Two-party security privacy comparison method based on block chain

A blockchain and secure technology, applied in the field of privacy comparison technology based on two-party secure computing, can solve the problem of user privacy not being guaranteed, and achieve the effect of ensuring security

Active Publication Date: 2020-06-02
HANGZHOU QULIAN TECH CO LTD
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

All transaction data in the blockchain is open and transparent. Although the security of each transaction is guaranteed, the privacy of users is not guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-party security privacy comparison method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The purpose and effect of the present invention will become more obvious by describing the present invention in detail according to the accompanying drawings and specific embodiments. The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0021] The two-party security and privacy comparison method based on block chain of the present invention, its process is as follows figure 1 As shown, it specifically includes the following steps:

[0022] (1) Participant C 1 and C 2 Establish a session to agree on a certain resource S to be compared, and agree on the comparison rules, and upload the session record to the blockchain.

[0023] (2)C 1 and C 2 Establish a long-term connection with security authentication and perform data transmission and comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-party security privacy comparison method based on a block chain. The two-party security privacy comparison method based on the block chain is used for comparing a certainresource in a data sharing platform under the condition that two participating parties do not leak own information and do not know the opposite parties. The two participating parties firstly agree resources to be compared; communication connection is established between participating parties, then, one party decomposes resources to be compared into a plurality of atomic data; the atomic data areencrypted, a ciphertext is transmitted to the other party by using an unintentional transmission protocol, and the other party participating in the encryption also decomposes the own data into a plurality of atomic data, encrypts the atomic data, compares the encrypted atomic data with the received data according to the circuit table, and returns a final comparison result to the other party. According to the comparison method, data privacy protection is achieved to a certain extent.

Description

technical field [0001] The present invention relates to the field of blockchain, privacy protection, secure multi-party computing, and in particular to a privacy comparison technology based on two-party secure computing. Its application scenarios mainly include electronic elections, electronic auctions and other fields. Background technique [0002] The essence of blockchain is a decentralized distributed ledger, which is mainly used to solve the trust and security issues of transactions. Each node on the blockchain has the contents of the entire ledger, so each node can verify the legitimacy of the transaction, and to a large extent prevent one or some nodes from making false accounts. Transactions on the blockchain are public, but account identity information is encrypted with public-private key technology, and only the data owner can view it, ensuring data security and privacy. The blockchain also ensures the consistency of all nodes through a consensus mechanism. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60
CPCG06F21/6245G06F21/602
Inventor 李伟邱炜伟尹可挺李启雷梁秀波孙飞宇
Owner HANGZHOU QULIAN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products