WO2020177109A1 - Procédé de traitement de tirage au sort, puce de confiance, nœud, support de stockage et dispositif électronique - Google Patents

Procédé de traitement de tirage au sort, puce de confiance, nœud, support de stockage et dispositif électronique Download PDF

Info

Publication number
WO2020177109A1
WO2020177109A1 PCT/CN2019/077250 CN2019077250W WO2020177109A1 WO 2020177109 A1 WO2020177109 A1 WO 2020177109A1 CN 2019077250 W CN2019077250 W CN 2019077250W WO 2020177109 A1 WO2020177109 A1 WO 2020177109A1
Authority
WO
WIPO (PCT)
Prior art keywords
random information
user
promise
trusted execution
random
Prior art date
Application number
PCT/CN2019/077250
Other languages
English (en)
Chinese (zh)
Inventor
段夕华
钟林
Original Assignee
北京建极练科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京建极练科技有限公司 filed Critical 北京建极练科技有限公司
Priority to PCT/CN2019/077250 priority Critical patent/WO2020177109A1/fr
Publication of WO2020177109A1 publication Critical patent/WO2020177109A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof

Definitions

  • the present disclosure relates to the field of blockchain technology, and in particular to a lottery processing method based on blockchain, a trusted execution chip, a blockchain network node, a computer storage medium, and an electronic device.
  • Lottery has inherent requirements for fairness, non-controllability and confidentiality. Fairness means that the output result of the lottery algorithm is fair, that is, the probability of being drawn should be equal for all users. Uncontrollability means that the result of the lottery cannot be manipulated by the attacker, thus destroying the fairness of the result. Confidentiality means that the attacker cannot know the result of the lottery in advance.
  • the lottery is usually processed through a centralized operator or management server, the fairness of the lottery is guaranteed through algorithms, and the operator or management is handled in accordance with regulations through notarization and other means.
  • the operator or management party will operate in compliance with laws and regulations, and will not cheat or manipulate.
  • the inventor of the present invention found that there are problems in the above-mentioned prior art, and therefore proposes a new technical solution for at least one of the problems.
  • a lottery processing method based on blockchain including: a node receives a random information request from a user, and sends the random information request of the user and the public key of the user to a trusted execution chip The node receives the random information promise, the signature of the random information promise, and the ciphertext of the random information output by the trusted execution chip; wherein the random information is requested by the trusted execution chip based on the user's random information request Generated, the ciphertext of the random information is generated by encrypting the random information with the public key of the user, the random information promise is generated according to the random information, and the signature of the random information promise is executed by using the trusted
  • the private key of the chip is obtained by signing the random information promise; the node broadcasts the random information promise, the signature of the random information promise, and the ciphertext of the random information to the blockchain network to form a blockchain.
  • the method further includes: the user decrypts the ciphertext of the random information with a private key to obtain the random information.
  • the method further includes: other users receiving the random information provided by the user, and verifying the validity of the random information based on the random information promise.
  • the method further includes: the node according to the public key of the trusted execution chip The signature of the promise with the random information verifies the validity of the promise with the random information.
  • the user's random information request is a digital signature of the user's random information request; after the node receives the user's random information request, the method further includes: the node verifies the user's random information The validity of the requested digital signature.
  • the random information is generated by the trusted execution chip based on the private key of the trusted execution chip and the random information request of the user.
  • the public key sent by the user to the trusted execution chip is encrypted and transmitted by the public key of the trusted execution chip.
  • the blockchain network includes multiple nodes, and each node has a trusted execution chip.
  • the user’s random information request is sent to multiple nodes, and the user’s random information request is generated and combined by the trusted execution chips of the multiple nodes. Output the random information promise, the signature of the random information promise, and the cipher text of the random information.
  • the method further includes: initializing a plurality of trusted execution chips, so that the plurality of trusted execution chips have the same public key, private key, and seed.
  • the node broadcasting the random information promise, the signature of the random information promise, and the ciphertext of the random information to the blockchain network to form a blockchain includes: broadcasting to the blockchain network for the multiple nodes The random information promise, the signature of the random information promise, and the ciphertext of the random information are generated based on the blockchain consensus algorithm.
  • a trusted execution chip including:
  • the receiving module is used to receive the random information request of the user and the public key of the user;
  • a random information generating module configured to receive a random information request from the user, and generate random information according to the random information request of the user;
  • a promise generation module used to generate a random information promise based on the random information
  • a commitment signature generation module configured to sign the random information commitment through the private key of the trusted execution chip to obtain a digital signature of the random information commitment
  • a random ciphertext generating module configured to generate a ciphertext of the random information by encrypting the random information with the public key of the user;
  • the output module is used to output the random information promise, the signature of the random information promise, and the ciphertext of the random information.
  • the random information generating module generates the random information based on the private key of the trusted execution chip and the random information request of the user.
  • a blockchain network node including the above-mentioned trusted execution chip, wherein the blockchain network node receives a user's random information request, and combines the user's random information request with The public key of the user is sent to the trusted execution chip, and the random information promise, the signature of the random information promise, and the ciphertext of the random information output by the trusted execution chip are received, and the random information promise and random information promise The signature and ciphertext of random information are broadcast to the blockchain network to form a blockchain.
  • a computer-readable storage medium on which a computer program is stored, wherein the computer program is characterized in that the above-mentioned blockchain-based lottery processing method is implemented when the computer program is executed by a processor.
  • an electronic device including:
  • a memory for storing executable instructions of the processor
  • the processor is configured to execute the above-mentioned blockchain-based lottery processing method by executing the executable instruction.
  • the node inputs the user's random information request to the trusted execution chip, and the trusted execution chip generates random information and related promises and signatures.
  • the process is fair, confidential and non-tamperable, and the trusted execution chip
  • the content output by the execution chip is broadcast to the blockchain; users decrypt and disclose random information, while other users verify the validity of the promise.
  • random information is generated through the trusted execution chip and a consensus is reached in the blockchain system, then the random information has fairness, uncontrollability and confidentiality.
  • Figure 1 shows a schematic structural diagram of an embodiment of a blockchain network according to the present disclosure
  • FIG. 2 shows a flowchart of an embodiment of a lottery processing method based on blockchain according to the present disclosure
  • FIG. 3 shows a flowchart of another embodiment of a lottery processing method based on blockchain according to the present disclosure
  • FIG. 4 shows a flowchart of an embodiment of a method for drawing lots of license plates according to the present disclosure
  • Figure 5 shows a flow chart of an embodiment of a chess and card activity according to the present disclosure
  • FIG. 6 shows a schematic structural diagram of an embodiment of a trusted execution chip used in the present disclosure.
  • FIG. 7 shows a schematic diagram of an electronic device used in the blockchain-based lottery processing method of the present disclosure.
  • Blockchain technology can be used to deal with lottery issues.
  • the random information generation method of distributed smart contracts based on blockchain is used for lottery.
  • the distributed characteristics of blockchain can be used to ensure the fairness and uncontrollability of lottery. Since the operation of smart contracts in blockchain smart contracts is open and transparent, any node or user can generate random information, so this type of scheme is insufficient for the confidentiality of random information.
  • the execution efficiency of smart contracts depends on the blockchain system. If the blockchain system has low operating efficiency or high operating costs, the efficiency of this type of random information generation scheme will be lower or higher operating costs. .
  • a blockchain network node has a trusted execution chip, that is, a black box; the black box input node provides a transaction ticket, for example, includes transaction data and user public key, and outputs user public key encryption Random information; the node broadcasts the ciphertext of the random information to the blockchain, and only the user corresponding to the private key can decrypt and disclose the random information, thereby achieving the confidentiality of the random information, thereby providing a fair and unmanageable Distributed random information generation scheme with security and confidentiality.
  • a trusted execution chip that is, a black box
  • the black box input node provides a transaction ticket, for example, includes transaction data and user public key, and outputs user public key encryption Random information
  • the node broadcasts the ciphertext of the random information to the blockchain, and only the user corresponding to the private key can decrypt and disclose the random information, thereby achieving the confidentiality of the random information, thereby providing a fair and unmanageable Distributed random information generation scheme with security and confidentiality.
  • Fig. 1 shows a schematic structural diagram of an embodiment of a blockchain network according to the present disclosure.
  • the blockchain network includes multiple nodes 11, and the nodes 11 have a trusted execution chip 110.
  • the trusted execution chip 110 may also be referred to as a software-impenetrable black box, and may use specialized hardware, such as Intel's SGX (SoftwareGuard Extensions, software protection extensions) technology or ARM's TrustZone technology and similar technologies.
  • the trusted execution chip 110 can read external data and at the same time expose the interface through the API, thereby providing initialization and extraction functions. Through the initialization operation, the trusted execution chip 110 can have the same seed for generating random information or lottery information.
  • the trusted execution chip 110 has the same public key and private key through initialization, or has the same public key for the lottery function. And private key.
  • one or more registered users 12 participate in the lottery, and the registered users 12 provide their own public key and signature Sig to make a request.
  • the node 11 sends the public key and signature Sig of the registered user 12 to the trusted execution chip 110.
  • the trusted execution chip 110 executes the lottery.
  • the data C can be decrypted with the private key of the registered user 12.
  • Others include trusted execution
  • the host of the chip 110 cannot read the plaintext, thus avoiding the possibility of peeping.
  • the black box While sending encrypted data, the black box will also send a proof P of the extracted data to the host node, where Broadcast to the blockchain network and synchronously recorded by each node, ensuring the public verifiability of the data.
  • the algorithm itself will guarantee fairness, credibility, and verifiability, but the data cannot be reversed before the holder publishes it. Conversely, if the user forged results are extracted, it will not be able to pass the verification of the blockchain network that each node can participate in.
  • the trusted execution chip 110 executes the lottery, which is a consensus random algorithm based on cryptography, and all random numbers are generated by an original seed, external input, and a private key for seed transformation.
  • the three parts of data between each node (for example, through the initialization process) are kept consistent, so the consensus of the generated random numbers is guaranteed.
  • the private key is kept secret from the outside world, thus ensuring the unpredictability of the random number, and the seed is automatically changed every time with the input from the outside, which further ensures the unpredictability of the random number.
  • the trusted execution chip provides the public key to the user at the same time.
  • the user's data including the original sequence, signature, etc., can be encrypted for transmission, thereby further improving the privacy of data transmission and further improving the verifiability. safer.
  • Fig. 2 shows a flowchart of an embodiment of a lottery processing method based on blockchain according to the present disclosure.
  • step S202 the node receives the random information request of the user, and sends the random information request of the user and the public key of the user to the trusted execution chip.
  • Step S204 the node receives the random information promise, the signature of the random information promise, and the ciphertext of the random information output by the trusted execution chip; wherein, the random information is generated by the trusted execution chip based on the user's random information request, and the ciphertext of the random information is generated by the trusted execution chip
  • the user's public key encrypts and generates the random information
  • the random information promise is generated based on the random information
  • the signature of the random information promise is obtained by signing the random information promise using the private key of the trusted execution chip.
  • Step S206 the node broadcasts the random information promise, the signature of the random information promise, and the ciphertext of the random information to the blockchain network to form a blockchain.
  • the node inputs the user's random information request to the trusted execution chip, and the trusted execution chip generates random information and related promises and signatures.
  • the process is fair, confidential and non-tamperable, and the trusted execution
  • the content output by the chip is broadcast to the blockchain; users decrypt and disclose random information, while other users verify the validity of the promise.
  • random information is generated through the trusted execution chip and a consensus is reached in the blockchain system, and the random information uses fairness, uncontrollability, and confidentiality.
  • random information generation algorithm random information generation algorithm
  • commitment algorithm digital signature algorithm
  • public key encryption algorithm public key encryption algorithm
  • Random information generation algorithm Input the private key and data, and output the random number.
  • the random information generation algorithm is a deterministic polynomial time algorithm Rand, which satisfies the following two conditions:
  • Randomness distribution ⁇ Rand(n) ⁇ , n ⁇ N is random distribution.
  • Defining the commitment algorithm includes two phases, the commitment phase and the open phase.
  • Commitment stage input message, output commitment.
  • the promise algorithm has the characteristics of correctness, binding and concealment.
  • Binding If you input other messages, the verification fails, and the probability of output success can be ignored.
  • Digital signature algorithms can include secret key generation algorithms, signature algorithms, and verification algorithms.
  • Signature algorithm input the private key and message, and output the signature.
  • Verification algorithm Input message signature and public key, and output validity judgment.
  • Key generation algorithm KeyGen Enter the security parameter 1 ⁇ , enter the private key SK and the public key PK, (SK, PK) ⁇ KeyGen(1 ⁇ ).
  • Signature algorithm Sig Input the private key SK and message m, and output the signature ⁇ , ⁇ Sig(SK, m).
  • Verification algorithm Ver Input the message signature pair (m, ⁇ ) and the public key PK, and output the validity judgment Valid/Invalid ⁇ Ver(m, ⁇ , PK).
  • the digital signature algorithm has the characteristics of correctness and unforgeability.
  • Unforgeability The attacker cannot forge a signature in polynomial time to make the signature verification successful.
  • Public key encryption algorithms may include secret key generation algorithms, encryption algorithms, and decryption algorithms.
  • Encryption algorithm input message and public key, output ciphertext.
  • Decryption algorithm input ciphertext and private key, and output plaintext.
  • Key generation algorithm KeyGen Enter the security parameter 1 ⁇ , enter the private key SK and the public key PK, (SK, PK) ⁇ KeyGen(1 ⁇ ).
  • Encryption algorithm Enc input public key PK and message m, output cipher text C, C ⁇ Enc(PK, m).
  • Authentication algorithm Dec input ciphertext C and private key SK, output plaintext m, m ⁇ Dec(SK, C).
  • the public key encryption algorithm has the characteristics of correctness and confidentiality.
  • Correctness Input the correct ciphertext and private key, and output the correct plaintext.
  • FIG. 3 shows a flowchart of another embodiment of a lottery processing method based on blockchain according to the present disclosure.
  • step 301 the user calls the signature algorithm, outputs the digital signature of the random information request, and sends it to the blockchain network node.
  • step 302 the node invokes the verification algorithm to verify the validity of the digital signature of the random information request.
  • the validity verification of the digital signature of the random information request Valid/Invalid ⁇ Ver(Tx i , m, PK i ), where i represents any user, PK i represents the user’s public key, and m represents For messages that need to be signed, Ver represents the verification algorithm in the digital signature algorithm, and Tx i represents the signature of the message.
  • step 303 the node sends the digital signature of the random information request and the user's public key to the trusted execution chip.
  • the trusted execution chip generates random information, random information promise, random information promise signature, and random information ciphertext. In an embodiment, it specifically includes the following steps:
  • the trusted execution chip calls the random information generation algorithm, inputs the chip's private key and the digital signature requested by the user, and outputs random information.
  • RandNum i ⁇ Rand(SK 0 , Tx i ), where 0 represents the trusted execution chip, SK 0 represents the private key of the chip, Rand represents the random number generation algorithm, and RandNum i represents the random number output by the chip .
  • the trusted execution chip calls the promise algorithm, inputs random information, and outputs random information promises.
  • ⁇ i Com(RandNum i ), where i represents any user, RandNum i represents the random number output by the chip, Com represents the commitment algorithm, and ⁇ i represents the commitment value output by the commitment algorithm.
  • the trusted execution chip calls the signature algorithm, inputs the chip private key and random information promise, and outputs the signature.
  • ⁇ i Sig(SK 0 , Hash( ⁇ i )), where i represents any user, ⁇ i represents the commitment value output by the commitment algorithm, Hash represents the hash algorithm, and SK 0 represents trusted Execute the private key of the chip, Sig represents the signature algorithm in the digital signature algorithm, and ⁇ i represents the signature value output by the digital signature algorithm.
  • the trusted execution chip calls encryption algorithms, inputs random information and user public keys, and outputs cipher text.
  • C i ⁇ Enc(PK i , RandNum i ), where i represents any user, RandNum i represents the random number output by the chip, PK i represents the public key of the user, Enc represents the public key encryption algorithm
  • the encryption algorithm, C i represents the ciphertext output by the encryption algorithm.
  • step 305 the trusted execution chip sends the random information promise, the signature of the random information promise, and the ciphertext of the random information to the node.
  • step 306 the node verifies the validity of the signature promised by the random information.
  • the node calls the verification algorithm, inputs the chip public key and random information promise signature pair, and outputs the validity judgment.
  • Valid/Invalid Ver(PK 0 , Hash( ⁇ i ), ⁇ i ), where i represents any user, ⁇ i represents the signature value output by the digital signature algorithm, and ⁇ i represents the commitment algorithm output Hash indicates the hash algorithm, PK 0 indicates the public key of the trusted execution chip, Ver indicates the verification algorithm in the digital signature algorithm, and Valid/Invalid indicates the output result of the signature verification algorithm, that is, valid or invalid.
  • the node broadcasts the promise of random information, the signature of the promise of random information, and the ciphertext of the random information to the blockchain.
  • Broadcast information node comprising: ( ⁇ i, ⁇ i, C i, PK i), where, i denotes any user, PK i represents the user's public key, C i represents the output ciphertext encryption algorithm, ⁇ i represents a number The signature value output by the signature algorithm, ⁇ i represents the commitment value output by the commitment algorithm.
  • step 308 the user calls the decryption algorithm, inputs the private key and the ciphertext of random information, and outputs the plaintext of random information.
  • the user decrypts: RandNum i ⁇ Dec(SK i , C i ), where i represents any user, C i represents the ciphertext output by the encryption algorithm, SK i represents the user’s private key, and Dec represents the public
  • the decryption algorithm in the key encryption algorithm, RandNum i represents the random number output by the chip.
  • the user decrypts and discloses the random information, while other users verify the validity of the promise, by calling the verification algorithm, input the random information plaintext and the random information promise, and output the validity judgment.
  • other users verify the commitment: Valid/Invalid ⁇ Ver(RandNum i , ⁇ i ), where i represents any user, ⁇ i represents the commitment value output by the commitment algorithm, and RandNum i represents the random number output by the chip , Ver represents the verification algorithm in the commitment algorithm, Valid/Invalid represents the output result of the commitment verification algorithm, that is, valid or invalid.
  • FIG. 4 shows a flowchart of an embodiment of a method for drawing lots of license plates according to the present disclosure.
  • User Submit identity information to the license plate lottery blockchain network, and download lottery information from the blockchain.
  • Lottery company Lottery company draws lots based on user identity information and broadcasts the lottery results to the blockchain.
  • the applicant submits the digital signature of the identity information to the license plate lottery blockchain network.
  • each node (lottery company) in the blockchain network verifies the validity of the identity information and the digital signature.
  • Each node then performs the lottery process independently:
  • each node inputs the digital signature of the applicant's identity information to the trusted execution chip.
  • the trusted execution chip generates a piece of random information based on the digital signature of the applicant's identity information; the trusted execution chip inputs random information and outputs random information promises; the trusted execution chip inputs random information promises and private keys, and outputs signatures; trusted The implementation chip inputs random information and applicant public key, and outputs ciphertext.
  • each node receives the random information promise, the signature of the random information promise, and the ciphertext of the random information, inputs the chip public key and the random information promise signature pair, and outputs the validity judgment.
  • the applicant obtains the ciphertext of the random information from the blockchain, and decrypts to obtain the plaintext of the random information.
  • the applicant determines that the lottery is successful according to whether the random information meets the predetermined conditions. For example, if the random information is less than a certain threshold, the draw is successful (that is, the license plate number is obtained).
  • random information is generated inside the trusted execution chip, and each node (lottery company) cannot obtain it.
  • Random information promises to be complete, binding, and concealed. Therefore, users can publish random information for integrity verification; users cannot open random information as other random information; attackers cannot obtain random information.
  • Random information digital signature can ensure that random information is generated by a trusted execution chip.
  • the random information encryption ensures that no random lottery company knows the plain text of the user's random information, and only the applicant can decrypt and obtain it. If a few lottery companies cheat, they will be discarded in the blockchain network verification (dishonest data will not get the consensus of the entire network). Only when the lottery company honestly draws the lottery can it be broadcast to the blockchain.
  • the blockchain consensus algorithm used for blockchain network verification does not need to limit the specific consensus algorithm. It only requires an algorithm that can ensure the security of the system and reach a consensus when the honest participants are the majority, such as the proof-of-work mechanism POW consensus Algorithms, consensus algorithms for proof of rights and interests, etc
  • the entire lottery system is based on a blockchain system and a trusted execution chip.
  • the license plate lottery cannot be cheated, and has fairness, non-controllability, and confidentiality. Only the applicant knows whether the lottery is successful, but other people can verify whether the applicant is successful.
  • FIG. 5 shows a flowchart of an embodiment of a chess and card activity according to the present disclosure.
  • the user digitally signs a certain board game, applies to participate in the game, and downloads the random number required for the board game from the blockchain.
  • the chess and card operator (miner) generates a random number based on the user's digital signature and broadcasts the result to the blockchain.
  • step S502 the user digitally signs the game.
  • step S504 the chess and card operator verifies the validity of the digital signature.
  • step S506 the chess and card operator inputs the user's digital signature to the trusted execution chip.
  • step S508 the trusted execution chip generates random information, random information promise, digital signature of random information promise, and ciphertext of random information.
  • Random information generation Input the user's digital signature to the trusted execution chip, and the trusted execution chip generates a piece of random information based on the user's digital signature.
  • Random information promise Trusted execution chip inputs random information and outputs random information promise.
  • Random information digital signature Trusted execution chip inputs random information promise and private key, and outputs signature.
  • Random information encryption The trusted execution chip inputs random information and the applicant's public key, and outputs ciphertext.
  • step S510 multiple chess and card operators receive the credible execution chip to generate random information promises, digital signatures of random information promises, and ciphertexts of random information. Chess and card operators (miners) verify the validity of the signature: input the chip public key and random information promise signature pair, and output the validity judgment.
  • step S512 multiple chess and card operators broadcast the random information promise, random information promise signature, and random information cipher text to the blockchain.
  • step S514 the user obtains the ciphertext of the random information from the blockchain, and decrypts to obtain the plaintext of the random information.
  • step S5166 the user participates in the board game in plaintext according to random information.
  • step S5128 if the user discloses the random information, the card operator or the entire network user can verify the correctness of the random information.
  • the entire chess and card game system is based on a blockchain system and a trusted execution chip. Therefore, the generation of random numbers cannot be cheated, and has fairness, uncontrollability, and confidentiality.
  • Multiple users can jointly apply for a total random information and obtain part of the random information separately. Part of the random information of each user is mutually exclusive, and the union of mutually exclusive random information is equal to the total random information. So meet the requirements of chess and card games.
  • Fig. 6 shows a schematic structural diagram of an embodiment of a trusted execution chip used in the present disclosure.
  • the trusted execution chip includes:
  • the receiving module 61 is configured to receive a random information request from a user and the public key of the user;
  • the random information generating module 62 is configured to receive the random information request of the user, and generate random information according to the random information request of the user;
  • the promise generating module 63 is configured to generate a random information promise according to the random information
  • the commitment signature generating module 64 is configured to sign the random information commitment through the private key of the trusted execution chip to obtain a digital signature of the random information commitment;
  • a random ciphertext generating module 65 configured to encrypt the random information with the user's public key to generate a ciphertext of the random information
  • the output module 66 is configured to output the random information promise, the signature of the random information promise, and the cipher text of the random information.
  • the random information generating module 62 generates random information based on the private key of the trusted execution chip and the random information request of the user.
  • the electronic device 600 according to this embodiment of the present invention will be described below with reference to FIG. 7.
  • the electronic device 600 shown in FIG. 7 is only an example, and should not bring any limitation to the function and application scope of the embodiment of the present invention.
  • the electronic device 600 is represented in the form of a general-purpose computing device.
  • the components of the electronic device 600 may include, but are not limited to: the aforementioned at least one processing unit 610, the aforementioned at least one storage unit 620, and a bus 630 connecting different system components (including the storage unit 620 and the processing unit 610).
  • the storage unit stores program code, and the program code can be executed by the processing unit 610, so that the processing unit 610 executes the various exemplary methods described in the "exemplary method" section of this specification. Implementation steps.
  • the processing unit 610 may execute S202 as shown in FIG.
  • the storage unit 620 may include a readable medium in the form of a volatile storage unit, such as a random access storage unit (RAM) 6201 and/or a cache storage unit 6202, and may further include a read-only storage unit (ROM) 6203.
  • RAM random access storage unit
  • ROM read-only storage unit
  • the storage unit 620 may also include a program/utility tool 6204 having a set of (at least one) program module 6205.
  • program module 6205 includes but is not limited to: an operating system, one or more application programs, other program modules, and program data, Each of these examples or some combination may include the implementation of a network environment.
  • the bus 630 may represent one or more of several types of bus structures, including a storage unit bus or a storage unit controller, a peripheral bus, a graphics acceleration port, a processing unit, or a local area using any bus structure among multiple bus structures. bus.
  • the electronic device 600 may also communicate with one or more external devices (such as keyboards, pointing devices, Bluetooth devices, etc.), and may also communicate with one or more devices that enable a user to interact with the electronic device 600, and/or communicate with
  • the electronic device 600 can communicate with any device (such as a router, modem, etc.) that communicates with one or more other computing devices. This communication can be performed through an input/output (I/O) interface 650.
  • the electronic device 600 may also communicate with one or more networks (for example, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through the network adapter 660.
  • networks for example, a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet
  • the network adapter 660 communicates with other modules of the electronic device 600 through the bus 630. It should be understood that although not shown in the figure, other hardware and/or software modules can be used in conjunction with the electronic device 600, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives And data backup storage system, etc.
  • the exemplary embodiments described herein can be implemented by software, or can be implemented by combining software with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , Including several instructions to make a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) execute the method according to the embodiments of the present disclosure.
  • a computing device which may be a personal computer, a server, a terminal device, or a network device, etc.
  • a computer-readable storage medium on which is stored a program product capable of implementing the above method in this specification.
  • various aspects of the present invention may also be implemented in the form of a program product, which includes program code, and when the program product runs on a terminal device, the program code is used to make the The terminal device executes the steps according to various exemplary embodiments of the present invention described in the above "Exemplary Method" section of this specification.
  • the program product for implementing the above method according to the embodiment of the present invention may adopt a portable compact disk read-only memory (CD-ROM) and include program code, and may run on a terminal device, such as a personal computer.
  • CD-ROM portable compact disk read-only memory
  • the program product of the present invention is not limited thereto.
  • the readable storage medium can be any tangible medium that contains or stores a program, and the program can be used by or in combination with an instruction execution system, device, or device.
  • the program product can use any combination of one or more readable media.
  • the readable medium may be a readable signal medium or a readable storage medium.
  • the readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or a combination of any of the above. More specific examples (non-exhaustive list) of readable storage media include: electrical connections with one or more wires, portable disks, hard disks, random access memory (RAM), read only memory (ROM), erasable Type programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • the computer-readable signal medium may include a data signal propagated in baseband or as a part of a carrier wave, and readable program code is carried therein. This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the readable signal medium may also be any readable medium other than a readable storage medium, and the readable medium may send, propagate, or transmit a program for use by or in combination with the instruction execution system, apparatus, or device.
  • the program code contained on the readable medium can be transmitted by any suitable medium, including but not limited to wireless, wired, optical cable, RF, etc., or any suitable combination of the foregoing.
  • the program code used to perform the operations of the present invention can be written in any combination of one or more programming languages.
  • the programming languages include object-oriented programming languages-such as Java, C++, etc., as well as conventional procedural programming languages. Programming language-such as "C" language or similar programming language.
  • the program code can be executed entirely on the user's computing device, partly on the user's device, executed as an independent software package, partly on the user's computing device and partly executed on the remote computing device, or entirely on the remote computing device or server Executed on.
  • the remote computing device can be connected to a user computing device through any kind of network, including a local area network (LAN) or a wide area network (WAN), or can be connected to an external computing device (for example, using Internet service providers) Business to connect via the Internet).
  • LAN local area network
  • WAN wide area network
  • Internet service providers Internet service providers
  • the exemplary embodiments described herein can be implemented by software, or can be implemented by combining software with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (can be a CD-ROM, U disk, mobile hard disk, etc.) or on the network , Including several instructions to make a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) execute the method according to the embodiment of the present disclosure.
  • a computing device which may be a personal computer, a server, a mobile terminal, or a network device, etc.

Abstract

La présente invention concerne un procédé de traitement de tirage au sort basé sur une chaîne de blocs, une puce d'exécution de confiance, un nœud de réseau de chaîne de blocs, un support de stockage informatique et un dispositif électronique, qui se rapportent au domaine de la technologie des chaînes de blocs et de la cryptologie. Ledit procédé comprend les étapes suivantes : un nœud envoie une requête d'informations aléatoires d'un utilisateur et une clé publique de l'utilisateur à une puce d'exécution de confiance ; le nœud reçoit un engagement d'informations aléatoires, une signature de l'engagement d'informations aléatoires et un cryptogramme des informations aléatoires qui sont délivrées par la puce d'exécution de confiance ; et le nœud diffuse l'engagement d'informations aléatoires, la signature de l'engagement d'informations aléatoires et le cryptogramme des informations aléatoires à un réseau de chaîne de blocs de façon à former une chaîne de blocs. L'existence de la puce d'exécution de confiance évite des risques potentiels, tels que la prévisibilité, la lecture en mémoire et l'exploitabilité, de façon à faciliter l'atteinte d'un consensus par le réseau de chaîne de blocs, et une partie de génération ne peut pas utiliser la génération d'une séquence, garantissant l'équité de la solution d'une manière ouverte et vérifiable.
PCT/CN2019/077250 2019-03-07 2019-03-07 Procédé de traitement de tirage au sort, puce de confiance, nœud, support de stockage et dispositif électronique WO2020177109A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/077250 WO2020177109A1 (fr) 2019-03-07 2019-03-07 Procédé de traitement de tirage au sort, puce de confiance, nœud, support de stockage et dispositif électronique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/077250 WO2020177109A1 (fr) 2019-03-07 2019-03-07 Procédé de traitement de tirage au sort, puce de confiance, nœud, support de stockage et dispositif électronique

Publications (1)

Publication Number Publication Date
WO2020177109A1 true WO2020177109A1 (fr) 2020-09-10

Family

ID=72338407

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/077250 WO2020177109A1 (fr) 2019-03-07 2019-03-07 Procédé de traitement de tirage au sort, puce de confiance, nœud, support de stockage et dispositif électronique

Country Status (1)

Country Link
WO (1) WO2020177109A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572810A (zh) * 2021-06-09 2021-10-29 北京邮电大学 一种面向物联网私有多账本区块链系统设计与实现的方法
WO2024023425A1 (fr) * 2022-07-27 2024-02-01 La Française Des Jeux Procédé, dispositif et programme d'ordinateur de tirage électronique

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107103097A (zh) * 2017-05-22 2017-08-29 中链科技有限公司 基于区块链技术的抽签方法和终端设备
CN107862782A (zh) * 2017-10-27 2018-03-30 链家网(北京)科技有限公司 基于以太坊区块链的抽签方法及装置
CN108269090A (zh) * 2018-01-19 2018-07-10 中国科学院软件研究所 基于无协商随机抽签的用于区块链系统的共识方法和装置
KR101887964B1 (ko) * 2017-04-28 2018-08-13 주식회사 더블체인 양자난수 기반 보안기능을 가진 블록체인 코어서버 및 블록체인 보안방법 및 전자화폐 거래 시스템
CN109003083A (zh) * 2018-07-27 2018-12-14 山东渔翁信息技术股份有限公司 一种基于区块链的ca认证方法、装置及电子设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101887964B1 (ko) * 2017-04-28 2018-08-13 주식회사 더블체인 양자난수 기반 보안기능을 가진 블록체인 코어서버 및 블록체인 보안방법 및 전자화폐 거래 시스템
CN107103097A (zh) * 2017-05-22 2017-08-29 中链科技有限公司 基于区块链技术的抽签方法和终端设备
CN107862782A (zh) * 2017-10-27 2018-03-30 链家网(北京)科技有限公司 基于以太坊区块链的抽签方法及装置
CN108269090A (zh) * 2018-01-19 2018-07-10 中国科学院软件研究所 基于无协商随机抽签的用于区块链系统的共识方法和装置
CN109003083A (zh) * 2018-07-27 2018-12-14 山东渔翁信息技术股份有限公司 一种基于区块链的ca认证方法、装置及电子设备

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572810A (zh) * 2021-06-09 2021-10-29 北京邮电大学 一种面向物联网私有多账本区块链系统设计与实现的方法
WO2024023425A1 (fr) * 2022-07-27 2024-02-01 La Française Des Jeux Procédé, dispositif et programme d'ordinateur de tirage électronique
FR3138553A1 (fr) * 2022-07-27 2024-02-02 La Française Des Jeux Procédé, dispositif et programme d’ordinateur de tirage électronique

Similar Documents

Publication Publication Date Title
EP3583740B1 (fr) Distribution de clé sécurisée restreintre par le propriétaire de données
US11271730B2 (en) Systems and methods for deployment, management and use of dynamic cipher key systems
US10142107B2 (en) Token binding using trust module protected keys
US11930103B2 (en) Method, user device, management device, storage medium and computer program product for key management
CN111431713B (zh) 一种私钥存储方法、装置和相关设备
WO2022199290A1 (fr) Calcul sécurisé multi-parties
EP2095288B1 (fr) Procédé pour le stockage sûr de données d'état de programme dans un dispositif électronique
US11210658B2 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN106576043A (zh) 病毒式可分配可信消息传送
US20170310479A1 (en) Key Replacement Direction Control System and Key Replacement Direction Control Method
KR101879758B1 (ko) 사용자 단말기별 사용자 디지털 인증서 발급 방법 및 그 인증서에 의한 인증 방법
EP4150879A1 (fr) Construction d'une transaction de registre distribué sur un portefeuille matériel froid
JP2017112604A (ja) 対称鍵暗号化と非対称鍵二重暗号化を複合的に適用した暗/復号化速度改善方法
CN104486087A (zh) 一种基于远程硬件安全模块的数字签名方法
WO2021098152A1 (fr) Procédé de traitement de données à base de chaîne de blocs, dispositif et appareil informatique
CN111181944B (zh) 通信系统及信息发布方法、装置、介质、设备
CN109361512A (zh) 数据传输方法
Sharma et al. Secure file storage on cloud using hybrid cryptography
WO2020177109A1 (fr) Procédé de traitement de tirage au sort, puce de confiance, nœud, support de stockage et dispositif électronique
CN111010283B (zh) 用于生成信息的方法和装置
JP4840575B2 (ja) 端末装置、証明書発行装置、証明書発行システム、証明書取得方法および証明書発行方法
CN110414269B (zh) 应用安装包的处理方法、相关装置、存储介质及系统
KR20180024389A (ko) 키 관리 장치 및 방법
KR102304831B1 (ko) 순열그룹 기반의 암호화 기술을 적용한 암호화시스템 및 방법
CN110611674B (zh) 不同计算机系统之间的协议交互方法、系统及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19917771

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18/01/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19917771

Country of ref document: EP

Kind code of ref document: A1