the information and the like to the evaluation system by the evaluation manager through the access interface of the evaluation manager. The review management module in the review system can verify the qualification of the review administrator by decrypting the received signature by using the public key of the review administrator, and link the information submitted by the review administrator after the verification is passed. For example, a block may be created for the content to be evaluated, and the information may be stored in the block. This block can subsequently be traced back through the initial block of the review system and accessed.
In the embodiment containing the role of the system administrator, the review administrator sends the public key and the authentication request containing the identity information to the system administrator through the review administrator access interface, and after the system administrator verifies the identity of the review administrator through the authentication module, the public key of the review administrator is signed by using the private key of the system administrator and the signature is returned to the review administrator. Thus, the review manager can submit the signature of the public key of the review manager by the system manager to the review system together with the content to be evaluated and the related parameters thereof, the public key of the review manager and the like. And after the intelligent contract corresponding to the review management module verifies the qualification of the review manager through the public key and the signature submitted by the review manager, chaining the information.
With continued reference to FIG. 1, the review experts participating in the review of the content to be reviewed interact with the review system through the review expert access interface. In the embodiment of the invention, the public key of the review expert is blinded firstly, and the public key after blinding processing and the authentication request are sent to the review manager. The authentication request may contain relevant authentication information for verifying the identity of the review expert. The evaluation manager responds to the authentication request from the evaluation expert, verifies the real identity of the evaluation expert through the authentication module, signs the received blinded public key from the evaluation expert by using the private key of the evaluation manager so as to obtain the blind signature of the evaluation expert, and returns the blind signature to the evaluation expert. And the evaluation expert performs anti-blinding processing on the received blind signature so as to obtain the signature of the evaluation administrator on the public key of the evaluation expert. Therefore, the public key of the evaluation expert and the signature of the evaluation administrator on the public key of the evaluation expert are submitted to the evaluation management module by the evaluation expert, the evaluation management module decrypts the received signature of the public key of the evaluation expert by the evaluation administrator by using the public key of the evaluation administrator, matches the decrypted data with the public key of the evaluation expert, and returns the key for reading the content to be evaluated if the decrypted data is matched with the public key of the evaluation expert. And the evaluation expert reads the contents to be evaluated in the evaluation system through the key for reading the contents to be evaluated and gives evaluation opinions. The evaluation expert signs the evaluation opinions by using the private key of the evaluation expert and submits the evaluation opinions and the signatures thereof, the public key of the evaluation expert and the signatures of the public keys of the evaluation expert, which are obtained before, of the evaluation administrator to the evaluation expert to the evaluation system. The intelligent contract corresponding to the review management module verifies the review qualification of the review expert through the public key of the review expert, the public key of the review manager and the signature of the review manager on the public key of the review expert, verifies that the review comment is legal review submitted by the review expert through the public key of the review expert, the review comment and the signature of the review expert on the review comment, adds the review comment into a review comment list corresponding to the content to be reviewed after the verification is qualified, returns a submission certificate to the review expert and issues a reward to the review expert. The review expert provides its blinded public key and the submission proof to the review administrator. After the review reminding time is reached, the review manager can determine which review experts finish the review and which review experts do not finish the review according to the correspondence between the submission certificate, the blinding public key of the review experts and the identities of the review experts, and send corresponding reminders. However, in the process of the review, the review manager can only make the blind public key of the review expert correspond to the individual one by one, but cannot make the public key of the review expert correspond to the individual one, so that the review opinions in the review opinion list cannot correspond to the specific review experts one by one, and the anonymization of the review expert is realized. When the review deadline is reached, the review manager reads the review opinion list of the content to be reviewed from the blockchain to count the review result.
Fig. 2 shows a flow diagram of a block chain-based controllable anonymous network expert review method according to an embodiment of the present invention. The review manager and the review expert are used as user accounts of the block chain, have private keys and public keys of the review manager and the review expert, and can communicate with each other through the block chain. And the preset process related to the evaluation activity is loaded into the block chain in the form of an intelligent contract, and a review manager access interface and a review specialist access interface which are associated with the intelligent contract are set. The review manager and the review expert can participate in the review process through the review manager access interface and the review expert access interface respectively. The method mainly comprises the following steps:
at step S1), the review manager saves the content to be evaluated and the related parameters, which at least include the list of review experts of the content to be evaluated, the key for reading the content to be evaluated, the review time limit, and the public key and signature of the review manager, into the corresponding block of the blockchain. For example, the review manager signs the information submitted by the review manager to be saved in the blockchain by using the private key of the review manager, and submits the information related to the content to be evaluated through the access interface of the review manager. The intelligent contract corresponding to the review process can verify the validity of the review manager by using the public key of the review manager and the received signature, if the verification is passed, a corresponding block is created for the content to be evaluated in the block chain, and the content to be evaluated and the related parameters thereof are stored in the created block.
At step 2), when the review expert is to participate in the review, the public key of the review expert may be blinded and the blinded public key and the authentication request may be sent to the review manager. The blinding process herein can be performed using an existing blinding algorithm or blinding function, which is not limited herein. When the evaluation manager receives the blinded public key and the authentication request from the evaluation expert, after the identity of the evaluation expert is verified, the private key of the evaluation manager is used for signing the blinded public key of the evaluation expert, and the generated signature is returned to the evaluation expert.
In step S3), the review expert performs anti-blind processing on the obtained signature of the public key that is blinded by the review administrator by using a corresponding anti-blind function or anti-blind transformation, so as to obtain the signature of the public key of the review expert by the review administrator.
At step S4), the review expert may submit the signature of the review administrator on the public key of the review expert and the public key of the review expert through the review expert access interface; the intelligent contract corresponding to the evaluation process can decrypt the signature of the public key of the evaluation expert received from the evaluation expert and compared with the public key of the evaluation expert to verify the validity of the evaluation expert, and the intelligent contract returns the key for reading the content to be evaluated and/or the content to be evaluated to the evaluation expert after verification. The evaluation expert signs the evaluation opinions by using the private key of the evaluation expert, and submits the evaluation opinions, the signature of the evaluation administrator on the public key of the evaluation expert, the public key of the evaluation expert and the like through the access interface of the evaluation expert. The intelligent contract corresponding to the evaluation process can verify the validity of the evaluation expert by utilizing the public key of the evaluation manager, the signature of the evaluation manager on the public key of the evaluation expert and the public key of the evaluation expert; after the signature of the review opinion is decrypted by using the public key of the review expert, the decrypted result is compared with the received review opinion to verify the validity of the review opinion. And after the verification is passed, storing the review opinions of the contents to be reviewed into the corresponding blocks of the block chain.
In yet another embodiment, the method may further comprise returning a proof of submission to the review expert in response to the review expert's uplink of review opinions regarding the content to be reviewed. The review expert may send its submission to the review manager along with the signature of the public key that the review manager blinded. The review manager can find the personal information of the review experts according to the received signature of the public key after blinding the review experts, and can determine which review experts submit the certification according to the submission certification. When the preset review reminding time limit is reached, a reminder can be sent to the review experts who do not submit the evidence. When the evaluation activity end time is reached, the evaluation manager can traverse the block content on the chain, gather the evaluation result and publish the evaluation result.
In the above embodiment, the review manager may obtain all the review opinions of the content to be reviewed, and also may know which review experts have finished the review through the received submission proofs, but the review manager cannot make the review opinions and the review experts correspond to each other one by one, and the related data in the review process is recorded in the block chain, thereby avoiding the risks that the privacy of the review experts is revealed and the review opinions are tampered.
In another embodiment of the present invention, a computer-readable storage medium is further provided, on which a computer program or executable instructions are stored, and when the computer program or the executable instructions are executed, the technical solution as described in the foregoing embodiments is implemented, and the implementation principle thereof is similar, and is not described herein again. In embodiments of the present invention, the computer readable storage medium may be any tangible medium that can store data and that can be read by a computing device. Examples of computer readable storage media include hard disk drives, Network Attached Storage (NAS), read-only memory, random-access memory, CD-ROMs, CD-R, CD-RWs, magnetic tapes, and other optical or non-optical data storage devices. The computer readable storage medium may also include computer readable media distributed over a network coupled computer system so that computer programs or instructions may be stored and executed in a distributed fashion.
In another embodiment of the present invention, an electronic device is further provided, which includes a processor and a memory, where the memory is used for storing executable instructions that can be executed by the processor, and the processor is configured to execute the executable instructions stored in the memory, and when the executable instructions are executed, the technical solution described in any one of the foregoing embodiments is implemented, and the implementation principles thereof are similar, and are not described herein again.
Reference in the specification to "various embodiments," "some embodiments," "one embodiment," or "an embodiment," etc., means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, appearances of the phrases "in various embodiments," "in some embodiments," "in one embodiment," or "in an embodiment," or the like, in various places throughout this specification are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. Thus, a particular feature, structure, or characteristic illustrated or described in connection with one embodiment may be combined, in whole or in part, with a feature, structure, or characteristic of one or more other embodiments without limitation, as long as the combination is not logical or operational.
The terms "comprises," "comprising," and "having," and similar referents in this specification, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements but may alternatively include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. The word "a" or "an" does not exclude a plurality. Additionally, the various elements of the drawings of the present application are merely schematic illustrations and are not drawn to scale.
Although the present invention has been described by the above embodiments, the present invention is not limited to the embodiments described herein, and various changes and modifications may be made without departing from the scope of the present invention.

Claims (10)

1. An anonymous network expert review method based on a blockchain comprises the following steps:
step S1), the review manager stores the content to be evaluated and the related parameters into the corresponding block of the block chain, wherein the parameters at least comprise the review expert list of the content to be evaluated, the key for reading the content to be evaluated, the review time limit and the public key and signature of the review manager;
step S2), the public key of the review expert is blinded, and the blinded public key and the authentication request are sent to the review manager to obtain the signature of the blinded public key by the review manager;
step S3), the obtained signature of the public key after the blind by the review manager is subjected to anti-blind processing by the review expert to obtain the signature of the public key of the review manager to the review expert;
step S4) the review expert uses the public key of the review expert, the signature of the review manager on the public key of the review expert and the public key of the review manager to obtain the key for reading the content to be reviewed and store the review comments of the content to be reviewed into the corresponding blocks of the block chain.
2. The method according to claim 1, step S1) comprising:
and verifying the validity of the review administrator by using the public key and the signature of the review administrator, if the verification is passed, creating a corresponding block for the content to be evaluated in the block chain, and storing the content to be evaluated and related parameters thereof in the created block.
3. The method of claim 1, step S2) further comprising: and the evaluation manager responds to the blind public key and the authentication request from the evaluation expert, verifies the identity of the evaluation expert, signs the blind public key of the evaluation expert by using the private key of the evaluation manager, and returns the generated signature to the evaluation expert.
4. The method according to claim 1, the step S4) comprising
Verifying the validity of the evaluation expert by using the public key of the evaluation expert, the signature of the evaluation administrator on the public key of the evaluation expert and the public key of the evaluation administrator, and executing one of the following steps if the verification is passed:
returning a key for reading the content to be evaluated to the evaluation expert;
and verifying the legality of the review opinions of the contents to be reviewed from the review expert, and if the verification is passed, storing the review opinions of the contents to be reviewed by the review expert into the corresponding block of the block chain.
5. The method of claim 4, wherein verifying the legitimacy of the review comment from the review expert for the content to be reviewed comprises decrypting the signature of the review comment by the review expert using the public key of the review expert and matching the decrypted review comment with the review comment received from the review expert, and if the two are in agreement, the verifying passes.
6. The method of any of claims 1-5, further comprising:
in response to the uplink of the review opinions of the review experts on the content to be reviewed, returning a submission certification to the review experts;
and sending the submission certification and the acquired signature of the public key blinded by the review manager to the review manager by the review expert so that the review manager can count the review condition.
7. An anonymous network expert review system based on a block chain comprises an authentication module and a review management module, wherein the authentication module and the review management module are loaded in the block chain in an intelligent contract mode, and a review manager and a review expert as users of the block chain respectively access the system through corresponding intelligent contract interfaces and carry out mutual communication based on the system; wherein:
the authentication module is used for registering and verifying the identity of a review manager and a review expert and generating and distributing corresponding public keys and private keys for the review manager and the review expert;
the review management module is used for:
receiving the content to be evaluated and related parameters from a review manager, and storing the content to be evaluated and the related parameters into a corresponding block of a block chain, wherein the parameters at least comprise a review expert list of the content to be evaluated, a secret key for reading the content to be evaluated, review time limit, and a public key and a signature of the review manager;
in response to receiving the public key and the authentication request of the evaluation expert, blinding the public key of the evaluation expert, and sending the blinded public key and the authentication request to an evaluation manager;
in response to receiving the signature of the public key of the review manager on the review expert after blinding, performing anti-blinding processing on the public key, and sending the signature of the public key of the review expert obtained after processing to the review expert;
and sending the key for reading the content to be evaluated to the evaluation expert in response to the public key of the evaluation expert, the signature of the evaluation expert on the public key of the evaluation expert and the public key of the evaluation administrator, which are received by the evaluation expert, and saving the evaluation opinion on the content to be evaluated from the evaluation expert into the corresponding block of the block chain.
8. The system of claim 7, the review management module configured to: and verifying the validity of the review administrator by using the public key and the signature of the review administrator, if the verification is passed, creating a corresponding block for the content to be evaluated in the block chain, and storing the content to be evaluated and related parameters thereof in the created block.
9. The system of claim 7, wherein the review manager, in response to receiving the blinded public key and the authentication request from the review expert, verifies the identity of the review expert via the authentication module, signs the blinded public key of the review expert with a private key of the review manager, and returns the generated signature to the review expert.
10. The system of claim 7, the review management module configured to:
verifying the validity of the evaluation expert by using the public key of the evaluation expert, the signature of the evaluation administrator on the public key of the evaluation expert and the public key of the evaluation administrator, and executing one of the following steps if the verification is passed:
returning a key for reading the content to be evaluated to the evaluation expert;
and verifying the legality of the review opinions of the contents to be reviewed from the review expert, and if the legality passes the verification, storing the review opinions of the contents to be reviewed by the review expert into the corresponding block of the block chain.
CN202210256870.XA 2022-03-16 2022-03-16 Anonymous network expert review method and system based on block chain Pending CN114692198A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210256870.XA CN114692198A (en) 2022-03-16 2022-03-16 Anonymous network expert review method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210256870.XA CN114692198A (en) 2022-03-16 2022-03-16 Anonymous network expert review method and system based on block chain

Publications (1)

Publication Number Publication Date
CN114692198A true CN114692198A (en) 2022-07-01

Family

ID=82139589

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210256870.XA Pending CN114692198A (en) 2022-03-16 2022-03-16 Anonymous network expert review method and system based on block chain

Country Status (1)

Country Link
CN (1) CN114692198A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115423418A (en) * 2022-07-04 2022-12-02 北京交通大学 Thesis review method based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115423418A (en) * 2022-07-04 2022-12-02 北京交通大学 Thesis review method based on block chain
CN115423418B (en) * 2022-07-04 2023-05-02 北京交通大学 Paper review method based on blockchain

Similar Documents

Publication Publication Date Title
US11411730B2 (en) Cryptoasset custodial system with different rules governing access to logically separated cryptoassets and proof-of-stake blockchain support
US11388010B2 (en) Blockchain account migration
US11301845B2 (en) Cryptoasset custodial system with proof-of-stake blockchain support
US20220029802A1 (en) Methods and systems for creating and recovering accounts using dynamic passwords
CN108701276B (en) System and method for managing digital identities
US11170092B1 (en) Document authentication certification with blockchain and distributed ledger techniques
US20190268165A1 (en) Cryptoasset custodial system with different rules governing access to logically separated cryptoassets
Anakath et al. Privacy preserving multi factor authentication using trust management
EP3997606B1 (en) Cryptoasset custodial system with custom logic
US11301849B2 (en) Risk mitigation for a cryptoasset custodial system using a hardware security key
US11501291B2 (en) Cryptoasset custodial system using encrypted and distributed client keys
US11876915B2 (en) Method, apparatus, and computer-readable medium for authentication and authorization of networked data transactions
WO2019178440A1 (en) System and method for securing private keys behind a biometric authentication gateway
CN114519206B (en) Method for anonymously signing electronic contract and signature system
CN114692198A (en) Anonymous network expert review method and system based on block chain
CN115514489A (en) Knowledge-intensive type zero-work economic service system and operation method thereof
CN116166743A (en) Digital asset inheritance system and method based on Hyperledger Fabric super ledger
CN116961896A (en) Block chain-based voting method, apparatus, electronic device and readable medium
CN111695096A (en) Identity verification method and device
Al Hamadi Secure Multi-Agent System for Location Based Services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination