CN117390650A - Data providing, using and sharing method, intelligent terminal and sharing system - Google Patents

Data providing, using and sharing method, intelligent terminal and sharing system Download PDF

Info

Publication number
CN117390650A
CN117390650A CN202311451293.0A CN202311451293A CN117390650A CN 117390650 A CN117390650 A CN 117390650A CN 202311451293 A CN202311451293 A CN 202311451293A CN 117390650 A CN117390650 A CN 117390650A
Authority
CN
China
Prior art keywords
data
blockchain
provider
evaluation result
downloaded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311451293.0A
Other languages
Chinese (zh)
Inventor
姚晴娟
陈序
盛天娇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Ji'an Technology Co ltd
Original Assignee
Suzhou Ji'an Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Ji'an Technology Co ltd filed Critical Suzhou Ji'an Technology Co ltd
Priority to CN202311451293.0A priority Critical patent/CN117390650A/en
Publication of CN117390650A publication Critical patent/CN117390650A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data providing, using and sharing method, an intelligent terminal and a sharing system, and provides the following technical scheme aiming at the privacy and safety problems of data sharing, wherein a homomorphic encryption private key is used for homomorphic encryption of desensitized data, and the homomorphic encrypted data is uploaded to a blockchain; the method comprises the steps that after a data user utilizes a homomorphic encryption public key to calculate homomorphic encrypted data downloaded from a blockchain in a credit evaluation model to obtain an evaluation result, and the evaluation result is uploaded to the blockchain, the data provider downloads the evaluation result from the blockchain; and decrypting the evaluation result into a plaintext by using the homomorphic encryption private key, and uploading the decryption result to a blockchain for the data user to download the decryption result from the blockchain for use. By the method, effective data information is contributed, original sensitive information is protected, and privacy and safety of data sharing are improved.

Description

Data providing, using and sharing method, intelligent terminal and sharing system
Technical Field
The present invention relates to a blockchain technology, and more particularly, to a data providing, using and sharing method, an intelligent terminal and a sharing system.
Background
With the rapid development of information technology, especially internet technology and cloud storage technology, data value is increasingly reflected, and privacy problems of data sharing and collaborative use also continuously appear.
For example, enterprise credit assessment is an important tool for enterprise cooperation and bank management risk, reflects the credit status of enterprises, determines whether cooperation is achieved between enterprises or whether a bank pays a money of a category, and plays an important role in supporting a social credit system. Professional credit assessment is performed on enterprises, and various data such as consumption, tax, cooperation, assets, liabilities and the like in various dimensions are required in the operation process of the enterprises, and are usually held by different organizations, so that the data are not scattered fully, the necessary information is collected, and the data are prevented from being leaked, so that the method is an important subject for perfecting currently.
The differential privacy is a current common data privacy protection means, and privacy protection is realized by adding noise into data, but the technology can influence the availability and accuracy of a model to a certain extent when being applied, so that the technology cannot be applied on a large scale at present for scenes with high accuracy requirements, such as face recognition and financial risk metering.
Compared with the differential privacy technology, homomorphic encryption provides a wide research direction for multiparty privacy protection data sharing and collaborative modeling by the consistency of the calculation results between the original data and the encrypted data and the calculation of the ciphertext under the condition of not sacrificing the utility of the data. However, existing data homomorphic encryption aggregation methods rely primarily on third parties or central servers. The public trust of the third party and the security of the central server bring great hidden danger to the data security of each party, and the risk of privacy disclosure is increased.
Therefore, further improvement of the privacy of data sharing remains a currently pending problem.
Disclosure of Invention
In view of the shortcomings of the prior art, a first object of the present invention is to provide a data providing method, which has the advantages of protecting the privacy of a provider and improving the security of data.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a data providing method includes
Homomorphic encryption private key is used for homomorphic encryption of the desensitized data, and the homomorphic encrypted data is uploaded to a blockchain;
the method comprises the steps that after a data user utilizes a homomorphic encryption public key to calculate homomorphic encrypted data downloaded from a blockchain in a credit evaluation model to obtain an evaluation result, and the evaluation result is uploaded to the blockchain, the data provider downloads the evaluation result from the blockchain;
and decrypting the evaluation result into a plaintext by using the homomorphic encryption private key, and uploading the decryption result to a blockchain for the data user to download the decryption result from the blockchain for use.
Further, also include
And before uploading the homomorphic encrypted data to the blockchain, signing the homomorphic encrypted data by using a provider SM2 private key for a data user to download the homomorphic encrypted data from the blockchain after passing verification by using the provider SM2 public key.
Further, also include
When downloading the evaluation result from the blockchain, the data provider firstly uses the public key of the user SM2 to verify the signature applied by the user SM2 private key on the evaluation result, and the verification passes the verification and can download the evaluation result.
Further, when uploading the decryption result to the blockchain for the data consumer to download, the decryption result is signed by the private key of the provider SM2, and is used for verifying the signature by the data consumer by the public key of the provider SM2, and the decryption result can be downloaded from the blockchain after verification.
Further, also include
Signing homomorphically encrypted data with provider SM2 private key, and/or
The data consumer applies a signature on the evaluation result by using the SM2 private key of the consumer,
the signature action is carried out on a hash value generated by adopting an SM3 hash algorithm on target data;
when homomorphic encrypted data and/or the evaluation result are downloaded from the blockchain, a SM3 hash algorithm is used for generating a hash value for the downloaded object, the generated hash value is used for comparing with the hash value of the downloaded object, and if verification is consistent, the downloaded object is the correct downloaded data.
Further, it is also included that, prior to the data provision,
generating a provider SM2 private key and a provider SM2 public key, sending the provider SM2 public key to a data user, and acquiring a user SM2 public key generated by the data user;
and generating homomorphic encryption private keys and homomorphic encryption public keys, and sending the homomorphic encryption public keys to the data user.
Aiming at the defects existing in the prior art, the second aim of the invention is to provide a data use method which has the advantages of protecting the privacy and safety of data.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a data use method comprises
The method comprises the steps that homomorphic encryption is carried out on desensitized data by a data provider through a homomorphic encryption private key, the homomorphic encrypted data are uploaded to a blockchain, the homomorphic encrypted data downloaded from the blockchain are calculated in a credit evaluation model through the homomorphic encryption public key to obtain an evaluation result, and the evaluation result is uploaded to the blockchain;
and downloading the evaluation result from the blockchain by the data provider, decrypting the evaluation result into a plaintext by using the homomorphic encryption private key, and uploading the decryption result to the blockchain, and then downloading the decryption result from the blockchain for use.
Further, when the homomorphic encrypted data is downloaded from the blockchain, after the data provider signs the homomorphic encrypted data by using the private key of the provider SM2 and uploads the homomorphic encrypted data to the blockchain, the public key of the provider SM2 is used for verifying the signature, and the homomorphic encrypted data can be downloaded after verification.
Further, also include
Applying a signature on the evaluation result by using the party SM2 private key for the data provider to verify the signature with the party SM2 public key, and after the verification is passed, the data provider downloads the evaluation result from the blockchain.
Further, also include
When the decryption result is downloaded from the blockchain, the data provider signs the decryption result by using the private key of the provider SM2, and then the data user verifies the signature by using the public key of the provider SM2, so that the decryption result can be downloaded from the blockchain after verification.
Further, also include
The data provider signs homomorphically encrypted data with the provider SM2 private key, and/or
The data consumer applies a signature on the evaluation result by using the SM2 private key of the consumer,
the signature action is carried out on a hash value generated by adopting an SM3 hash algorithm on target data;
when homomorphic encrypted data and/or the evaluation result are downloaded from the blockchain, a SM3 hash algorithm is used for generating a hash value for the downloaded object, the generated hash value is used for comparing with the hash value of the downloaded object, and if verification is consistent, the downloaded object is the correct downloaded data.
Further, it is also included that, prior to the data provision,
generating a provider SM2 private key and a provider SM2 public key, sending the provider SM2 public key to a data user, and acquiring a user SM2 public key generated by the data user;
and generating homomorphic encryption private keys and homomorphic encryption public keys, and sending the homomorphic encryption public keys to the data user.
Aiming at the defects existing in the prior art, the third aim of the invention is to provide a data sharing method, which eliminates the risk of privacy disclosure and ensures the security of multiparty data sharing and aggregation.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a data sharing method, comprising the data providing method according to any one of the above technical solutions, and the data using method according to any one of the above technical solutions.
In view of the shortcomings of the prior art, a fourth object of the present invention is to include an application of a data providing method, a data using method and a data sharing method in the fields of loan, lease and guarantee.
Aiming at the defects existing in the prior art, the fifth aim of the invention is to provide an intelligent terminal which can ensure that the privacy and the safety are both ensured when the data are shared and aggregated among multiple parties after use.
In order to achieve the above purpose, the present invention provides the following technical solutions:
an intelligent terminal comprises
One or more processors; and
a memory associated with the one or more processors, the memory configured to store program instructions that, when read and executed by the one or more processors, perform the data providing method according to any of the above claims, or perform the data using method according to any of the above claims.
Aiming at the defects existing in the prior art, the sixth object of the invention is to provide a data sharing system which can ensure both privacy and security when data is shared and aggregated among multiple parties.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a data sharing system includes
One or more processors; and
a memory associated with the one or more processors, the memory for storing a computer program that, when read for execution by the one or more processors, performs the data sharing method of any of the above claims.
In summary, the invention has the following beneficial effects:
1. the centralized sharing aggregation mode is replaced, and the potential privacy risk from a third party is reduced;
2. based on the principle of privacy protection, the data provider cannot directly send original data to the data consumer, in order to ensure the privacy and safety of the data and realize data sharing, a homomorphic encryption scheme is adopted to encrypt customer data, ciphertext data is given to the data consumer for modeling, and finally the data provider carries out decryption processing, returns a plaintext modeling ciphertext result to the data consumer, and the data consumer decrypts the plaintext result to obtain a plaintext result to develop various services, so that the use number is really not found in the process, the data ownership is ensured, and the data sharing is realized.
Drawings
FIG. 1 is a flow chart of a data providing method according to the present invention;
FIG. 2 is a flow chart of a method of data use according to the present invention;
FIG. 3 is a schematic diagram of a logic mechanism of the intelligent terminal according to the present invention;
fig. 4 is a schematic diagram of the logic structure of the data sharing system in the present invention.
Detailed Description
The present invention will be described in detail with reference to the accompanying drawings and examples.
The present embodiment is only for explanation of the present invention and is not to be construed as limiting the present invention, and modifications to the present embodiment, which may not creatively contribute to the present invention as required by those skilled in the art after reading the present specification, are all protected by patent laws within the scope of claims of the present invention.
Application scenario description:
the A company is a data provider and has data of a certain type of clients, but based on the principle of privacy protection, the A company does not want to directly send the real data of the clients to other companies for use, so that homomorphic encryption technology is adopted to encrypt the data, and ciphertext data is sent to a data user for modeling analysis.
The company B is a data user and has transaction information data of clients, but the aim of realizing accurate marketing and financial loan service for certain types of client loans is to far from enough transaction data, and an omnibearing and multi-informationized intelligent air control system is built by combining the transaction data with the data of the party A.
Example 1
Referring to fig. 1, the data providing method includes the following steps:
s101: homomorphic encryption private key is used for homomorphic encryption of the desensitized data, and the homomorphic encrypted data is uploaded to a blockchain;
s102: the method comprises the steps that after a data user utilizes a homomorphic encryption public key to calculate homomorphic encrypted data downloaded from a blockchain in a credit evaluation model to obtain an evaluation result, and the evaluation result is uploaded to the blockchain, the data provider downloads the evaluation result from the blockchain;
s103: and decrypting the evaluation result into a plaintext by using the homomorphic encryption private key, and uploading the decryption result to a blockchain for the data user to download the decryption result from the blockchain for use.
Before the above-mentioned process is implemented, the data provider and the data consumer respectively utilize SM2 asymmetric encryption algorithm to generate key pairs, which specifically includes a provider SM2 private key and a provider SM2 public key generated by the data provider, and a consumer SM2 private key and a consumer SM2 public key generated by the data consumer, the private keys are used for own preservation, and the public keys are mutually transmitted to the other party for verification signature and encryption and decryption by the other party. After successful exchange, the data provider holds the private key of the provider SM2 and the public key of the user SM2, and the data user holds the private key of the user SM2 and the public key of the provider SM 2.
Meanwhile, the data provider also needs to generate homomorphic encryption key pairs, which are also divided into private keys and public keys. The private key is stored by the private party, and the public key is transmitted to the data user party for homomorphic encryption operation ciphertext. The data provider holds a homomorphic encryption private key and a homomorphic encryption public key, and the data consumer holds the homomorphic encryption public key.
In step S101, the data provider first performs box-division encoding on the original data, then encrypts the encoded data by columns (n features except id) respectively using homomorphic encryption private keys to form n encrypted data files, puts the n data files into a folder, compresses and saves the folder to local, and then uploads the data to the server.
In addition, step S101 generates a hash value of the compressed folder by using SM3 hash algorithm before uploading the homomorphic encrypted data to the blockchain, then signs the hash value signature by using the provider SM2 private key, at this time, saves the hash value of the compressed folder, the timestamp, the signature and the download address URL of the compressed folder, and uploads the same to the blockchain for the data user to download the homomorphic encrypted data from the blockchain after passing the authentication by using the provider SM2 public key.
In step S102, the evaluation result uploaded by the data provider from the data consumer downloaded from the blockchain is obtained by the data consumer downloading homomorphic encrypted data from the blockchain and calculating the data in the credit evaluation model, and then the data consumer uploads the data to the blockchain.
In addition, when the data provider downloads the evaluation result from the blockchain, the timestamp is compared first to ensure that the latest data file is downloaded. If the data file with the latest timestamp is found, the provider SM2 public key is used for signing the hash value of the ciphertext score compression folder and comparing the hash value with the hash value signature in the blockchain, and after verification, the compressed folder of the ciphertext result can be downloaded through the URL. And then, generating a hash value for the compressed folder of the ciphertext result by using an SM3 hash algorithm, comparing the hash value with the hash value of the ciphertext result in the blockchain, and after verification, indicating that the correct ciphertext result data is needed for the current downloading.
In step S103, the data provider decrypts the evaluation result into plaintext using the homomorphic encryption private key. And encrypting the plaintext data by using the public key of the user SM2 to generate a ciphertext result, storing the ciphertext result as a compressed file to the local, and uploading the compressed file to a server.
And then, generating a hash value for the compressed folder of the ciphertext result by using an SM3 hash algorithm, signing the hash value of the compressed folder of the ciphertext result by using a private key of a provider SM2, storing the hash value, the timestamp, the signature and a download address URL of the compressed folder of the ciphertext result, and uploading the hash value, the timestamp, the signature and the download address URL of the compressed folder of the ciphertext result to a blockchain for a data user.
Example 2
Referring to fig. 2, a data usage method, suitable for a data user, includes the following steps:
step S201: the method comprises the steps that homomorphic encryption is carried out on desensitized data by a data provider through a homomorphic encryption private key, the homomorphic encrypted data are uploaded to a blockchain, the homomorphic encrypted data downloaded from the blockchain are calculated in a credit evaluation model through the homomorphic encryption public key to obtain an evaluation result, and the evaluation result is uploaded to the blockchain;
step S202: and after the data provider downloads the evaluation result from the blockchain, decrypts the evaluation result into a plaintext by using the homomorphic encryption private key, and uploads the decryption result to the blockchain, the decryption result is downloaded from the blockchain for use.
Similarly, the same key generation and exchange procedure as in embodiment 1 needs to be performed before data sharing, and this step is a pre-base for data sharing.
In step S201, when the data consumer downloads homomorphic encrypted data from the blockchain, the data consumer first compares the time stamp to ensure that the latest data file is downloaded according to the download address of the compression folder. If the data file with the latest time stamp is found, the provider SM2 public key is used for verifying whether the hash value of the encrypted data and the hash value signature in the blockchain pass or not. If the signature passes, the ciphertext compression folder can be downloaded through the download address URL of the compression folder.
And then, generating a hash value for the downloaded ciphertext compression folder by using an SM3 hash algorithm, comparing the hash value with the hash value of the compression folder in the blockchain, and if verification passes twice, indicating that the downloaded ciphertext data is correct and up to date.
The credit evaluation model is a model for evaluating and analyzing data based on the data downloaded from the data provider to obtain an evaluation result, for example, in the financial field, the credit evaluation model performs homomorphic operation on the data based on income, liability, credit score and the like to obtain the evaluation result.
In addition, before uploading the evaluation result to the blockchain, the data consumer applies a signature on the evaluation result by using the SM2 private key for the data provider to download the evaluation result from the blockchain after the data provider verifies the signature by using the SM2 public key.
Specifically, the data user puts the evaluation result into a folder, compresses the folder to the local and uploads the result to the server. And finally, generating a hash value for the ciphertext-scored compressed folder by using an SM3 hash algorithm, signing the hash value of the ciphertext-scored compressed folder by using a private key of the user SM2, storing the hash value, the timestamp, the signature and a download address URL of the ciphertext-scored compressed folder, and uploading the hash value and the timestamp, the signature and the download address URL of the ciphertext-scored compressed folder to a blockchain.
In step S202, when the data is used, the data user repeats the verification step when the data is downloaded, and the time stamp is compared to ensure that the latest data file is downloaded. If the data file with the latest timestamp is found, the provider SM2 public key is used for signing the hash value of the ciphertext score compression folder and comparing the hash value with the hash value signature in the blockchain, and after verification, the compressed folder of the ciphertext result can be downloaded through the URL.
And then, generating a hash value for the compressed folder of the ciphertext result by using an SM3 hash algorithm, comparing the hash value with the hash value of the ciphertext result in the blockchain, and after verification, indicating that the correct ciphertext result data is needed for the current downloading.
Finally, the data user decrypts the ciphertext result by using the SM2 private key of the user to obtain the plaintext score.
Example 3
A data sharing method for data interaction sharing between multiple parties, comprising a data providing method based on a provider side as disclosed in embodiment 1 and a data using method based on a consumer side as disclosed in embodiment 2.
It should be appreciated that in the field of loan applications, a financial institution may use a credit assessment model to assess a person's or business's loan application to determine whether to approve the loan, and how the loan condition is. In the rental application field, a rental company can use a credit assessment model to assess the credits of a tenant to determine whether to rent a property or device, and formulate rental terms. In the field of vouching applications, insurance companies may use credit assessment models to assess risk to insurance applicants to determine whether to accept the application and calculate insurance rates. Obviously, the data providing method, the data using method and the data sharing method can bring great convenience in the fields of loan, lease and guarantee
Example 4
Referring to fig. 3, an intelligent terminal includes
One or more processors; and
a memory associated with the one or more processors, the memory for storing program instructions that, when read by the one or more processors, perform the data providing method as disclosed in embodiment 1 or perform the data using method as disclosed in embodiment 2.
Example 5
Referring to FIG. 4, a data sharing system, reference diagram, includes
One or more processors; and
a memory associated with one or more processors, the memory for storing a computer program which, when read for execution by the one or more processors, performs a data sharing method as disclosed in embodiment 3
The above description is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above examples, and all technical solutions belonging to the concept of the present invention belong to the protection scope of the present invention. It should be noted that modifications and adaptations to the present invention may occur to one skilled in the art without departing from the principles of the present invention and are intended to be within the scope of the present invention.

Claims (16)

1. A data providing method, characterized in that: comprising
Homomorphic encryption private key is used for homomorphic encryption of the desensitized data, and the homomorphic encrypted data is uploaded to a blockchain;
the method comprises the steps that after a data user utilizes a homomorphic encryption public key to calculate homomorphic encrypted data downloaded from a blockchain in a credit evaluation model to obtain an evaluation result, and the evaluation result is uploaded to the blockchain, the data provider downloads the evaluation result from the blockchain;
and decrypting the evaluation result into a plaintext by using the homomorphic encryption private key, and uploading the decryption result to a blockchain for the data user to download the decryption result from the blockchain for use.
2. The data providing method according to claim 1, wherein: and also comprises
And before uploading the homomorphic encrypted data to the blockchain, signing the homomorphic encrypted data by using a provider SM2 private key for a data user to download the homomorphic encrypted data from the blockchain after passing verification by using the provider SM2 public key.
3. The data providing method according to claim 1, wherein: and also comprises
When downloading the evaluation result from the blockchain, the data provider firstly uses the public key of the user SM2 to verify the signature applied by the user SM2 private key on the evaluation result, and the verification passes the verification and can download the evaluation result.
4. The data providing method according to claim 1, wherein: when uploading the decryption result to the blockchain for the data consumer to download, the decryption result is signed by the private key of the provider SM2, and is used for verifying the signature by the data consumer by the public key of the provider SM2, and the decryption result can be downloaded from the blockchain after verification.
5. The data providing method according to any one of claims 2 to 4, wherein: also includes signing the homomorphically encrypted data with the provider SM2 private key, and/or
The data consumer applies a signature on the evaluation result by using the SM2 private key of the consumer,
the signature action is carried out on a hash value generated by adopting an SM3 hash algorithm on target data;
when homomorphic encrypted data and/or the evaluation result are downloaded from the blockchain, a SM3 hash algorithm is used for generating a hash value for the downloaded object, the generated hash value is used for comparing with the hash value of the downloaded object, and if verification is consistent, the downloaded object is the correct downloaded data.
6. The data providing method according to claim 1, wherein: also included is the provision of a data set that is prior to the provision of the data,
generating a provider SM2 private key and a provider SM2 public key, sending the provider SM2 public key to a data user, and acquiring a user SM2 public key generated by the data user;
and generating homomorphic encryption private keys and homomorphic encryption public keys, and sending the homomorphic encryption public keys to the data user.
7. A method of data use, characterized by: comprising
The method comprises the steps that homomorphic encryption is carried out on desensitized data by a data provider through a homomorphic encryption private key, the homomorphic encrypted data are uploaded to a blockchain, the homomorphic encrypted data downloaded from the blockchain are calculated in a credit evaluation model through the homomorphic encryption public key to obtain an evaluation result, and the evaluation result is uploaded to the blockchain;
and downloading the evaluation result from the blockchain by the data provider, decrypting the evaluation result into a plaintext by using the homomorphic encryption private key, and uploading the decryption result to the blockchain, and then downloading the decryption result from the blockchain for use.
8. The data usage method according to claim 7, wherein: when the homomorphic encrypted data is downloaded from the blockchain, after the data provider signs the homomorphic encrypted data by using a private key of the provider SM2 and uploads the blockchain, the public key of the provider SM2 is used for verifying the signature, and the homomorphic encrypted data can be downloaded after verification.
9. The data usage method according to claim 7, wherein: and also comprises
Applying a signature on the evaluation result by using the party SM2 private key for the data provider to verify the signature with the party SM2 public key, and after the verification is passed, the data provider downloads the evaluation result from the blockchain.
10. The data usage method according to claim 7, wherein: and also comprises
When the decryption result is downloaded from the blockchain, the data provider signs the decryption result by using the private key of the provider SM2, and then the data user verifies the signature by using the public key of the provider SM2, so that the decryption result can be downloaded from the blockchain after verification.
11. A method of data use according to any one of claims 8 to 10, wherein: and also comprises
The data provider signs homomorphically encrypted data with the provider SM2 private key, and/or
The data consumer applies a signature on the evaluation result by using the SM2 private key of the consumer,
the signature action is carried out on a hash value generated by adopting an SM3 hash algorithm on target data;
when homomorphic encrypted data and/or the evaluation result are downloaded from the blockchain, a SM3 hash algorithm is used for generating a hash value for the downloaded object, the generated hash value is used for comparing with the hash value of the downloaded object, and if verification is consistent, the downloaded object is the correct downloaded data.
12. The data usage method according to claim 7, wherein: also included is the provision of a data set that is prior to the provision of the data,
generating a provider SM2 private key and a provider SM2 public key, sending the provider SM2 public key to a data user, and acquiring a user SM2 public key generated by the data user;
and generating homomorphic encryption private keys and homomorphic encryption public keys, and sending the homomorphic encryption public keys to the data user.
13. A data sharing method is characterized in that: comprising a data providing method according to any one of claims 1 to 6 and a data using method according to any one of claims 7 to 12.
14. The data providing method, the data using method and the data sharing method are applied to the fields of loan, lease and guarantee.
15. An intelligent terminal, its characterized in that: comprising
One or more processors; and
a memory associated with the one or more processors for storing program instructions that, when read for execution by the one or more processors, perform the data providing method of any one of claims 1 to 6, or perform the data using method of any one of claims 7 to 12.
16. A data sharing system, characterized by: comprising
One or more processors; and
a memory associated with the one or more processors, the memory for storing a computer program that, when read for execution by the one or more processors, performs the data sharing method of claim 13.
CN202311451293.0A 2023-11-03 2023-11-03 Data providing, using and sharing method, intelligent terminal and sharing system Pending CN117390650A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311451293.0A CN117390650A (en) 2023-11-03 2023-11-03 Data providing, using and sharing method, intelligent terminal and sharing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311451293.0A CN117390650A (en) 2023-11-03 2023-11-03 Data providing, using and sharing method, intelligent terminal and sharing system

Publications (1)

Publication Number Publication Date
CN117390650A true CN117390650A (en) 2024-01-12

Family

ID=89471779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311451293.0A Pending CN117390650A (en) 2023-11-03 2023-11-03 Data providing, using and sharing method, intelligent terminal and sharing system

Country Status (1)

Country Link
CN (1) CN117390650A (en)

Similar Documents

Publication Publication Date Title
US11004067B2 (en) Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
US11469878B2 (en) Homomorphic computations on encrypted data within a distributed computing environment
KR102180991B1 (en) Regulation of confidential blockchain transactions
US20220084013A1 (en) Identity management, smart contract generator, and blockchain mediating system, and related methods
CN110419053A (en) System and method for information protection
WO2019032089A1 (en) Blockchain architecture with record security
CN110378755B (en) Electronic invoice generation method and device, computer equipment and storage medium
CN110189184B (en) Electronic invoice storage method and device
US20220311611A1 (en) Reputation profile propagation on blockchain networks
US11711286B2 (en) Compliance mechanisms in blockchain networks
US20210217098A1 (en) Blockchain-based message services for time-sensitive events
CN112435026A (en) Method and device for protecting file transaction information by using zero-knowledge proof and electronic equipment
WO2021114495A1 (en) Supply chain transaction privacy protection system and method based on blockchain, and related device
US20210217100A1 (en) Storage management based on message feedback
Liang et al. Decentralized crowdsourcing for human intelligence tasks with efficient on-chain cost
US20150206143A1 (en) Line item processing in a multi-layer transaction tracking system
US11496316B1 (en) System and method for identity verification for online dating
CN111753018B (en) E-letter method, system and computer equipment
CN117390650A (en) Data providing, using and sharing method, intelligent terminal and sharing system
Senthilkumar Data confidentiality, integrity, and authentication
CN113536372A (en) Data processing method and device and electronic equipment
Hardjono et al. Privacy-preserving claims exchange networks for virtual asset service providers
US20220036355A1 (en) Methods and devices for privacy-preserving verification of profit-sharing between users
US11893553B1 (en) Systems and methods of exchanging digital assets using a public key cryptography (PKC) framework
US20230081416A1 (en) Anonymous private shared partitions in blockchain networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination