WO2021134897A1 - Système et procédé de supervision dynamique cachée de transaction par chaîne d'approvisionnement de chaîne de blocs - Google Patents

Système et procédé de supervision dynamique cachée de transaction par chaîne d'approvisionnement de chaîne de blocs Download PDF

Info

Publication number
WO2021134897A1
WO2021134897A1 PCT/CN2020/077624 CN2020077624W WO2021134897A1 WO 2021134897 A1 WO2021134897 A1 WO 2021134897A1 CN 2020077624 W CN2020077624 W CN 2020077624W WO 2021134897 A1 WO2021134897 A1 WO 2021134897A1
Authority
WO
WIPO (PCT)
Prior art keywords
parameter
signature
node device
candidate
utxo
Prior art date
Application number
PCT/CN2020/077624
Other languages
English (en)
Chinese (zh)
Inventor
辛佳骏
张骁
来鑫
Original Assignee
深圳市网心科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市网心科技有限公司 filed Critical 深圳市网心科技有限公司
Publication of WO2021134897A1 publication Critical patent/WO2021134897A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Definitions

  • the present invention relates to the technical field of block chains, in particular to a dynamic supervision system and method for block chain supply chain transaction hiding.
  • the existing blockchain supply chain system connects core enterprise node equipment, supplier node equipment, factor node equipment, and bank node equipment through the blockchain.
  • core enterprise node equipment, supplier node equipment, factorer node equipment, and bank node equipment are used as blockchain nodes to join the blockchain supply chain system, they need to be authorized to join, and there is a certain degree of trust between the blockchain nodes Basically, the credibility of the data is enhanced by the way of transaction data on the chain such as accounts receivable, bill vouchers, and mortgage goods vouchers.
  • the main purpose of the present invention is to provide a block chain supply chain transaction hidden dynamic supervision system and method, which aims to solve the technical problem of privacy leakage and no supervision caused by the clear text of transaction data in the block chain supply chain.
  • the first aspect of the present invention provides a blockchain supply chain transaction hidden dynamic supervision system, the system includes:
  • the supervisory authority node device is used to send multiple signature parameters when receiving a signature parameter application from the core enterprise node device;
  • the core enterprise node device is used to use Pedersen's commitment to encrypt the payables promised by the core enterprise to the first-tier supplier to obtain confidential transactions; use Bulletproof range certification to calculate the certification parameters based on the multiple signature parameters and the generated random numbers; Sign the confidential transaction and the certification parameters and upload the signed transaction data to the blockchain supply chain platform;
  • a first-level supplier node device configured to use the blockchain supply chain platform to receive the transaction data, decrypt it, and output it to the first-level supplier;
  • the regulatory agency node device is also used to obtain the transaction data from the blockchain supply chain platform; obtain confidential transactions and certification parameters in the transaction data, and determine the confidential transaction based on the certification parameters Payables in to achieve the supervision of said payables;
  • the blockchain supply chain platform is used to store the transaction data; verify the correctness of the transaction data and the legitimacy of the signature of the regulatory agency node device.
  • the multiple signature parameters include a first signature parameter, a second signature parameter, and a third signature parameter, and the random number includes a first random number and a second random number;
  • Pedersen's commitment to encrypt the payables promised by the core enterprise to the first-tier suppliers to obtain confidential transactions includes:
  • the core enterprise node equipment uses the Bulletproof range to prove that the calculation proof parameters based on the multiple signature parameters and the generated random numbers include:
  • the target certification parameter is calculated based on the first calculation number and the second signature parameter.
  • the calculating target certification parameters based on the first calculation number and the second signature parameter includes:
  • the target certification parameter is calculated based on the first calculation number, the second signature parameter, the first public parameter, and the second public parameter.
  • sending multiple signature parameters includes:
  • first candidate parameter Generate a first candidate parameter, a second candidate parameter, and a third candidate parameter; sign the first candidate parameter to obtain a first signature parameter, sign the second candidate parameter to obtain a second signature parameter, and perform a signature on the first candidate parameter; Signing the three candidate parameters to obtain the third signature parameter; when receiving the signature parameter application of the core enterprise node device, send the first signature parameter, the second signature parameter, and the third signature parameter; or
  • the first-level supplier node device is further configured to:
  • the first-level supplier node device or the other blockchain entity node device is also used to pay the core enterprise node device to the core enterprise node device when the payable is due
  • the UTXO held is invalidated and signed or returned to the core enterprise node device.
  • system further includes:
  • At least one risk assessment agency node device used to read transaction data stored on the blockchain supply chain platform, use a pre-trained risk assessment model to perform risk assessment on the transaction data, and send the risk assessment result to The other blockchain entity node devices.
  • the second aspect of the present invention provides a dynamic supervision method for block chain supply chain transaction hiding, and the method includes:
  • the supervisory authority node device When the supervisory authority node device receives the signature parameter request of the core enterprise node device, sending the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device;
  • the core enterprise node device uses Pedersen's commitment to encrypt the payables promised by the core enterprise to the primary supplier to obtain confidential transactions;
  • the core enterprise node device uses the Bulletproof range certificate to calculate the proof parameter based on the multiple signature parameters and the generated random number;
  • the core enterprise node device signs the confidential transaction and the certification parameters and uploads the signed transaction data to the blockchain supply chain platform;
  • the first-level supplier node device uses the blockchain supply chain platform to receive the transaction data, decrypt it, and output it to the first-level supplier;
  • the regulatory agency node device obtains the transaction data from the blockchain supply chain platform; obtains the confidential transaction and certification parameters in the transaction data, and determines the payable in the confidential transaction based on the certification parameters In order to achieve the supervision of the said payables.
  • the supervisory authority node device when the supervisory authority node device receives the signature parameter request of the core enterprise node device, it sends the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device include:
  • first candidate parameter Generate a first candidate parameter, a second candidate parameter, and a third candidate parameter; sign the first candidate parameter to obtain a first signature parameter, sign the second candidate parameter to obtain a second signature parameter, and perform a signature on the first candidate parameter; Signing the three candidate parameters to obtain the third signature parameter; when receiving the signature parameter application of the core enterprise node device, send the first signature parameter, the second signature parameter, and the third signature parameter; or
  • the certification parameter is signed and the signature and the corresponding first candidate parameter, the second candidate parameter, and the third candidate parameter are saved; when a signature parameter request from the core enterprise node device is received, the The first candidate parameter is used as the first signature parameter, the second candidate parameter is used as the second signature parameter, and the third candidate parameter is used as the third signature parameter and sent to the core enterprise node device.
  • the method further includes:
  • the UTXO in the transaction data is split into a first UTXO and a second UTXO through the first-level supplier node device, wherein the sum of the amount in the first UTXO and the amount in the second UTXO is equal to the The amount in UTXO;
  • the method further includes:
  • the blockchain supply chain transaction hidden dynamic supervision system and method according to the embodiment of the present invention, by introducing the concepts of Pedersen commitment and Bulletproof scope proof, encrypts the plaintext payables of core enterprises into confidential transactions and puts them on the chain. Only both parties can Decrypt the amount in the transaction data, protect the transaction privacy from being leaked, and protect the business secrets of the blockchain entity. After obtaining the confidential transaction and Bulletproof scope certificate, the supervisory authority will supervise the confidential transaction through the Bulletproof scope certificate.
  • FIG. 1 is a schematic diagram of the architecture of a dynamic supervision system for block chain supply chain transaction hiding according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of the architecture of a dynamic supervision system for block chain supply chain transaction hiding according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart of a method for dynamic supervision of transaction hiding in a blockchain supply chain according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of the structure of a blockchain node device according to an embodiment of the present invention.
  • FIG. 1 it is a schematic diagram of the architecture of a dynamic supervision system for blockchain supply chain transaction hiding according to an embodiment of the present invention.
  • the block chain supply chain transaction hidden dynamic supervision system 1 can include, but is not limited to: block chain supply chain platform 10, core enterprise node equipment 11, first-tier supplier node equipment 12, other block chain entity node equipment 13 and supervision Institutional node equipment 14.
  • the other block chain entity node device 13 may include one or a combination of the following: a secondary supplier node device 13, a bank node device 13, and a factor node device 13.
  • the core enterprises, primary suppliers, secondary suppliers, banks, and factoring companies are all referred to as blockchain entities.
  • the core enterprise node equipment 11, the first-level supplier node equipment 12, the second-level supplier node equipment 13, the bank node equipment 13, and the factoring company node equipment 13 are referred to as blockchain entity node equipment.
  • the blockchain entity Before accessing the blockchain supply chain platform 10, the blockchain entity first applies for a digital certificate from a certificate authority (CA). After the CA determines the identity of the applicant, it assigns a public key to the applicant, and at the same time associates the distributed public key with the applicant's identity information and signs it to form a digital certificate and send it to the applicant. Subsequently, when the blockchain entity is connected to the blockchain supply chain platform 10, the blockchain supply chain platform 10 uses the public key of the CA to verify the signature on the digital certificate of the connected blockchain entity, and when the verification passes , The digital certificate is considered valid and the blockchain entity is allowed to access the blockchain supply chain platform 10. When the verification fails, the digital certificate is considered invalid and the blockchain entity is denied access to the blockchain supply chain Platform 10.
  • the content of the digital certificate includes: information of the electronic visa authority, public key user information, public key, signature, validity period, and so on.
  • the core enterprise node device 11 is used to apply to the regulatory agency node device 14 for multiple signature parameters and generate random numbers; Pedersen promises to encrypt the payables promised by the core enterprise to the first-tier suppliers to obtain confidential transactions Use Bulletproof range proof to calculate proof parameters based on the multiple signature parameters and the random number; sign the confidential transaction and the proof parameters and upload the signed transaction data to the blockchain supply chain platform 10.
  • the core enterprise purchases the products of the first-tier supplier and promises to pay
  • the first-tier supplier can purchase the products of the second-tier supplier based on a part of the said payables
  • the second-tier supplier can further split the payables promised by the first-tier supplier Purchase products from other second-tier suppliers after distribution, and so on.
  • Factors can purchase payables held by primary and secondary suppliers.
  • the bank can provide loans based on the supplier's payables.
  • the core company After the core company purchases the products of the first-tier supplier and promises to pay, the core company encrypts the payables through the core company node device 11 to obtain confidential transactions, ensuring that the core company and the first-tier supplier Privacy of transactions between.
  • the core enterprise may apply for the first signature parameter ⁇ , the second signature parameter s L, and the third signature parameter s R from the node device of the regulatory agency before proceeding with the proof of the transaction data range.
  • the signature parameter refers to a plurality of candidate parameters selected by a regulatory agency node device, and parameters obtained after signing the multiple candidate parameters; or, a plurality of candidate parameters selected by a regulatory agency node device based on multiple candidate parameters
  • the parameter calculates the proof parameter, signs the proof parameter and saves the signature. At this time, the candidate parameter corresponding to the signature is used as the signature parameter.
  • the core enterprise node device 11 may calculate the first calculation number and the second calculation number based on the transaction data, and generate the first random number and the second random number.
  • the core enterprise node device may use a random number generation algorithm to generate random numbers in advance. For example, a first random number r and a second random number ⁇ are generated.
  • the second random number ⁇ is a number within Z p.
  • the Z p is an integer modulo p additive group.
  • the calculation of the first calculation number and the second calculation number based on the transaction data includes:
  • the difference between the first calculation number and the unit array is calculated to obtain the second calculation number.
  • the first calculation number a L is an n-dimensional array composed of binary numbers 0 or 1, and the product of each number in the n-dimensional array and 2 n corresponds to the data at the same position in the transaction data .
  • the second calculated number 1 n is an n-dimensional array composed of binary numbers 1.
  • a L ⁇ 0,1,1,...0,1,0 ⁇
  • a R ⁇ -1,0,0,...-1,0,-1 ⁇ .
  • the core enterprise node device 11 is used to use Pedersen's commitment to encrypt the payables promised by the core enterprise to the primary supplier to obtain confidential transactions.
  • the core enterprise node device can then choose to decrypt the promised value. Once the promise is issued, the core enterprise node device cannot find another value that still has the same promise calculation result.
  • the first system parameter g and the second system parameter h are the basis of discrete logarithms, and are a system parameter that is published worldwide.
  • the core enterprise node device 11 uses Bulletproof range certification to calculate a first certification parameter based on the first random number, the second random number, and the first calculation number.
  • Bulletproof is the most efficient range proof algorithm currently used to prove that the value of a promise is between [0, 2 n -1].
  • the first certification parameter wherein, g and h are all public system parameters, ⁇ is the second random number, a L is the first calculation number, and a R is the second calculation number.
  • system parameters g and h in this embodiment are different from the first system parameter g and the second system parameter h.
  • the core enterprise node device 11 uses the Bulletproof range proof to calculate a second proof parameter based on the first signature parameter, the second signature parameter, and the third signature parameter.
  • the second certification parameter Where ⁇ is the first signature parameter, s L is the second signature parameter, and s R is the third signature parameter.
  • the core enterprise node device 11 calculates a target certification parameter based on the first calculation number and the second signature parameter.
  • the core enterprise node device 11 calculating target certification parameters based on the first calculation number and the second signature parameter includes:
  • the target proof parameter P a L -z ⁇ 1 n +s L ⁇ x is calculated, where z Is the first public parameter, and x is the second public parameter.
  • the core enterprise node device sends the first certification parameter to the supervisory authority node device
  • the second proof parameter The node device of the regulatory agency dynamically selects a random number z as the first public number and publicly responds to the node device of the core enterprise, where the random number
  • the core enterprise node device 11 generates a fifth random number ⁇ 1 and a sixth random number ⁇ 2 , and the fifth random number ⁇ 1 and the sixth random number ⁇ 2 are both numbers within Z p .
  • the core enterprise node device 11 may use the Pedersen commitment to calculate the first commitment based on the fifth random number, the first system parameter g, and the second system parameter h Use the Pedersen promise to calculate the second promise based on the sixth random number, the first system parameter g, and the second system parameter h
  • the core enterprise node device 11 sends the first promise and the second promise to the supervisory authority node device 14.
  • the regulatory agency node device 14 dynamically selects a random number x as the second public number and publicly responds to the core enterprise node device, where the random number
  • the core enterprise node device 11 sends the confidential transaction, the first certification parameter, the second certification parameter, and the target certification parameter to the regulatory agency node device 14, so that the regulatory agency node device 14 is based on the The target proof parameter, the first public parameter, and the second public parameter determine the payable in the confidential transaction, so as to realize the supervision of the payable.
  • the primary supplier node device 12 is configured to use the blockchain supply chain platform 10 to receive the transaction data, decrypt it, and output it to the primary supplier.
  • the first-level supplier as the recipient of the payable by the core enterprise, receives the verification parameters sent by the core enterprise node device 11 through the first-level supplier node device 12.
  • the core enterprise can inform the primary supplier of the payment and the first random number r through key agreement and other methods.
  • the first-level supplier node device 12 is also used to split the UTXO in the transaction data into a first UTXO and a second UTXO, based on the first UTXO and the second UTXO.
  • UTXO conducts transactions with other blockchain entity node devices.
  • the primary supplier node device 12 sends the transaction data to the blockchain supply chain platform 10 for storage.
  • the sum of the amount in the first UTXO and the amount in the second UTXO is equal to the amount in the UTXO.
  • the primary supplier can split the UTXO in the transaction data and trade it to secondary suppliers, factoring companies, or mortgage loans through banks.
  • the secondary supplier, factor or bank can further split and trade the UTXO after receiving the split.
  • the first-tier supplier node device 12 is also used to perform range certification on the first UTXO and the second UTXO based on Bulletproof.
  • the amount is a legal value, that is, the amount in UTXO is a positive number within a certain range.
  • the splitting of UTXO into two sub-UTXOs is taken as an example.
  • the first-tier supplier node device can also split UTXO into 3 or more parts for more flexibility. Deal with secondary suppliers.
  • the first-level supplier node device when the first-level supplier node device splits the UTXO into multiple sub-UTXOs, it can also initiate a supervisable confidential transaction based on the sub-UTXO, and initiate a supervisable confidential transaction with the core enterprise node device Similarly, the first-tier supplier node device also needs to first apply for the first signature parameter, the second signature parameter, and the third signature parameter from the regulatory agency node device, and then initiate a supervisable secret transaction according to the method of the core enterprise node device to initiate a supervisable secret transaction. Confidential transactions.
  • supplier node devices including primary, secondary, tertiary or even lower-level supplier node devices
  • the first-level supplier node device 12 or the other blockchain entity node device 13 is also used to pay the core enterprise node device when the payable is due The payable, in response to the successful redemption of the payable, invalidate the UTXO held or return it to the core enterprise node device.
  • the due time stamp of the payment is marked in the UTXO.
  • the core enterprise When the core enterprise receives the information of redemption of the payable through the core enterprise node device 11, it confirms whether the payable is due. After confirming that the due payment is due, the debt is redeemed. After receiving the debt, the blockchain entity signs, indicating that the debt has been received. When or after receiving the debt, the blockchain entity holding the UTXO invalidates the UTXO signature or returns it to the core enterprise to form a complete transaction data record on the blockchain supply chain platform 10.
  • the regulatory agency node device 14 is configured to send multiple signature parameters when receiving a signature parameter application from the core enterprise node device.
  • sending multiple signature parameters includes:
  • first candidate parameter Generate a first candidate parameter, a second candidate parameter, and a third candidate parameter; sign the first candidate parameter to obtain a first signature parameter, sign the second candidate parameter to obtain a second signature parameter, and perform a signature on the first candidate parameter;
  • the three candidate parameters are signed to obtain the third signature parameter; upon receiving the signature parameter application of the core enterprise node device, the first signature parameter, the second signature parameter, and the third signature parameter are sent.
  • the regulatory agency node device respectively signs the first candidate parameter, the second candidate parameter, and the third candidate parameter, and sends the first candidate parameter, the second candidate parameter, and the third candidate parameter and their respective Sign to the core enterprise node device.
  • sending multiple signature parameters includes:
  • the regulatory agency node device sets the second certification parameter
  • the signature of and multiple signature parameters are sent to the core enterprise node device, and the core enterprise node device verifies the signature of the second certification parameter to determine the authenticity of the three signature parameters. Since only the second proof parameter needs to be signed, there is no need to sign the first candidate parameter, the second candidate parameter, and the third candidate parameter, which reduces the number of signatures; and sends multiple unsigned candidate parameters as multiple signature parameters For core enterprise node devices, the amount of information transmission is reduced, and the efficiency of sending signature parameters is improved.
  • first signature parameter p the second signature parameter s L, and the third signature parameter s R are all numbers within the range of Z p.
  • These signature parameters are all dynamically generated one-time random numbers.
  • the supervisory authority node device 14 uses Bulletproof range proof to calculate proof parameters based on the first signature parameter, the second signature parameter, and the third signature parameter.
  • the supervisory authority node device 14 uses a private key to sign the certification parameter and saves the signature and the corresponding first signature parameter, the second signature parameter, and the third signature parameter.
  • the regulatory agency node device 14 uses digital signature technology to sign the certification parameters.
  • Digital signature technology is based on asymmetric encryption algorithm and message digest algorithm to achieve the authentication of the source and integrity of the message, and at the same time, it is a guarantee that the signer cannot deny.
  • There are two roles in a digital signature system one is the signer of the message and the other is the authenticator of the message.
  • the signer of the message can sign the information digest of a message according to his private key, and the authenticator of the message verifies the information digest of a message according to his public key. If the verification is passed, it can be proved that the source of the message is the signer of the message, the information digest of the message is the same and the signer cannot deny it.
  • the supervisory authority node device 14 is further configured to send the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device when a signature parameter request from the core enterprise node device is received. Signature parameters.
  • the transaction data sender Before the transaction data sender performs the transaction data range certification, it applies to the regulatory agency node device for signature parameters through the core enterprise node device, and the regulatory agency node device sends the signed certification parameters to the first signature parameter, the second signature parameter, and The third signature parameter is sent to the supervisory authority node device.
  • the supervisory authority node device 14 is further configured to reply to the first certification parameter and the second certification parameter sent by the core enterprise node device.
  • One public parameter One public parameter.
  • the core enterprise node device sends the first certification parameter to the supervisory authority node device And the second proof parameter
  • the node device of the regulatory agency dynamically selects a random number z as the first public number and publicly responds to the node device of the core enterprise, where the random number
  • the regulatory agency node device 14 is further configured to reply to the second public parameter when the first commitment parameter and the second commitment parameter sent by the core enterprise node device are received.
  • the core enterprise node device sends the first promise and the second promise to the supervisory authority node device.
  • the regulatory agency node device dynamically selects a random number x as the second public number and publicly responds to the core enterprise node device, where the random number
  • the random number y is a one-time random number dynamically and randomly generated when the regulatory agency node device 14 receives the first certification parameter and the second certification parameter sent by the core enterprise node device
  • the random number x is the A one-time random number dynamically and randomly generated when the regulatory agency node device 14 receives the first commitment parameter and the second commitment parameter.
  • the regulatory agency node device 14 is also used to obtain the transaction data from the blockchain supply chain platform; obtain confidential transactions and certification parameters in the transaction data, and determine the confidentiality based on the certification parameters Payables in the transaction to achieve the supervision of said payables.
  • the supervisory authority node device 14 determining the payable in the confidential transaction based on the certification parameter to implement the supervision of the payable includes:
  • the target random number is an n-dimensional array composed of 0 or 1, and the product of each number in the n-dimensional array and 2n corresponds to the data at the same position in the payable.
  • the supervisory authority node device can calculate the transaction data v in the certificate according to the signature in the certificate and the parameter P in the certificate. Since a L is the binary form of transaction data v, P, x, and z are all public values, so the regulator node device can calculate the value of a L according to the value of the random number s L possessed, and then calculate the payable v .
  • multiple signature parameters are selected by the regulatory agency node device and the certification parameters are calculated. After signing the calculated certification parameters, the signed multiple signature parameters can be sent to the core enterprise node device, so that the core enterprise node The device calculates the certification parameters based on multiple signature parameters. Since the supervisory authority node equipment and the core enterprise node equipment use the same multiple signature parameters to calculate the same proof parameters, when the confidential transaction is reversed on the blockchain network, the supervisory authority node equipment can supervise the core enterprise node equipment Proof parameters, thus realizing the supervision of confidential transactions.
  • the blockchain supply chain platform 10 is used to store the transaction data; verify the correctness of the transaction data and the legitimacy of the signature of the regulatory agency node device.
  • the blockchain supply chain platform 10 the core enterprise node equipment 11, the first-tier supplier node equipment 12, and the regulatory agency node equipment 14 in the blockchain supply chain transaction hidden dynamic supervision system 1 must If it exists, the other blockchain entity node device 13 optionally exists. That is, the secondary supplier node equipment, bank node equipment, and factor node equipment may optionally exist in the blockchain supply chain transaction hidden dynamic supervision system 1.
  • FIG. 2 it is a schematic diagram of another architecture of the blockchain supply chain transaction hiding dynamic supervision system according to an embodiment of the present invention.
  • the blockchain supply chain transaction hidden dynamic supervision system 1 includes the blockchain supply chain platform 10, core enterprise node equipment 11, first-tier supplier node equipment 12, and other blockchain entity node equipment 13, which are described in Figure 1.
  • the regulatory agency node device 14 may also include at least one risk assessment agency node device 15.
  • the at least one risk assessment agency node device 15 is used to read transaction data stored on the blockchain supply chain platform 10, use a pre-trained risk assessment model to perform risk assessment on the transaction data, and The risk assessment result is sent to the other blockchain entity node device 13.
  • At least one risk assessment agency node device 15 can obtain the historical transaction data recorded on the blockchain supply chain platform 10 in advance, and train a risk assessment model based on the historical transaction data to evaluate the value of the payment in each transaction data.
  • At least one risk assessment agency node device 15 When at least one risk assessment agency node device 15 reads the newly recorded transaction data on the blockchain supply chain platform 10, it uses a risk assessment model to evaluate the value of the payable in the newly recorded transaction data, and evaluate the risk The result is sent to potential purchasers of UTXO (that is, the payable of the core enterprise) corresponding to the transaction data.
  • the potential purchasers may include, but are not limited to, secondary suppliers, factoring companies, banks, etc.
  • the blockchain supply chain platform 10 may be a blockchain system based on any UTXO model and a blockchain system supporting the UTXO account model.
  • the blockchain supply chain system 1 may further include: a data decryption module, a UTXO amount range certification module, a blockchain wallet, a lightweight wallet, a statistical analysis tool, an entity list, etc.
  • one-time signature parameters dynamically selected by the regulatory agency and proof parameters based on random number calculations need to be obtained and signed in advance, and the blockchain entity generates Bulletproof based on the one-time signature parameters. Prove that it has the characteristics of forward security.
  • the blockchain supply chain platform also verifies the legitimacy of the signature of the regulatory agency. Since the signature parameter is a one-time number dynamically generated by the regulatory agency, when the regulatory agency's key is leaked, it will not cause a wide range of transaction data to be leaked.
  • the blockchain supply chain privacy transaction dynamic supervision system described in this embodiment introduces the concepts of Pedersen commitment and Bulletproof scope proof, encrypts the plaintext payables of core enterprises into confidential transactions and uploads them to the chain. Only both parties to the transaction can decrypt the transaction data The amount in the transaction privacy is protected from being leaked, and the business secrets of the blockchain entity are protected. After obtaining the confidential transaction and Bulletproof scope certificate, the supervisory authority will supervise the confidential transaction through the Bulletproof scope certificate.
  • FIG. 3 is a schematic flowchart of a method for dynamic supervision of transaction hiding in a blockchain supply chain disclosed in an embodiment of the present invention.
  • the block chain supply chain transaction concealment dynamic supervision method is applied to a block chain supply chain network.
  • the block chain supply chain transaction concealment dynamic supervision method specifically includes the following steps. According to different needs, the steps in the flowchart The order can be changed, and some steps can be omitted.
  • S31 When the supervisory authority node device receives the signature parameter request of the core enterprise node device, it sends the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device.
  • the supervisory authority node device when the supervisory authority node device receives the signature parameter request of the core enterprise node device, it sends the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device.
  • the supervisory authority node device when the supervisory authority node device receives the signature parameter request of the core enterprise node device, it sends the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device.
  • first candidate parameter Generate a first candidate parameter, a second candidate parameter, and a third candidate parameter; sign the first candidate parameter to obtain a first signature parameter, sign the second candidate parameter to obtain a second signature parameter, and perform a signature on the first candidate parameter;
  • the three candidate parameters are signed to obtain the third signature parameter; upon receiving the signature parameter application of the core enterprise node device, the first signature parameter, the second signature parameter, and the third signature parameter are sent.
  • the first candidate parameter, the second candidate parameter, and the third candidate parameter are generated; the Bulletproof range proof is based on the first candidate parameter, the second candidate parameter, and the third candidate parameter Calculate the certification parameters; use the private key to sign the certification parameters and save the signature and the corresponding first candidate parameter, the second candidate parameter, and the third candidate parameter; when the core enterprise node device is received When requesting signature parameters, send the first candidate parameter as the first signature parameter, the second candidate parameter as the second signature parameter, and the third candidate parameter as the third signature parameter.
  • Core enterprise node equipment When requesting signature parameters, send the first candidate parameter as the first signature parameter, the second candidate parameter as the second signature parameter, and the third candidate parameter as the third signature parameter.
  • the core enterprise node device uses Pedersen's commitment to encrypt the payables promised by the core enterprise to the first-tier supplier to obtain confidential transactions.
  • the core enterprise node device uses Bulletproof range proof to calculate proof parameters based on the multiple signature parameters and the generated random numbers.
  • the core enterprise node device signs the confidential transaction and the certification parameters and uploads the signed transaction data to the blockchain supply chain platform.
  • the first-level supplier node device uses the blockchain supply chain platform to receive the transaction data, decrypt it, and output it to the first-level supplier.
  • the regulatory agency node device obtains the transaction data from the blockchain supply chain platform; obtains the confidential transaction and certification parameters in the transaction data, and determines the confidential transaction in the confidential transaction based on the certification parameters. Payables to achieve the supervision of said payables.
  • the method further includes:
  • the UTXO in the transaction data is split into a first UTXO and a second UTXO through the first-level supplier node device, wherein the sum of the amount in the first UTXO and the amount in the second UTXO is equal to the The amount in UTXO;
  • the method further includes:
  • the blockchain supply chain privacy transaction dynamic supervision method described in this embodiment introduces the concepts of Pedersen commitment and Bulletproof scope proof, encrypts the plaintext payables of core companies into confidential transactions and uploads them to the chain. Only both parties to the transaction can decrypt the transaction data The amount in the transaction privacy is protected from being leaked, and the business secrets of the blockchain entity are protected. After obtaining the confidential transaction and Bulletproof scope certificate, the supervisory authority will supervise the confidential transaction through the Bulletproof scope certificate.
  • FIG. 4 is a schematic diagram of the internal structure of a blockchain node device disclosed in an embodiment of the present invention.
  • the blockchain node device 4 may include a memory 41, a processor 42, a bus 43, and a transceiver 44.
  • the blockchain node device 4 may be a core enterprise node device, a regulatory agency node device, or a first-tier supplier node device, other blockchain entities (for example, a second-tier supplier, bank, factor) Node equipment, etc.
  • the blockchain node device 4 is a core enterprise node device, the function of the core enterprise node device described in Embodiment 1 or Embodiment 2 is performed;
  • the blockchain node device 4 is a regulatory agency node device , Execute the function of the regulatory agency node device described in the first embodiment or the second embodiment;
  • the blockchain node device 4 is the first-tier supplier node device, execute the function described in the first embodiment or the second embodiment
  • the function of the first-level supplier node device; when the blockchain node device 4 is another blockchain entity node device, the function of the other blockchain entity node device described in the first embodiment or the second embodiment is performed.
  • the memory 41 includes at least one type of readable storage medium, and the readable storage medium includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, and the like.
  • the memory 41 may be an internal storage unit of the blockchain node device 4 in some embodiments, for example, the hard disk of the blockchain node device 4.
  • the memory 41 may also be an external storage device of the blockchain node device 4, for example, a plug-in hard disk equipped on the blockchain node device 4, a smart memory card (Smart Media Card, SMC). ), Secure Digital (SD) card, Flash Card, etc.
  • the memory 41 may also include not only the internal storage unit of the blockchain node device 4, but also an external storage device.
  • the memory 41 can be used not only to store application programs and various data installed in the blockchain node device 4, but also to temporarily store data that has been output or will be output.
  • the processor 42 may be a central processing unit (CPU), controller, microcontroller, or microprocessor in some embodiments, and is used to run program codes or process data stored in the memory 41.
  • CPU central processing unit
  • controller microcontroller
  • microprocessor in some embodiments, and is used to run program codes or process data stored in the memory 41.
  • the bus 43 may be a peripheral component interconnect standard (PCI) bus or an extended industry standard architecture (EISA) bus, etc.
  • PCI peripheral component interconnect standard
  • EISA extended industry standard architecture
  • the bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 4 to represent it, but it does not mean that there is only one bus or one type of bus.
  • the blockchain node device 4 may also include a network interface, and the network interface may optionally include a wired interface and/or a wireless interface (such as a WI-FI interface, a Bluetooth interface, etc.), which is usually used in the block
  • the link node device 4 establishes a communication connection with other dispatch servers.
  • the blockchain node device 4 may also include a user interface.
  • the user interface may include a display (Display) and an input unit, such as a keyboard (Keyboard).
  • the user interface may also include a standard wired interface, wireless interface.
  • the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an organic light-emitting diode (OLED) touch device, and the like.
  • the display may also be called a display screen or a display unit, which is used to display the messages processed in the dispatch server and to display a visualized user interface.
  • FIG. 4 only shows the blockchain node device 4 with components 41-44.
  • the structure shown in FIG. 4 does not constitute a limitation on the blockchain node device 4. It may be a bus-type structure or a star-shaped structure.
  • the blockchain node device 4 may also include fewer or more components than shown in the figure, or a combination of certain components, or a different component arrangement.
  • Other existing or future electronic products that can be adapted to the present invention should also be included in the protection scope of the present invention, and are included here by reference.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website site, computer, server or data center via wired (for example, coaxial cable, optical fiber, digital subscriber line) or wireless (for example, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or application program functional unit.
  • the integrated unit is implemented in the form of an application function unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • a computer readable storage medium includes several instructions to make a dispatch server (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, hard disk, Read-Only Memory (Read-Only Memory, ROM), magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Un système et un procédé de supervision dynamique cachée de transaction par chaîne d'approvisionnement de chaîne de blocs sont divulgués. Le système comprend : un dispositif de nœud d'institution de supervision qui est utilisé pour transmettre une pluralité de paramètres de signature lorsqu'une application de paramètres de signature d'un dispositif de nœud d'entreprise central est reçue; le dispositif de nœud d'entreprise central, qui est utilisé pour chiffrer un montant à l'aide d'un engagement de Pedeersen pour obtenir une transaction confidentielle, calculer un paramètre de preuve à l'aide d'une preuve de plage pare-balles et sur la base de la pluralité de paramètres de signature et d'un nombre aléatoire, et signer la transaction confidentielle et le paramètre de preuve et procéder au chaînage associé; un dispositif de nœud fournisseur de premier niveau, qui est utilisée pour recevoir des données de transaction et les décrypter, le dispositif de nœud d'institution de supervision étant également utilisé pour acquérir la transaction confidentielle et le paramètre de preuve et déterminer le montant sur la base du paramètre de preuve de façon à réaliser la supervision du montant; et une plateforme de chaîne d'approvisionnement de chaîne de blocs, qui est utilisée pour stocker les données de transaction et vérifier l'exactitude des données de transaction et de la signature. Au moyen du procédé, un montant dans une chaîne d'approvisionnement de chaîne de blocs peut être chiffré et chaîné pour éviter une fuite de confidentialité, et le montant est supervisé.
PCT/CN2020/077624 2019-12-31 2020-03-03 Système et procédé de supervision dynamique cachée de transaction par chaîne d'approvisionnement de chaîne de blocs WO2021134897A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911416606.2 2019-12-31
CN201911416606.2A CN111079190A (zh) 2019-12-31 2019-12-31 区块链供应链交易隐藏动态监管系统及方法

Publications (1)

Publication Number Publication Date
WO2021134897A1 true WO2021134897A1 (fr) 2021-07-08

Family

ID=70320948

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/077624 WO2021134897A1 (fr) 2019-12-31 2020-03-03 Système et procédé de supervision dynamique cachée de transaction par chaîne d'approvisionnement de chaîne de blocs

Country Status (2)

Country Link
CN (1) CN111079190A (fr)
WO (1) WO2021134897A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112990928B (zh) * 2021-05-10 2021-08-24 南开大学 一种数字货币交易数据的安全保护方法
CN113657914A (zh) * 2021-08-26 2021-11-16 卓尔智联(武汉)研究院有限公司 基于区块链的商品溯源方法、计算机装置及存储介质
CN116389164B (zh) * 2023-05-26 2023-09-12 建信金融科技有限责任公司 数据的检测方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418689A (zh) * 2017-11-30 2018-08-17 矩阵元技术(深圳)有限公司 一种适合区块链隐私保护的零知识证明方法和介质
CN109377215A (zh) * 2018-08-06 2019-02-22 阿里巴巴集团控股有限公司 区块链交易方法及装置、电子设备
CN109584055A (zh) * 2018-09-20 2019-04-05 阿里巴巴集团控股有限公司 基于区块链的交易方法、装置和汇出方设备
CN110383311A (zh) * 2018-11-07 2019-10-25 阿里巴巴集团控股有限公司 监管区块链机密交易
CN110505046A (zh) * 2019-07-29 2019-11-26 深圳壹账通智能科技有限公司 多数据提供方加密数据跨平台零知识校验方法、装置及介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418689A (zh) * 2017-11-30 2018-08-17 矩阵元技术(深圳)有限公司 一种适合区块链隐私保护的零知识证明方法和介质
CN109377215A (zh) * 2018-08-06 2019-02-22 阿里巴巴集团控股有限公司 区块链交易方法及装置、电子设备
CN109584055A (zh) * 2018-09-20 2019-04-05 阿里巴巴集团控股有限公司 基于区块链的交易方法、装置和汇出方设备
CN110383311A (zh) * 2018-11-07 2019-10-25 阿里巴巴集团控股有限公司 监管区块链机密交易
CN110505046A (zh) * 2019-07-29 2019-11-26 深圳壹账通智能科技有限公司 多数据提供方加密数据跨平台零知识校验方法、装置及介质

Also Published As

Publication number Publication date
CN111079190A (zh) 2020-04-28

Similar Documents

Publication Publication Date Title
US10673632B2 (en) Method for managing a trusted identity
US10547446B2 (en) Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items
TWI725124B (zh) 決定用於資訊的安全交換的共同私密,及階層化的決定性加密金鑰
US11095449B2 (en) System and method for securely processing an electronic identity
US11625490B2 (en) Method and apparatus for obtaining input of secure multiparty computation protocol
TWI709314B (zh) 資料處理方法和裝置
WO2021134900A1 (fr) Système et procédé de supervision statique cachée de transaction de chaîne d'approvisionnement de blockchain
US11251937B2 (en) Distributed security mechanism for blockchains and distributed ledgers
US20150193744A1 (en) Methods and systems for creating and using massless currency
CN111160908B (zh) 基于区块链的供应链交易隐私保护系统、方法及相关设备
WO2021134897A1 (fr) Système et procédé de supervision dynamique cachée de transaction par chaîne d'approvisionnement de chaîne de blocs
CN111105235B (zh) 基于区块链的供应链交易隐私保护系统、方法及相关设备
TWI622949B (zh) 具多重密鑰的kyc資料標記之爭議救濟系統及其方法
US8220040B2 (en) Verifying that group membership requirements are met by users
WO2021114495A1 (fr) Système et procédé de protection de confidentialité d'une transaction de chaîne d'approvisionnement de blocs, et dispositif associé
CN112435026A (zh) 用零知识证明保护文件交易信息的方法、装置和电子设备
Cebeci et al. Secure e-commerce scheme
TWI734729B (zh) 實現電子簽章的方法、裝置及簽章伺服器
CN114514550A (zh) 将请求分区成区块链的交易
CN113342802A (zh) 区块链数据存储的方法和装置
US20220092587A1 (en) Verification systems for blockchains and distributed ledgers
CN112950356B (zh) 基于数字身份的个人贷款处理方法及系统、设备、介质
CN115310978A (zh) 一种数字资产的交易方法及装置
CN111429119B (zh) 区块链技术用于数字货币的加密、支付、查询和提交方法
US20230124498A1 (en) Systems And Methods For Whitebox Device Binding

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20910638

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20910638

Country of ref document: EP

Kind code of ref document: A1