NL2026713A - A Blockchain Privacy Protection System and Its Method - Google Patents
A Blockchain Privacy Protection System and Its Method Download PDFInfo
- Publication number
- NL2026713A NL2026713A NL2026713A NL2026713A NL2026713A NL 2026713 A NL2026713 A NL 2026713A NL 2026713 A NL2026713 A NL 2026713A NL 2026713 A NL2026713 A NL 2026713A NL 2026713 A NL2026713 A NL 2026713A
- Authority
- NL
- Netherlands
- Prior art keywords
- transaction information
- module
- user terminal
- aforementioned
- information
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000012795 verification Methods 0.000 claims description 18
- 230000008569 process Effects 0.000 claims description 4
- 238000013475 authorization Methods 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a blockchain privacy protection system and its method. The blockchain privacy protection system comprises: an user terminal, an user management center and a blockchain network; the user terminal is used to collect the user information and transaction information, identify the privacy of intellect contract codes, and encrypt the transaction information and intellect contract codes after privacy identification; the user management center is used to authenticate the identity according to the user information sent by the user terminal, generate a block for the authenticated user terminal and add the block to the blockchain network, and update the total number of blocks in the blockchain network; the user management center also generates a transaction information permission signature for the authenticated user terminal according to the user information sent by the user terminal, and sends the transaction information permission signature to the user terminal and the blockchain network; the blockchain network comprises several blocks, which are used to store and share the transaction information. The invention can flexibly protect the privacy transaction information, so as to ensure the security of the user’s privacy information.
Description
A Blockchain Privacy Protection System and Its Method Technical Field
[001] The invention relates to the field of privacy protection technology, in particular to a blockchain privacy protection system and its method. Background Technology
[002] The transaction records in the blockchain system are jointly completed by multiple nodes distributed in different places, and each node records a complete account. Therefore, they can participate in the supervision of the legitimacy of the transaction, and can also jointly testify for them, so as to avoid the possibility of a single node being controlled or bribed to record false accounts. In addition, because there are enough accounting nodes, in theory, unless all nodes are destroyed, the accounts will not be lost, thus ensuring the security of the account data. With its unique technical advantages, innovative value concepts and broad application environment, blockchain technology has increasingly become a high-value frontier field, and its application has extended to many fields such as social management, Internet of Things, medical health and intelligent manufacturing, etc.
[003] However, in blockchain, Bitcoin and other systems achieve anonymity through pseudonyms. Anonymity refers to a pseudonym with non-relevance. The so-called non- relevance means that from the perspective of the attacker, it is impossible to associate any two interactions between the user and the system. In Bitcoin, although it also plays a role in protecting users’ privacy to some extent, all transactions of Bitcoin are publicly recorded in the distributed ledger in clear text, and anyone can know the details of transactions at each address. Once connected with the real identity, the privacy of users will be disclosed. The security problems in privacy protection greatly hinder the extensive application of blockchain technology.
[004] Therefore, it is necessary to provide a blockchain privacy protection system and its privacy protection method, so as to prevent the leakage of personal privacy data. Summary of the Invention
[005] The purpose of the invention is to provide a blockchain privacy protection system and its method, so as to solve the technical problems existing in the above existing technology, flexibly protect the private transaction information, and ensure the security of the user's privacy information.
[006] In order to achieve the above purpose, the invention provides the following solutions: The invention provides a blockchain privacy protection system, which comprises: an user terminal, an user management center and a blockchain network; 1
[007] The user terminal is used to collect the user information and transaction information, identify the privacy of intellect contract codes, and encrypt the transaction information and intellect contract codes after privacy identification;
[008] The user management center is used to authenticate the identity according to the user information sent by the user terminal, generate a block for the authenticated user terminal and add the generated block to the blockchain network, and update the total number of blocks in the blockchain network; the user management center also generates a transaction information permission signature for the authenticated user terminal according to the user information sent by the user terminal, and sends the transaction information permission signature to the user terminal and the blockchain network;
[009] The blockchain network comprises several blocks, which are used to store and share the transaction information.
[0010] Preferably, the user terminal comprises: an information collection module, a data processing module, a key generation module, an identification module and an encryption module;
[0011] The information collection module is used to collect the user's identity authentication information, account address and transaction information;
[0012] The data processing module is used to blindly process the user's account address;
[0013] The key generation module is used to generate a private key and a public key, and publish the public key to the blockchain network;
[0014] The identification module is used to identify the privacy of intellect contract codes;
[0015] The encryption module is used to perform a hash operation on the transaction information containing the intellect contract, so as to obtain the hash value of the transaction information, and sign the hash value through the private key; the intellect contract contains the intellect contract codes after privacy identification.
[0016] Preferably, the block comprises: an input module, a decryption module, an execution module, a verification module, a writing module, a database and a sharing module;
[0017] The input module is used to input the transaction information signed by the corresponding user terminal, and the input module is also used to input the information sent by other blocks in the blockchain network;
[0018] The decryption module is used to decrypt the signed transaction information;
[0019] The execution module is used to execute the decrypted intellect contract codes in a trusted execution environment, and encrypt the transaction information according to the privacy identification;
[0020] The verification module is used to verify the identity of other blocks;
[0021] The writing module is used to write the encrypted transaction information of the execution module into the database; the writing module also writes the public keys and transaction information of other blocks verified by the verification module into the database; 2
[0022] The database is used to store the transaction information, public key information and transaction information permission signature;
[0023] The sharing module is used to share the transaction information sent by the user terminal corresponding to the block in the blockchain network.
[0024] Preferably, the information sent by other blocks comprises: a transaction information permission signature, a public key and a encrypted transaction information.
[0025] Preferably, the verification module is used to verify the identity of other blocks according to the transaction information permission signature of other blocks.
[0026] Preferably, the specific method for sharing the sharing module comprises:
[0027] The sharing module divides the encrypted transaction information into several parts according to the latest block quantity information sent by the user management center, and encrypts and calculates each part of transaction information with the public key of each block, respectively; and sends the encrypted and calculated transaction information and the transaction information permission signature to each block, respectively.
[0028] The invention also provides a method for blockchain privacy protection, which comprises the following steps: Generation of User Terminal Block: The user terminal obtains the user's identity information, the identity information comprises the user's identity authentication information and account address, and sends the account address to the user management center after blind processing; Authenticate the identity authentication information sent by the user terminal through the user management center; Generate a block and transaction information permission signature for the authenticated user terminal through the user management center, add the generated block to the blockchain network, and update the total number of blocks in the blockchain network, and send the transaction information permission signature to the blockchain network and the user terminal; Writing of User Terminal Transaction Information: Collect the transaction information through the user terminal; Identify the privacy of intellect contract codes; Generate a private key based on the user's identity information, generate a public key based on the private key, and publish the public key to the blockchain network; Perform a hash operation on the transaction information containing the intellect contract, so as to obtain the hash value of the transaction information, of which, the intellect contract contains the intellect contract codes after privacy identification; sign the hash value of the transaction information through the private key; Decrypt the signed transaction information through the corresponding block of the user terminal, execute the decrypted intellect contract codes in a trusted execution environment, 3 encrypt the transaction information according to the privacy identification in the intellect contract codes, and write it into the database; Sharing of User Terminal Transaction Information: Receive public keys sent by other blocks through the corresponding block of the user terminal; Divide the encrypted transaction information into several parts through the corresponding block of the user terminal, encrypt and calculate each part of transaction information with the public key of each block, respectively, and send the encrypted and calculated transaction information and the transaction information permission signature to each block, respectively; Writing of Other Block Transaction Information: Receive the encrypted transaction information and transaction information permission signature sent by other blocks through the corresponding block of the user terminal; Verify the identity of other blocks according to the transaction information permission signature, and write the transaction information of other blocks that have passed the verification into the database.
[0029] The invention discloses the following technical effects:
[0030] In the invention, through the privacy identification of intellect contract codes, users can selectively encrypt the transaction information that needs privacy, so as to improve the flexibility of the privacy protection system; meanwhile, the transaction information sent to the blockchain network in the invention is the encrypted information according to user's needs, and verify the identity of other blocks according to the transaction information permission signature, which meets the anti-counterfeiting requirements of transaction information and effectively ensures the security of the user's private information. Brief Description of Drawings
[0031] In order to more clearly explain the embodiments of the invention or the technical solutions in the existing technology, the following will give a brief introduction to the drawings required in the embodiments. It is obvious that the drawings in the following description are only some embodiments of the invention. For those ordinary technical personnel in the field, without paying any creative work, they can also obtain other drawings according to these drawings.
[0032] Figure 1 is a structure diagram of the blockchain privacy protection system of the invention. Detailed Description of the Presently Preferred Embodiments
[0033] In the following part, the technical solutions in the embodiments of the invention will be described clearly and completely in conjunction with the drawings in the embodiments of the invention. Obviously, the described embodiments are only a part of the embodiments of the invention, not all of the embodiments. In view of the embodiments in the invention, all other 4 embodiments obtained by those ordinary technical personnel in this field without paying any creative work belong to the scope of protection of the invention.
[0034] In order to make the above purpose, characteristics and advantages of the invention more obvious and understandable, the invention will be further illustrated in detail in conjunction with the drawings and specific implementation methods.
[0035] Referring to Figure 1, the embodiment provides a blockchain privacy protection system, which comprises: an user terminal, an user management center and a blockchain network;
[0036] The user terminal is used to collect the user information and transaction information, identify the privacy of intellect contract codes, and encrypt the transaction information and intellect contract codes after privacy identification; the user terminal comprises: an information collection module, a data processing module, a key generation module, an identification module and an encryption module;
[0037] The information collection module is used to collect the user's identity authentication information, account address and transaction information; the identity authentication information comprises ID card information and fingerprint information;
[0038] The data processing module is used to blindly process the user's account address, so that the relationship between its real identity information and the account address will not be exposed during transactions; the information processing module performs blind processing by adding a blind factor to the account address;
[0039] The key generation module is used to generate a private key and a public key; the key generation module generates a private key based on the users identity authentication information, and generates a public key according to the private key; the key generation module generates a public key through an elliptic curve, and sends the public key to the blockchain network;
[0040] The identification module is used to identify the privacy of intellect contract codes; The privacy identification is used to distinguish the parts that need privacy and those that do not need privacy in the transaction information;
[0041] The encryption module is used to perform a hash operation on the transaction information containing the intellect contract, so as to obtain the hash value of the transaction information, and sign the hash value through the private key; the intellect contract contains the intellect contract codes after privacy identification.
[0042] The user management center is used to authenticate the identity according to the user information sent by the user terminal, generate a block for the authenticated user terminal and add the generated block to the blockchain network, and update the total number of blocks in the blockchain network; the user management center also generates a transaction information permission signature for the authenticated user terminal according to the user information sent by the user terminal, and sends the transaction information permission signature to the user terminal and the blockchain network; 5
[0043] The blockchain network comprises several blocks, which are used to store and share the transaction information; each block comprises: an input module, a decryption module, an execution module, a verification module, a writing module, a database and a sharing module;
[0044] The input module is used to input the transaction information signed by the corresponding user terminal, and the input module is also used to input the transaction information permission signature, public key and encrypted transaction information sent by other blocks in the blockchain network;
[0045] The decryption module is used to decrypt the signed transaction information;
[0046] The execution module is used to execute the decrypted intellect contract codes in a trusted execution environment, and encrypt the transaction information according to the privacy identification; of which, during the encryption process, the part of the transaction information that needs privacy is encrypted, and the part that does not need privacy does not need to be processed;
[0047] The verification module is used to verify the identity of other blocks according to the transaction information permission signature of other blocks.
[0048] The writing module is used to write the encrypted transaction information of the execution module into the database; the writing module also writes the public keys and transaction information of other blocks verified by the verification module into the database;
[0049] The database is used to store the transaction information, public key information and transaction information permission signature;
[0050] The sharing module is used to share the transaction information sent by the user terminal corresponding to the block in the blockchain network; the specific method comprises:
[0051] The sharing module divides the encrypted transaction information into several parts according to the latest block quantity information sent by the user management center, and encrypts and calculates each part of transaction information with the public key of each block, respectively; and sends the encrypted and calculated transaction information and the transaction information permission signature to each block, respectively. Of which, the sharing module uses an elliptic curve algorithm to encrypt and calculate each part of transaction information.
[0052] The embodiment also provides a method for blockchain privacy protection, which specifically comprises the following steps: S1. Generation of User Terminal Block: S1.1. The user terminal obtains the user's identity information, the identity information comprises the user's identity authentication information and account address, and sends the account address to the user management center after blind processing; S1.2. Authenticate the identity authentication information sent by the user terminal through the user management center, 6
S1.3. Generate a block and transaction information permission signature for the authenticated user terminal through the user management center, add the generated block to the blockchain network, and update the total number of blocks in the blockchain network, and send the transaction information permission signature to the blockchain network and the user terminal; S2. Writing of User Terminal Transaction Information: S2.1 Collect the transaction information through the user terminal; S2.2. Identify the privacy of intellect contract codes; S2.3. Generate a private key based on the user's identity information, generate a public key based on the private key, and publish the public key to the blockchain network; S2.4. Perform a hash operation on the transaction information containing the intellect contract, so as to obtain the hash value of the transaction information, of which, the intellect contract contains the intellect contract codes after privacy identification; sign the hash value of the transaction information through the private key; S2.5. Decrypt the signed transaction information through the corresponding block of the user terminal, execute the decrypted intellect contract codes in a trusted execution environment, encrypt the transaction information according to the privacy identification in the intellect contract codes, and write it into the database; S3. Sharing of User Terminal Transaction Information: S3.1. Receive public keys sent by other blocks through the corresponding block of the user terminal; S3.2. Divide the encrypted transaction information into several parts through the corresponding block of the user terminal, encrypt and calculate each part of transaction information with the public key of each block, respectively, and send the encrypted and calculated transaction information and the transaction information permission signature to each block, respectively; S4. Writing of Other Block Transaction Information: S4.1. Receive the encrypted transaction information and transaction information permission signature sent by other blocks through the corresponding block of the user terminal; S4.2. Verify the identity of other blocks according to the transaction information permission signature, and write the transaction information of other blocks that have passed the verification into the database.
The above described embodiments are only to describe the preferred methods of the invention, but not to limit the scope of the invention. On the premise of not departing from the design spirit of the invention, various deformations and improvements made by those ordinary technical personnel in the field to the technical solutions of the invention shall fall within the protection scope determined by the claims of the invention.
7
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2026713A NL2026713B1 (en) | 2020-10-20 | 2020-10-20 | A Blockchain Privacy Protection System and Its Method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2026713A NL2026713B1 (en) | 2020-10-20 | 2020-10-20 | A Blockchain Privacy Protection System and Its Method |
Publications (2)
Publication Number | Publication Date |
---|---|
NL2026713A true NL2026713A (en) | 2020-12-02 |
NL2026713B1 NL2026713B1 (en) | 2021-12-14 |
Family
ID=73598260
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NL2026713A NL2026713B1 (en) | 2020-10-20 | 2020-10-20 | A Blockchain Privacy Protection System and Its Method |
Country Status (1)
Country | Link |
---|---|
NL (1) | NL2026713B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12032715B2 (en) | 2022-01-04 | 2024-07-09 | Bank Of America Corporation | System and method for securing information in a distributed network via a distributed identifier |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170289111A1 (en) * | 2016-04-01 | 2017-10-05 | Jpmorgan Chase Bank, N.A. | Systems and methods for providing data privacy in a private distributed ledger |
US20200195419A1 (en) * | 2018-12-21 | 2020-06-18 | Alibaba Group Holding Limited | Blockchain data protection based on generic account model and homomorphic encryption |
US20200273028A1 (en) * | 2018-12-29 | 2020-08-27 | Alibaba Group Holding Limited | System and method for information protection |
-
2020
- 2020-10-20 NL NL2026713A patent/NL2026713B1/en not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170289111A1 (en) * | 2016-04-01 | 2017-10-05 | Jpmorgan Chase Bank, N.A. | Systems and methods for providing data privacy in a private distributed ledger |
US20200195419A1 (en) * | 2018-12-21 | 2020-06-18 | Alibaba Group Holding Limited | Blockchain data protection based on generic account model and homomorphic encryption |
US20200273028A1 (en) * | 2018-12-29 | 2020-08-27 | Alibaba Group Holding Limited | System and method for information protection |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12032715B2 (en) | 2022-01-04 | 2024-07-09 | Bank Of America Corporation | System and method for securing information in a distributed network via a distributed identifier |
Also Published As
Publication number | Publication date |
---|---|
NL2026713B1 (en) | 2021-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11314891B2 (en) | Method and system for managing access to personal data by means of a smart contract | |
US12088568B2 (en) | Systems and methods for secure key service | |
Kaaniche et al. | A blockchain-based data usage auditing architecture with enhanced privacy and availability | |
CN108418680B (en) | Block chain key recovery method and medium based on secure multi-party computing technology | |
Tran et al. | A survey on privacy-preserving blockchain systems (PPBS) and a novel PPBS-based framework for smart agriculture | |
CN109845220A (en) | For providing the method and apparatus of block chain participant's identity binding | |
CN110661613B (en) | Anti-quantum-computation implicit certificate issuing method and system based on alliance chain | |
CN112789642A (en) | Association of identities in a distributed database | |
CN111327419B (en) | Method and system for resisting quantum computation block chain based on secret sharing | |
CN110737915B (en) | Anti-quantum-computation anonymous identity recognition method and system based on implicit certificate | |
US20240005316A1 (en) | Method, apparatus, and computer-readable medium for authentication and authorization of networked data transactions | |
CN112149077B (en) | Supply chain billing method, system and computer equipment based on block chain technology | |
Khan et al. | Blockchain and the identity based encryption scheme for high data security | |
CN110868295A (en) | Anti-quantum computing alliance chain system based on secret sharing and communication method | |
CN114666064B (en) | Digital asset management method, device, storage medium and equipment based on blockchain | |
Ghafourian et al. | Combining blockchain and biometrics: A survey on technical aspects and a first legal analysis | |
NL2026713B1 (en) | A Blockchain Privacy Protection System and Its Method | |
Xenya et al. | Decentralized distributed blockchain ledger for financial transaction backup data | |
CN114514550A (en) | Partitioning requests into blockchains | |
US11451522B2 (en) | System and method for enabling the secure storage, transmission and access of genetic data | |
Tiwari et al. | A novel secure cloud storage architecture combining proof of retrievability and revocation | |
CN116781332A (en) | Block chain-based network flow evidence obtaining and tracing method and system | |
Sisodiya et al. | A comprehensive study of Blockchain and its various Applications | |
HamithaNasrin et al. | A Review on Implementation Techniques of Blockchain enabled Smart Contract for Document Verification | |
CN112837064A (en) | Signature method, signature verification method and device of alliance chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM | Lapsed because of non-payment of the annual fee |
Effective date: 20231101 |