CN117997653A - Block chain-based data privacy protection method and device for Internet of things - Google Patents

Block chain-based data privacy protection method and device for Internet of things Download PDF

Info

Publication number
CN117997653A
CN117997653A CN202410397433.9A CN202410397433A CN117997653A CN 117997653 A CN117997653 A CN 117997653A CN 202410397433 A CN202410397433 A CN 202410397433A CN 117997653 A CN117997653 A CN 117997653A
Authority
CN
China
Prior art keywords
data
msg
things
internet
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410397433.9A
Other languages
Chinese (zh)
Other versions
CN117997653B (en
Inventor
谭林
吴承浩
钟玉洁
郭兆中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Tianhe Guoyun Technology Co Ltd
Original Assignee
Hunan Tianhe Guoyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Tianhe Guoyun Technology Co Ltd filed Critical Hunan Tianhe Guoyun Technology Co Ltd
Priority to CN202410397433.9A priority Critical patent/CN117997653B/en
Publication of CN117997653A publication Critical patent/CN117997653A/en
Application granted granted Critical
Publication of CN117997653B publication Critical patent/CN117997653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a block chain-based data privacy protection method and device of the Internet of things, wherein the method comprises the steps that a data provider P performs validity verification on shared data msg derived from Internet of things equipment, and then signature uploading is performed on the shared data msg through a one-time linkable ring signature; the data verifier V verifies the validity of the signature, and then generates corresponding non-interactive zero knowledge proof ZKP for each ring signature based on MPC-in-the-Head to determine the validity of the shared data; the data consumer C proves the validity of the ZKP by verifying zero knowledge, and finally the shared data msg is obtained. Compared with the related art, the block chain-based data privacy protection method and device for the Internet of things can improve the integrity and the legality of data verification and improve the concealment of data transmission.

Description

Block chain-based data privacy protection method and device for Internet of things
Technical Field
The present invention relates to the field of blockchains, and in particular to the field of communications where security for file transfer is required.
Background
With the rapid development of the internet of things, data generated by a large amount of equipment provides great potential for realizing intelligent and efficient urban management, industrial control and life service. However, efficient and secure sharing of such data remains a complex challenge. Traditional internet of things data sharing methods typically rely on centralized data management systems, which often involve third party trust and present some potential security and privacy issues in the data transmission and storage process.
Among the most common techniques are data desensitization and secure transmission based on encryption techniques. This includes the use of symmetric encryption and asymmetric encryption to ensure confidentiality of data during transmission and storage. However, these approaches do not fully address privacy concerns. Once an entity with access to the key is breached or misused, privacy leakage may still result. Furthermore, these methods do not address the issue of data ownership and source trustworthiness, and thus may still be questioned by data trustworthiness in some scenarios.
Another common approach is data sharing based on blockchain technology. The block chain realizes transparency and non-tamper property of the data through a mechanism of the distributed account book, so that the credibility of the data is improved. However, the conventional blockchain has problems of performance bottleneck and high energy consumption when processing a large amount of data of the internet of things scale. Moreover, data on blockchains is often public and difficult to adapt to some scenarios where data privacy requirements are high.
The patent with the publication number of CN113411384A discloses a system and a method for protecting privacy in the process of data security sharing of the Internet of things, adopts a method based on a blockchain, and combines a cryptography technology to ensure that the privacy of a user is protected in the process of data sharing. However, in the above system, the design based on blockchain and attribute encryption may still present a degree of privacy risk because attribute information may be used to identify the user identity. In data sharing, it is often critical to ensure that responsibility for data usage is traceable in order to trace back responsible parties when a problem occurs. Furthermore, systems based on attribute encryption and zero knowledge proof may be subject to some attacks, such as collusion attacks or malicious users spoofing identities.
Therefore, it is necessary to provide a new method and device for protecting the privacy of data of the internet of things based on blockchain, so as to overcome the above-mentioned drawbacks.
Disclosure of Invention
The invention aims to provide a novel block chain-based data privacy protection method and device for the Internet of things, which can improve the integrity and legality of data verification and improve the concealment of data transmission.
In order to achieve the above object, the present invention provides a blockchain-based data privacy protection method for the internet of things, comprising:
The data provider P performs validity verification on the shared data msg derived from the Internet of things equipment, and then uploads the shared data msg after signing through a one-time linkable ring signature algorithm;
The data verifier V verifies the validity of the signature, and then generates corresponding non-interactive zero knowledge proof ZKP for each ring signature based on MPC-in-the-Head to determine the validity of the shared data;
the data consumer C proves the validity of the ZKP by verifying zero knowledge, and finally the shared data msg is obtained.
The invention also provides a block chain-based data privacy protection device of the Internet of things, which comprises:
the internet of things module is used for communicating with the internet of things and providing the sharing data msg of the internet of things;
A data demander comprising a data provider, a data verifier and a data consumer for transmitting and using shared data;
the ring signature module is used for generating a public key ring R and generating ring signature verification data by combining a self key of a data requiring party and shared data msg;
the knowledge proof module is used for generating zero knowledge proof ZKP through the ring signature data;
a blockchain network for broadcasting and storing signature data and zero knowledge proof ZKP.
The invention also provides a computer readable storage medium storing a computer program which when executed by a processor implements the steps of the blockchain-based internet of things data privacy protection method.
The invention also provides a computer terminal, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor realizes the steps of the block chain-based data privacy protection method of the Internet of things when executing the computer program.
Compared with the related art, the invention can lead the data provider to have traceability on the blockchain while keeping anonymity by introducing the ring signature technology; zero-exposure data verification is realized based on a verification mechanism of zero knowledge proof. The verifier can confirm the validity of the data by verifying the zero-knowledge proof of the ring signature without knowing the actual data content; by combining ring signatures and zero knowledge proof with blockchain techniques, distributed privacy protection is achieved. The anonymity and validity verification of the data are distributed in the whole blockchain network, so that the burden of centralized management is reduced, and the expandability of the system is improved.
Drawings
For a clearer description of the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments are briefly introduced below, the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art, wherein:
FIG. 1 is a system architecture diagram of a blockchain-based data privacy protection method of the Internet of things;
FIG. 2 is a system flow diagram of a blockchain-based method of protecting data privacy of the Internet of things;
FIG. 3 is a ring signature flow chart of the blockchain-based data privacy protection method of the Internet of things of the present invention;
FIG. 4 is a data verifier verification flow chart of the blockchain-based data privacy protection method of the Internet of things of the present invention;
Fig. 5 is a data consumer verification flow chart of the blockchain-based internet of things data privacy protection method of the present invention.
Detailed Description
The following description of the technical solutions in the embodiments of the present invention will be clear and complete, and it is obvious that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In order to solve the security and privacy problems in the prior art, the invention adopts a one-time linkable ring signature and a zero knowledge proof technical scheme based on MPC-in-the-Head to solve the problems in the existing internet of things (IoT) data sharing process.
The present invention employs a one-time linkable ring signature so that a data provider can anonymously uplink data without exposing the true identity to generate a non-traceable one-time ring signature. The problem that privacy leakage is possibly caused in traditional data sharing is effectively solved, and even if data is disclosed, the data cannot be directly traced to a specific data provider, so that the privacy of the data is protected.
The invention introduces non-interactive zero knowledge proof based on MPC-in-Head, and a verifier can confirm the validity of data by verifying the zero knowledge proof of ring signature on the premise of not knowing the actual data content. On the basis of protecting privacy, the integrity and the legality of the data are verified, and the credibility of the data is guaranteed more strongly.
The invention combines the disposable interlinkable ring signature and the non-interactive zero knowledge proof scheme, and a verifier only needs to verify the corresponding zero knowledge proof when verifying the validity of data, without complex calculation of a large amount of data. The computing burden is effectively reduced, the performance and the expandability of the system are improved, and the performance bottleneck problem possibly faced in the traditional data verification process is solved.
The invention adopts a data distributed storage system based on a block chain, the data is stored in a distributed mode, and each node has the same data copy, so that the credibility of the data is improved. Meanwhile, the ring signature and zero knowledge proof guarantee the privacy and the integrity of the data, reduce the trust dependence on a third party and realize more decentralized data management. The reliability of the data is effectively improved, and single-point faults and attack risks possibly existing in the centralized system are prevented.
In order to facilitate understanding of the technical solutions of the present invention by those skilled in the art, the following description and description will be made with reference to fig. 1 and 2.
In the system, three types of roles are included in total: the data provider (P), the data verifier (V) and the data consumer (C) are the following specific implementation procedures of the technical scheme:
The data provider (P) has shared data derived from the Internet of things equipment, and in order to facilitate validity verification of the nodes on the chain, the data provider (P) randomly selects a ring set R containing a public key of the data provider (P). Then, the data provider (P) can only sign msg once, and repeated signatures will be tracked, in combination with its own private key, shared data msg and ring set R. The shared data msg and signature information are then uploaded and the data verifier (V) in the system combines the public ring set R and the shared data msg to verify the validity of the signature, while verifying whether the shared data has been tampered with. If the verification ditch passes, the data verifier (V) will use Zero Knowledge Proof (ZKP) based on MPC-in-the-Head to let the data consumer (C) trust the validity of the shared data without revealing the detailed information of the shared data, which has post quantum security. The data consumer (C) will eventually get the shared data msg after performing validity verification of the shared data.
Fig. 3 is a flow chart of a one-time linkable ring signature designed according to the present invention. The data provider (P) selectively signs the anonymized internet of things data using a one-time linkable ring signature scheme. Specifically, the flow is as follows:
The data provider (P) collects data exported by the Internet of things equipment and obtains data msg to be shared; the data provider (P) selects a ring R containing its own public key, signs the data msg using its own key pair (pk, sk), and discloses the corresponding pk, the signature result is sig=sign (sk, msg, R), the ring signature has post quantum properties and linkable properties, and anonymity and traceability of the data on the blockchain can be ensured. The generated signature enhances privacy by binding the data with the identity of the provider (P), but due to the one-time linkable nature (Linkable) is not associable between the ring signatures generated by different data providers (P).
The data provider (P) uplinks the data with a one-time linkable ring signature, ensuring that the data is accessible by the blockchain network. This step guarantees anonymity and traceability of the data, while the one-time linkable nature prevents multiple uses of the same signature.
Fig. 4 is a flow of signature verification by a data verifier (V) according to the present application. The data verifier (V) generates a corresponding non-interactive zero-knowledge proof (NIZK) for each ring signature using MPC-in-the-Head based techniques. The design concept of the protocol is that a prover performs a secure multiparty computing protocol aiming at a zero knowledge function through simulation in the brain of the prover, and then information generated in the execution process is sent to a verifier. The verifier is responsible for confirming the correctness of the information, while the zero knowledge of the protocol is ensured by the privacy guarantee of the multiparty computing protocol, i.e. the zero knowledge proof is generated without exposing the actual intermediate result of the computation. Specifically, the MPC model adopted in the zero-knowledge proof of the present application is a client-server model (client-server model), and the data verifier (V) performs a commitment after combining public input and private input (sharing data by the internet of things) and secure multiparty computation thereof through the circuit C to generate the proof.
The generated zero knowledge proof is uplinked so that other nodes or data consumers can access and verify the validity of the data. This step ensures that the proof provided by the data verifier (V) can be verified by the whole network, further enhancing the trustworthiness of the data. The specific flow is as follows:
the data verifier (V) acquires a ring signature and shared data msg from the chain;
The data verifier (V) verifies the validity of the shared data msg and the signature by using the public key ring R and passing the shared data msg through a ring signature verification algorithm Verify (sig, msg, R), and if the verification is passed, the next step is executed. Otherwise, carrying out corresponding punishment;
The data verifier (V) performs a secure multiparty computing protocol for zero knowledge functions in a header simulation in combination with the shared data msg and finally generates a zero knowledge proof ZKP.
The data verifier (V) uploads ZKP, all of which can verify the authenticity of the shared data msg, but without specifically revealing any privacy information of the data.
FIG. 5 is a flow of verification of zero knowledge proof by a data consumer (C) designed in accordance with the present invention. Finally, the data consumer (C) or other verification node verifies the proof provided by the data verifier (V) using the same zero knowledge proof scheme. By verifying the zero knowledge proof, the validity of the data is ensured, i.e. it is generated by a legitimate user and not tampered with. Because of the characteristic of zero knowledge proof, the verifier does not know the actual data content when verifying the validity of the data, and privacy is protected. The specific flow is as follows:
The data consumer (C) initiates a request to acquire the shared data msg on the chain;
The data verifier (V) carries out relevant auditing on the request sent by the data verifier, and if the auditing is passed, the ZKP of the shared data is sent to the data consumer (C);
The data consumer (C) acquires the ZKP of the shared data msg, then verifies the authenticity of the shared data msg, and if the verification is passed, applies for the original data again. The data validator (V) reviews its qualification and if the review passes, the shared data msg is finally sent to the data consumer (C).
By integrating the one-time linkable ring signature and the zero knowledge proof based on the MPC-in-the-Head, the technical scheme has comprehensive beneficial effects in the aspects of protecting privacy, verifying the validity of data, improving the performance of a system and the like.
The invention can effectively prevent the exposure of the identity of the provider of the data and provide higher-level privacy protection for the user. In the context of the internet of things, protecting the privacy of device and user identity information is critical, especially where personal life data or sensitive industry data are involved.
The invention can effectively ensure that the verifier verifies the validity of the data without knowing the actual data content. This is achieved by verifying zero knowledge proof of the ring signature, effectively preventing the risk of tampering during data transmission and storage. This is critical to ensure the integrity and reliability of the data, especially in situations where reliable data analysis and decision making is required.
The invention can make the privacy protection of the data more distributed. The anonymity and validity verification of the data are distributed in the whole blockchain network, so that the dependence on centralized management is reduced, and the decentralization degree of the system is improved. Such a design not only improves the scalability of the system, but also helps to resist single point failures and attack risks that a centralized system may face.
The invention can reduce trust dependence on a third party on the premise of not sacrificing data privacy. The anonymity and validity verification of the data are realized in a decentralization mode, so that the risk of trust of a single entity is reduced. This is of great importance for the establishment of a more trusted data exchange ecosystem, in particular in the context of sharing sensitive data between a plurality of organizations or individuals.
The invention also provides a block chain-based data privacy protection device of the Internet of things, which comprises:
the internet of things module is used for communicating with the internet of things and providing the sharing data msg of the internet of things;
A data demander comprising a data provider, a data verifier and a data consumer for transmitting and using shared data;
the ring signature module is used for generating a public key ring R and generating ring signature verification data by combining a self key of a data requiring party and shared data msg;
the knowledge proof module is used for generating zero knowledge proof ZKP through the ring signature data;
a blockchain network for broadcasting and storing signature data and zero knowledge proof ZKP.
In another aspect, the present invention also provides a computer readable storage medium storing a computer program, where the computer program when executed by a processor implements the steps of the above-mentioned blockchain-based internet of things data privacy protection method.
An extension of another aspect of the present invention also provides a computer terminal, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the blockchain-based internet of things data privacy protection method described above when the processor executes the computer program.
The processor, when executing the computer program, performs the functions of the modules/units in the above-described device embodiments. The computer program may be divided into one or more modules/units, which are stored in the memory and executed by the processor to accomplish the present invention, for example. The one or more modules/units may be a series of computer program instruction segments capable of performing the specified functions, which instruction segments are used for describing the execution of the computer program in the terminal device.
The computer terminal can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing devices. May include, but is not limited to, a processor, memory. More or fewer components may be included or certain components may be combined, or different components may be included, for example, in input and output devices, network access devices, buses, etc.
The Processor may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), off-the-shelf Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may be an internal storage unit, such as a hard disk or a memory. The memory may also be an external storage device such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD), or the like. Further, the memory may also include both internal storage units and external storage devices. The memory is used for storing the computer program and other programs and data. The memory may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other manners. For example, the apparatus/terminal device embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical function division, and there may be additional divisions in actual implementation, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated modules/units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
The foregoing description is only illustrative of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes or direct or indirect application in other related technical fields are included in the scope of the present invention.

Claims (7)

1. The data privacy protection method of the Internet of things based on the blockchain is characterized by comprising the following steps of:
The data provider P performs validity verification on the shared data msg derived from the Internet of things equipment, and then uploads the shared data msg after signing through a one-time linkable ring signature algorithm;
The data verifier V verifies the validity of the signature, and then generates corresponding non-interactive zero knowledge proof ZKP for each ring signature based on MPC-in-the-Head to determine the validity of the shared data;
the data consumer C proves the validity of the ZKP by verifying zero knowledge, and finally the shared data msg is obtained.
2. The blockchain-based internet of things data privacy protection method of claim 1, wherein the data provider performs validity verification on the shared data derived from the internet of things device, and then uploads the shared data msg after signing by a one-time linkable ring signature algorithm, comprising:
The data provider P collects data exported by the Internet of things equipment and obtains data msg to be shared;
The data provider P selects a public key ring R containing its own public key pk, performs ring signature in combination with the private key sk and the shared data msg, and the signature result is:
sig=sign(sk,msg,R),
the generated signature links the data with the one-time linkable ring signature by binding the shared data with the identity of the data provider P.
3. The blockchain-based internet of things data privacy protection method of claim 2, wherein the data verifier V verifies the validity of the signature and then determines the validity of the shared data through MPC-in-the-Head-based zero knowledge proof comprises:
the data verifier V acquires a ring signature and shared data msg from the chain;
the data verifier V verifies the validity of the shared data msg and the signature by a ring signature verification algorithm Verify (sig, msg, R) using the public key ring R and the shared data msg;
the data verifier V performs a secure multiparty computation protocol aiming at a zero knowledge function in a head simulation mode by combining the shared data msg, and finally generates a zero knowledge proof ZKP;
The data verifier V uploads the zero knowledge proof ZKP, and all nodes can verify the authenticity of the shared data msg.
4. The blockchain-based internet of things data privacy protection method of claim 3, wherein the data consumer C ensures the validity of the data by verifying zero knowledge proof, and eventually will obtain the shared data msg comprises:
the data consumer C initiates a request for acquiring the shared data msg on the chain;
The data verifier V carries out relevant auditing on the request sent by the data verifier V and sends zero knowledge proof ZKP to the data consumer C;
the data consumer C verifies the authenticity of the zero knowledge proof ZKP, applies the original data to the data verifier V, and finally sends the shared data msg to the data consumer C.
5. An apparatus for applying the blockchain-based internet of things data privacy protection method of any of claims 1-4, the apparatus comprising:
the internet of things module is used for communicating with the internet of things and providing the sharing data msg of the internet of things;
A data demander comprising a data provider, a data verifier and a data consumer for transmitting and using shared data;
the ring signature module is used for generating a public key ring R and generating ring signature verification data by combining a self key of a data requiring party and shared data msg;
the knowledge proof module is used for generating zero knowledge proof ZKP through the ring signature data;
a blockchain network for broadcasting and storing signature data and zero knowledge proof ZKP.
6. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the steps of the blockchain-based internet of things data privacy protection method of any of claims 1 to 4.
7. A computer terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor, when executing the computer program, implements the steps of the blockchain-based internet of things data privacy protection method of any of claims 1 to 4.
CN202410397433.9A 2024-04-03 2024-04-03 Block chain-based data privacy protection method and device for Internet of things Active CN117997653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410397433.9A CN117997653B (en) 2024-04-03 2024-04-03 Block chain-based data privacy protection method and device for Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410397433.9A CN117997653B (en) 2024-04-03 2024-04-03 Block chain-based data privacy protection method and device for Internet of things

Publications (2)

Publication Number Publication Date
CN117997653A true CN117997653A (en) 2024-05-07
CN117997653B CN117997653B (en) 2024-06-07

Family

ID=90891523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410397433.9A Active CN117997653B (en) 2024-04-03 2024-04-03 Block chain-based data privacy protection method and device for Internet of things

Country Status (1)

Country Link
CN (1) CN117997653B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2719895A (en) * 1994-07-29 1996-02-08 Canon Kabushiki Kaisha A method for sharing secret information, generating a digital signature, and performing certification in a communication system that has a plurality of information processing apparatuses and a communication system that employs such a method
US20120089494A1 (en) * 2010-10-08 2012-04-12 Microsoft Corporation Privacy-Preserving Metering
CN112989415A (en) * 2021-03-23 2021-06-18 广东工业大学 Private data storage and access control method and system based on block chain
CN113411384A (en) * 2021-06-10 2021-09-17 华中科技大学 System and method for privacy protection in data security sharing process of Internet of things
CN114143080A (en) * 2021-11-30 2022-03-04 兰州理工大学 Block chain data privacy protection and sharing method based on zero knowledge proof
US11310060B1 (en) * 2018-02-15 2022-04-19 Blockstream Corporation Atomic cross-chain swaps using equivalent secret values
CN116894672A (en) * 2023-07-12 2023-10-17 暨南大学 Data transaction platform implementation method based on blockchain and payment channel network
CN117155563A (en) * 2023-09-01 2023-12-01 国网山东省电力公司信息通信公司 Block chain-based power grid and power communication network data sharing protection method and system
CN117176361A (en) * 2023-09-26 2023-12-05 云南财经大学 Block chain digital identity authentication control system and method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2719895A (en) * 1994-07-29 1996-02-08 Canon Kabushiki Kaisha A method for sharing secret information, generating a digital signature, and performing certification in a communication system that has a plurality of information processing apparatuses and a communication system that employs such a method
US20120089494A1 (en) * 2010-10-08 2012-04-12 Microsoft Corporation Privacy-Preserving Metering
US11310060B1 (en) * 2018-02-15 2022-04-19 Blockstream Corporation Atomic cross-chain swaps using equivalent secret values
CN112989415A (en) * 2021-03-23 2021-06-18 广东工业大学 Private data storage and access control method and system based on block chain
CN113411384A (en) * 2021-06-10 2021-09-17 华中科技大学 System and method for privacy protection in data security sharing process of Internet of things
CN114143080A (en) * 2021-11-30 2022-03-04 兰州理工大学 Block chain data privacy protection and sharing method based on zero knowledge proof
CN116894672A (en) * 2023-07-12 2023-10-17 暨南大学 Data transaction platform implementation method based on blockchain and payment channel network
CN117155563A (en) * 2023-09-01 2023-12-01 国网山东省电力公司信息通信公司 Block chain-based power grid and power communication network data sharing protection method and system
CN117176361A (en) * 2023-09-26 2023-12-05 云南财经大学 Block chain digital identity authentication control system and method

Also Published As

Publication number Publication date
CN117997653B (en) 2024-06-07

Similar Documents

Publication Publication Date Title
US11244054B2 (en) Method and apparatus for trusted computing
CN109889497B (en) Distrust-removing data integrity verification method
CN111801910A (en) System and method for authenticating off-chain data based on proof verification
CN112801663B (en) Blockchain certification method, device, system, equipment and medium
CN111164948A (en) Managing network security vulnerabilities using blockchain networks
CN112651037B (en) Out-of-chain data access method and system for block chain system
CN109361508A (en) Data transmission method, electronic equipment and computer readable storage medium
CN113328997A (en) Alliance chain cross-chain system and method
Luong et al. Privacy-preserving blockchain-based healthcare system for IoT devices using zk-SNARK
Yan et al. Integrity audit of shared cloud data with identity tracking
CN112073196B (en) Service data processing method and device, electronic equipment and storage medium
CN111159753A (en) Block chain intelligent contract management method and system, storage medium and terminal
Arapinis et al. Verifying privacy-type properties in a modular way
CN112734423A (en) Transaction method based on block chain and terminal equipment
CN111950032A (en) Block chain-based data storage method, terminal device and storage medium
CN114760071B (en) Zero-knowledge proof based cross-domain digital certificate management method, system and medium
CN113328854B (en) Service processing method and system based on block chain
CN113206746B (en) Digital certificate management method and device
CN113420886B (en) Training method, device, equipment and storage medium for longitudinal federal learning model
CN116562874B (en) Privacy protection cross-chain transaction verification method based on zero knowledge proof
CN117997653B (en) Block chain-based data privacy protection method and device for Internet of things
CN111949737A (en) Block chain-based data integrity verification method, terminal device and storage medium
CN115967568A (en) Cross-chain access control method based on block chain and group signature mechanism
Rani et al. A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records
CN115409511A (en) Personal information protection system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant