CN117454437B - Transaction processing method, storage medium and electronic device - Google Patents

Transaction processing method, storage medium and electronic device Download PDF

Info

Publication number
CN117454437B
CN117454437B CN202311776550.8A CN202311776550A CN117454437B CN 117454437 B CN117454437 B CN 117454437B CN 202311776550 A CN202311776550 A CN 202311776550A CN 117454437 B CN117454437 B CN 117454437B
Authority
CN
China
Prior art keywords
transaction
information
target
receiving
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311776550.8A
Other languages
Chinese (zh)
Other versions
CN117454437A (en
Inventor
俞海清
胡益榕
张舒畅
宋英齐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tianrun Foundation Technology Development Co ltd
Original Assignee
Beijing Tianrun Foundation Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tianrun Foundation Technology Development Co ltd filed Critical Beijing Tianrun Foundation Technology Development Co ltd
Priority to CN202311776550.8A priority Critical patent/CN117454437B/en
Publication of CN117454437A publication Critical patent/CN117454437A/en
Application granted granted Critical
Publication of CN117454437B publication Critical patent/CN117454437B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a transaction processing method, a storage medium and electronic equipment, and relates to the field of information security. The transaction processing method comprises the following steps: generating target transaction information and determining target encryption information corresponding to the target transaction information; the target encryption information is sent to the information receiving end, so that the information receiving end stores the target encryption information and then generates a receiving evidence; receiving a receiving certificate sent by an information receiving end; and sending the receiving certificate and the target encryption information to the transaction execution end so that the transaction execution end verifies whether the target encryption information is stored in the information receiving end or not based on the receiving certificate, verifies whether the target encryption information is correctly generated by the transaction initiation end for the target transaction information, and executes the target transaction information with the transaction initiation end under the condition that verification is passed. The method and the device ensure traceability, reliability and safety of the transaction, and reduce transaction risk and possible transaction loss.

Description

Transaction processing method, storage medium and electronic device
Technical Field
The present application relates to the field of information security technologies, and in particular, to a transaction processing method, a storage medium, and an electronic device.
Background
Currently, with the development of network technology, blockchain transactions are increasingly applied in various scenes. However, when both parties to the transaction conduct an electronic transaction, the initiator and the recipient may tamper with the transaction data, thereby affecting the fairness and transparency of the transaction. Meanwhile, in the process of transaction hosting and transaction verification, interaction of related transaction data among multiple parties is involved, and how to guarantee privacy of the related transaction data and security of the transaction in the process is an urgent problem to be solved.
Disclosure of Invention
In view of the foregoing, embodiments of the present application provide a transaction processing method, a storage medium, and an electronic device.
In a first aspect, an embodiment of the present application provides a transaction processing method, which is applied to a transaction initiating terminal. The method comprises the following steps: generating target transaction information, and determining target encryption information corresponding to the target transaction information, wherein the target encryption information comprises a transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information, and an electronic signature executed on the transaction ciphertext and the transaction tag; the target encryption information is sent to the information receiving end, so that the information receiving end stores the target encryption information and then generates a receiving evidence; receiving a receiving certificate sent by an information receiving end; and sending the receiving certificate and the target encryption information to the transaction execution end so that the transaction execution end verifies whether the target encryption information is stored in the information receiving end or not based on the receiving certificate, verifies whether the target encryption information is correctly generated by the transaction initiation end for the target transaction information, and executes the target transaction information with the transaction initiation end under the condition that verification is passed.
With reference to the first aspect, in some implementations of the first aspect, the method for generating the target encryption information includes: generating a key pair based on the security parameters, the key pair including an encryption key and a verification key; encrypting the target transaction information by using an encryption key through an verifiable encryption algorithm to generate a transaction ciphertext corresponding to the target transaction information; calculating the target transaction information by using a type calculation function, inputting a calculation result and an encryption key into a verifiable random function, and generating a transaction tag corresponding to the target transaction information; based on the encryption key, signing the transaction ciphertext and the transaction tag to generate an electronic signature.
With reference to the first aspect, in certain implementation manners of the first aspect, verifying whether the target encryption information is correctly generated by the transaction initiator for the target transaction information includes: when the transaction ciphertext is obtained and generated, a first certificate output by the encryption algorithm can be verified, and whether the transaction ciphertext is generated based on the target transaction information and the encryption key or not is verified based on the first certificate; when the transaction label is generated, the second certificate output by the random function can be verified, and whether the transaction label is correctly generated based on the target transaction information or not is verified based on the second certificate; and acquiring a verification key corresponding to the transaction initiating terminal, and verifying whether the electronic signature is generated by the transaction initiating terminal through a signature algorithm on the transaction ciphertext and the transaction tag based on the verification key.
With reference to the first aspect, in certain implementations of the first aspect, the method further includes: generating a target transaction tag based on the target transaction type when receiving a request of a transaction investigation end for retrieving transaction information belonging to the target transaction type; searching encryption information corresponding to transaction information matched with the target transaction tag in a designated database of the information receiving end based on the target transaction tag; verifying the validity of the electronic signature in the encrypted information; under the condition that the electronic signature passes the validity verification, the transaction ciphertext in the encryption information is decrypted by using the decryption key, so that the transaction information matched with the target transaction tag is obtained, and the transaction information is sent to the transaction investigation terminal.
With reference to the first aspect, in certain implementation manners of the first aspect, the sending the transaction information to the transaction investigation end includes: verifying the decryption correctness of the transaction information by using the verification key; and sending the transaction information to a transaction investigation end when the transaction information is decrypted correctly.
With reference to the first aspect, in certain implementations of the first aspect, the proof of receipt includes an electronic signature generated by the information receiving end based on the target encrypted information and a private key of the information receiving end.
In a second aspect, an embodiment of the present application provides a transaction processing method, which is applied to an information receiving end. The method comprises the following steps: receiving target encryption information corresponding to target transaction information sent by a transaction initiating terminal, wherein the target encryption information comprises a transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information, and an electronic signature executed on the transaction ciphertext and the transaction tag; classifying and storing the target encryption information to a specified database based on a transaction tag corresponding to the target transaction information; and generating a receiving evidence of the target encryption information, and sending the receiving evidence to the transaction initiating terminal so that the transaction initiating terminal sends the receiving evidence and the target encryption information to the transaction executing terminal, and executing the target transaction information with the transaction initiating terminal under the condition that the receiving evidence and the target encryption information pass verification by the transaction executing terminal.
In a third aspect, an embodiment of the present application provides a transaction processing method, which is applied to a transaction execution end. The method comprises the following steps: receiving target encryption information corresponding to target transaction information sent by a transaction initiating terminal and receiving evidence generated after the information receiving terminal stores the target encryption information, wherein the target encryption information comprises transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information and an electronic signature executed on the transaction ciphertext and the transaction tag; verifying the received certification; under the condition that the receiving evidence passes the verification, verifying the target encryption information; and executing the target transaction information with the transaction initiating terminal under the condition that the target encryption information passes the verification.
In a fourth aspect, an embodiment of the present application provides a transaction processing device applied to a transaction initiating terminal. The device comprises: the determining module is used for generating target transaction information and determining target encryption information corresponding to the target transaction information, wherein the target encryption information comprises a transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information and an electronic signature executed on the transaction ciphertext and the transaction tag; the first sending module is used for sending the target encryption information to the information receiving end so that the information receiving end can store the target encryption information and then generate a receiving evidence; the receiving module is used for receiving the receiving evidence sent by the information receiving end; and the second sending module is used for sending the receiving evidence and the target encryption information to the transaction execution end so that the transaction execution end verifies whether the target encryption information is stored in the information receiving end or not based on the receiving evidence, verifies whether the target encryption information is correctly generated by the transaction initiating end aiming at the target transaction information, and executes the target transaction information with the transaction initiating end under the condition that verification is passed.
In a fifth aspect, an embodiment of the present application provides a transaction processing device applied to an information receiving end. The device comprises: the receiving module is used for receiving target encryption information corresponding to target transaction information sent by the transaction initiating terminal, wherein the target encryption information comprises a transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information and an electronic signature executed on the transaction ciphertext and the transaction tag; the storage module is used for classifying and storing the target encryption information to the appointed database based on the transaction label corresponding to the target transaction information; the sending module is used for generating a receiving evidence of the target encryption information and sending the receiving evidence to the transaction initiating terminal so that the transaction initiating terminal can send the receiving evidence and the target encryption information to the transaction executing terminal, and the receiving evidence and the target encryption information can pass verification through the transaction executing terminal, and the receiving evidence and the target encryption information can execute the target transaction information with the transaction initiating terminal.
In a sixth aspect, an embodiment of the present application provides a transaction processing device applied to a transaction execution end. The device comprises: the receiving module is used for receiving target encryption information corresponding to target transaction information sent by the transaction initiating terminal and receiving evidence generated after the information receiving terminal stores the target encryption information, wherein the target encryption information comprises transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information and an electronic signature executed on the transaction ciphertext and the transaction tag; the first verification module is used for verifying the receiving evidence; the second verification module is used for verifying the target encryption information under the condition that the receiving evidence passes verification; and the transaction module is used for executing the target transaction information with the transaction initiating terminal under the condition that the target encryption information passes the verification.
In a seventh aspect, an embodiment of the present application provides a computer readable storage medium storing a computer program for executing the methods of the first, second and third aspects.
In an eighth aspect, an embodiment of the present application provides an electronic device, including: a processor; a memory for storing processor-executable instructions; the processor is configured to perform the methods of the first, second and third aspects.
The application provides an abuse-resistant transaction processing scheme which can be applied to privacy-protected transaction audit and transaction monitoring. Specifically, the transaction initiating terminal sends the target encryption information corresponding to the target transaction information to be executed to the information receiving terminal, so that the traceability and reliability of the transaction are ensured. Meanwhile, the transaction initiating terminal hosts the target encryption information corresponding to the target transaction information, so that the privacy and anonymity of the transaction can be ensured even if the information receiving terminal is corroded or maliciously attacked. And secondly, before the transaction execution end executes the target transaction information, firstly, the receiving evidence of the information receiving end is verified, so that the validity of the transaction process is ensured, and the loss possibly generated in the follow-up process is reduced. Finally, the target encryption information in the application comprises a transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information and an electronic signature, so that the correctness of the target transaction information is conveniently verified by the transaction execution end, the correspondence authentication between the target transaction information and the transaction initiation end is conveniently performed, the transaction risk is further reduced, and the transaction safety is ensured.
Drawings
The foregoing and other objects, features and advantages of the present application will become more apparent from the following more particular description of embodiments of the present application, as illustrated in the accompanying drawings. The accompanying drawings are included to provide a further understanding of embodiments of the application and are incorporated in and constitute a part of this specification, illustrate the application and not constitute a limitation to the application. In the drawings, like reference numerals generally refer to like parts or steps.
Fig. 1 is a flow chart of a transaction processing method according to an embodiment of the present application.
Fig. 2 is a flowchart of a method for generating target encryption information according to an embodiment of the present application.
Fig. 3 is a flowchart of verification target encryption information according to an embodiment of the present application.
Fig. 4 is a flow chart of a transaction processing method according to another embodiment of the present application.
Fig. 5 is a schematic structural diagram of a transaction processing device of a transaction initiation terminal according to an embodiment of the present application.
Fig. 6 is a schematic structural diagram of a transaction processing device at an information receiving end according to an embodiment of the present application.
Fig. 7 is a schematic structural diagram of a transaction processing device at a transaction execution end according to an embodiment of the present application.
Fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the technical solutions in the embodiments of the present application will be made clearly and completely with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
Fig. 1 is a flow chart of a transaction processing method according to an embodiment of the present application. Illustratively, the present embodiment relates to a transaction initiator, an information receiver, and a transaction executor. As shown in fig. 1, the transaction processing method in the present embodiment includes the following steps.
Step S110, generating target transaction information and determining target encryption information corresponding to the target transaction information. Specifically, the transaction initiating terminal generates target transaction information and determines target encryption information corresponding to the target transaction information.
In this embodiment, the target transaction information is converted into target encrypted information using an encryption algorithm to protect confidentiality of the target transaction information. Illustratively, the encryption algorithm that may be employed by the present embodiment is symmetric encryption that uses the same key to encrypt and decrypt data, and asymmetric encryption that uses a public key and a private key to encrypt and decrypt data, respectively. In practical application, for symmetric encryption, the transaction initiating terminal encrypts the target transaction information by using its own key to obtain target encryption information, and sends the key to the information receiving terminal, so that the information receiving terminal decrypts the target encryption information by using the key of the transaction initiating terminal. For asymmetric encryption, the transaction initiating terminal encrypts the target encryption information by using the public key of the information receiving terminal, and the information receiving terminal decrypts the target encryption information by using the private key of the information receiving terminal.
Step S120, the target encryption information is transmitted. Specifically, the transaction initiating terminal transmits the target encryption information to the information receiving terminal.
In this embodiment, when the transaction initiating terminal and the information receiving terminal communicate, and the transaction initiating terminal and the transaction executing terminal communicate, some measures may be taken to ensure the security and credibility of the communication environment. Illustratively, a strictly security-reviewed communication protocol is selected to ensure data security and integrity during communication; alternatively, the communication device and software are updated periodically to fix known security vulnerabilities to reduce the risk of being attacked.
Step S130, classifying and storing the target encryption information to a specified database based on the transaction label corresponding to the target transaction information. Specifically, the information receiving end classifies and stores the target encryption information to a specified database based on the transaction tag corresponding to the target transaction information.
The transaction tag refers to an identifier that classifies the target encrypted information, e.g., the transaction tag may use encryption techniques to generate the target transaction information. In addition, in generating transaction tags, a number of factors, such as information on the type, time, price, quantity, etc. of the transaction, need to be considered, and thus, complex algorithms and models, which may be implemented using a programming language such as Python, are required to generate accurate transaction tags.
The database structure of the specified database in this embodiment is designed according to the characteristics of the target encryption information, and includes fields of a table, data types, indexes, and the like. And the designated database is reasonably index designed, partitioned, tabulated and the like so as to improve the processing speed of target encryption information. Since the target encryption information is important business data, the data in the appointed database is also backed up regularly and can be restored quickly. And finally, monitoring and optimizing the appointed database so as to discover and solve the problems in time and ensure the normal processing of the target encryption information.
Step S140, a reception proof of the target encryption information is generated. Specifically, the information receiving end generates a reception proof of the target encrypted information.
The reception proof in this embodiment is used to prove that the information receiving end has successfully received the target encrypted information.
In one example, the proof of receipt includes an electronic signature generated by the information receiving end based on the target encrypted information and a private key of the information receiving end. The electronic signature in this example can prove that the information receiving end has received the target encryption information sent by the transaction initiating end, and can prevent the information receiving end from repudiating that the data is not received in the subsequent transaction; secondly, the electronic signature is realized based on a symmetric encryption technology, so that the safety of subsequent data transmission can be ensured, and the data is prevented from being tampered or forged. Finally, the electronic signature is used as a receiving evidence, so that the traditional process of paper evidence requiring mailing or transmission can be avoided, and time and cost are saved. The data referred to herein refers to data related to the target transaction information.
In another example, the received proof includes information including a timestamp, an information digest, and the like in addition to the electronic signature. The time stamp is used for proving when the information support end receives the target encryption information, and the information abstract is used for proving that the target encryption information received by the information support end is consistent with the target encryption information of the transaction initiating end. The receiving evidence in the example contains richer content, so that the transaction execution end can verify the reliability and the authenticity of the transaction from more dimensions before executing the target transaction information.
Step S150, sending the receiving evidence. Specifically, the information receiving end sends the receiving evidence to the transaction initiating end.
Step S160, transmitting the reception certificate and the target encryption information. Specifically, the transaction initiating terminal transmits the receiving evidence and the target encryption information to the transaction executing terminal.
As described above, when the information receiving end communicates with the transaction initiating end and when the transaction initiating end communicates with the transaction executing end, some measures may be taken to ensure the security and credibility of the communication environment, and specific measures may be referred to as step S120.
Step S170, verifying the received certification. Specifically, the transaction execution end verifies the receipt proof.
If the received certificate is the electronic signature of the information receiving end, the method for verifying the received certificate by the transaction execution end comprises the following steps: and verifying the electronic signature by using the public key of the transaction execution end.
If the received evidence comprises the information such as the time stamp, the information abstract and the electronic signature, the transaction execution end can verify the received evidence from three aspects of the time stamp, the information abstract and the electronic signature after receiving the received evidence. Illustratively, the transaction execution terminal verifies the timestamp based on the time when the transaction initiation terminal sent the target encryption information to the information receiving terminal; verifying the electronic signature based on the public key of the information receiving end; the transaction execution end decrypts the information abstract by using the public key of the information support end to obtain a hash value of the target encryption information, the transaction execution end uses the same hash algorithm to carry out hash calculation on the target encryption information to obtain the hash value of the target encryption information, compares whether the two hash values obtained by the two calculation modes are the same or not, if so, the receiving evidence is valid, and the target encryption information is correctly stored in the information support end to realize verification of the information abstract.
In step S180, in the case where the reception certificate passes the verification, the target encrypted information is verified. Specifically, the transaction execution end verifies the target encryption information under the condition that the received certification passes verification.
Illustratively, the transaction executing end sends challenge information to the information receiving end, e.g., requiring the information receiving end to provide specific attributes of the target encryption information. The information receiving end uses the challenge information and the receiving evidence to generate response information, and sends the response information to the transaction executing end. It should be noted that, the response information in this embodiment corresponds to the challenge information, that is, the response information is a specific value of a specific attribute of the target encryption information that the information receiving end wants to obtain. The transaction execution end uses the receipt proof, the challenge information and the response information to verify the target encryption information.
Step S190, executing the target transaction information with the transaction initiating terminal under the condition that the target encryption information passes verification. Specifically, the transaction executing end executes the target encryption information with the transaction initiating end under the condition that the target encryption information passes verification.
When the transaction executing terminal executes the target encryption information with the transaction initiating terminal, the transaction executing terminal can also send the target encryption information to other organization members for confirmation, and verify related transaction information according to the endorsement policy of the specific application program, so as to ensure that the transaction meets all conditions.
In addition, in the process of executing the transaction, the transaction execution end needs to pay attention to the following information: the identity and authority of the transaction initiating terminal so as to ensure the legitimacy of the transaction; the content and purpose of the transaction in order to perform the correct operation; an endorsement policy to ensure that the transaction meets all conditions; consensus protocol to ensure that transactions are properly ordered and confirmed.
The application provides an abuse-resistant transaction processing scheme which can be applied to privacy-protected transaction audit and transaction monitoring. Specifically, the transaction initiating terminal sends the target encryption information corresponding to the target transaction information to be executed to the information receiving terminal, so that the traceability and reliability of the transaction are ensured. Meanwhile, the transaction initiating terminal hosts the target encryption information corresponding to the target transaction information, so that the privacy and anonymity of the transaction can be ensured even if the information receiving terminal is corroded or maliciously attacked. And secondly, before the transaction execution end executes the target transaction information, firstly, the receiving evidence of the information receiving end is verified, so that the validity of the transaction process is ensured, and the loss possibly generated in the follow-up process is reduced. Finally, the target encryption information in the application comprises a transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information and an electronic signature, so that the correctness of the target transaction information is conveniently verified by the transaction execution end, the correspondence authentication between the target transaction information and the transaction initiation end is conveniently performed, the transaction risk is further reduced, and the transaction safety is ensured.
In the following, in connection with the cryptographic protocol, how to generate and verify the target encryption information, how to respond to the investigation requirements of the transaction investigation end, etc. are specifically described on the basis of the embodiment shown in fig. 1.
First, each protocol involved in the following embodiments will be described.
Firstly, inputting a safety parameter, correspondingly, generating public and private key pairs of an information receiving end to be recorded as #) And public-private key pair (++) of transaction initiating terminal>)。
Escrow protocol: is an interactive protocol between the transaction initiating terminal and the information receiving terminal, which is to add the related transaction information of the transaction initiating terminal into the database of the information receiving terminal (the database can be public), and make the transaction initiating terminal receive a receipt proof from the information receiving terminal for the transaction executing terminal to carry out subsequent verification on the receipt proof. It should be noted that, the database of the information receiving end in the present application may be public.
Receiving a proof verification protocol: the interactive protocol between the transaction initiating terminal and the transaction executing terminal aims at the transaction executing terminal to verify the receipt proof provided by the transaction initiating terminal, and the transaction executing terminal returns an acceptance/rejection.
Calling protocol: interaction agreement between transaction investigation terminal and transaction initiation terminal, transaction investigation terminal inputting a pairing in the agreement Indicating that the transaction type of the transaction initiating terminal in the database needs to be acquired is +.>Is a transaction information of the transaction information. If the transaction initiating terminal refuses to cooperate with the investigation, the protocol outputs a concopt, otherwise the protocol outputs transaction information of all transaction TYPEs of the transaction initiating terminal equal to TYPE to the transaction investigating terminal.
Next, the properties that should be satisfied for the entire scheme include:
completeness of the flow: if all transaction initiation terminals adhere to the protocol, then each piece of hosted transaction information can be obtained by the transaction investigation terminal through the summoning protocol.
Verifiability: if the transaction information presented by the transaction initiator to the information receiver in the escrow agreement is incorrect, his counter-party (transaction executing end) will reject the transaction during the proof of receipt verification phase.
Escape-disabled summons: in the call protocol, either the transaction investigation end is judged as refusing to match the investigation (i.e. the call protocol outputs a contract), or all the transaction information with Type equal to Type in the database is revealed to the transaction investigation end.
Non-tamperable: the information receiving end cannot forge the transaction information of any transaction initiating end.
Privacy: for two different hosted transaction messages, the message receiving end can only determine whether the two transaction messages belong to the same category (i.e. whether the sponsors of the two transaction messages are the same and the transaction types are the same), but cannot obtain any redundant message.
Fig. 2 is a flowchart of a method for generating target encryption information according to an embodiment of the present application. The embodiment shown in fig. 2 is extended from the embodiment shown in fig. 1, and differences between the embodiment shown in fig. 2 and the embodiment shown in fig. 1 are described with emphasis, and the details of the differences are not repeated.
As shown in fig. 2, the generation method of the target encryption information includes the following steps.
Step S210, a key pair is generated based on the security parameters.
The key pair includes an encryption key and an authentication key, and the key pair of the transaction initiation terminal in this embodiment may be expressed as @) Wherein->Is an encryption key->Is an authentication key. In one example, the process of generating the security parameters and key pairs using the Diffie-Hellman algorithm is as follows: two large prime numbers p and g are selected, wherein g is the primitive root of p, the transaction initiating terminal selects a private key a, and calculates the public key +.>. In this process, p and g are security parameters and a are key pairs at the transaction initiation end. In another example, the process of generating the security parameter and key pair using ECC is as follows: selecting an elliptic curve E and a base point G, wherein E and G are public parameters, selecting a private key d by a transaction initiating terminal, and calculating a public key +. >. In this process, E and G are security parameters and d and P are key pairs at the transaction initiation end.
Step S220, encrypting the target transaction information by using the encryption key through the verifiable encryption algorithm, and generating a transaction ciphertext corresponding to the target transaction information.
The verifiable encryption algorithm in this embodiment includes four algorithms, including, in addition to the generation of the key pair in step S210:
: representing the input key k and a message m, outputting +.>Wherein->Is the ciphertext of message m, ">Is a certificate.
Representing the input of a ciphertext c and a key k, resulting in a decrypted plaintext. Here the requirement is
: representing the input of a public key pk, message m, ciphertext c, and a certificate +.>And outputting acceptance/rejection. Ver satisfies the following properties if +.>Ver will output an accept if c is not equal to +.>Then whatever proof file is entered +.>Ver will output a rejection.
The transaction ciphertext in this embodiment is as described in step S210Enc represents a verifiable encryption algorithm.
Step S230, calculating the target transaction information by using the type calculation function, and inputting the calculation result and the encryption key into the verifiable random function to generate a transaction tag corresponding to the target transaction information.
Aiming at the type calculation function, rules of transaction labels are defined first, and then judgment is carried out by utilizing target transaction information.
Verifiable random function has a pair of public key and private key. For any one input x, the private key k is used, andto output a value +.>And a certificate +.>. Will prove->In combination with the public key pk, it is possible to verify whether there is really thereI.e. it is not honest to check the assignment of F. In addition, a verifiable random function can be used for generating a trusted random number, so that an electronic lottery protocol is realized. Specifically, the verifiable random function in this embodiment includes the following three algorithms:
: representing the input of a security parameter, outputting a pair of public key private keys +.>
: represents the input private key k and x, output +.>Here->,/>Is a certificate.
: representing the input public key PK, x, y and a certificate +.>And outputting acceptance/rejection. Ver satisfies the following properties if +.>Then Ver will output an acceptance; if y is not equal to +.>Then do nothing>Ver will output a rejection.
Based on the above, the transaction tag in this embodiment can be expressed asWhere VRF represents a verifiable random function and Type represents a Type calculation function.
Step S240, signature is carried out on the transaction ciphertext and the transaction tag based on the encryption key, and an electronic signature is generated.
The electronic signature can carry out identity authentication to prove that the electronic signature actually has the private key SK corresponding to the public key PK. In general, if the transaction execution end wants the transaction initiation end to prove that the transaction initiation end has the SK corresponding to the PK, the transaction execution end firstly sends a message m to the transaction initiation end randomly, and then the transaction initiation end calls a signature algorithm to generate a messageAnd send to the transaction execution end, after receiving the information, the transaction execution end calls Ver algorithm to check whether the Sig returned by the transaction initiation end can pass the check, i.e. the transaction execution end checks whether +.>. If the transaction initiating terminal does possess SK, the transaction initiating terminal can calculate Sig by using a signature algorithm, so that the transaction executing terminal can check and pass, and if the transaction initiating terminal does not possess SK, the transaction initiating terminal cannot use the signature algorithm, and therefore the transaction initiating terminal cannot return a Sig capable of passing the Ver algorithm.
In this embodiment, the transaction initiation terminalAnd signing the transaction ciphertext and the transaction tag serving as a message m to obtain an electronic signature corresponding to the transaction initiating terminal. Along with the above, the electronic signature of the transaction initiator may be expressed as Sig is an electronic signature scheme.
In this embodiment, it is explained in detail how to generate target encryption information such as transaction ciphertext, transaction tag, and electronic signature. Specifically, the verifiable encryption algorithm is utilized to generate the transaction ciphertext, so that the integrity and the authenticity of the transaction ciphertext can be verified, the transaction ciphertext is prevented from being tampered or forged, and the safety and the reliability of the transaction ciphertext are ensured. The method can effectively prevent the target transaction information from being tampered or forged, thereby ensuring the safety and reliability of the transaction. In addition, the transaction label generated by the verifiable random function is random, so that the sender and the receiver of the target transaction information cannot be tracked through the transaction label, the privacy of a transaction initiating terminal is protected, and the anonymity of the transaction is improved. The transaction ciphertext and the transaction tag are used as the information to sign, so that the transaction data can be ensured not to be tampered or forged, meanwhile, the true identities of both transaction parties can be confirmed, the repudiation is prevented from occurring in the transaction, and the safety and the reliability of the transaction are ensured.
Fig. 3 is a flowchart of verification target encryption information according to an embodiment of the present application. The embodiment shown in fig. 3 is extended from the embodiment shown in fig. 2, and differences between the embodiment shown in fig. 3 and the embodiment shown in fig. 2 are described with emphasis, and the details of the differences are not repeated.
As shown in fig. 3, in the present embodiment, verifying whether the target encryption information is correctly generated by the transaction initiator for the target transaction information includes the following steps.
In step S310, when the transaction ciphertext is generated, the first certificate output by the encryption algorithm may be verified, and based on the first certificate, whether the transaction ciphertext is generated based on the target transaction information and the encryption key may be verified.
Specifically, the first certificate is used for proving that the transaction ciphertext c is indeed the target transaction informationCorresponding private keyEncryption below.
Illustratively, the verifiable encryption algorithm in this embodiment is constructed by the following steps:
order theFor the binary length of p, let security parameter be +.>Let->Assume the length of a messageTwo cryptographic hash functions H1, H2 are selected, whose output lengths are +.>
: the representation is the same as the key in the VRF.
: indicating that a length of +.>Calculating +. >Wherein->Note that use +.>Can reversely restore m and r. Cipher textWherein->Proof file->Is about proposition>Is a non-interactive zero knowledge proof of (a).
: indicating that pair c is +.>Two solutions can be obtained for the middle-open 2k times>O and +.>Less than->And then reduced to give m.
To verify zero knowledge proof.
Next, the first certificate is specifically described in conjunction with step S310How it is generated by the transaction initiator and how the transaction executor verifies:
is generated by: randomly select->Taking->,/>The method comprises the steps of carrying out a first treatment on the surface of the Order theWherein Hash is a Hash function; let->First certificate
For the first certificateIs verified by: transaction execution side calculation->,/>The method comprises the steps of carrying out a first treatment on the surface of the Check whether there is
Step S320, when the transaction tag is generated, the second certificate outputted by the random function may be verified, and based on the second certificate, whether the transaction tag is correctly generated based on the target transaction information may be verified.
The second certificate is used for proving that t is VRF useCorresponding private key->And Type (m).
Illustratively, the construction process of the verifiable random function in this embodiment includes:
order theIs two larger primes, and +.>The method comprises the steps of carrying out a first treatment on the surface of the Let->Is- >Is a generator of the above.
Construction of VRF: order theIs a cryptographic hash function.
: randomly select->
: return->Wherein->,/>Is to proposition>"a non-interactive zero knowledge proof.
Is the verification of zero knowledge proof.
Next, the second certificate is specifically described in conjunction with step S320How it is generated by the transaction initiator and how the transaction executor verifies:
second certificateIs generated by: randomly select->Taking->The method comprises the steps of carrying out a first treatment on the surface of the Order theWherein Hash is a Hash function; let->The method comprises the steps of carrying out a first treatment on the surface of the Second certificate->
For the second certificateIs verified by: transaction execution side calculation->The method comprises the steps of carrying out a first treatment on the surface of the Check whether there is
Step S330, a verification key corresponding to the transaction initiating terminal is obtained, and whether the electronic signature is generated by the transaction initiating terminal through a signature algorithm on the transaction ciphertext and the transaction tag is verified based on the verification key.
In one example, the transaction executing end decrypts the electronic signature using the verification key to obtain the plaintext message. Then, the transaction initiating terminal composes the transaction tag and the transaction ciphertext into a message m, and then signs the message m by using the same signature algorithm to obtain another electronic signature. And finally, the public key of the transaction initiating terminal and the newly generated electronic signature are transmitted to the transaction executing terminal. The transaction execution end uses the public key of the transaction initiation end to decrypt the newly generated electronic signature to obtain a plaintext message ++ >. If->And->And if the information m is equal, the electronic signature is generated by signing the information m by the transaction initiating terminal, and the electronic signature is valid. Otherwise, the electronic signature is invalid.
In another example, the nature of the electronic signature is utilized to directly input the verification key of the transaction initiating terminal into the verification algorithm, and if the output of the verification algorithm is 1, the electronic signature is indicated to be generated by the transaction initiating terminal on the transaction ciphertext and the transaction tag by utilizing the signature algorithm; if the verification algorithm output is 0, the electronic signature is not generated by the transaction initiating terminal on the transaction ciphertext and the transaction tag by using a signature algorithm.
In this embodiment, by verifying the first certificate, the second certificate and the electronic signature of the transaction initiating terminal, it can be ensured that the target encrypted information is actually generated correctly by the transaction initiating terminal according to the target transaction information at the moment, and further the target transaction information is prevented from being tampered or forged, thereby ensuring the security and reliability of the transaction.
Fig. 4 is a flow chart of a transaction processing method according to another embodiment of the present application. The embodiment shown in fig. 4 is extended from the embodiment shown in fig. 1, and differences between the embodiment shown in fig. 4 and the embodiment shown in fig. 1 are described with emphasis, and the details of the differences are not repeated.
As shown in fig. 4, the transaction processing method provided in this embodiment includes the following steps.
Step S410, when a request of a transaction investigation end for retrieving transaction information belonging to a target transaction type is received, a target transaction tag is generated based on the target transaction type.
Specifically, the transaction investigation terminal indicates that the terminal needs to acquire the transaction information with the transaction type T of the transaction initiating terminal, and the transaction initiating terminal calculatesAnd use->The calculated t is proved to be correct. Illustratively, the transaction investigation terminal is a court.
It should be noted that, the transaction investigation end cannot calculate the transaction tag according to the transaction type T, and therefore, the investigated transaction initiator is required to calculate the transaction tag. Because of the verifiability of the VRF, the transaction investigation end can check whether the transaction tag generated by the transaction initiation end is correct.
Step S420, based on the target transaction label, searching the appointed database of the information receiving end for the encryption information corresponding to the transaction information matched with the target transaction label.
Specifically, a specified database is queried for all qualified transaction cryptograms using the transaction tag t.
Step S430, verifying the validity of the electronic signature in the encrypted information.
Ciphertext for each transactionTransaction investigation terminal checks signature->Whether or not to be combinedBy a method. If the signature is illegal, the transaction investigation end considers the transaction as unrealistic, and the transaction investigation end can skip the transaction possibly forged by a malicious attacker. In addition, if the electronic signature is illegal, the transaction initiating terminal can deny that the transaction ciphertext is the true transaction of the transaction initiating terminal.
Step S440, under the condition that the electronic signature passes the validity verification, the transaction ciphertext in the encrypted information is decrypted by using the decryption key, so that the transaction information matched with the target transaction tag is obtained, and the transaction information is sent to the transaction investigation terminal.
In one implementation, sending transaction information to a transaction investigation end includes: verifying the decryption correctness of the transaction information by using the verification key; and sending the transaction information to a transaction investigation end when the transaction information is decrypted correctly. In this embodiment, it can be ensured that the transaction initiation end will certainly perform correct decryption on the transaction ciphertext.
Specifically, if the signature is legitimate, the transaction initiator uses its own keyDecryption->Obtain->Will->Sent to the transaction investigation terminal and use his own +. >The decryption is proved to be correct.
Further, if the transaction initiating terminal performs the steps of step S430 and step S440, the transaction investigation terminal obtains all transaction information of the transaction initiating terminal with the transaction type T. If the transaction initiating terminal does not completely perform step S430 and step S440, the transaction investigation terminal considers that the transaction initiating terminal does not cooperate with investigation, and outputs a concot.
In this embodiment, by searching the corresponding encrypted information in the specified database through the target transaction tag, the correctness of the type of the obtained encrypted information can be ensured, and errors caused by mismatch of transaction types can be avoided. By effectively authenticating the electronic signature in the encrypted information, the encrypted information can be ensured to be signed by the transaction initiating terminal, the transaction information is not tampered, the authenticity and the legality of the transaction information are ensured, and the fairness of the transaction investigation terminal on the transaction initiating terminal is further ensured.
Embodiments of the transaction processing method of the present application are described above in detail with reference to fig. 1 to 4, and embodiments of the transaction processing device of the present application are described below in detail with reference to fig. 5 to 7. It will be appreciated that the description of the embodiments of the transaction processing method corresponds to the description of the embodiments of the transaction processing device and that parts not described in detail may therefore be referred to the previous method embodiments.
Fig. 5 is a schematic structural diagram of a transaction processing device of a transaction initiation terminal according to an embodiment of the present application. As shown in fig. 5, a transaction processing device 50 provided in an embodiment of the present application includes:
the determining module 510 is configured to generate target transaction information, and determine target encryption information corresponding to the target transaction information, where the target encryption information includes a transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information, and an electronic signature executed on the transaction ciphertext and the transaction tag;
the first sending module 520 is configured to send the target encrypted information to the information receiving end, so that the information receiving end stores the target encrypted information and generates a receiving proof;
a receiving module 530, configured to receive a receipt proof sent by the information receiving end;
the second sending module 540 is configured to send the receiving proof and the target encryption information to the transaction executing end, so that the transaction executing end verifies whether the target encryption information is stored at the information receiving end, and verifies whether the target encryption information is correctly generated by the transaction initiating end for the target transaction information, and if the verification passes, executes the target transaction information with the transaction initiating end.
In an embodiment of the present application, the first determining module 510 is further configured to generate, based on the security parameter, a key pair, where the key pair includes an encryption key and an authentication key; encrypting the target transaction information by using an encryption key through an verifiable encryption algorithm to generate a transaction ciphertext corresponding to the target transaction information; calculating the target transaction information by using a type calculation function, inputting a calculation result and an encryption key into a verifiable random function, and generating a transaction tag corresponding to the target transaction information; based on the encryption key, signing the transaction ciphertext and the transaction tag to generate an electronic signature.
In an embodiment of the present application, the second sending module 540 is further configured to, when receiving a request from the transaction investigation end for retrieving transaction information belonging to a target transaction type, generate a target transaction tag based on the target transaction type; searching encryption information corresponding to transaction information matched with the target transaction tag in a designated database of the information receiving end based on the target transaction tag; verifying the validity of the electronic signature in the encrypted information; under the condition that the electronic signature passes the validity verification, the transaction ciphertext in the encryption information is decrypted by using the decryption key, so that the transaction information matched with the target transaction tag is obtained, and the transaction information is sent to the transaction investigation terminal.
In an embodiment of the present application, the second sending module 540 is further configured to verify the decryption correctness of the transaction information by using the verification key; and sending the transaction information to a transaction investigation end when the transaction information is decrypted correctly.
In one embodiment of the present application, the received proof includes an electronic signature generated by the information receiving end based on the target encrypted information and the private key of the information receiving end.
Fig. 6 is a schematic structural diagram of a transaction processing device at an information receiving end according to an embodiment of the present application. As shown in fig. 6, a transaction processing device 60 provided in an embodiment of the present application includes:
the receiving module 610 is configured to receive target encryption information corresponding to target transaction information sent by a transaction initiator, where the target encryption information includes a transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information, and an electronic signature executed on the transaction ciphertext and the transaction tag;
the storage module 620 is configured to store the target encrypted information in a specified database in a classified manner based on the transaction tag corresponding to the target transaction information;
the sending module 630 is configured to generate a receiving proof of the target encryption information, and send the receiving proof to the transaction initiating terminal, so that the transaction initiating terminal sends the receiving proof and the target encryption information to the transaction executing terminal, and execute the target transaction information with the transaction initiating terminal when the transaction executing terminal passes the verification of the receiving proof and the target encryption information.
Fig. 7 is a schematic structural diagram of a transaction processing device at a transaction execution end according to an embodiment of the present application. As shown in fig. 7, a transaction processing device 70 provided in an embodiment of the present application includes:
the receiving module 710 is configured to receive target encryption information corresponding to target transaction information sent by the transaction initiating terminal, and a receipt proof generated after the information receiving terminal stores the target encryption information, where the target encryption information includes a transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information, and an electronic signature executed on the transaction ciphertext and the transaction tag;
a first verification module 720, configured to verify the received proof;
a second verification module 730, configured to verify the target encryption information if the received certificate passes the verification;
the transaction module 740 is configured to execute the target transaction information with the transaction initiator if the target encryption information passes the verification.
In an embodiment of the present application, the second verification module 730 is further configured to, when obtaining the generated transaction ciphertext, verify the first certificate output by the encryption algorithm, and verify, based on the first certificate, whether the transaction ciphertext is generated based on the target transaction information and the encryption key; when the transaction label is generated, the second certificate output by the random function can be verified, and whether the transaction label is correctly generated based on the target transaction information or not is verified based on the second certificate; and acquiring the verification key corresponding to the transaction initiating terminal, and verifying whether the electronic signature is generated by the transaction initiating terminal through a signature algorithm on the transaction ciphertext and the transaction tag based on the verification key.
Next, an electronic device according to an embodiment of the present application is described with reference to fig. 8. Fig. 8 is a schematic structural diagram of an electronic device according to an exemplary embodiment of the present application.
As shown in fig. 8, the electronic device 80 includes one or more processors 801 and memory 802.
The processor 801 may be a Central Processing Unit (CPU) or other form of processing unit having data processing and/or instruction execution capabilities and may control other components in the electronic device 80 to perform desired functions.
Memory 802 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM) and/or cache memory (cache), and the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, and the like. One or more computer program instructions may be stored on the computer readable storage medium that can be executed by the processor 801 to implement the transaction processing methods and/or other desired functions of the various embodiments of the present application described above. Various contents such as including target transaction information, target encryption information, receipt certification, and the like may also be stored in the computer-readable storage medium.
In one example, the electronic device 80 may further include: an input device 803 and an output device 804, which are interconnected by a bus system and/or other forms of connection mechanisms (not shown).
The input device 803 may include, for example, a keyboard, a mouse, and the like.
The output device 804 may output various information to the outside, including target transaction information, target encryption information, reception certificate, and the like. The output device 804 may include, for example, a display, speakers, a printer, and a communication network and remote output devices connected thereto, etc.
Of course, only some of the components of the electronic device 80 relevant to the present application are shown in fig. 8 for simplicity, components such as buses, input/output interfaces, and the like being omitted. In addition, the electronic device 80 may include any other suitable components depending on the particular application.
In addition to the methods and apparatus described above, embodiments of the present application may also be a computer program product comprising computer program instructions which, when executed by a processor, cause the processor to perform the steps in the transaction processing methods according to the various embodiments of the present application described above in this specification.
The computer program product may write program code for performing the operations of embodiments of the present application in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present application may also be a computer-readable storage medium, having stored thereon computer program instructions, which when executed by a processor, cause the processor to perform the steps in the transaction processing method according to various embodiments of the present application described above in the present specification.
The computer readable storage medium may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may include, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The basic principles of the present application have been described above in connection with specific embodiments, however, it should be noted that the advantages, benefits, effects, etc. mentioned in the present application are merely examples and not limiting, and these advantages, benefits, effects, etc. are not to be considered as necessarily possessed by the various embodiments of the present application. Furthermore, the specific details disclosed herein are for purposes of illustration and understanding only, and are not intended to be limiting, as the application is not intended to be limited to the details disclosed herein as such.
The block diagrams of the devices, apparatuses, devices, systems referred to in this application are only illustrative examples and are not intended to require or imply that the connections, arrangements, configurations must be made in the manner shown in the block diagrams. As will be appreciated by one of skill in the art, the devices, apparatuses, devices, systems may be connected, arranged, configured in any manner. Words such as "including," "comprising," "having," and the like are words of openness and mean "including but not limited to," and are used interchangeably therewith. The terms "or" and "as used herein refer to and are used interchangeably with the term" and/or "unless the context clearly indicates otherwise. The term "such as" as used herein refers to, and is used interchangeably with, the phrase "such as, but not limited to.
It is also noted that in the apparatus, devices and methods of the present application, the components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered as equivalent to the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, this description is not intended to limit the embodiments of the application to the form disclosed herein. Although a number of example aspects and embodiments have been discussed above, a person of ordinary skill in the art will recognize certain variations, modifications, alterations, additions, and subcombinations thereof.

Claims (10)

1. A transaction processing method, for application to a transaction initiation terminal, the method comprising:
Generating target transaction information and determining target encryption information corresponding to the target transaction information, wherein the target encryption information comprises transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information, and an electronic signature executed on the transaction ciphertext and the transaction tag, and the transaction tag represents an identifier for classifying the target encryption information;
the target encryption information is sent to an information receiving end, so that the information receiving end generates a receiving evidence after storing the target encryption information, and the receiving evidence is used for proving that the information receiving end successfully receives the target encryption information;
receiving the receiving evidence sent by the information receiving end;
and sending the receiving certificate and the target encryption information to a transaction execution end so that the transaction execution end verifies whether the target encryption information is stored in the information receiving end or not based on the receiving certificate, verifies whether the target encryption information is correctly generated by the transaction initiating end for the target transaction information, and executes the target transaction information with the transaction initiating end under the condition that verification is passed.
2. The transaction processing method according to claim 1, wherein the target encryption information generation method includes:
generating a key pair based on the security parameters, the key pair comprising an encryption key and an authentication key;
encrypting the target transaction information by using the encryption key through a verifiable encryption algorithm to generate the transaction ciphertext corresponding to the target transaction information;
calculating the target transaction information by using a type calculation function, inputting a calculation result and the encryption key into a verifiable random function, and generating the transaction tag corresponding to the target transaction information;
and signing the transaction ciphertext and the transaction tag based on the encryption key to generate the electronic signature.
3. The transaction processing method according to claim 2, wherein the verifying whether the target encryption information is correctly generated by the transaction initiator for the target transaction information includes:
when the transaction ciphertext is generated, a first certificate output by the verifiable encryption algorithm is obtained, and whether the transaction ciphertext is generated based on the target transaction information and the encryption key is verified based on the first certificate;
When the transaction label is generated, a second certificate which can be output by the verification random function is obtained, and whether the transaction label is generated correctly based on the target transaction information is verified based on the second certificate;
and acquiring the verification key corresponding to the transaction initiating terminal, and verifying whether the electronic signature is generated by the transaction initiating terminal through a signature algorithm on the transaction ciphertext and the transaction tag based on the verification key.
4. A transaction processing method according to any one of claims 1 to 3, further comprising:
generating a target transaction tag based on a target transaction type when receiving a request of a transaction investigation end for retrieving transaction information belonging to the target transaction type;
searching encryption information corresponding to transaction information matched with the target transaction tag in a designated database of the information receiving end based on the target transaction tag;
verifying the validity of the electronic signature in the encrypted information;
and under the condition that the electronic signature passes the validity verification, decrypting the transaction ciphertext in the encrypted information by using a decryption key to obtain transaction information matched with the target transaction tag, and sending the transaction information to the transaction investigation terminal.
5. The transaction processing method according to claim 4, wherein the transmitting the transaction information to the transaction investigation terminal includes:
verifying the decryption correctness of the transaction information by using a verification key;
and sending the transaction information to the transaction investigation end under the condition that the decryption of the transaction information is correct.
6. A transaction processing method according to any one of claims 1 to 3, wherein the received proof includes an electronic signature generated by the information receiving end based on the target encrypted information and a private key of the information receiving end.
7. A transaction processing method, applied to an information receiving end, the method comprising:
receiving target encryption information corresponding to target transaction information sent by a transaction initiating terminal, wherein the target encryption information comprises a transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information, and an electronic signature executed on the transaction ciphertext and the transaction tag, and the transaction tag represents an identifier for classifying the target encryption information;
classifying and storing the target encryption information to a specified database based on a transaction tag corresponding to the target transaction information;
Generating a receiving evidence of the target encryption information, and sending the receiving evidence to the transaction initiating terminal, so that the transaction initiating terminal sends the receiving evidence and the target encryption information to a transaction executing terminal, and executing the target transaction information with the transaction initiating terminal under the condition that the transaction executing terminal passes the receiving evidence and the target encryption information in a verification mode, wherein the receiving evidence is used for proving that the information receiving terminal successfully receives the target encryption information.
8. A transaction processing method, applied to a transaction execution end, the method comprising:
receiving target encryption information corresponding to target transaction information sent by a transaction initiating terminal and receiving evidence generated after the information receiving terminal stores the target encryption information, wherein the target encryption information comprises transaction ciphertext corresponding to the target transaction information, a transaction tag corresponding to the target transaction information and an electronic signature executed on the transaction ciphertext and the transaction tag, the transaction tag represents an identifier for classifying the target encryption information, and the receiving evidence is used for proving that the information receiving terminal successfully receives the target encryption information;
Verifying the receipt proof;
verifying the target encryption information under the condition that the received evidence passes verification;
and executing the target transaction information with the transaction initiating terminal under the condition that the target encryption information passes verification.
9. A computer readable storage medium, characterized in that the storage medium stores a computer program for executing the method of any of the preceding claims 1 to 8.
10. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
the processor being configured to perform the method of any of the preceding claims 1 to 8.
CN202311776550.8A 2023-12-22 2023-12-22 Transaction processing method, storage medium and electronic device Active CN117454437B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311776550.8A CN117454437B (en) 2023-12-22 2023-12-22 Transaction processing method, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311776550.8A CN117454437B (en) 2023-12-22 2023-12-22 Transaction processing method, storage medium and electronic device

Publications (2)

Publication Number Publication Date
CN117454437A CN117454437A (en) 2024-01-26
CN117454437B true CN117454437B (en) 2024-03-22

Family

ID=89580236

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311776550.8A Active CN117454437B (en) 2023-12-22 2023-12-22 Transaction processing method, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN117454437B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109903028A (en) * 2019-03-05 2019-06-18 郑州师范学院 A kind of electronic trade method, device, transaction originating end and medium
CN110011801A (en) * 2018-11-16 2019-07-12 阿里巴巴集团控股有限公司 Remote certification method and device, the electronic equipment of trusted application
CN112507363A (en) * 2020-12-15 2021-03-16 平安科技(深圳)有限公司 Data supervision method, device and equipment based on block chain and storage medium
CN113923044A (en) * 2021-10-29 2022-01-11 博雅正链(北京)科技有限公司 Chain crossing system and method based on trusted execution environment
WO2023160097A1 (en) * 2022-02-25 2023-08-31 蚂蚁区块链科技(上海)有限公司 Proof generation method and apparatus, electronic device, and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140089117A1 (en) * 2012-09-24 2014-03-27 Curenci, Llc Secure Escrow Transaction System

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011801A (en) * 2018-11-16 2019-07-12 阿里巴巴集团控股有限公司 Remote certification method and device, the electronic equipment of trusted application
CN109903028A (en) * 2019-03-05 2019-06-18 郑州师范学院 A kind of electronic trade method, device, transaction originating end and medium
CN112507363A (en) * 2020-12-15 2021-03-16 平安科技(深圳)有限公司 Data supervision method, device and equipment based on block chain and storage medium
CN113923044A (en) * 2021-10-29 2022-01-11 博雅正链(北京)科技有限公司 Chain crossing system and method based on trusted execution environment
WO2023160097A1 (en) * 2022-02-25 2023-08-31 蚂蚁区块链科技(上海)有限公司 Proof generation method and apparatus, electronic device, and storage medium

Also Published As

Publication number Publication date
CN117454437A (en) 2024-01-26

Similar Documents

Publication Publication Date Title
CN110493197B (en) Login processing method and related equipment
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
EP2291787B1 (en) Techniques for ensuring authentication and integrity of communications
CN109905360B (en) Data verification method and terminal equipment
CN110505067B (en) Block chain processing method, device, equipment and readable storage medium
EP1999631A1 (en) Generation of electronic signatures
CN110597836B (en) Information inquiry request response method and device based on block chain network
CN110096894B (en) Data anonymous sharing system and method based on block chain
CN115460019B (en) Method, apparatus, device and medium for providing digital identity-based target application
CN110867012A (en) Method, device and system for de-centering electronic voting based on intelligent contract and storage medium
CN112734423A (en) Transaction method based on block chain and terminal equipment
CN115396115A (en) Block chain data privacy protection method, device, equipment and readable storage medium
KR20120091618A (en) Digital signing system and method using chained hash
CN115174099A (en) Copyright asset authorization method and device based on block chain and electronic equipment
CN111079190A (en) Block chain supply chain transaction hiding dynamic supervision system and method
CN116506134B (en) Digital certificate management method, device, equipment, system and readable storage medium
CN111314059B (en) Processing method, device and equipment for account authority proxy and readable storage medium
CN114172923B (en) Data transmission method, communication system and communication device
CN117454437B (en) Transaction processing method, storage medium and electronic device
CN115550060A (en) Block chain based trusted certificate verification method, apparatus, device and medium
CN112507369B (en) Service processing method and device based on block chain, readable medium and electronic equipment
Chen et al. How to bind a TPM’s attestation keys with its endorsement key
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
KR102056612B1 (en) Method for Generating Temporary Anonymous Certificate
CN109104393B (en) Identity authentication method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant