Blockchain data encryption method based on spatio-temporal information as a function model
A function model, data encryption technology, applied in the field of blockchain, to achieve the effect of improving strong confrontation and solving data security problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] A blockchain data encryption method based on spatio-temporal information as a function model, see figure 1 , including the following steps:
[0046] S1: Establish the identity information of all nodes on the blockchain according to preset conditions;
[0047] Specifically, identity information can be established based on preset complex conditions, and has accessible automated information. The identity information can be used to encrypt the address of the sending and receiving node to keep the address of the sending and receiving node secret, so that the intermediate node cannot decrypt without knowing the key information. In this method, the identity information of each node is unique in the whole network, so the conditions for establishing the identity information should meet certain basic unique function standards.
[0048] figure 2 A blockchain network constructed for this embodiment consists of eight blockchain nodes A to H. Suppose the identity information is ...
Embodiment 2
[0063] Embodiment 2 provides an encryption method on the basis of Embodiment 1.
[0064] After the node receives the ciphertext, decrypting the ciphertext in combination with the node's identity information specifically includes:
[0065] After the node receives the ciphertext, it reversely decrypts the address of the recipient in the ciphertext according to a preset reverse algorithm.
[0066] Specifically, when a node receives the information, it reversely calculates the Dst in the ciphertext and its own node information, see Table 1.
[0067] Table 1:
[0068]
[0069] The HComp column in Table 1 can be abbreviated as Dst / Src! =**, that is, the reverse operation performed by the method node when receiving the ciphertext is Dst / Src. In this method, except nodes A and F, any intermediate node does not know the information of the ciphertext sender and receiver, so they cannot accurately understand the keys of A and F, which increases the difficulty and complexity of decr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


