CN115964680B - Copyright protection method based on double authentication blocking signature and blockchain - Google Patents

Copyright protection method based on double authentication blocking signature and blockchain Download PDF

Info

Publication number
CN115964680B
CN115964680B CN202211603862.4A CN202211603862A CN115964680B CN 115964680 B CN115964680 B CN 115964680B CN 202211603862 A CN202211603862 A CN 202211603862A CN 115964680 B CN115964680 B CN 115964680B
Authority
CN
China
Prior art keywords
transaction
applicant
blockchain
public
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211603862.4A
Other languages
Chinese (zh)
Other versions
CN115964680A (en
Inventor
杨安家
陈小虎
翁健
李明
李涛
刘家男
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN202211603862.4A priority Critical patent/CN115964680B/en
Publication of CN115964680A publication Critical patent/CN115964680A/en
Application granted granted Critical
Publication of CN115964680B publication Critical patent/CN115964680B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a copyright protection method based on double authentication block signatures and blockchains, which comprises the following steps: acquiring public and private key pairs of copyright buying and selling parties and third party authorities; the copyright buyer and the seller comprise a copyright applicant and a copyright holder; based on the public and private key pair, the copyright applicant carries out copyright registration to a third party authority to acquire copyright registration information; based on the copyright registration information, the copyright applicant exchanges with the copyright holder through a blockchain, and carries out illegal action constraint on the copyright holder through an intelligent contract deployed in advance; the supervising node protects the copyright transaction based on a preset strategy. The application combines the double authentication block signing algorithm and the blockchain technology, solves the problems of high communication cost with the third party authority and incapability of achieving prior security defense in the traditional method, reduces the communication cost with the third party authority and achieves the prior security defense.

Description

Copyright protection method based on double authentication blocking signature and blockchain
Technical Field
The application belongs to the technical field of network space security, and particularly relates to a copyright protection method based on double authentication blocking signatures and blockchains.
Background
Copyright protection may give the original author various rights, including rights to prevent illegal copying by others, facilitating the progress of producers and users. Different from the entity copyright protection, the requirement of the digital era on the copyright protection mechanism is also higher and higher along with the continuous increase of the number of the copyright. Protecting copyrights presents a number of technical challenges, with the dominant technologies of traditional copyrights protection being watermarking technology and digital technology. These techniques mostly achieve copyright protection by adding a watermark or digital fingerprint to the file to be protected. By examining the tags added to the file, the data owners can discover illegal data usage and then protect their rights by other means, such as reporting to authorities.
In recent years, blockchains have received attention as an emerging technology for its reliability and transparency. Blockchain technology provides a mutual trust solution for both parties, protects copyrights without third party authorities, and avoids high legal and transaction costs. However, most blockchain-based copyright protection schemes can only be validated after the copyist finds himself infringing ('post penalty') rather than blocked before infringing ('pre-defense'). Although some schemes can achieve the purpose of 'pre-defense', the schemes of the scheme are limited, such as being only applicable to digital images and the like.
Disclosure of Invention
The application aims to provide a copyright protection method based on double authentication blocking signatures and blockchains, so as to solve the problems in the prior art.
In order to achieve the above object, the present application provides a copyright protection method based on a dual authentication block signature and a blockchain, comprising:
acquiring public and private key pairs of copyright buying and selling parties and third party authorities; the copyright buyer and the seller comprise a copyright applicant and a copyright holder;
based on the public and private key pair, the copyright applicant carries out copyright registration to a third party authority to acquire copyright registration information;
based on the copyright registration information, the copyright applicant exchanges with the copyright holder through a blockchain, and carries out illegal action constraint on the copyright holder through an intelligent contract deployed in advance;
the supervising node protects the copyright transaction based on a preset strategy.
Optionally, the process of obtaining the public and private key pair of the copyright buyer and the seller and the third party authority comprises the following steps:
taking the blockchain transaction record as a copyright proof;
and acquiring the public and private key pair by registering with a key management mechanism.
Optionally, the blockchain transaction record includes a description des of the copyright, a copyright hash value m, an address under the chain of the copyright data, an identity ids of the copyright buyer and the double authentication blocking signature s.
Optionally, the public-private key pair includes:
sk,pk=g sk
wherein pk is a public key of a user, sk is a private key of the user, G is a generator of G, which is a public security parameter, G is a cyclic group of p-order, and p is a prime number;
the definition of the public and private keys held by the buyer is (sk) B ,pk B ) The seller holds a definition of public and private keys as (sk) S ,pk S ) The third party authority holds a definition of the public and private key as (sk T ,pk T ) The copyright applicant holds a definition of a public-private key as (sk A ,pk A )。
Optionally, the process of registering the copyright of the copyright applicant with the third party authority comprises the following steps:
the copyright holder initiates a copyright application request to the third party authority; the copyright application request comprises copyright information, copyright applicant identity and other materials;
the third party authority verifies the copyright application request based on a local database;
after the verification is passed, the third party authority generates transaction information, and the copyright holder and the copyright applicant sign the transaction information;
and based on the transaction information, linking and taking the transaction information as an initial transaction.
Optionally, each transaction in the course of the copyright transaction is derived from the initial transaction.
Optionally, the act of restricting the copyright holder from illicit actions by the smart contracts deployed in advance includes:
if the copyright applicant considers that the copyright holder has sold the copyright, the copyright holder creates an intelligent contract and creates deposit in the intelligent contract, and the intelligent contract stores the deposit; the deposit amount is larger than the transaction amount;
the copyright holder creates a double authentication block signature, the copyright applicant verifies the double authentication block signature and issues the double authentication block signature to a blockchain network.
Optionally, the dual authentication blocking signature includes a zero knowledge proof, a verifiable secret sharing parameter and a transaction, after the dual authentication blocking signature is created, the copyright holder signs the transaction once, and after the copyright applicant verifies the dual authentication blocking signature, signs the transaction once again;
the transaction includes a description of the current owner of the right, a hash value of the right of the data, an under-chain address of the right, a secret sharing value, and an address in the chain of the last transaction of the right.
Optionally, the process that the supervising node protects the copyright transaction based on the preset strategy includes:
after the copyright applicant issues the double-authentication blocking signature to the blockchain network, the supervision node checks the transaction in the double-authentication blocking signature based on a preset strategy, and if the check is correct, the transaction amount is paid based on an intelligent contract and the deposit is returned; and if the supervising node finds the fraudulent behavior of the copyright holder, punishing the copyright holder based on the double authentication blocking signature.
Optionally, the manner in which the copyright holder is punished based on the dual authentication blocking signature is:
wherein sk A Is the private key of the copyright applicant s 1 And s 2 Representing a double authentication block signature, x 1 And x 2 The random values corresponding to the two transactions are respectively obtained.
The application has the technical effects that:
the application combines the double authentication block signing algorithm and the blockchain technology, solves the problems of high communication cost with the third party authority and incapability of achieving prior security defense in the traditional method, reduces the communication cost with the third party authority and achieves the prior security defense.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
FIG. 1 is a detailed flowchart of a copyright trade in an embodiment of the present application;
fig. 2 is a general flow chart of copyright transactions in an embodiment of the present application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
Example 1
As shown in fig. 1-2, the present embodiment provides a copyright protection method based on a dual authentication block signature and a blockchain, including:
initializing a copyright protection system to obtain public and private key pairs of copyright buyers and sellers and third-party authorities;
firstly defining the transaction record (des, m, address, ids, s) on the blockchain as the copyright proof, wherein the transaction record comprises a description des of the copyright, a hash value m of the copyright, an address under a chain of the copyright data, an identity ids of both transaction parties and the double authentication blocking signature s.
The copyright protection system is initialized, when each user accesses, the user firstly registers with the key management mechanism to obtain a public and private key pair issued by the key management mechanism: sk, pk=g sk Wherein pk is the public key of the user, sk is the private key of the user, G is a generator of G, which is a public security parameter shared by the whole system, G is a cyclic group of order p, where p is a prime number, and the buyer holds the public-private key pair defined as (sk B ,pk B ) The seller is (sk) S ,pk S ) The third party authority is (sk) T ,pk T ) The copyright applicant is (sk) A ,pk A );
Step two, based on the public and private key pair, the copyright applicant registers copyright to a third party authority;
the copyright holder initiates a copyright application request req= (m, id, info) to a third party authority. The request includes the rights information m, the identity id of the rights applicant and other material info to prove his possession of the rights. After the third party authority receives the request, it verifies the request with its local database. If the verification is passed, the third party authority generates a trade with the copyright holder on the blockchain, and the trade is used for representing the distribution and guarantee of the copyright. Both parties sign the transaction information, respectively, and finally the transaction is uplink (initial transaction). Subsequent transactions on the copyright are traced back to the initial transaction.
Step 3, based on the copyright registration information, the buyer transacts with the seller through a blockchain, and constrains illegal actions of the seller through intelligent contracts deployed in advance, so that the transaction is normally ended or abnormally exited;
in this step, the buyer wants to purchase the seller's rights, but worry that the seller has sold the rights to many people, so the buyer asks the seller to generate a signature using the DAPS protocol. First, the seller creates an intelligent contract SC and publishes it in the blockchain. He then creates a deposit v at time t of the smart contract. The deposit should be greater than the price of the transaction data. Intelligent contract maintains a group of Deposits]To store a credit value for each account. The seller then generates a double authentication block signature sigma. Specifically, if the seller owns the copyright m and sells it for the first time, the seller randomly selects the integer x and calculates a verifiable secret sharing value s=a x+sk s And generates a zero knowledge proof PK { (a, sk) without interaction S ):A=g a ∧a=H(data,sk S ) }. Wherein a=h (data, sk S ) Is a parameter for binding copyrights one by one; a=g a Is a parameter for verifiable secret sharing; sk (sk) s Is the buyer's private key. The seller simultaneously generates a transaction tx 0 = (des, hash, addr, s, pointer), including a description des of the current owner of the data right, a hash value hash of the data right, the under-chain address addr of the right, the secret sharing value s and the address pointer of the last transaction in the chain of the right. The seller signs the transaction and sends the transaction to the buyer, the buyer performs zero knowledge proof, secret sharing and signature verification, and after verification, the transaction is signed and issued to the blockchain network. The supervising node checks the transaction according to a predetermined policy.
And 4, protecting the copyright transaction based on the system, and completing system construction.
If the transaction is successfully completed, meaning no fraud is found in the transaction, a function in the smart contract is invoked to make the payment that transfers money corresponding to the buyer's bid to an account corresponding to the seller and refunds the deposit of the seller and buyer. If the transaction is interrupted halfway, which means that the supervising node finds out fraudulent behaviour of the seller, the seller will be penalized, specifically by the corresponding double authentication blocking signature s in the two illicit transactions found by the supervising node 1 And s 2 The realization is as follows: wherein x is 1 And x 2 The random values corresponding to the two transactions are respectively obtained. The transaction is invalid, so that the safe proceeding of the copyright transaction is ensured, and the purpose of pre-defense is achieved.
The present application is not limited to the above-mentioned embodiments, and any changes or substitutions that can be easily understood by those skilled in the art within the technical scope of the present application are intended to be included in the scope of the present application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.

Claims (6)

1. A copyright protection method based on double authentication block signature and blockchain is characterized by comprising the following steps:
acquiring public and private key pairs of copyright buying and selling parties and third party authorities; the copyright buyer and the seller comprise a copyright applicant and a copyright holder;
based on the public and private key pair, the copyright applicant carries out copyright registration to a third party authority to acquire copyright registration information;
based on the copyright registration information, the copyright applicant exchanges with the copyright holder through a blockchain, and carries out illegal action constraint on the copyright holder through an intelligent contract deployed in advance;
the supervision node protects the copyright transaction based on a preset strategy;
the process of performing the constraint of the illegal actions on the copyright holder through the intelligent contracts deployed in advance comprises the following steps:
if the copyright applicant considers that the copyright holder has sold the copyright, the copyright holder creates an intelligent contract and creates deposit in the intelligent contract, and the intelligent contract stores the deposit; the deposit amount is larger than the transaction amount;
the copyright holder creates a double-authentication blocking signature, the copyright applicant verifies the double-authentication blocking signature and issues the double-authentication blocking signature to a blockchain network;
the double authentication blocking signature comprises zero knowledge proof, verifiable secret sharing parameters and a transaction, after the double authentication blocking signature is created, the copyright holder signs the transaction once, and after the copyright applicant verifies the double authentication blocking signature, the copyright applicant signs the transaction once again; the transaction comprises the description of the current owner of the copyright, a hash value of the data copyright, an under-chain address of the copyright, a secret sharing value and an address of the last transaction of the copyright in the chain;
the process of protecting the copyright transaction based on the preset strategy by the supervision node comprises the following steps:
after the copyright applicant issues the double-authentication blocking signature to the blockchain network, the supervision node checks the transaction in the double-authentication blocking signature based on a preset strategy, and if the check is correct, the transaction amount is paid based on an intelligent contract and the deposit is returned; if the supervising node finds the fraudulent behavior of the copyright holder, punishing the copyright holder based on the double authentication blocking signature;
the manner of punishing the copyright holder based on the double authentication block signature is:
wherein sk A Is the private key of the copyright applicant s 1 And s 2 Representing a double authentication block signature, x 1 And x 2 Respectively two times of crossingA random value that is easily mapped.
2. The dual authentication blocking subscription and blockchain based copyright protection method of claim 1, wherein the process of obtaining the public and private key pairs of the copyright buyer and the third party authority comprises:
taking the blockchain transaction record as a copyright proof;
and acquiring the public and private key pair by registering with a key management mechanism.
3. The method of claim 1, wherein the blockchain transaction record includes a description des of the copyright, a copyright hash value m, an address under the chain of the copyright data, an identity ids of the copyright buyer and the blockchain, and a dual authentication blocking signature s.
4. The dual authentication blocking signature and blockchain based copyright protection method of claim 1, wherein the public-private key pair comprises:
sk,pk=g sk
wherein pk is a public key of a user, sk is a private key of the user, G is a generator of G, which is a public security parameter, G is a cyclic group of p-order, and p is a prime number;
the definition of the public and private keys held by the buyer is (sk) B ,pk B ) The seller holds a definition of public and private keys as (sk) S ,pk S ) The third party authority holds a definition of the public and private key as (sk T ,pk T ) The copyright applicant holds a definition of a public-private key as (sk A ,pk A )。
5. The dual authentication blocking subscription and blockchain based copyright protection method of claim 1, wherein the process of the copyright applicant registering the copyright with a third party authority comprises:
the copyright holder initiates a copyright application request to the third party authority; the copyright application request comprises copyright information, copyright applicant identity and other materials;
the third party authority verifies the copyright application request based on a local database;
after the verification is passed, the third party authority generates transaction information, and the copyright holder and the copyright applicant sign the transaction information;
and based on the transaction information, linking and taking the transaction information as an initial transaction.
6. The dual authentication blocking signature and blockchain based copyright protection method of claim 5, wherein each transaction in the copyright transaction process originates from the initial transaction.
CN202211603862.4A 2022-12-13 2022-12-13 Copyright protection method based on double authentication blocking signature and blockchain Active CN115964680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211603862.4A CN115964680B (en) 2022-12-13 2022-12-13 Copyright protection method based on double authentication blocking signature and blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211603862.4A CN115964680B (en) 2022-12-13 2022-12-13 Copyright protection method based on double authentication blocking signature and blockchain

Publications (2)

Publication Number Publication Date
CN115964680A CN115964680A (en) 2023-04-14
CN115964680B true CN115964680B (en) 2023-09-29

Family

ID=87352061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211603862.4A Active CN115964680B (en) 2022-12-13 2022-12-13 Copyright protection method based on double authentication blocking signature and blockchain

Country Status (1)

Country Link
CN (1) CN115964680B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017148245A1 (en) * 2016-03-01 2017-09-08 华为技术有限公司 Rights management method and system
CN107222303A (en) * 2017-05-11 2017-09-29 暨南大学 Digital publishing rights traceability system building method based on block chain and cloud platform
WO2021073502A1 (en) * 2019-10-14 2021-04-22 Shanghai Weilian Information Technology Co., Ltd. Method and device for implementing identity endorsement on blockchain
CN113706344A (en) * 2021-08-05 2021-11-26 武汉大学 Block chain-based digital copyright protection method
CN113949515A (en) * 2021-09-09 2022-01-18 卓尔智联(武汉)研究院有限公司 Digital copyright information processing method and device and storage medium
CN114386147A (en) * 2022-01-05 2022-04-22 武汉市市政建设集团有限公司 Copyright protection method and system of BIM (building information modeling) model based on block chain and intelligent contract
CN115174099A (en) * 2022-06-17 2022-10-11 蚂蚁区块链科技(上海)有限公司 Copyright asset authorization method and device based on block chain and electronic equipment
CN115408666A (en) * 2022-08-30 2022-11-29 湖南大学 Anti-piracy digital content copyright authentication and transaction method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017148245A1 (en) * 2016-03-01 2017-09-08 华为技术有限公司 Rights management method and system
CN107222303A (en) * 2017-05-11 2017-09-29 暨南大学 Digital publishing rights traceability system building method based on block chain and cloud platform
WO2021073502A1 (en) * 2019-10-14 2021-04-22 Shanghai Weilian Information Technology Co., Ltd. Method and device for implementing identity endorsement on blockchain
CN113706344A (en) * 2021-08-05 2021-11-26 武汉大学 Block chain-based digital copyright protection method
CN113949515A (en) * 2021-09-09 2022-01-18 卓尔智联(武汉)研究院有限公司 Digital copyright information processing method and device and storage medium
CN114386147A (en) * 2022-01-05 2022-04-22 武汉市市政建设集团有限公司 Copyright protection method and system of BIM (building information modeling) model based on block chain and intelligent contract
CN115174099A (en) * 2022-06-17 2022-10-11 蚂蚁区块链科技(上海)有限公司 Copyright asset authorization method and device based on block chain and electronic equipment
CN115408666A (en) * 2022-08-30 2022-11-29 湖南大学 Anti-piracy digital content copyright authentication and transaction method and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Guo, J 等.Research on digital copyright blockchain technology. 2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK).2020,第114-118页. *
李莉 ; 周斯琴 ; 刘芹 ; 何德彪 ; .基于区块链的数字版权交易系统.网络与信息安全学报.2018,(第07期),全文. *

Also Published As

Publication number Publication date
CN115964680A (en) 2023-04-14

Similar Documents

Publication Publication Date Title
US20220198418A1 (en) Systems and methods for commerce in a distributed system with blockchain protocols and smart contracts
CN105373955B (en) Digital asset processing method and device based on multiple signatures
US20230004970A1 (en) Distributed Ledgers with Ledger Entries Containing Redactable Payloads
CN112364305B (en) Digital content copyright protection method and device based on blockchain platform
JP2006522413A (en) Rights trading system
CN112801785B (en) Fair data transaction method and device based on blockchain intelligent contract
Gao et al. Secure, fair and instant data trading scheme based on bitcoin
CN114218591A (en) Digital asset management method capable of realizing anonymous transaction
CN117391726A (en) Block chain-based trusted energy data transaction method
CN110807634A (en) Second-hand ticket transaction method and platform based on Hasp hash chain and intelligent contract
CN112464178B (en) Data transaction copyright protection method based on blockchain and homomorphic encryption
CN115964680B (en) Copyright protection method based on double authentication blocking signature and blockchain
CN116664298A (en) Implementation method and device of block chain-based decentralization data transaction system
Wu et al. Privacy-friendly Blockchain Based Data Trading and Tracking
CN116258494A (en) Copyright transaction circulation method and device based on blockchain and computer equipment
Ai et al. B2IPTS: A blockchain-based intellectual property transaction framework
CN117557441B (en) Image copyright protection and transaction authentication method, device and medium
CN111062833A (en) Signature authentication method of contract data and related device
Wang et al. Blockchain Data Transaction with Leakage Tracing Based on Digital Fingerprint
Kala Cyber Security Issues and Challenges on Non-fungible Tokens
El Azzaoui et al. QNFT: A Post-Quantum Non-fungible Tokens for Secure Metaverse Environment.
Frattolillo et al. A novel approach to DRM systems
JP2003216875A (en) Electronic settlement method
CN116843333A (en) Digital video fair trading method based on blockchain
CN118468350A (en) Distributed authentication method and system for intellectual property rights and interests based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant