WO2022089237A1 - 基于区块链的数值验证方法、装置、计算机设备和介质 - Google Patents

基于区块链的数值验证方法、装置、计算机设备和介质 Download PDF

Info

Publication number
WO2022089237A1
WO2022089237A1 PCT/CN2021/124386 CN2021124386W WO2022089237A1 WO 2022089237 A1 WO2022089237 A1 WO 2022089237A1 CN 2021124386 W CN2021124386 W CN 2021124386W WO 2022089237 A1 WO2022089237 A1 WO 2022089237A1
Authority
WO
WIPO (PCT)
Prior art keywords
value
user terminal
verification
result
numerical
Prior art date
Application number
PCT/CN2021/124386
Other languages
English (en)
French (fr)
Inventor
吴玟静
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2022089237A1 publication Critical patent/WO2022089237A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Definitions

  • the present application relates to the field of blockchain, in particular to a method, device, computer equipment and storage medium for numerical verification based on blockchain.
  • Blockchain technology also known as distributed ledger technology, is an emerging technology in which several computing devices jointly participate in "bookkeeping" and jointly maintain a complete distributed database.
  • the blockchain encryption node when uploading data to each blockchain, the blockchain encryption node will encrypt the data first, then upload the ciphertext data to the chain and synchronize the ciphertext ledger to other blockchains. node to ensure the timeliness of data on the chain.
  • the user terminal when the user terminal needs to obtain the access authority or purchase authority to a certain product, it needs to pass the verification conditions set by the server corresponding to the product, so that the user terminal needs to upload the information required by the server, and among these information. It may include private information, such as the value of a certain feature of the user terminal, such as the amount in the account; then the server will verify the qualification of the user terminal according to the uploaded information to see if it meets the verification conditions.
  • This verification method requires the user terminal to search for the amount in the account and upload it comprehensively, but the inventor realizes that a user terminal may have multiple accounts, and the expression of the amount in different accounts is also different. You can modify the amount at will, and you can also conceal some important information. This cannot guarantee the authenticity and accuracy of the numerical verification, and directly upload the private data such as the amount to a server to directly obtain the unencrypted data information and give it to the user. posed a great threat to information security.
  • the present application provides a blockchain-based numerical verification method, device, computer equipment and storage medium to solve the technical problem that numerical authenticity and security cannot be guaranteed in numerical verification in the prior art .
  • a blockchain-based numerical verification method is applied to a consortium chain network system constructed based on a blockchain, wherein the consortium chain network system includes a plurality of blockchain nodes that perform operations according to an agreed consensus mechanism, and the Methods include:
  • the result value is verified according to the verification condition, and the numerical verification result is obtained.
  • a block chain-based numerical verification device is applied to a consortium chain network system constructed based on block chain, wherein the consortium chain network system includes a plurality of block chain nodes that perform operations according to an agreed consensus mechanism, and the The device includes:
  • a request module configured to receive a numerical verification request sent by a user terminal, wherein the numerical verification request is used to generate a preset processing condition
  • an authorization module configured to obtain authorization information of the user terminal according to the numerical verification request
  • an acquisition module configured to acquire encrypted values from the blockchain nodes authorized by the user terminal according to the authorization information
  • a calculation module configured to calculate the encrypted value through zero-knowledge proof, and obtain a result value, wherein the encrypted value is the data calculated according to the preset processing condition
  • the verification module is used for comparing the result value and the verification condition in the ciphertext state to obtain the numerical verification result.
  • a computer device comprising a memory and a processor, and computer-readable instructions stored in the memory and executable on the processor, the processor further implementing the following steps when executing the computer-readable instructions:
  • the encrypted value is obtained from the blockchain node authorized by the user terminal, wherein the encrypted value is the data calculated according to the preset processing condition;
  • the result value is verified according to the verification condition, and the numerical verification result is obtained.
  • a computer-readable storage medium where computer-readable instructions are stored in the computer-readable storage medium, and when the computer-readable instructions are executed by a processor, the processor further performs the following steps:
  • the encrypted value is obtained from the blockchain node authorized by the user terminal, wherein the encrypted value is the data calculated according to the preset processing condition;
  • the result value is verified according to the verification condition, and the numerical verification result is obtained.
  • the above blockchain-based numerical verification method, device, computer equipment and storage medium obtain different encrypted values on the authorized blockchain node according to the authorization information after receiving the numerical verification request sent by the user terminal, and then Calculate the encrypted value through zero-knowledge proof, get the result value, and then compare it with the verification conditions in the ciphertext state to obtain the final numerical verification result.
  • the numerical verification method performed in the ciphertext state avoids the risks of numerical fraud and numerical leakage, and solves the technical problem that numerical authenticity and security cannot be guaranteed in numerical verification in the prior art.
  • Figure 1 is a schematic diagram of the application environment of the blockchain-based numerical verification method
  • Figure 2 is a schematic flowchart of a blockchain-based numerical verification method
  • Figure 3 is a schematic diagram of a block chain-based numerical verification device
  • Figure 4 is a schematic diagram of a computer device in one embodiment.
  • the blockchain-based numerical verification method provided by the embodiment of the present application can be applied to the application environment shown in FIG. 1 .
  • the application environment may include a terminal 102, a network, and a server 104.
  • the network is used to provide a communication link medium between the terminal 102 and the server 104.
  • the network may include various connection types, such as wired, wireless communication links or fiber optic cables, etc.
  • the user can use the terminal 102 to interact with the server 104 through the network to receive or send messages and the like.
  • Various communication client applications may be installed on the terminal 102, such as web browser applications, shopping applications, search applications, instant communication tools, email clients, social platform software, and the like.
  • the terminal 102 can be various electronic devices that have a display screen and support web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, moving picture experts compress standard audio Layer 3), MP4 (Moving Picture Experts Group Audio Layer IV, Moving Picture Experts Compression Standard Audio Layer 4) Players, Laptops and Desktops, etc.
  • MP3 players Moving Picture Experts Group Audio Layer III, moving picture experts compress standard audio Layer 3
  • MP4 Moving Picture Experts Group Audio Layer IV, Moving Picture Experts Compression Standard Audio Layer 4
  • Players Laptops and Desktops, etc.
  • the server 104 may be a server that provides various services, for example, a background server that provides support for pages displayed on the terminal 102 .
  • the blockchain-based numerical verification method provided by the embodiments of this application is generally performed by the server/terminal, and accordingly, the blockchain-based numerical verification device is generally set in the server/terminal device.
  • terminals, networks and servers in FIG. 1 are only illustrative. There can be any number of terminal devices, networks and servers according to implementation needs.
  • the terminal 102 communicates with the server 104 through the network.
  • the server 104 receives the value verification request initiated by the terminal 102 through a certain blockchain node, and authorizes the server to obtain the authorized encrypted value from the specified blockchain node; the server 104 then calculates the encrypted value based on the zero-knowledge proof, The result value is obtained, and finally, the result value is compared with the verification condition in the ciphertext state, and the numerical verification result is obtained.
  • the terminal 102 and the server 104 are connected through a network
  • the network may be a wired network or a wireless network
  • the terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices
  • the server 104 can be implemented by an independent server or a server cluster composed of multiple servers.
  • a method for numerical verification based on blockchain is provided, and the method is applied to the server in FIG. 1 as an example to illustrate, including the following steps:
  • Step 202 Receive a value verification request sent by a user terminal, wherein the value verification request is used to generate a preset processing condition.
  • This embodiment can be applied to a consortium chain network system constructed based on a block chain, wherein the consortium chain network system includes a plurality of block chain nodes that perform operations according to an agreed consensus mechanism.
  • the alliance chain network system is built as: using blockchain technology, a "numerical verification system" is established by multi-party business nodes, such as the alliance chain of the "qualified qualification verification chain” used for user asset verification, and each blockchain node is connected to the blockchain.
  • the asset information associated with the user is encrypted and uploaded to the chain, and the consortium chain network system is constructed.
  • the alliance chain network system such as the name of the blockchain network, the deployment method of the blockchain network, the number of blockchain nodes, the type of blockchain nodes, and the consensus layer of the blockchain network.
  • Configuration, blockchain node configuration, blockchain encryption algorithm, etc. to verify the legality of the aggregated information, such as whether the character length exceeds the maximum length, etc.
  • deploy the blockchain management platform, blockchain consensus layer, and blockchain nodes This step can be completed by operating in the blockchain management platform, deploying the application services on the blockchain nodes, and finally executing the verification case to use Verify that the status of the blockchain network and node services is normal.
  • each blockchain node such as banks, securities companies, fund companies, asset management companies, trust companies, insurance companies, futures companies, and blockchain nodes deployed by regulatory agencies
  • the bottom layer is based on
  • the agreed consensus mechanism algorithm automatically executes the pre-agreed conditions: each financial institution is included in the type of financial asset (the data included in the financial asset is different for each financial institution according to the type of business, and the specific definition of the financial asset is based on the concept), on-chain data
  • business process-related mechanisms such as real-time synchronization of data in the business systems of various financial institutions, as well as consensus mechanisms such as the underlying operation of the blockchain (such as the addition of alliance members, management mechanisms, rules of procedure, etc.) to jointly maintain the ledger data
  • each blockchain node The upper layer is connected with their respective business systems to realize data import.
  • each financial institution provides the name, ID number, or mobile phone number of all investors in its institution, and data on the balance of financial assets in the institution.
  • All uploaded business data carry the electronic signature of each uploader to ensure the authenticity and reliability of the data source. Since the business data involves investor privacy and business secrets, when uploading the data, the blockchain encryption node will encrypt the data first, then upload the ciphertext data to the chain and synchronize the ciphertext ledger to other blockchain nodes.
  • the ledger will be synchronized with the business system data of various financial institutions in real time to ensure the timeliness of the data on the chain.
  • the zero-knowledge proof technology is used to verify the value of a certain type of user.
  • the information is calculated to prove that a certain type of value of the user meets the verification conditions of an auditing blockchain node under the circumstance of worry-free privacy.
  • this embodiment can be applied not only in the financial field, but also in other Internet fields.
  • various social networks can jointly establish a consortium chain network system, each social network participant corresponds to at least one blockchain node, and the user Its identity information, number of fans, dynamic number, dynamic type and other information are encrypted and uploaded to the corresponding blockchain node, and the blockchain node regularly updates some dynamic data and keeps it synchronized to ensure the timeliness of the data.
  • WeChat, Weibo, Oasis, QQ, Facebook, Twitter, Line and other social software participants build a blockchain-based social alliance chain network system.
  • the node obtains its own encrypted value on some blockchain nodes through the alliance chain network system, such as the number of events released in the previous year, the number of certain types of events, etc. encrypted data, so that the audited blockchain Nodes are qualified for verification. It can not only protect privacy and security, but also facilitate user operation.
  • this embodiment can also be applied in the field of smart government affairs.
  • a consortium chain network system is established through various institutions, such as through credit reporting, traffic, police and other institutions.
  • the verification conditions of a certain blockchain node are met, the user can actively initiate a verification request, such as verifying whether the user's working years and family situation meet the verification conditions, and then the user actively requests to obtain a product under the blockchain node, such as Anju housing, government subsidies, etc.
  • the numerical verification request is used to generate preset processing conditions, specifically: when the numerical verification request is to obtain the user's financial data, generate and sort out various asset information on each blockchain node authorized by the user, For example: regular and current asset data on banks, for example: when obtaining encrypted values, the alliance chain network system obtains the investor's "name” + "identity identifier" from the authorized information according to the business node to extract the investor himself through various financial institutions. The encrypted value of the asset amount corresponding to the name and identity on the chain of the institution; when the value verification request is the dynamic quantity of "positive energy” published on the platform corresponding to each blockchain node authorized by the user, it will be generated. Calculation scheme for calculating the number of "positive energy" dynamics.
  • Step 204 obtaining authorization information of the user terminal according to the numerical verification request.
  • the numerical verification in this embodiment can be illustrated by whether a user is qualified to purchase a certain product, and whether a certain product can be purchased is determined by verifying the amount of user assets.
  • the authorization information is the information generated by the blockchain node corresponding to the user terminal that the user authorizes the blockchain node for auditing to obtain the encrypted values on which blockchain nodes, including the blockchain node 1a to the blockchain.
  • the authorized content of the node 2a which data can be viewed, the number of authorized viewing times, the time limit, or some other usage rights.
  • an investor initiates a product application to Trust Company A on the investor's client side, and authorizes Trust Company A to verify "whether the financial assets under his or his family's name are ' ⁇ 5 million yuan'", and then Trust Company A can After receiving the user's application, obtain the corresponding authorization information from the blockchain node corresponding to the investor client. After receiving the authorization of the investor, Trust Company A will trigger the operation of "Qualified Investor Qualification Verification" on the Alliance Network System.
  • the alliance chain network system can also instruct the investor client to reconfirm the user's identity after receiving the investor's application, such as through face recognition and its blockchain identity.
  • the identity of the investor is verified by means of a certificate to ensure that the qualification verification is from the investor's own will, and the received authorization information is stored on the chain. For example, obtain the digital certificate of the blockchain node corresponding to the user terminal; verify whether the user terminal is legal according to the digital certificate; if it is legal, execute the steps of obtaining the authorization information of the user terminal according to the numerical verification request, and upload the authorization information to the chain Evidence. If it is invalid, the numerical verification result of the verification failure will be sent to the blockchain node corresponding to the user terminal.
  • the verification of the user by means of the blockchain identity certificate is as follows:
  • the blockchain node responsible for the audit (hereinafter referred to as the business node) first obtains the digital certificate of the blockchain node (hereinafter referred to as the user node) corresponding to the investor client through the alliance chain network system, and verifies whether its identity is legal through the digital certificate. .
  • the digital certificate includes the validity period of the certificate itself, which indicates that the user's identity is legal within a certain period of time. If the certificate expires, the user's identity is not protected by law; when the digital certificate passes the CA organization (digital certificate system) After issuance, it can be placed directly on the alliance chain network system, so that all other blockchain nodes can query and verify the identities of all blockchain participants.
  • each participant will obtain (issued) a digital certificate of its own, not the digital certificates of other participants.
  • the digital certificate solves the legality problem when the data is uploaded to the chain.
  • the identity of the person on the chain will be verified to ensure that whose data will be uploaded to the chain, and the identity of others cannot be used to upload the data. It can also further ensure the traceability and authenticity of the data.
  • Step 206 Obtain an encrypted value from the blockchain node authorized by the user terminal according to the authorization information, where the encrypted value is data calculated according to the preset processing condition.
  • the user specifies the validity period of a specific piece of data authorization according to the authorization information.
  • the validity period expires, the authorized service node's authorization right to the piece of data will automatically become invalid, and the service node will no longer have the right to the data.
  • the consortium chain network system When obtaining the encrypted value, the consortium chain network system obtains the investor's "name” + “identity identifier” from the authorization information according to the business node, and extracts the corresponding asset amount under the name and identifier that the investor himself has uploaded to the chain through various financial institutions. encrypted value. Subsequent verifications can then be performed without decryption. For example: verify "whether the financial assets under the name of the investor or the family are ⁇ 5 million". In addition, the verification initiation process is closely related to the investor authorization process. If the business node corresponding to Trust Company A has not gone through the investor authorization process, the next step will not be performed.
  • participating nodes can use encrypted signatures to add new transactions to the existing transaction chain, forming a secure, continuous, and immutable chain.
  • the data structure greatly ensures the timeliness and security of the data.
  • the applied system is a blockchain-based social alliance chain network system
  • the user's published data can be processed according to preset processing conditions. Semantic recognition of the dynamic information, extracting keyword information, and generating "positive energy” tags for each dynamic information according to the extracted keywords, and then counting the number of "positive energy” tags to obtain encrypted values.
  • This blockchain-based social alliance network system can greatly guarantee the security and privacy of user information by authorizing information and data owners to achieve accurate field-level and object-by-object authorization management of data.
  • this embodiment can use a blockchain system with a full encryption framework, which means that the information on the chain is independently encrypted by the data owner and then uploaded, and the secret key is stored by the data uploader, thereby realizing data ownership. All other participating blockchain nodes directly obtain ciphertext data in the distributed ledger, and through the authorization information, the data owner can realize the authorization management of the data to the field level and object-by-object, so that other participants can only view the data. To the data that needs to be seen, and can realize the recovery of permissions and other operations, greatly ensuring the security and privacy of user information.
  • Step 208 Calculate the encrypted value through zero-knowledge proof to obtain the result value.
  • Zero-knowledge proof algorithm plays an extremely important role in cryptography, which means that the prover can still prove the correctness of a certain assertion without providing any useful information to the verifier.
  • the above authorization and verification process is an automated process developed to realize this function. It can increase this function and realize the connection with the blockchain network by making a small amount of modification to the business nodes of each participant, or it can also be used to realize this function.
  • Computer-readable instructions developed separately such as application computer-readable instructions in the form of web pages, clients, or mobile phone APPs.
  • a blockchain-based zero-knowledge proof system is constructed by combining smart contracts and client computer-readable instructions.
  • all transaction verifications are performed using a characteristic zero-knowledge algorithm.
  • the data on the chain is ciphertext data.
  • the algorithm suite based on the national secret algorithm standard is adopted, combined with the zero-knowledge algorithm protocol, to realize the functions of the entire trading system.
  • the national secret algorithm standard suite mainly includes algorithms SM2, SM3, SM4, SM9, etc. It also customizes corresponding zero-knowledge algorithm suites for international general algorithm standards.
  • the international general algorithm standard suite mainly includes algorithms secp256r1, SHA256, AES, BN256, etc.
  • the zero-knowledge transaction ledger can be implemented on multiple blockchain networks. Based on the zero-knowledge ledger information across the blockchain network, the occurrence and verification of all transactions can be performed across the blockchain network.
  • a zero-knowledge transaction ledger if a series of relationships need to be verified for transactions or account balances, it is necessary to specify the relationships that must be satisfied. Based on the zero-knowledge verification relationship management function information, the corresponding authority control is performed for the creation, modification, and deletion of relationships. Participants can set up the zero-knowledge proof enablement. After enabling, the financial asset balance data can be used for zero-knowledge verification in combination with the verification application scenario.
  • the alliance chain network system performs an "addition" operation on the ciphertext data of the investor's financial asset balance in each financial institution according to the algorithm of the 3D zero-knowledge proof technology, and obtains "whether ⁇ 5 million yuan” ", and return the "Yes” or "No” verification result to Trust Company A.
  • the alliance chain network system consists of ten financial institutions from A to J. Among them, the investor has financial assets in three financial institutions B, C and D. For example, he has a deposit of 1 million yuan in bank B and a wealth management product of 2 million yuan.
  • the investor will have two encrypted data on the balance of financial assets in Bank B (this data is only displayed in plain text to Bank B, and is cipher text information to any other members in the alliance chain network system); Insurance company C has insurance of 2 million yuan, and trust company D has trust products of 1 million yuan, then insurance company C and trust company D have encrypted data on the balance of financial assets; in the other 7 financial institutions, there is no financial asset data, then The other 7 financial institutions do not participate in this verification calculation.
  • the verification process is carried out in four pieces of ciphertext data of three financial institutions B, C, and D.
  • Each of B, C, and D has uploaded the corresponding amount of financial assets, but they are all ciphertext data.
  • institution B has uploaded two ciphertext data, so there are four ciphertext data in total.
  • the verification of the ciphertext here is to add the four pieces of ciphertext data.
  • the elliptic curve mode is used to generate the additive homomorphic encryption algorithm; the ciphertext value is added according to the additive homomorphic encryption algorithm to obtain the resulting value.
  • This embodiment uses zero-knowledge proof technology to cross-validate encrypted data, especially data under complex business logic.
  • the initiating prover initiates zero-knowledge proof for the data on the chain, and other participants can verify these ciphertext data with zero-knowledge. It proves that the purpose of data sharing is achieved under the premise of data privacy protection, the "available and invisible" data is realized, the legal compliance issues in the process of transaction flow are ensured, and the business flow between multiple entities is greatly improved. wind control ability.
  • the encrypted information on different blockchain nodes here refers to information encrypted and uploaded by different blockchain nodes.
  • a and b are plaintext
  • x and y are the corresponding encryption keys
  • a and B are the corresponding encrypted ciphertexts
  • G is a widely accepted generator for the selected elliptic curve
  • the homomorphic encryption technology does not need to decrypt each ciphertext and then calculate it and spend a high computational cost, so that the calculation of the ciphertext without the key party can be realized.
  • the communication cost can also transfer the computing task, and the third party cannot obtain the plaintext data, which improves the security of the information, and the result of the decryption after the ciphertext calculation is consistent with the result of the same operation on the plaintext, which ensures the correctness of the operation.
  • Step 210 verify the result value according to the verification condition, and obtain a numerical verification result.
  • the verification condition is obtained according to the numerical verification request, wherein the verification condition is whether the result value is greater than the preset value; if the result value is greater than the preset value, the numerical verification result that passes the verification is sent to the user terminal; otherwise, the verification result is sent to the user terminal Failed numerical validation result.
  • the value verification request is to verify the amount of data, it will naturally correspond to the verification conditions set on Trust Company A.
  • Trust Company A can adjust the verification conditions as needed, such as adjusting the preset values in the verification conditions. for 10 million and so on.
  • the verification condition is set by Trust Company A; the four pieces of ciphertext data are added and calculated, and the calculated ciphertext result is compared with the verification condition of "whether ⁇ 5 million yuan" in the ciphertext state through homomorphic encryption technology.
  • Output a "yes” or "no" verification conclusion.
  • the investor can receive a prompt of "meeting the purchase conditions” on the investor's client terminal and can apply to purchase the asset management products of A Trust Company; for investors whose verification result is returned as "No” Investors, investors receive a prompt "not meeting the purchase conditions” and cannot apply for the purchase of asset management products.
  • the above verification conclusion is encrypted and stored on the chain. The verification result is only visible to A Trust Company, and is open to the regulatory agency for penetrating supervision.
  • the encrypted values on different blockchain nodes are obtained through the user's authorization information, and then the user's numerical information is processed and verified through the authorization information and digital certificate within the validity period, and is still encrypted. Completion of calculation verification in the state of , which ensures the security of user information.
  • steps in the flowchart of FIG. 2 are shown in sequence according to the arrows, these steps are not necessarily executed in the sequence shown by the arrows. Unless explicitly stated herein, the execution of these steps is not strictly limited to the order, and these steps may be performed in other orders. Moreover, at least a part of the steps in FIG. 2 may include multiple sub-steps or multiple stages. These sub-steps or stages are not necessarily executed and completed at the same time, but may be executed at different times. The execution of these sub-steps or stages The sequence also need not be sequential, but may be performed alternately or alternately with other steps or sub-steps of other steps or at least a portion of a phase.
  • a blockchain-based numerical verification device is provided, and the blockchain-based numerical verification device corresponds one-to-one with the blockchain-based numerical verification method in the above embodiment .
  • the blockchain-based numerical verification device includes:
  • a request module 302 configured to receive a numerical verification request sent by the user terminal, wherein the numerical verification request is used to generate a preset processing condition
  • the authorization module 304 is used to obtain authorization information of the user terminal according to the numerical verification request;
  • the obtaining module 306 is configured to obtain the encrypted value from the blockchain node authorized by the user terminal according to the authorization information, wherein the encrypted value is the data calculated according to the preset processing condition;
  • a calculation module 308, configured to calculate the encrypted value through zero-knowledge proof, and obtain the result value
  • the verification module 310 is configured to verify the result value according to the verification condition to obtain the numerical verification result.
  • the authorization module 304 includes:
  • An identification submodule used to obtain the identification of the user terminal from the authorization information
  • the extraction sub-module is used to extract the encrypted value of the user terminal on the chain through each blockchain node according to the identity identifier.
  • computing module 308 includes:
  • the calculation sub-module is used to calculate the encrypted values obtained through different blockchain nodes through homomorphic encryption, and obtain the resulting value.
  • calculation sub-module includes:
  • the addition unit is used to generate an additive homomorphic encryption algorithm in an elliptic curve mode
  • the processing unit is used to perform addition processing on the ciphertext value according to the additive homomorphic encryption algorithm to obtain the result value.
  • calculation sub-module includes:
  • the condition submodule is used to obtain the verification condition according to the value verification request, wherein the verification condition is whether the result value is greater than the preset value;
  • a first sending submodule configured to send a numerical verification result that has passed the verification to the user terminal if the result value is greater than the preset value
  • the second sending submodule is used for sending the numerical verification result of the verification failure to the user terminal otherwise.
  • authorization module 304 it also includes:
  • the certificate module is used to obtain the digital certificate of the blockchain node corresponding to the user terminal;
  • the legal verification module is used to verify whether the user terminal is legal according to the digital certificate
  • the certificate legal module is used to execute the step of obtaining the authorization information of the user terminal according to the numerical verification request when it is legal;
  • the certificate violation module is used to send the numerical verification result of the verification failure to the blockchain node where the user terminal is located when it is illegal.
  • the above blockchain-based numerical verification device obtains encrypted values on different blockchain nodes through the user's authorization information, and then processes and verifies the user's numerical information within the validity period through the authorization information and digital certificate, and the encrypted value is still encrypted.
  • the calculation verification is completed in the state, which ensures the security of user information.
  • a computer device is provided, and the computer device may be a server, and its internal structure diagram may be as shown in FIG. 4 .
  • the computer device includes a processor, memory, a network interface, and a database connected by a system bus. Among them, the processor of the computer device is used to provide computing and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium, an internal memory.
  • the non-volatile storage medium stores an operating system, computer readable instructions and a database.
  • the internal memory provides an environment for the execution of the operating system and computer-readable instructions in the non-volatile storage medium.
  • the computer device's database is used to store values.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • the computer-readable instructions are executed by the processor to implement the blockchain-based numerical verification method in the method of the above embodiment.
  • the computer device here is a device that can automatically perform numerical calculation and/or information processing according to pre-set or stored instructions, and its hardware includes but is not limited to microprocessors, special-purpose Integrated circuit (Application Specific Integrated Circuit, ASIC), programmable gate array (Field-Programmable Gate Array, FPGA), digital processor (Digital Signal Processor, DSP), embedded equipment, etc.
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • DSP Digital Signal Processor
  • embedded equipment etc.
  • a computer-readable storage medium on which computer-readable instructions are stored, and when the computer-readable instructions are executed by a processor, the steps of the blockchain-based numerical verification method in the foregoing embodiment are implemented, For example, steps 202 to 210 shown in FIG. 2, or, when the processor executes the computer-readable instructions, implements the functions of each module/unit of the blockchain-based numerical verification apparatus in the above-mentioned embodiment, such as module 302 shown in FIG. 3 to the function of module 310 .
  • the computer-readable storage medium may be non-volatile or volatile.
  • Nonvolatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in various forms such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Road (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
  • the blockchain referred to in this application is a new application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information to verify its Validity of information (anti-counterfeiting) and generation of the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本申请实施例属于区块链技术,应用于智慧政务领域中,涉及一种基于区块链的数值验证方法,包括接收用户终端发送的数值验证请求,其中,所述数值验证请求用于生成预设处理条件;根据数值验证请求获取用户终端的授权信息;根据授权信息从用户终端授权的区块链节点上获取加密数值,其中,所述加密数值为根据所述预设处理条件计算得到的数据;通过零知识证明计算加密数值,得到结果数值;根据验证条件验证结果数值,得到数值验证结果。其中,用户的隐私信息/结果数据数值验证结果可存储于区块链中。本申请还提供一种基于区块链的数值验证装置、计算机设备及存储介质。本申请解决了现有技术中数值验证中数值真实性、安全性无法保证的技术问题。

Description

基于区块链的数值验证方法、装置、计算机设备和介质
本申请要求于2020年10月29日提交中国专利局、申请号为202011186598.X,发明名 称为“基于区块链的数值验证方法、装置、计算机设备和介质”的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。
技术领域
本申请涉及区块链领域,特别是涉及一种基于区块链的数值验证方法、装置、计算机设备和存储介质。
背景技术
区块链技术也被称为分布式账本技术,是一种由若干台计算设备共同参与“记账”,共同维护一份完整的分布式数据库的新兴技术。相应地,鉴于记录的数据设计隐私或商业秘密,故各区块链在数据上传时,区块链加密节点会先将数据经过加密后,将密文数据完成上链并将密文账本同步至其他节点,以保证链上数据的时效性。
现有技术中当用户终端需要获取对某产品的访问权限或购买权限时,需要通过与该产品对应的服务端设置的验证条件,这样就需要用户终端上传服务端需要的信息,而这些信息中可能包括隐私信息,比如用户终端某特征的数值,比如账户中数额的多寡;然后服务端会根据上传的信息对用户终端进行资格验证,看是否符合验证条件。这种验证方式需要用户终端自己搜寻账户中的数额综合上传,但发明人意识到,某一用户终端可能有多个账户,不同的账户中数额的表现形式也有不同,用户终端不仅可以对账户中的数额进行随意修改,还可以隐瞒一些重要信息,这种无法保证数值验证的真实性和准确性,而且直接将数额一类的隐私数据上传到一个服务端直接获得未曾加密的数据信息,给用户的信息安全带来了极大的威胁。
发明内容
基于此,针对上述技术问题,本申请提供一种基于区块链的数值验证方法、装置、计算机设备及存储介质,以解决现有技术中数值验证中数值真实性、安全性无法保证的技术问题。
一种基于区块链的数值验证方法,应用于基于区块链构建的联盟链网络系统中,其中,所述联盟链网络系统包括多个按照约定共识机制执行操作的区块链节点,所述方法包括:
接收用户终端发送的数值验证请求;
根据所述数值验证请求获取所述用户终端的授权信息,其中,所述数值验证请求用于生成预设处理条件;
根据所述授权信息从所述用户终端授权的区块链节点上获取加密数值;
通过零知识证明计算所述加密数值,得到结果数值,其中,所述加密数值为根据所述预设处理条件计算得到的数据;
根据验证条件验证所述结果数值,得到数值验证结果。
一种基于区块链的数值验证装置,应用于基于区块链构建的联盟链网络系统中,其中,所述联盟链网络系统包括多个按照约定共识机制执行操作的区块链节点,所述装置包括:
请求模块,用于接收用户终端发送的数值验证请求,其中,所述数值验证请求用于生成预设处理条件;
授权模块,用于根据所述数值验证请求获取所述用户终端的授权信息;
获取模块,用于根据所述授权信息从所述用户终端授权的区块链节点上获取加密数值;
计算模块,用于通过零知识证明计算所述加密数值,得到结果数值,其中,所述加密数值为根据所述预设处理条件计算得到的数据;
验证模块,用于将所述结果数值与验证条件做密文状态下的对比,得到数值验证结果。
一种计算机设备,包括存储器和处理器,以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时还实现如下步骤:
接收用户终端发送的数值验证请求,其中,所述数值验证请求用于生成预设处理条件;
根据所述数值验证请求获取所述用户终端的授权信息;
根据所述授权信息,从所述用户终端授权的区块链节点上获取加密数值,其中,所述加密数值为根据所述预设处理条件计算得到的数据;
通过零知识证明计算所述加密数值,得到结果数值;
根据验证条件验证所述结果数值,得到数值验证结果。
一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,所述计算机可读指令被处理器执行时,使得所述处理器还执行如下步骤:
接收用户终端发送的数值验证请求,其中,所述数值验证请求用于生成预设处理条件;
根据所述数值验证请求获取所述用户终端的授权信息;
根据所述授权信息,从所述用户终端授权的区块链节点上获取加密数值,其中,所述加密数值为根据所述预设处理条件计算得到的数据;
通过零知识证明计算所述加密数值,得到结果数值;
根据验证条件验证所述结果数值,得到数值验证结果。
上述基于区块链的数值验证方法、装置、计算机设备和存储介质,通过在接收到用户终端发送的数值验证请求后,根据授权信息获取被授权的区块链节点上的不同的加密数值,然后通过零知识证明的方式计算加密数值,得到结果数值,再在密文状态下将其与验证条件做对比,得到最终的数值验证结果,这种全程从数值的获取、计算、对比一系列操作都在密文状态下进行的数值验证方式,避免了数值造假、数值泄露的风险,解决了现有技术中数值验证中数值真实性、安全性无法保证的技术问题。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为基于区块链的数值验证方法的应用环境示意图;
图2为基于区块链的数值验证方法的流程示意图;
图3为基于区块链的数值验证装置的示意图;
图4为一个实施例中计算机设备的示意图。
具体实施方式
除非另有定义,本文所使用的所有的技术和科学术语与属于本申请的技术领域的技术人员通常理解的含义相同;本文中在申请的说明书中所使用的术语只是为了描述具体的实施例的目的,不是旨在于限制本申请;本申请的说明书和权利要求书及上述附图说明中的术语“包括”和“具有”以及它们的任何变形,意图在于覆盖不排他的包含。本申请的说明书和权利要求书或上述附图中的术语“第一”、“第二”等是用于区别不同对象,而不是用于描述特定顺序。
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
为了使本申请的目的、技术方案及优点更加清楚明白,下面结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于 限定本申请。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例提供的基于区块链的数值验证方法,可以应用于如图1所示的应用环境中。其中,该应用环境可以包括终端102、网络以及服务端104,网络用于在终端102和服务端104之间提供通信链路介质,网络可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。
用户可以使用终端102通过网络与服务端104交互,以接收或发送消息等。终端102上可以安装有各种通讯客户端应用,例如网页浏览器应用、购物类应用、搜索类应用、即时通信工具、邮箱客户端、社交平台软件等。
终端102可以是具有显示屏并且支持网页浏览的各种电子设备,包括但不限于智能手机、平板电脑、电子书阅读器、MP3播放器(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器、膝上型便携计算机和台式计算机等等。
服务端104可以是提供各种服务的服务器,例如对终端102上显示的页面提供支持的后台服务器。
需要说明的是,本申请实施例所提供的基于区块链的数值验证方法一般由服务端/终端执行,相应地,基于区块链的数值验证装置一般设置于服务端/终端设备中。
应该理解,图1中的终端、网络和服务端的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备、网络和服务器。
其中,终端102通过网络与服务端104进行通信。服务端104接收终端102通过某一区块链节点发起的数值验证请求,并授权服务端从指定的区块链节点获取授权的加密数值;服务端104再基于零知识证明计算得到的加密数值,得到结果数值,最后对结果数值与验证条件做密文状态下的对比,得到数值验证结果。其中,终端102和服务端104之间通过网络进行连接,该网络可以是有线网络或者无线网络,终端102可以但不限于是各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备,服务端104可以用独立的服务器或者是多个组成的服务器集群来实现。
在一个实施例中,如图2所示,提供了一种基于区块链的数值验证方法,以该方法应用于图1中的服务端为例进行说明,包括以下步骤:
步骤202,接收用户终端发送的数值验证请求,其中,所述数值验证请求用于生成预设处理条件。
本实施例可以应用于基于区块链构建的联盟链网络系统中,其中,联盟链网络系统包括多个按照约定共识机制执行操作的区块链节点。具体地,联盟链网络系统搭建为:利用区块链技术,由多方业务节点组建“数值验证系统”,比如用于用户资产验证的“合格资质验证链”的联盟链,将各区块链节点上与用户相关联的资产信息加密上链,构建得到联盟链网络系统。具体地,需要先汇集联盟链网络系统创建过程中所需要的信息,比如区块链网络名称、区块链网络部署方式、区块链节点数量、区块链节点类型、区块链网络共识层配置、区块链节点配置、区块链加密算法等等,对汇集信息做合法性校验,例如字符长度是否超过最大长度等等。然后部署区块链管理平台、区块链共识层、区块链节点,此步骤可以通过在区块链管理平台中操作完成,部署区块链节点上的应用服务,最后执行验证案例,用以验证区块链网络及节点服务的状态是否正常。
具体地,在这个联盟链网络系统里,各区块链节点,比如银行、证券公司、基金公司、资产管理公司、信托公司、保险公司、期货公司和监管机构部署的区块链节点,其底层按照约定的约定共识机制算法,自动执行事先约定的条件:各金融机构计入金融资产种类(各金融机构根据业务类型不同,计入金融资产的数据不同,具体对照金融资产概念定义)、上链数据与各金融机构业务系统数据实时同步等业务流程相关机制,以及区块链底层运行等共识机制(如联盟成员新增、管理机制、议事规则等),共同维护账本数据,每个区块链节点的上层 跟各自的业务系统对接,实现数据导入。而各金融机构提供其机构内所有投资者姓名、身份证号码、或手机号码、在本机构的金融资产余额数据。所有上传的业务数据均带有各上传人的电子签名,以确保数据来源真实可靠。鉴于业务数据涉及投资者隐私及商业机密,在数据上传时,区块链加密节点会先将数据经过加密后,将密文数据完成上链并将密文账本同步至其他区块链节点,密文账本会与各金融机构业务系统数据保持实时同步,以确保链上数据的时效性。然后在保证各区块链节点下对应的参与方,比如某银行、证券公司等商业数据以及用户身份信息、资产信息等隐私安全的基础下,运用零知识证明技术对某一用户某一类的数值信息做计算,在隐私无忧的情况下证明该用户的某类数值符合某一审核区块链节点的验证条件。
可选地,本实施例除了可以应用在金融领域,还可以应用在其他互联网领域,比如各种社交网络可以共同建立一个联盟链网络系统,各社交网络参与方对应至少一个区块链节点,用户将其身份信息、粉丝数量、动态数量、动态类型等信息加密上传到对应的区块链节点,区块链节点定时进行更新一些动态数据并保持同步,以保证数据的时效性。比如微信、微博、绿洲、QQ、Facebook、推特、Line等各种社交软件参与方构建一个基于区块链的社交联盟链网络系统。
如果某用户想要参与该联盟链网络系统中某社交软件推出的活动,但是该社交软件设置有某验证条件,需要符合该验证条件的用户才能参与,这样用户就可以授权该审核的区块链节点通过联盟链网络系统获取自己在某些区块链节点上的加密数值,比如在上一年中发布动态的数量、发布某类动态的数量等等加密数据,以使该审核的区块链节点进行资格验证。既可以保障隐私安全,又可以方便用户操作。
可选地,本实施例还可以应用于智慧政务领域中,通过各机构建立一个联盟链网络系统,比如通过征信、交通、警务等机构构建,当需要验证某用户的某特征数值是否符合其中某一区块链节点的验证条件时,用户可以主动发起验证请求,比如验证用户的工作年限、家庭情况是否符合验证条件,然后用户主动请求获取该区块链节点下的某产品,比如安居房、政府补助等。
在一些实施例中,数值验证请求用于生成预设处理条件,具体为:当数值验证请求为获取用户的金融数据时,则生成整理用户授权的各个区块链节点上的各种资产信息,比如:银行上的定期、活期等资产数据,例如:在获取加密数值时,联盟链网络系统根据业务节点从授权信息中得到投资者的“姓名”+“身份标识”提取投资者本人通过各金融机构上链的该姓名、身份标识下对应的资产金额的加密数值;当数值验证请求为获取用户授权的各个区块链节点所对应的平台上的发布的“正能量”动态的数量,则生成计算“正能量”动态的数量的计算方案。
步骤204,根据数值验证请求获取用户终端的授权信息。
本实施例的数值验证,可以用某用户购买是否具有购买某产品的资格来说明,通过验证用户资产的多寡来判定是否可以购买某产品。其中,授权信息是用户终端所对应的区块链节点用户授权用于审核的区块链节点可以获取哪些区块链节点上的加密数值而生成的信息,包括区块链节点1a对区块链节点2a的授权内容,可以查看哪些数据、授权查看的次数、时间期限,或者其他的一些使用权限。
例如,投资者在投资者客户端向A信托公司发起了产品申请,并授权A信托公司验证“其本人或家庭名下的金融资产‘是否≥500万元’”,然后A信托公司就可以在接收到用户的申请后,从投资者客户端对应的区块链节点上获取对应的授权信息。A信托公司收到投资者的授权后,会触发联盟连网络系统上“合格投资者资格验证”的操作。
其中,为了进一步保证用户信息的安全性,联盟链网络系统还可以在接收到投资者的申请后,指示投资者客户端对用户的身份进行再次确认,比如通过人脸识别及其区块链身份证书的方式验证投资者身份,确保资格验证是出自投资者本人的意愿,并将接收到的授权信息上链存证。比如,获取用户终端所对应的区块链节点的数字证书;根据数字证书验证用户终 端是否合法;当合法的时,则执行根据数值验证请求获取用户终端的授权信息de步骤,将授权信息上链存证。若不合法,则向用户终端所对应的区块链节点发送验证失败的数值验证结果。可选地,还可以直接结束数值验证,等待用户终端的下次验证请求。
具体地,通过区块链身份证书的方式对用户进行验证为:
负责审核的区块链节点(以下称为业务节点)首先通过联盟链网络系统获取投资者客户端对应的区块链节点(以下称为用户节点)的数字证书,通过数字证书验证其身份是否合法。其中,数字证书包括证书本身的有效期,这个有效期说明该用户身份在某一时间段内时合法的,如果证书过期,则用户身份不受法律的保护;在数字证书通过CA机构(数字证书系统)颁发后可以直接放在联盟链网络系统上,这样其他所有的区块链节点都可以查询和验证所有区块链参与方的身份。
需要注意的是,此处是从数字身份证书系统获取的数字证书,即每个参与方都会获取(被颁发)一份自己的数字证书,不是获取其他参与方的数字证书。数字证书解决数据上链时候的合法性问题,数据上链的时候,会验证上链人的身份,保证谁的数据谁上链,而不能冒用别人的身份上链数据。也可以进一步保证数据的可追溯性和真实性。
步骤206,根据授权信息从用户终端授权的区块链节点上获取加密数值,其中,所述加密数值为根据所述预设处理条件计算得到的数据。
用户根据授权信息指定具体的某条数据授权的有效期,当有效期到达后,被授权的业务节点对该条数据的授权权利将会自动失效,该业务节点将不再拥有该数据的权利。
在获取加密数值时,联盟链网络系统根据业务节点从授权信息中得到投资者的“姓名”+“身份标识”提取投资者本人通过各金融机构上链的该姓名、身份标识下对应的资产金额的加密数值。然后无需解密就可以进行后续的验证。比如:验证“投资者本人或家庭名下的金融资产‘是否≥500万’”。此外,验证发起流程与投资者授权流程紧密关联,若A信托公司对应的业务节点未经过投资者授权流程,则不会进行下一步的操作。
通过这种从授权的对等网络的多个参与者之间获取加密数据,参与的节点可以使用加密签名将新的交易添加到现有的交易链中,形成安全、连续、不变的链式数据结构,大大保证了数据的时效性和安全性。
此外,还可以在向用户终端所在的区块链节点发送数值获取成功的信息,以指示用户终端所对应的区块链节点撤销授权信息,防止被授权方滥用用户的隐私数据。
可选地,当所应用的系统为基于区块链的社交联盟链网络系统时,当需要获取“正能量”动态的数量这种用户的加密数据,可以根据预设处理条件,对用户的所发布的动态信息进行语义识别,提取关键词信息,并根据提取到关键词为每一动态信息生成“正能量”标签,然后统计“正能量”标签的数量,得到加密数值。这种基于区块链的社交联盟网络系统,可以极大方面各个通过授权信息数据拥有方可以对数据实现精准到字段级别、分对象的授权管理,极大保证了用户信息的安全性和隐私性,而且将本申请的技术方案应用于这种基于区块链的社交联盟网络系统解决现有技术中用户数据分散不集中,无法进行统计的技术难题,使得用户自己也可以十分方便地获取自己所发布的动态信息的数量,以实现快速获取所有的信息进行下一步数值验证获取所需对象的目的。
进一步地,本实施例可以使用全加密框架的区块链系统,意味着链上的信息由数据所有方自主加密后上传,秘钥由数据上传方保存,实现数据的确权。其他参与的区块链节点在分布式账本中直接获取的都是密文数据,而且通过授权信息数据拥有方可以对数据实现精准到字段级别、分对象的授权管理,使得其他参与方仅能看到需要看到的数据,并且可实现权限的回收等操作,大大保证用户信息的安全性和隐私性。
步骤208,通过零知识证明计算加密数值,得到结果数值。
零知识证明算法在密码学中具有极为重要的地位,指的是证明者在不对验证者提供任何有用信息的情况下,仍可证明某一论断的正确性。上述授权及验证流程是为了实现该功能所开发的一个自动化流程,可以通过对各参与方的业务节点做少量改造以增加该功能、实现与 区块链网络的对接,也可以是为了实现该功能单独开发的计算机可读指令,如网页、客户端,或手机APP等形式的应用计算机可读指令。
在区块链网络中,结合智能合约与用户端计算机可读指令,构建基于区块链的零知识证明系统。在这个交易系统中,所有的交易验证均采用特色的零知识算法进行。在链上数据均为密文数据。采用基于国密算法标准的算法套件,结合零知识算法协议,实现整个交易系统的功能。国密算法标准套件主要包括算法SM2、SM3、SM4、SM9等。也针对国际通用算法标准,定制相应的零知识算法套件。国际通用算法标准套件主要包括算法secp256r1、SHA256、AES、BN256等。
在零知识交易系统中,存在一系列关键的算法参数。这些参数需要由一个安全的环境生成,并不能泄露。为了防止系统的运营商利用或泄露关键算法参数,需要使用安全的算法参数选举功能实现关键算法参数的安全产生。
基于安全的零知识算法参数选举功能信息,区块链的参与方都可以参与算法参数的选举,任何一个或多个参与方都无法控制参数选择,确保了系统的安全可靠。在大型系统中,需要对数据进行有效的管理,不同类型的数据,其管理策略也不相同。零知识交易账本可以在多个区块链网络上实现,基于跨区块链网络的零知识账本信息,所有交易的发生、验证都可以跨区块链网络进行。
基于3D零知识证明,可以实现跨账本的密文数据“加”、“减”、“乘”、“除”四则运算后的各类数据关系证明。这些数据关系包括“等于”、“大于”、“大于等于”、“小于”、“小于等于”等。此外,针对一般零知识算法运行效率低的特点,将零知识证明的运算时间从数十秒(Z-Cash)提升到1ms,真正满足业务系统的性能需求。上述验证不仅可以在同一区块链网络中完成,还可以在跨区块链网络的密文数据间完成。
在零知识交易账本中,如果需要对交易或账户余额进行一系列关系的验证,需要指定必须满足的关系。基于零知识验证关系管理功能信息,对于关系的创建、修改、删除进行相应的权限控制。参与方可进行零知识证明启用设置,启用后,金融资产余额数据即可结合验证应用场景进行零知识验证。
例如,在本实施例中,联盟链网络系统根据3D零知识证明技术的算法,对投资者在各金融机构的金融资产余额的密文数据进行“加法”运算,得出“是否≥500万元”的验证结果,并将“是”或者“否”的验证结果返回A信托公司。如:联盟链网络系统内由A~J十家金融机构组成,其中,该投资者在B、C、D三家金融机构有金融资产,如其在银行B有存款100万元及理财产品200万元,则区块链账本中该投资者在银行B会有两条金融资产余额的加密数据(该数据仅对银行B显示明文,对联盟链网络系统内其他任何成员均为密文信息);在保险公司C有保险200万元、在信托公司D有信托产品100万元,则保险公司C、信托公司D分别有一条金融资产余额的加密数据;在其他7家金融机构没有金融资产数据,则其他7家金融机构不参加此次验证计算。
验证过程在B、C、D三家金融机构的四条密文数据中进行。B、C、D每家都上传了对应的金融资产金额,但是都是密文数据,其中机构B上传了两条密文数据,所以一共是四条密文数据。此处对密文的验证就是把这四条密文数据做加法计算。比如,采用椭圆曲线模式生成加法同态加密算法;根据加法同态加密算法对密文数值进行加法处理,得到结果数值。本实施例使用零知识证明技术,对加密数据,尤其是复杂业务逻辑下数据的交叉验证,由发起证明方针对链上数据发起零知识证明,其他参与方可以对这些密文数据进行验证零知识证明,达到了在数据隐私保护的前提下实现数据共享的目的,实现了数据的“可用不可见”,确保了交易流转过程中的合法合规性问题,极大地提高了业务在多主体间流转的风控能力。
具体地,此处的不同区块链节点上的加密信息指的通过不同的区块链节点加密上传的信息。把这四条密文数据做加法计算用到了加法同态加密技术中的加法同态加密技术,以保证:E(a)+E(b)=E(a+b),这里的a和b是密文,E()是一种加密方式,即:对a和b加密以后做加法,和对a+b做加密,结果是一样的。
需要提醒的是,所有的加法同态技术都可以用于本实施例的实现,并不限于具体的技术。比如:采用ECC曲线上的Pedersen Commitment模式生成加法同态加密方法;
形式为:A=E(a)=a*G+x*H;
B=E(b)=b*G+y*H;->C=E(a+b)=(a+b)*G+(x+y)*H;
这里的a和b是明文,x和y为对应的加密密钥,A和B为对应的加密密文,G为所选择椭圆曲线广泛接受的generator;H为椭圆曲线上的另一个点,且保证无任何可推导q,使得H=qG。
本实施例通过同态加密技术不必对每一个密文解密后再计算而花费高昂的计算代价,就可以实现无密钥方对密文的计算,密文计算无须经过密钥方,既可以减少通信代价,又可以转移计算任务,而且第三方无法获得明文数据提高了信息的安全性,且对密文计算后解密的结果与明文进行同样运算的结果一致,保证了运算的正确性。
步骤210,根据验证条件验证结果数值,得到数值验证结果。
根据数值验证请求获取验证条件,其中,验证条件是结果数值是否大于预设数值;若结果数值满足大于预设数值,则向用户终端发送验证通过的数值验证结果;否则,则向用户终端发送验证失败的数值验证结果。比如:如果数值验证请求是验证金额数据的多少,则自然会与A信托公司上设置的验证条件相对应的,A信托公司可以根据需要对验证条件进行调整,比如调整验证条件中的预设数值为1000万等等。
验证条件是A信托公司设置的;对四条密文数据进行加法计算,并通过同态加密技术将计算后的密文结果与“是否≥500万元”的验证条件做密文状态下的比较,输出“是”或“否”的验证结论。对于验证结果返回为“是”的投资者,投资者可在投资者客户端收到“符合购买条件”的提示并可申请购买A信托公司的资管产品;对于验证结果返回为“否”的投资者,投资者收到提示“不符合购买条件”,无法申请购买资管产品。上述验证结论加密后上链存证,该验证结果仅对A信托公司可见,并对监管机构穿透式监管时开放。
上述基于区块链的数值验证方法中,通过用户的授权信息获取不同区块链节点上的加密数值,然后再通过授权信息和数字证书在有效期内对用户的数值信息进行处理验证,还在加密的状态的下完成计算验证,保障了用户信息的安全性。
应该理解的是,虽然图2的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图2中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
在一个实施例中,如图3所示,提供了一种基于区块链的数值验证装置,该基于区块链的数值验证装置与上述实施例中基于区块链的数值验证方法一一对应。该基于区块链的数值验证装置包括:
请求模块302,用于接收用户终端发送的数值验证请求,其中,数值验证请求用于生成预设处理条件;
授权模块304,用于根据数值验证请求获取用户终端的授权信息;
获取模块306,用于根据授权信息从用户终端授权的区块链节点上获取加密数值,其中,加密数值为根据预设处理条件计算得到的数据;
计算模块308,用于通过零知识证明计算加密数值,得到结果数值;
验证模块310,用于根据验证条件验证结果数值,得到数值验证结果。
进一步地,授权模块304,包括:
标识子模块,用于从授权信息中获取用户终端的身份标识;
提取子模块,用于根据身份标识提取用户终端通过各区块链节点上链的加密数值。
进一步地,计算模块308,包括:
计算子模块,用于通过同态加密方式计算获取到的通过不同区块链节点上链的加密数值,得到结果数值。
进一步地,计算子模块,包括:
加法单元,用于采用椭圆曲线模式生成加法同态加密算法;
处理单元,用于根据加法同态加密算法对密文数值进行加法处理,得到结果数值。
进一步地,计算子模块,包括:
条件子模块,用于根据数值验证请求获取验证条件,其中,验证条件是结果数值是否大于预设数值;
第一发送子模块,用于若结果数值满足大于预设数值,则向用户终端发送验证通过的数值验证结果;
第二发送子模块,用于否则,则向用户终端发送验证失败的数值验证结果。
进一步地,在授权模块304之前,还包括:
证书模块,用于获取用户终端所对应的区块链节点的数字证书;
合法验证模块,用于根据数字证书验证用户终端是否合法;
证书合法模块,用于当合法的时,则执行根据数值验证请求获取用户终端的授权信息的步骤;
证书违法模块,用于当不合法时,向用户终端所在的区块链节点发送验证失败的数值验证结果。
上述基于区块链的数值验证装置,通过用户的授权信息获取不同区块链节点上的加密数值,然后再通过授权信息和数字证书在有效期内对用户的数值信息进行处理验证,还在加密的状态的下完成计算验证,保障了用户信息的安全性。
在一个实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图4所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机可读指令和数据库。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的数据库用于存储数值。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现上述实施例方法中基于区块链的数值验证方法。
其中,本技术领域技术人员可以理解,这里的计算机设备是一种能够按照事先设定或存储的指令,自动进行数值计算和/或信息处理的设备,其硬件包括但不限于微处理器、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程门阵列(Field-Programmable Gate Array,FPGA)、数字处理器(Digital Signal Processor,DSP)、嵌入式设备等。通过用户的授权信息获取不同区块链节点上的加密数值,然后再通过授权信息和数字证书在有效期内对用户的数值信息进行处理验证,还在加密的状态的下完成计算验证,保障了用户信息的安全性。
在一个实施例中,提供了一种计算机可读存储介质,其上存储有计算机可读指令,计算机可读指令被处理器执行时实现上述实施例中基于区块链的数值验证方法的步骤,例如图2所示的步骤202至步骤210,或者,处理器执行计算机可读指令时实现上述实施例中基于区块链的数值验证装置的各模块/单元的功能,例如图3所示模块302至模块310的功能。所述计算机可读存储介质可以是非易失性,也可以是易失性。
通过用户的授权信息获取不同区块链节点上的加密数值,然后再通过授权信息和数字证书在有效期内对用户的数值信息进行处理验证,还在加密的状态的下完成计算验证,保障了用户信息的安全性。本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施 例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
本申请所指区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层等。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形、改进或者对部分技术特征进行等同替换,而这些修改或者替换,并不使相同技术方案的本质脱离本申请个实施例技术方案地精神和范畴,都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种基于区块链的数值验证方法,应用于基于区块链构建的联盟链网络系统中,所述联盟链网络系统包括多个按照约定共识机制执行操作的区块链节点,所述方法包括:
    接收用户终端发送的数值验证请求,其中,所述数值验证请求用于生成预设处理条件;
    根据所述数值验证请求获取所述用户终端的授权信息;
    根据所述授权信息,从所述用户终端授权的区块链节点上获取加密数值,其中,所述加密数值为根据所述预设处理条件计算得到的数据;
    通过零知识证明计算所述加密数值,得到结果数值;
    根据验证条件验证所述结果数值,得到数值验证结果。
  2. 根据权利要求1所述的方法,其中,所述根据所述授权信息从所述用户终端授权的区块链节点上获取加密数值,包括:
    从所述授权信息中获取所述用户终端的身份标识;
    根据所述身份标识提取用户终端通过各区块链节点上链的加密数值。
  3. 根据权利要求1所述的方法,其中,所述通过零知识证明计算所述加密数值,得到结果数值,包括:
    通过同态加密方式计算获取到的通过不同区块链节点上链的加密数值,得到所述结果数值。
  4. 根据权利要求3所述的方法,其中,所述同态加密方式为加法同态加密算法,所述通过同态加密方式计算获取到的通过不同区块链节点上链的加密数值,得到所述结果数值,包括:
    采用椭圆曲线模式生成加法同态加密算法;
    根据所述加法同态加密算法对所述密文数值进行加法处理,得到所述结果数值。
  5. 根据权利要求1所述的方法,其中,所述根据验证条件验证所述结果数值,得到数值验证结果,包括:
    根据所述数值验证请求获取所述验证条件,其中,所述验证条件是所述结果数值是否大于预设数值;
    若所述结果数值满足大于所述预设数值,则向所述用户终端发送验证通过的数值验证结果;
    否则,则向所述用户终端发送验证失败的数值验证结果。
  6. 根据权利要求1所述的方法,其中,在所述根据所述数值验证请求获取所述用户终端的授权信息之前,还包括:
    获取用户终端所对应的区块链节点的数字证书;
    根据所述数字证书验证所述用户终端是否合法;
    当合法的时,则执行所述根据所述数值验证请求获取所述用户终端的授权信息的步骤;
    当不合法时,向所述用户终端所对应的区块链节点发送验证失败的数值验证结果。
  7. 根据权利要求1所述的方法,其中,在所述根据所述授权信息从所述用户终端授权的区块链节点上获取加密数值之后,还包括:
    向所述用户终端所在的区块链节点发送数值获取成功信息,以指示所述用户终端所在的区块链节点撤销所述授权信息。
  8. 一种基于区块链的数值验证装置,应用于基于区块链构建的联盟链网络系统中,所述联盟链网络系统包括多个按照约定共识机制执行操作的区块链节点,包括:
    请求模块,用于接收用户终端发送的数值验证请求,其中,所述数值验证请求用于生成预设处理条件;
    授权模块,用于根据所述数值验证请求获取所述用户终端的授权信息;
    获取模块,用于根据所述授权信息从所述用户终端授权的区块链节点上获取加密数值,其中,所述加密数值为根据所述预设处理条件计算得到的数据;
    计算模块,用于通过零知识证明计算所述加密数值,得到结果数值;
    验证模块,用于根据验证条件验证所述结果数值,得到数值验证结果。
  9. 一种计算机设备,包括存储器和处理器,所述存储器存储有计算机可读指令,所述处理器执行所述计算机可读指令时还实现如下步骤:
    接收用户终端发送的数值验证请求,其中,所述数值验证请求用于生成预设处理条件;
    根据所述数值验证请求获取所述用户终端的授权信息;
    根据所述授权信息,从所述用户终端授权的区块链节点上获取加密数值,其中,所述加密数值为根据所述预设处理条件计算得到的数据;
    通过零知识证明计算所述加密数值,得到结果数值;
    根据验证条件验证所述结果数值,得到数值验证结果。
  10. 根据权利要求9所述的计算机设备,其中,所述根据所述授权信息从所述用户终端授权的区块链节点上获取加密数值,包括:
    从所述授权信息中获取所述用户终端的身份标识;
    根据所述身份标识提取用户终端通过各区块链节点上链的加密数值。
  11. 根据权利要求9所述的计算机设备,其中,所述通过零知识证明计算所述加密数值,得到结果数值,包括:
    通过同态加密方式计算获取到的通过不同区块链节点上链的加密数值,得到所述结果数值。
  12. 根据权利要求11所述的计算机设备,其中,所述同态加密方式为加法同态加密算法,所述通过同态加密方式计算获取到的通过不同区块链节点上链的加密数值,得到所述结果数值,包括:
    采用椭圆曲线模式生成加法同态加密算法;
    根据所述加法同态加密算法对所述密文数值进行加法处理,得到所述结果数值。
  13. 根据权利要求9所述的计算机设备,其中,所述根据验证条件验证所述结果数值,得到数值验证结果,包括:
    根据所述数值验证请求获取所述验证条件,其中,所述验证条件是所述结果数值是否大于预设数值;
    若所述结果数值满足大于所述预设数值,则向所述用户终端发送验证通过的数值验证结果;
    否则,则向所述用户终端发送验证失败的数值验证结果。
  14. 根据权利要求9所述的计算机设备,其中,在所述根据所述数值验证请求获取所述用户终端的授权信息之前,还包括:
    获取用户终端所对应的区块链节点的数字证书;
    根据所述数字证书验证所述用户终端是否合法;
    当合法的时,则执行所述根据所述数值验证请求获取所述用户终端的授权信息的步骤;
    当不合法时,向所述用户终端所对应的区块链节点发送验证失败的数值验证结果。
  15. 根据权利要求9所述的计算机设备,其中,在所述根据所述授权信息从所述用户终端授权的区块链节点上获取加密数值之后,还包括:
    向所述用户终端所在的区块链节点发送数值获取成功信息,以指示所述用户终端所在的区块链节点撤销所述授权信息。
  16. 一种计算机可读存储介质,其上存储有计算机可读指令,所述计算机可读指令被处理器执行时,使得所述处理器还执行如下步骤:
    接收用户终端发送的数值验证请求,其中,所述数值验证请求用于生成预设处理条件;
    根据所述数值验证请求获取所述用户终端的授权信息;
    根据所述授权信息,从所述用户终端授权的区块链节点上获取加密数值,其中,所述加密数值为根据所述预设处理条件计算得到的数据;
    通过零知识证明计算所述加密数值,得到结果数值;
    根据验证条件验证所述结果数值,得到数值验证结果。
  17. 根据权利要求16所述的计算机可读存储介质,其中,所述根据所述授权信息从所述用户终端授权的区块链节点上获取加密数值,包括:
    从所述授权信息中获取所述用户终端的身份标识;
    根据所述身份标识提取用户终端通过各区块链节点上链的加密数值。
  18. 根据权利要求16所述的计算机可读存储介质,其中,所述通过零知识证明计算所述加密数值,得到结果数值,包括:
    通过同态加密方式计算获取到的通过不同区块链节点上链的加密数值,得到所述结果数值。
  19. 根据权利要求18所述的计算机可读存储介质,其中,所述同态加密方式为加法同态加密算法,所述通过同态加密方式计算获取到的通过不同区块链节点上链的加密数值,得到所述结果数值,包括:
    采用椭圆曲线模式生成加法同态加密算法;
    根据所述加法同态加密算法对所述密文数值进行加法处理,得到所述结果数值。
  20. 根据权利要求16所述的计算机可读存储介质,其中,所述根据验证条件验证所述结果数值,得到数值验证结果,包括:
    根据所述数值验证请求获取所述验证条件,其中,所述验证条件是所述结果数值是否大于预设数值;
    若所述结果数值满足大于所述预设数值,则向所述用户终端发送验证通过的数值验证结果;
    否则,则向所述用户终端发送验证失败的数值验证结果。
PCT/CN2021/124386 2020-10-29 2021-10-18 基于区块链的数值验证方法、装置、计算机设备和介质 WO2022089237A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011186598.XA CN112231769A (zh) 2020-10-29 2020-10-29 基于区块链的数值验证方法、装置、计算机设备和介质
CN202011186598.X 2020-10-29

Publications (1)

Publication Number Publication Date
WO2022089237A1 true WO2022089237A1 (zh) 2022-05-05

Family

ID=74123252

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/124386 WO2022089237A1 (zh) 2020-10-29 2021-10-18 基于区块链的数值验证方法、装置、计算机设备和介质

Country Status (2)

Country Link
CN (1) CN112231769A (zh)
WO (1) WO2022089237A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115242789A (zh) * 2022-08-30 2022-10-25 中国电力科学研究院有限公司 一种负荷调控业务数据上链存储方法、系统、设备及介质
CN115589303A (zh) * 2022-07-11 2023-01-10 昆明理工大学 基于sm9算法和跨链技术的数据共享与隐私保护方法
CN115913564A (zh) * 2022-10-18 2023-04-04 鼎铉商用密码测评技术(深圳)有限公司 区块链产品的安全检测方法、系统、设备及可读存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231769A (zh) * 2020-10-29 2021-01-15 深圳壹账通智能科技有限公司 基于区块链的数值验证方法、装置、计算机设备和介质
CN113472807B (zh) * 2021-02-22 2023-03-21 支付宝(杭州)信息技术有限公司 用户间的隐私通信方法和装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110708170A (zh) * 2019-12-13 2020-01-17 腾讯科技(深圳)有限公司 一种数据处理方法、装置以及计算机可读存储介质
CN111553792A (zh) * 2020-03-24 2020-08-18 平安科技(深圳)有限公司 基于区块链的数据验证方法及装置
CN111783151A (zh) * 2020-06-30 2020-10-16 平安科技(深圳)有限公司 区块链账本的管理方法、装置和计算机设备
CN111800252A (zh) * 2020-07-22 2020-10-20 深圳壹账通智能科技有限公司 基于区块链的信息审核方法、装置和计算机设备
CN112231769A (zh) * 2020-10-29 2021-01-15 深圳壹账通智能科技有限公司 基于区块链的数值验证方法、装置、计算机设备和介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110708170A (zh) * 2019-12-13 2020-01-17 腾讯科技(深圳)有限公司 一种数据处理方法、装置以及计算机可读存储介质
CN111553792A (zh) * 2020-03-24 2020-08-18 平安科技(深圳)有限公司 基于区块链的数据验证方法及装置
CN111783151A (zh) * 2020-06-30 2020-10-16 平安科技(深圳)有限公司 区块链账本的管理方法、装置和计算机设备
CN111800252A (zh) * 2020-07-22 2020-10-20 深圳壹账通智能科技有限公司 基于区块链的信息审核方法、装置和计算机设备
CN112231769A (zh) * 2020-10-29 2021-01-15 深圳壹账通智能科技有限公司 基于区块链的数值验证方法、装置、计算机设备和介质

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115589303A (zh) * 2022-07-11 2023-01-10 昆明理工大学 基于sm9算法和跨链技术的数据共享与隐私保护方法
CN115589303B (zh) * 2022-07-11 2024-02-27 昆明理工大学 基于sm9算法和跨链技术的数据共享与隐私保护方法
CN115242789A (zh) * 2022-08-30 2022-10-25 中国电力科学研究院有限公司 一种负荷调控业务数据上链存储方法、系统、设备及介质
CN115913564A (zh) * 2022-10-18 2023-04-04 鼎铉商用密码测评技术(深圳)有限公司 区块链产品的安全检测方法、系统、设备及可读存储介质

Also Published As

Publication number Publication date
CN112231769A (zh) 2021-01-15

Similar Documents

Publication Publication Date Title
EP3673435B1 (en) Improving integrity of communications between blockchain networks and external data sources
EP3610606B1 (en) Managing sensitive data elements in a blockchain network
Liang et al. PDPChain: A consortium blockchain-based privacy protection scheme for personal data
WO2022089237A1 (zh) 基于区块链的数值验证方法、装置、计算机设备和介质
AU2019204712A1 (en) Managing sensitive data elements in a blockchain network
US10917249B2 (en) Processing data elements stored in blockchain networks
US11271760B2 (en) Managing blockchain-based centralized ledger systems
US10742423B1 (en) Managing blockchain-based centralized ledger systems
KR102326460B1 (ko) 원장 시스템에서의 신뢰 포인트 관리
CN113674077A (zh) 消费信贷风险防范方法、系统、设备及存储介质
US11323489B1 (en) Scalable auditability of monitoring process using public ledgers
Panwar et al. Sampl: Scalable auditability of monitoring processes using public ledgers
Wu et al. The survey on the development of secure multi-party computing in the blockchain
Shahzad et al. Blockchain based monitoring on trustless supply chain processes
Drăgan et al. Bootstrapping online trust: Timeline activity proofs
CN110943846A (zh) 新型基于环签名技术的异构身份联盟用户信誉值传递方法
Yu et al. SPRA: Scalable policy‐based regulatory architecture for blockchain transactions

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21884965

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 09.08.2023)

122 Ep: pct application non-entry in european phase

Ref document number: 21884965

Country of ref document: EP

Kind code of ref document: A1