Movatterモバイル変換


[0]ホーム

URL:


CN111144887A - Protection method for block chain shared data - Google Patents

Protection method for block chain shared data
Download PDF

Info

Publication number
CN111144887A
CN111144887ACN201911328648.0ACN201911328648ACN111144887ACN 111144887 ACN111144887 ACN 111144887ACN 201911328648 ACN201911328648 ACN 201911328648ACN 111144887 ACN111144887 ACN 111144887A
Authority
CN
China
Prior art keywords
matrix
transaction
code
verification
verification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911328648.0A
Other languages
Chinese (zh)
Inventor
李�杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liaoning Zhenxing Bank Co Ltd
Original Assignee
Liaoning Zhenxing Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liaoning Zhenxing Bank Co LtdfiledCriticalLiaoning Zhenxing Bank Co Ltd
Priority to CN201911328648.0ApriorityCriticalpatent/CN111144887A/en
Publication of CN111144887ApublicationCriticalpatent/CN111144887A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a protection method for shared data of a block chain, which relates to the technical field of block chains and comprises the following steps: extracting the same fields in a plurality of transactions: merging the same fields to obtain a verification code first matrix, a verification code second matrix and a verification code third matrix; verifying the verification code first matrix, the verification code second matrix and the verification code third matrix; and extracting fields of the same transaction from the verified certificate code one matrix, the verified certificate code two matrix and the verified certificate code three matrix, and forming a transaction code matrix. According to the scheme, the information in the same transaction is split and is packaged and verified together with the same split information in other transactions, so that the transaction efficiency is not influenced, and the number of transactions needing to be verified can be reduced under the condition of more transactions; in addition, the verifier does not know which parts are split in the same transaction under the condition that the hash of the complete transaction of the transaction party is not available, and the privacy protection of the transaction information can be improved.

Description

Protection method for block chain shared data
Technical Field
The invention relates to the technical field of block chains, in particular to a protection method for block chain shared data.
Background
Most of the uplink data of the current block chain adopts a mode of uplink transaction hash instead of plaintext to protect privacy of the uplink data, the uplink plaintext is not beneficial to protecting the privacy data of the transaction of both parties, and the uplink hash does not essentially store the data on the block chain network, and cannot realize the authority of sharing and controlling the sharing of the data on the chain, but only verifies the data. Moreover, the conventional transaction verification is a single transverse verification in one stroke, and the transactions are not related to each other; the scheme integrates multiple transactions into longitudinal verification, and the transactions are related to each other, such as: assuming that a plurality of transactions are initiated, the initiating parties are A, B, C, D and E respectively; the receivers are respectively a, b, c, d and e; the transaction finances are a ', b ', c ', d ', e ', respectively.
The conventional method is to separately and separately link up the verification for one transaction, and when the batch verification is required, the conventional method has many verification times, long time and low efficiency, so that a person skilled in the art provides a protection method for block chain shared data to solve the problems proposed in the background art.
Disclosure of Invention
The invention aims to provide a method for realizing data uplink sharing, protecting privacy and improving verification efficiency.
In order to achieve the purpose, the invention provides the following technical scheme:
a protection method for block chain shared data comprises the following steps:
step one, extracting the same fields in multiple transactions:
step two, merging the same fields to obtain a verification code first matrix, a verification code second matrix and a verification code third matrix;
step three, verifying the verification code first matrix, the verification code second matrix and the verification code third matrix;
and step four, extracting fields of the same transaction from the verified certificate code first matrix, the verified certificate code second matrix and the verified certificate code third matrix, and forming a transaction code matrix.
As a preferable scheme of the present invention, the specific operation steps in the step one are as follows: extracting the same fields in a plurality of transactions [ A, a ', a ], [ B, B', B ], [ C, C ', C ], [ D, D', D ], [ E, E ', E ], to obtain A, B, C, D, E, three groups of data of a', B ', C', D ', E' and a, B, C, D and E.
As a preferred embodiment of the present invention, the second step is specifically performed by combining A, B, C, D, E to generate a first matrix [ a, B, C, D, E ] of the verification code, combining a ', B ', C ', D ', E ' to generate a second matrix [ a ', B ', C ', D ', E ] of the verification code, and combining a, B, C, D, E to generate a third matrix [ a, B, C, D, E ] of the verification code.
As a preferred embodiment of the present invention, the specific operation steps in the second step include the following verification of three verification code matrices [ a, B, C, D, E ], [ a ', B', C ', D', E ], [ a, B, C, D, E ]:
a-sending a;
b-sending B-B;
c- -sending C- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -;
d-sending D;
e-sends E-E.
[ authentication code matrix one ] [ authentication code matrix two ] [ authentication code matrix three ].
As a preferred embodiment of the present invention, the specific operations in the fourth step include the following steps:
s1, setting N to hash (a, a', a), N being known only by the transaction initiator;
s2, setting a "to hash (a, N), where a" will follow field a as a field of transaction to uplink as an identifier;
s3, setting a '═ hash (a', N), where a 'will follow field a' to be a field of transaction for uplink as an identifier;
s4, telling the N to the other side, and the other side deduces A and a according to the N, namely deducing that N (A, a', a) belongs to a transaction, so that integration is realized.
Compared with the prior art, the invention has the beneficial effects that:
according to the scheme, the information in the same transaction is split and is packaged and verified together with the same split information in other transactions, the efficiency of the transaction is not affected, the number of transaction strokes to be verified can be reduced under the condition of more transactions, for example, 10 times of verification is carried out under the conventional condition of 10 transactions, if the number of splitting times of one transaction is less than 10 times, 10 transactions do not need to be verified, only the number of splitting strokes needs to be verified, more importantly, the privacy safety of the same transaction is protected, and a verifier does not know which parts are split in the same transaction under the condition of no hash of the complete transaction of a transaction party. Therefore, the technical scheme provided by the invention can improve the transaction verification efficiency and improve the privacy protection of the transaction information.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments of the present invention, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without any creative effort, shall fall within the protection scope of the present invention.
A protection method for block chain shared data comprises the following steps:
step one, extracting the same fields in multiple transactions:
step two, merging the same fields to obtain a verification code first matrix, a verification code second matrix and a verification code third matrix;
step three, verifying the verification code first matrix, the verification code second matrix and the verification code third matrix;
and step four, extracting fields of the same transaction from the verified certificate code first matrix, the verified certificate code second matrix and the verified certificate code third matrix, and forming a transaction code matrix.
Wherein, the specific operation steps in the step one are as follows: extracting the same fields in a plurality of transactions [ A, a ', a ], [ B, B', B ], [ C, C ', C ], [ D, D', D ], [ E, E ', E ], and obtaining A, B, C, D, E, three groups of data of a', B ', C', D ', E' and a, B, C, D and E.
The second step is specifically operated to combine A, B, C, D, E to generate a first verification code matrix (A, B, C, D, E), combine a ', B', C ', D', E 'to generate a second verification code matrix (a', B ', C', D ', E'), and combine a, B, C, D, E to generate a third verification code matrix (a, B, C, D, E).
The specific operation steps in the second step are to sequentially verify three verification code matrixes [ A, B, C, D, E ], [ a ', B', C ', D', E ], [ a, B, C, D, E ]:
a-sending a;
b-sending B-B;
c- -sending C- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -;
d-sending D;
e-sends E-E.
[ authentication code matrix one ] [ authentication code matrix two ] [ authentication code matrix three ].
The specific operation in the fourth step comprises the following steps:
s1, setting N to hash (a, a', a), N being known only by the transaction initiator;
s2, setting a "to hash (a, N), where a" will follow field a as a field of transaction to uplink as an identifier;
s3, setting a '═ hash (a', N), where a 'will follow field a' to be a field of transaction for uplink as an identifier;
s4, telling the other side N, the other side deduces A and a according to N, and then deduces that N [ A, a', a ] belongs to a same transaction, and integration is realized
Example one
Assume 4 transactions: the method comprises the following steps of (1) extracting identical fields in 4 transactions [ A, a ', a ], [ B, B', B ], [ C, C ', C ], [ D, D', D ], and obtaining A, B, C, D, a ', B', C ', D' and three groups of data of a, B, C and D; a, B, C, D are combined to generate a first verification code matrix (A, B, C, D), a ', B', C ', D' are combined to generate a second verification code matrix (a ', B', C ', D'), and a, B, C, D are combined to generate a third verification code matrix (a, B, C, D); the following verification is sequentially carried out on the three verification code matrixes of [ A, B, C and D ], [ a ', B', C ', D' ], and [ a, B, C and D ]:
a-sending a;
b-sending B-B;
c- -sending C- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -;
d-sending D;
[ authentication code matrix one ] [ authentication code matrix two ] [ authentication code matrix three ].
After verification is finished, setting N as hash (A, a', a), wherein N is only known by a transaction initiator;
setting A ═ hash (A, N), the A ″, which will follow field A as a field of transaction to carry on cochain, as the identification bit; setting a '″ as hash (a', N), the a 'will be linked up as an identification bit following the field a' as a field of transaction; telling the opposite side N, the opposite side deduces A and a according to N, and then deduces that N [ A, a', a ] belongs to a transaction, and integration is realized.
When the 5 transactions are checked by the conventional method, 5 checks are needed, but only three checks are needed by using the checking method provided by the invention.
Example two
Assume 7 transactions: three groups of data, A, B, C, D, E, F, G, a ', B', C ', a', [ B, B ', B ], [ C, C', C ], [ D, D ', D ], [ E, E', E ], [ F, F ', F ], [ G, G', G ], are obtained by extracting the same fields in 7 transactions [ A, a ', a ], [ B, B', B ], [ C, C ', C ], [ D, D', D ], [ E, E ', E ], [ F, F', [ G, G ', G ], and a, B, C, D, E, F, G'; a, B, C, D, E, F, G are combined to generate a first verification code matrix [ A, B, C, D, E, F, G ], a ', B ', C ', D ', E ', F ', G ' are combined to generate a second verification code matrix [ a ', B ', C ', D ', E ', F ', G ], a, B, C, D, E, F, G are combined to generate a third verification code matrix [ a, B, C, D, E, F, G ]; the following verification is sequentially performed on three verification code matrixes [ A, B, C, D, E, F, G ], [ a ', B ', C ', D ', E ', F ', G ' ], [ a, B, C, D, E, F and G ]:
a-sending a;
b-sending B-B;
c- -sending C- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -;
d-sending D;
e-sending E-E;
f- -sends F- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -;
g-sends G-G;
[ authentication code matrix one ] [ authentication code matrix two ] [ authentication code matrix three ].
After verification is finished, setting N as hash (A, a', a), wherein N is only known by a transaction initiator;
setting A ═ hash (A, N), the A ″, which will follow field A as a field of transaction to carry on cochain, as the identification bit; setting a '″ as hash (a', N), the a 'will be linked up as an identification bit following the field a' as a field of transaction; telling the opposite side N, the opposite side deduces A and a according to N, and then deduces that N [ A, a', a ] belongs to a transaction, and integration is realized.
When the 7 transactions are checked by the conventional method, 7 checks are needed, but only three checks are needed by using the checking method provided by the invention.
EXAMPLE III
Assume 10 transactions: the same fields in [ A, a ', a ], [ B, B ', B ], [ C, C ', C ], [ D, D ', D ], [ E, E ', E ], [ F, F ', F ] G, G ', G ], [ H, H ', H ], [ I, I ', I ], and [ J, J ', J ], 10 trades [ A, a ', a ], [ B, B ', B ], [ C, C ', C, [ D, D ', D ], [ E, E ', E ], [ F, F ', F ] G, G ', G, [ H, H ', H ], [ I, I ', I ], J, J ', J ], are extracted to obtain A, B, C, D, E, F, G, H, I, J, a ', B ', H ', D ', E ], and [ E, F ', G ], G ', H ', H ], and [ I, I ', I ], G ', C ', D ', e. f, g, h, i and j; a, B, C, D, E, F, G, H, I, J are combined to generate a first verification code matrix (A, B, C, D, E, F, G, H, I, J), a ', b', c ', d', e ', f', g ', h', i ', j' are combined to generate a second verification code matrix (a ', b', c ', d', e ', f', g ', h', i ', j'), and a, b, c, d, e, f, g, h, i, j are combined to generate a third verification code matrix (a, b, c, d, e, f, g, h, i, j); the following verification is sequentially performed on three verification code matrixes in the [ A, B, C, D, E, F, G, H, I, J ], [ a ', b', c ', d', e ', f', g ', h', i ', j' ], and [ a, b, c, d, e, f, g, h, i, j ]:
a-sending a;
b-sending B-B;
c- -sending C- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -;
d-sending D;
e-sending E-E;
f- -sends F- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -;
g-sends G-G;
h- -sending H- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -;
i-sending I-I;
j' - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -;
[ authentication code matrix one ] [ authentication code matrix two ] [ authentication code matrix three ].
After verification is finished, setting N as hash (A, a', a), wherein N is only known by a transaction initiator;
setting A ═ hash (A, N), the A ″, which will follow field A as a field of transaction to carry on cochain, as the identification bit; setting a '″ as hash (a', N), the a 'will be linked up as an identification bit following the field a' as a field of transaction; telling the opposite side N, the opposite side deduces A and a according to N, and then deduces that N [ A, a', a ] belongs to a transaction, and integration is realized.
While the 10 transactions are checked 10 times using conventional methods, it will be apparent to those skilled in the art that the present invention is not limited to the details of the exemplary embodiments described above, but may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (5)

CN201911328648.0A2019-12-202019-12-20Protection method for block chain shared dataPendingCN111144887A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201911328648.0ACN111144887A (en)2019-12-202019-12-20Protection method for block chain shared data

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201911328648.0ACN111144887A (en)2019-12-202019-12-20Protection method for block chain shared data

Publications (1)

Publication NumberPublication Date
CN111144887Atrue CN111144887A (en)2020-05-12

Family

ID=70519193

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201911328648.0APendingCN111144887A (en)2019-12-202019-12-20Protection method for block chain shared data

Country Status (1)

CountryLink
CN (1)CN111144887A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105577612A (en)*2014-10-112016-05-11中兴通讯股份有限公司Identity authentication method, third party server, merchant server, and user terminal
CN107885788A (en)*2017-10-182018-04-06上海瀚之友信息技术服务有限公司A kind of business datum check method
CN108023896A (en)*2017-12-282018-05-11江苏通付盾科技有限公司Block synchronous method and system
CN108053211A (en)*2017-12-272018-05-18北京欧链科技有限公司Transaction processing method and device based on block chain
CN108322309A (en)*2017-12-272018-07-24北京欧链科技有限公司Transaction processing method based on block chain and device
JP2018116578A (en)*2017-01-192018-07-26富士通株式会社 Information processing system, verification apparatus, information processing method, verification method, and program
CN108764909A (en)*2018-06-012018-11-06杭州复杂美科技有限公司A kind of block chain data monitoring and managing method
WO2018215872A1 (en)*2017-05-222018-11-29nChain Holdings LimitedTrustless deterministic state machine
CN109064146A (en)*2018-08-072018-12-21中钞信用卡产业发展有限公司杭州区块链技术研究院A kind of digital cash method of commerce, equipment, system, terminal and client wallet
CN109285006A (en)*2018-09-202019-01-29中链科技有限公司A kind of parallel proof processing method and processing device of block chain data
CN109544167A (en)*2018-11-162019-03-29北京三快在线科技有限公司Transaction data authentication method, apparatus, medium and electronic equipment
GB201907349D0 (en)*2019-05-242019-07-10Nchain Holdings LtdVerification of data fields of blockchain transactions
CN110245490A (en)*2019-05-202019-09-17阿里巴巴集团控股有限公司The receipt storage method and node of conditional combination code mark and type dimension
CN110309022A (en)*2019-05-222019-10-08平安银行股份有限公司 Method, simulator, device and storage medium for simulated transaction testing

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105577612A (en)*2014-10-112016-05-11中兴通讯股份有限公司Identity authentication method, third party server, merchant server, and user terminal
JP2018116578A (en)*2017-01-192018-07-26富士通株式会社 Information processing system, verification apparatus, information processing method, verification method, and program
WO2018215872A1 (en)*2017-05-222018-11-29nChain Holdings LimitedTrustless deterministic state machine
CN107885788A (en)*2017-10-182018-04-06上海瀚之友信息技术服务有限公司A kind of business datum check method
CN108053211A (en)*2017-12-272018-05-18北京欧链科技有限公司Transaction processing method and device based on block chain
CN108322309A (en)*2017-12-272018-07-24北京欧链科技有限公司Transaction processing method based on block chain and device
CN108023896A (en)*2017-12-282018-05-11江苏通付盾科技有限公司Block synchronous method and system
CN108764909A (en)*2018-06-012018-11-06杭州复杂美科技有限公司A kind of block chain data monitoring and managing method
CN109064146A (en)*2018-08-072018-12-21中钞信用卡产业发展有限公司杭州区块链技术研究院A kind of digital cash method of commerce, equipment, system, terminal and client wallet
CN109285006A (en)*2018-09-202019-01-29中链科技有限公司A kind of parallel proof processing method and processing device of block chain data
CN109544167A (en)*2018-11-162019-03-29北京三快在线科技有限公司Transaction data authentication method, apparatus, medium and electronic equipment
CN110245490A (en)*2019-05-202019-09-17阿里巴巴集团控股有限公司The receipt storage method and node of conditional combination code mark and type dimension
CN110309022A (en)*2019-05-222019-10-08平安银行股份有限公司 Method, simulator, device and storage medium for simulated transaction testing
GB201907349D0 (en)*2019-05-242019-07-10Nchain Holdings LtdVerification of data fields of blockchain transactions

Similar Documents

PublicationPublication DateTitle
US11121880B2 (en)Method for reaching consensus on public distributed ledgers and system using the same
CN113407977B (en)Cross-chain extension method and system based on aggregated signature
US8572378B2 (en)Method for protecting the first message of security protocol
CN105827304B (en)Satellite network anonymous authentication method based on gateway station
CN110868295B (en)Anti-quantum computing union chain system based on secret sharing and communication method
CN109450640A (en)Two side's endorsement methods and system based on SM2
CN112966283A (en)PPARM (vertical partition data parallel processor) method for solving intersection based on multi-party set
CN104484596A (en)Method and terminal for creating password in multi-operation system
CN106330838A (en)Dynamic signature method, client using the same and server
CN115379445A (en) A key derivation method and device, and network equipment
CN115189878A (en)Shared data sorting method based on secret sharing and electronic equipment
CN108566385B (en) Cloud-based two-way authentication method for efficient privacy protection
DE202023106573U1 (en) Communication network with data channel
Alwen et al.Collusion-free multiparty computation in the mediated model
US8612761B2 (en)Method of executing a cryptographic protocol between two electronic entities
CN111144887A (en)Protection method for block chain shared data
CN105187449A (en)Interface calling method and device
CN109697613B (en)Security authentication method and system for network transaction in block chain
DE102009008535B4 (en) Method and system for the secure transmission of a message
CN106991332A (en)The method and device that a kind of mass data is stored safely
CN103441989B (en)A kind of authentication, information processing method and device
CN109831303B (en)High-strength random encryption method capable of being realized by low-end 8-bit singlechip
CN105897398A (en)Key protection method and system for use in DES (Data Encryption Standard) encryption process
CN108900300A (en)A kind of efficient error verification and private key amplification method in continuous variable quantum key distribution
CN117955652A (en)Dynamic token authentication method and system based on mask technology

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20200512

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp