Methods of Realizing Privacy Protection in Blockchain

A privacy protection, blockchain technology, applied in the field of privacy protection

Active Publication Date: 2020-07-07
ADVANCED NEW TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Current solutions do not have a more flexible approach to privacy protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods of Realizing Privacy Protection in Blockchain
  • Methods of Realizing Privacy Protection in Blockchain
  • Methods of Realizing Privacy Protection in Blockchain

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0044]

[0045]

[0046] Generally, after this contract is deployed on the blockchain, the storage state corresponding to the state variable "balance" is plain text, and anyone can see its state, without privacy protection settings and capabilities. If users want to protect state privacy, the current zero-knowledge proof and homomorphic encryption solutions need to rewrite this contract to make the state variable "balance" encrypted and protected, and it needs to support all operations of balance in the encryption domain. . Generally, this kind of encryption method is complicated in operation, and it is difficult to design a suitable algorithm to support it in the encryption domain. In some solutions that combine blockchain and TEE, in order to achieve privacy protection, all contract states of smart contracts are stored on the blockchain as data that requires privacy protection. The blockchain is a data set stored in a database of a node and organized by a specific logic. Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application discloses a method for realizing privacy protection in the blockchain, including: the client encrypts the transaction containing the smart contract, and sends the encrypted transaction to the first blockchain node, and the smart contract The code includes the contract state indicated by the privacy identifier; the first blockchain node decrypts the code of the smart contract in the transaction, executes the code of the smart contract in a trusted execution environment, and converts the privacy When the contract state indicated by the identifier is written into the database, it is encrypted with a key. Using the embodiment of the present application, it is possible to flexibly encrypt the contract status marked with privacy protection.

Description

Technical field [0001] This application relates to the field of blockchain technology, and in particular to a method for realizing privacy protection in a blockchain. Background technique [0002] Blockchain technology is built on a transmission network (such as a peer-to-peer network). The network nodes in the transmission network use chained data structures to verify and store data, and use distributed node consensus algorithms to generate and update data. Nodes in these blockchain networks sometimes need to be increased. [0003] At present, the two biggest challenges of enterprise-level blockchain platform technology are privacy and performance. Often these two challenges are difficult to solve at the same time. Most of the solutions are to lose performance in exchange for privacy, or do not consider privacy to pursue performance. Common encryption technologies that solve privacy problems, such as Homomorphic encryption and Zero-knowledge proof, are highly complex, have poor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q40/04G06F21/60G06F21/62
CPCG06Q40/04G06F21/602G06F21/6218G06F2221/2107G06F2221/2105G06F21/64G06Q30/06H04L9/50H04L9/14H04L9/0825G06Q20/0658G06Q20/38215G06Q20/3829G06Q20/4014H04L9/0637H04L2209/56
Inventor 闫莺宋旭阳林立赵博然余逸荣
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products