Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Tamper-proofing timing data secret transmission method based on block chain smart contract

A smart contract and data confidentiality technology, applied in the blockchain field, can solve problems such as excessive deposits of middlemen and inability to deal with replacement attacks

Active Publication Date: 2019-07-05
HENAN UNIVERSITY
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to solve the problem that the intermediary deposit in the existing model is too large and cannot cope with the replacement attack, and propose a tamper-proof timing data confidential transmission method based on blockchain smart contracts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper-proofing timing data secret transmission method based on block chain smart contract
  • Tamper-proofing timing data secret transmission method based on block chain smart contract
  • Tamper-proofing timing data secret transmission method based on block chain smart contract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further explained below in conjunction with accompanying drawing and specific embodiment:

[0049] Such as figure 1 As shown, a tamper-proof timing data confidential transmission method based on blockchain smart contracts includes the following steps:

[0050] Step S101: The intermediary generates a public key and private key pair , so that the sender S uses the public key PubKey to perform secondary encryption on the transmitted ciphertext fragment and s It is sent to the intermediary at all times; the intermediary is generated by calling the intermediary registration contract registration on the network node on the public blockchain;

[0051] The intermediary registration contract enables any node in a public blockchain network to register as an intermediary. When a node registers as an intermediary, it needs to submit a part of funds as its own credit support, and this fund is recorded as d. At the same time, the intermediary needs to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of block chains, and discloses a tamper-proofing timing data secret transmission method based on a block chain smart contract, which comprises the following steps that: a man-in-the-middle generates a public key and a private key pair (PubKey, PrivKey), so that a sender S performs secondary encryption on a transmitted ciphertext fragment through the public key PubKey and sends the ciphertext fragment to the man-in-the-middle at the Ts moment; the man-in-the-middle receives the ciphertext fragment which is sent by the sender S at the Ts moment and isencrypted for the second time through the public key PubKey and performs decrypting at the moment close to the Tr moment to obtain an original ciphertext fragment, and transmits the original ciphertext fragment to a receiver R at the Tr moment, so that the receiver R judges whether the original ciphertext fragment received from a man-in-the-middle is tampered or not, and if the original ciphertext fragment is tampered, the man-in-the-middle is punished. According to the method, the man-in-the-middle cost can be greatly reduced, and the replacement attack of the ciphertext can be resisted.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a tamper-proof timing data confidential transmission method based on block chain smart contracts. Background technique [0002] Timed-Release Encryption (TRE) solves the problem of "sending a message that can only be decrypted after a specified time". Existing TRE solutions can be simply divided into two types: TLP and proxy server. The TLP solution is to realize TRE by solving some non-parallel computing problems. Due to the non-parallelism of the problem design, it can be estimated that it will take time to solve the problem. Use this as the time control for decryption. The proxy server scheme is divided into interactive proxy server (trusted proxy) and non-interactive server. Both methods set up a "time server", and the decryption is completed through the time trapdoor issued by the time server at a specified time. [0003] The limitations of existing TRE technologies...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0478H04L63/0823
Inventor 袁科曹淏文闫永航周黎鸣李征刘春王亚慧
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products