CN115879135B - Bid data processing method, device, equipment and storage medium - Google Patents

Bid data processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN115879135B
CN115879135B CN202310010271.4A CN202310010271A CN115879135B CN 115879135 B CN115879135 B CN 115879135B CN 202310010271 A CN202310010271 A CN 202310010271A CN 115879135 B CN115879135 B CN 115879135B
Authority
CN
China
Prior art keywords
result
bidding
encryption
bid
homomorphic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310010271.4A
Other languages
Chinese (zh)
Other versions
CN115879135A (en
Inventor
陈海锋
李朝霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Unicom Cloud Data Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Unicom Cloud Data Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Digital Technology Co Ltd, Unicom Cloud Data Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202310010271.4A priority Critical patent/CN115879135B/en
Publication of CN115879135A publication Critical patent/CN115879135A/en
Application granted granted Critical
Publication of CN115879135B publication Critical patent/CN115879135B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application provides a bid-tendering data processing method, a device, equipment and a storage medium, wherein the method relates to the technical field of communication, is applied to a bid-tendering terminal and comprises the following steps: broadcasting bid requirement information and random numbers on a blockchain network; receiving a second encryption result sent by the first bidding terminal and a fourth encryption result sent by the second bidding terminal; respectively decrypting the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result; calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, and sending the first calculation result to a supervision terminal; receiving the difference between the first bidding end quotation and the second bidding end quotation sent by the supervision end; and determining the bid winning result according to the difference between the bid price of the first bidding end and the bid price of the second bidding end, thereby improving the safety and fairness of bidding.

Description

Bid data processing method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a bid and ask data processing method, apparatus, device, and storage medium.
Background
With the development of computer technology, bidding is gradually started to utilize the internet technology, and bidding information is published through a network system. The bidding terminal logs in the electronic system for bidding, and the bidding terminal publishes the bidding condition through the electronic system after checking and auditing the bidding information.
Currently, in the prior art, when bidding to a bidding end, bidding data such as quotation is usually directly sent to an electronic system to be transmitted to the bidding end.
However, the bidding data in the prior art is easy to leak, and bidding safety and fairness are low.
Disclosure of Invention
The application provides a bidding data processing method, device, equipment and storage medium, which are used for solving the technical problems of easy leakage of bidding data, low bidding safety and low fairness in the prior art.
In a first aspect, the present application provides a bid-tendering data processing method, applied to a bid-tendering terminal, including:
broadcasting bid requirement information and random numbers on a blockchain network;
receiving a second encryption result sent by a first bidding terminal and a fourth encryption result sent by the second bidding terminal, wherein the second encryption result is a homomorphic encryption public key sent by a supervision terminal through a blockchain network after the first bidding terminal receives the bidding demand information and the random number, carrying out encryption processing on the sum of the random number and the quotation of the first bidding terminal according to the homomorphic encryption public key to obtain a first encryption result, adopting the bidding terminal public key, carrying out encryption processing on the first encryption result through a preset algorithm to obtain a second encryption result, and sending the second encryption result to the bidding terminal; the fourth encryption result is that after the second bidding end receives the bidding demand information and the random number, a homomorphic encryption public key sent by a supervision end is obtained through a blockchain network, encryption processing is carried out on the sum of the random number and the second bidding end quotation according to the homomorphic encryption public key to obtain a third encryption result, encryption processing is carried out on the third encryption result through a preset algorithm by adopting the bidding end public key to obtain a fourth encryption result, and the fourth encryption result is sent to the bidding end;
Respectively decrypting the second encryption result and the fourth encryption result to obtain the first encryption result and the third encryption result;
calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to a supervision terminal, enabling the supervision terminal to decrypt the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding terminal quotation and the second bidding terminal quotation, and sending the difference between the first bidding terminal quotation and the second bidding terminal quotation to a bidding terminal;
receiving a difference between the first bid side offer and the second bid side offer;
and determining a winning result according to the difference between the first bidding end quotation and the second bidding end quotation.
Here, the bidding terminal method provided by the embodiment of the application applies homomorphic technology to the comparison of bidding results, the bidding terminal receives bidding offers of two bidding terminals after homomorphic encryption, determines the bidding results by comparing the bidding prices after homomorphic encryption, and obtains the bidding results without knowing the bidding prices through homomorphic comparison. In order to ensure the public fairness of bidding, a supervision terminal is added, homomorphism encrypted public and private key pairs are kept through the supervision terminal, the homomorphism encrypted private keys are issued by the supervision terminal, so that the bidding terminal with encrypted data does not have decrypted private keys, and the supervision terminal with private keys does not have bidding encrypted data, so that any one terminal cannot obtain bidding price before bidding results come out, meanwhile, in order to improve the safety of bidding data, the supervision terminal is prevented from finally obtaining real bidding price for analysis, the bidding terminal is added with random numbers sent by the bidding terminal before quotation is sent, and the possibility that the supervision terminal uses massive data for attack test to obtain final bidding results is avoided. The bidding data is not easy to leak, and the bidding safety and fairness are improved.
Optionally, after determining the bid result according to the difference between the first bid side bid and the second bid side bid, the method further includes: the first encryption result and the third encryption result are respectively sent to the supervision terminal, so that the supervision terminal respectively decrypts the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and the first homomorphic result and the third homomorphic result are sent to the bid-inviting terminal; and calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quotation and the second bidding end quotation, and determining whether the bidding result is effective according to the comparison result.
After the bid-winning result is determined, the first encryption result and the third encryption result are sent to the supervising end, the supervising end is enabled to conduct decryption processing respectively, the first homomorphic result and the third homomorphic result are obtained and sent to the bidding end, the bidding end conducts validity judgment according to the difference between the first homomorphic result and the third homomorphic result and the difference between the bidding price of the first bidding end and the bidding price of the second bidding end, whether false or wrong data exist in the transmission process is determined, and safety and fairness of bidding data are further guaranteed.
Optionally, after determining the bid result according to the difference between the first bid side bid and the second bid side bid, the method further includes: the first encryption result is sent to the supervision terminal, so that the supervision terminal decrypts the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, and the first homomorphic result is sent to the bid-inviting terminal; and encrypting the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is effective or not according to the comparison result.
After the bid-winning result is determined, the first encryption result is sent to the supervision terminal, the supervision terminal carries out decryption processing to obtain a first homomorphic result, the first homomorphic result is sent to the bid-winning terminal, the bid-winning terminal carries out homomorphic encryption to obtain a first homomorphic verification result, the first homomorphic verification result is compared with the first encryption result obtained in the transmission process, whether the situation of fake or wrong data exists in the transmission process can be determined, and safety and fairness of bid-winning data are further guaranteed.
Optionally, after determining the bid result according to the difference between the first bid side bid and the second bid side bid, the method further includes: the winning bid results are broadcast over the blockchain network in a private key signed manner.
In a second aspect, an embodiment of the present application provides a bid data processing method, applied to a supervision terminal, including:
broadcasting homomorphic encryption public keys on a blockchain network;
receiving a first calculation result sent by a bidding terminal, wherein the first calculation result is that the bidding terminal issues bidding demand information and random numbers on a blockchain network, receives a second encryption result sent by the first bidding terminal and a fourth encryption result sent by the second bidding terminal, respectively carries out decryption processing on the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result, calculates the difference between the first encryption result and the third encryption result to obtain a first calculation result, and sends the first calculation result to the supervision terminal; the second encryption result is that after the first bidding end receives the bidding demand information and the random number, a homomorphic encryption public key sent by a supervision end is obtained through a blockchain network, encryption processing is carried out on the sum of the random number and the bidding price of the first bidding end according to the homomorphic encryption public key to obtain a first encryption result, encryption processing is carried out on the first encryption result through a preset algorithm by adopting the bidding end public key to obtain a second encryption result, and the second encryption result is sent to the bidding end; the fourth encryption result is that after the second bidding end receives the bidding demand information and the random number, a homomorphic encryption public key sent by a supervision end is obtained through a blockchain network, encryption processing is carried out on the sum of the random number and the second bidding end quotation according to the homomorphic encryption public key to obtain a third encryption result, encryption processing is carried out on the third encryption result through a preset algorithm by adopting the bidding end public key to obtain a fourth encryption result, and the fourth encryption result is sent to the bidding end;
Decrypting the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding end quotation and the second bidding end quotation;
and sending the difference between the first bid side quotation and the second bid side quotation to a bid-tendering end, so that the bid-tendering end determines a bid-winning result according to the difference between the first bid side quotation and the second bid side quotation.
Here, in the embodiment of the application, the homomorphic encrypted public and private key pair is kept by the supervising end, and the homomorphic encrypted private key is issued by the supervising end, so that the bidding end with encrypted data does not have decrypted private keys, and the supervising end with private keys does not have bidding encrypted data, so that any party cannot obtain bidding price before bidding results come out, bidding data are not easy to leak, and safety and fairness of bidding data are improved.
Optionally, after the sending the difference between the first bid side bid and the second bid side bid to a bid side, the bid side determines a bid result according to the difference between the first bid side bid and the second bid side bid, the method further includes: receiving a first encryption result and a third encryption result which are sent by the bid-inviting terminal; and respectively decrypting the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, sending the first homomorphic result and the third homomorphic result to the bidding end so that the bidding end calculates the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the bid of the first bidding end and the bid of the second bidding end, and determining whether the bidding result is effective or not according to the comparison result.
Optionally, after the sending the difference between the first bid side bid and the second bid side bid to a bid side, the bid side determines a bid result according to the difference between the first bid side bid and the second bid side bid, the method further includes: receiving a first encryption result sent by the bidding terminal; and decrypting the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, sending the first homomorphic result to the bidding end so that the bidding end encrypts the first homomorphic result through the homomorphic encryption private key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is effective or not according to the comparison result.
In a third aspect, an embodiment of the present application provides a bidding data processing apparatus, applied to a bidding terminal, the apparatus including:
the first broadcasting module is used for broadcasting the bid-inviting demand information and the random number on the blockchain network;
the first receiving module is used for receiving a second encryption result sent by a first bidding terminal and a fourth encryption result sent by the second bidding terminal, wherein the second encryption result is a homomorphic encryption public key sent by a supervision terminal through a blockchain network after the first bidding terminal receives the bidding demand information and the random number, the sum of the random number and the quotation of the first bidding terminal is encrypted according to the homomorphic encryption public key to obtain a first encryption result, the first encryption result is encrypted by a preset algorithm to obtain a second encryption result, the second encryption result is sent to the bidding terminal, the fourth encryption result is a homomorphic encryption public key sent by the supervision terminal after the second bidding terminal receives the bidding demand information and the random number, the sum of the random number and the quotation of the second bidding terminal is encrypted by the homomorphic encryption public key to obtain a third encryption result, and the fourth encryption result is encrypted by the preset algorithm to the fourth bidding terminal;
The first decryption module is used for respectively decrypting the second encryption result and the fourth encryption result to obtain the first encryption result and the third encryption result;
the first processing module is used for calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to a supervision terminal so that the supervision terminal can decrypt the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding terminal quotation and the second bidding terminal quotation, and sending the difference between the first bidding terminal quotation and the second bidding terminal quotation to a bidding terminal;
a second receiving module for receiving a difference between the first bid side bid and the second bid side bid;
and the result determining module is used for determining a winning bid result according to the difference between the first bidding end quotation and the second bidding end quotation.
Optionally, after the result determining module determines the bid result according to the difference between the first bid side bid and the second bid side bid, the apparatus further includes:
the first validity authentication module is used for respectively sending the first encryption result and the third encryption result to the supervision terminal so that the supervision terminal can respectively decrypt the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and sending the first homomorphic result and the third homomorphic result to the bidding terminal; and calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quotation and the second bidding end quotation, and determining whether the bidding result is effective according to the comparison result.
Optionally, after the result determining module determines the bid result according to the difference between the first bid side bid and the second bid side bid, the apparatus further includes:
the second validity authentication module is used for sending the first encryption result to the supervision terminal so that the supervision terminal can decrypt the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result and send the first homomorphic result to the bidding terminal; and encrypting the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is effective or not according to the comparison result.
Optionally, after the result determining module determines the bid result according to the difference between the first bid side bid and the second bid side bid, the apparatus further includes:
and the third broadcasting module is used for broadcasting the winning result on the blockchain network in a private key signature mode.
In a fourth aspect, an embodiment of the present application provides a bidding data processing apparatus, applied to a supervising end, including:
The second broadcasting module is used for broadcasting the homomorphic encryption public key on the blockchain network;
a third receiving module, configured to receive a first calculation result sent by a bid-bidding end, where the first calculation result is that the bid-bidding end issues bid-bidding requirement information and a random number on a blockchain network, receive a second encryption result sent by the first bid-bidding end and a fourth encryption result sent by the second bid-bidding end, decrypt the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result, calculate a difference between the first encryption result and the third encryption result, obtain a first calculation result, send the first calculation result to the supervising end, and the second encryption result is that the first bid-bidding end obtains a homomorphic encryption public key sent by the supervising end through the blockchain network after receiving the bid-bidding requirement information and the random number, encrypting the sum of the random number and the first bid side quotation according to the homomorphic encryption public key to obtain a first encryption result, encrypting the first encryption result by adopting a bid side public key through a preset algorithm to obtain a second encryption result, sending the second encryption result to the bid side, obtaining the homomorphic encryption public key sent by a supervision terminal through a block chain network after the second bid side receives the bid requirement information and the random number, encrypting the sum of the random number and the second bid side quotation according to the homomorphic encryption public key to obtain a third encryption result, encrypting the third encryption result by adopting the bid side public key through the preset algorithm to obtain a fourth encryption result, and sending the fourth encryption result to the bid side;
The second decryption module is used for decrypting the first calculation result through the homomorphic encryption private key to obtain the difference between the first bidding end quotation and the second bidding end quotation;
and the sending module is used for sending the difference between the first bidding end quotation and the second bidding end quotation to a bidding end so that the bidding end can determine a winning result according to the difference between the first bidding end quotation and the second bidding end quotation.
Optionally, after the sending module sends the difference between the first bid end offer and the second bid end offer to a bid end, so that the bid end determines a bid result according to the difference between the first bid end offer and the second bid end offer, the apparatus further includes:
a third validity authentication module, configured to: receiving a first encryption result and a third encryption result which are sent by the bid-inviting terminal; and respectively decrypting the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, sending the first homomorphic result and the third homomorphic result to the bidding end so that the bidding end calculates the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the bid of the first bidding end and the bid of the second bidding end, and determining whether the bidding result is effective or not according to the comparison result.
Optionally, after the sending module sends the difference between the first bid end offer and the second bid end offer to a bid end, so that the bid end determines a bid result according to the difference between the first bid end offer and the second bid end offer, the apparatus further includes:
a fourth validity authentication module configured to: receiving a first encryption result sent by the bidding terminal; and decrypting the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, sending the first homomorphic result to the bidding end so that the bidding end encrypts the first homomorphic result through the homomorphic encryption private key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is effective or not according to the comparison result.
In a fifth aspect, the present application provides a bidding data processing apparatus comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executes computer-executable instructions stored in the memory such that the at least one processor performs the bid data processing method as described above in the first aspect and the various possible designs of the first aspect.
In a sixth aspect, the present application provides a bidding data processing apparatus comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executes computer-executable instructions stored by the memory such that the at least one processor performs the bid data processing method as described above in the second aspect and the various possible designs of the second aspect.
In a seventh aspect, the present application provides a computer readable storage medium having stored therein computer executable instructions which, when executed by a processor, implement the bid data processing method according to the first aspect and the various possible designs of the first aspect.
In an eighth aspect, the present application provides a computer readable storage medium having stored therein computer executable instructions which, when executed by a processor, implement the bid data processing method according to the above second aspect and the various possible designs of the second aspect.
In a ninth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the bid data processing method of the first aspect and the various possible designs of the first aspect as described above.
In a tenth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the bid data processing method of the above second aspect and the various possible designs of the second aspect.
The bid-bidding data processing method, device, equipment and storage medium, wherein the method applies homomorphism technology to the comparison of bid results, the bid-bidding ends receive bid offers of two bid ends after homomorphism encryption, bid prices after homomorphism encryption are compared to determine bid results, and bid results are obtained under the condition that bid prices are not known through homomorphism comparison. In order to ensure the public fairness of bidding, a supervision terminal is added, homomorphism encrypted public and private key pairs are kept through the supervision terminal, the homomorphism encrypted private keys are issued by the supervision terminal, so that the bidding terminal with encrypted data does not have decrypted private keys, and the supervision terminal with private keys does not have bidding encrypted data, so that any one terminal cannot obtain bidding price before bidding results come out, meanwhile, in order to improve the safety of bidding data, the supervision terminal is prevented from finally obtaining real bidding price for analysis, the bidding terminal is added with random numbers sent by the bidding terminal before quotation is sent, and the possibility that the supervision terminal uses massive data for attack test to obtain final bidding results is avoided. The bidding data is not easy to leak, and the bidding safety and fairness are improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive faculty for a person skilled in the art.
FIG. 1 is a schematic diagram of a bid and ask data processing system architecture according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a bid and ask data processing method according to an embodiment of the present application;
FIG. 3 is a flow chart of another bid and ask data processing method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a bid and ask data processing device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a bidding data processing apparatus according to an embodiment of the present application.
Specific embodiments of the present disclosure have been shown by way of the above drawings and will be described in more detail below. These drawings and the written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the disclosed concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The terms "first," "second," "third," and "fourth" and the like in the description and in the claims of this application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region, and provide corresponding operation entries for the user to select authorization or rejection.
With the development of computer technology, bidding is gradually started to utilize the internet technology, and bidding information is published through a network system. The bidding terminal logs in the electronic system for bidding, and the bidding terminal publishes the bidding condition through the electronic system after checking and auditing the bidding information. Currently, in the prior art, when bidding to a bidding end, bidding data such as quotation is usually directly sent to an electronic system to be transmitted to the bidding end. In the prior art, bidding data is easy to leak, and bidding safety and fairness are low.
In order to solve the technical problems, the embodiments of the present application provide a bid-tendering data processing method, apparatus, device, and storage medium, in which a supervision terminal is added, a homomorphic encrypted public-private key pair is kept by a supervision terminal, the homomorphic encrypted private key is issued by the supervision terminal, so that the bid terminal with encrypted data has no decrypted private key, and the supervision terminal with private key has no bid-tendering encrypted data, so that any terminal cannot obtain bid price before the bid result comes out, and meanwhile, in order to improve the security of bid-tendering data, the supervision terminal is prevented from finally obtaining real bid price for analysis, the bid terminal is prevented from adding a random number sent by the bid terminal before sending a bid, and the possibility that the supervision terminal uses massive data to perform an attack test to obtain the final bid result is avoided. The bidding data is not easy to leak, and the bidding safety and fairness are improved.
Optionally, fig. 1 is a schematic diagram of a bid data processing system architecture according to an embodiment of the present application. As shown in fig. 1, the above architecture includes: a first bid side 101, a second bid side 102, a bid side 103 and a supervising side 104.
It will be appreciated that the number and specific structure of the second bidding end, the first bidding end and the bidding end may be determined according to practical situations, and fig. 1 is only schematic, and the number of the nodes is not specifically limited in the embodiment of the present application.
The number of bidding ends may be determined according to the actual situation, and only two bidding ends are taken as an example in fig. 1, and in the actual situation, more bidding ends or fewer bidding ends may be used.
The nodes are all nodes connected in the blockchain, the nodes can be cloud servers, servers or terminal equipment, and the like, and any two nodes can communicate through a blockchain network.
The second bidding end, the first bidding end, the supervision end and the bidding end can be arranged on the server or the terminal equipment, and the second bidding end, the first bidding end, the supervision end and the bidding end can also be the server or the terminal equipment.
Optionally, each bidding end (the first bidding end and the second bidding end), the supervising end and the bidding end are simultaneously accessed into the blockchain network and register own identity, that is to say, each bidding end, the supervising end and the bidding end issue own blockchain identification, identity identification and public key in a mode of broadcasting messages which need private key signature.
Optionally, the bidding terminal issues the bidding document to the blockchain network by using the broadcasting message signed by the private key.
Optionally, the supervising end locally generates a homomorphic encrypted public-private key pair, and then issues the homomorphic encrypted public key PK in the blockchain network by using a broadcast message signed by the private key.
Alternatively, all bidding sides and bidding sides can acquire the broadcast message sent by the supervising side. And then, carrying out private key signature authentication on the broadcast message, and if the authentication is passed, recording the homomorphic encrypted public key PK by all bidding terminals and bidding terminals.
Optionally, the bidding side sends a random number R into the blockchain network using a broadcast message signed by the private key, with the goal of giving the random number R to the bidding side.
It will be appreciated that the architecture illustrated by embodiments of the present application does not constitute a particular limitation on the architecture of the bidding data processing system. In other possible embodiments of the present application, the architecture may include more or fewer components than those illustrated, or some components may be combined, some components may be separated, or different component arrangements may be specifically determined according to the actual application scenario, and the present application is not limited herein. The components shown in fig. 1 may be implemented in hardware, software, or a combination of software and hardware.
In addition, the network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided in the embodiments of the present application, and as a person of ordinary skill in the art can know, with evolution of the network architecture and appearance of a new service scenario, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems.
The following description of the technical solutions of the present application will take several embodiments as examples, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is a flow chart of a bid data processing method provided in the embodiment of the present application, where the embodiment of the present application may be applied to the bid end 103 in fig. 1, where the bid end 103 may be a server or a terminal device, and a specific execution body may be determined according to an actual application scenario. As shown in fig. 2, the method comprises the steps of:
s201: the bid requirement information and the random number are broadcast over a blockchain network.
Alternatively, the random number may be generated according to a hashing algorithm.
Optionally, the broadcast message signed by the private key of the signer is issued into the blockchain network.
S202: and receiving the second encryption result sent by the first bidding terminal and the fourth encryption result sent by the second bidding terminal.
The second encryption result is that after the first bidding end receives bidding demand information and the random number, the homomorphic encryption public key sent by the supervising end is obtained through the blockchain network, the sum of the random number and the bidding price of the first bidding end is encrypted according to the homomorphic encryption public key to obtain the first encryption result, the bidding public key is adopted to encrypt the first encryption result through a preset algorithm to obtain the second encryption result, and the second encryption result is sent to the bidding end.
The fourth encryption result is that after the second bidding end receives bidding demand information and the random number, the homomorphic encryption public key sent by the supervising end is obtained through the blockchain network, the sum of the random number and the bid of the second bidding end is encrypted according to the homomorphic encryption public key to obtain a third encryption result, the bidding end public key is adopted to encrypt the third encryption result through a preset algorithm to obtain a fourth encryption result, and the fourth encryption result is sent to the bidding end.
In one possible implementation, the manner in which the bidding side sends the second encryption result and the fourth result is as follows:
All bidding terminals and bidding terminals can acquire the broadcast message sent by the supervision terminal. And then, carrying out private key signature authentication on the broadcast message, and if the authentication is passed, recording the homomorphic encrypted public key PK by all bidding terminals and bidding terminals.
The bidding side sends a random number R to the blockchain network in the form of a broadcast message signed with a private key, with the goal of giving the random number R to the bidding side.
The bidding terminal uses a broadcast message mode of private key signature to issue bidding demand information, after receiving the broadcast message, the bidding terminal carries out authentication of private key signature on the broadcast message, if the authentication is passed, the bidding is carried out according to the demand, the bidding is carried out by a first bidding terminal, namely, a+R (bidding+random number), and the bidding is carried out by a second bidding terminal, namely, b+R.
The first bidding end encrypts a (or encrypts a+R) by using a homomorphic public key PK to obtain a first result Epk (a+R), encrypts the encrypted result by using a public key of the bidding end according to a preset algorithm to obtain a second encrypted result, and then sends the second encrypted result to the bidding end.
The second bidding end encrypts b by using homomorphic public key PK to obtain Epk (b+R), encrypts the encryption result by using the public key of the bidding end according to a preset algorithm to obtain a fourth encryption result, and then sends the fourth encryption result to the bidding end.
S203: and respectively carrying out decryption processing on the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result.
Optionally, the bid-signing end obtains a second encryption result and a fourth encryption result, then decrypts the second encryption result and the fourth encryption result by using own public keys according to a pre-agreed algorithm to obtain Epk (a+r) and Epk (b+r), then calculates a first calculation result dr=epk (a+r) -Epk (b+r), signs the first calculation result by using a private key of the bid-signing end, and sends the first calculation result to the supervision end.
S204: and calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to a supervision terminal, enabling the supervision terminal to decrypt the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding terminal quotation and the second bidding terminal quotation, and sending the difference between the first bidding terminal quotation and the second bidding terminal quotation to a bidding terminal.
In one possible implementation, the difference between the first bid side bid and the second bid side is as follows:
after receiving the information containing the first calculation result, the supervision terminal verifies the private key signature of the information, and after the verification is passed, the supervision terminal decrypts the DR by using the homomorphic private key of the supervision terminal, finally obtains a+R-b+R=a-b, and the supervision terminal feeds back the result of the a-b to the bidding terminal.
S205: a difference between the first bid side bid and the second bid side bid is received.
S206: and determining a bid winning result according to the difference between the bid price of the first bidding side and the bid price of the second bidding side.
The bid price of which bidding end is high can be judged according to the positive and negative of the difference between the bid price of the first bidding end and the bid price of the second bidding end, so that the bid winning result is determined.
Optionally, after determining the bid result according to the difference between the first bid side bid and the second bid side bid, the method further includes: the winning bid results are broadcast over the blockchain network in a private key signed manner.
Optionally, the bid-winning result is issued in a broadcast mode of private key signature.
Here, the bidding terminal method provided by the embodiment of the application applies homomorphic technology to the comparison of bidding results, the bidding terminal receives bidding offers of two bidding terminals after homomorphic encryption, determines the bidding results by comparing the bidding prices after homomorphic encryption, and obtains the bidding results without knowing the bidding prices through homomorphic comparison. In order to ensure the public fairness of bidding, a supervision terminal is added, homomorphism encrypted public and private key pairs are kept through the supervision terminal, the homomorphism encrypted private keys are issued by the supervision terminal, so that the bidding terminal with encrypted data does not have decrypted private keys, and the supervision terminal with private keys does not have bidding encrypted data, so that any one terminal cannot obtain bidding price before bidding results come out, meanwhile, in order to improve the safety of bidding data, the supervision terminal is prevented from finally obtaining real bidding price for analysis, the bidding terminal is added with random numbers sent by the bidding terminal before quotation is sent, and the possibility that the supervision terminal uses massive data for attack test to obtain final bidding results is avoided. The bidding data is not easy to leak, and the bidding safety and fairness are improved.
Optionally, after determining the bid result according to the difference between the first bid side bid and the second bid side bid, the method further includes: the first encryption result and the third encryption result are respectively sent to the supervision terminal, so that the supervision terminal respectively decrypts the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and the first homomorphic result and the third homomorphic result are sent to the bidding terminal; and calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quotation and the second bidding end quotation, and determining whether the bidding result is effective or not according to the comparison result.
In one possible implementation manner, the bidding terminal sends the first encryption result Epk (a+r) and the third encryption result Epk (b+r) to the supervising terminal respectively.
The supervision terminal calculates the first homomorphic result (a+R) 'and the third homomorphic result (b+R)' by adopting homomorphic private keys for the Epk (a+R) and the Epk (b+R) respectively, and sends the first homomorphic result (a+R) 'and the third homomorphic result (b+R)' to the bidding terminal, and the bidding terminal calculates the difference (a+R) '- (b+R)' between the first homomorphic result and the third homomorphic result and compares the first homomorphic result with the second homomorphic result and the third homomorphic result with the first homomorphic result, if the first homomorphic result and the third homomorphic result are the same, the bidding is effective.
After the bid-winning result is determined, the first encryption result and the third encryption result are sent to the supervising end, the supervising end is enabled to conduct decryption processing respectively, the first homomorphic result and the third homomorphic result are obtained and sent to the bidding end, the bidding end conducts validity judgment according to the difference between the first homomorphic result and the third homomorphic result and the difference between the bidding price of the first bidding end and the bidding price of the second bidding end, whether false or wrong data exist in the transmission process is determined, and safety and fairness of bidding data are further guaranteed.
Optionally, after determining the bid result according to the difference between the first bid side bid and the second bid side bid, the method further includes: the first encryption result is sent to the supervision terminal, so that the supervision terminal decrypts the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, and the first homomorphic result is sent to the bid-inviting terminal; and encrypting the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is effective according to the comparison result.
In one possible implementation manner, the bidding terminal obtains a first homomorphic verification result Epk ((a+r) '), and verifies the first homomorphic verification result Epk ((a+r)') =epk (a+r) so as to avoid no cheating of the supervising terminal.
After the bid-winning result is determined, the first encryption result is sent to the supervision terminal, the supervision terminal carries out decryption processing to obtain a first homomorphic result, the first homomorphic result is sent to the bid-winning terminal, the bid-winning terminal carries out homomorphic encryption to obtain a first homomorphic verification result, the first homomorphic verification result is compared with the first encryption result obtained in the transmission process, whether the situation of fake or wrong data exists in the transmission process can be determined, and safety and fairness of bid-winning data are further guaranteed.
Alternatively, the true bid price a can be obtained by subtracting R from (a+r)' obtained by decryption. Or b is obtained in the same way.
Fig. 3 is a flow chart of another bid and ask data processing method provided in the embodiment of the present application, where the embodiment of the present application may be applied to the monitor 104 in fig. 1, where the monitor 104 may be a server or a terminal device, and a specific execution body may be determined according to an actual application scenario. As shown in fig. 3, the method comprises the steps of:
S301: the homomorphic encryption public key is broadcast over a blockchain network.
S302: and receiving a first calculation result sent by the bidding terminal.
The first calculation result is that the bidding end issues bidding requirement information and random numbers on the blockchain network, receives a second encryption result sent by the first bidding end and a fourth encryption result sent by the second bidding end, respectively decrypts the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result, calculates the difference between the first encryption result and the third encryption result to obtain a first calculation result, and sends the first calculation result to the supervision end.
The second encryption result is that after the first bidding end receives bidding demand information and the random number, the homomorphic encryption public key sent by the supervising end is obtained through the blockchain network, the sum of the random number and the bidding price of the first bidding end is encrypted according to the homomorphic encryption public key to obtain the first encryption result, the bidding public key is adopted to encrypt the first encryption result through a preset algorithm to obtain the second encryption result, and the second encryption result is sent to the bidding end.
The fourth encryption result is that after the second bidding end receives bidding demand information and the random number, the homomorphic encryption public key sent by the supervising end is obtained through the blockchain network, the sum of the random number and the bidding price of the second bidding end is encrypted according to the homomorphic encryption public key to obtain a third encryption result, the bidding public key is adopted to encrypt the third encryption result through a preset algorithm to obtain a fourth encryption result, and the fourth encryption result is sent to the bidding end;
S303: and decrypting the first calculation result through the homomorphic encryption private key to obtain the difference between the first bidding end quotation and the second bidding end quotation.
S304: and sending the difference between the first bid side quotation and the second bid side quotation to the bidding side, so that the bidding side determines a bid winning result according to the difference between the first bid side quotation and the second bid side quotation.
Optionally, after sending the difference between the first bid side bid and the second bid side bid to the bid side, the bid side determines the bid result according to the difference between the first bid side bid and the second bid side bid, the method further includes: receiving a first encryption result and a third encryption result which are sent by a bid-inviting terminal; the first encryption result and the third encryption result are respectively decrypted through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, the first homomorphic result and the third homomorphic result are sent to the bidding end, so that the bidding end calculates the difference between the first homomorphic result and the third homomorphic result, the difference between the first homomorphic result and the third homomorphic result is compared with the difference between the bidding end quotation and the second bidding end quotation, and whether the bidding result is effective or not is determined according to the comparison result.
Optionally, after sending the difference between the first bid side bid and the second bid side bid to the bid side, the bid side determines the bid result according to the difference between the first bid side bid and the second bid side bid, the method further includes: receiving a first encryption result sent by a bid-inviting terminal; and decrypting the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, sending the first homomorphic result to the bidding end, so that the bidding end encrypts the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is effective or not according to the comparison result.
Here, in the embodiment of the application, the homomorphic encrypted public and private key pair is kept by the supervising end, and the homomorphic encrypted private key is issued by the supervising end, so that the bidding end with encrypted data does not have decrypted private keys, and the supervising end with private keys does not have bidding encrypted data, so that any party cannot obtain bidding price before bidding results come out, bidding data are not easy to leak, and safety and fairness of bidding data are improved.
The embodiment of the application also provides a bidding processing device.
Fig. 4 is a schematic structural diagram of a bidding data processing apparatus provided in an embodiment of the present application, which is applied to a bidding terminal, as shown in fig. 4, where the apparatus in an embodiment of the present application includes: a first broadcasting module 401, a first receiving module 402, a first decrypting module 403, a first processing module 404, a second receiving module 405 and a result determining module 406. The bid data processing means may be a server or a terminal device, or a chip or an integrated circuit that realizes the functions of the server or the terminal device. Here, the division of the first broadcasting module 401, the first receiving module 402, the first decrypting module 403, the first processing module 404, the second receiving module 405, and the result determining module 406 is just one logical division, and the two may be integrated or independent physically.
The first broadcasting module is used for broadcasting the bid-inviting demand information and the random number on the blockchain network;
the first receiving module is used for receiving a second encryption result sent by the first bidding terminal and a fourth encryption result sent by the second bidding terminal, wherein the second encryption result is a homomorphic encryption public key sent by the supervising terminal through the blockchain network after the first bidding terminal receives bidding demand information and the random number, the sum of the random number and the first bidding terminal quotation is encrypted according to the homomorphic encryption public key to obtain a first encryption result, the bidding terminal public key is adopted to encrypt the first encryption result through a preset algorithm to obtain a second encryption result, the second encryption result is sent to the bidding terminal, the fourth encryption result is the homomorphic encryption public key sent by the supervising terminal after the second bidding terminal receives bidding demand information and the random number, the sum of the random number and the second bidding terminal is encrypted through the blockchain network to obtain a third encryption result, the bidding terminal public key is adopted to encrypt the third encryption result through the preset algorithm, and the fourth encryption result is obtained, and the fourth encryption result is sent to the bidding terminal;
The first decryption module is used for decrypting the second encryption result and the fourth encryption result respectively to obtain a first encryption result and a third encryption result;
the first processing module is used for calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to the supervising end so that the supervising end can decrypt the first calculation result through the homomorphic encryption private key to obtain the difference between the first bidding end quotation and the second bidding end quotation, and sending the difference between the first bidding end quotation and the second bidding end quotation to the bidding end;
the second receiving module is used for receiving the difference between the first bidding end quotation and the second bidding end quotation;
and the result determining module is used for determining the winning result according to the difference between the first bidding end quotation and the second bidding end quotation.
Optionally, after the result determining module determines the winning result according to the difference between the first bid side bid and the second bid side bid, the apparatus further includes:
the first validity authentication module is used for respectively sending the first encryption result and the third encryption result to the supervision terminal so that the supervision terminal can respectively decrypt the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and sending the first homomorphic result and the third homomorphic result to the bid-inviting terminal; and calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quotation and the second bidding end quotation, and determining whether the bidding result is effective or not according to the comparison result.
Optionally, after the result determining module determines the winning result according to the difference between the first bid side bid and the second bid side bid, the apparatus further includes:
the second validity authentication module is used for sending the first encryption result to the supervision terminal so that the supervision terminal can decrypt the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, and sending the first homomorphic result to the bidding terminal; and encrypting the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is effective according to the comparison result.
Optionally, after the result determining module determines the winning result according to the difference between the first bid side bid and the second bid side bid, the apparatus further includes:
and the third broadcasting module is used for broadcasting the winning bid result in a private key signature mode on the blockchain network.
The embodiment of the application also provides another bidding data processing device. The device applied to the supervision terminal comprises: the system comprises a second broadcasting module, a third receiving module, a second decryption module and a sending module. The bid data processing means may be a server or a terminal device, or a chip or an integrated circuit that realizes the functions of the server or the terminal device. Here, the second broadcasting module, the third receiving module, the second decrypting module and the transmitting module are only one logical function, and may be integrated or independent physically.
The second broadcasting module is used for broadcasting the homomorphic encryption public key on the blockchain network;
the system comprises a third receiving module, a supervision terminal, a first receiving module and a second receiving module, wherein the first receiving module is used for receiving a first calculation result sent by the supervision terminal, wherein the first calculation result is that the supervision terminal issues bid demand information and random numbers on a blockchain network, receives a second encryption result sent by the first bidding terminal and a fourth encryption result sent by the second bidding terminal, respectively carries out decryption processing on the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result, calculates the difference between the first encryption result and the third encryption result to obtain a first calculation result, sends the first calculation result to the supervision terminal, the second encryption result is that the first bidding terminal receives bid demand information and random numbers, carries out encryption processing on the sum of the random numbers and the first bidding terminal quoted by the public keys according to the homomorphic encryption public keys, carries out encryption processing on the sum of the first bidding terminal quoted by the first bidding terminal, obtains the second encryption result to the supervision terminal by adopting a preset algorithm, and the fourth encryption result is that the second bidding terminal receives the second bidding terminal and the random numbers at the second bidding terminal, carries out encryption processing on the second bidding terminal by adopting the homomorphic encryption public keys, and the public keys by adopting the preset bidding terminal to obtain the homomorphic encryption result sent by the second bidding terminal;
The second decryption module is used for decrypting the first calculation result through the homomorphic encryption private key to obtain the difference between the first bidding end quotation and the second bidding end quotation;
and the sending module is used for sending the difference between the first bidding end quotation and the second bidding end quotation to the bidding end so that the bidding end determines a winning result according to the difference between the first bidding end quotation and the second bidding end quotation.
Optionally, after the sending module sends the difference between the first bid side bid and the second bid side bid to the bid side, so that the bid side determines the bid result according to the difference between the first bid side bid and the second bid side bid, the apparatus further includes:
a third validity authentication module, configured to: receiving a first encryption result and a third encryption result which are sent by a bid-inviting terminal; the first encryption result and the third encryption result are respectively decrypted through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, the first homomorphic result and the third homomorphic result are sent to the bidding end, so that the bidding end calculates the difference between the first homomorphic result and the third homomorphic result, the difference between the first homomorphic result and the third homomorphic result is compared with the difference between the bidding end quotation and the second bidding end quotation, and whether the bidding result is effective or not is determined according to the comparison result.
Optionally, after the sending module sends the difference between the first bid side bid and the second bid side bid to the bid side, so that the bid side determines the bid result according to the difference between the first bid side bid and the second bid side bid, the apparatus further includes:
a fourth validity authentication module configured to: receiving a first encryption result sent by a bid-inviting terminal; and decrypting the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, sending the first homomorphic result to the bidding end, so that the bidding end encrypts the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is effective or not according to the comparison result.
Referring to fig. 5, a schematic diagram of a structure of a bid data processing device 500 suitable for use in implementing embodiments of the present disclosure is shown, the bid data processing device 500 may be a terminal device or a server. The terminal device may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a personal digital assistant (Personal Digital Assistant, PDA for short), a tablet (Portable Android Device, PAD for short), a portable multimedia player (Portable Media Player, PMP for short), an in-vehicle terminal (e.g., an in-vehicle navigation terminal), and the like, and a fixed terminal such as a digital TV, a desktop computer, and the like. The bidding data processing apparatus illustrated in fig. 5 is only one example and should not impose any limitation on the functionality and scope of use of the embodiments of the present disclosure.
As shown in fig. 5, the bidding data processing apparatus 500 may include a processing device (e.g., a central processor, a graphics processor, etc.) 501 that may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage device 508 into a random access Memory (Random Access Memory, RAM) 503. In the RAM 503, various programs and data required for the operation of the bidding data processing apparatus 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
In general, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 507 including, for example, a liquid crystal display (Liquid Crystal Display, abbreviated as LCD), a speaker, a vibrator, and the like; storage 508 including, for example, magnetic tape, hard disk, etc.; and communication means 509. The communication means 509 may allow the bidding data processing apparatus 500 to communicate wirelessly or by wire with other apparatuses to exchange data. Although fig. 5 illustrates bid data processing apparatus 500 with various means, it should be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 509, or from the storage means 508, or from the ROM 502. The above-described functions defined in the methods of the embodiments of the present disclosure are performed when the computer program is executed by the processing device 501.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be contained in the bidding data processing apparatus; or may exist alone without being assembled into the bidding data processing apparatus.
The computer readable medium carries one or more programs which, when executed by the bidding data processing apparatus, cause the bidding data processing apparatus to perform the method shown in the above-described embodiments.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a local area network (Local Area Network, LAN for short) or a wide area network (Wide Area Network, WAN for short), or it may be connected to an external computer (e.g., connected via the internet using an internet service provider).
In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (11)

1. A bid data processing method, applied to a bid end, comprising:
broadcasting bid requirement information and random numbers on a blockchain network;
receiving a second encryption result sent by a first bidding terminal and a fourth encryption result sent by the second bidding terminal, wherein the second encryption result is a homomorphic encryption public key sent by a supervision terminal through a blockchain network after the first bidding terminal receives the bidding demand information and the random number, carrying out encryption processing on the sum of the random number and the quotation of the first bidding terminal according to the homomorphic encryption public key to obtain a first encryption result, adopting the bidding terminal public key, carrying out encryption processing on the first encryption result through a preset algorithm to obtain a second encryption result, and sending the second encryption result to the bidding terminal; the fourth encryption result is that after the second bidding end receives the bidding demand information and the random number, a homomorphic encryption public key sent by a supervision end is obtained through a blockchain network, encryption processing is carried out on the sum of the random number and the second bidding end quotation according to the homomorphic encryption public key to obtain a third encryption result, encryption processing is carried out on the third encryption result through a preset algorithm by adopting the bidding end public key to obtain a fourth encryption result, and the fourth encryption result is sent to the bidding end;
Respectively decrypting the second encryption result and the fourth encryption result to obtain the first encryption result and the third encryption result;
calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to a supervision terminal, enabling the supervision terminal to decrypt the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding terminal quotation and the second bidding terminal quotation, and sending the difference between the first bidding terminal quotation and the second bidding terminal quotation to a bidding terminal;
receiving a difference between the first bid side offer and the second bid side offer;
determining a bid winning result according to the difference between the bid price of the first bidding end and the bid price of the second bidding end;
after the bid result is determined according to the difference between the first bid side bid and the second bid side bid, the method further comprises:
the first encryption result and the third encryption result are respectively sent to the supervision terminal, so that the supervision terminal respectively decrypts the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and the first homomorphic result and the third homomorphic result are sent to the bid-inviting terminal;
And calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quotation and the second bidding end quotation, and determining whether the bidding result is effective according to the comparison result.
2. The method of claim 1, further comprising, after said determining a bid result based on a difference between said first bid side bid and said second bid side bid,:
the first encryption result is sent to the supervision terminal, so that the supervision terminal decrypts the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, and the first homomorphic result is sent to the bid-inviting terminal;
and encrypting the first homomorphic result through the homomorphic encryption public key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is effective or not according to the comparison result.
3. The method according to claim 1 or 2, further comprising, after said determining a bid result based on a difference between said first bid side bid and said second bid side bid,:
The winning bid results are broadcast over the blockchain network in a private key signed manner.
4. A bid data processing method, applied to a supervising end, comprising:
broadcasting homomorphic encryption public keys on a blockchain network;
receiving a first calculation result sent by a bidding terminal, wherein the first calculation result is that the bidding terminal issues bidding demand information and random numbers on a blockchain network, receives a second encryption result sent by the first bidding terminal and a fourth encryption result sent by the second bidding terminal, respectively carries out decryption processing on the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result, calculates the difference between the first encryption result and the third encryption result to obtain a first calculation result, and sends the first calculation result to the supervision terminal; the second encryption result is that after the first bidding end receives the bidding demand information and the random number, a homomorphic encryption public key sent by a supervision end is obtained through a blockchain network, encryption processing is carried out on the sum of the random number and the bidding price of the first bidding end according to the homomorphic encryption public key to obtain a first encryption result, encryption processing is carried out on the first encryption result through a preset algorithm by adopting the bidding end public key to obtain a second encryption result, and the second encryption result is sent to the bidding end; the fourth encryption result is that after the second bidding end receives the bidding demand information and the random number, a homomorphic encryption public key sent by a supervision end is obtained through a blockchain network, encryption processing is carried out on the sum of the random number and the second bidding end quotation according to the homomorphic encryption public key to obtain a third encryption result, encryption processing is carried out on the third encryption result through a preset algorithm by adopting the bidding end public key to obtain a fourth encryption result, and the fourth encryption result is sent to the bidding end;
Decrypting the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding end quotation and the second bidding end quotation;
sending the difference between the first bid side bid and the second bid side bid to a bid-tendering side so that the bid-tendering side determines a bid-winning result according to the difference between the first bid side bid and the second bid side bid;
after the difference between the first bid side bid and the second bid side bid is sent to a bid side so that the bid side determines a bid result according to the difference between the first bid side bid and the second bid side bid, the method further comprises:
receiving a first encryption result and a third encryption result which are sent by the bid-inviting terminal;
and respectively decrypting the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, sending the first homomorphic result and the third homomorphic result to the bidding end so that the bidding end calculates the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the bid of the first bidding end and the bid of the second bidding end, and determining whether the bidding result is effective or not according to the comparison result.
5. The method of claim 4, further comprising, after said sending the difference between the first bid side bid and the second bid side bid to a bid side, causing the bid side to determine a bid result based on the difference between the first bid side bid and the second bid side bid:
receiving a first encryption result sent by the bidding terminal;
and decrypting the first encryption result through the homomorphic encryption private key to obtain a first homomorphic result, sending the first homomorphic result to the bidding end so that the bidding end encrypts the first homomorphic result through the homomorphic encryption private key to obtain a first homomorphic verification result, comparing the first homomorphic verification result with the first encryption result, and determining whether the bidding result is effective or not according to the comparison result.
6. A bidding data processing apparatus for use at a bidding end, the apparatus comprising:
the first broadcasting module is used for broadcasting the bid-inviting demand information and the random number on the blockchain network;
the first receiving module is used for receiving a second encryption result sent by a first bidding terminal and a fourth encryption result sent by the second bidding terminal, wherein the second encryption result is a homomorphic encryption public key sent by a supervision terminal through a blockchain network after the first bidding terminal receives the bidding demand information and the random number, the sum of the random number and the quotation of the first bidding terminal is encrypted according to the homomorphic encryption public key to obtain a first encryption result, the first encryption result is encrypted by a preset algorithm to obtain a second encryption result, the second encryption result is sent to the bidding terminal, the fourth encryption result is a homomorphic encryption public key sent by the supervision terminal after the second bidding terminal receives the bidding demand information and the random number, the sum of the random number and the quotation of the second bidding terminal is encrypted by the homomorphic encryption public key to obtain a third encryption result, and the fourth encryption result is encrypted by the preset algorithm to the fourth bidding terminal;
The first decryption module is used for respectively decrypting the second encryption result and the fourth encryption result to obtain the first encryption result and the third encryption result;
the first processing module is used for calculating the difference between the first encryption result and the third encryption result to obtain a first calculation result, sending the first calculation result to a supervision terminal so that the supervision terminal can decrypt the first calculation result through a homomorphic encryption private key to obtain the difference between the first bidding terminal quotation and the second bidding terminal quotation, and sending the difference between the first bidding terminal quotation and the second bidding terminal quotation to a bidding terminal;
a second receiving module for receiving a difference between the first bid side bid and the second bid side bid;
the result determining module is used for determining a winning bid result according to the difference between the first bidding end quotation and the second bidding end quotation;
the first validity authentication module is used for respectively sending the first encryption result and the third encryption result to the supervision terminal so that the supervision terminal can respectively decrypt the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, and sending the first homomorphic result and the third homomorphic result to the bidding terminal; and calculating the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the first bidding end quotation and the second bidding end quotation, and determining whether the bidding result is effective according to the comparison result.
7. A bidding data processing apparatus for use at a supervising site, comprising:
the second broadcasting module is used for broadcasting the homomorphic encryption public key on the blockchain network;
a third receiving module, configured to receive a first calculation result sent by a bid-bidding end, where the first calculation result is that the bid-bidding end issues bid-bidding requirement information and a random number on a blockchain network, receive a second encryption result sent by the first bid-bidding end and a fourth encryption result sent by the second bid-bidding end, decrypt the second encryption result and the fourth encryption result to obtain a first encryption result and a third encryption result, calculate a difference between the first encryption result and the third encryption result, obtain a first calculation result, send the first calculation result to the supervising end, and the second encryption result is that the first bid-bidding end obtains a homomorphic encryption public key sent by the supervising end through the blockchain network after receiving the bid-bidding requirement information and the random number, encrypting the sum of the random number and the first bid side quotation according to the homomorphic encryption public key to obtain a first encryption result, encrypting the first encryption result by adopting a bid side public key through a preset algorithm to obtain a second encryption result, sending the second encryption result to the bid side, obtaining the homomorphic encryption public key sent by a supervision terminal through a block chain network after the second bid side receives the bid requirement information and the random number, encrypting the sum of the random number and the second bid side quotation according to the homomorphic encryption public key to obtain a third encryption result, encrypting the third encryption result by adopting the bid side public key through the preset algorithm to obtain a fourth encryption result, and sending the fourth encryption result to the bid side;
The second decryption module is used for decrypting the first calculation result through the homomorphic encryption private key to obtain the difference between the first bidding end quotation and the second bidding end quotation;
the sending module is used for sending the difference between the first bidding end quotation and the second bidding end quotation to a bidding end so that the bidding end can determine a winning result according to the difference between the first bidding end quotation and the second bidding end quotation;
the third validity authentication module is used for receiving the first encryption result and the third encryption result sent by the bid-inviting terminal; and respectively decrypting the first encryption result and the third encryption result through the homomorphic encryption private key to obtain a first homomorphic result and a third homomorphic result, sending the first homomorphic result and the third homomorphic result to the bidding end so that the bidding end calculates the difference between the first homomorphic result and the third homomorphic result, comparing the difference between the first homomorphic result and the third homomorphic result with the difference between the bid of the first bidding end and the bid of the second bidding end, and determining whether the bidding result is effective or not according to the comparison result.
8. A bidding data processing apparatus, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the bidding data processing method of any one of claims 1 to 3.
9. A bidding data processing apparatus, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the bidding data processing method of claim 4 or 5.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are for implementing a bid data processing method according to any one of claims 1 to 3.
11. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are for implementing the bidding data processing method of claim 4 or 5.
CN202310010271.4A 2023-01-05 2023-01-05 Bid data processing method, device, equipment and storage medium Active CN115879135B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310010271.4A CN115879135B (en) 2023-01-05 2023-01-05 Bid data processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310010271.4A CN115879135B (en) 2023-01-05 2023-01-05 Bid data processing method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115879135A CN115879135A (en) 2023-03-31
CN115879135B true CN115879135B (en) 2023-05-16

Family

ID=85758052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310010271.4A Active CN115879135B (en) 2023-01-05 2023-01-05 Bid data processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115879135B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108520402A (en) * 2018-04-09 2018-09-11 济南浪潮高新科技投资发展有限公司 A kind of method of commerce and transaction system based on block chain
CN110751544A (en) * 2019-10-18 2020-02-04 中国联合网络通信集团有限公司 Bidding information, supervision information and bid evaluation information processing method, terminal and system
US11514511B2 (en) * 2020-03-24 2022-11-29 Saudi Arabian Oil Company Autonomous bidder solicitation and selection system
CN112862576A (en) * 2021-02-07 2021-05-28 湖南大学 Bidding auction method, system, equipment and storage medium based on block chain
CN113420321B (en) * 2021-05-21 2023-05-19 中国联合网络通信集团有限公司 Electronic bidding method, bidding node, first bidding node and third party node
CN113191863B (en) * 2021-05-21 2023-06-23 中国联合网络通信集团有限公司 Bid method, third party device, bid issuing party device and bid issuing party device
CN113205399B (en) * 2021-05-21 2023-07-14 中国联合网络通信集团有限公司 Electronic bidding method, first bidding node equipment and neutral third party node equipment
CN114626922A (en) * 2022-03-21 2022-06-14 国网辽宁省电力有限公司 Self-adaptive bidding multi-energy P2P trading platform based on block chain

Also Published As

Publication number Publication date
CN115879135A (en) 2023-03-31

Similar Documents

Publication Publication Date Title
CN110061846B (en) Method, device and computer readable storage medium for identity authentication and confirmation of user node in block chain
CN108923925B (en) Data storage method and device applied to block chain
CN111030827A (en) Information interaction method and device, electronic equipment and storage medium
CN116738503B (en) Collaborative encryption method for hardware system and operating system and electronic equipment
CN111464295B (en) Bank card making method and device
CN115766294B (en) Cloud server resource authentication processing method, device, equipment and storage medium
CN115906140A (en) Bidding data processing method, device, equipment and storage medium
CN114745207B (en) Data transmission method, device, equipment, computer readable storage medium and product
CN117061105A (en) Data processing method and device, readable medium and electronic equipment
CN115296807B (en) Key generation method, device and equipment for preventing industrial control network viruses
CN115879135B (en) Bid data processing method, device, equipment and storage medium
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain
CN116015900A (en) Data self-storage self-verification method, device, equipment and storage medium
CN116471327B (en) Cloud resource processing method, device, equipment and storage medium
CN108550036B (en) Method, terminal and device for establishing security infrastructure
CN114826616B (en) Data processing method, device, electronic equipment and medium
CN115378743B (en) Information encryption transmission method, device, equipment and medium
CN115987657B (en) Cloud storage security authentication method, device, equipment and storage medium
CN116738472B (en) Task data encryption method, device and equipment applied to task data interaction
CN115906182A (en) Data comparison processing method, device, equipment and storage medium
CN117150544A (en) Bid data comparison method, device, equipment and storage medium
CN116846533A (en) Data processing method, device, equipment and storage medium
CN111314320B (en) Communication method, terminal, server and system based on HTTP
CN112926076B (en) Data processing method, device and system
CN112767142B (en) Processing method, device, computing equipment and medium for transaction file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant