Method for supervisor to share sensitive data in alliance chain scene based on group negotiation key

A technology for sensitive data and regulators, applied in digital data authentication, digital data protection, electronic digital data processing, etc., can solve the problem of session key efficiency and affect the efficient, orderly, credible and centralized organization of digital economic activities high cost etc.

Pending Publication Date: 2022-03-25
江苏众享金联科技有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing publication number is CN108055274A, which is based on an encryption and sharing method of alliance chain storage data and the system proposes and solves the technical defects in customer service existing book encryption methods and sharing, but the problem of trust building has gradually become a pain point in the industry. On the one hand, centralized institutions generally have problems such as high cost, low efficiency, and insecure data storage; on the other hand, it is difficult for groups that do not trust each other in the network to quickly establish trust at a low cost, which affects the efficient and orderly nature of digital economic activities. , credibly, the supervisor is usually not undertaken by a single node, but multiple nodes from different interest groups share the supervision responsibility to prevent the control of powerful organizations and avoid problems such as single point of failure
Therefore, there are scenarios where multiple regulators need to know the private data of a certain transaction, which brings about the efficiency of session key sharing. For this reason, we propose a group-negotiated key-based consortium chain supervision ways to share sensitive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for supervisor to share sensitive data in alliance chain scene based on group negotiation key
  • Method for supervisor to share sensitive data in alliance chain scene based on group negotiation key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] The present invention proposes a method for regulators to share sensitive data in a consortium chain scenario based on group negotiation keys. The flow chart is as follows: figure 1As shown, node P 1 with node P 2 For transactions, the specific transaction information is divided into plain text part D 1 and ciphertext part D 2 , where D 2 by P 1 with P 2 The agreed upon session key is encrypted.

[0047] The inventive method has the following steps:

[0048] S1: The certification center generates system parameters and submits relevant system parameters to the alliance chain;

[0049] S2: The regulator group joins the alliance chain network, and completes their own key registration and generation according to the system parameters and other information on the chain, and then submits public information such as public key and registration identification information to the alliance chain;

[0050] S3: Each regulator obtains the public information from the alliance c...

Embodiment 2

[0055] The present invention is a method for regulators to share sensitive data in a consortium chain scenario based on group negotiation keys. The transaction sensitive data authorization scenario discussed is as follows: figure 2 As shown, there are n supervisors in the supervisor set U {u 1 ,u 2 ,...,u n}, each regulator needs to obtain the data used to encrypt sensitive data D 2 session key.

[0056] Specifically, the present invention has the following steps:

[0057] S1: The certification center generates system parameters and submits relevant system parameters to the alliance chain;

[0058] Its sub-steps are:

[0059] S1.1: Build a consortium chain network;

[0060] S1.2: The certification center generates relevant system parameters params based on the bilinear pairing of the elliptic curve group;

[0061] S1.3: The certification center submits relevant system parameters params to the alliance chain.

[0062] S2: The regulator group joins the alliance chain ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to a method for a supervisor to share sensitive data in an alliance chain scene based on a group negotiation key in the technical field of alliance chain content supervision, and the method comprises the following steps: S1, generating system parameters by an authentication center, and submitting the related system parameters to an alliance chain; s2, a supervisor group joins the alliance chain network, completes respective secret key registration and generation according to information such as system parameters on the chain, and submits public information such as a public key and registration identification information to the alliance chain; and S3, obtaining the public information from the alliance chain by each supervisor, calculating to obtain corresponding broadcast information, uploading the broadcast information to the alliance chain, and storing a private message value locally at the same time. The method has the beneficial effects that the block chain which has the characteristics of decentralization, tampering difficulty, traceability and the like is proposed, the safe sharing of account book data can be realized by applying means of data encryption, timestamps, distributed consensus, economic incentive and the like, and the healthy and sustainable development of the block chain industry is ensured.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of consortium chain content supervision, in particular to a method for supervisors to share sensitive data in a consortium chain scenario based on group negotiation keys. Background technique [0002] Consortium chain content supervision is divided by organizational structure and landing application mode. Blockchain can be divided into three types: public chain, consortium chain and private chain. Among them, the nodes in the public chain are completely equal, and the nodes' ability to manage information is extremely limited. ; Nodes in the private chain are strictly restricted, and write permissions are controlled by certain organizations and institutions. [0003] The existing publication number is CN108055274A, which is based on an encryption and sharing method of alliance chain storage data and the system proposes and solves the technical defects in customer service existing boo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/44G06F21/60G06F21/64H04L9/40
CPCG06F21/6245G06F21/44G06F21/64G06F21/602H04L63/0442H04L63/123G06F2221/2107H04L2463/062
Inventor 杨路梁志超胡晓艳宋晓怡
Owner 江苏众享金联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products