De-anonymization method and system by combining block chain and secret sharing

A technology of secret sharing and anonymization, which is applied in the field of combining blockchain and cryptography to achieve the effects of dynamic supervision, privacy protection, and deanonymization

Inactive Publication Date: 2019-04-23
SUNING COM CO LTD
View PDF9 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the privacy and security problems of centralized anonymous storage in traditional social networks, how to design

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • De-anonymization method and system by combining block chain and secret sharing
  • De-anonymization method and system by combining block chain and secret sharing
  • De-anonymization method and system by combining block chain and secret sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0051]The basic scheme of a deanonymization method and system combining blockchain and secret sharing disclosed in the embodiment of the present invention is: the user generates a symmetric key locally and uses a symmetric encryption algorithm to encrypt his personal identity information and uploads it to the Blockchain to protect personal privacy; threshold secret sharing technology is used to realize the division of symmetric keys, and the divided encrypted sub-secrets are uploaded to the blockchain to realize the sharing of symmetric keys among members of the custodian organization; Under the joint action of the members of the institution, the symmetric key is recovered and the user identity information is decrypted to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a de-anonymization method and system by combining block chain and secret sharing. The method comprises the following steps: a user encrypts the own identity information, and segments a key corresponding to the encrypted identity information through a threshold secret sharing algorithm; the segmented sub-keys are held by various collocation mechanism members, the encrypted identity information and a collocation mechanism member public key and the sub-keys encrypted by the public key are uploaded to the block chain; each collocation mechanism member holding the sub-key recovers the own sub-key and sends the same to a supervision mechanism; the supervision mechanism reconstructs the encryption key according to the sub-keys, thereby decrypting the identity information of the user and realizing the de-anonymization of the user identity. Through the method and system disclosed by the invention, the personal privacy safety problem of the centralized anonymous storage in the traditional social networking service can be solved, and a supervision problem on the anonymous user is further solved.

Description

technical field [0001] The invention belongs to the technical field of combining blockchain and cryptography, and in particular relates to a deanonymization method and system combining blockchain and secret sharing. Background technique [0002] Personal privacy has always been an extremely important issue in the real world, and anonymity is an effective means of protecting privacy, which plays a role in protecting user privacy. However, anonymity also brings many serious challenges to supervision. Therefore, how to achieve deanonymization in anonymous scenarios is a key issue to be studied by the industry. [0003] Traditionally, aliases are often used to protect the anonymity of user identities. In order to realize the real-name authentication of pseudonyms and cooperate with the supervision of pseudonyms, most network operators adopt a centralized method to save the corresponding relationship between pseudonyms and real names. This centralized method leads to the complet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0825H04L9/085H04L9/0894
Inventor 宋沫飞徐志娟
Owner SUNING COM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products