Blockchain data sharing encryption and decryption method, equipment, and storage medium

A data sharing and encryption method technology, applied in the blockchain field, can solve problems such as low credibility, differences in data calculation results, false information, etc.

Active Publication Date: 2020-07-07
湖南智慧政务区块链科技有限公司
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Homomorphic encryption has a limiting feature, that is, the encrypted data comes from the same secret key to perform homomorphic calculations. When the sources of metadata come from different users, and different users do not want their data to be known by others, a single Homomorphic encryption algorithm still cannot meet the requirements
[0004] The existing technology needs to share the secret key of homomorphic encryption. Once it is leaked and used by the attacker, false information will be generated, resulting in discrepancies in data calculation results. All protocol parties sharing the secret key must replace the secret key of homomorphic encryption
Moreover, many operations are carried out off-chain, and there are some black-box operations in algorithms and data, and the credibility is not very high
In terms of efficiency, multiple messages need to be passed on and off the chain, which is relatively inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain data sharing encryption and decryption method, equipment, and storage medium
  • Blockchain data sharing encryption and decryption method, equipment, and storage medium
  • Blockchain data sharing encryption and decryption method, equipment, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] A blockchain data sharing encryption method, such as figure 1 , 3 As shown, it includes: at least one first party creates a homomorphic proxy re-encryption key pair private key A and public key A1; encrypts plaintext a to obtain ciphertext a1; uploads ciphertext a1 to the blockchain; at least one first The two parties create a homomorphic proxy re-encryption key pair private key B and public key B1; encrypt the plaintext b to obtain the ciphertext b1; upload the ciphertext b1 to the blockchain; The smart contract of the blockchain obtains the public key C1; the first party re-encrypts the public key C1 and the private key A, obtains the key rekeyA, and uploads it to the blockchain; the second party re-encrypts the public key C1 and the private key B. The agent re-encrypts, obtains the key rekeyB, and uploads it to the blockchain; among them, the smart contract creates the key pair private key C and public key C1 through homomorphic encryption.

[0033] The proxy re-en...

Embodiment 2

[0036] A blockchain data sharing decryption method, according to a blockchain data sharing encryption method described in Embodiment 1, such as figure 2 , 3 It includes: the smart contract re-encrypts the ciphertext a1 with the key rekeyA to obtain the re-encrypted ciphertext a2; the smart contract re-encrypts the ciphertext b1 with the key rekeyB to obtain the re-encrypted ciphertext b2; the smart contract re-encrypts the ciphertext b2 The ciphertext a2 and the re-encrypted ciphertext b2 are subjected to homomorphic calculation to obtain the ciphertext c2; the smart contract decrypts the ciphertext c2 with the private key C to obtain the plaintext c1, which is the same as the calculation result of the plaintext a and the plaintext b. The proxy re-encryption is based on multiple re-encryption algorithms, such as bls12, or bn256. The homomorphic encryption algorithm is rsa-based multiplication homomorphism, Paillier's additive homomorphism, or Gentry full homomorphism.

[00...

Embodiment 3

[0039] An apparatus comprising: one or more processors; a memory for storing one or more programs that, when executed by the one or more processors, cause the one or more programs One or more processors perform the method as described above.

[0040] A storage medium storing a computer program, when the program is executed by a processor, implements the method described in Embodiment 1 above.

[0041] Figure 4 It is a schematic structural diagram of a device provided by an embodiment of the present invention.

[0042] like Figure 4 As shown, as another aspect, the present application also provides a device 500, comprising one or more central processing units (CPUs) 501, which can operate according to a program stored in a read only memory (ROM) 502 or from a storage portion 508 performs various appropriate actions and processes by loading a program into random access memory (RAM) 503 . In the RAM 503, various programs and data necessary for the operation of the device 500 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a blockchain data sharing encryption and decryption method, equipment and a storage medium, which belong to the technical field of blockchains. The blockchain data sharing encryption and decryption method comprises the steps of: creating a homomorphic proxy re-encryption key pair private key A and public key A1 by at least one first party; encrypting a plaintext a to obtaina ciphertext a1; uploading the ciphertext a1 to a blockchain; creating a homomorphic proxy re-encryption key pair private key B and public key B1 by at least one second party; encrypting a plaintextb to obtain a ciphertext b1; uploading the ciphertext b1 to the blockchain; acquiring a public key C1 from an intelligent contract of the blockchain by the first party and the second party; performingproxy re-encryption on the public key C1 and the private key A to obtain a secret key rekey A by the first party, and uploading the secret key rekey A to the blockchain; and performing proxy re-encryption on the public key C1 and the private key B to obtain a secret key rekey B by the second party, and uploading the secret key rekey B to the blockchain, wherein the intelligent contract creates akey pair private C and public key C1 through homomorphic encryption. The blockchain data sharing encryption and decryption method solves the homomorphic problem of conducting safety calculation basedon private data of the blockchain, reduces the interaction process between users and the blockchain and between the users, moves some operations under the chain to the chain, and makes calculation more credible.

Description

technical field [0001] The present invention relates to the field of blockchain technology, and in particular, to a blockchain data sharing encryption and decryption method, device and storage medium. Background technique [0002] Blockchain-based secure computing is a major technical background. Blockchain has the characteristics of openness and transparency. For private data, more encryption calculations are required for data protection. Secure computing is also an important research topic for blockchain to computable private data. The existing technical solution is that the user establishes a secret key sharing scheme under the chain, encrypts the data with the same secret key, and then uploads the data to the chain. The smart contract on the chain performs safe and reliable calculation on the data, and the calculation result is obtained from the chain. After that, the off-chain account decrypts and proves that the calculation is true through zero-knowledge proof, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/00
CPCH04L63/0428H04L9/008H04L67/06H04L9/50
Inventor 谢超良赵辉王超
Owner 湖南智慧政务区块链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products