CN117879807A - Bid processing method and system based on blockchain, electronic equipment and storage medium - Google Patents

Bid processing method and system based on blockchain, electronic equipment and storage medium Download PDF

Info

Publication number
CN117879807A
CN117879807A CN202311834015.3A CN202311834015A CN117879807A CN 117879807 A CN117879807 A CN 117879807A CN 202311834015 A CN202311834015 A CN 202311834015A CN 117879807 A CN117879807 A CN 117879807A
Authority
CN
China
Prior art keywords
encryption key
alliance
party
fragments
bidding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311834015.3A
Other languages
Chinese (zh)
Inventor
李宗金
章永望
韩岱桥
踪训杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Resources Digital Technology Co Ltd
Original Assignee
China Resources Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Resources Digital Technology Co Ltd filed Critical China Resources Digital Technology Co Ltd
Priority to CN202311834015.3A priority Critical patent/CN117879807A/en
Publication of CN117879807A publication Critical patent/CN117879807A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Storage Device Security (AREA)

Abstract

The application provides a method and a system for processing a tagbook based on a blockchain, electronic equipment and a storage medium, and belongs to the technical field of blockchains. The method comprises the following steps: acquiring a target standard book and the current number of alliance parties; generating an encryption key, and dividing the encryption key according to the current quantity to distribute corresponding encryption key fragments for each alliance party; determining fragments of the target mark to be encrypted; aiming at each alliance party, based on encryption key fragments of the alliance party, carrying out encryption processing on the to-be-encrypted bidding document fragments corresponding to the encryption key fragments to obtain a first bidding document fragment ciphertext; for each alliance party, carrying out confusion processing on the first punctuation fragment ciphertext based on preset confusion parameters to obtain a second punctuation fragment ciphertext; and sending the encryption key fragments and the second tag fragment ciphertext of the alliance party to each alliance party so that the alliance party can uplink the second tag fragment ciphertext. The method and the device can improve the safety of the bidding process.

Description

Bid processing method and system based on blockchain, electronic equipment and storage medium
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a blockchain-based method and system for processing a tagbook, an electronic device, and a storage medium.
Background
The tagbook is an important document in collaboration, and thus confidentiality and integrity of the tagbook are of paramount importance.
At present, encryption and decryption of the bidding documents often depend on manual operation or a simple static key management mode. The manual operation mode has the risk of human misoperation, and data leakage is easy to cause; while the static key management mode is easy to be attacked maliciously, once the key is revealed, the security of the whole system is threatened. Thus, both of the above methods may reduce the storage security of the taggant.
Disclosure of Invention
The embodiment of the invention provides a method and a system for processing a bidding document based on a blockchain, electronic equipment and a storage medium, aiming at improving the safety of bidding document processing.
To achieve the above object, a first aspect of the embodiments of the present application proposes a method for processing a tagbook based on a blockchain, applied to a federated chain, the federated chain including a plurality of federated parties, the method being performed by an intelligent contract, the method comprising:
Obtaining a target standard book and the current number of alliance parties in the alliance chain;
generating an encryption key according to a preset key generation rule, and dividing the generated encryption key according to the acquired current number of alliance parties so as to distribute corresponding encryption key fragments for each alliance party;
determining the to-be-encrypted bidding document fragments corresponding to each encryption key fragment in the target bidding document;
for each alliance party, encrypting the to-be-encrypted bidding fragments corresponding to the encryption key fragments based on the encryption key fragments of the alliance party to obtain a first bidding fragment ciphertext of the alliance party;
for each alliance party, carrying out confusion processing on a first punctuation fragment ciphertext of the alliance party based on preset confusion parameters to obtain a second punctuation fragment ciphertext;
and for each alliance party, sending the encryption key fragments and the second standard fragment ciphertext of the alliance party to the alliance party so that the alliance party can uplink the second standard fragment ciphertext.
In some embodiments, after said sending the encryption key shard and the tagbook shard ciphertext of the federated party to the federated party for each of the federated parties, the method further comprises:
When the encryption key fragments and the second bidding document fragment ciphertext are determined to be completely transmitted, the target bidding document, the encryption key fragments and the second bidding document fragment ciphertext are cleared;
or,
and when the second bidding fragment ciphertext is determined to be completely uplink, the target bidding, the encryption key fragments and the second bidding fragment ciphertext are cleared.
In some embodiments, after said clearing the target tagbook, the encryption key fragment, and the second tagbook fragment ciphertext, the method further comprises:
receiving a decryption request sent by a target alliance party, and determining a time stamp for receiving the decryption request; wherein the decryption request includes a target encryption key fragment of the target federation party and a federation party signature;
if the time stamp is not earlier than a preset time threshold, performing first verification on the decryption request based on the alliance party signature;
and if the first verification is determined to pass, decrypting a plurality of mark fragment ciphertexts acquired from the alliance chain based on the stored encryption key fragments of the preset storage space in the intelligent contract and the target encryption key fragments to obtain the target mark, and sending the target mark to the target alliance party.
In some embodiments, the preset time threshold is determined by:
acquiring the disclosure time of the target mark;
and setting a threshold according to the open time to obtain the preset time threshold.
In some embodiments, the decrypting the plurality of tagbook fragment ciphertexts obtained from the coalition chain based on the stored encryption key fragments of the preset storage space in the smart contract and the target encryption key fragments includes:
performing integrity verification based on the stored encryption key shard and the target encryption key shard;
and if the integrity verification is determined to pass, decrypting a plurality of the tagbook fragment ciphertext acquired from the alliance chain based on the stored encryption key fragments and the target encryption key fragments.
In some embodiments, the integrity verification based on the stored encryption key shard and the target encryption key shard comprises:
acquiring a target mark encryption signature of the target mark, wherein the mark encryption signature is generated by encrypting the signature of the target mark through the encryption key;
Performing key recombination based on the stored encryption key fragments and the target encryption key fragments to generate a decryption key;
decrypting the taggant encryption signature based on the decryption key;
if the decryption key is determined to successfully decrypt the encrypted signature of the mark book, determining that the integrity verification is passed;
if it is determined that the decryption key fails to decrypt the tagbook cryptographic signature, it is determined that the integrity verification is not passed.
In some embodiments, after said sending the encryption key shard and the tagbook shard ciphertext of the federated party to the federated party for each of the federated parties, the method further comprises:
updating the current quantity of the alliance parties in the alliance chain based on the received alliance party updating request to obtain updated current quantity, generating an updated encryption key according to a preset key generation rule, and dividing the generated updated encryption key according to the obtained updated current quantity so as to distribute corresponding updated encryption key fragments for each alliance party;
determining the to-be-encrypted bidding document fragments corresponding to each updated encryption key fragment in the target bidding document;
For each alliance party, based on the updated encryption key fragments of the alliance party, carrying out encryption processing on the to-be-encrypted bidding fragments corresponding to the updated encryption key fragments to obtain updated first bidding fragment ciphertext of the alliance party;
for each alliance party, carrying out confusion processing on the updated first bidding fragment ciphertext of the alliance party based on preset confusion parameters to obtain updated second bidding fragment ciphertext;
and for each alliance party, sending the updated encryption key fragments and the updated second bidding fragment ciphertext of the alliance party to the alliance party so that the alliance party can uplink the updated second bidding fragment ciphertext.
To achieve the above object, a second aspect of the embodiments of the present application proposes a blockchain-based tagbook processing system applied to a federated chain including a plurality of federated parties, the system comprising:
the acquisition module is used for acquiring target books and the current number of alliance parties in the alliance chain;
the generation module is used for generating an encryption key according to a preset key generation rule, and dividing the generated encryption key according to the current number of the obtained alliance parties so as to distribute corresponding encryption key fragments for each alliance party;
The determining module is used for determining the to-be-encrypted bidding document fragments corresponding to each encryption key fragment in the target bidding document;
the first processing module is used for carrying out encryption processing on the to-be-encrypted bidding fragments corresponding to the encryption key fragments based on the encryption key fragments of the alliance party aiming at each alliance party to obtain a first bidding fragment ciphertext of the alliance party;
the second processing module is used for carrying out confusion processing on the first punctuation fragment ciphertext of each alliance party based on preset confusion parameters to obtain second punctuation fragment ciphertext;
and the distribution module is used for sending the encryption key fragments and the second bidding fragment ciphertext of the alliance party to each alliance party so as to enable the alliance party to uplink the second bidding fragment ciphertext.
To achieve the above object, a third aspect of the embodiments of the present application provides an electronic device, where the electronic device includes a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus, and where the memory stores a computer program, and where the processor executes the computer program to implement the method described in the first aspect.
To achieve the above object, a fourth aspect of the embodiments of the present application proposes a computer-readable storage medium storing a computer program that, when executed by a processor, implements the method of the first aspect.
The method and the system for processing the target books based on the blockchain, the electronic equipment and the storage medium are used for acquiring the target books and the current number of alliances in the alliance chain; an encryption key is generated according to a preset key generation rule, the generated encryption key is divided according to the current number of the obtained alliance parties, so that corresponding encryption key fragments are distributed to each alliance party, the encryption key is divided into a plurality of fragments, the fragments are distributed to different alliance parties, the complete key cannot be leaked under the condition that one alliance party is attacked, and meanwhile, the malicious alliance party cannot restore the complete key independently, so that the security of the bidding processing is improved. Further, determining the to-be-encrypted bidding document fragments corresponding to each encryption key fragment in the target bidding document; and aiming at each alliance party, based on encryption key fragments of the alliance party, encrypting the to-be-encrypted bidding fragments corresponding to the encryption key fragments to obtain a first bidding fragment ciphertext of the alliance party, and encrypting different bidding fragments by adopting different key fragments, so that the security of bidding processing is improved. Further, for each alliance party, the first bidding fragment ciphertext of the alliance party is subjected to confusion processing based on preset confusion parameters to obtain a second bidding fragment ciphertext, and the situation that the alliance party or a non-alliance party restores the target bidding through partial ciphertext and key fragments can be avoided, so that the safety of bidding processing is improved. Further, for each party, the encryption key fragments and the second taggant fragment ciphertext of the party are sent to the party, so that the party can link the second taggant fragment ciphertext. The method realizes distributed key management, improves the security and decentralised storage of the key, and reduces the risk of single-point faults in the traditional key management method; the embodiment of the application also realizes the decentralization storage of the ciphertext and improves the safety of the bidding processing. Meanwhile, the target books are stored in the ciphertext mode, so that the safety of book labeling processing is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a blockchain-based tagbook processing method provided by an embodiment of the present application;
FIG. 2 is another flow chart of a blockchain-based tagbook processing method provided by embodiments of the present application;
fig. 3 is a flowchart of step S203 in fig. 2;
fig. 4 is a flowchart of step S301 in fig. 3;
FIG. 5 is another flow chart of a blockchain-based tagbook processing method provided by embodiments of the present application;
FIG. 6 is a schematic diagram of a block chain based tagbook processing system provided in an embodiment of the present application;
fig. 7 is a schematic hardware structure of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
It should be noted that although functional block diagrams are depicted as block diagrams, and logical sequences are shown in the flowchart, in some cases, the steps shown or described may be performed in a different order than the block diagrams in the system. The terms first, second and the like in the description and in the claims and in the above-described figures, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the present application.
First, several nouns referred to in this application are parsed:
artificial intelligence (artificial intelligence, AI): is a new technical science for researching and developing theories, methods, technologies and application systems for simulating, extending and expanding the intelligence of people; artificial intelligence is a branch of computer science that attempts to understand the nature of intelligence and to produce a new intelligent machine that can react in a manner similar to human intelligence, research in this field including robotics, language recognition, image recognition, natural language processing, and expert systems. Artificial intelligence can simulate the information process of consciousness and thinking of people. Artificial intelligence is also a theory, method, technique, and application system that utilizes a digital computer or digital computer-controlled machine to simulate, extend, and expand human intelligence, sense the environment, acquire knowledge, and use knowledge to obtain optimal results.
Natural language processing (natural language processing, NLP): NLP is a branch of artificial intelligence that is a interdisciplinary of computer science and linguistics, and is often referred to as computational linguistics, and is processed, understood, and applied to human languages (e.g., chinese, english, etc.). Natural language processing includes parsing, semantic analysis, chapter understanding, and the like. Natural language processing is commonly used in the technical fields of machine translation, handwriting and print character recognition, voice recognition and text-to-speech conversion, information intent recognition, information extraction and filtering, text classification and clustering, public opinion analysis and opinion mining, and the like, and relates to data mining, machine learning, knowledge acquisition, knowledge engineering, artificial intelligence research, linguistic research related to language calculation, and the like.
Information extraction (Information Extraction): extracting the fact information of the appointed type of entity, relation, event and the like from the natural language text, and forming the text processing technology of the structured data output. Information extraction is a technique for extracting specific information from text data. Text data is made up of specific units, such as sentences, paragraphs, chapters, and text information is made up of small specific units, such as words, phrases, sentences, paragraphs, or a combination of these specific units. The noun phrase, the name of a person, the name of a place, etc. in the extracted text data are all text information extraction, and of course, the information extracted by the text information extraction technology can be various types of information.
Next, the background art of the present application will be described.
The tagbook is an important document in collaboration, and thus confidentiality and integrity of the tagbook are of paramount importance.
At present, encryption and decryption of the bidding documents often depend on manual operation or a simple static key management mode. The manual operation mode has the risk of human misoperation, and data leakage is easy to cause; while the static key management mode is easy to be attacked maliciously, once the key is revealed, the security of the whole system is threatened. Thus, both of the above methods may reduce the storage security of the taggant.
Based on the above, the embodiment of the application provides a method and a system for processing a bidding document based on a blockchain, an electronic device and a storage medium, aiming at improving the security of bidding document processing.
The method and system for processing a tagbook based on a blockchain, the electronic device and the storage medium provided by the embodiment of the application are specifically described through the following embodiments, and the method for processing a tagbook based on a blockchain in the embodiment of the application is described first.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
The embodiment of the application provides a tagbook processing method based on a blockchain, and relates to the technical field of blockchains. The method for processing the tagbook based on the blockchain can be applied to a terminal, a server side and software running in the terminal or the server side. In some embodiments, the terminal may be a smart phone, tablet, notebook, desktop, etc.; the server side can be configured as an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and a cloud server for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, basic cloud computing services such as big data and artificial intelligent platforms and the like; the software may be an application or the like that implements a blockchain-based tagbook processing method, but is not limited to the above form.
The subject application is operational with numerous general purpose or special purpose computer system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In the various embodiments of the present application, when related processing is required according to data related to identity or characteristics of an object, such as object information, object behavior data, object history data, and object position information, permission or consent of the object is obtained first, and related laws and regulations and standards are complied with for collection, use, processing, and the like of the data. In addition, when the embodiment of the application needs to acquire the sensitive personal information of the object, the independent permission or independent consent of the object is acquired through a popup window or a jump to a confirmation page or the like, and after the independent permission or independent consent of the object is explicitly acquired, the necessary object related data for enabling the embodiment of the application to normally operate is acquired.
Fig. 1 is an optional flowchart of a method for processing a blockchain-based tagbook according to an embodiment of the present application, where the method in fig. 1 may include, but is not limited to, steps S101 to S106:
step S101, obtaining a target standard book and the current number of alliance parties in an alliance chain;
step S102, an encryption key is generated according to a preset key generation rule, and the generated encryption key is segmented according to the current number of the obtained alliance parties, so that corresponding encryption key fragments are distributed for each alliance party;
step S103, determining the to-be-encrypted bidding document fragments corresponding to each encryption key fragment in the target bidding document;
step S104, for each alliance party, based on encryption key fragments of the alliance party, encryption processing is carried out on the to-be-encrypted bidding fragments corresponding to the encryption key fragments, so as to obtain first bidding fragment ciphertext of the alliance party;
step S105, for each alliance party, carrying out confusion processing on the first punctuation fragment ciphertext of the alliance party based on preset confusion parameters to obtain second punctuation fragment ciphertext;
step S106, for each alliance party, the encryption key fragments and the second bidding fragment ciphertext of the alliance party are sent to the alliance party, so that the alliance party can uplink the second bidding fragment ciphertext.
Step S101 to step S106 illustrated in the embodiment of the present application, by obtaining the target specification and the current number of alliance parties in the alliance chain; an encryption key is generated according to a preset key generation rule, the generated encryption key is divided according to the current number of the obtained alliance parties, so that corresponding encryption key fragments are distributed to each alliance party, the encryption key is divided into a plurality of fragments, the fragments are distributed to different alliance parties, the complete key cannot be leaked under the condition that one alliance party is attacked, and meanwhile, the malicious alliance party cannot restore the complete key independently, so that the security of the bidding processing is improved. Further, determining the to-be-encrypted bidding document fragments corresponding to each encryption key fragment in the target bidding document; and aiming at each alliance party, based on encryption key fragments of the alliance party, encrypting the to-be-encrypted bidding fragments corresponding to the encryption key fragments to obtain a first bidding fragment ciphertext of the alliance party, and encrypting different bidding fragments by adopting different key fragments, so that the security of bidding processing is improved. Further, for each alliance party, the first bidding fragment ciphertext of the alliance party is subjected to confusion processing based on preset confusion parameters to obtain a second bidding fragment ciphertext, and the situation that the alliance party or a non-alliance party restores the target bidding through partial ciphertext and key fragments can be avoided, so that the safety of bidding processing is improved. Further, for each party, the encryption key fragments and the second taggant fragment ciphertext of the party are sent to the party, so that the party can link the second taggant fragment ciphertext. The method realizes distributed key management, improves the security and decentralised storage of the key, and reduces the risk of single-point faults in the traditional key management method; the embodiment of the application also realizes the decentralization storage of the ciphertext and improves the safety of the bidding processing. Meanwhile, the target books are stored in the ciphertext mode, so that the safety of book labeling processing is improved.
Step S101 is described in detail below.
In step S101 of some embodiments, the bidding document refers to a written document submitted by a bidder when bidding on a bidding project according to the requirement of the bidding document, and is an important basis for the bidder to review the bid. The target specification refers to a specification that needs to be stored. The alliance chain is a blockchain network commonly managed by alliances, and the alliance chain comprises a plurality of alliances. A smart contract is a computer program running on a blockchain that automatically executes contract terms when predefined conditions are met. In implementations, the smart contract may retrieve the target specification by calling an external API or using a predictor service. Meanwhile, the intelligent contract can inquire the current quantity of the alliance party by calling the API of the alliance chain node; queries may also be made by calling the API of the federated chain browser. And, if there is one intelligent contract in the federation chain that is dedicated to managing federation party information, the intelligent contract can query the current number of federation parties in the federation chain by calling the API of the intelligent contract.
Step S102 is described in detail below.
In step S102 of some embodiments, the encryption key is confidential information used to encrypt the data. The encryption key fragments are obtained by dividing the encryption key based on the current number of alliances, and the dividing can be equal dividing or uneven dividing. The preset key generation rule may be key generation by a symmetric key generation algorithm, or key generation by a pseudo-random number generator, which is not limited herein. After the encryption key is generated, the encryption key is segmented based on the current number of the alliance parties, so that a plurality of encryption key fragments with the same number as the alliance parties are obtained, corresponding encryption key fragments are distributed for each alliance party, and each encryption key fragment corresponds to one alliance party one by one. In the step, the encryption key is divided into a plurality of fragments, the fragments are distributed to different alliances, the complete key cannot be revealed under the condition that one alliance is attacked, and meanwhile, the malicious alliance cannot restore the complete key independently, so that the security of the bidding process is improved. In other embodiments, the preset key generation rule may be that the current number of the federation parties is used as a parameter for key generation, and by using the current number of the federation parties as the parameter for key generation, the key generation can be ensured to be related to the scale of the federation, so as to ensure high complexity of the key. By establishing the relation between the number of alliance parties and the complexity of the secret key, the flexibility of the secret key generating process is improved, and the security and the expandability of the bidding processing system are maintained.
Step S103 is described in detail below.
In step S103 of some embodiments, the fragments of the target object are fragments of the target object, and the portion corresponding to the fragments of the encryption key is extracted from the target object. In a specific implementation, the target books can be segmented according to the current number, so that a plurality of fragments of the targets, the number of which is consistent with the current number of alliance parties, are obtained. And then, carrying out random matching on the plurality of taggant fragments and the encryption key fragments or matching according to a preset matching rule, so that the plurality of taggant fragments are in one-to-one correspondence with the plurality of encryption key fragments.
Step S104 is described in detail below.
In step S104 of some embodiments, the first tagbook fragment ciphertext is a ciphertext obtained by encrypting the target tagbook fragment with the encryption key fragment of the federation party. Since the encryption key fragments are in one-to-one correspondence with the federation parties, and the encryption key fragments are in one-to-one correspondence with the fragments to be encrypted, the federation parties are also in one-to-one correspondence with the fragments to be encrypted. In specific implementation, for each alliance party, encryption processing is carried out on the to-be-encrypted tagbook fragments corresponding to the encryption key fragments based on the encryption key fragments of the alliance party, so as to obtain a first tagbook fragment ciphertext of the alliance party. Assuming that a alliance party A1 and an alliance party A2 exist, the alliance party A1 has a corresponding encryption key fragment B1, the alliance party A2 has a corresponding encryption key fragment B2, the encryption key fragment B1 corresponds to a to-be-encrypted tagbook fragment C1, and the encryption key fragment B2 corresponds to the to-be-encrypted tagbook fragment C2, when in encryption processing, aiming at the alliance party A1, the encryption processing is carried out on the to-be-encrypted tagbook fragment C1 by using the encryption key fragment B1, a first tagbook fragment ciphertext D1 is obtained, and the first tagbook fragment ciphertext D1 corresponds to the alliance party A1; for the alliance party A2, the encryption key fragment B2 is used for encrypting the to-be-encrypted bidding document fragment C2, so that a first bidding document fragment ciphertext D2 is obtained, and the first bidding document fragment ciphertext D2 corresponds to the alliance party A2.
Step S105 is described in detail below.
In step S105 of some embodiments, the preset confusion parameter is a preset parameter for confusion or enhanced security, and is preset according to a specific confusion process. The second bidding fragment ciphertext is a ciphertext obtained by confusing the first bidding fragment ciphertext by using preset confusing parameters. The aliasing process is one of adding random noise, data transformation, adding masking, salifying and blurring. By carrying out confusion processing on the first bidding fragment ciphertext, the effect that the complete target bidding content is difficult to restore even if part of the second bidding fragment ciphertext and key fragments are obtained can be achieved, and the safety of target bidding processing is improved. Specifically, the second bidding fragment ciphertext also corresponds to the alliance party one by one, and the first bidding fragment ciphertext D1 is assumed to be subjected to confusion processing to obtain a second bidding fragment ciphertext E1, wherein the second bidding fragment ciphertext E1 corresponds to the alliance party A1; and carrying out confusion processing on the first punctuation fragment ciphertext D2 to obtain a second punctuation fragment ciphertext E2, wherein the second punctuation fragment ciphertext E2 corresponds to the alliance party A2.
Step S106 is described in detail below.
In step S106 of some embodiments, for each federation party, the encryption key shard and the second taggant patch ciphertext corresponding to the federation party are sent to the federation party, and the federation party performs uplink processing on the second taggant patch ciphertext while storing the encryption key shard locally to the federation party. Specifically, the smart contract sends the encryption key fragment B1 and the second bidding fragment ciphertext E1 to the federation party A1; the encryption key fragment B2, and the second tag fragment ciphertext E2 are sent to federation party A2. The alliance party A1 carries out uplink processing on the second bidding fragment ciphertext E1; the alliance party A2 carries out uplink processing on the second bidding fragment ciphertext E2. And uploading the ciphertext obtained by each alliance party to an alliance chain to ensure the decentralization storage of the ciphertext.
After step S106 of some embodiments, the blockchain-based tagbook processing method further includes clearing the target tagbook, the encryption key shard, and the second tagbook shard ciphertext. Specifically, when the encryption key fragments and the second bidding document fragment ciphertext are determined to be completely transmitted, the target bidding document, the encryption key fragments and the second bidding document fragment ciphertext are cleared; or when the second bidding document fragment ciphertext is determined to be completely uplink, the target bidding document, the encryption key fragment and the second bidding document fragment ciphertext are cleared. Wherein clearing after determining that the uplink is complete improves non-volatility of the data over clearing after determining that the transmission is complete. Meanwhile, leakage of information can be prevented through clearing data, and storage cost is reduced, so that safety of bidding processing is improved.
Referring to fig. 2, in some embodiments, after the target tagbook, the encryption key fragment, and the second tagbook fragment ciphertext are cleared, the blockchain-based tagbook processing method may further include, but is not limited to, steps S201 to S203:
step S201, receiving a decryption request sent by a target alliance party, and determining a time stamp of the received decryption request; wherein the decryption request includes a target encryption key fragment of the target party and a party signature;
step S202, if the time stamp is not earlier than a preset time threshold, performing first verification on the decryption request based on the alliance party signature;
in step S203, if it is determined that the first verification is passed, the plurality of target mark fragments ciphertext obtained from the alliance chain is decrypted based on the stored encryption key fragments of the preset storage space in the smart contract and the target encryption key fragments, so as to obtain a target mark, and the target mark is sent to the target alliance party.
The following describes step S201 to step S203 in detail.
In step S201 of some embodiments, the target federation party refers to a federation party that issued the decryption request. The decryption request is a request for decrypting the target mark by the federation party, and the decryption request includes the target encryption key fragment of the target federation party and the federation party signature. The target encryption key shard is an encryption key shard stored locally by the target federation party. The time stamp records the time at which the decryption request was received. In implementations, the intelligence may also determine a timestamp of when the decryption request was received at about the time the decryption request was received by the target federation party.
Prior to step S202 of some embodiments, a blockchain-based tagbook processing method includes determining a preset time threshold. The preset time threshold is used for judging whether the target mark book can be decrypted or not. The preset time threshold is determined by: acquiring the disclosure time of a target mark; and setting a threshold according to the disclosure time to obtain a preset time threshold. The disclosure time of the target mark can be obtained from the target mark or set manually. Specifically, the smart contract may obtain a preset time threshold according to the disclosure time of the target mark, set a time trigger based on the preset time threshold, and specify the decryption time of the target mark. Decryption is enabled only after the specified decryption time has arrived.
In step S202 of some embodiments, the time stamp is compared with a preset time threshold, and if the time stamp is earlier than the preset time threshold, no further processing is performed. And if the time stamp is not earlier than the preset time threshold, performing first verification on the decryption request based on the alliance party signature. The first verification is validity verification, specifically verification of a alliance party signature, and ensures that a decryption request comes from a legal alliance party.
The time trigger is triggered when the designated decryption time arrives. The time trigger is used for triggering the intelligent contract to actively detect time, and after the time trigger is triggered, the intelligent contract can actively check whether the current time accords with the set decryption condition, namely, the current time meets the decryption condition after the preset time threshold. If the decryption conditions are met, the smart contract authorization federation party can begin decrypting the target specification. But authorization simply means that the federation party can begin decrypting the target specification, but decryption also requires the federation to send a decryption request to the smart contract.
In step S203 of some embodiments, the stored encryption key shard in the preset storage space is an encryption key shard that the smart contract has acquired. And if the first verification is determined to pass, decrypting a plurality of mark fragment ciphertexts acquired from the alliance chain based on the stored encryption key fragments of the preset storage space in the intelligent contract and the target encryption key fragments to obtain a target mark, and sending the target mark to a target alliance party.
After receiving the decryption request, the steps S201 to S203 can perform time verification on the decryption request, so as to ensure that the decryption request meets the disclosure condition of the bidding document; after the time verification is passed, the validity verification is carried out, so that the decryption request is ensured to be sent by the alliance party, a safe and efficient decryption channel is established, the validity of the decryption request is determined, and the reliability of the decryption operation is improved.
Referring to fig. 3, in some embodiments, the process of decrypting the plurality of tagbook fragment ciphertexts acquired from the coalition chain based on the stored encryption key fragments of the preset storage space in the smart contract and the target encryption key fragments may include, but is not limited to, steps S301 to S302:
step S301, performing integrity verification based on the stored encryption key fragments and the target encryption key fragments;
step S302, if the integrity verification is determined to pass, the plurality of mark book fragment cryptograms acquired from the alliance chain are decrypted based on the stored encryption key fragments and the target encryption key fragments.
The following describes step S301 to step S302 in detail.
It should be noted that, when the smart contract receives a decryption request sent by a target federation party, passes time verification, passes validity verification, and fails integrity verification, a target encryption key fragment in the decryption request is stored in a preset storage space, and the decryption request of the target federation party is rejected.
Referring to fig. 4, in some embodiments, step S301 may include, but is not limited to, steps S401 to S405:
step S401, a target mark encryption signature is obtained, and the mark encryption signature is generated by encrypting the signature of the target mark through an encryption key;
Step S402, performing key reorganization based on the stored encryption key fragments and the target encryption key fragments to generate a decryption key;
step S403, decrypting the encrypted signature of the marker book based on the decryption key;
step S404, if the decryption key is determined to successfully decrypt the encrypted signature of the marker book, determining that the integrity verification is passed;
step S405, if it is determined that the decryption key fails to decrypt the encrypted signature of the tag, it is determined that the integrity verification is not passed.
Steps S401 to S405 are described in detail below.
In step S401 of some embodiments, the signature of the target mark is obtained by signing the unique identifier of the target mark by the smart contract. The unique identifier refers to information or a numerical value capable of uniquely determining the target mark, the unique identifier may be a code of the target mark, or the unique identifier may be a hash value obtained by performing hash operation on the target mark, which is not limited herein. The signature of the target mark is obtained by encrypting the signature of the target mark through an encryption key, wherein the encryption key is a complete/undivided encryption key generated based on the current number of alliances. The taggant encryption signature is stored at the smart contract after generation, so the smart contract can obtain the taggant encryption signature of the target taggant from the storage space.
In step S402 of some embodiments, key reorganization refers to combining multiple key fragments. Specifically, the stored encryption key fragments and the target encryption key fragments are input into a reorganization function to be calculated, and a decryption key is generated. The reorganization function may be one of a euclidean algorithm, a discrete logarithm algorithm, a linear algebra operation, a discrete fourier transform, and a deep learning algorithm, which is not limited herein.
In step S403 of some embodiments, after obtaining the decryption key, the taggant encryption signature is decrypted with the decryption key.
In step S404 of some embodiments, if it is determined that the decryption key successfully decrypts the tagbook encrypted signature, it is determined that the integrity verification passes. The decryption key can decrypt the encrypted signature of the target mark, and after the decryption result is obtained, the decryption result can be compared with the content of the signature of the target mark stored in the intelligent contract in advance, so that double verification is realized, and the accuracy of integrity verification is improved.
In step S405 of some embodiments, if it is determined that the decryption key fails to decrypt the taggant encrypted signature, it is determined that the integrity verification is not passed. At this time, the smart contract stores the target encryption key fragment to a preset storage space.
The step S401 to the step S405 can realize the integrity verification of the key fragments based on the decryption of the target mark encryption signature, thereby verifying whether all alliance parties send decryption requests and improving the mark decryption security of the intelligent contract.
In step S302 of some embodiments, after determining that the integrity verification passes, the smart contract obtains a plurality of taggant patch ciphertexts, i.e., a second taggant patch ciphertexts of the upper chain, from the coalition chain. And then restoring the second punctuation fragment ciphertext based on the preset confusion parameter stored in the intelligent contract to obtain a first punctuation fragment ciphertext corresponding to the second punctuation fragment ciphertext. Then, the first tagpiece ciphertext is decrypted based on the stored encryption key shard and the target encryption key shard. And storing the target encryption key fragments into a preset storage space.
Through the steps S301 to S302, whether all alliances participate in the decryption process can be verified, asynchronous decryption of target books by the alliances is realized, so that different alliances can execute decryption operation in parallel, the overall decryption efficiency is improved, the complexity and diversity of the book decryption process are adapted, and the fairness and fairness of a decryption mechanism are improved.
For each target, the intelligent contract stores the signature of the target and the encrypted signature of the target; the signature of the target mark corresponds to the confusion parameter attribute and the alliance party identity attribute, and can be stored in a ternary array form, and the signature of the target mark, the confusion parameter and the alliance party information corresponding to the confusion parameter are stored in an element of one ternary array. The benefit of this storage is that it facilitates the restoration of the second taggant piece ciphertext based on the corresponding confusion parameter.
Referring to fig. 5, after step S106 of some embodiments, the blockchain-based tagbook processing method may further include, but is not limited to, steps S501 to S505:
step S501, based on the received alliance party update request, updating the current quantity of alliance parties in an alliance chain to obtain updated current quantity, generating an updated encryption key according to a preset key generation rule, and dividing the generated updated encryption key according to the obtained updated current quantity so as to distribute corresponding updated encryption key fragments for each alliance party;
step S502, determining the to-be-encrypted bidding document fragments corresponding to each updated encryption key fragment in the target bidding document;
Step S503, for each alliance party, based on the updated encryption key fragments of the alliance party, carrying out encryption processing on the to-be-encrypted bidding fragments corresponding to the updated encryption key fragments to obtain updated first bidding fragment ciphertext of the alliance party;
step S504, for each alliance party, carrying out confusion processing on the updated first bidding fragment ciphertext of the alliance party based on preset confusion parameters to obtain updated second bidding fragment ciphertext;
step S505, for each alliance party, the updated encryption key fragments and the updated second label fragment ciphertext of the alliance party are sent to the alliance party, so that the alliance party can uplink the updated second label fragment ciphertext.
Step S501 to step S505 are described in detail below.
The method is characterized in that the meanings of the updated current quantity, the updated encryption key fragment, the to-be-encrypted tagbook fragment corresponding to the updated encryption key fragment, the updated first tagbook fragment ciphertext and the updated second tagbook fragment ciphertext are in one-to-one correspondence with the meanings of the current quantity, the encryption key fragment, the to-be-encrypted tagbook fragment corresponding to the encryption key fragment, the first tagbook fragment ciphertext and the second tagbook fragment ciphertext. The difference is before update and after update.
In step S501 of some embodiments, the federated party update request is a request issued by a federated party that includes the federated party 'S identity information and the federated party' S public key. The identity information is used for identifying the alliance party, and the public key is used for verifying the signature of the alliance party. And updating the current quantity of the alliance parties in the alliance chain according to the received alliance party updating request. The specific implementation process of the subsequent key generation and the segmentation step of the generated key according to the updated current number is similar to the specific implementation process of the step S102, and will not be described herein. In other embodiments, the smart contract may detect the number of federation parties, update the current number of federation parties when the number of federation parties changes, and generate a key based on the updated current number.
The implementation process of step S502 is similar to the implementation process of step S103, and will not be described herein. The implementation process of step S503 is similar to the implementation process of step S104, and will not be described herein. The implementation process of step S504 is similar to that of step S105, and will not be described here. The implementation process of step S505 is similar to the implementation process of step S106, and will not be described here.
It should be noted that, in step S505 of some embodiments, the federation party may replace the locally stored encryption key shard with an updated encryption key shard. After the alliance party receives the updated second taggant fragment ciphertext, if the alliance party has successfully uplink the updated second taggant fragment ciphertext, in this case, if the current blockchain allows the data on the chain to be changed, the alliance party replaces the data on the chain with the updated second taggant fragment ciphertext. If the current block chain does not allow the data on the chain to be changed, the updated second punctuation fragment ciphertext is uplink, and a failure mark is given to the second punctuation fragment ciphertext before the updating, wherein the failure mark indicates that the data is invalid. After the alliance party receives the updated second bidding fragment ciphertext, if the alliance party does not uplink the updated second bidding fragment ciphertext, the alliance party deletes the updated second bidding fragment ciphertext and uplink the updated second bidding fragment ciphertext.
Through the steps S501 to S505, the encryption process of the target bidding document can be adjusted along with the joining of the alliance party or the exiting of the alliance party, so that the flexibility and the security of the encryption process are improved, each alliance party can participate in the security encryption of the target bidding document, and the expandability and the decentralization characteristic of the bidding document processing system are ensured.
Referring to fig. 6, an embodiment of the present application further provides a system for processing a tagbook based on a blockchain, which can implement the tagbook processing method based on a blockchain, where the system is applied to a coalition chain, and the coalition chain includes a plurality of coalition parties, and the system includes:
the acquisition module 601 is configured to acquire a target standard book and a current number of alliance parties in an alliance chain;
the generating module 602 is configured to generate an encryption key according to a preset key generating rule, and segment the generated encryption key according to the obtained current number of federation parties, so as to allocate a corresponding encryption key fragment for each federation party;
the determining module 603 is configured to determine, in the target standard, a to-be-encrypted standard fragment corresponding to each encryption key fragment;
the first processing module 604 is configured to, for each party, encrypt, based on the encryption key fragments of the party, the fragments of the to-be-encrypted bidding documents corresponding to the encryption key fragments, to obtain a first bidding document fragment ciphertext of the party;
the second processing module 605 is configured to, for each party, perform confusion processing on the first punctuation fragment ciphertext of the party based on a preset confusion parameter, to obtain a second punctuation fragment ciphertext;
The distribution module 606 is configured to send, for each party, the encryption key fragment and the second standard fragment ciphertext of the party to the party, so that the party uplinks the second standard fragment ciphertext.
The detailed implementation of the blockchain-based bidding processing system is substantially the same as the detailed embodiment of the blockchain-based bidding processing method described above, and will not be repeated here.
The embodiment of the application also provides electronic equipment, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the block chain-based bidding processing method when executing the computer program. The electronic equipment can be any intelligent terminal including a tablet personal computer, a vehicle-mounted computer and the like.
Referring to fig. 7, fig. 7 illustrates a hardware structure of an electronic device according to another embodiment, the electronic device includes:
the processor 701 may be implemented by a general-purpose CPU (central processing unit), a microprocessor, an application-specific integrated circuit (ApplicationSpecificIntegratedCircuit, ASIC), or one or more integrated circuits, etc. for executing related programs to implement the technical solutions provided by the embodiments of the present application;
The memory 702 may be implemented in the form of read-only memory (ReadOnlyMemory, ROM), static storage, dynamic storage, or random access memory (RandomAccessMemory, RAM). Memory 702 may store an operating system and other application programs, and when the technical solutions provided in the embodiments of the present application are implemented in software or firmware, relevant program codes are stored in memory 702, and the processor 701 invokes a blockchain-based tagbook processing method to perform the embodiments of the present application;
an input/output interface 703 for implementing information input and output;
the communication interface 704 is configured to implement communication interaction between the device and other devices, and may implement communication in a wired manner (e.g. USB, network cable, etc.), or may implement communication in a wireless manner (e.g. mobile network, WIFI, bluetooth, etc.);
a bus 705 for transferring information between various components of the device (e.g., the processor 701, memory 702, input/output interfaces 703, and communication interfaces 704);
wherein the processor 701, the memory 702, the input/output interface 703 and the communication interface 704 are in communication connection with each other inside the device via a bus 705.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores a computer program, and the computer program realizes the block chain-based bidding processing method when being executed by a processor.
The memory, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs as well as non-transitory computer executable programs. In addition, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory remotely located relative to the processor, the remote memory being connectable to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The embodiment of the application provides a tagbook processing method based on a blockchain, a tagbook processing system based on the blockchain, electronic equipment and a storage medium, wherein the target tagbook and the current number of alliance parties in an alliance chain are obtained; an encryption key is generated according to a preset key generation rule, the generated encryption key is divided according to the current number of the obtained alliance parties, so that corresponding encryption key fragments are distributed to each alliance party, the encryption key is divided into a plurality of fragments, the fragments are distributed to different alliance parties, the complete key cannot be leaked under the condition that one alliance party is attacked, and meanwhile, the malicious alliance party cannot restore the complete key independently, so that the security of the bidding processing is improved. Further, determining the to-be-encrypted bidding document fragments corresponding to each encryption key fragment in the target bidding document; and aiming at each alliance party, based on encryption key fragments of the alliance party, encrypting the to-be-encrypted bidding fragments corresponding to the encryption key fragments to obtain a first bidding fragment ciphertext of the alliance party, and encrypting different bidding fragments by adopting different key fragments, so that the security of bidding processing is improved. Further, for each alliance party, the first bidding fragment ciphertext of the alliance party is subjected to confusion processing based on preset confusion parameters to obtain a second bidding fragment ciphertext, and target bidding can be prevented from being restored through part of ciphertext and key fragments, so that the safety of bidding processing is improved. Further, for each party, the encryption key fragments and the second taggant fragment ciphertext of the party are sent to the party, so that the party can link the second taggant fragment ciphertext. The method realizes distributed key management, improves the security and decentralised storage of the key, and reduces the risk of single-point faults in the traditional key management method; the embodiment of the application also realizes the decentralization storage of the ciphertext and improves the safety of the bidding processing. Meanwhile, the target books are stored in the ciphertext mode, so that the safety of book labeling processing is improved. In addition, the key slicing mode realizes that all alliances encrypt and decrypt the bidding documents together, thereby improving fairness and fairness. The distributed key management and intelligent contract control ensure that the decryption process of the bidding document is safe and reliable, potential malicious attacks are prevented, and the security of bidding document processing is improved. Because encryption and decryption are automatic and manual intervention is not needed, the embodiment of the application further improves the operation convenience of the bidding processing.
The embodiments described in the embodiments of the present application are for more clearly describing the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application, and as those skilled in the art can know that, with the evolution of technology and the appearance of new application scenarios, the technical solutions provided by the embodiments of the present application are equally applicable to similar technical problems.
It will be appreciated by those skilled in the art that the technical solutions shown in the figures do not constitute limitations of the embodiments of the present application, and may include more or fewer steps than shown, or may combine certain steps, or different steps.
The system embodiments described above are merely illustrative, in that the units illustrated as separate components may or may not be physically separate, i.e., may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Those of ordinary skill in the art will appreciate that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof.
The terms "first," "second," "third," "fourth," and the like in the description of the present application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in this application, "at least one" means one or more, and "a plurality" means two or more. "and/or" for describing the association relationship of the association object, the representation may have three relationships, for example, "a and/or B" may represent: only a, only B and both a and B are present, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b or c may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
In the several embodiments provided in this application, it should be understood that the disclosed systems and methods may be implemented in other ways. For example, the system embodiments described above are merely illustrative, e.g., the division of the above elements is merely a logical functional division, and there may be additional divisions in actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. The coupling or direct coupling or communication connection shown or discussed with each other may be through some interface, indirect coupling or communication connection of systems or units, electrical, mechanical, or other form.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including multiple instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the various embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing a program.
Preferred embodiments of the present application are described above with reference to the accompanying drawings, and thus do not limit the scope of the claims of the embodiments of the present application. Any modifications, equivalent substitutions and improvements made by those skilled in the art without departing from the scope and spirit of the embodiments of the present application shall fall within the scope of the claims of the embodiments of the present application.

Claims (10)

1. A blockchain-based tagbook processing method, characterized by being applied to a federated chain including a plurality of federated parties, the method being performed by a smart contract, the method comprising:
obtaining a target standard book and the current number of alliance parties in the alliance chain;
generating an encryption key according to a preset key generation rule, and dividing the generated encryption key according to the acquired current number of alliance parties so as to distribute corresponding encryption key fragments for each alliance party;
determining the to-be-encrypted bidding document fragments corresponding to each encryption key fragment in the target bidding document;
for each alliance party, encrypting the to-be-encrypted bidding fragments corresponding to the encryption key fragments based on the encryption key fragments of the alliance party to obtain a first bidding fragment ciphertext of the alliance party;
for each alliance party, carrying out confusion processing on a first punctuation fragment ciphertext of the alliance party based on preset confusion parameters to obtain a second punctuation fragment ciphertext;
and for each alliance party, sending the encryption key fragments and the second standard fragment ciphertext of the alliance party to the alliance party so that the alliance party can uplink the second standard fragment ciphertext.
2. The blockchain-based tagbook processing method of claim 1, wherein after the sending the encryption key shard and the tagbook shard ciphertext of the federating party to the federating party for each of the federating parties, the method further comprises:
when the encryption key fragments and the second bidding document fragment ciphertext are determined to be completely transmitted, the target bidding document, the encryption key fragments and the second bidding document fragment ciphertext are cleared;
or,
and when the second bidding fragment ciphertext is determined to be completely uplink, the target bidding, the encryption key fragments and the second bidding fragment ciphertext are cleared.
3. The blockchain-based tagbook processing method of claim 2, wherein after the clearing of the target tagbook, the encryption key shard, and the second tagbook shard ciphertext, the method further comprises:
receiving a decryption request sent by a target alliance party, and determining a time stamp for receiving the decryption request; wherein the decryption request includes a target encryption key fragment of the target federation party and a federation party signature;
If the time stamp is not earlier than a preset time threshold, performing first verification on the decryption request based on the alliance party signature;
and if the first verification is determined to pass, decrypting a plurality of mark fragment ciphertexts acquired from the alliance chain based on the stored encryption key fragments of the preset storage space in the intelligent contract and the target encryption key fragments to obtain the target mark, and sending the target mark to the target alliance party.
4. The blockchain-based tagbook processing method of claim 3, wherein the preset time threshold is determined by:
acquiring the disclosure time of the target mark;
and setting a threshold according to the open time to obtain the preset time threshold.
5. The blockchain-based tagbook processing method of claim 3, wherein the decrypting the plurality of tagbook fragment ciphers obtained from the coalition chain based on the stored encryption key fragments of the preset storage space in the smart contract and the target encryption key fragments comprises:
performing integrity verification based on the stored encryption key shard and the target encryption key shard;
And if the integrity verification is determined to pass, decrypting a plurality of the tagbook fragment ciphertext acquired from the alliance chain based on the stored encryption key fragments and the target encryption key fragments.
6. The blockchain-based tagbook processing method of claim 5, wherein the integrity verification based on the stored encryption key shard and the target encryption key shard comprises:
acquiring a target mark encryption signature of the target mark, wherein the mark encryption signature is generated by encrypting the signature of the target mark through the encryption key;
performing key recombination based on the stored encryption key fragments and the target encryption key fragments to generate a decryption key;
decrypting the taggant encryption signature based on the decryption key;
if the decryption key is determined to successfully decrypt the encrypted signature of the mark book, determining that the integrity verification is passed;
if it is determined that the decryption key fails to decrypt the tagbook cryptographic signature, it is determined that the integrity verification is not passed.
7. The blockchain-based tagbook processing method of any of claims 1 to 6, wherein after the sending the encryption key shard and the tagbook shard ciphertext of the federation party to the federation party for each of the federation parties, the method further comprises:
Updating the current quantity of the alliance parties in the alliance chain based on the received alliance party updating request to obtain updated current quantity, generating an updated encryption key according to a preset key generation rule, and dividing the generated updated encryption key according to the obtained updated current quantity so as to distribute corresponding updated encryption key fragments for each alliance party;
determining the to-be-encrypted bidding document fragments corresponding to each updated encryption key fragment in the target bidding document;
for each alliance party, based on the updated encryption key fragments of the alliance party, carrying out encryption processing on the to-be-encrypted bidding fragments corresponding to the updated encryption key fragments to obtain updated first bidding fragment ciphertext of the alliance party;
for each alliance party, carrying out confusion processing on the updated first bidding fragment ciphertext of the alliance party based on preset confusion parameters to obtain updated second bidding fragment ciphertext;
and for each alliance party, sending the updated encryption key fragments and the updated second bidding fragment ciphertext of the alliance party to the alliance party so that the alliance party can uplink the updated second bidding fragment ciphertext.
8. A blockchain-based tagbook processing system, characterized by being applied to a federated chain comprising a plurality of federated parties, the system comprising:
the acquisition module is used for acquiring target books and the current number of alliance parties in the alliance chain;
the generation module is used for generating an encryption key according to a preset key generation rule, and dividing the generated encryption key according to the current number of the obtained alliance parties so as to distribute corresponding encryption key fragments for each alliance party;
the determining module is used for determining the to-be-encrypted bidding document fragments corresponding to each encryption key fragment in the target bidding document;
the first processing module is used for carrying out encryption processing on the to-be-encrypted bidding fragments corresponding to the encryption key fragments based on the encryption key fragments of the alliance party aiming at each alliance party to obtain a first bidding fragment ciphertext of the alliance party;
the second processing module is used for carrying out confusion processing on the first punctuation fragment ciphertext of each alliance party based on preset confusion parameters to obtain second punctuation fragment ciphertext;
and the distribution module is used for sending the encryption key fragments and the second bidding fragment ciphertext of the alliance party to each alliance party so as to enable the alliance party to uplink the second bidding fragment ciphertext.
9. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing the steps of the blockchain-based tagbook processing method of any of claims 1-7 when executing a program stored on a memory.
10. A computer readable storage medium having stored thereon a computer program, which when executed by a processor implements the steps of the blockchain-based taggant processing method of any of claims 1-7.
CN202311834015.3A 2023-12-27 2023-12-27 Bid processing method and system based on blockchain, electronic equipment and storage medium Pending CN117879807A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311834015.3A CN117879807A (en) 2023-12-27 2023-12-27 Bid processing method and system based on blockchain, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311834015.3A CN117879807A (en) 2023-12-27 2023-12-27 Bid processing method and system based on blockchain, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117879807A true CN117879807A (en) 2024-04-12

Family

ID=90578572

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311834015.3A Pending CN117879807A (en) 2023-12-27 2023-12-27 Bid processing method and system based on blockchain, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117879807A (en)

Similar Documents

Publication Publication Date Title
CN109257340B (en) Website tamper-proof system and method based on block chain
CN110602052B (en) Micro-service processing method and server
US20120260108A1 (en) Font encryption and decryption system and method
CN109241484B (en) Method and equipment for sending webpage data based on encryption technology
KR102023101B1 (en) Apparatus for preventing forgery of original data and method thereof
CN109743161B (en) Information encryption method, electronic device and computer readable medium
CN108304733B (en) Encrypted data searching method and data storage system capable of encrypted searching
CN104657665A (en) File processing method
CN106529317B (en) Web application encipher-decipher method based on Shadow DOM
CN110781676B (en) Text processing method, device and system, electronic equipment and storage medium
CN113961956A (en) Method, device, equipment and medium for generating and applying tagged network information service
CN115333775A (en) Data processing method and device based on privacy calculation, equipment and storage medium
KR101593675B1 (en) User data integrity verification method and apparatus
CN111475690B (en) Character string matching method and device, data detection method and server
CN104657504A (en) Fast file identification method
CN114363094B (en) Data sharing method, device, equipment and storage medium
CN105678185B (en) A kind of data security protection method and intelligent terminal management system
CN103632069B (en) Terminal safety managing method and device in internal network
CN109218009B (en) Method, client and server for improving equipment ID security
CN117879807A (en) Bid processing method and system based on blockchain, electronic equipment and storage medium
CN110618989A (en) Information processing method, information processing device and related product
CN111030930B (en) Decentralized network data fragment transmission method, device, equipment and medium
CN114048490A (en) Information processing method and device, equipment and storage medium thereof
CN105471818B (en) Method and system for information transmission between application software
CN116107991A (en) Container label database construction method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination