Secure verifiable service providing method and system based on block chain cross-chain
A blockchain and security technology, applied in the field of network communication, can solve problems such as unmatched services and increased system complexity, and achieve the effect of ensuring data security and data consistency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] This embodiment 1 provides a blockchain-based cross-chain security and verifiable service providing system, including:
[0051] The initialization module is used to obtain the registration request of the service provider and the service requester, issue a digital certificate to them respectively after successful verification, and receive the ciphertext of the service data of the service provider;
[0052] The matching module is used to obtain the service request of the service requester, and after the verification is passed, the matching contract is called for service matching;
[0053] The re-encryption module is used to convert the private key of the service provider and the public key of the service requester to obtain a re-encryption key after successful matching, and use the re-encryption key to re-encrypt the service data;
[0054] The decryption module is used to publish the re-encrypted ciphertext of the service data on the proxy chain, and then transfer it to t...
Embodiment 2
[0074] This embodiment 2 provides a system and method for providing a secure and verifiable service based on blockchain cross-chain, using the blockchain cross-chain technology to solve the problem of data isolation between different trust domains of the traditional Internet of Things, and re-encrypting the service by proxy The data is protected for security, and the data consistency is verified according to the service data hash value finally obtained by the service requester and the original hash value provided by the service provider, and a penalty mechanism is added.
[0075] combine figure 1 , Image 6 As shown, in the cross-chain system and method proposed in this embodiment, any application chain in the system except the proxy chain is in an equal position, and can either request services or provide services, that is, the data flow is bidirectional. The process of one-way provision of services from the first blockchain to the second blockchain is described. The model i...
Embodiment 3
[0100] Embodiment 3 of the present invention provides an electronic device, including a memory and a processor, the processor and the memory communicate with each other, the memory stores program instructions that can be executed by the processor, and the processor invokes the The above-mentioned program instruction executes a method for providing security and verifiable services based on blockchain cross-chain, and the method includes the following process steps:
[0101] Step S1: The blockchain certification center obtains the registration request of the proxy node, and after successful verification, respectively issues a digital certificate for it, the service provider encrypts the service data, and the ciphertext is forwarded to the first blockchain certification center through the first proxy node and Published on the proxy chain;
[0102] Step S2: the service requester invokes the request contract to issue a service request, the request is forwarded to the second blockch...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


