Unlock instant, AI-driven research and patent intelligence for your innovation.

Blockchain data encryption method based on spatio-temporal information as a function model

A function model, data encryption technology, applied in the field of blockchain, to achieve the effect of improving strong confrontation and solving data security problems

Active Publication Date: 2022-04-05
开采夫(杭州)科技有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the defects in the prior art, the present invention provides a block chain data encryption method involving spatiotemporal information as a function model, realizes multi-layer encryption with dynamically changing keys, and improves the strong resistance of encryption, thereby solving the problem of block chain data encryption. Data security issues during communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain data encryption method based on spatio-temporal information as a function model
  • Blockchain data encryption method based on spatio-temporal information as a function model
  • Blockchain data encryption method based on spatio-temporal information as a function model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] A blockchain data encryption method based on spatio-temporal information as a function model, see figure 1 , including the following steps:

[0046] S1: Establish the identity information of all nodes on the blockchain according to preset conditions;

[0047] Specifically, identity information can be established based on preset complex conditions, and has accessible automated information. The identity information can be used to encrypt the address of the sending and receiving node to keep the address of the sending and receiving node secret, so that the intermediate node cannot decrypt without knowing the key information. In this method, the identity information of each node is unique in the whole network, so the conditions for establishing the identity information should meet certain basic unique function standards.

[0048] figure 2 A blockchain network constructed for this embodiment consists of eight blockchain nodes A to H. Suppose the identity information is ...

Embodiment 2

[0063] Embodiment 2 provides an encryption method on the basis of Embodiment 1.

[0064] After the node receives the ciphertext, decrypting the ciphertext in combination with the node's identity information specifically includes:

[0065] After the node receives the ciphertext, it reversely decrypts the address of the recipient in the ciphertext according to a preset reverse algorithm.

[0066] Specifically, when a node receives the information, it reversely calculates the Dst in the ciphertext and its own node information, see Table 1.

[0067] Table 1:

[0068]

[0069] The HComp column in Table 1 can be abbreviated as Dst / Src! =**, that is, the reverse operation performed by the method node when receiving the ciphertext is Dst / Src. In this method, except nodes A and F, any intermediate node does not know the information of the ciphertext sender and receiver, so they cannot accurately understand the keys of A and F, which increases the difficulty and complexity of decr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The block chain data encryption method with space-time information as a function model provided by the present invention establishes the identity information of all nodes on the block chain; when the initial sender node sends data, the identity information of the initial sender node is used, and finally The identity information and space-time information of the receiver node encrypt the data to obtain the ciphertext; the initial sender node broadcasts the ciphertext to the adjacent nodes; when the node receives the ciphertext, it combines the identity information of the node to The ciphertext is decrypted; if the decryption result is different from the node’s identity information, use the node information and space-time information of the node to encrypt, and then continue to broadcast to adjacent nodes; if the decryption result is the same as the node’s identity information, use The node's identity information decrypts the ciphertext to obtain the plaintext. This method realizes multi-layer encryption with dynamically changing keys, improves the strong resistance of encryption, and thus solves the data security problem in the communication process of the blockchain.

Description

technical field [0001] The invention belongs to the technical field of block chains, and in particular relates to a block chain data encryption method using spatiotemporal information as a function model. Background technique [0002] In the application process of blockchain, encryption is a very important part, and a large amount of sensitive information is transmitted in the open network, which faces great risks. The current blockchain data encryption mainly includes two methods based on stealth algorithms and computing power suppression. [0003] 1. Data encryption based on stealth algorithm. [0004] Based on an anonymous algorithm, the bits of the original data are rearranged, reorganized, transformed, etc. When used, the encryption is reversed through the matching decryption algorithm to obtain the original data. The data cannot be decrypted without knowing the decryption algorithm, thus creating encryption. For example, modern cipher telegraphs, encryption machines...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/1095H04L45/745
CPCH04L63/0464H04L67/1095H04L45/745
Inventor 于庆冰
Owner 开采夫(杭州)科技有限公司