Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A tamper-proof timing data confidential transmission method based on blockchain smart contract

A technology of smart contracts and data confidentiality, applied in the field of blockchain, it can solve the problems of inability to deal with replacement attacks and excessive deposit of the middleman

Active Publication Date: 2021-06-11
HENAN UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to solve the problem that the intermediary deposit in the existing model is too large and cannot cope with the replacement attack, and propose a tamper-proof timing data confidential transmission method based on blockchain smart contracts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A tamper-proof timing data confidential transmission method based on blockchain smart contract
  • A tamper-proof timing data confidential transmission method based on blockchain smart contract
  • A tamper-proof timing data confidential transmission method based on blockchain smart contract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further explained below in conjunction with accompanying drawing and specific embodiment:

[0049] Such as figure 1 As shown, a tamper-proof timing data confidential transmission method based on blockchain smart contracts includes the following steps:

[0050] Step S101: The intermediary generates a public key and private key pair , so that the sender S uses the public key PubKey to perform secondary encryption on the transmitted ciphertext fragment and s It is sent to the intermediary at all times; the intermediary is generated by calling the intermediary registration contract registration on the network node on the public blockchain;

[0051] The intermediary registration contract enables any node in a public blockchain network to register as an intermediary. When a node registers as an intermediary, it needs to submit a part of funds as its own credit support, and this fund is recorded as d. At the same time, the intermediary needs to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of block chain, and discloses a tamper-proof timing data confidential transmission method based on block chain smart contract, including: a middleman generates a public key and a private key pair <pubkey,privkey>, so that the sender S uses the public key PubKey to perform secondary encryption on the transmitted ciphertext fragments and at T s Send to the intermediary at all times; the intermediary receives the sender S at T s The ciphertext fragments that are encrypted twice by the public key PubKey and sent at any time, and close to T r Decrypt at any time to get the original ciphertext fragment, at T r At time , the original ciphertext fragment is transmitted to the receiver R, so that the receiver R can judge whether the original ciphertext fragment received from the intermediary has been tampered with, and if tampered, the intermediary will be punished. The invention can greatly reduce the cost of the middleman, and can resist the replacement attack of the ciphertext at the same time.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to a tamper-proof timing data confidential transmission method based on block chain smart contracts. Background technique [0002] Timed-Release Encryption (TRE) solves the problem of "sending a message that can only be decrypted after a specified time". Existing TRE solutions can be simply divided into two types: TLP and proxy server. The TLP solution is to realize TRE by solving some non-parallel computing problems. Due to the non-parallelism of the problem design, it can be estimated that it will take time to solve the problem. Use this as the time control for decryption. The proxy server scheme is divided into interactive proxy server (trusted proxy) and non-interactive server. Both methods set up a "time server", and the decryption is completed through the time trapdoor issued by the time server at a specified time. [0003] The limitations of existing TRE technologies...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0478H04L63/0823
Inventor 袁科曹淏文闫永航周黎鸣李征刘春王亚慧
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products