CN108021821A - Multicenter block chain transaction intimacy protection system and method - Google Patents

Multicenter block chain transaction intimacy protection system and method Download PDF

Info

Publication number
CN108021821A
CN108021821A CN201711218249.XA CN201711218249A CN108021821A CN 108021821 A CN108021821 A CN 108021821A CN 201711218249 A CN201711218249 A CN 201711218249A CN 108021821 A CN108021821 A CN 108021821A
Authority
CN
China
Prior art keywords
transaction
layer
block chain
encryption
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711218249.XA
Other languages
Chinese (zh)
Inventor
伍前红
王沁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201711218249.XA priority Critical patent/CN108021821A/en
Publication of CN108021821A publication Critical patent/CN108021821A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of multicenter block chain transaction intimacy protection system and method, wherein, system includes:Alliance's management and control module is used for multi-party joint generation alliance parameter;Number authentication module is used to verify that encrypted ciphertext number is equal in outputting and inputting for transaction;Scope authentication module is used to verify that encrypted ciphertext number to be in specific sections in transaction so that perseverance is just;Encrypting module and deciphering module are used to send and receive process for number progress homomorphic cryptography and decryption;Block catenary system transaction modules are used for complete class bit coin digital cash transaction system, possess the transaction process that transmission, reception, broadcast and block confirm.The system can strengthen general construction by the block chain transaction privacy under multicenter regulatory format; so as to realize under multi-party joint management and control for the secret protection in trapdoor parameter and process of exchange for metadata of merchandising, effectively strengthen the plaintext number safety in multicenter class block catenary system process of exchange.

Description

Multicenter block chain transaction intimacy protection system and method
Technical field
The present invention relates to the cryptography in information security and cryptography currency technical field, more particularly to a kind of multicenter Block chain transaction intimacy protection system and method.
Background technology
Class block chain transaction system is set something afoot in bit coin digital coin systems.2008, this acute hearing in Japan PROCEDURE person (Satoshi Nakamoto) is designed and has been issued a kind of point-to-point decentralization digital cash --- bit coin.Bit coin system System proposes the trusted-authority for based on point-to-point new distribution type pattern, eliminating conditional electronic currency.Bit coin Concealment and decentralization, have driven a series of the Internet moneys based on cryptography to rise.According to the difference of operation principle, bag Bit coin, Lay spy coin, dog dog coin based on PoW (Proof of Work, proof of work) are included, based on PoS (Proof of Stake, equity prove) bit stock, the intelligent black coin in mill, and the ether mill based on PoW+PoS, point point coin etc..
Bottom layer realization of the block chain technology as bit coin system, the decentralization shown, information can not distort, information Wide-scale distribution, information anonymity characteristic are gradually paid close attention to by academia and industrial quarters and further investigation and extensive use are unfolded.Block chain In 1.0 epoch, be the bottom industrial structure formed using digital cash such as bit coin as core, forms ore deposit machine, ore deposit pond, digital goods Coin, pay wallet, exchange, the industrial colony of digital cash gateway and industrial chain.In 2.0 epoch of block chain, technology and application The application that focus is transferred to Floor layer Technology block chain technology from simple electronic money comes up, and forms the ecology of block chain+X industries Circle, classification and industry across it is big, degree of independence is high, be related to assets verification, financial service, charitable, media and community, study and The fields such as investment, intelligent contract, just false proof, e-commerce, social communication, Internet of Things, file storage.
However, propagated with the large area of class block chain transaction system, in system design bring two with operation Disclosed privacy leakage problem:1) for the trust problem of member in multi-party supervision, such as the cooperation of alliance's interchain;2) process of exchange The privacy leakage problem of middle metadata, such as the exposure of plaintext number in merchandising.
The content of the invention
It is contemplated that solve at least some of the technical problems in related technologies.
For this reason, an object of the present invention is to provide a kind of multicenter block chain transaction intimacy protection system, the system It can realize under multi-party joint management and control for the secret protection in trapdoor parameter and process of exchange for metadata of merchandising, effectively increase Plaintext number safety in strong multicenter class block catenary system process of exchange.
It is another object of the present invention to propose a kind of multicenter block chain transaction method for secret protection.
To reach above-mentioned purpose, one aspect of the present invention embodiment proposes a kind of multicenter block chain transaction secret protection system System, including:Alliance's management and control module, combines generation alliance parameter for multi-party;Number authentication module, after verifying encryption Ciphertext number it is equal in outputting and inputting for transaction;Scope authentication module, for verifying encrypted ciphertext number in transaction In specific sections so that perseverance is just;Encrypting module and deciphering module, add for sending and receiving process for number progress homomorphism Close and decryption;Block catenary system transaction modules, for complete class bit coin digital cash transaction system, possess transmission, reception, The transaction process that broadcast and block confirm.
The multicenter block chain transaction intimacy protection system of the embodiment of the present invention, can utilize thresholding encryption and decryption system to realize For the secret protection in multi-party joint management and control for generation trapdoor parameter, realized using homomorphic cryptography system to number Number privacy in encryption and decryption computing enhancing transmitting procedure, utilization scope, which is promised to undertake, to be proved to prove to ensure process of exchange with the property shown promise In ensure that hiding trading value be always on the occasion of and number of deals before and after sum it is consistent, so as to realize multi-party joint management and control Under in trapdoor parameter and process of exchange for merchandise metadata secret protection, effectively strengthen multicenter class block catenary system Plaintext number safety in process of exchange.
In addition, multicenter block chain according to the above embodiment of the present invention is merchandised, intimacy protection system can also have following Additional technical characteristic:
Further, in one embodiment of the invention, Π is made1=(rdmPara, coN, BipriTest, KeyGen) RSA thresholding cipher key schemes are represented, wherein rdmPara, coN, BipriTest and KeyGen is respectively the RSA thresholdings key side Threshold parameter distribution, joint generation mould integer, double primality tests and alliance's parameter generation in case;Make Π2=(PKeyGen, PEnc, PDec) homomorphism encryption and decryption scheme is represented, wherein PKeyGen, PEnc and PDec is respectively in the homomorphism encryption and decryption scheme Key generation, algorithms for encryption and decryption;Make Π3=(TKeyGen, TCom, TVer, TIndic) promises to undertake proof side for representative Case, wherein TKeyGen, TCom, TVer and TIndic be respectively the property shown promise to undertake key generation in proof scheme, promise to undertake, Verify and the property shown algorithm;Make Π4=(RKeyGen, RCom, RVer, RInact) represents scope and promises to undertake proof scheme, wherein RKeyGen, RCom, RVer and RInact are respectively key generation, promise, verification and interactive algorithm in scheme;Make Π5= (TIn, TOut, TBroad, BCfm) represents class block chain transaction system scheme, and wherein TIn, TOut, TBroad and BCfm distinguishes Confirm for the transaction transmission in the class block chain transaction system scheme, transaction acceptance, transaction broadcast and block.
Further, in one embodiment of the invention, the block chain transaction system includes transaction layer and validation layer, Wherein, the transaction layer is used for the transaction step to performing the block chain transaction system, including trading card generation, inputs defeated Go out, broadcast acknowledgements, and by encrypted metadata substitution original plaintext, be shown among trading card;The validation layer is used for Verify whether encrypted data meet value consistency and be present in particular range.
Further, in one embodiment of the invention, alliance's management and control module is used for allied member according to distribution Obtained piecemeal parameter, the parameter N of joint of reaching common understanding generation system transaction, wherein any member is in not up to threshold condition In the case of can not learn its trapdoor decompose;The block catenary system transaction modules be used for the transaction system input security parameter and Alliance's parameter, output for encryption and decryption computing generation public key and private key to (pki,ski), while export and be used to verify Public key pkd, the public key is without pairing private key;The block catenary system transaction modules are used to calculate total input value of merchandising, wherein, If trading card is as the block newly confirmed, the trading card will obtain extra bit coin expense as reward, described total The summation that input value is mutually operated with former ciphertext in plain text for the part;If the trading card is not that new confirmation block is first single, no volume Outer income, total input value are the value that upper single cross is easily transmitted;The encrypting module is used for parallel encryption and represents transaction metadata Through being carried out at the same time encryption in the transaction layer and the validation layer, wherein, system uses recipient's public key point in the transaction layer Other encrypted transmission number, while use each number of the identical number of system public key encryption in the validation layer;In the transaction The encrypted number of layer will be sent to each recipient's account in the validation layer by rear, it is noted that sent in the validation layer Encryption number will enter validation layer account, it is noted that the account abandons after this authentication without private key, the amount of money;The encrypting module and The number that deciphering module is used for after validation layer verification is hidden whether be on the occasion of, and whether input and output total value equal, Wherein, the validation layer is divided into two steps, and the first step proves that the hiding amount of money begins by commitment value in the method for proof of specific sections Eventually be on the occasion of;When for it is true when, whether the number after validation layer verification is hidden is on the occasion of rear, and system validation layer enters second Step, sum is equal before and after the equal method of proof of used two commitment values proves hiding amount of money input and output;When step is all When true, into the sending link of the transaction layer;The deciphering module carries out the whole network broadcast and hands over after checking and finding correct for recipient Yi Dan etc. is to be confirmed, wherein, original cleartext information will hide ciphertext for that can not distinguish on trading card after treatment, with Ensure the privacy of the only possible analyzed processing of process of exchange;The block catenary system transaction modules are verified for the validation layer By rear, encrypted number is sent to recipient by the transaction layer, and the recipient is decrypted according to the private key of oneself; The recipient check oneself the reception amount of money it is correct after, continue next single transaction, under the reception value of the recipient is One single input value.
Further, in one embodiment of the invention, allied member is secret chooses integer piAnd qi, run Π1's RdmPara algorithms;Mould Integer N is calculated, wherein, run Π1CoN algorithms;Double primality tests, wherein, the allied member leads to Cross algorithm and ensure product of the big Integer N for two prime numbers, wherein, run Π1BipriTest algorithms;Alliance's parameter and thresholding Key generates, and runs Π1KeyGen algorithms, draw alliance's key.
Further, in one embodiment of the invention, the transaction metadata is encrypted, wherein, run Π2 PEnc algorithms;The transaction metadata is decrypted, wherein, run Π2PDec algorithms;Homomorphism behaviour is carried out to ciphertext Make, wherein, run Π3POper algorithms.
Further, in one embodiment of the invention, (m, m') is given, promise calculating is carried out to plaintext secret, its In, run Π3TCom algorithms;Verify the validity of commitment value, wherein, run Π3TVer algorithms;Transaction is produced not The property shown promise is carried out with ciphertext value to verify whether containing same metadata, wherein, run Π3TIndic algorithms.
Further, in one embodiment of the invention, transaction input terminal total value is calculated, wherein, run Π5TIn Algorithm;Transaction output terminal is directed toward according to path, wherein, run Π5TOut algorithms;Trading card is subjected to the whole network broadcast, wherein, Run Π5TBroad algorithms;Absence from work without reason confirms trading card generation block according to common recognition mechanism, wherein, run Π5BCfm algorithms.
To reach above-mentioned purpose, another aspect of the present invention embodiment proposes a kind of multicenter block chain transaction secret protection Method, comprises the following steps:The piecemeal parameter that allied member obtains according to distribution, the ginseng of joint of reaching common understanding generation system transaction Number N, wherein any member can not learn that its trapdoor decomposes in the case of not up to threshold condition;Transaction system input safety ginseng Number and alliance's parameter, output for encryption and decryption computing generation public key and private key to (pki,ski), while output is used for The public key pk of verificationd, the public key is without pairing private key;The total input value of merchandising is calculated, wherein, if trading card is as newly confirming Block, then it is part plaintext and original that the trading card, which will obtain extra bit coin expense as reward, total input value, The summation that ciphertext mutually operates;If the trading card is not that new confirmation block is first single, no additional income, total input value is upper The value that single cross is easily transmitted;Parallel encryption represents transaction metadata through being carried out at the same time encryption in the transaction layer and the validation layer, Wherein, system distinguishes encrypted transmission number in the transaction layer using recipient's public key, while uses system in the validation layer Each number of the identical number of public key encryption;It will be sent extremely by rear in the validation layer in the encrypted number of the transaction layer Each recipient's account, it is noted that validation layer account will be entered in the encryption number that the validation layer is sent, it is noted that the account Without private key, the amount of money abandons after this authentication;Whether number after validation layer verification is hidden is on the occasion of and input and output are total Whether volume is equal, wherein, the validation layer is divided into two steps, and the first step is proved hidden by commitment value in the method for proof of specific sections The amount of money of Tibetan be always on the occasion of;When for it is true when, whether the number after validation layer verification is hidden is the system verification on the occasion of rear Layer enters second step, and sum is equal before and after the equal method of proof of used two commitment values proves hiding amount of money input and output; When step is true, into the sending link of the transaction layer;Recipient carries out the whole network broadcast trading card etc. after checking and finding correct It is to be confirmed, wherein, original cleartext information will hide ciphertext for that can not distinguish on trading card after treatment, to ensure to hand over The privacy of the only possible analyzed processing of easy process;After the validation layer is verified, the transaction layer is by encrypted number Recipient is sent to, the recipient is decrypted according to the private key of oneself;The reception amount of money of oneself is checked in the recipient After correct, continue next single transaction, the reception value of the recipient is next single input value.
The multicenter block chain transaction method for secret protection of the embodiment of the present invention, can utilize thresholding encryption and decryption system to realize For the secret protection in multi-party joint management and control for generation trapdoor parameter, realized using homomorphic cryptography system to number Number privacy in encryption and decryption computing enhancing transmitting procedure, utilization scope, which is promised to undertake, to be proved to prove to ensure process of exchange with the property shown promise In ensure that hiding trading value be always on the occasion of and number of deals before and after sum it is consistent, so as to realize multi-party joint management and control Under in trapdoor parameter and process of exchange for merchandise metadata secret protection, effectively strengthen multicenter class block catenary system Plaintext number safety in process of exchange.
In addition, multicenter block chain according to the above embodiment of the present invention is merchandised, method for secret protection can also have following Additional technical characteristic:
Further, in one embodiment of the invention, Π is made1=(rdmPara, coN, BipriTest, KeyGen) RSA thresholding cipher key schemes are represented, wherein rdmPara, coN, BipriTest and KeyGen is respectively the RSA thresholdings key side Threshold parameter distribution, joint generation mould integer, double primality tests and alliance's parameter generation in case;Make Π2=(PKeyGen, PEnc, PDec) homomorphism encryption and decryption scheme is represented, wherein PKeyGen, PEnc and PDec is respectively in the homomorphism encryption and decryption scheme Key generation, algorithms for encryption and decryption;Make Π3=(TKeyGen, TCom, TVer, TIndic) promises to undertake proof side for representative Case, wherein TKeyGen, TCom, TVer and TIndic be respectively the property shown promise to undertake key generation in proof scheme, promise to undertake, Verify and the property shown algorithm;Make Π4=(RKeyGen, RCom, RVer, RInact) represents scope and promises to undertake proof scheme, wherein RKeyGen, RCom, RVer and RInact are respectively key generation, promise, verification and interactive algorithm in scheme;Make Π5= (TIn, TOut, TBroad, BCfm) represents class block chain transaction system scheme, and wherein TIn, TOut, TBroad and BCfm distinguishes Confirm for the transaction transmission in the class block chain transaction system scheme, transaction acceptance, transaction broadcast and block.
Further, in one embodiment of the invention, the block chain transaction system includes the transaction layer and institute Validation layer is stated, wherein, the transaction layer is used for the transaction step to performing the block chain transaction system, including trading card life Into, input and output, broadcast acknowledgements, and by encrypted metadata substitution original plaintext, be shown among trading card;It is described to test Card layer is used to verify whether encrypted data meet value consistency and be present in particular range.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description Obtain substantially, or recognized by the practice of the present invention.
Brief description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially and it is readily appreciated that, wherein:
Fig. 1 is the structure diagram according to the multicenter block chain of one embodiment of the invention transaction intimacy protection system;
Fig. 2 is the general scheme flow chart according to one embodiment of the invention;
Fig. 3 is the concrete scheme flow chart according to one embodiment of the invention;
Fig. 4 is the system transaction flow figure according to one embodiment of the invention;
Fig. 5 is the flow chart according to the multicenter block chain of one embodiment of the invention transaction method for secret protection.
Embodiment
The embodiment of the present invention is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end Same or similar label represents same or similar element or has the function of same or like element.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
Before multicenter block chain transaction intimacy protection system and method is introduced, first class block linkwork is simply introduced The design principle of system.
The embodiment of the present invention analyses in depth the design principle of such block catenary system, by cryptography threshold generation mechanism, Homomorphism encryption and decryption system, promise and zero-knowledge proof method, it is proposed that method is solved to the general construction of the above problem, and is combined Existing cryptography instrument gives instantiation scheme construction.
Threshold generation mechanism is used to adopt the secret protection under multi-party joint management and control for generation trapdoor parameter, scheme Combine the RSA of generation system (RSA algorithm, RSA cryptographic algorithms) mould integer with the agreement of Dan Boheh propositions.Should Agreement makes the parameter of multi-party joint generation system, the i.e. big Integer Ns of RSA, but any one party does not know the decomposition of integer The factor p and q.If want to make system normal operation, it is necessary to the common recognition of multiple participants is obtained, its parameter could be generated and ensure operation, But any one party can not learn the trapdoor prime factor after generation.The mechanism protects the profit for having ensured multiple participants of justice Benefit, makes the transmission that operates in of system conveniently obtain distributivity, while has also carried out secret protection to trapdoor parameter, ensure that system Overall security.
Homomorphic cryptography system is used for the hidden protection to plaintext number in transaction, and scheme uses Paillier encryption systems pair Transmission is encrypted in plaintext number of deals.The system is to be proposed by Pascal Paillier for 1999, the difficulty of encryption system Based on number rank residue class difficult problem is closed, there is the anti-chosen -plain attact safety under master pattern.The system, which has, to be added together Step response so that realize that corresponding plus-minus in plain text operates by carrying out multiplying operation to encrypted ciphertext, which applies to Verification process in the case of privacy is not revealed.Except homomorphic characteristic, which is also equipped with high efficiency so that scheme can pass through Carry out precomputation and quickly calculated with Chinese remainder theorem, meet the encrypting and decrypting step in bit coin exchange hour Suddenly.
After being encrypted with encryption system, the ciphertext of generation will be present in each trading card, corresponding close to ensure On the occasion of and with equal requirement, scheme proves and zero-knowledge proof is tested with promising to undertake the satisfaction of the hiding plaintext of text Card.Red et al. the method proposed, the party before the scope commitment value of specific sections proves (Range Proof) using 2004 5 Method ensure that small extension field under the relatively simple process of step, secret number is remained on the occasion of can demonstrate,prove.Two commitment values The equal property shown, which is promised to undertake, proves (Balance) with the equal thought of Hash mapping value, in the case where not revealing by promise number Two commitment values of verification include same secret value.Two proof schemes all possess Zero Knowledge characteristic, ensure that encrypted number Volume is not compromised in verification process, improves the secret protection to metadata in transaction.
Demand for security of the embodiment of the present invention towards State-level, it then follows mentioned above principle is a kind of general more by designing The block chain transaction secret protection scheme of square tube control, is realized in such transaction system for the reality of joint management and control and privacy enhancing Demand.
Be based on above-mentioned reason, the embodiment of the present invention propose a kind of multicenter block chain transaction intimacy protection system and Method.
The multicenter block chain transaction intimacy protection system that describes to propose according to embodiments of the present invention with reference to the accompanying drawings and Method, describes the multicenter block chain transaction intimacy protection system proposed according to embodiments of the present invention with reference to the accompanying drawings first.
Fig. 1 is the structure diagram of the multicenter block chain transaction intimacy protection system of one embodiment of the invention.
As shown in Figure 1, multicenter block chain transaction intimacy protection system 10 includes:Alliance's management and control module 100, number are tested Demonstrate,prove module 200, scope authentication module 300, encrypting module 400, deciphering module 500 and block catenary system transaction modules 600.
Wherein, alliance's management and control module 100 is used for multi-party joint generation alliance parameter.Number authentication module 200 is used for Verify that encrypted ciphertext number is equal in outputting and inputting for transaction.Scope authentication module 300 is used to verify to be encrypted in transaction Ciphertext number afterwards is in specific sections so that perseverance is just.Encrypting module 400 and deciphering module 500 are used to send and receive process Homomorphic cryptography and decryption are carried out for number.Block catenary system transaction modules 600 are handed over for complete class bit coin digital cash Easy system, possesses the transaction process that transmission, reception, broadcast and block confirm.The system 10 of the embodiment of the present invention can lead to Cross under multicenter regulatory format block chain transaction privacy enhancing general construction, so as to realize under multi-party joint management and control for For the secret protection for metadata of merchandising in trapdoor parameter and process of exchange, effectively strengthen multicenter class block catenary system and merchandised Plaintext number safety in journey.
It is understood that the embodiment of the present invention can be used for strengthen multicenter class block catenary system process of exchange in it is bright Literary number safety, especially suitable for the transaction secret protection under alliance's chain mode, and designs one kind and possesses and combining in many ways The general construction of transaction privacy protection function under pipe diameter design.This is configured with modular construction and builds, and according to modular character one It is secondary to realize alliance's management and control, homomorphic cryptography, zero knowledge proof, the function of credible transaction.Wherein module includes:1. joint management and control module 100:Multi-party joint generation alliance trapdoor parameter;2. number authentication module 200:Verify that encrypted ciphertext number is being merchandised Output and input it is equal;3 scope authentication modules 300:Encrypted ciphertext number is in specific sections, i.e. perseverance in verification transaction Just;4. homomorphism encryption/decryption module includes encrypting module 400 and deciphering module 500:Process is sent and received to carry out together for number State encryption and decryption;5. block chain transaction modules 600:Complete class bit coin digital cash transaction system, possesses transmission, receptions, extensively Broadcast the transaction process confirmed with block.The embodiment of the present invention can realize multi-party joint pipe by thresholding encryption and decryption system For the secret protection of trapdoor parameter under control, realized by homomorphic cryptography system i.e. bright for transaction metadata in process of exchange The secret protection of literary number, while by zero-knowledge proof with promising to undertake that proof ensure that it is always just and defeated that number is hidden in transaction Enter to export the equal requirement of total value.
Further, in one embodiment of the invention, Π is made1=(rdmPara, coN, BipriTest, KeyGen) RSA thresholding cipher key schemes are represented, wherein rdmPara, coN, BipriTest and KeyGen is respectively in RSA thresholding cipher key schemes Threshold parameter distribution, joint generation mould integer, double primality tests and alliance's parameter generation;Make Π2=(PKeyGen, PEnc, PDec homomorphism encryption and decryption scheme) is represented, wherein PKeyGen, PEnc and PDec is respectively the key life in homomorphism encryption and decryption scheme Into, algorithms for encryption and decryption;Make Π3=(TKeyGen, TCom, TVer, TIndic) promises to undertake proof scheme for representative, wherein TKeyGen, TCom, TVer and TIndic respectively property shown promise to undertake that the key in proof scheme is generated, promised to undertake, verifying and the property shown is calculated Method;Make Π4=(RKeyGen, RCom, RVer, RInact) represent scope promise to undertake proof scheme, wherein RKeyGen, RCom, RVer and RInact is respectively key generation, promise, verification and interactive algorithm in scheme;Make Π5=(TIn, TOut, TBroad, BCfm) class block chain transaction system scheme is represented, wherein TIn, TOut, TBroad and BCfm is respectively class block chain Transaction transmission, transaction acceptance, transaction broadcast and block in transaction system scheme confirm.
It is understood that as shown in Fig. 2, the embodiment of the present invention can list the cryptography instrument that general construction is used, And the cryptography master tool used is needed when mainly providing construction universal architecture, including threshold generation system, homomorphism encryption and decryption System, promise to undertake proof system, zero-knowledge proof system and block chain transaction system.The simple of these master tools is provided first Definition, then respectively describes each cipher system in detail, wherein, it will be situated between in detail to each cipher system below Continue.The simple definition of master tool:
Make Π1=(rdmPara, coN, BipriTest, KeyGen) represents RSA thresholding cipher key schemes, wherein rdmPara, CoN, BipriTest and KeyGen are respectively threshold parameter distribution, joint generation mould integer, double primality tests and connection in scheme Alliance's parameter generation.
Make Π2=(PKeyGen, PEnc, PDec) represents homomorphism encryption and decryption scheme, and wherein PKeyGen, PEnc and PDec divide Key generation that Wei be in scheme, algorithms for encryption and decryption.
Make Π3=(TKeyGen, TCom, TVer, TIndic) promises to undertake proof, wherein TKeyGen, TCom for representative, TVer and TIndic is respectively that the key in scheme is generated, promised to undertake, verifying and the property shown algorithm.
Make Π4=(RKeyGen, RCom, RVer, RInact) represent scope promise to undertake proof scheme, wherein RKeyGen, RCom, RVer and RInact are respectively key generation, promise, verification and interactive algorithm in scheme.
Make Π5=(TIn, TOut, TBroad, BCfm) represents class block chain transaction system scheme, wherein TIn, TOut, TBroad and BCfm is respectively that the transaction in scheme sends (input terminal of trading card), transaction acceptance (output terminal of trading card), Transaction broadcast and block confirm.
Further, in one embodiment of the invention, block chain transaction system includes transaction layer and validation layer, its In, transaction layer is used for the transaction step to performing block chain transaction system, including trading card generates, input and output, broadcast acknowledgements, And by encrypted metadata substitution original plaintext, it is shown among trading card;Validation layer is used to verify encrypted data Whether meet value consistency and be present in particular range.
It is understood that block chain transaction system is divided into two levels:1. transaction layer/Transaction layer:Hand over Easy layer is used for the transaction step to performing block chain transaction system, including trading card generation, input and output, broadcast acknowledgements etc..Through Encrypted metadata substitution original plaintext is crossed, is shown among trading card.The main calling module MEnc and Tx of the level.2. verification Layer/Verification layer:It is parallel construction with transaction layer, for verifying it is consistent whether encrypted data meet numerical value Property and it is present in particular range.The level main calling module MEnc, BalanceVer and RangeVer.Need what is illustrated It is that relationship trading layer and validation layer have invoked module MEnc jointly, while encrypt transaction metadata, simply both use different Public key, generates different ciphertext/commitment values.The ciphertext of transaction layer is used for true sale, the ciphertext of validation layer be used for uniformity with Scope is verified.
Further, in one embodiment of the invention, alliance's management and control module 100 is distributed for allied member's foundation The piecemeal parameter arrived, the parameter N of joint of reaching common understanding generation system transaction, wherein feelings of any member in not up to threshold condition It can not learn that its trapdoor decomposes under condition;Block catenary system transaction modules 600 are used for transaction system input security parameter and alliance's ginseng Number, output for encryption and decryption computing generation public key and private key to (pki,ski), while export the public key pk for verifyingd, Public key is without pairing private key;Block catenary system transaction modules 600 are used to calculate total input value of merchandising, wherein, if trading card is conduct The block newly confirmed, then trading card will obtain extra bit coin expense as reward, total input value for the part in plain text and original The summation that ciphertext mutually operates;If trading card is not that new confirmation block is first single, no additional income, total input value easily passes for upper single cross The value come;Encrypting module 400 is used for parallel encryption and represents transaction metadata through being carried out at the same time encryption in transaction layer and validation layer, its In, system distinguishes encrypted transmission number in transaction layer using recipient's public key, while uses system public key encryption phase in validation layer With each number of number;It will be sent in the encrypted number of transaction layer in validation layer by rear to each recipient's account, note Validation layer account will be entered to the encryption number sent in validation layer by anticipating, it is noted that the account loses after this authentication without private key, the amount of money Abandon;Whether the number that encrypting module 400 and deciphering module 500 are used for after validation layer verification is hidden is on the occasion of and input is defeated Whether equal go out total value, wherein, validation layer is divided into two steps, and the first step is proved hidden by commitment value in the method for proof of specific sections The amount of money of Tibetan be always on the occasion of;When for it is true when, number after validation layer verification is hidden whether be on the occasion of rear, system validation layer into Enter second step, sum is equal before and after the equal method of proof of used two commitment values proves hiding amount of money input and output;Work as step When being true suddenly, into the sending link of transaction layer;Deciphering module 500 carries out the whole network broadcast and hands over after checking and finding correct for recipient Yi Dan etc. is to be confirmed, wherein, original cleartext information will hide ciphertext for that can not distinguish on trading card after treatment, with Ensure the privacy of the only possible analyzed processing of process of exchange;Block catenary system transaction modules 600 are verified for validation layer Afterwards, encrypted number is sent to recipient by transaction layer, and recipient is decrypted according to the private key of oneself;Checked in recipient After oneself the reception amount of money is correct, continue next single transaction, the reception value of recipient is next single input value.
Specifically, block chain transaction system can be divided into eight steps:
Step 1:Alliance's parameter generation/ParaGen:The piecemeal parameter that allied member obtains according to distribution, connection of reaching common understanding The parameter N that symphysis is merchandised into system, wherein any member can not learn that its trapdoor decomposes in the case of not up to threshold condition.
Step 2:Transaction system initialization/KeyGen:The alliance that transaction system inputs security parameter and previous step is generated Parameter, output for encryption and decryption computing generation public key and private key to (pki,ski), while export the public key for verifying pkd, pay attention to this public key without pairing private key;
Step 3:Calculate input total value/Insum:Total input value of merchandising is calculated, i.e., upper single cross is easily (non-first with digging ore deposit total income Beginning block chain then take in by no this item);If the trading card is as the block newly confirmed, which will obtain extra bit The summation that coin expense is mutually operated with former ciphertext in plain text as reward, total income for the part;If the trading card is not new confirmation area Block is first single, then without additional income, total income is the value that upper single cross is easily transmitted;
Step 4:Parallel encryption/Parallel Encrypt:Parallel encryption represents that transaction metadata is passed through in transaction layer and tested Card layer is carried out at the same time encryption.System distinguishes encrypted transmission number in transaction layer using recipient's public key, while is used in validation layer Each number of the identical number of system public key encryption;It will be sent in the encrypted number of transaction layer in validation layer by rear to each Recipient's account, it is noted that will enter validation layer account in the encryption number that validation layer is sent, it is noted that the account is without private key, gold Volume abandons after this authentication;
Step 5:Scope promises to undertake verification/Range Proof:Validation layer verification hide after number whether be on the occasion of, with And whether input and output total value is equal;Validation layer is divided into two steps, and the first step is demonstrate,proved by method of proof of the commitment value in specific sections The bright hiding amount of money be always on the occasion of;When the step is true, verification enters in next step;
Step 6:The property shown promises to undertake verification/Balance:Whether the number after validation layer verification is hidden is on the occasion of rear, system Validation layer enters second step, and the equal method of proof of used two commitment values proves total phase before and after hiding amount of money input and output Deng;When two steps are true, into the sending link of transaction layer;The step is called
Step 7:Broadcast acknowledgements/Broadcast:I.e. it is true to carry out the whole network broadcast trading card wait by recipient after checking and finding correct Recognize;Original cleartext information will hide ciphertext for that can not distinguish on trading card after the program is handled, ensure that transaction The privacy of the only possible analyzed processing of process.
Step 8:Decryption/Decrypt:After validation layer is verified, encrypted number is sent to recipient by transaction layer, Recipient is decrypted according to the private key of oneself;Recipient check oneself the reception amount of money it is correct after, continue next single friendship Easily;The reception value of the recipient is next single input value.
Further, Π=(CoParaGen, MEnc, RangeVer, BalanceVer, Tx) is defined to supervise for multicenter Block chain transaction secret protection scheme general construction, represents alliance's parameter generation, encrypting metadata number item, ciphertext scope successively Promise to undertake that proof, the ciphertext property shown promise to undertake proof and the transaction of block chain.It will describe in detail below to each cipher system.
Alternatively, in one embodiment of the invention, allied member is secret chooses integer piAnd qi, run Π1's RdmPara algorithms;Mould Integer N is calculated, wherein, run Π1CoN algorithms;Double primality tests, wherein, allied member passes through calculation Method ensures product of the big Integer N for two prime numbers, wherein, run Π1BipriTest algorithms;Alliance's parameter and thresholding key Generation, runs Π1KeyGen algorithms, draw alliance's key.
It is understood that (1) allied member is secret to choose integer piAnd qi, run Π1RdmPara algorithms, distribution ginseng Number;(2) mould Integer N is calculated, runs Π1CoN algorithms, N=pq=(pi+...+pk)(qi+...+qk).(3) double primality tests, Allied member ensures product of the big Integer N for two prime numbers by algorithm, runs Π1BipriTest algorithms, verification need to lead to Cross.(4) alliance's parameter and the generation of thresholding key, run Π1KeyGen algorithms, draw alliance's key, MEnc (m, pk, c, sk):Define message m ∈ { 0,1 }*
Specifically, RSA thresholdings key (Generation of Shared RSA Key) is generated
Allied member joint generation alliance trapdoor parameter N, do not know its decomposition but, which prevent independent or a small amount of malice into Attack of the member to transaction system;Only after allied member reaches common understanding, just can to drawing the factorization of big Integer N, into And decrypt encrypted turnover ciphertext.This function is very suitable for the supervision under multicenter.
Define 1 (threshold RSA):Define Π1=(rdmPara, coN, BipriTest, KeyGen) represents RSA thresholding keys Scheme, wherein rdmPara, coN, BipriTest and KeyGen are respectively that threshold parameter distribution, joint generation in scheme are big whole Several, double primality tests and alliance's parameter generation.It is respectively defined as:
rdmPara(1k):Allied member is secret to choose integer piAnd qi, and grown except range test.
coN(pi,qi):Mould Integer N is calculated, and is grown except range test.Wherein:N=pq=(pi+...+pk)(qi +...+qk)。
BipriTest(N):Double primality tests.Allied member ensures product of the big Integer N for two prime numbers by algorithm.
KeyGen(N,d):Alliance's parameter and the generation of thresholding key.
Alternatively, in one embodiment of the invention, transaction metadata is encrypted, wherein, run Π2PEnc Algorithm;Transaction metadata is decrypted, wherein, run Π2PDec algorithms;Homomorphism operation is carried out to ciphertext, wherein, operation Π3POper algorithms.
It is understood that it is divided into following components for transaction data enciphering and deciphering algorithm:
(1) transaction metadata is encrypted.Run Π2PEnc algorithms, c=PEnc (pk, m).
(2) transaction metadata is decrypted.Run Π2PDec algorithms, m=PDec (sk, c).
(3) homomorphism operation is carried out to ciphertext.Run Π3POper algorithms, PDec (PEnc (mi)·PEnc(mj)modn2) =mi+mj modn。
Specifically, homomorphism encryption and decryption system (Homomorphic Cryptosystem)
Homomorphic cryptography is one kind of public encryption system, is the cryptography skill of the computational complexity theory based on difficult math question Art.The encryption system possesses isomorphism, and it is that ciphertext operates that will can operate in plain text hidden, i.e., to by encrypted data Reason obtains an output, this output is decrypted, its result with the initial data of Same Way processing unencryption with being obtained Output result remain unchanged.Homomorphic cryptography system is divided into by computing mode plus homomorphic algorithm, multiplies homomorphic algorithm with mixing homomorphism Algorithm.Homomorphic encryption scheme generally comprises four (probability) polynomial time algorithms.
Define 2 (homomorphic cryptographies):Define Π2=(PKeyGen, PEnc, PDec, POper), which is represented, possesses adding for isomorphism Close scheme, wherein PKeyGen, PEnc and PDec are respectively key generation, encryption, decryption and operative algorithm in scheme.Point It is not defined as:
PKeyGen(1k):It is a probabilistic polynomial time algorithm.It inputs 1k, export recipient public private key pair (pk, sk)。
PEnc(pk,m):It is a probabilistic polynomial time algorithm.It inputs public key pk and message m ∈ M, output ciphertext c =PEnc (pk, m).
PDec(sk,c):It is a definite polynomial time algorithm.It input private key sk and ciphertext c, output message m or Symbol ⊥ (represents that c is an invalid ciphertext).
POper(ci,cj):It is a probabilistic polynomial algorithm.Its input two is encrypted close by homomorphic encryption algorithm The step of text carries out multinomial operation, its formula meets homomorphism operation, meets PDec (PEnc (m by resulti)·PEnc(mj) modn2)=mi+mj modn。
Also, homomorphic encryption scheme must is fulfilled for correctness and isomorphism.Correctness i.e. for all (pk, sk) ← PKeyGen(1k) and message m ∈ M, meet PDec (sk, PEnc (pk, m))=m, isomorphism meets PDecsk(PEncpk (mi)·PEncpk(mj)modn2)=mi+mj modn。
Alternatively, in one embodiment of the invention, (m, m') is given, promise calculating is carried out to plaintext secret, wherein, Run Π3TCom algorithms;Verify the validity of commitment value, wherein, run Π3TVer algorithms;Transaction is produced different close Literary value carries out the property shown promise and verifies whether containing same metadata, wherein, run Π3TIndic algorithms.
It is understood that BalanceVer (m, m ', pk):Number uniformity confirmation is carried out to commitment value.Specifically include:
(1) (m, m') is given, promise calculating is carried out to plaintext secret.Run Π3TCom algorithms, TCom (pk, r, r', m,m')→(C,C')。
(2) validity of commitment value is verified.Run Π3TVer algorithms, TVer (pk, r, m, C) → 1/0, if output be 1, illustrate that the commitment value of generation is effective, otherwise export 0 terminator.
(3) property shown promise is carried out to the different ciphertext values produced of merchandising to verify whether containing same metadata.Run Π3's TIndic algorithms, TIndic (sk, C, C') → 1/0, if output is 1, illustrates in two commitment values comprising the identical first number of secret According to otherwise exporting 0 terminator.
In addition, RangeVer (m, [a, b], pk):Commitment value is confirmed into line range.Specifically include:
(1) plaintext metadata m is given, promise calculating is carried out to plaintext secret.Run Π4RCom algorithms, RCom (pk, r,m)→C。
(2) validity of commitment value is verified.Run Π4TVer algorithms, RVer (pk, r, m, C) → 1/0, if output be 1, illustrate that the commitment value of generation is effective, otherwise export 0 terminator,
(3) the different ciphertext values that transaction produces are promised to undertake into line range and verified whether in specific sections.Run Π4Interaction Formula RInact algorithms, RInact (sk, [a, b], C) → 1/0, if output is 1, the secret metadata for illustrating to include in commitment value exists Between section [a, b], 0 terminator is otherwise exported.
Specifically, the property shown, which is promised to undertake, proves (Indicative Commitment Proof)
The property shown, which is promised to undertake, is proved to be a kind of special commitment scheme.Tradition promise to undertake for commitment value according to trap door information into Row computing, and the trapdoor property shown is promised to undertake and operated for two commitment values, its characteristics only allows the people for possessing trap door information It can interpolate that out whether the secret value in two promises is equal, cannot but open promise.Characteristics i.e. in concept are embodied in The output of scheme is the result is that judging result 1 or 0, rather than specific commitment value.And if only if possess trap door key and promise to undertake in Secret value equal situation when occurring, scheme output 1, other situations output 0.
Define 3 (property shown, which is promised to undertake, to be proved):Define Π3=(TKeyGen, TCom, TVer, TIndic) is promised to undertake for representative and demonstrate,proved Bright, wherein TKeyGen, TCom, TVer and TIndic are respectively that the key in scheme is generated, promised to undertake, verifying and the property shown algorithm.
TKeyGen(1k):Input 1k, export open parameter pk and trap door key sk.
TCom(pk,m):The open parameter pk and commitment value m of input, output promise to undertake C=TCom (pk, m) and verify what is promised to undertake Parameter (r, m).
TVer(pk,C,r,m):The open parameter pk of input, promise to undertake C and the parameter (r, m) that verification is promised to undertake, checks whether satisfaction Verify function TVer (pk, C, r, m).
TIndic(sk,C,C'):Input trap door key sk and two and promise to undertake C, C ', judge the promise secret value in promise C, C ' Whether m, m ' are identical.If identical, 1 is exported at this time, otherwise exports 0.
Scope, which is promised to undertake, proves (Range Commitment Proof)
Scope, which is promised to undertake, to be proved to be used to prove commitment value in a specific section.Commitment scheme typically refers to sending direction and connects Debit sends a secret value, and recipient does not know the secret value, and then sender can open the secret value, recipient into Row verification.Commitment scheme includes two stages, promises to undertake stage and opening stage (or disclosing the stage).Scope promises to undertake proof scheme In the case where not opening commitment value, to the approximate range of ciphertext value into line justification, possesses good crypticity.
Define 4 (scope, which is promised to undertake, to be proved):Define Π4=(RKeyGen, RCom, RVer, RInact) represents scope and promises to undertake card Bright scheme, wherein RKeyGen, RCom, RVer and RInact are respectively that key generation, promise, verification and interaction in scheme are calculated Method.
RKeyGen(1k):Input 1k, export open parameter pk and trap door key sk.
RCom(pk,m):The open parameter pk and commitment value m of input, output promise to undertake C=RCom (pk, m) and verify what is promised to undertake Parameter (r, m).
RVer(pk,C,r,m):The open parameter pk of input, promise to undertake C and the parameter (r, m) that verification is promised to undertake, checks whether satisfaction Verify function RVer (pk, C, r, m).
RInact(a,b,sk,C):Input trap door key sk and commitment value C, judge promise to undertake C in promise secret value m whether Among section [a, b].If so, exporting 1 at this time, 0 is otherwise exported.
Alternatively, in one embodiment of the invention, transaction input terminal total value is calculated, wherein, run Π5TIn calculate Method;Transaction output terminal is directed toward according to path, wherein, run Π5TOut algorithms;Trading card is subjected to the whole network broadcast, wherein, fortune Row Π5TBroad algorithms;Absence from work without reason confirms trading card generation block according to common recognition mechanism, wherein, run Π5BCfm algorithms.
It is understood that Tx (TIn, TOut):The general operation level of class block chain transaction system:
(1) transaction input terminal total value is calculated.Run Π5TIn algorithms, Insum=TIn (TOuti-1,reward);
(2) it is directed toward transaction output terminal according to path.Run Π5TOut algorithms,
(3) trading card is subjected to the whole network broadcast.Run Π5TBroad algorithms, Comfirm=TBroad (Tx);
(4) absence from work without reason confirms trading card generation block according to common recognition mechanism.Run Π5BCfm algorithms, Block=BCfm (Txi,Txj...)。
Specifically, class block chain transaction system (Blockchain-based System)
Class block chain transaction system refers to the intermediate item for being designed and being issued token using block chain form.The system Middle clever framework is employed, credibleization distributed storage and open transaction are carried out to data, and using token as measurement unit.Such Transaction system is unidirectional irreversible chain structure by trading card, data block and block link layer layer architecture.
Define 5 (class block chain transaction systems):Define Π5=(TIn, TOut, TBroad, BCfm) represents the friendship of class block chain Easy system schema, wherein TIn, TOut, TBroad and BCfm are respectively that the transaction in scheme sends (input terminal of trading card), are handed over (output terminal of trading card) easily is received, transaction broadcast and block confirm.
TIn(TOuti-1,reward):System input accept it is upper one merchandise output, if block first transaction then There is the premiums reward for digging ore deposit, the summation for obtaining input terminal is transmitted.
TOut(TIn,address):It is output valve that the input summation of system, which is sent to receiving terminal, according to specified public key Address address is traded direction.
TBroad(Tx):System carries out the whole network broadcast for the trading card produced, waits absence from work without reason to be confirmed.
BCfm(Txi,Txj...):Stay away from work without leave and the trading card in ore deposit pond is confirmed, and according to common recognition mechanism by countless trading cards Pack, the new block of a block is chained in generation.
In one particular embodiment of the present invention, as shown in figure 3, the embodiment of the present invention gives multicenter supervision block A kind of instantiation specific configuration of chain transaction secret protection scheme, i.e., after the algorithm of each module is instantiated, the step of scheme It can be achieved.The specific implementation of the program is described below:
1. the concrete scheme construction of tool model
1.1 specific alliance's parameter generation algorithm/ParaGen, the i.e. embodiment of the present invention provide the connection of DanBoneh propositions Symphysis is into RSA thresholding cipher key schemes.
1) allied member is secret chooses integer piAnd qi
A) allied member is secret chooses integer pi
B) p=p is calculatedi+...+pk, ensure that alliance's integer and p can not be by less than B1Prime decomposition
C) allied member chooses integer qiAnd verified
2) mould Integer N is calculated.
A) N=pq=(pi+...+pk)(i+...+qk), generate parameter N when can not extraneous information
B) allied member can be ensured not by [B by trial division algorithms1,B2] between prime decomposition factor
3) double primality tests.Allied member ensures product of the big Integer N for two prime numbers by algorithm.
4) alliance's parameter generates.Allied member's joint generation is used for the parameter N of encryption system in transaction system, but arbitrarily Member can not learn its factorization.
1.2 specific homomorphic encryption algorithms/Homomorphic Cryptosystem, the i.e. embodiment of the present invention provide Paillier encipherment schemes.
Paillier encryption systems provide the anti-chosen -plain attact safety under master pattern, possess efficient encryption solution Close efficiency and the characteristic for adding homomorphism, the system encryption and decryption step are as follows:
PKeyGen:If p and q is Big prime, g is system generation member, makes n=pq, calculates λ=λ (n)=lcm (p-1, q- 1), wherein public key is (n, g), private key λ.
PEnc:C=gm·rn modn2, wherein r is any selection.
POper(ci,cj):Decsk(Encpk(m1)·Encpk(m2)modn2)=m1+m2modn。
The 1.3 specific property shown commitment scheme/Indicative Commitment Proof, the i.e. embodiment of the present invention provide The non-interactive type property shown commitment scheme:
PK{x,r1,r2:E=E1(x,r1)modn1∧ F=E2(x,r2)modn2}。
1) .Alice randomly choose ω ∈ 1 ..., 2i+tb-1},ηα∈{1,...,2l+t+sn-1},ηβ∈{1,...,2l +t+sn-1};Then calculate:
2) Alice calculates u=H (Wα||Wβ);
3) Alice is calculated:
D=ω+um, Dαα+urα,Dββ+urβ
And send (u, D, Dα,Dβ) give validation layer account ";
4) Bob checks whether u=u ', wherein
If the part steps are proved to be successful, two commitment values include same secret value.
1.4 specific scope commitment schemes/Range Commitment Proof, the i.e. embodiment of the present invention provide Wu and exist 2004 scope promises to undertake identification protocol
PK{x,r:E=E (x, r) mod n ∧ x ∈ [a, b] }.
1) Alice sets v=α2y+ω>2t+l+s+T, wherein arbitrarily selection α ≠ 0,0<ω≤2s+T;R is set3-rα2+r1α+ r2∈[-2sn+1,...,2sN-1], wherein arbitrarily selection r1,r2,r3∈[-2sn+1,...,2sn-1];Then calculate:
Alice sends (V, E2,E3, F) and give recipient;
2) recipient calculates:
E1=E0(mi,r)/ga=gyhrMod n,
3) Alice and recipient each calculate:
Wherein r*=-r α2-r1α-r2
4) recipient verifies PK1, the correctness of PK2, PK3, and whether meets v>2t+l+s+T, recipient can if meeting To firmly believe x>a;Proving by the same methods obtains x<b.
1.5 specific block chain trading scheme/Blockchain-based System, i.e., using bit coin transaction system Exemplary carrier as general construction.
2nd, concrete scheme implementation steps are as follows:
As shown in figure 4, the embodiment of the present invention can the instantiation algorithm based on modules, and the double-deck level of system Structure, final instantiation scheme implementation steps are as follows:
Step 1:Alliance's parameter generation/ParaGen:The piecemeal parameter that allied member obtains according to distribution, connection of reaching common understanding The parameter N that symphysis is merchandised into system, wherein any member can not learn that its trapdoor decomposes in the case of not up to threshold condition. Allied member is secret first chooses integer pi, and calculate p=pi+...+pk, ensure that alliance's integer and p can not be by less than in scopes Limit B1Prime decomposition.Similarly, allied member chooses integer qiAnd verified.Then, member chooses integer and finishes, and calculates mould Integer N=pq=(pi+...+pk)(qi+...+qk), during this period, generation parameter N will not reveal extraneous information.To ensure Parameter is being specified in section, and allied member can be ensured not by [B by trial division algorithms1,B2] between prime decomposition Factor.Similarly, to ensure product that parameter is two prime numbers, allied member carries out double primality tests, ensures its product property.Most Afterwards, under the conditions of guarantee parameter N is correctly available, the trapdoor that allied member's joint generation is used for encryption system in transaction system is joined Number d, and two parameter N are passed to system, the encryption for below step.
Step 2:Transaction system initialization/KeyGen:Security parameter is inputted, output is for encryption and decryption computing and verification Parameter.In transaction layer, for each different recipient i, system is generated generates two Big prime p to each recipientiAnd qi。 Recipient's private key is skii, public key pki=(ni,gi), wherein ni=piqi
At the same time in validation layer, system output is for the public key pk for the account verifiedd=(nd,gd), it is noted that this public key without with To private key.I.e. the system account cannot operate the received amount of money;System generation option Vα(gα,hα) and Vβ(gβ,hβ) use In verification.It is noted that since validation layer account and commitment value prove to be in validation layer together, and its parameter is generated by system, Design of scheme gβ=gdAndNumber is promised to undertake to ensure that the ciphertext after operation can become;
Step 3:Calculate total input value/Insum:Total input value of merchandising is calculated, i.e., upper single cross is easily with digging ore deposit total income.If should Trading card is as the block newly confirmed, then the trading card will obtain extra number expense as reward, and total income is the portion The number summation that clearly demarcated Wen Yuyuan ciphertexts mutually operate, is expressed asIf the trading card It is not the new value for confirming that block is first single, then easily being transmitted without additional income, the as upper single cross of total income, is expressed as
Step 4:Parallel encrypted entry/ParallelEncrypt:In transaction layer, scheme uses the public key of different recipients pk1,pk2,...,pkiThe plaintext number m of transmission is encrypted using Paillier encryption systems1,m2,...,miFor c1,c2,..., ci, it is expressed as:Meanwhile use the same public key pk of system in validation layer, schemedWill The number m that each in transaction layer is sent1,m2,...,miIt is encrypted, is expressed as:Its Middle design of scheme random number rd=hβ;Two layers of common ground is to have encrypted identical number of deals mi, difference is transaction layer Use the different public key pk from recipienti, validation layer used the identical public key pk from systemdIt is used for realization Paillier systems add homomorphic characteristic.In identical number m in itiIt ensure that recipient is worth correct after this authentication Property;
Step 5:Scope promises to undertake verification/Range Proof:Whether number of the system after validation layer verification is hidden is just Value.Whole validation layer is divided into two steps, and the first step proves the hiding amount of money all the time by method of proof of the commitment value in specific sections For on the occasion of.Aspects, which are promised to undertake, to be proved to ensure encrypted number miFor on the occasion of sender Alice is for different recipients I, makes promise respectivelyTo put it more simply, use E0, E1, E2, E3, F, V replace Ei0, Ei1, Ei2, Ei3, Fi, Vi
1) Alice sets v=α2y+ω>2t+l+s+T, wherein arbitrarily selection α ≠ 0,0<ω≤2s+T;R is set3-rα2+r1α+ r2∈[-2sn+1,...,2sN-1], wherein arbitrarily selection r1,r2,r3∈[-2sn+1,...,2sn-1];And calculate:
Alice sends (V, E2,E3, F) and give recipient;
2) recipient calculates:E1=E0(mi,r)/ga=gyhrModn,
3) Alice and recipient each calculate:
Wherein r*=-r α2-r1α-r2
4) recipient verifies PK1, the correctness of PK2, PK3, and whether meets v>2t+l+s+T, recipient can if meeting To firmly believe x>a;
5) for each recipient mi, scheme repeat step 1-4, that is, provable mi>0 (i=1,2 ..., i }).
The proof part is by the m of each recipientiRepeat i times, arbitrarily once fail if wherein had, transaction is lost Lose;If all successes, system returns to 1, and continues the verification of next step.
Step 6:The property shown promises to undertake verification/Balance:System verifies that the number input and output total value after hiding is in validation layer It is no equal.Validation layer is divided into two steps, which is second step, and the equal method of proof of used two commitment values proves the hiding amount of money Sum is equal before and after input and output.Scheme is ensured one before and after transaction output input using the equal proof of two commitment values is proved Cause, i.e. m=m1+m2+...+mi=∑ mi.Now, it is as follows to make two promises by Alice:
Wherein rα∈{-2sn+1,...,2sN-1 }, rβ=nd∈{-2sn+1,...,2sn-1};If receive identical number " mute's account " want to verify in its received ciphertext whether contained plaintext number equal with the value that Alice is sent, then it Need to carry out following two steps:
A the equal m=∑s m of secret value) being hidden in commitment value E and Fi
B the ciphertext H=∏ c after) operatingidF is promised to undertake equal to one of.
In order to realize above-mentioned steps 1), we carry out following algorithm:
1) .Alice randomly choose ω ∈ 1 ..., 2i+tb-1},ηα∈{1,...,2l+t+sn-1},ηβ∈{1,...,2l +t+sn-1};Then calculate:
2) .Alice calculates u=H (Wα||Wβ);
3) .Alice is calculated:D=ω+um, Dαα+urα,Dββ+urβ
And send (u, D, Dα,Dβ) give validation layer account;
4 validation layer accounts check whether u=u ', wherein
If the part steps are proved to be successful, continue lower part proves step by step:
A) validation layer account calculates received ciphertext:
B) is from the above it can be seen that we arbitrarily can choose r in ciphering processd=hβ, it is any in verification process Choose rβ=nd;And in system initialization process, we are setAnd gd=gβ, it is event:
C) checks whether H is equal to F, if not, Fail Transaction, if returning to 1, and carries out in next step.
To sum up verify, when being true the step of two parts, into the sending link of transaction layer;
Step 7:Broadcast acknowledgements/Broadcast:Validation layer carries out the whole network broadcast trading card etc. after checking and finding correct to be confirmed. Original cleartext information will hide ciphertext for that can not distinguish on trading card after the program is handled, ensure that process of exchange The privacy of only possible analyzed processing.This trading card mark can be T by weAlice, the process be equally applicable to it is any its His single cross is easy.
Step 8:Decrypt item/Dcrypt:For broadcast acknowledgements by rear, recipient receives encrypted number ci, recipient according to According to the private key sk of oneselfiIt is decrypted:
Whereinx∈Sn={ u<n2| x=1modn };The reception amount of money that oneself is checked in recipient is correct Afterwards, next single transaction can be continued.The reception value of the recipient is next single input value.It is worth noting that, when transaction After the completion of, the ciphertext number in validation layer account will be dropped, it is acted on only makes the value of validation layer and the value sent as bridge Produce contact.
In addition, the embodiment of the present invention can with combining cipher Threshold, homomorphic cryptography technology and promise to undertake proof mechanism, The existing transaction Privacy Protection under multi-party management and control is solved in existing class block chain transaction system, the embodiment of the present invention System 10 includes system architecture and the definition of multicenter block chain transaction intimacy protection system;Multicenter block chain transaction privacy is protected The general scheme construction of protecting system;The concrete scheme construction of multicenter block chain transaction intimacy protection system.Wherein, it is involved Multicenter block chain transaction privacy system is made of five cryptography modules, and particular transactions flow is divided into two levels, eight steps Suddenly.The cryptography instrument being related to includes threshold generation system, homomorphism encryption and decryption system, promises to undertake proof system, zero-knowledge proof body System and block chain transaction system.With following functions:
(1) secret protection to trapdoor parameter under multi-party joint management and control is realized.Alliance side reaches in acquirement common recognition The parameter that system starts is generated after threshold condition, but any one party can not learn the factoring of parameter.
(2) secret protection to metadata of merchandising is realized.The plaintext number in metadata of merchandising is added in process of exchange It is close to be traded for ciphertext, and ciphertext computing can be carried out to it.
(3) verification of correctness to ciphertext of merchandising is realized.System can ensure that hiding trading value in transaction is always On the occasion of, and sum is consistent before and after the number merchandised.
To sum up, system of the embodiment of the present invention 10 has the characteristics that:
(1) design of the lower block chain transaction secret protection system of multicenter supervision is a kind of generalization in the embodiment of the present invention Construction, any fundamental cryptographic instrument for meeting application claims all can be combined realization and possess joint management and control and privacy protection function Class block chain transaction system concrete scheme.
(2) embodiment of the present invention gives the construction step of a specific lower block chain privacy enhanced scheme of multicenter supervision Rapid and construction example, for those of ordinary skill in the art, can be imitated according to oneself desired performance and demand for security According to this instance constructs others block chain trading scheme.
(3) privacy for trapdoor parameter that structural scheme is realized by thresholding encryption and decryption system under joint management and control is protected Shield, the encrypting and decrypting computing realized by homomorphic cryptography system to number ensure the number privacy in transmitting procedure, lead at the same time Crossing scope promise proves to promise to undertake that proof ensure that hiding number is always just in transaction and input and output total value is equal with the property shown It is required that.
The multicenter block chain transaction intimacy protection system proposed according to embodiments of the present invention, can utilize thresholding encryption and decryption System is realized for the secret protection in multi-party joint management and control for generation trapdoor parameter, utilizes homomorphic cryptography system to realize The number privacy in encryption and decryption computing enhancing transmitting procedure to number, utilization scope, which is promised to undertake, to be proved to prove to ensure with the property shown promise Ensure that in process of exchange hiding trading value be always on the occasion of and number of deals before and after sum it is consistent, it is multi-party so as to realize For the secret protection in trapdoor parameter and process of exchange for metadata of merchandising under joint management and control, effectively strengthen multicenter class area Plaintext number safety in block catenary system process of exchange.
The multicenter block chain transaction method for secret protection proposed according to embodiments of the present invention referring next to attached drawing description Flow chart.
As shown in figure 5, multicenter block chain transaction method for secret protection comprises the following steps:
In step S501, allied member's foundation distributes obtained piecemeal parameter, the transaction of joint of reaching common understanding generation system Parameter N, wherein any member can not be learnt in the case of not up to threshold condition its trapdoor decompose.
In step S502, transaction system input security parameter and alliance's parameter, generation of the output for encryption and decryption computing Public key and private key to (pki,ski), while export the public key pk for verifyingd, public key is without pairing private key.
In step S503, total input value of merchandising is calculated, wherein, if trading card is as the block newly confirmed, merchandise Single summation that will be obtained extra bit coin expense and mutually operated with former ciphertext in plain text for the part as reward, total input value;If Trading card is not that new confirmation block is first single, then without additional income, total input value is the value that upper single cross is easily transmitted.
In step S504, parallel encryption represents that transaction metadata is passed through and is carried out at the same time encryption in transaction layer and validation layer, its In, system distinguishes encrypted transmission number in transaction layer using recipient's public key, while uses system public key encryption phase in validation layer With each number of number;It will be sent in the encrypted number of transaction layer in validation layer by rear to each recipient's account, note Validation layer account will be entered to the encryption number sent in validation layer by anticipating, it is noted that the account loses after this authentication without private key, the amount of money Abandon.
In step S505, validation layer verification hide after number whether be on the occasion of, and input and output total value whether It is equal, wherein, validation layer is divided into two steps, and the first step proves that the hiding amount of money begins by commitment value in the method for proof of specific sections Eventually be on the occasion of;When for it is true when, whether the number after validation layer verification is hidden is on the occasion of rear, and system validation layer enters second step, Sum is equal before and after the equal method of proof of used two commitment values proves hiding amount of money input and output;When step is true When, into the sending link of transaction layer.
In step S506, progress the whole network broadcast trading card etc. is to be confirmed after recipient checks and find correct, wherein, by processing Original cleartext information will hide ciphertext for that can not distinguish on trading card afterwards, to ensure that process of exchange is only possible analyzed The privacy of processing.
In step s 507, after validation layer is verified, encrypted number is sent to recipient, recipient by transaction layer Private key according to oneself is decrypted;Recipient check oneself the reception amount of money it is correct after, continue next single transaction, receive The reception value of person is next single input value.
Further, in one embodiment of the invention, Π is made1=(rdmPara, coN, BipriTest, KeyGen) RSA thresholding cipher key schemes are represented, wherein rdmPara, coN, BipriTest and KeyGen is respectively in RSA thresholding cipher key schemes Threshold parameter distribution, joint generation mould integer, double primality tests and alliance's parameter generation;Make Π2=(PKeyGen, PEnc, PDec homomorphism encryption and decryption scheme) is represented, wherein PKeyGen, PEnc and PDec is respectively the key life in homomorphism encryption and decryption scheme Into, algorithms for encryption and decryption;Make Π3=(TKeyGen, TCom, TVer, TIndic) promises to undertake proof scheme for representative, wherein TKeyGen, TCom, TVer and TIndic respectively property shown promise to undertake that the key in proof scheme is generated, promised to undertake, verifying and the property shown is calculated Method;Make Π4=(RKeyGen, RCom, RVer, RInact) represent scope promise to undertake proof scheme, wherein RKeyGen, RCom, RVer and RInact is respectively key generation, promise, verification and interactive algorithm in scheme;Make Π5=(TIn, TOut, TBroad, BCfm) class block chain transaction system scheme is represented, wherein TIn, TOut, TBroad and BCfm is respectively class block chain Transaction transmission, transaction acceptance, transaction broadcast and block in transaction system scheme confirm.
Further, in one embodiment of the invention, block chain transaction system includes transaction layer and validation layer, its In, transaction layer is used for the transaction step to performing block chain transaction system, including trading card generates, input and output, broadcast acknowledgements, And by encrypted metadata substitution original plaintext, it is shown among trading card;Validation layer is used to verify encrypted data Whether meet value consistency and be present in particular range.
It should be noted that the foregoing explanation to multicenter block chain transaction privacy protection device embodiment is also suitable In the multicenter block chain transaction method for secret protection of the embodiment, details are not described herein again.
The multicenter block chain transaction method for secret protection proposed according to embodiments of the present invention, can utilize thresholding encryption and decryption System is realized for the secret protection in multi-party joint management and control for generation trapdoor parameter, utilizes homomorphic cryptography system to realize The number privacy in encryption and decryption computing enhancing transmitting procedure to number, utilization scope, which is promised to undertake, to be proved to prove to ensure with the property shown promise Ensure that in process of exchange hiding trading value be always on the occasion of and number of deals before and after sum it is consistent, it is multi-party so as to realize For the secret protection in trapdoor parameter and process of exchange for metadata of merchandising under joint management and control, effectively strengthen multicenter class area Plaintext number safety in block catenary system process of exchange.
In the description of the present invention, it is to be understood that term " " center ", " longitudinal direction ", " transverse direction ", " length ", " width ", " thickness ", " on ", " under ", "front", "rear", "left", "right", " vertical ", " level ", " top ", " bottom " " interior ", " outer ", " up time The orientation or position relationship of the instruction such as pin ", " counterclockwise ", " axial direction ", " radial direction ", " circumferential direction " be based on orientation shown in the drawings or Position relationship, is for only for ease of and describes the present invention and simplify description, rather than indicates or imply that signified device or element must There must be specific orientation, with specific azimuth configuration and operation, therefore be not considered as limiting the invention.
In addition, term " first ", " second " are only used for description purpose, and it is not intended that instruction or hint relative importance Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, " multiple " are meant that at least two, such as two, three It is a etc., unless otherwise specifically defined.
In the present invention, unless otherwise clearly defined and limited, term " installation ", " connected ", " connection ", " fixation " etc. Term should be interpreted broadly, for example, it may be fixedly connected or be detachably connected, or integrally;Can be that machinery connects Connect or be electrically connected;It can be directly connected, can also be indirectly connected by intermediary, can be in two elements The connection in portion or the interaction relationship of two elements, unless otherwise restricted clearly.For those of ordinary skill in the art For, the concrete meaning of above-mentioned term in the present invention can be understood as the case may be.
In the present invention, unless otherwise clearly defined and limited, fisrt feature can be with "above" or "below" second feature It is that the first and second features directly contact, or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists Second feature " on ", " top " and " above " but fisrt feature are directly over second feature or oblique upper, or be merely representative of Fisrt feature level height is higher than second feature.Fisrt feature second feature " under ", " lower section " and " below " can be One feature is immediately below second feature or obliquely downward, or is merely representative of fisrt feature level height and is less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment of the present invention or example.In the present specification, schematic expression of the above terms is not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office Combined in an appropriate manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this area Art personnel can be tied the different embodiments or example described in this specification and different embodiments or exemplary feature Close and combine.
Although the embodiment of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, those of ordinary skill in the art within the scope of the invention can be to above-mentioned Embodiment is changed, changes, replacing and modification.

Claims (10)

  1. The intimacy protection system 1. a kind of multicenter block chain is merchandised, it is characterised in that including:
    Alliance's management and control module, combines generation alliance parameter for multi-party;
    Number authentication module, for verifying that encrypted ciphertext number is equal in outputting and inputting for transaction;
    Scope authentication module, for verifying that encrypted ciphertext number is in specific sections in transaction so that perseverance is just;
    Encrypting module and deciphering module, homomorphic cryptography and decryption are carried out for sending and receiving process for number;And
    Block catenary system transaction modules, for complete class bit coin digital cash transaction system, possess transmission, reception, broadcast The transaction process confirmed with block.
  2. The intimacy protection system 2. multicenter block chain according to claim 1 is merchandised, it is characterised in that
    Make Π1=(rdmPara, coN, BipriTest, KeyGen) represents RSA thresholding cipher key schemes, wherein rdmPara, coN, BipriTest and KeyGen is respectively that the threshold parameter in the RSA thresholdings cipher key scheme distributes, joint generates mould integer, double Primality test and alliance's parameter generation;
    Make Π2=(PKeyGen, PEnc, PDec) represents homomorphism encryption and decryption scheme, and wherein PKeyGen, PEnc and PDec is respectively Key generation in the homomorphism encryption and decryption scheme, algorithms for encryption and decryption;
    Make Π3=(TKeyGen, TCom, TVer, TIndic) for representative promise to undertake proof scheme, wherein TKeyGen, TCom, Key in the respectively described property the shown promise proof schemes of TVer and TIndic is generated, promised to undertake, verifying and the property shown algorithm;
    Make Π4=(RKeyGen, RCom, RVer, RInact) represent scope promise to undertake proof scheme, wherein RKeyGen, RCom, RVer and RInact is respectively key generation, promise, verification and interactive algorithm in scheme;
    Make Π5=(TIn, TOut, TBroad, BCfm) represents class block chain transaction system scheme, wherein TIn, TOut, TBroad It is respectively transaction transmission, transaction acceptance, transaction broadcast and block confirmation in the class block chain transaction system scheme with BCfm.
  3. The intimacy protection system 3. multicenter block chain according to claim 2 is merchandised, it is characterised in that the block chain is handed over Easy system includes transaction layer and validation layer, wherein, the transaction layer is used to walk the transaction for performing the block chain transaction system Suddenly, including trading card generates, input and output, broadcast acknowledgements, and by encrypted metadata substitution original plaintext, is shown in friendship Among Yi Dan;The validation layer is used to verify whether encrypted data meet value consistency and be present in particular range.
  4. The intimacy protection system 4. multicenter block chain according to claim 3 is merchandised, it is characterised in that
    Alliance's management and control module is used for the piecemeal parameter that allied member obtains according to distribution, and joint of reaching common understanding generation system is handed over Easy parameter N, wherein any member can not learn that its trapdoor decomposes in the case of not up to threshold condition;
    The block catenary system transaction modules are used for transaction system input security parameter and alliance's parameter, output are used for The public key and private key of the generation of encryption and decryption computing are to (pki,ski), while export the public key pk for verifyingd, the public key without with To private key;
    The block catenary system transaction modules are used to calculate total input value of merchandising, wherein, if trading card is as the area newly confirmed Block, then it is that the part is close with original in plain text that the trading card, which will obtain extra bit coin expense as reward, total input value, The summation of literary mutually operation;If the trading card is not that new confirmation block is first single, no additional income, total input value is upper list The value that transaction is transmitted;
    The encrypting module is used for parallel encryption and represents transaction metadata through being carried out at the same time in the transaction layer and the validation layer Encryption, wherein, system distinguishes encrypted transmission number in the transaction layer using recipient's public key, while is used in the validation layer Each number of the identical number of system public key encryption;It will pass through rear hair in the validation layer in the encrypted number of the transaction layer Send to each recipient's account, it is noted that validation layer account will be entered in the encryption number that the validation layer is sent, it is noted that should Account abandons after this authentication without private key, the amount of money;
    Whether the number that the encrypting module and deciphering module are used for after validation layer verification is hidden is on the occasion of and input Whether equal export total value, wherein, the validation layer is divided into two steps, the first step by commitment value specific sections method of proof Prove the hiding amount of money be always on the occasion of;When for it is true when, whether the number after validation layer verification is hidden is on the occasion of rear, is System validation layer enters second step, and the equal method of proof of used two commitment values proves sum before and after hiding amount of money input and output It is equal;When step is true, into the sending link of the transaction layer;
    Progress the whole network broadcast trading card etc. is to be confirmed after the deciphering module checks and find correct for recipient, wherein, by processing Original cleartext information will hide ciphertext for that can not distinguish on trading card afterwards, to ensure that process of exchange is only possible analyzed The privacy of processing;
    After the block catenary system transaction modules are verified for the validation layer, the transaction layer sends out encrypted number Recipient is given, the recipient is decrypted according to the private key of oneself;The reception amount of money of oneself is being checked in the recipient just After really, continue next single transaction, the reception value of the recipient is next single input value.
  5. The intimacy protection system 5. multicenter block chain according to claim 4 is merchandised, it is characterised in that
    Allied member is secret to choose integer piAnd qi, run Π1RdmPara algorithms;
    Mould Integer N is calculated, wherein, run Π1CoN algorithms;
    Double primality tests, wherein, the allied member ensures product of the big Integer N for two prime numbers by algorithm, wherein, operation Π1BipriTest algorithms;
    Alliance's parameter and the generation of thresholding key, run Π1KeyGen algorithms, draw alliance's key.
  6. The intimacy protection system 6. multicenter block chain according to claim 4 is merchandised, it is characterised in that
    The transaction metadata is encrypted, wherein, run Π2PEnc algorithms;
    The transaction metadata is decrypted, wherein, run Π2PDec algorithms;
    Homomorphism operation is carried out to ciphertext, wherein, run Π3POper algorithms;
    Given (m, m'), promise calculating is carried out to plaintext secret, wherein, run Π3TCom algorithms;
    Verify the validity of commitment value, wherein, run Π3TVer algorithms;
    The different ciphertext values produced to transaction carry out the property shown promise and verify whether containing same metadata, wherein, run Π3's TIndic algorithms.
  7. The intimacy protection system 7. multicenter block chain according to claim 4 is merchandised, it is characterised in that
    Transaction input terminal total value is calculated, wherein, run Π5TIn algorithms;
    Transaction output terminal is directed toward according to path, wherein, run Π5TOut algorithms;
    Trading card is subjected to the whole network broadcast, wherein, run Π5TBroad algorithms;
    Absence from work without reason confirms trading card generation block according to common recognition mechanism, wherein, run Π5BCfm algorithms.
  8. The method for secret protection 8. a kind of multicenter block chain is merchandised, it is characterised in that comprise the following steps:
    Allied member is according to the obtained piecemeal parameter of distribution, the parameter N of joint of reaching common understanding generation system transaction, wherein arbitrarily into Member can not learn that its trapdoor decomposes in the case of not up to threshold condition;
    Transaction system inputs security parameter and alliance's parameter, public key and private key pair of the output for the generation of encryption and decryption computing (pki,ski), while export the public key pk for verifyingd, the public key is without pairing private key;
    Total input value of merchandising is calculated, wherein, if trading card will be obtained additionally as the block newly confirmed, the trading card The summation that bit coin expense is mutually operated with former ciphertext in plain text as reward, total input value for the part;If the trading card It is not that new confirmation block is first single, then without additional income, total input value is the value that upper single cross is easily transmitted;
    Parallel encryption represents transaction metadata through being carried out at the same time encryption in the transaction layer and the validation layer, wherein, system exists The transaction layer uses system public key encryption identical using recipient's public key difference encrypted transmission number, while in the validation layer Each number of number;It will be sent in the encrypted number of the transaction layer in the validation layer by rear to each recipient's account Family, it is noted that validation layer account will be entered in the encryption number that the validation layer is sent, it is noted that the account exists without private key, the amount of money Abandoned after verification;
    Number after validation layer verification is hidden whether be on the occasion of, and whether input and output total value equal, wherein, it is described Validation layer is divided into two steps, the first step by commitment value the method for proof of specific sections prove the hiding amount of money be always on the occasion of; When for it is true when, whether number after validation layer verification is hidden is on the occasion of rear, and system validation layer enters second step, used two Sum is equal before and after the equal method of proof of a commitment value proves hiding amount of money input and output;When step is true, enter The sending link of the transaction layer;
    Progress the whole network broadcast trading card etc. is to be confirmed after recipient checks and find correct, wherein, it is original on trading card after treatment Cleartext information will hide ciphertext for that can not distinguish, to ensure the privacy of the only possible analyzed processing of process of exchange;And
    After the validation layer is verified, encrypted number is sent to recipient, recipient's foundation by the transaction layer The private key of oneself is decrypted;The recipient check oneself the reception amount of money it is correct after, continue next single transaction, it is described The reception value of recipient is next single input value.
  9. The method for secret protection 9. multicenter block chain according to claim 8 is merchandised, it is characterised in that
    Make Π1=(rdmPara, coN, BipriTest, KeyGen) represents RSA thresholding cipher key schemes, wherein rdmPara, coN, BipriTest and KeyGen is respectively that the threshold parameter in the RSA thresholdings cipher key scheme distributes, joint generates mould integer, double Primality test and alliance's parameter generation;
    Make Π2=(PKeyGen, PEnc, PDec) represents homomorphism encryption and decryption scheme, and wherein PKeyGen, PEnc and PDec is respectively Key generation in the homomorphism encryption and decryption scheme, algorithms for encryption and decryption;
    Make Π3=(TKeyGen, TCom, TVer, TIndic) for representative promise to undertake proof scheme, wherein TKeyGen, TCom, Key in the respectively described property the shown promise proof schemes of TVer and TIndic is generated, promised to undertake, verifying and the property shown algorithm;
    Make Π4=(RKeyGen, RCom, RVer, RInact) represent scope promise to undertake proof scheme, wherein RKeyGen, RCom, RVer and RInact is respectively key generation, promise, verification and interactive algorithm in scheme;
    Make Π5=(TIn, TOut, TBroad, BCfm) represents class block chain transaction system scheme, wherein TIn, TOut, TBroad It is respectively transaction transmission, transaction acceptance, transaction broadcast and block confirmation in the class block chain transaction system scheme with BCfm.
  10. 10. multicenter block chain transaction method for secret protection according to claim 8 or claim 9, it is characterised in that the block Chain transaction system includes the transaction layer and the validation layer, wherein, the transaction layer is used to merchandise to performing the block chain The transaction step of system, including trading card generation, input and output, broadcast acknowledgements, and it is original by the substitution of encrypted metadata In plain text, it is shown among trading card;The validation layer is used to verify whether encrypted data meet value consistency and deposit It is particular range.
CN201711218249.XA 2017-11-28 2017-11-28 Multicenter block chain transaction intimacy protection system and method Pending CN108021821A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711218249.XA CN108021821A (en) 2017-11-28 2017-11-28 Multicenter block chain transaction intimacy protection system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711218249.XA CN108021821A (en) 2017-11-28 2017-11-28 Multicenter block chain transaction intimacy protection system and method

Publications (1)

Publication Number Publication Date
CN108021821A true CN108021821A (en) 2018-05-11

Family

ID=62077260

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711218249.XA Pending CN108021821A (en) 2017-11-28 2017-11-28 Multicenter block chain transaction intimacy protection system and method

Country Status (1)

Country Link
CN (1) CN108021821A (en)

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108718341A (en) * 2018-05-30 2018-10-30 北京阿尔山金融科技有限公司 Shared and search the method for data
CN108717634A (en) * 2018-05-16 2018-10-30 横琴密达科技有限责任公司 A kind of limitation block chain method of commerce and system
CN108833107A (en) * 2018-05-19 2018-11-16 深圳市图灵奇点智能科技有限公司 The common parameter generation method and system of zero-knowledge proof
CN108898490A (en) * 2018-06-25 2018-11-27 北京奇虎科技有限公司 Execution method, node, system, electronic equipment and the storage medium of intelligent contract
CN109146481A (en) * 2018-08-23 2019-01-04 泰链(厦门)科技有限公司 Account private key automatically imported method, medium, device and the block catenary system of block chain wallet
CN109190384A (en) * 2018-07-26 2019-01-11 百色学院 A kind of multicenter block chain fuse protection system and method
CN109194486A (en) * 2018-08-23 2019-01-11 东北大学 Believable cooperation model and data model, metadata storage and co-verification algorithm
CN109255250A (en) * 2018-09-21 2019-01-22 大连莫比嗨客智能科技有限公司 A kind of data safety encryption device and application method based on alliance's chain
CN109284627A (en) * 2018-09-10 2019-01-29 中山大学 A kind of reference prestige method and device based on block chain intelligence contract
CN109409890A (en) * 2018-11-13 2019-03-01 华瓴(南京)信息技术有限公司 A kind of electricity transaction system and method based on block chain
CN109447791A (en) * 2018-11-09 2019-03-08 北京邮电大学 A kind of funds transaction method and device based on block chain
CN109584055A (en) * 2018-09-20 2019-04-05 阿里巴巴集团控股有限公司 Method of commerce, device and remittance abroad method, apparatus based on block chain
CN109583886A (en) * 2018-09-30 2019-04-05 阿里巴巴集团控股有限公司 Method of commerce, device and remittance abroad method, apparatus based on block chain
CN109614809A (en) * 2018-12-13 2019-04-12 税友软件集团股份有限公司 A kind of electronic bill information ciphering method, device and computer readable storage medium
CN109615378A (en) * 2019-01-24 2019-04-12 上海点融信息科技有限责任公司 Multi-party computations method, apparatus and readable storage medium storing program for executing based on block chain
CN110033363A (en) * 2018-12-14 2019-07-19 阿里巴巴集团控股有限公司 Event-handling method and device, electronic equipment based on block chain
CN110059503A (en) * 2019-04-24 2019-07-26 成都派沃特科技股份有限公司 The retrospective leakage-preventing method of social information
CN110291756A (en) * 2018-11-07 2019-09-27 阿里巴巴集团控股有限公司 Restore encrypted transaction message in the transaction of block chain secret
CN110337665A (en) * 2018-11-27 2019-10-15 阿里巴巴集团控股有限公司 System and method for information protection
WO2019072300A3 (en) * 2018-12-21 2019-10-24 Alibaba Group Holding Limited Blockchain data protection based on generic account model and homomorphic encryption
CN110390212A (en) * 2019-07-31 2019-10-29 中国工商银行股份有限公司 Based on the supply of material monitoring method of block chain, node apparatus
CN110419055A (en) * 2018-11-07 2019-11-05 阿里巴巴集团控股有限公司 Block chain data protection based on the account bill model using zero-knowledge proof
CN110419053A (en) * 2018-11-27 2019-11-05 阿里巴巴集团控股有限公司 System and method for information protection
CN110505046A (en) * 2019-07-29 2019-11-26 深圳壹账通智能科技有限公司 The cross-platform Zero Knowledge method of calibration of more data providing encryption datas, device and medium
CN110517147A (en) * 2019-08-30 2019-11-29 深圳市网心科技有限公司 Transaction data processing method, device, system and computer readable storage medium
WO2019209168A3 (en) * 2018-04-26 2019-12-12 华为国际有限公司 Data processing method, related apparatus, and blockchain system
JP2019537348A (en) * 2018-11-07 2019-12-19 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Blockchain data protection using homomorphic encryption
EP3545483A4 (en) * 2018-11-07 2020-01-08 Alibaba Group Holding Limited Blockchain data protection using homomorphic encryption
WO2020011382A1 (en) * 2018-07-12 2020-01-16 Nokia Technologies Oy Enabling access to devices in a communication network
CN110730963A (en) * 2018-11-27 2020-01-24 阿里巴巴集团控股有限公司 System and method for information protection
WO2020033296A1 (en) * 2018-08-06 2020-02-13 Alibaba Group Holding Limited Method, apparatus and electronic device for blockchain transactions
CN110912713A (en) * 2019-12-20 2020-03-24 支付宝(杭州)信息技术有限公司 Method and device for processing model data by combining multiple parties
WO2020073124A1 (en) 2018-10-12 2020-04-16 Blackberry Limited Method and system for single purpose public keys for public ledgers
WO2020086219A1 (en) * 2018-10-26 2020-04-30 Alibaba Group Holding Limited Method, apparatus and electronic device for blockchain transactions
CN111259433A (en) * 2020-02-18 2020-06-09 重庆第二师范学院 Block chain privacy protection system
US10678931B2 (en) 2018-11-07 2020-06-09 Alibaba Group Holding Limited Regulating blockchain confidential transactions
CN111327415A (en) * 2018-12-13 2020-06-23 航天信息股份有限公司 Alliance link data protection method and device
CN111368309A (en) * 2018-12-26 2020-07-03 阿里巴巴集团控股有限公司 Information processing method, system and equipment
CN111429138A (en) * 2020-03-25 2020-07-17 中国工商银行股份有限公司 Block link point data safety interaction method and first interaction node
CN111489143A (en) * 2020-04-08 2020-08-04 中央财经大学 Auditable encrypted digital currency supervision method based on alliance side chain
CN111598701A (en) * 2020-05-22 2020-08-28 深圳市网心科技有限公司 Information monitoring method, system, equipment and storage medium
US10790987B2 (en) 2018-12-21 2020-09-29 Alibaba Group Holding Limited Blockchain data protection based on generic account model and homomorphic encryption
CN111885056A (en) * 2020-07-22 2020-11-03 北京金山云网络技术有限公司 Zero knowledge proving method and device based on block chain and electronic equipment
WO2020233425A1 (en) * 2019-05-20 2020-11-26 创新先进技术有限公司 Determination condition based receipt storage method and node
CN112236792A (en) * 2018-06-06 2021-01-15 E·马伊姆 Secure transaction system in P2P architecture
TWI724460B (en) * 2018-12-14 2021-04-11 開曼群島商創新先進技術有限公司 Block chain-based event processing method and device, and electronic equipment
CN112651740A (en) * 2018-08-30 2021-04-13 创新先进技术有限公司 Block chain transaction method and device and electronic equipment
CN112767153A (en) * 2019-02-01 2021-05-07 创新先进技术有限公司 Block chain transaction method and device, electronic equipment and storage medium
CN113343261A (en) * 2021-06-22 2021-09-03 南京邮电大学 Transaction privacy protection protocol based on threshold audit
CN113630411A (en) * 2021-08-05 2021-11-09 华中农业大学 Method and device for auditing multi-party privacy protection data on alliance block chain
US11341487B2 (en) 2018-12-29 2022-05-24 Advanced New Technologies Co., Ltd. System and method for information protection
US11405364B1 (en) 2021-03-04 2022-08-02 International Business Machines Corporation Privacy-preserving endorsements in blockchain transactions
CN115829754A (en) * 2023-02-16 2023-03-21 之江实验室 Privacy protection block chain oriented transaction supervision method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529951A (en) * 2016-12-30 2017-03-22 杭州云象网络技术有限公司 Node consensus verification method under league chain network through asynchronous mode
US20170155515A1 (en) * 2015-11-26 2017-06-01 International Business Machines Corporation System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
CN106911470A (en) * 2017-01-23 2017-06-30 北京航空航天大学 A kind of bit coin transaction privacy Enhancement Method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170155515A1 (en) * 2015-11-26 2017-06-01 International Business Machines Corporation System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
CN106529951A (en) * 2016-12-30 2017-03-22 杭州云象网络技术有限公司 Node consensus verification method under league chain network through asynchronous mode
CN106911470A (en) * 2017-01-23 2017-06-30 北京航空航天大学 A kind of bit coin transaction privacy Enhancement Method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DAN BONEH等: "Building Intrusion Tolerant Applications", 《PROCEEDINGS DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION》 *

Cited By (105)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111989891B (en) * 2018-04-26 2024-07-05 华为国际有限公司 Data processing method, related device and block chain system
WO2019209168A3 (en) * 2018-04-26 2019-12-12 华为国际有限公司 Data processing method, related apparatus, and blockchain system
CN111989891A (en) * 2018-04-26 2020-11-24 华为国际有限公司 Data processing method, related device and block chain system
CN108717634A (en) * 2018-05-16 2018-10-30 横琴密达科技有限责任公司 A kind of limitation block chain method of commerce and system
CN108833107A (en) * 2018-05-19 2018-11-16 深圳市图灵奇点智能科技有限公司 The common parameter generation method and system of zero-knowledge proof
CN108833107B (en) * 2018-05-19 2021-06-11 深圳市图灵奇点智能科技有限公司 Zero-knowledge proof public parameter generation method and system
CN108718341A (en) * 2018-05-30 2018-10-30 北京阿尔山金融科技有限公司 Shared and search the method for data
CN112236792A (en) * 2018-06-06 2021-01-15 E·马伊姆 Secure transaction system in P2P architecture
CN108898490A (en) * 2018-06-25 2018-11-27 北京奇虎科技有限公司 Execution method, node, system, electronic equipment and the storage medium of intelligent contract
WO2020011382A1 (en) * 2018-07-12 2020-01-16 Nokia Technologies Oy Enabling access to devices in a communication network
CN109190384A (en) * 2018-07-26 2019-01-11 百色学院 A kind of multicenter block chain fuse protection system and method
CN109190384B (en) * 2018-07-26 2022-02-22 百色学院 Multi-center block chain fusing protection system and method
CN111783114A (en) * 2018-08-06 2020-10-16 阿里巴巴集团控股有限公司 Block chain transaction method and device and electronic equipment
WO2020033296A1 (en) * 2018-08-06 2020-02-13 Alibaba Group Holding Limited Method, apparatus and electronic device for blockchain transactions
CN111783114B (en) * 2018-08-06 2024-04-02 创新先进技术有限公司 Block chain transaction method and device and electronic equipment
TWI786282B (en) * 2018-08-06 2022-12-11 開曼群島商創新先進技術有限公司 Block chain transaction method and device, electronic equipment
US11379826B2 (en) 2018-08-06 2022-07-05 Advanced New Technologies Co., Ltd. Method, apparatus and electronic device for blockchain transactions
US11244306B2 (en) 2018-08-06 2022-02-08 Advanced New Technologies Co., Ltd. Method, apparatus and electronic device for blockchain transactions
CN109194486A (en) * 2018-08-23 2019-01-11 东北大学 Believable cooperation model and data model, metadata storage and co-verification algorithm
CN109146481B (en) * 2018-08-23 2020-09-08 泰链(厦门)科技有限公司 Method, medium and device for automatically importing account private key of blockchain wallet and blockchain system
CN109146481A (en) * 2018-08-23 2019-01-04 泰链(厦门)科技有限公司 Account private key automatically imported method, medium, device and the block catenary system of block chain wallet
US11392942B2 (en) * 2018-08-30 2022-07-19 Advanced New Technologies Co., Ltd. Method, apparatus and electronic device for blockchain transactions
US11341492B2 (en) 2018-08-30 2022-05-24 Advanced New Technologies Co., Ltd. Method, apparatus and electronic device for blockchain transactions
CN112651740A (en) * 2018-08-30 2021-04-13 创新先进技术有限公司 Block chain transaction method and device and electronic equipment
CN109284627B (en) * 2018-09-10 2022-02-08 中山大学 Credit credit method and device based on block chain intelligent contract
CN109284627A (en) * 2018-09-10 2019-01-29 中山大学 A kind of reference prestige method and device based on block chain intelligence contract
US11032077B2 (en) 2018-09-20 2021-06-08 Advanced New Technologies Co., Ltd. Blockchain-based transaction method and apparatus, and remitter device
US12021993B2 (en) 2018-09-20 2024-06-25 Advanced New Technologies Co., Ltd. Blockchain-based transaction method and apparatus, and remitter device
CN109584055A (en) * 2018-09-20 2019-04-05 阿里巴巴集团控股有限公司 Method of commerce, device and remittance abroad method, apparatus based on block chain
CN111833186A (en) * 2018-09-20 2020-10-27 创新先进技术有限公司 Transaction method and device based on block chain and node equipment
CN111833186B (en) * 2018-09-20 2024-11-01 蚂蚁链技术有限公司 Transaction method, device and node equipment based on blockchain
CN109255250A (en) * 2018-09-21 2019-01-22 大连莫比嗨客智能科技有限公司 A kind of data safety encryption device and application method based on alliance's chain
US11050549B2 (en) 2018-09-30 2021-06-29 Advanced New Technologies Co., Ltd. Blockchain-based transaction method and apparatus, and remitter device
CN109583886A (en) * 2018-09-30 2019-04-05 阿里巴巴集团控股有限公司 Method of commerce, device and remittance abroad method, apparatus based on block chain
US11263630B2 (en) 2018-10-12 2022-03-01 Blackberry Limited Method and system for single purpose public keys for public ledgers
EP3834118A4 (en) * 2018-10-12 2021-09-15 BlackBerry Limited Method and system for single purpose public keys for public ledgers
WO2020073124A1 (en) 2018-10-12 2020-04-16 Blackberry Limited Method and system for single purpose public keys for public ledgers
EP4407477A3 (en) * 2018-10-12 2024-08-21 Malikie Innovations Limited Method and system for single purpose public keys for public ledgers
WO2020086219A1 (en) * 2018-10-26 2020-04-30 Alibaba Group Holding Limited Method, apparatus and electronic device for blockchain transactions
US11004070B2 (en) 2018-10-26 2021-05-11 Advanced New Technologies Co., Ltd. Method, apparatus and electronic device for blockchain transactions
US11258584B2 (en) 2018-10-26 2022-02-22 Advanced New Technologies Co., Ltd. Method, apparatus and electronic device for blockchain transactions
US11055709B2 (en) 2018-11-07 2021-07-06 Advanced New Technologies Co., Ltd. Recovering encrypted transaction information in blockchain confidential transactions
US10615960B2 (en) 2018-11-07 2020-04-07 Alibaba Group Holding Limited Blockchain data protection using homomorphic encryption
JP2019537348A (en) * 2018-11-07 2019-12-19 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Blockchain data protection using homomorphic encryption
US10664835B2 (en) 2018-11-07 2020-05-26 Alibaba Group Holding Limited Blockchain data protection using homomorphic encryption
RU2726157C1 (en) * 2018-11-07 2020-07-09 Алибаба Груп Холдинг Лимитед Recovering encrypted transaction information in confidential transactions with blockchain
CN110419055A (en) * 2018-11-07 2019-11-05 阿里巴巴集团控股有限公司 Block chain data protection based on the account bill model using zero-knowledge proof
CN110291756A (en) * 2018-11-07 2019-09-27 阿里巴巴集团控股有限公司 Restore encrypted transaction message in the transaction of block chain secret
RU2729595C1 (en) * 2018-11-07 2020-08-11 Алибаба Груп Холдинг Лимитед Protection of data of chains of blocks on basis of model of banknotes on accounts with proof with zero disclosure
EP3542336A4 (en) * 2018-11-07 2019-11-20 Alibaba Group Holding Limited Blockchain data protection based on account note model with zero-knowledge proof
CN110419055B (en) * 2018-11-07 2023-08-22 创新先进技术有限公司 Blockchain data protection based on account ticket model with zero knowledge proof
US10922421B2 (en) 2018-11-07 2021-02-16 Advanced New Technologies Co., Ltd. Regulating blockchain confidential transactions
US10678931B2 (en) 2018-11-07 2020-06-09 Alibaba Group Holding Limited Regulating blockchain confidential transactions
US11232442B2 (en) 2018-11-07 2022-01-25 Advanced New Technologies Co., Ltd. Recovering encrypted transaction information in blockchain confidential transactions
EP3545483A4 (en) * 2018-11-07 2020-01-08 Alibaba Group Holding Limited Blockchain data protection using homomorphic encryption
EP3829104A1 (en) * 2018-11-07 2021-06-02 Advanced New Technologies Co., Ltd. Blockchain data protection based on account note model with zero-knowledge proof
EP3545640A4 (en) * 2018-11-07 2020-01-08 Alibaba Group Holding Limited Blockchain data protection using homomorphic encryption
US11429962B2 (en) 2018-11-07 2022-08-30 Advanced New Technologies Co., Ltd. Recovering encrypted transaction information in blockchain confidential transactions
EP3549306A4 (en) * 2018-11-07 2020-01-01 Alibaba Group Holding Limited Recovering encrypted transaction information in blockchain confidential transactions
CN109447791B (en) * 2018-11-09 2021-07-16 北京邮电大学 Block chain-based fund transaction method and device
CN109447791A (en) * 2018-11-09 2019-03-08 北京邮电大学 A kind of funds transaction method and device based on block chain
CN109409890A (en) * 2018-11-13 2019-03-01 华瓴(南京)信息技术有限公司 A kind of electricity transaction system and method based on block chain
CN110730963A (en) * 2018-11-27 2020-01-24 阿里巴巴集团控股有限公司 System and method for information protection
CN110337665A (en) * 2018-11-27 2019-10-15 阿里巴巴集团控股有限公司 System and method for information protection
CN110337665B (en) * 2018-11-27 2023-06-06 创新先进技术有限公司 System and method for information protection
CN110730963B (en) * 2018-11-27 2023-12-01 创新先进技术有限公司 System and method for information protection
CN110419053B (en) * 2018-11-27 2023-12-01 创新先进技术有限公司 System and method for information protection
CN110419053A (en) * 2018-11-27 2019-11-05 阿里巴巴集团控股有限公司 System and method for information protection
CN109614809A (en) * 2018-12-13 2019-04-12 税友软件集团股份有限公司 A kind of electronic bill information ciphering method, device and computer readable storage medium
CN111327415A (en) * 2018-12-13 2020-06-23 航天信息股份有限公司 Alliance link data protection method and device
TWI724460B (en) * 2018-12-14 2021-04-11 開曼群島商創新先進技術有限公司 Block chain-based event processing method and device, and electronic equipment
CN110033363A (en) * 2018-12-14 2019-07-19 阿里巴巴集团控股有限公司 Event-handling method and device, electronic equipment based on block chain
CN110033363B (en) * 2018-12-14 2024-01-23 创新先进技术有限公司 Event processing method and device based on block chain and electronic equipment
US10790987B2 (en) 2018-12-21 2020-09-29 Alibaba Group Holding Limited Blockchain data protection based on generic account model and homomorphic encryption
US10680800B2 (en) 2018-12-21 2020-06-09 Alibaba Group Holding Limited Blockchain data protection based on generic account model and homomorphic encryption
US11063769B2 (en) 2018-12-21 2021-07-13 Advanced New Technologies Co., Ltd. Blockchain data protection based on generic account model and homomorphic encryption
CN111602161B (en) * 2018-12-21 2023-08-22 创新先进技术有限公司 Blockchain Data Protection Based on Universal Account Model and Homomorphic Encryption
CN111602161A (en) * 2018-12-21 2020-08-28 阿里巴巴集团控股有限公司 Block chain data protection based on general account model and homomorphic encryption
WO2019072300A3 (en) * 2018-12-21 2019-10-24 Alibaba Group Holding Limited Blockchain data protection based on generic account model and homomorphic encryption
US10708039B1 (en) 2018-12-21 2020-07-07 Alibaba Group Holding Limited Blockchain data protection based on generic account model and homomorphic encryption
CN111368309A (en) * 2018-12-26 2020-07-03 阿里巴巴集团控股有限公司 Information processing method, system and equipment
CN111368309B (en) * 2018-12-26 2024-03-29 阿里巴巴集团控股有限公司 Information processing method, system and equipment
US11341487B2 (en) 2018-12-29 2022-05-24 Advanced New Technologies Co., Ltd. System and method for information protection
US11416854B2 (en) 2018-12-29 2022-08-16 Advanced New Technologies Co., Ltd. System and method for information protection
CN109615378A (en) * 2019-01-24 2019-04-12 上海点融信息科技有限责任公司 Multi-party computations method, apparatus and readable storage medium storing program for executing based on block chain
CN112767153A (en) * 2019-02-01 2021-05-07 创新先进技术有限公司 Block chain transaction method and device, electronic equipment and storage medium
CN110059503A (en) * 2019-04-24 2019-07-26 成都派沃特科技股份有限公司 The retrospective leakage-preventing method of social information
CN110059503B (en) * 2019-04-24 2023-03-24 成都派沃特科技股份有限公司 Traceable social information anti-leakage method
WO2020233425A1 (en) * 2019-05-20 2020-11-26 创新先进技术有限公司 Determination condition based receipt storage method and node
CN110505046A (en) * 2019-07-29 2019-11-26 深圳壹账通智能科技有限公司 The cross-platform Zero Knowledge method of calibration of more data providing encryption datas, device and medium
CN110390212A (en) * 2019-07-31 2019-10-29 中国工商银行股份有限公司 Based on the supply of material monitoring method of block chain, node apparatus
CN110517147A (en) * 2019-08-30 2019-11-29 深圳市网心科技有限公司 Transaction data processing method, device, system and computer readable storage medium
CN110912713A (en) * 2019-12-20 2020-03-24 支付宝(杭州)信息技术有限公司 Method and device for processing model data by combining multiple parties
CN111259433A (en) * 2020-02-18 2020-06-09 重庆第二师范学院 Block chain privacy protection system
CN111429138A (en) * 2020-03-25 2020-07-17 中国工商银行股份有限公司 Block link point data safety interaction method and first interaction node
CN111489143A (en) * 2020-04-08 2020-08-04 中央财经大学 Auditable encrypted digital currency supervision method based on alliance side chain
CN111598701B (en) * 2020-05-22 2023-09-19 深圳市迅雷网络技术有限公司 Information monitoring method, system, equipment and storage medium
CN111598701A (en) * 2020-05-22 2020-08-28 深圳市网心科技有限公司 Information monitoring method, system, equipment and storage medium
CN111885056A (en) * 2020-07-22 2020-11-03 北京金山云网络技术有限公司 Zero knowledge proving method and device based on block chain and electronic equipment
US11405364B1 (en) 2021-03-04 2022-08-02 International Business Machines Corporation Privacy-preserving endorsements in blockchain transactions
CN113343261B (en) * 2021-06-22 2023-07-18 南京邮电大学 Transaction privacy protection method based on threshold audit
CN113343261A (en) * 2021-06-22 2021-09-03 南京邮电大学 Transaction privacy protection protocol based on threshold audit
CN113630411A (en) * 2021-08-05 2021-11-09 华中农业大学 Method and device for auditing multi-party privacy protection data on alliance block chain
CN113630411B (en) * 2021-08-05 2022-04-05 华中农业大学 Method and device for auditing multi-party privacy protection data on alliance block chain
CN115829754A (en) * 2023-02-16 2023-03-21 之江实验室 Privacy protection block chain oriented transaction supervision method and device

Similar Documents

Publication Publication Date Title
CN108021821A (en) Multicenter block chain transaction intimacy protection system and method
Delgado-Segura et al. A fair protocol for data trading based on bitcoin transactions
Mitani et al. Traceability in permissioned blockchain
CN111008836B (en) Privacy security transfer payment method, device, system and storage medium
Goldfeder et al. Escrow protocols for cryptocurrencies: How to buy physical goods using bitcoin
CN106911470B (en) Bit currency transaction privacy enhancement method
Garman et al. Accountable privacy for decentralized anonymous payments
Mercer Privacy on the blockchain: Unique ring signatures
US8051010B2 (en) Method for automatically validating a transaction, electronic payment system and computer program
Hasan Overview and applications of zero knowledge proof (ZKP)
CN115795518B (en) Block chain-based federal learning privacy protection method
Kokaras et al. The cost of privacy on blockchain: A study on sealed-bid auctions
Zhang et al. A fairness-aware and privacy-preserving online insurance application system
Sui et al. AuxChannel: Enabling efficient bi-directional channel for scriptless blockchains
Malhotra Bitcoin Protocol: Model of ‘Cryptographic Proof’Based Global Crypto-Currency & Electronic Payments System
Abadi et al. Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims
Howlader et al. Sealed‐bid auction: a cryptographic solution to bid‐rigging attack in the collusive environment
Huang et al. A black-box construction of strongly unforgeable signature schemes in the bounded leakage model
周志賢 On the Privacy of" User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking"
Hu et al. Verifying privacy-preserving financing orders on a consortium blockchain based on zk-snarks
Gowravaram Zero knowledge proofs and applications to financial regulation
Kuppuswamy et al. Securing E-commerce business using hybrid combination based on new symmetric key and RSA algorithm
Siva Sangari et al. A Survey on Homomorphic Encryption for Financial Cryptography Workout
Chen et al. ID-Based Certificateless Electronic Cash on Smart Card against Identity Theft and Financial Card Fraud
Yang Practical escrow protocol for cryptocurrencies

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180511