Unlock instant, AI-driven research and patent intelligence for your innovation.

Behavior verification method, node, system and electronic device in blockchain

A verification method, blockchain technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as inability to effectively verify data transaction behaviors, achieve network-wide supervision and ensure smooth progress Effect

Active Publication Date: 2022-01-25
BEIJING QIHOO TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a behavior verification method, node, system, electronic device and computer-readable storage medium in the blockchain, which can solve the problem that data transaction behavior cannot be effectively verified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior verification method, node, system and electronic device in blockchain
  • Behavior verification method, node, system and electronic device in blockchain
  • Behavior verification method, node, system and electronic device in blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] The embodiment of this application provides a behavior verification method in the block chain, such as figure 1 As shown, the method includes:

[0089] Step S101, use a random key to encrypt the target data corresponding to the first character string to obtain the first data, and send the first data to the second node, wherein the first character string is the target data that is encrypted using a homomorphic encryption algorithm The string obtained after encryption;

[0090] Step S102, receiving the signed second character string returned by the second node, where the second character string is a character string obtained by encrypting the first data by the second node using a homomorphic encryption algorithm;

[0091] Step S103, generating a verification message based on the signed second character string, the random key and the first character string, and sending the verification message to any node in the blockchain.

[0092] For example, the user of the second no...

Embodiment 2

[0097] The embodiment of the present application provides another possible implementation manner, which further includes the method shown in the second embodiment on the basis of the first embodiment.

[0098]Among them, the longer the key used for encryption, the more difficult it is to crack. Therefore, the random key in step S101 should be as long as possible, for example, the length of the random key can be in the same order of magnitude as the length of the target data, or the length of the random key is equal to the length of the target data, which helps Improve the security of data encryption.

[0099] However, the length of the target data is often very large. For example, the data volume of a picture is several megabytes, the data volume of a video reaches hundreds of megabytes, and the high-definition movie even reaches several gigabytes. When the length of the random key and the target data are in the same order of magnitude, it means that sending the random key to...

Embodiment 3

[0124] Based on the same inventive concepts as Embodiments 1 and 2, this embodiment provides a behavior verification method in a block chain, such as image 3 As shown, the method includes the following steps:

[0125] Step S301. Receive the verification message sent by the first node, and obtain the signed second character string corresponding to the verification message, the random key and the first character string, wherein the first character string is a homomorphic encryption algorithm used to encrypt the target The character string obtained after the data is encrypted, and the second character string is a character string obtained by encrypting the first data with a homomorphic encryption algorithm.

[0126] Step S302, according to the digital signature in the signed second character string, verify that the node that received the first data sent by the first node is the second node;

[0127] Step S303, according to the second character string, the random key and the fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application provides a behavior verification method, node, system and electronic equipment in the block chain. The method includes: using a random key to encrypt the target data corresponding to the first character string to obtain the first data, and sending the first data to the second node, wherein the first character string is the The string obtained after the data is encrypted; the second string after receiving the signature returned by the second node, the second string is the string obtained by encrypting the first data by the second node using the homomorphic encryption algorithm; based on the signature The second string, the random key, and the first string generate a verification message, and send the verification message to any node in the blockchain. In the technical solution of this application, without disclosing the original data, any node in the blockchain can verify any data transaction process, realizing the supervision of the whole network, ensuring the smooth progress of data transactions and the security of user data.

Description

technical field [0001] The present application relates to the technical field of block chain, specifically, the present application relates to a behavior verification method, node, system, electronic device and computer-readable storage medium in the block chain. Background technique [0002] With the advancement of Internet technology and the development of big data, the data that people come into contact with in life and work is increasing exponentially. It is difficult for users' personal storage media to meet people's needs. At the same time, it is quite inconvenient to share, so Shared storage has become a trend. [0003] In a shared storage system, users of each node can provide storage services to other users in the network, and users can store data in the storage media of other nodes, and when the data is needed, obtain it from the node that stores the data data. Since the user who stores the data provides the service of storing the data and providing the data, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0861H04L9/0863H04L9/0869H04L9/3226H04L9/3247H04L63/08H04L63/083
Inventor 胡宇光陈毅钟健男
Owner BEIJING QIHOO TECH CO LTD