CN115550026A - Multi-monitoring method, system and storage medium based on block chain transaction - Google Patents

Multi-monitoring method, system and storage medium based on block chain transaction Download PDF

Info

Publication number
CN115550026A
CN115550026A CN202211177023.0A CN202211177023A CN115550026A CN 115550026 A CN115550026 A CN 115550026A CN 202211177023 A CN202211177023 A CN 202211177023A CN 115550026 A CN115550026 A CN 115550026A
Authority
CN
China
Prior art keywords
supervision
key
financial institution
transaction
direct
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211177023.0A
Other languages
Chinese (zh)
Other versions
CN115550026B (en
Inventor
王楠
刘浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCB Finetech Co Ltd
Original Assignee
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCB Finetech Co Ltd filed Critical CCB Finetech Co Ltd
Priority to CN202211177023.0A priority Critical patent/CN115550026B/en
Publication of CN115550026A publication Critical patent/CN115550026A/en
Application granted granted Critical
Publication of CN115550026B publication Critical patent/CN115550026B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application relates to the technical field of financial supervision, and provides a block chain transaction-based multi-supervision method and system and a storage medium. The method comprises the following steps: the financial institution encrypts user transaction according to the supervision key thereof to construct block chain transaction; any one of the plurality of monitoring institutions acquires the monitoring key of the next monitoring institution step by step until the monitoring key of the direct monitoring institution is acquired, and calculates to obtain the monitoring key of the financial institution; and any supervision organization calculates a key of the blockchain transaction according to the supervision key of the financial institution, and decrypts the blockchain transaction through the key to supervise the blockchain transaction. By adopting the method, any level of supervisory organization can decrypt the content of the block chain transaction by obtaining the supervisory key of the financial organization, thereby realizing multi-party multi-supervision of the financial organization and protecting the transaction privacy of users.

Description

Multi-monitoring method, system and storage medium based on block chain transaction
Technical Field
The application relates to the technical field of financial supervision, in particular to a block chain transaction-based multi-supervision method, a block chain transaction-based multi-supervision system, a computer-readable storage medium and a computer program product.
Background
The block chain technology provides a convenient tool for financial activities, and the intelligent contracts in the block chain can be used as a trusted third party to manage digital assets, so that more complex financial policies or financial activities can be realized, and human errors are avoided. Typically, the blockchain data is visible within the range of the consensus node, and thus the blockchain itself is publicly transparent. Blockchain technology presents challenges to the compliance of financial activities or privacy of users.
Financial institutions are usually supervised by multiple parties, such as the national people's bank, the national bank prison and the national certificate prison, and may supervise a certain financial institution simultaneously according to business needs. Often, the regulatory bodies are hierarchical structures, and the high-level regulatory bodies need to be able to supervise the financial bodies supervised by the low-level regulatory bodies.
In block chain transaction, after the higher-intensity privacy protection technology is applied, a backdoor is left for the monitoring mechanism while privacy protection is performed, so that the monitoring mechanism can see the addresses of a sender and a receiver of the transaction and the amount of the transaction, which is often difficult to realize. The current solution is mainly to protect the money by homomorphic encryption algorithm, prove the transaction compliance by zero knowledge proof technology, and realize supervision by methods such as key escrow. The scheme adopting the zero-knowledge proof technology only supports postharvest evidence at present and cannot be used for actively finding the problems in financial activities, and the solution does not have a detailed scheme aiming at multiple supervision and cannot meet the requirements of multiple supervision of multiple parties. How to achieve multi-party multi-monitoring (monitoring of the same financial institution by multiple monitoring institutions at different levels) under the condition of protecting user privacy, and making the financial institution to use the block chain technology in compliance under monitoring is a problem to be solved urgently at present.
Disclosure of Invention
In order to solve the technical defects, the present application provides a method and a system for multiple monitoring based on blockchain transactions.
A first aspect of the present application provides a multiple supervision method based on blockchain transaction, including:
the financial institution serving as the block chain node encrypts user transactions according to the supervision key of the financial institution to construct block chain transactions;
any one of the plurality of monitoring organizations acquires the monitoring key of the next monitoring organization step by step until the monitoring key of the direct monitoring organization of the financial organization is acquired, and the monitoring key of the financial organization is calculated according to the monitoring key of the direct monitoring organization; at least one highest supervision entity and at least one direct supervision entity of the plurality of supervision entities;
and any supervision organization calculates a key of the blockchain transaction according to the supervision key of the financial institution, and decrypts the blockchain transaction through the key to supervise the blockchain transaction.
In an embodiment of the application, before the financial institution constructs the blockchain transaction, the method further comprises:
generating a supervision key of the highest supervision organization, and generating a supervision key of a next level supervision organization according to the supervision key of the highest supervision organization; a financial institution's supervisory key is generated.
In an embodiment of the present application, the generating a financial institution supervision key includes:
when the financial institution has only one direct supervision institution, generating a supervision key of the financial institution according to the supervision key of the direct supervision institution;
when the financial institution has a plurality of direct supervision institutions, randomly generating the supervision keys of the financial institution, wherein the supervision keys of the financial institution and the supervision keys of the direct supervision institutions form a collateral system irresolvable function family.
In an embodiment of the present application, the financial institution serving as a blockchain node encrypts a user transaction according to a regulatory key of the financial institution, including: the financial institution generates parameters or keys required by block chain transaction privacy protection according to the supervision keys of the financial institution; and encrypting the user transaction according to the parameter or the key.
In an embodiment of the present application, the generating, by the financial institution, parameters or keys required for privacy protection of blockchain transactions according to a supervision key of the financial institution includes:
using a supervision key of a financial institution as a random seed number to generate a random large integer, using the random large integer as a starting point of prime number search to determine a prime number, and calculating parameters required by block chain transaction by using the prime number;
and taking the supervision key of the financial institution as a random number seed, and generating a key required by block chain transaction privacy protection by adopting a pseudo-random number generation function.
In an embodiment of the present application, the constructing a blockchain transaction includes:
if the financial institution has a plurality of direct supervision institutions, when the financial institution constructs the blockchain transaction, the blockchain transaction comprises the description of a function h, wherein the function h is obtained by sampling from a collateral system unsolvable function family formed by the supervision key of the financial institution and the supervision key of the direct supervision institution, and the function h is collected
Figure BDA0003864960630000031
Has a mapping value of K Fi
Wherein PRF denotes a pseudo random number generating function, F i Representing a financial institution, N j1 、N jk Denotes the direct supervision agency, K Nj1 、K Njk Supervision Key, ID, representing a direct supervision Authority Fi Representing a financial institution, K Fi Representing the administrative key of the financial institution.
In an embodiment of the present application, the calculating a supervision key of a financial institution according to a supervision key of a direct supervision institution includes: if the financial institution has a plurality of direct monitoring institutions, the monitoring key of the direct monitoring institution is substituted into the function h described in the block chain transaction, and the monitoring key of the financial institution is obtained through calculation.
In an embodiment of the present application, calculating, by any regulatory agency, a key for blockchain transaction according to a regulatory key of a financial institution includes: the supervising authority takes the supervising secret key of the financial institution as a random number seed to generate a random large integer, the random large integer is taken as a starting point of prime number searching to determine a prime number, and a secret key of block chain transaction is obtained through calculation according to the prime number.
A second aspect of the present application provides a multiple supervision system based on blockchain transaction, including:
the financial institution is used as a block chain node and used for encrypting the user transaction according to the supervision key of the financial institution and constructing the block chain transaction; and
a plurality of regulatory agencies;
at least one highest supervision entity and at least one direct supervision entity of the plurality of supervision entities;
any of a plurality of regulatory agencies are configured to:
acquiring the supervision key of the next level supervision mechanism step by step until the supervision key of the direct supervision mechanism is acquired;
calculating to obtain a supervision key of the financial institution according to the supervision key of the direct supervision institution;
and calculating a key of the blockchain transaction according to the supervision key of the financial institution, and decrypting the blockchain transaction through the key to supervise the blockchain transaction.
In an embodiment of the application, prior to a financial institution constructing a blockchain transaction:
the highest supervision mechanism generates a supervision key of the highest supervision mechanism, and a pseudo-random number generation function is used for generating a supervision key of a next-level supervision mechanism according to the supervision key of the highest supervision mechanism;
under the condition that the financial institution only has one direct supervision institution, the direct supervision institution generates a supervision key of the financial institution according to the supervision key of the direct supervision institution;
under the condition that the financial institution has a plurality of direct supervision institutions, the financial institution randomly generates the supervision key of the financial institution, and the supervision key of the financial institution and the supervision key of the direct supervision institution form a collateral system irresolvable function family.
In an embodiment of the present application, the encrypting the user transaction according to the administrative key of the financial institution includes: the financial institution takes the supervision key of the financial institution as a random number seed to generate a random large integer, the random large integer is taken as the initial point of prime number search to determine a prime number, and the prime number is utilized to calculate parameters required by block chain transaction privacy protection; taking a supervision key of a financial institution as a random number seed, and generating a key required by block chain transaction privacy protection by adopting a pseudo-random number generation function; and encrypting the user transaction according to the parameter or the key.
In the embodiment of the application, any one of a plurality of monitoring authorities generates a random large integer as a random number seed according to a monitoring key of a financial institution, determines a prime number by taking the random large integer as a starting point of prime number search, and calculates a key of block chain transaction according to the prime number.
A third aspect of the present application provides a machine-readable storage medium, in which computer instructions are stored, and the computer instructions are executed by a processor to implement the method for block chain transaction based multiple supervision provided in the first aspect.
A fourth aspect of the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the method for multiple block chain transaction-based supervision provided by the first aspect.
According to the multiple supervision method and system based on the block chain transaction, the financial institution is supervised by finding the supervision path based on the hierarchical structure of the supervision institution. Any one of all the supervision authorities acquires the supervision key of the lower supervision authority step by step from the hierarchical structure so as to acquire the supervision key of the financial institution, and decrypts the content of each block chain transaction of the financial institution through the supervision key of the financial institution, thereby realizing the supervision of the financial institution, meeting the requirements of multi-party multiple supervision and protecting the transaction privacy of users.
Additional features and advantages of embodiments of the present application will be described in detail in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the detailed description serve to explain the embodiments of the application and not to limit the embodiments of the application. In the drawings:
fig. 1 is a flowchart of a multi-monitoring method based on blockchain transaction according to an embodiment of the present disclosure;
FIG. 2 is a flowchart illustrating the generation of key parameters associated with a blockchain intelligent contract according to an embodiment of the present application;
FIG. 3 is a flow diagram illustrating a financial institution configured blockchain transaction according to an embodiment of the present application;
FIG. 4 is a flow diagram of a supervisor decryption blockchain transaction in accordance with an embodiment of the present application;
FIG. 5 is a schematic diagram of a hierarchy of regulatory agencies in an example of the present application;
FIG. 6 is a schematic diagram of a hierarchy of a second regulatory agency according to an example of the present application;
fig. 7 is an architecture diagram of a multiple supervision system based on blockchain transaction according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it should be understood that the specific embodiments described herein are only used for illustrating and explaining the embodiments of the present application and are not used for limiting the embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Interpretation of terms:
family of collateral unsolvable functions: the concept of a functional family of collateral unsolvable is proposed by Yuliang Zheng et al in the patent "hidden interactive functions families and the like" published in the Asia conference (Asian society of cryptography) in 1991.
Fig. 1 is a flowchart illustrating a multi-policing method based on blockchain transactions according to an embodiment of the present disclosure. As shown in fig. 1, in an embodiment of the present application, a method for multiple policing based on blockchain transactions is provided, which includes the following steps:
step 102, a financial institution serving as a blockchain node encrypts user transactions according to a supervision key of the financial institution to construct blockchain transactions;
104, acquiring the supervision key of the next level supervision mechanism step by any one of the plurality of supervision mechanisms until the supervision key of the direct supervision mechanism of the financial mechanism is acquired, and calculating according to the supervision key of the direct supervision mechanism to obtain the supervision key of the financial mechanism; at least one highest supervising authority and at least one direct supervising authority among the plurality of supervising authorities;
and step 106, any supervising agency calculates the key of the blockchain transaction according to the supervising key of the financial institution, and decrypts the blockchain transaction through the key to supervise the blockchain transaction.
According to the multiple supervision method based on the blockchain transaction, the financial institution is supervised by finding the supervision path based on the hierarchical structure of the supervision institution. Any one of all the supervision authorities acquires the supervision key of the lower-level supervision authority from the hierarchical structure step by step so as to acquire the supervision key of the financial institution.
Because the key required by the user privacy protection algorithm is obtained by calculation according to the supervision key, the supervision organization can recalculate the key of the user privacy protection algorithm, so as to decrypt the ciphertext in the blockchain transaction constructed by the financial institution in the blockchain and the ciphertext in the intelligent contract deployed by the financial institution, thereby realizing the supervision of the whole transaction process.
When the financial institution is supervised by a supervisory organization with a hierarchical structure, by adopting the block chain transaction-based multi-supervision method of the embodiment of the application, any one level of supervisory organization can decrypt the content of each block chain transaction of a manager by obtaining the supervision key of the financial institution, thereby realizing the supervision of the financial institution, meeting the requirements of multi-party multi-supervision and protecting the transaction privacy of users.
It should be understood that, although the steps in the flowchart of fig. 1 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, prior to step 102 above, the supervisory key of the highest regulatory body is generated, the supervisory key of the next level of regulatory body is generated from the supervisory key of the highest regulatory body, and the supervisory key of the financial body is generated. When the financial institution has only one direct supervision institution, generating a supervision key of the financial institution according to the supervision key of the direct supervision institution; when the financial institution has a plurality of direct supervision institutions, randomly generating the supervision keys of the financial institution, wherein the supervision keys of the financial institution and the supervision keys of the direct supervision institutions form a collateral system undecipherable function family SIFF. Multiple multiparty regulatory agencies and financial institutions can be regarded as partial order sets, the relation is a hierarchy or a regulatory relation, and then a SIFF key distribution method is adopted on the partial order sets to generate regulatory keys for the agencies.
In one embodiment, in step 102, the financial institution generates parameters or keys required for privacy protection of blockchain transactions according to the administrative key of the financial institution, and encrypts the user transactions according to the generated parameters or keys. Specifically, a supervision key of a financial institution is used as a random number seed to generate a random large integer, the random large integer is used as a starting point of prime number search to determine a prime number (prime number), and parameters required by block chain transaction privacy protection are calculated by using the prime number; and taking the supervision key of the financial institution as a random number seed, and generating a key required by the block chain transaction by adopting a pseudo-random number generation function. In the step 106, the supervising authority uses the supervising key of the financial institution as a random number seed to generate a random large integer, uses the random large integer as a starting point of prime number search to determine a prime number, and can calculate a key of block chain transaction according to the determined prime number.
In one embodiment, in step 102, if there are multiple direct monitoring organizations in the financial institution, the multiple direct monitoring organizations are represented as { N } j1 ,…,N jk }. When the financial institution constructs the blockchain transaction, the description of a function h is contained in the blockchain transaction, the function h is obtained by sampling from a collateral unsolvable function family formed by a supervision key of the financial institution and a supervision key of a direct supervision institution, and the function h is collected
Figure BDA0003864960630000081
Has a mapping value of K Fi (ii) a Wherein PRF denotes a pseudo random number generating function, F i Representing a financial institution, N j1 ,...,N jk Denotes the direct supervision agency, K Nj1 ,...,K Njk Supervision Key, ID, representing a direct supervision Authority Fi Representing a financial institution, K Fi Representing the administrative key of the financial institution. In step 104, if the financial institution has a plurality of direct administration organizations, the administrative key (K) of the direct administration organization is used Nj1 ,...,K Njk ) Substituting the function h described in the block chain transaction into the block chain transaction to calculate and obtain the supervision key K of the financial institution Fi
The technical solution of the embodiment of the present application is described in detail below from the dimension of constructing blockchain transactions by financial institutions and decrypting blockchain transactions by supervisory institutions.
As shown in fig. 2, the highest-level regulatory body initializes its own key, randomly generates its own regulatory key, and then each of the high-level regulatory bodies generates a regulatory key for its next-level regulatory body using a pseudo random number generation function PRF based on the initialized key until a direct regulatory body key of the financial body is generated as the regulatory key of the direct regulatory body. Then, judging whether the financial institution is supervised by a plurality of supervising agencies together; if the financial institution only has one direct supervision institution, the direct supervision institution uses a pseudo random number generation function (PRF) to generate a supervision key k of the financial institution and distributes the supervision key k to the financial institution; if the financial institution has a plurality of direct supervision institutions, the financial institution randomly generates a supervision key k, and the supervision key k of the financial institution and the supervision key of the direct supervision institution form a collateral system unsolvable function. Next, the financial institution uses the administrative key k to generate the keys or parameters required by the user privacy protection algorithm. Specifically, when a user privacy protection algorithm needs to generate a random large prime number, a supervision key k is used as a random number seed, a random large integer is generated as a starting point of prime number search, and a definite algorithm is adopted to search for the prime number meeting conditions; when a user privacy protection algorithm needs a symmetric encryption key, a supervision key k is used as a random number seed, and a pseudo random number generation function PRF is adopted to generate the symmetric encryption key. The financial institution deploys an intelligent contract on the block chain transaction according to the obtained prime number and the symmetric encryption key, and encrypts the block chain transaction.
As shown in fig. 3, a user submits a user transaction to a financial institution, which, after performing a compliance check, takes privacy protection control measures to construct a generated blockchain transaction. In the process of constructing the block chain transaction, the user transaction is encrypted by using the symmetric encryption key and adopting a symmetric encryption algorithm, and if the financial institution is supervised by a plurality of direct supervision institutions, a function h is sampled from the collateral unsolvable function family and is added into the block chain transaction. The financial institution submits the constructed blockchain transactions to blockchain nodes, which process the blockchain transactions according to intelligent contracts. The financial institution may also process the blockchain transaction as a blockchain link point.
As shown in fig. 4, in the supervision process, a certain supervision entity acquires block chain data, and for the case that there is only one direct supervision entity, the supervision entity directly calculates by using a pseudo random number generation function PRF to obtain a supervision key of the financial institution; and for the condition that the financial institution has a plurality of direct monitoring institutions, substituting the monitoring key of the direct monitoring institution into the function h described in the block chain transaction by the monitoring institution, and calculating according to the function h in the block chain transaction to obtain the monitoring key of the financial institution. And the supervision authority decrypts the block chain transaction data and the ciphertext in the intelligent contract account according to the supervision key of the financial institution so as to implement the supervision strategy.
The following describes the technical solution of the present application in detail by citing typical examples.
In the following example, the privacy preserving algorithm employs a lightweight "Cramer-Shoup" algorithm and an initial IV random AES-CBC algorithm. The lightweight "Cramer-Shoup" algorithm is recorded in the paper A Simple Public-Key Cryptosystem with a Double Tracpdoor Decryption Mechanism and Its Applications, published by Emmanuel Bresson et al, asia-Missary 2003. When submitting user transaction, the digital signature algorithm and digital certificate are needed, and standard X.509 certificate and ECDSA digital signature algorithm can be adopted. The secure channel between the user and the financial institution is implemented using a secure transport layer protocol (TLS). And the block chain adopts an Ether private chain. The blockchain nodes are composed of financial institutions. The user effects changes to the assets in the blockchain by submitting user transactions to registered financial institutions. Security parameter k =256 of the family of paralyzable functions (SIFF). The pseudo-random number generation function employs a SHA256 hash function.
Example 1
Example one A hierarchy of regulatory agencies is shown in FIG. 5, financial institution F 1 The supervision authority of is S 1 ={N 1 ,N 2 ,...,N 6 ,N 7 ,N 9 In which the highest level regulatory body is N 1 And N 7 Financial institution F 1 Is { N } 6 ,N 9 }. Let financial institution F 1 The user group is U 1 User u 1 ,u 2 ∈U 1
S 1 All the highest level supervisors in the system randomly generate their own supervision keys, and then each high level supervisor generates the supervision keys for the next level supervisor by using a pseudo-random number generation function. N is a radical of 1 And N 7 Respectively randomly selecting own supervision keys as
Figure BDA0003864960630000101
Financial institution F 1 Other regulatory agency key of
Figure BDA0003864960630000102
Figure BDA0003864960630000103
Financial institution F 1 There are 2 direct regulatory agencies with { N } 6 ,N 9 }, the financial institution randomly generates a supervision key
Figure BDA0003864960630000104
Financial institution F 1 Is monitored by the monitoring key
Figure BDA0003864960630000105
As random number seed of the key required by the financial institution to further generate the user privacy protection algorithm, all the supervision authorities S 1 The supervision authority in (2) can supervise the key by supervising the key
Figure BDA0003864960630000106
And calculating a key used by the user privacy protection algorithm.
The lightweight "Cramer-Shoup" algorithm is employed in this example, so random large prime numbers p and q need to be computed. With financial institution F 1 Is monitored by the monitoring key
Figure BDA0003864960630000107
Generating a random large integer as a starting point of prime number search for a random number seed, and then searching for a prime number meeting conditions by adopting a determined algorithm. Financial institution F 1 Will be provided with
Figure BDA0003864960630000111
As a seed for the randint function in the Python random library, a next _ prime function that generates random integers substituted into the Python gym2 library searches for large prime numbers p, q, such that p =2p '+1, q =2q' +1, where p ', q' are both large prime numbers. Then, N = pq is calculated, and a random number ρ is selected, where
Figure BDA0003864960630000112
Calculating g = -rho 2N mod N 2 So that the order of g is λ (N) =2p 'q'. Setting financial institution F 1 The master private key of (b) is (λ (N), N) and the master public key is (g, N).
In this example, the AES-CBC symmetric encryption scheme is used, and therefore, the key of the symmetric encryption algorithm needs to be calculated. With financial institution F 1 Is monitored by the monitoring key
Figure BDA0003864960630000113
For random number seed, pseudo-random number generation function generation is adopted
Figure BDA0003864960630000114
In addition, financial institution F 1 Deploying intelligent contract CoinContract in block chain to obtain intelligent contract address
Figure BDA0003864960630000115
The intelligent contract CoinContract includes the following data structures and functions:
Figure BDA0003864960630000116
where balance1 and balance2 store the cryptogram amounts under the user account.
The user submits the user transaction to the financial institution, the financial institution takes privacy protection control measures after compliance check, and then block chain transaction is generated, wherein the block chain transaction comprises the user transaction encrypted by adopting a symmetric encryption algorithm. User u 1 Generating a user transaction, submitting the user transaction to a financial institution F via a secure channel 1 . The user transaction comprises information such as transaction type, amount, a receiver and the like, wherein the amount is ciphertext information. Financial institution F 1 And decrypting the user transaction by using a main private key in a lightweight Cramer-Shoup algorithm, and carrying out compliance check. And then adding interference transactions, covering address information of the user transactions, generating block chain transactions, wherein the block chain transactions comprise ciphertext information of the user transactions or the interference transactions, and encrypting by adopting an initial IV random AES-CBC algorithm.
At financial institution F 1 When constructing a blockchain transaction, there are two direct supervisory authorities for the financial institution, namely { N 6 ,N 9 H, sampling a function h from the family of bystander unresolvable functions such that the function is in set
Figure BDA0003864960630000121
A mapping value of
Figure BDA0003864960630000122
Financial institution F 1 The description of the function h is included in the blockchain transaction. The process of sampling a function h from the family of coefficients-unsolvable functions is as follows:
financial institution F 1 Computing
Figure BDA0003864960630000123
Figure BDA0003864960630000124
Choosing a large prime number p of 512 bits s 2 random numbers u of 256 bits are selected 1 And u 2 In the domain F (p) s ) The following equation set is solved:
Figure BDA0003864960630000125
obtaining a sampled h-function (a) 0 ,a 1 )。
For financial institution F 1 Intelligent contracts submitted to transactions and financial institution deployments in blockchains with a regulatory agency of { N } 6 ,N 9 }. Assume with a regulatory body N 6 As representative, regulatory agency N 6 Calculating out
Figure BDA0003864960630000126
Substituting the function into a function h described in the block chain transaction to calculate a supervision key of the financial institution
Figure BDA0003864960630000127
The large prime number p is then calculated according to step 3,q, obtaining financial institution F 1 And calculating a symmetric encryption key, and calculating a master private key (λ (N), N) of (c), and (d) of (c)
Figure BDA0003864960630000128
Therefore, the content of block chain transaction and the content of the ciphertext in the intelligent contract can be decrypted, and the supervision strategy is implemented.
Example two
Example two the hierarchy of the regulatory agencies is shown in FIG. 6, financial institution F 2 The supervision authority of is S 2 ={N 1 ,N 3 H, with the highest level regulatory body being N 1 Financial institution F 2 Is { N } 3 }。
Example two differs from example one in that the financial institution F 2 Having only one direct supervision agency, financial institution F 2 By the direct supervision authority N 3 And (6) distributing. N is a radical of 3 Calculating out
Figure BDA0003864960630000129
And distributed to financial institutions F 2 . In addition, the financial institution does not include the function h sampled in the collateral unsolvable function family in the blockchain transaction when constructing the blockchain transaction. In decrypting blockchain transactions, supervisor N 3 Direct calculation financial institution F 2 Is managed by a key management
Figure BDA00038649606300001210
Get financial institution F 2 P, q and the symmetric encryption key sk.
It should be noted that, depending on the privacy protection algorithm adopted by the financial institution, the encryption key and the random parameter generated by the financial institution are different, and different decryption keys may be required. For example, the financial institution adopts an identity-based homomorphic encryption algorithm, and the supervision key of the financial institution can be used for generating a random matrix, so that the financial institution generates a master private key through a trapdoor generation algorithm, and the supervision authority can also calculate a decryption key according to the supervision key of the financial institution. Therefore, the application does not limit the privacy protection method adopted by the financial institution, and only requires that the financial institution can recover the decryption key by the supervision institution when implementing various privacy protection measures.
Aiming at the problems that the prior art cannot meet the requirements of multi-party multiple supervision and the technical scheme based on zero knowledge certification only supports post supervision, the embodiment of the application adopts a collateral-system undecomposable function SIFF key distribution method to ensure that a financial institution is supervised by a supervision organization under a hierarchical structure, and simultaneously allows the financial institution to adopt a privacy protection algorithm to protect the privacy of a user.
Fig. 7 is an architecture diagram of a multiple supervision system based on blockchain transaction according to an embodiment of the present application. As shown in FIG. 7, in one embodiment, a multi-custody system for blockchain transactions is provided, including a financial institution F 1 And a plurality of regulatory agencies N 1 、N 2 、N 3 、N 4 、N 5 、N 6 、N 7 、N 8 、N 9 In which N is 1 、N 7 Is the highest level regulatory body, N 6 、N 9 For financial institution F 1 Direct supervision of (1). Financial institution F 1 As blockchain node, according to financial institution F 1 The supervision key of (2) encrypts the user transaction to construct a blockchain transaction. Any one of the plurality of monitoring authorities can acquire the monitoring key of the next monitoring authority stage by stage until the monitoring key of the direct monitoring authority is acquired; calculating to obtain a supervision key of the financial institution according to the supervision key of the direct supervision institution; and calculating a key of the blockchain transaction according to the supervision key of the financial institution, and decrypting the blockchain transaction through the key to supervise the blockchain transaction.
In one embodiment, at financial institution F 1 Highest supervisor N before building blockchain transactions 1 And N 7 And generating a self supervision key, and generating a supervision key of a next-level supervision organization according to the self supervision key by using a pseudo-random number generation function. There is only one in the financial institutionIn the case of a direct administration, the direct administration generates the administrative key of the financial institution based on the administrative key of the direct administration. In FIG. 7, financial institution F 1 With two direct supervision authorities N 6 、N 9 Financial institution F 1 Randomly generating a self supervision key, wherein the self supervision key of the financial institution and the supervision key of the direct supervision institution form a collateral system unsolvable function family.
In one embodiment, the financial institution generates a random large integer by taking the supervision key of the financial institution as a random number seed, determines a prime number by taking the random large integer as a starting point of prime number search, and calculates parameters required by block chain transaction by using the prime number; and taking the supervision key of the financial institution as a random number seed, generating a key required by the block chain transaction by adopting a pseudo-random number generation function, and encrypting the user transaction according to the calculated parameters or the key.
In one embodiment, any one of the plurality of monitoring authorities can generate a random large integer as a random number seed according to a monitoring key of the financial institution, determine a prime number by taking the random large integer as a starting point of prime number search, and calculate a key of block chain transaction according to the determined prime number.
The specific details of the multiple supervision system based on blockchain transaction of the present embodiment can be understood by referring to the multiple supervision method based on blockchain transaction described in the above example one. The multiple supervision system based on blockchain transaction of the present embodiment has the same advantages as the above multiple supervision method based on blockchain transaction compared with the prior art.
The embodiment of the present application further provides a computer-readable storage medium, where a computer instruction is stored in the computer-readable storage medium, and when the computer instruction runs on a computer, the computer is enabled to execute the technical solution of the block chain transaction-based multiple monitoring method in the foregoing embodiments. Computer-readable storage media include permanent and non-permanent, removable and non-removable media and may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The embodiment of the present application further provides a computer program product, where the computer program product includes a computer program stored in a computer-readable storage medium, and the computer program can be read by at least one processor from the computer-readable storage medium, and when the computer program is executed by the at least one processor, the technical solution of the block chain transaction-based multiple monitoring method in the foregoing embodiments can be implemented.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art to which the present application pertains. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (14)

1. A method for multi-monitoring based on blockchain transactions, comprising:
the financial institution serving as the blockchain node encrypts the user transaction according to the supervision key of the financial institution to construct blockchain transaction;
any one of the plurality of monitoring organizations acquires the monitoring key of the next monitoring organization step by step until the monitoring key of the direct monitoring organization of the financial organization is acquired, and the monitoring key of the financial organization is calculated according to the monitoring key of the direct monitoring organization; at least one highest supervising authority and at least one direct supervising authority among the plurality of supervising authorities;
and any supervision organization calculates a key of the blockchain transaction according to the supervision key of the financial institution, and decrypts the blockchain transaction through the key so as to supervise the blockchain transaction.
2. The method for multi-custody based blockchain transactions according to claim 1, wherein prior to a financial institution constructing a blockchain transaction, the method further comprises:
generating a supervision key of the highest supervision organization, and generating a supervision key of a next level supervision organization according to the supervision key of the highest supervision organization;
a financial institution's supervisory key is generated.
3. The method for multi-custody based on blockchain transactions according to claim 2, wherein said generating a custody key of a financial institution includes:
when the financial institution has only one direct supervision institution, generating a supervision key of the financial institution according to the supervision key of the direct supervision institution;
when the financial institution has a plurality of direct supervision institutions, randomly generating the supervision keys of the financial institution, wherein the supervision keys of the financial institution and the supervision keys of the direct supervision institutions form a collateral system unsolvable function family.
4. The method of claim 3, wherein the financial institution as the blockchain node encrypts the user transaction according to the financial institution's administrative key, comprising:
the financial institution generates parameters or keys required by block chain transaction privacy protection according to the supervision keys of the financial institution;
and encrypting the user transaction according to the parameter or the key.
5. The method of claim 4, wherein the financial institution generates parameters or keys required for blockchain transaction privacy protection based on the financial institution's administrative key, comprising:
using a supervision key of a financial institution as a random number seed to generate a random large integer, using the random large integer as a starting point of prime number search to determine a prime number, and calculating parameters required by block chain transaction by using the prime number;
and taking the supervision key of the financial institution as a random number seed, and generating a key required by block chain transaction privacy protection by adopting a pseudo-random number generation function.
6. The method of claim 3, wherein the constructing a blockchain transaction comprises:
if the financial institution has a plurality of direct supervision institutions, when the financial institution constructs the blockchain transaction, the blockchain transaction comprises the description of a function h, wherein the function h is obtained by sampling from a collateral system unsolvable function family formed by the supervision key of the financial institution and the supervision key of the direct supervision institution, and the function h is collected
Figure FDA0003864960620000021
The mapping value of (C) is K Fi
Wherein PRF denotes a pseudo random number generating function, F i Representing a financial institution, N j1 、N jk Denotes the direct supervision agency, K Nj1 、K Njk Supervision Key, ID, representing a direct supervision Authority Fi Representing a financial institution, K Fi Representing the administrative key of the financial institution.
7. The method for multi-supervision of blockchain transaction according to claim 6, wherein the calculating of the supervision key of the financial institution according to the supervision key of the direct supervision institution comprises:
if the financial institution has a plurality of direct monitoring institutions, the monitoring key of the direct monitoring institution is substituted into the function h described in the block chain transaction, and the monitoring key of the financial institution is obtained through calculation.
8. The method as claimed in claim 5, wherein any supervising entity calculates the key of the blockchain transaction according to the supervising key of the financial institution, and the method comprises:
the supervising organization uses the supervising secret key of the financial institution as a random seed number to generate a random large integer, uses the random large integer as a starting point of prime number searching to determine a prime number, and calculates according to the prime number to obtain the secret key of block chain transaction.
9. A system for multi-custody based on blockchain transactions, comprising:
the financial institution is used as a block chain node and used for encrypting the user transaction according to the supervision key of the financial institution and constructing the block chain transaction; and
a plurality of regulatory agencies;
at least one highest supervising authority and at least one direct supervising authority in the plurality of supervising authorities;
any of a plurality of regulatory agencies are configured to:
acquiring the supervision key of the next level supervision mechanism step by step until the supervision key of the direct supervision mechanism is acquired;
calculating to obtain a supervision key of the financial institution according to the supervision key of the direct supervision institution;
and calculating a key of the blockchain transaction according to the supervision key of the financial institution, and decrypting the blockchain transaction through the key to supervise the blockchain transaction.
10. The system for multiple custody of blockchain transactions according to claim 9, wherein prior to a financial institution constructing a blockchain transaction:
the highest supervision mechanism generates a supervision key of the highest supervision mechanism, and a pseudo-random number generating function is used for generating a supervision key of a next level supervision mechanism according to the supervision key of the highest supervision mechanism;
under the condition that the financial institution only has one direct supervision institution, the direct supervision institution generates a supervision key of the financial institution according to the supervision key of the direct supervision institution;
under the condition that the financial institution has a plurality of direct supervision institutions, the financial institution randomly generates the supervision key of the financial institution, and the supervision key of the financial institution and the supervision key of the direct supervision institution form a collateral system irresolvable function family.
11. The system of claim 10, wherein the encryption of the user transaction according to the financial institution's administrative key comprises:
the financial institution takes the supervision key of the financial institution as a random number seed to generate a random large integer, the random large integer is taken as the initial point of prime number search to determine a prime number, and the prime number is utilized to calculate parameters required by block chain transaction privacy protection;
taking a supervision key of a financial institution as a random number seed, and generating a key required by block chain transaction privacy protection by adopting a pseudo-random number generation function;
and encrypting the user transaction according to the parameter or the key.
12. The system of claim 11, wherein any of the plurality of supervisors generates a large random integer as the random number seed according to the supervising key of the financial institution, determines a prime number using the large random integer as the starting point of the prime number search, and calculates the key of the blockchain transaction according to the prime number.
13. A computer-readable storage medium having stored thereon computer instructions for implementing the method of multi-custody based blockchain transactions of any one of claims 1 to 8 when executed by a processor.
14. A computer program product comprising a computer program which, when executed by a processor, implements the method of multi-supervision over blockchain transactions according to any one of claims 1 to 8.
CN202211177023.0A 2022-09-26 2022-09-26 Multi-supervision method, system and storage medium based on blockchain transaction Active CN115550026B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211177023.0A CN115550026B (en) 2022-09-26 2022-09-26 Multi-supervision method, system and storage medium based on blockchain transaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211177023.0A CN115550026B (en) 2022-09-26 2022-09-26 Multi-supervision method, system and storage medium based on blockchain transaction

Publications (2)

Publication Number Publication Date
CN115550026A true CN115550026A (en) 2022-12-30
CN115550026B CN115550026B (en) 2023-07-04

Family

ID=84730147

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211177023.0A Active CN115550026B (en) 2022-09-26 2022-09-26 Multi-supervision method, system and storage medium based on blockchain transaction

Country Status (1)

Country Link
CN (1) CN115550026B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106777923A (en) * 2016-11-30 2017-05-31 谭小刚 Information for hospital supervising platform and monitoring and managing method
CN110365475A (en) * 2019-06-21 2019-10-22 深圳壹账通智能科技有限公司 Block chain two-stage monitoring and managing method, device, equipment and storage medium
CN111327597A (en) * 2020-01-21 2020-06-23 暨南大学 Digital evidence obtaining method based on block chain privacy protection and fine-grained access control
CN111461712A (en) * 2020-03-17 2020-07-28 江苏华能智慧能源供应链科技有限公司 Transaction privacy protection and hierarchical supervision under block chain supply chain financial scenario
CN112132577A (en) * 2020-09-16 2020-12-25 建信金融科技有限责任公司 Multi-supervision transaction processing method and device based on block chain
WO2021011282A1 (en) * 2019-07-12 2021-01-21 Mord Benjamin Allan Custodial integrity for virtual digital assets and related technologies
US20210073913A1 (en) * 2019-09-06 2021-03-11 Bosonic, Inc. System and method of providing a block chain-based recordation process
CN112507363A (en) * 2020-12-15 2021-03-16 平安科技(深圳)有限公司 Data supervision method, device and equipment based on block chain and storage medium
CN112751675A (en) * 2019-10-30 2021-05-04 深圳市网心科技有限公司 Information monitoring method, system, equipment and storage medium based on block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106777923A (en) * 2016-11-30 2017-05-31 谭小刚 Information for hospital supervising platform and monitoring and managing method
CN110365475A (en) * 2019-06-21 2019-10-22 深圳壹账通智能科技有限公司 Block chain two-stage monitoring and managing method, device, equipment and storage medium
WO2021011282A1 (en) * 2019-07-12 2021-01-21 Mord Benjamin Allan Custodial integrity for virtual digital assets and related technologies
US20210073913A1 (en) * 2019-09-06 2021-03-11 Bosonic, Inc. System and method of providing a block chain-based recordation process
CN112751675A (en) * 2019-10-30 2021-05-04 深圳市网心科技有限公司 Information monitoring method, system, equipment and storage medium based on block chain
CN111327597A (en) * 2020-01-21 2020-06-23 暨南大学 Digital evidence obtaining method based on block chain privacy protection and fine-grained access control
CN111461712A (en) * 2020-03-17 2020-07-28 江苏华能智慧能源供应链科技有限公司 Transaction privacy protection and hierarchical supervision under block chain supply chain financial scenario
CN112132577A (en) * 2020-09-16 2020-12-25 建信金融科技有限责任公司 Multi-supervision transaction processing method and device based on block chain
CN112507363A (en) * 2020-12-15 2021-03-16 平安科技(深圳)有限公司 Data supervision method, device and equipment based on block chain and storage medium

Also Published As

Publication number Publication date
CN115550026B (en) 2023-07-04

Similar Documents

Publication Publication Date Title
Cui et al. Attribute-based storage supporting secure deduplication of encrypted data in cloud
KR102627049B1 (en) Computer-implemented method for generating threshold vaults
Liu et al. Traceable-then-revocable ciphertext-policy attribute-based encryption scheme
CN109359470A (en) Secure calculation method and device, electronic equipment
Alowolodu et al. Elliptic curve cryptography for securing cloud computing applications
CN106161034A (en) Use the RSA deciphering of multiplication privacy share
CN104901942A (en) Distributed access control method for attribute-based encryption
JP2010220212A (en) Securing communications sent by first user to second user
CN105071937A (en) Ciphertext poly attribute base encryption method having efficient attribute revocation capability
CN110086615A (en) A kind of more authorized party's ciphertext policy ABE base encryption methods of distribution that medium is obscured
Kroll et al. Secure protocols for accountable warrant execution
CN111953483A (en) Multi-authority access control method based on criterion
Suveetha et al. Ensuring confidentiality of cloud data using homomorphic encryption
CN115550026B (en) Multi-supervision method, system and storage medium based on blockchain transaction
Adleman et al. The use of public key cryptography in communication system design
Lerman et al. Key Management as a Service.
Li Research on Key Security Detection Method of Cross Domain Information Sharing Based on PKG Trust Gateway
Binu et al. Secret Sharing Schemes with Extended Capabilities and Applications
Gao et al. Deniably information-hiding encryptions secure against adaptive chosen ciphertext attack
Li et al. Role and time-based access control with efficient revocation for cloud storage
US7801302B2 (en) Cryptographic method and apparatus
Harkude et al. Security in Cloud Computing using Homomorphic Cryptography.
Ramprasath Dynamic Remote Data Auditing using Privacy Preserving Auditing Protocol in Cloud Environment
Kumar et al. Threshold extended ID3 algorithm
Han et al. Access Control Management of Information System based on Homomorphism and Blockchain Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant