A blockchain multi-party data sharing method based on secret sharing technology
A technology of secret sharing and data sharing, applied in the field of blockchain, it can solve the problems of unsafe secret reconstruction and cannot effectively guarantee the fairness of participants, and achieve the effect of improving work efficiency and reducing workload.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0055] figure 1 An implementation form according to the present invention is shown, and the main process of blockchain multi-party data sharing based on secret sharing technology is shown, and the main implementation steps include:
[0056] (1) Participant P i Multi-party key negotiation and distribution;
[0057] (2) Authorized P i get session key k i , Unauthorized users apply for authorization or do not participate in this data sharing;
[0058] (3) According to the number of participants, formulate a multi-party limited data sharing agreement to ensure the stability of the data sharing process and data security;
[0059] (4) The homomorphic secret sharing method is used to realize the collaborative sharing of data among multi-party related participants in the blockchain;
[0060] (5) The data is calculated by Verify the completion commitment status of each participant's shared data. Participants who meet the conditions can reconstruct the data and obtain the deposit...
Embodiment 2
[0079] figure 2 An implementation form according to the present invention is shown, showing that the data sharing protocol is formulated based on the above key encryption operation and completion, and also includes a process of verifying sub-data to ensure the correctness of the shared data. The root hash generated by the Merkle hash tree in the blockchain can be used as the only identity proof of the data file in the current state on the one hand, and can also be used as a parameter to prove the integrity of the data. The verification process is similar to common blockchain transaction verification. The present invention allocates a piece of data as a whole into sub-data, and the sub-data is easier to restore than the overall data, so the present invention also includes the operation of restoring damaged or lost data. The specific implementation process of data verification and recovery includes:
[0080] 1.1 Participant P i owns subdata share d i and put d i and its ve...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com