CN114841701B - Digital artwork anti-theft credible transaction method and device based on NFT - Google Patents

Digital artwork anti-theft credible transaction method and device based on NFT Download PDF

Info

Publication number
CN114841701B
CN114841701B CN202210777578.2A CN202210777578A CN114841701B CN 114841701 B CN114841701 B CN 114841701B CN 202210777578 A CN202210777578 A CN 202210777578A CN 114841701 B CN114841701 B CN 114841701B
Authority
CN
China
Prior art keywords
digital artwork
source file
digital
transaction
artwork
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210777578.2A
Other languages
Chinese (zh)
Other versions
CN114841701A (en
Inventor
张秉晟
王迪
任奎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN202210777578.2A priority Critical patent/CN114841701B/en
Publication of CN114841701A publication Critical patent/CN114841701A/en
Application granted granted Critical
Publication of CN114841701B publication Critical patent/CN114841701B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a digital artwork anti-theft credible transaction method and device based on NFT, which is characterized in that NFT corresponding to the digital artwork is locally generated, and the encrypted digital artwork and NFT are uploaded to a block chain, so that a digital artwork source file is prevented from being disclosed on the block chain; through the visual display environment, the source file of the digital artwork can be visible and unavailable; adding a digital watermark to the digital artwork by using the traitor tracing code, wherein the transaction initiator can see the digital artwork with the digital watermark in a trusted visual display environment; and verifying the digital artwork by using the intelligent contract, realizing fair transaction between a transaction initiating party and a transaction receiving party, and triggering the transaction by using the intelligent contract if the verification is successful. At the moment, the intelligent contract sends the encryption key to the transaction initiator, and the transaction initiator can decrypt the encryption key through the private key so as to decrypt the digital artwork in the form of the ciphertext on the block chain.

Description

Digital artwork anti-theft credible transaction method and device based on NFT
Technical Field
The invention belongs to the technical field of digital artwork trusted transaction, and particularly relates to an NFT-based digital artwork anti-theft trusted transaction method and device.
Background
The blockchain can provide ownership proof with Non-homogeneous certificates (NFT) as a proof type for various digital assets such as digital content and the like, and store and distribute the ownership proof in a distributed mode and the like, and meanwhile, the uniqueness of the ownership proof is ensured and the ownership proof cannot be tampered, and the NFT is widely applied to the fields of digital assets and the like due to the characteristic. The field of digital art is one of the main application scenarios of NFT technology, through which it is possible to prove the copyright rights to digital art and allow owners to use their certificates in various online social spaces. However, because the NFT can only prove the copyright of the digital artwork, the NFT cannot protect the digital artwork from being stolen, for example, in the transaction or appreciation process of the digital artwork, the conventional method at present is to directly send the source file of the digital artwork to the appreciator, so the appreciator can obtain the digital artwork. In the conventional digital artwork displaying and trading scheme, it is inevitable for the appreciator to obtain a source file of the digital artwork, because the appreciator needs to verify the copyright of the digital artwork through the NFT generated by the source file.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
the existing copyright confirming scheme of the digital artwork is that the digital artwork is uploaded to a block chain, corresponding NFT is generated on the chain, so that a source file of the digital artwork is revealed, and if the digital artwork is slightly changed by others, the corresponding generated NFT cannot be used for confirming the copyright; in a traditional digital artwork display and transaction scheme, an appreciator or a transaction initiator needs to verify the copyright of the digital artwork through a source file and NFT (network file transfer) on a chain, so that the appreciator inevitably obtains the source file of the digital artwork; the existing digital artwork can only be proved to belong to copyright through NFT and cannot be prevented from being stolen; in the traditional transaction process, as two transaction parties can not trust each other completely, fair transaction can not be ensured.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the application aims to provide a digital artwork anti-theft credible transaction method and device based on NFT.
According to a first aspect of the embodiments of the present application, there is provided a digital artwork anti-theft trusted transaction method based on NFT, applied to a transaction receiver, where the transaction receiver holds a digital artwork source file, including:
encrypting the digital artwork source file by using a secret key to obtain a digital artwork in a ciphertext form and uploading the digital artwork in the ciphertext form to a block chain;
constructing an NFT of the digital artwork source file and uploading the NFT to a blockchain;
generating a digital artwork source file copy added with a digital watermark according to the digital artwork source file by using a traitor tracing code;
sending the digital artwork source file copy to a visual display environment so that a transaction initiator can appreciate the digital artwork source file copy in the visual display environment;
when the transaction initiator makes a transaction request, receiving a self public key sent by the transaction initiator through an intelligent contract, encrypting the key according to the public key to obtain an encryption key, and sending the encryption key to the intelligent contract, so that the intelligent contract verifies a corresponding digital artwork source file according to the encryption key, the corresponding NFT and ciphertext-form digital artwork obtained from a block chain and the public key sent by the transaction initiator;
and if the intelligent contract verifies that the digital artwork source file is true, completing the transaction with the transaction initiator through the intelligent contract, wherein the transaction initiator decrypts the encryption key according to a private key corresponding to the public key to obtain the key, and decrypts the digital artwork in the form of the ciphertext according to the key to obtain the digital artwork source file.
Further, generating a digital watermarked copy of the digital artwork source file from the digital artwork source file using a traitor tracing code, comprising:
adding a digital watermark to the digital artwork source file by using a traitor tracing code according to identity information registered by the transaction sender before entering the visual display environment;
and distributing a unique identity key for the transaction initiator so that the transaction initiator unlocks the digital artwork source file copy under the visual display environment according to the identity key for appreciation.
Further, verifying the corresponding digital artwork source file through the intelligent contract, comprising:
verifying whether the digital artwork in the form of the ciphertext on the block chain can generate the NFT which is the same as the NFT on the block chain after being decrypted by a zero-knowledge proof protocol;
verifying whether the digital watermark visible in the visual display environment is obtained by adding the watermark into the source file of the digital artwork;
and verifying whether the encryption key can decrypt the digital artwork in the form of the ciphertext on the block chain.
According to a second aspect of the embodiments of the present application, there is provided an NFT-based digital artwork anti-theft trusted transaction apparatus, which is applied to a transaction receiver, where the transaction receiver holds a digital artwork source file, including:
the encryption module is used for encrypting the digital artwork source file by using a secret key to obtain a digital artwork in a ciphertext form and uploading the digital artwork in the ciphertext form to the block chain;
the construction module is used for constructing the NFT of the digital artwork source file and uploading the NFT to a block chain;
a generating module, configured to generate, according to the digital artwork source file, a digital artwork source file copy to which a digital watermark is added by using a traitor tracing code;
a first sending module, configured to send the digital artwork source file copy to a visual display environment, so that a transaction initiator views the digital artwork source file copy in the visual display environment;
the second sending module is used for receiving a self public key sent by the transaction initiator through an intelligent contract when the transaction initiator makes a transaction request, encrypting the secret key according to the public key to obtain an encryption key, and sending the encryption key to the intelligent contract so that the intelligent contract verifies a corresponding digital artwork source file according to the encryption key, the digital artwork in the corresponding NFT and ciphertext forms acquired from the block chain and the public key sent by the transaction initiator;
and the first transaction module is used for completing a transaction with the transaction initiator through the intelligent contract if the intelligent contract verifies that the digital artwork source file is true, wherein the transaction initiator decrypts the encrypted key according to a private key corresponding to the public key to obtain the key, and decrypts the digital artwork in the form of the ciphertext according to the key to obtain the digital artwork source file.
According to a third aspect of the embodiments of the present application, there is provided an NFT-based digital artwork anti-theft trusted transaction method, applied to a transaction initiator, including:
the method comprises the steps of appreciating a digital artwork source file copy in a visual display environment and verifying the digital artwork source file copy through an intelligent contract, wherein a transaction receiver encrypts the digital artwork source file by using a key to obtain a digital artwork in a ciphertext form and uploads the digital artwork in the ciphertext form to a block chain to construct an NFT of the digital artwork source file and uploads the NFT to the block chain, the digital artwork source file copy added with a digital watermark is generated by using a traitor tracing code according to the digital artwork source file, and the digital artwork source file copy is sent to the visual display environment;
a transaction request is put forward, a public key of the transaction receiver is sent to the transaction receiver through an intelligent contract, so that the transaction receiver encrypts the secret key according to the public key to obtain an encryption key, and the encryption key is sent to the intelligent contract, so that the intelligent contract verifies a corresponding digital artwork source file according to the encryption key, the digital artwork in the form of the corresponding NFT and the ciphertext acquired from the block chain and the public key;
if the intelligent contract verifies that the digital artwork source file is true, the encryption key is decrypted according to a private key corresponding to the public key to obtain the key, the digital artwork in the form of the ciphertext is decrypted according to the key to obtain a digital artwork source file, and the transaction receiver completes transaction with the transaction initiator through the intelligent contract.
According to a fourth aspect of the embodiments of the present application, there is provided an NFT-based digital artwork anti-theft trusted transaction apparatus, applied to a transaction initiator, including:
the system comprises an appreciation module, a verification module and a verification module, wherein the appreciation module is used for appreciating a digital artwork source file copy in a visual display environment and verifying the digital artwork source file copy through an intelligent contract, a transaction receiver encrypts the digital artwork source file by using a secret key to obtain a digital artwork in a cryptograph form and uploads the digital artwork in the cryptograph form to a block chain to construct an NFT of the digital artwork source file and uploads the NFT to the block chain, the digital artwork source file copy added with a digital watermark is generated by using a traitor tracing code according to the digital artwork source file, and the digital artwork source file copy is sent to the visual display environment;
a third sending module, configured to send a transaction request to the transaction recipient through an intelligent contract, so that the transaction recipient encrypts the key according to the public key to obtain an encryption key, and send the encryption key to the intelligent contract, so that the intelligent contract verifies a corresponding digital art source file according to the encryption key, a corresponding NFT and ciphertext-form digital art obtained from a block chain, and the public key;
and the second transaction module is used for decrypting the encryption key according to a private key corresponding to the public key to obtain the key if the intelligent contract verifies that the digital artwork source file is true, and decrypting the digital artwork in the form of the ciphertext according to the key to obtain the digital artwork source file, wherein the transaction receiver completes transaction with the transaction initiator through the intelligent contract.
According to a fifth aspect of embodiments of the present application, there is provided an electronic apparatus, including:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a method as described in the first or third aspect.
According to a sixth aspect of embodiments herein, there is provided a computer readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the steps of the method according to the first or third aspect.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
as can be seen from the foregoing embodiments, according to the present application, the NFT corresponding to the digital artwork is locally generated, and the encrypted digital artwork and NFT are uploaded to the blockchain, so that the digital artwork source file is prevented from being disclosed on the blockchain, and the correspondence between the encrypted digital artwork on the blockchain and the NFT is verified to the viewer by intelligent combination on the premise that the digital artwork source file is not leaked; through the visual display environment, the source file of the digital artwork can be visible and unavailable; the digital artwork is added with the digital watermark by using the traitor tracing code, a transaction initiator can see the digital artwork with the digital watermark in a trusted visual display environment, and if the copy of the digital artwork is leaked, a leakage source can be traced on the copy of the digital artwork by using the traitor tracing code; and if the verification is successful, the intelligent contract triggers the transaction. At the moment, the intelligent contract sends the encryption key to the transaction initiator, and the transaction initiator can decrypt the encryption key through the private key so as to decrypt the digital artwork in the form of the ciphertext on the block chain.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a flowchart illustrating an NFT-based digital artwork anti-theft trusted transaction method (applied to a transaction recipient), according to an exemplary embodiment.
Fig. 2 is a flowchart illustrating step S13 according to an exemplary embodiment.
Fig. 3 is a block diagram illustrating an NFT-based digital artwork anti-theft trusted transaction device (applied to a transaction recipient) according to an exemplary embodiment.
Fig. 4 is a flowchart illustrating an NFT-based digital artwork anti-theft trusted transaction method (applied to a transaction initiator) according to an exemplary embodiment.
Fig. 5 is a block diagram illustrating an NFT-based digital artwork anti-theft trusted transaction device (applied to a transaction initiator) according to an exemplary embodiment.
Fig. 6 is an interaction diagram illustrating an NFT-based digital artwork anti-theft trusted transaction method according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present application.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at" \8230; "or" when 8230; \8230; "or" in response to a determination ", depending on the context.
The noun explains:
1) Non-homogeneous Tong-Zheng (NFT, non-fungal Tokens)
NFT (Non-homogeneous Token) is associated with the blockchain technology, and specifically refers to a data unit (data unit) stored in a blockchain digital book and generated by a specific software program. The non-homogeneous certificate is recorded in a block chain intelligent contract after being generated and represents ownership of rare digital commodities such as artworks or collectibles, and each non-homogeneous certificate has a unique and unique characteristic mark, cannot be interchanged or changed, and can be traced in the whole process.
2) Digital watermark (Digital watermark)
The Digital Watermarking (Digital Watermarking) technology is a technology for directly embedding some identification information (or specific information) into a Digital carrier (including Digital artworks, pictures, videos and the like), but does not influence the use value of the original carrier, a human perceptual system (such as a visual system or an auditory system) cannot detect the change of the carrier after the watermark is embedded, the watermark information cannot be directly obtained, targeted attack on the watermark information cannot be easily carried out, and the embedded watermark information is specially coded and is difficult to be tampered, so that the content security of the carrier can be ensured. The watermark information after special coding can ensure the accuracy during extraction, can be extracted only by a special detector, and has uniqueness, accuracy, concealment and robustness.
3) Traitor tracing code (Traitor tracing code)
Traitor tracking is a copyright infringement detection technique that protects the copyright issues of the file owner by tracking the source of the compromised file. The method is that the file owner adds a unique identifier (e.g., a digital watermark, etc.) to each copy distributed. Each licensee (user) is assigned a unique key for unlocking the file or allowing decryption, and when his copy is revealed to the public, the file distributor can trace back to the source of the "revealed" copy by checking its identity, determine the identity of the traitor, trace it, and revoke the traitor's decryption key, rendering it no longer available for digital information services, while also ensuring that "honest" users continue to use the file.
4) Zero knowledge proof (zero-knowledge proof)
Zero-knowledge proof is a method in which one party (prover) proves some proposition to the other party (verifier), the prover being able to convince the verifier that some conclusion is correct without providing the verifier with any useful information. Thus, it can be understood as "proof of zero compromise". Let P denote an entity that grasps some information and wishes to prove this fact, and let V be the entity that proves this fact. We call P achieve minimal leakage proof, provided that a certain protocol proves to V that P does indeed have some information, but V cannot deduce what these information are. Furthermore, if V cannot get anyone else's knowledge except for knowing that P can prove something, we call P implement zero-knowledge proof and the corresponding protocol is called zero-knowledge protocol.
5) Blockchain (Blockchain):
a technical scheme for collectively maintaining a reliable database in a decentralized and high-trust mode is provided, wherein each block in the database contains all data information of a system, and digital signatures are used for verifying the validity and the integrity of the information. The method has the three main characteristics of transparent information disclosure, difficult record tampering and independence of an intermediary mechanism.
6) Intelligent contract
An intelligent contract is a piece of code written on a blockchain that executes automatically upon an event triggering a term in the contract. That is to say, the intelligent contract is a technology which digitizes contracts in life, and can be automatically executed by a program after certain conditions are met, and the intelligent contract does not need to be manually controlled, and is one of core technologies of a block chain. The method has the advantages of transparent, open and flexible, autonomous contract establishment among users and the like.
Example 1:
fig. 1 is a flowchart illustrating a NFT-based digital artwork anti-theft trusted transaction method according to an exemplary embodiment, which is applied to a transaction receiver holding a digital artwork source file, as shown in fig. 1, and may include the following steps:
step S11: encrypting the digital artwork source file by using a secret key to obtain a digital artwork in a ciphertext form and uploading the digital artwork in the ciphertext form to a block chain;
step S12: constructing an NFT of the digital artwork source file and uploading the NFT to a blockchain;
step S13: generating a digital artwork source file copy added with a digital watermark by utilizing a traitor tracing code according to the digital artwork source file;
step S14: sending the digital artwork source file copy to a visual display environment so that a transaction initiator can appreciate the digital artwork source file copy in the visual display environment and verify the digital artwork source file copy through an intelligent contract;
step S15: when the transaction initiator makes a transaction request, receiving a self public key sent by the transaction initiator through an intelligent contract, encrypting the key according to the public key to obtain an encryption key, and sending the encryption key to the intelligent contract, so that the intelligent contract verifies a corresponding digital artwork source file according to the encryption key, the corresponding NFT and ciphertext-form digital artwork obtained from a block chain and the public key sent by the transaction initiator;
step S16: and if the intelligent contract verifies that the digital artwork source file is true, completing the transaction with the transaction initiator through the intelligent contract, wherein the transaction initiator decrypts the encryption key according to a private key corresponding to the public key to obtain the key, and decrypts the digital artwork in the form of the ciphertext according to the key to obtain the digital artwork source file.
As can be seen from the foregoing embodiments, according to the present application, the NFT corresponding to the digital artwork is locally generated, and the encrypted digital artwork and NFT are uploaded to the blockchain, so that the digital artwork source file is prevented from being disclosed on the blockchain, and the correspondence between the encrypted digital artwork on the blockchain and the NFT is verified to the viewer by intelligent combination on the premise that the digital artwork source file is not leaked; through the visual display environment, the source file of the digital artwork can be visible and unavailable; the digital artwork is added with the digital watermark by using the traitor tracing code, a transaction initiator can see the digital artwork with the digital watermark in a trusted visual display environment, and if the copy of the digital artwork is leaked, a leakage source can be traced on the copy of the digital artwork by using the traitor tracing code; and if the verification is successful, the intelligent contract triggers the transaction. At the moment, the intelligent contract sends the encryption key to the transaction initiator, and the transaction initiator can decrypt the encryption key through the private key so as to decrypt the digital artwork in the form of the ciphertext on the block chain.
In the specific implementation of the step S11, the digital artwork source file is encrypted by using a key to obtain a digital artwork in a ciphertext form, and the digital artwork in the ciphertext form is uploaded to a block chain;
specifically, firstly, a digital artwork is converted into a [ ] byte array, then a bit sequence corresponding to the digital artwork is encrypted by using a symmetric encryption method, and a transaction initiator and a transaction receiver use the same key k for encryption and decryption. Symmetric encryption algorithms such as DES, AES,3DES, etc. may be used. And the encrypted bit sequence of the digital artwork is uploaded to a block chain for disclosure, so that the problem of source file leakage in the traditional digital artwork appreciation transaction is avoided.
In a specific implementation of step S12, constructing an NFT of the digital artwork source file and uploading the NFT to a blockchain;
specifically, NFT is typically an upload of digital artwork to a blockchain on which NFT generation is performed, which operates to make a digital artwork source file published on the blockchain visible to anyone, so to ensure that the digital artwork source file is not leaked, the patent locally constructs an NFT of the digital artwork source file and uploads the NFT to the blockchain.
In this embodiment, a hash function is used to construct NFT, which is specifically expressed as follows:
NFT = F(I)
wherein, I is a digital artwork source file, and F is a hash function.
We can convert the digital artwork into an array of [ ] byte bytes and then compute its hash value. The use of the hash function ensures that the NFT corresponding to the same copy of digital artwork is unique, and NFTs generated by different digital artwork are different and do not collide in a short time.
In an implementation of step S13, generating a digital-watermarked copy of the digital artwork source file from the digital artwork source file using a traitor tracing code;
specifically, as shown in fig. 2, this step may include the following sub-steps:
step S21: adding a digital watermark to the digital artwork source file by using a traitor tracing code according to identity information registered by the transaction sender before entering the visual display environment;
specifically, the transaction receiver firstly stores a transaction initiator identity information set, and adds the identity information U registered by the transaction transmitter to the transaction initiator identity information set after the transaction transmitter proposes a transaction. The watermark information W with the length n is constructed by adopting a Hash function, and the following formula is specifically adopted:
W = F(U)
and F is a hash function.
And performing two-dimensional DCT (discrete cosine transformation) on the whole source file of the digital artwork, and selecting the largest n coefficients Y in the DCT domain of the source file to carry watermark information W.
Obtaining a DCT domain coefficient M containing the watermark:
M = Y(1+αW)
wherein, α is a scale factor for controlling the watermark embedding strength, and represents the watermark embedding strength, and the larger the value, the deeper the embedding degree. Alpha may also be removed to allow the watermark to be directly embedded. The embedded depth can be controlled by alpha, so that the robustness and the concealment of the watermark can be indirectly adjusted, and the value of the alpha can be obtained through multiple experiments and is usually 30.
And then carrying out two-dimensional inverse DCT transformation, and carrying out inverse two-dimensional DCT transformation on the new coefficient M to obtain the digital artwork source file copy added with the digital watermark.
And when the digital watermark needs to be extracted, performing corresponding two-dimensional DCT on the whole copy of the source file of the digital artwork. Selecting n important coefficients X containing watermarks in the transform domain coefficients, and extracting watermark information M' from the n important coefficients X:
M’=(X-Y)/(Yα)
step S22: and distributing a unique identity key for the transaction initiator so that the transaction initiator unlocks the digital artwork source file copy under the visual display environment according to the identity key for appreciation.
Specifically, the transaction receiver first generates a basic key set with size n, and then randomly takes m key combinations as the identity key P (u) of the transaction initiator. The information provided for the transaction initiator consists of two parts, namely an authorization packet EB and a ciphertext packet CB. The cipher text grouping CB is a cipher text group generated by a random information master key MK through a symmetric encryption mode on a digital artwork source file copy, and the authorization grouping EB is an authorization group generated by a random information master key MK through a symmetric encryption mode on all keys in a basic key set. Therefore, the transaction initiator firstly decrypts m corresponding information blocks in the authorization packet EB by using the personal key P (u) to obtain the information master key MK, and then decrypts the ciphertext packet by using the master key MK to obtain the copy of the digital artwork source file. Since each licensed user is assigned a unique key for unlocking the digital artwork in a trusted visual presentation environment, when a verifier reveals the copy to the public, such as by screenshot, the transaction recipient can trace back to the source of the "revealed" copy with a traitor tracing code, determine the identity of the revealed copy through a digital watermark with user attributes, trace it, and revoke the traitor's decryption key to lose the right to view the digital artwork.
In a specific implementation of step S14, sending the digital artwork source file copy to a visual display environment, so that a transaction initiator appreciates the digital artwork source file copy in the visual display environment and verifies the digital artwork source file copy through a smart contract;
in particular, the visual presentation environment may visualize digital signals of digital artwork, including but not limited to VR glasses, trusted software, trusted hardware, and the like.
Specifically, the verifying the digital artwork source file copy through the smart contract comprises the following steps:
(1) Verifying whether the digital artwork in the form of the ciphertext on the block chain can generate the NFT which is the same as the NFT on the block chain after being decrypted by a zero-knowledge proof protocol;
specifically, in the interactive zero-knowledge proof protocol, the proving party can prove to the verifying party that the data in the encrypted state is authentic without disclosing any specific information, and in order to enable the data to be better interacted, the data is in a public state. Data interaction efficiency and privacy cannot be simultaneously satisfied. The generation of the zero-knowledge proof realizes that the data is available but invisible, and ensures the data privacy and the data interaction efficiency. In the interactive zero knowledge proof, the more the number of repetitions, the higher the authenticity of the data. When this probability is high enough, the information can be almost assumed to be authentic. Because the interactive verification time is long and both interactive parties need to be present at the same time or the interactive verification time needs to be used online in the internet, the patent uses the non-interactive zero knowledge proof, and can convert the interactive zero knowledge proof into the non-interactive zero knowledge proof by utilizing the Hash function, thereby greatly reducing the communication steps and improving the communication efficiency. The protocol will allow the transaction recipient to issue a commitment value and hide it. The exact answer that originally needs to be submitted to the verifier (i.e. the appreciator) is also converted into another verifiable hash value, and the verifier can verify between the hash value and the commitment value, so as to verify whether the digital artwork in the form of the ciphertext on the blockchain can generate the same NFT as the NFT on the blockchain after decryption. The step is designed to verify the copyright of the digital artwork of the transaction receiver, in the conventional method, the digital artwork is placed on a block chain to generate NFT, so that although the digital copyright of the digital artwork can be verified, the disclosure of a source file of the digital artwork is caused, therefore, the encrypted digital artwork and NFT are uploaded to the block chain in S11 and S12, a viewer cannot verify the corresponding relation between the digital artwork and the NFT and cannot verify the digital copyright of the digital artwork, and a zero-knowledge proof protocol can verify the copyright of the digital artwork of the transaction receiver on the premise of not leaking the source file of the digital artwork.
(2) Verifying whether the digital watermark visible in the visual display environment is obtained by adding the watermark into the source file of the digital artwork or not;
specifically, to ensure that digital artwork is not visible, the digital artwork source file is digitally watermarked using a traitor tracing code and placed in a trusted display environment, and because the watermarked digital artwork does not correspond to NFTs on the blockchain, the appreciator cannot determine whether the recipient of the transaction owns the digital right of the digital artwork, the agreement allows the recipient of the transaction to issue a commitment value and hide it via a non-interactive zero-knowledge proof agreement. And the exact answer which is originally required to be submitted to the verifier (namely the transaction initiator) can be converted into another verifiable hash value, and the verifier can verify according to the hash value and the commitment value so as to verify whether the digital watermark visible in the visual display environment is obtained by adding the watermark into the digital artwork source file. This step is designed to verify the copyright to which the transaction recipient's digital artwork belongs, ensuring that the digital artwork is visible and unavailable.
(3) Verifying whether the encryption key can decrypt the digital artwork in the form of the ciphertext on the block chain;
specifically, the agreement allows the transaction receiver to issue a commitment value and hide it by verifying whether the pk (public key) encrypted key sent by the transaction receiver can unlock the encrypted digital artwork source file on the blockchain through a non-interactive zero-knowledge proof agreement. The exact answer that originally needs to be submitted to the verifier (i.e. the transaction initiator) will also be converted into another verifiable hash value, and the verifier can verify the hash value and the commitment value, and then verify whether the encryption key can decrypt the digital artwork in the form of the ciphertext on the block chain. The step is designed to ensure that fair transaction is carried out, a priority problem between a transaction initiator and a transaction receiver exists in traditional transaction, the patent uses an intelligent contract to realize fair transaction, the step is designed to verify that the encrypted digital artwork source file on the block chain can be decrypted after decryption by a transaction initiator through a zero-knowledge proof protocol on the premise of not disclosing a public key encrypted key k, and the transaction of the digital artwork is converted into the transaction of the key.
In a word, the intelligent contract can verify whether k sent by a transaction receiver can decrypt an encrypted digital artwork source file M 'on a blockchain through verify (c, M', NFT, Π) and whether NFT corresponding to the source file M decrypted by M 'is NFT on the blockchain, and if verify (c, M', NFT, Π) =1, the intelligent contract triggers the transaction.
In the specific implementation of step S15, when the transaction initiator makes a transaction request, the transaction initiator receives its own public key sent by the transaction initiator through the smart contract, encrypts the key according to the public key to obtain an encryption key, and sends the encryption key to the smart contract, so that the smart contract verifies a corresponding digital art source file according to the encryption key, a digital art in the form of corresponding NFT and ciphertext obtained from a block chain, and the public key sent by the transaction initiator;
specifically, a transaction initiator sends pk to an intelligent contract, the intelligent contract sends the public key to a transaction receiver, the transaction receiver encrypts a key k by using the public key pk and then sends the encrypted key k to the intelligent contract, at the moment, the intelligent contract verifies the intelligent contract, if the digital artwork in the form of ciphertext on a verification block chain can generate NFT which is the same as the NFT on the block chain after being decrypted, whether the digital watermark visible in the visual display environment is obtained by adding a watermark to the digital artwork source file is verified, and whether the encrypted key can successfully decrypt the digital artwork in the form of ciphertext on the block chain is verified, verify (c, M', NFT, pi) =1 is carried out, and the intelligent contract triggers the transaction. The step is designed to ensure the execution of fair transaction, the prior transaction has a priority problem between a transaction initiator and a transaction receiver, and the patent uses an intelligent contract to realize fair transaction.
In the specific implementation of step S16, if the intelligent contract verifies that the digital artwork source file is true, a transaction is completed with the transaction initiator through the intelligent contract, where the transaction initiator decrypts the encryption key according to a private key corresponding to the public key to obtain the key, and decrypts the digital artwork in the form of the ciphertext according to the key to obtain the digital artwork source file;
specifically, if the intelligent contract verifies that the digital artwork source file is authentic, the transaction is completed through the intelligent contract for the transaction receiver; and for the transaction sender, receiving the encryption key c of the transaction receiver, and decrypting the encryption key c by the transaction initiator by using the private key sk corresponding to the public key pk to obtain the key k, so as to decrypt the digital artwork M' in the form of the ciphertext on the block chain to obtain the digital artwork source file M, thereby completing fair transaction of the two parties.
Corresponding to the foregoing embodiments of the digital artwork anti-theft trusted transaction method based on the NFT, the present application also provides embodiments of a digital artwork anti-theft trusted transaction apparatus based on the NFT.
Fig. 3 is a block diagram illustrating an NFT-based digital artwork anti-theft trusted transaction device according to an exemplary embodiment. Referring to fig. 3, the apparatus is applied to a transaction recipient holding a digital artwork source file, and may include:
the encryption module 21 is configured to encrypt the digital artwork source file by using a key to obtain a digital artwork in a ciphertext form and upload the digital artwork in the ciphertext form to a block chain;
a constructing module 22, configured to construct an NFT of the digital artwork source file, and upload the NFT to a block chain;
a generating module 23, configured to generate, according to the digital artwork source file, a digital artwork source file copy added with a digital watermark by using a traitor tracing code;
a first sending module 24, configured to send the digital artwork source file copy to a visual display environment, so that a transaction initiator appreciates the digital artwork source file copy in the visual display environment;
a second sending module 25, configured to receive a public key sent by the transaction initiator through an intelligent contract when the transaction initiator makes a transaction request, encrypt the secret key according to the public key to obtain an encryption key, and send the encryption key to the intelligent contract, so that the intelligent contract verifies a corresponding digital artwork source file according to the encryption key, the digital artwork in the form of the NFT and the ciphertext acquired from the block chain and the public key sent by the transaction initiator;
the first transaction module 26 is configured to complete a transaction with the transaction initiator through the smart contract if the smart contract verifies that the digital artwork source file is true, where the transaction initiator decrypts the encrypted key according to a private key corresponding to the public key to obtain the key, and decrypts the digital artwork in the form of the ciphertext according to the key to obtain the digital artwork source file.
Example 2:
fig. 4 is a flowchart illustrating an NFT-based digital artwork anti-theft trusted transaction method according to an exemplary embodiment, where the method is applied to a transaction initiator, as shown in fig. 4, and may include the following steps:
step S31: the method comprises the steps of appreciating a digital artwork source file copy in a visual display environment and verifying the digital artwork source file copy through an intelligent contract, wherein a transaction receiver encrypts the digital artwork source file by using a key to obtain a digital artwork in a ciphertext form and uploads the digital artwork in the ciphertext form to a block chain to construct an NFT of the digital artwork source file and uploads the NFT to the block chain, the digital artwork source file copy added with a digital watermark is generated by using a traitor tracing code according to the digital artwork source file, and the digital artwork source file copy is sent to the visual display environment;
step S32: a transaction request is put forward, a public key of the transaction receiver is sent to the transaction receiver through an intelligent contract, so that the transaction receiver encrypts the secret key according to the public key to obtain an encryption key, and the encryption key is sent to the intelligent contract, so that the intelligent contract verifies a corresponding digital artwork source file according to the encryption key, the digital artwork in the form of the corresponding NFT and the ciphertext acquired from the block chain and the public key;
step S33: if the intelligent contract verifies that the digital artwork source file is true, the encryption key is decrypted according to a private key corresponding to the public key to obtain the key, the digital artwork in the form of the ciphertext is decrypted according to the key to obtain a digital artwork source file, and the transaction receiving party completes the transaction with the transaction initiating party through the intelligent contract.
As can be seen from the above embodiments, according to the present application, the NFT corresponding to the digital artwork is locally generated by the transaction receiver, and the encrypted digital artwork and NFT are uploaded to the blockchain, so that the digital artwork source file is prevented from being disclosed on the blockchain, and the correspondence between the encrypted digital artwork on the blockchain and the NFT is verified to the appreciator on the premise that the digital artwork source file is not leaked through intelligent closure; through the visual display environment, the source file of the digital artwork can be visible and unavailable; the digital artwork is added with the digital watermark by using the traitor tracing code, a transaction initiator can see the digital artwork with the digital watermark in a trusted visual display environment, and if the copy of the digital artwork is leaked, a leakage source can be traced on the copy of the digital artwork by using the traitor tracing code; the fair transaction between a transaction initiating party and a transaction receiving party is realized by using an intelligent contract, the transaction initiating party sends a public key to the intelligent contract, the transaction receiving party sends a key encrypted by the public key to the intelligent contract, namely an encryption key, and if the verification is successful, the intelligent contract triggers the transaction. At the moment, the intelligent contract sends the encryption key to the transaction initiator, and the transaction initiator can decrypt the encryption key through the private key so as to decrypt the digital artwork in the form of the ciphertext on the block chain.
It should be noted that the detailed description of the specific implementation of steps S31-S33 is already described in embodiment 1, and is not repeated herein.
Corresponding to the foregoing embodiments of the digital artwork anti-theft trusted transaction method based on NFT, the present application also provides embodiments of a digital artwork anti-theft trusted transaction device based on NFT.
Fig. 5 is a block diagram illustrating an NFT-based digital artwork anti-theft trusted transaction device according to an exemplary embodiment. Referring to fig. 5, the apparatus, applied to a transaction initiator, may include:
the appreciation module 31 is configured to appreciate a digital artwork source file copy in a visual display environment and verify the digital artwork source file copy through an intelligent contract, wherein a transaction receiver encrypts the digital artwork source file by using a key to obtain a digital artwork in a ciphertext form and uploads the digital artwork in the ciphertext form to a block chain to construct an NFT of the digital artwork source file and uploads the NFT to the block chain, a digital artwork source file copy added with a digital watermark is generated by using a traitor tracing code according to the digital artwork source file, and the digital artwork source file copy is sent to the visual display environment;
a third sending module 32, configured to provide a transaction request, send a public key of the third sending module to the transaction receiver through an intelligent contract, so that the transaction receiver encrypts the key according to the public key to obtain an encryption key, and send the encryption key to the intelligent contract, so that the intelligent contract verifies a corresponding digital artwork source file according to the encryption key, the digital artwork in the NFT and ciphertext forms obtained from the block chain, and the public key;
and the second transaction module 33 is configured to, if the intelligent contract verifies that the digital artwork source file is true, decrypt the encryption key according to the private key corresponding to the public key to obtain the key, and decrypt the digital artwork in the form of the ciphertext according to the key to obtain the digital artwork source file, where the transaction receiver completes a transaction with the transaction initiator through the intelligent contract.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
For the device embodiment, since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
Example 3:
as shown in fig. 6, the present application provides an NFT-based digital artwork anti-theft trusted transaction method, including:
step S, 01: the transaction receiving party encrypts a digital artwork source file M by using a key k to obtain a digital artwork M 'in a ciphertext form and uploads the digital artwork M' in the ciphertext form to a block chain;
step S402: a transaction receiver constructs an NFT of the digital artwork source file and uploads the NFT to a blockchain;
step S403: generating a digital artwork source file copy M' added with a digital watermark by the transaction receiver by utilizing the traitor tracing code according to the digital artwork source file;
step S404: the transaction receiver sends the digital artwork source file copy M '' to a visual display environment;
step S405: the transaction initiator appreciating the digital artwork source file copy M "in the visual display environment;
step S406: the transaction initiator makes a transaction request;
step S407: a transaction receiving party receives a self public key pk sent by a transaction initiator through an intelligent contract, encrypts the key pk according to the public key pk to obtain an encryption key c, and sends the encryption key c to the intelligent contract;
step S408: the intelligent contract verifies the corresponding digital artwork source file according to the encryption key c, the corresponding NFT and the digital artwork M' in the form of the ciphertext acquired from the block chain and the public key pk sent by the transaction initiator;
step S409: if the intelligent contract verifies that the digital artwork source file is true, the transaction receiver completes the transaction with the transaction initiator through the intelligent contract;
step S410: and the transaction initiator decrypts the encrypted key c according to the private key sk corresponding to the public key pk to obtain the key k, and decrypts the digital artwork M' in the form of the ciphertext according to the key k to obtain the digital artwork source file M.
It should be noted that the specific implementation of steps S401 to S410 is described in detail in embodiment 1, and is not described herein again.
Example 4:
correspondingly, the present application also provides an electronic device, comprising: one or more processors; a memory for storing one or more programs; when executed by the one or more processors, cause the one or more processors to implement the NFT-based digital artwork anti-theft trusted transaction method as described above.
Example 5:
accordingly, the present application also provides a computer-readable storage medium having stored thereon computer instructions, which when executed by a processor, implement the NFT-based digital artwork anti-theft trusted transaction method as described above.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the present disclosure. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains.
It will be understood that the present application is not limited to the precise arrangements that have been described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof.

Claims (6)

1. A digital artwork anti-theft credible transaction method based on NFT is characterized by being applied to a transaction receiving party, wherein the transaction receiving party holds a digital artwork source file, and the method comprises the following steps:
encrypting the digital artwork source file by using a secret key to obtain a digital artwork in a ciphertext form and uploading the digital artwork in the ciphertext form to a block chain;
constructing an NFT of the digital artwork source file and uploading the NFT to a blockchain;
generating a digital artwork source file copy added with a digital watermark by utilizing a traitor tracing code according to the digital artwork source file;
sending the digital artwork source file copy to a visual display environment so that a transaction initiator appreciates the digital artwork source file copy in the visual display environment;
when the transaction initiator makes a transaction request, receiving a self public key sent by the transaction initiator through an intelligent contract, encrypting the key according to the public key to obtain an encryption key, and sending the encryption key to the intelligent contract, so that the intelligent contract verifies a corresponding digital artwork source file according to the encryption key, the corresponding NFT and ciphertext-form digital artwork obtained from a block chain and the public key sent by the transaction initiator;
if the intelligent contract verifies that the digital artwork source file is true, the transaction is completed through the intelligent contract and the transaction initiator, wherein the transaction initiator decrypts the encryption key according to a private key corresponding to the public key to obtain the key, and decrypts the digital artwork in the form of the ciphertext according to the key to obtain the digital artwork source file;
the NFT of the digital artwork source file is constructed by adopting a Hash function:
NFT = F(I)
wherein I is a digital artwork source file, and F is a hash function;
wherein generating a digitally watermarked copy of the digital artwork source file using the traitor tracing code comprises:
adding a digital watermark to the digital artwork source file by using a traitor tracing code according to identity information registered by the transaction sender before entering the visual display environment;
distributing a unique identity key for the transaction initiator so that the transaction initiator unlocks the digital artwork source file copy under the visual display environment according to the identity key to realize appreciation;
wherein, verify the digital artwork source file that corresponds through intelligent contract, include:
verifying whether the digital artwork in the form of the ciphertext on the block chain can generate the NFT which is the same as the NFT on the block chain after being decrypted through a zero-knowledge proof protocol;
verifying whether the digital watermark visible in the visual display environment is obtained by adding the watermark into the source file of the digital artwork;
and verifying whether the encryption key can decrypt the digital artwork in the form of the ciphertext on the block chain.
2. An NFT-based digital artwork anti-theft credible transaction device is applied to a transaction receiving party, wherein the transaction receiving party holds a digital artwork source file, and the NFT-based digital artwork anti-theft credible transaction device comprises:
the encryption module is used for encrypting the digital artwork source file by using a secret key to obtain a digital artwork in a ciphertext form and uploading the digital artwork in the ciphertext form to a block chain;
the construction module is used for constructing the NFT of the digital artwork source file and uploading the NFT to a block chain;
the generating module is used for generating a digital artwork source file copy added with a digital watermark by utilizing a traitor tracing code according to the digital artwork source file;
a first sending module, configured to send the digital artwork source file copy to a visual display environment, so that a transaction initiator views the digital artwork source file copy in the visual display environment;
a second sending module, configured to receive a public key of the transaction initiator sent by the transaction initiator through an intelligent contract when the transaction initiator makes a transaction request, encrypt the key according to the public key to obtain an encryption key, and send the encryption key to the intelligent contract, so that the intelligent contract verifies a corresponding digital art source file according to the encryption key, a corresponding NFT and ciphertext-form digital art acquired from a block chain, and the public key sent by the transaction initiator;
the first transaction module is used for completing a transaction with the transaction initiator through the intelligent contract if the intelligent contract verifies that the digital artwork source file is true, wherein the transaction initiator decrypts the encrypted key according to a private key corresponding to the public key to obtain the key, and decrypts the digital artwork in the form of the ciphertext according to the key to obtain the digital artwork source file;
the NFT of the digital artwork source file is constructed by adopting a Hash function:
NFT = F(I)
wherein I is a digital artwork source file, and F is a hash function;
wherein generating a digitally watermarked copy of the digital artwork source file using the traitor tracing code comprises:
adding a digital watermark to the digital artwork source file using a traitor tracing code according to identity information registered by the transaction sender prior to entering the visual display environment;
distributing a unique identity key for the transaction initiator so that the transaction initiator unlocks the digital artwork source file copy under the visual display environment according to the identity key to realize appreciation;
wherein, verify the digital artwork source file that corresponds through intelligent contract, include:
verifying whether the digital artwork in the form of the ciphertext on the block chain can generate the NFT which is the same as the NFT on the block chain after being decrypted by a zero-knowledge proof protocol;
verifying whether the digital watermark visible in the visual display environment is obtained by adding the watermark into the source file of the digital artwork;
and verifying whether the encryption key can decrypt the digital artwork in the form of the ciphertext on the block chain.
3. A digital artwork anti-theft credible transaction method based on NFT is characterized in that the method is applied to a transaction initiator and comprises the following steps:
the method comprises the steps of appreciating a digital artwork source file copy in a visual display environment and verifying the digital artwork source file copy through an intelligent contract, wherein a transaction receiver encrypts the digital artwork source file by using a key to obtain a digital artwork in a ciphertext form and uploads the digital artwork in the ciphertext form to a block chain to construct an NFT of the digital artwork source file and uploads the NFT to the block chain, the digital artwork source file copy added with a digital watermark is generated by using a traitor tracing code according to the digital artwork source file, and the digital artwork source file copy is sent to the visual display environment;
a transaction request is put forward, a public key of the transaction receiver is sent to the transaction receiver through an intelligent contract, so that the transaction receiver encrypts the secret key according to the public key to obtain an encryption key, and the encryption key is sent to the intelligent contract, so that the intelligent contract verifies a corresponding digital artwork source file according to the encryption key, the digital artwork in the form of the corresponding NFT and the ciphertext acquired from the block chain and the public key;
if the intelligent contract verifies that the digital artwork source file is true, the encryption key is decrypted according to a private key corresponding to the public key to obtain the key, the digital artwork in the form of the ciphertext is decrypted according to the key to obtain a digital artwork source file, and the transaction receiver completes transaction with the transaction initiator through the intelligent contract;
the NFT of the digital artwork source file is constructed by adopting a Hash function:
NFT = F(I)
wherein, I is a digital artwork source file, and F is a hash function;
wherein generating a digitally watermarked copy of the digital artwork source file using the traitor tracing code comprises:
adding a digital watermark to the digital artwork source file using a traitor tracing code according to identity information registered by the transaction sender prior to entering the visual display environment;
distributing a unique identity key for the transaction initiator so that the transaction initiator unlocks the digital artwork source file copy under the visual display environment according to the identity key to realize appreciation;
wherein, verify the digital artwork source file that corresponds through intelligent contract, include:
verifying whether the digital artwork in the form of the ciphertext on the block chain can generate the NFT which is the same as the NFT on the block chain after being decrypted by a zero-knowledge proof protocol;
verifying whether the digital watermark visible in the visual display environment is obtained by adding the watermark to the digital artwork source file;
and verifying whether the encryption key can decrypt the digital artwork in the form of the ciphertext on the block chain.
4. An NFT-based digital artwork anti-theft trusted transaction device is applied to a transaction initiator and comprises:
the system comprises an appreciation module, a verification module and a verification module, wherein the appreciation module is used for appreciating a digital artwork source file copy in a visual display environment and verifying the digital artwork source file copy through an intelligent contract, a transaction receiving party utilizes a secret key to encrypt the digital artwork source file, a digital artwork in a cryptograph form is obtained and uploaded to a block chain, an NFT of the digital artwork source file is constructed and uploaded to the block chain, a digital artwork source file copy added with a digital watermark is generated by utilizing a traitor tracing code according to the digital artwork source file, and the digital artwork source file copy is sent to the visual display environment;
a third sending module, configured to send a transaction request to the transaction recipient through an intelligent contract, so that the transaction recipient encrypts the key according to the public key to obtain an encryption key, and send the encryption key to the intelligent contract, so that the intelligent contract verifies a corresponding digital art source file according to the encryption key, a corresponding NFT and ciphertext-form digital art obtained from a block chain, and the public key;
the second transaction module is used for decrypting the encryption key according to a private key corresponding to the public key to obtain the key if the intelligent contract verifies that the digital artwork source file is true, and decrypting the digital artwork in the form of the ciphertext according to the key to obtain the digital artwork source file, wherein the transaction receiver completes transaction with the transaction initiator through the intelligent contract;
the NFT of the digital artwork source file is constructed by adopting a Hash function:
NFT = F(I)
wherein I is a digital artwork source file, and F is a hash function;
wherein generating a digitally watermarked copy of the digital artwork source file using the traitor tracing code comprises:
adding a digital watermark to the digital artwork source file by using a traitor tracing code according to identity information registered by the transaction sender before entering the visual display environment;
distributing a unique identity key for the transaction initiator so that the transaction initiator unlocks the digital artwork source file copy under the visual display environment according to the identity key to realize appreciation;
wherein, verify the digital artwork source file that corresponds through intelligent contract, include:
verifying whether the digital artwork in the form of the ciphertext on the block chain can generate the NFT which is the same as the NFT on the block chain after being decrypted by a zero-knowledge proof protocol;
verifying whether the digital watermark visible in the visual display environment is obtained by adding the watermark into the source file of the digital artwork;
and verifying whether the encryption key can decrypt the digital artwork in the form of the ciphertext on the block chain.
5. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1, 3.
6. A computer-readable storage medium having stored thereon computer instructions, which when executed by a processor, carry out the steps of the method according to any one of claims 1, 3.
CN202210777578.2A 2022-07-04 2022-07-04 Digital artwork anti-theft credible transaction method and device based on NFT Active CN114841701B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210777578.2A CN114841701B (en) 2022-07-04 2022-07-04 Digital artwork anti-theft credible transaction method and device based on NFT

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210777578.2A CN114841701B (en) 2022-07-04 2022-07-04 Digital artwork anti-theft credible transaction method and device based on NFT

Publications (2)

Publication Number Publication Date
CN114841701A CN114841701A (en) 2022-08-02
CN114841701B true CN114841701B (en) 2022-10-21

Family

ID=82574450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210777578.2A Active CN114841701B (en) 2022-07-04 2022-07-04 Digital artwork anti-theft credible transaction method and device based on NFT

Country Status (1)

Country Link
CN (1) CN114841701B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117034213B (en) * 2023-10-08 2023-12-19 广州市悦智计算机有限公司 Method for encryption protection of NFT (network File transfer) of digital work

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113065149A (en) * 2021-05-06 2021-07-02 广西师范大学 Data copyright protection method based on block chain and collusion attack resistant fingerprint code
CN113077264A (en) * 2020-01-06 2021-07-06 浙江甲骨文超级码科技股份有限公司 Copyright protection method and system based on block chain and timestamp technology

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711114B2 (en) * 2005-09-19 2010-05-04 International Business Machines Corporation System and method for assigning sequence keys to a media player to enable flexible traitor tracing
CN101196973B (en) * 2006-12-04 2011-01-05 华为技术有限公司 Digital copyright protection method and system thereof
WO2021090838A1 (en) * 2019-11-08 2021-05-14 株式会社ワコム Artwork transaction method and transaction device, and program
CN113240437A (en) * 2021-05-10 2021-08-10 南京智信安网络科技有限公司 Artwork supervision platform based on block chain and management method
CN113706344B (en) * 2021-08-05 2024-03-01 武汉大学 Digital copyright protection method based on block chain
CN114003871A (en) * 2021-09-29 2022-02-01 合肥高维数据技术有限公司 Video copyright protection method and system based on block chain and digital watermark technology
CN114143080A (en) * 2021-11-30 2022-03-04 兰州理工大学 Block chain data privacy protection and sharing method based on zero knowledge proof
CN114612244A (en) * 2022-03-25 2022-06-10 上海非常麦信息科技有限公司 Digital service transaction platform

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113077264A (en) * 2020-01-06 2021-07-06 浙江甲骨文超级码科技股份有限公司 Copyright protection method and system based on block chain and timestamp technology
CN113065149A (en) * 2021-05-06 2021-07-02 广西师范大学 Data copyright protection method based on block chain and collusion attack resistant fingerprint code

Also Published As

Publication number Publication date
CN114841701A (en) 2022-08-02

Similar Documents

Publication Publication Date Title
Memon et al. A buyer-seller watermarking protocol
Lei et al. An efficient and anonymous buyer-seller watermarking protocol
Qiao et al. Watermarking schemes and protocols for protecting rightful ownership and customer's rights
CN101398915A (en) Electronic stamp platform system based on internet
CN110727927B (en) Digital product protection system and method based on block chain technology
CA2652084A1 (en) A method and apparatus to provide authentication and privacy with low complexity devices
WO2021258907A1 (en) Transaction method based on blockchain network, node, and medium
Chang et al. An efficient and fair buyer–seller fingerprinting scheme for large scale networks
KR101282972B1 (en) Authentication between a device and a portable storage
CN114841701B (en) Digital artwork anti-theft credible transaction method and device based on NFT
Frattolillo A buyer-friendly and mediated watermarking protocol for web context
Chang et al. An enhanced buyer seller watermarking protocol
JP2000066590A (en) Data custody system, data custody method, custody data presence certification method, and program recording medium
EP1282263B1 (en) Method and system for securely timestamping digital data
CN115955308B (en) Digital asset processing method, device, equipment and medium based on quantum-resistant key
CN117454442A (en) Anonymous security and traceable distributed digital evidence obtaining method and system
Frattolillo Watermarking protocols: An excursus to motivate a new approach
JP2000324329A (en) Contents id provision system
Cheung et al. A commutative encrypted protocol for the privacy protection of watermarks in digital contents
Deng et al. Attacks on two buyer-seller watermarking protocols and an improvement for revocable anonymity
US20160260093A1 (en) Micro trusted network
Yongliang et al. Watermark detection schemes with high security
JP2000322432A (en) Contents directory system
JP3723379B2 (en) Content directory system
CN112991136B (en) Safe plaintext image cloud storage and processing method based on watermark

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant