Undeniable secure data transmission method based on block chain

A technology for secure data and transmission methods, applied in the field of undeniable secure data transmission based on blockchain, which can solve the problems of cost, low efficiency, and the difficulty of long-term safe preservation of evidence.

Active Publication Date: 2019-09-10
SICHUAN UNIV
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing non-repudiation data transmission scheme, if a trusted third party is not introduced, both parties of the data transmission need to confirm the non-repudiation of both parties through multiple transmissions of data fragmentation, zero-knowledge proof, digital signature, etc., which is usually more efficient. Low; if a trusted third party is introduced, the two parties can interact through the trusted third party as an intermediary (such as key distribution, receipt confirmation, etc.), but the introduction of a trusted third party will incur additional costs and it is difficult to find qualified trusted third party
In addition, both of the above two methods require participants or trusted third parties to store undeniable evidence of data transmission. Considering business migration, storage capacity limitations or human operation errors, such evidence is not easy to store safely for a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Undeniable secure data transmission method based on block chain
  • Undeniable secure data transmission method based on block chain
  • Undeniable secure data transmission method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0035] Deploy the smart contract first and disclose the contract address. Participants who need to transfer data undeniably can call any function in the smart contract through this address. Smart contracts can be applied to multiple transmission instances, and different instances are identified with different random numbers L. Considering the existence of malicious parties, a blockchain-based undeniable secure data transmission method includes the following steps:

[0036] (1) The recipient locally generates a temporary public-private key pair (sk tem ,pk tem ), and the temporary public key pk tem and your own blockchain account address Add R Sent to the sender via a normal channel independent of the blockchain.

[0037] (2) After receiving the receiver's temporary public key and blockchain account address, the data sender genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a non-deniable secure data transmission method based on a block chain. The method comprises the following steps that: (1) a receiver generates a temporary public and private key pair and sends a public key and a block chain account address thereof to a sender; (2) uploading initialization parameters to the intelligent contract in the sending direction; (3) the sending end pays the guarantee money to the intelligent contract; (4) receiving the deposit paid to the intelligent contract; (5) the sender sends the ciphertext and the digital signature of the ciphertext hash value to the receiver; (6) after the receiver obtains the ciphertext, a ciphertext hash value is disclosed to the intelligent contract; (7) the sending direction intelligent contract publicly uses the temporary public key to encrypt the ciphertext obtained by the secret key; and (8) the receiver obtains the ciphertext in the step (7) from the block chain, decrypts the original key by using the temporary private key and publishes the key hash value to the smart contract, and the smart contract returns the guarantee money of the two parties. The method and the device can be used for effectively realizing non-repudiation of a sender and a receiver on a transmission behavior in a secure data transmission process.

Description

technical field [0001] The invention relates to a data transmission method, in particular to a blockchain-based undeniable secure data transmission method. Background technique [0002] Blockchain and smart contracts: Blockchain technology, as a distributed digital ledger technology, with the help of cryptography, allows people to build confidence in mutual collaboration without the supervision of a central authority, and realizes in a distributed network Decentralization of multilateral transactions. All nodes in the blockchain keep the same digital ledger, and the contents of the ledger are open to everyone, and once the data is uploaded to the chain and stored in the ledger, it cannot be tampered with. At present, there are several blockchain technology platforms in the world for the research of blockchain technology and its applications. The Ethereum project (Ethereum) and Hyperledger Fabric (Hyperledger Fabric) that support smart contracts are representative platforms...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06F21/64H04L9/32H04L29/06
CPCG06F21/64G06Q20/3827G06Q20/3829H04L9/3236H04L9/3247H04L63/045H04L63/0876H04L63/18
Inventor 陈兴蜀金泓键兰晓张红霞曹琪
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products