Multi-party secure computing implementation method based on block chain technology

An implementation method, blockchain technology, applied in the field of multi-party security computing based on blockchain technology, can solve problems such as easy data leakage, low collaboration efficiency, and low security

Pending Publication Date: 2020-12-22
DATANG NETWORK CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two problems in this way: first, the synergy efficiency is very low
All the data of the smart contract is stored in all task nodes or accounting nodes. The security of the data depends entirely on the normal execution of the node engine. Once the node engine fails or has a loophole,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party secure computing implementation method based on block chain technology

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0030] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are part of the embodiments of the present invention, rather than all of them.

[0031] An embodiment of a multi-party secure computing implementation method based on blockchain technology as shown in the present invention, specifically includes the following steps:

[0032] Step 1. Compilation of smart contracts: The contract party corresponding to any demand side node that writes the smart contract acts as the initial initiator to write the smart contract. The smart contract written includes the node information of each contracting party, and each contracting party executes the contract. The tasks of the smart contract and the task execution relationship between the tasks; the content of the smart contract includes the state preservation and access interface of the ledger data, and the tasks...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-party security computing implementation method based on a blockchain technology. The method specifically comprises the following steps: step 1, compiling an intelligentcontract, wherein the intelligent contract comprises node information of each contract party, tasks of each contract party for executing the intelligent contract and task execution relationships among the tasks; step 2, publishing the intelligent contract: publishing the intelligent contract on the block chain; 3, determining an executable state: after the intelligent contract is authorized by related nodes of each contract party of the intelligent contract, determining the intelligent contract as the executable state; step 4, executing the intelligent contract, wherein different contract parties have own unique business accounts, log in node servers of nodes through node accounts of the nodes and execute tasks of the intelligent contract on the blockchain; and step 5, carrying out verification and recording of an execution result, wherein the nodes which do not participate in the intelligent contract carry out verification and state recording of the contract execution result. According to the invention, the problems of data security and privacy in the data cooperation process are solved.

Description

technical field [0001] The invention belongs to the technical field of block chains, and specifically refers to a method for implementing multi-party secure computing based on block chain technology. Background technique [0002] Multi-party secure computing means that in a distributed network, multiple users need to cooperate to complete a task. Each user holds some private data as the input of the task, and hopes to jointly complete the calculation of these data. At the same time, each user is required to Except for the calculation results, it is not possible to know any input information from other users. Secure multi-party computing is to solve the problem of completing collaborative computing between a group of distrusting parties under the premise of protecting privacy. Secure multi-party computing must ensure the independence of inputs and the correctness of calculations, while not disclosing each input data to participants other members of the calculation. It is ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/27G06F16/23G06F21/60G06Q40/04
CPCG06F16/27G06F16/2365G06F21/602G06Q40/04
Inventor 何照平高金龙金博
Owner DATANG NETWORK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products