Behavior verification method, node, system and electronic device in blockchain
A verification method, blockchain technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as inability to effectively verify data transaction behaviors, achieve network-wide supervision and ensure smooth progress Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0088] The embodiment of this application provides a behavior verification method in the block chain, such as figure 1 As shown, the method includes:
[0089] Step S101, use a random key to encrypt the target data corresponding to the first character string to obtain the first data, and send the first data to the second node, wherein the first character string is the target data that is encrypted using a homomorphic encryption algorithm The string obtained after encryption;
[0090] Step S102, receiving the signed second character string returned by the second node, where the second character string is a character string obtained by encrypting the first data by the second node using a homomorphic encryption algorithm;
[0091] Step S103, generating a verification message based on the signed second character string, the random key and the first character string, and sending the verification message to any node in the blockchain.
[0092] For example, the user of the second no...
Embodiment 2
[0097] The embodiment of the present application provides another possible implementation manner, which further includes the method shown in the second embodiment on the basis of the first embodiment.
[0098]Among them, the longer the key used for encryption, the more difficult it is to crack. Therefore, the random key in step S101 should be as long as possible, for example, the length of the random key can be in the same order of magnitude as the length of the target data, or the length of the random key is equal to the length of the target data, which helps Improve the security of data encryption.
[0099] However, the length of the target data is often very large. For example, the data volume of a picture is several megabytes, the data volume of a video reaches hundreds of megabytes, and the high-definition movie even reaches several gigabytes. When the length of the random key and the target data are in the same order of magnitude, it means that sending the random key to...
Embodiment 3
[0124] Based on the same inventive concepts as Embodiments 1 and 2, this embodiment provides a behavior verification method in a block chain, such as image 3 As shown, the method includes the following steps:
[0125] Step S301. Receive the verification message sent by the first node, and obtain the signed second character string corresponding to the verification message, the random key and the first character string, wherein the first character string is a homomorphic encryption algorithm used to encrypt the target The character string obtained after the data is encrypted, and the second character string is a character string obtained by encrypting the first data with a homomorphic encryption algorithm.
[0126] Step S302, according to the digital signature in the signed second character string, verify that the node that received the first data sent by the first node is the second node;
[0127] Step S303, according to the second character string, the random key and the fir...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


