Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure verifiable service providing method and system based on block chain cross-chain

A blockchain and security technology, applied in the field of network communication, can solve problems such as unmatched services and increased system complexity, and achieve the effect of ensuring data security and data consistency

Active Publication Date: 2022-07-29
BEIJING JIAOTONG UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the situation where multiple service providers provide services, a cross-consortium chain and public chain method connects service providers in the consortium chain and end users in the public chain to provide services, but the cross-chain method is chain For the chain, if it is necessary to realize the intercommunication of multiple application chains, the complexity of the system will increase sharply, and only the public chain can initiate a request, and the alliance chain can respond to the request to provide services in one direction, and there is no service matching

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure verifiable service providing method and system based on block chain cross-chain
  • Secure verifiable service providing method and system based on block chain cross-chain
  • Secure verifiable service providing method and system based on block chain cross-chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] This embodiment 1 provides a blockchain-based cross-chain security and verifiable service providing system, including:

[0051] The initialization module is used to obtain the registration request of the service provider and the service requester, issue a digital certificate to them respectively after successful verification, and receive the ciphertext of the service data of the service provider;

[0052] The matching module is used to obtain the service request of the service requester, and after the verification is passed, the matching contract is called for service matching;

[0053] The re-encryption module is used to convert the private key of the service provider and the public key of the service requester to obtain a re-encryption key after successful matching, and use the re-encryption key to re-encrypt the service data;

[0054] The decryption module is used to publish the re-encrypted ciphertext of the service data on the proxy chain, and then transfer it to t...

Embodiment 2

[0074] This embodiment 2 provides a system and method for providing a secure and verifiable service based on blockchain cross-chain, using the blockchain cross-chain technology to solve the problem of data isolation between different trust domains of the traditional Internet of Things, and re-encrypting the service by proxy The data is protected for security, and the data consistency is verified according to the service data hash value finally obtained by the service requester and the original hash value provided by the service provider, and a penalty mechanism is added.

[0075] combine figure 1 , Image 6 As shown, in the cross-chain system and method proposed in this embodiment, any application chain in the system except the proxy chain is in an equal position, and can either request services or provide services, that is, the data flow is bidirectional. The process of one-way provision of services from the first blockchain to the second blockchain is described. The model i...

Embodiment 3

[0100] Embodiment 3 of the present invention provides an electronic device, including a memory and a processor, the processor and the memory communicate with each other, the memory stores program instructions that can be executed by the processor, and the processor invokes the The above-mentioned program instruction executes a method for providing security and verifiable services based on blockchain cross-chain, and the method includes the following process steps:

[0101] Step S1: The blockchain certification center obtains the registration request of the proxy node, and after successful verification, respectively issues a digital certificate for it, the service provider encrypts the service data, and the ciphertext is forwarded to the first blockchain certification center through the first proxy node and Published on the proxy chain;

[0102] Step S2: the service requester invokes the request contract to issue a service request, the request is forwarded to the second blockch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety verifiable service providing method and system based on block chain cross-chain, and belongs to the technical field of network communication, and the method comprises the steps: obtaining registration requests of a service provider and a service requester, respectively issuing digital certificates for the service provider and the service requester after verification succeeds, and receiving a service data ciphertext of the service provider; obtaining a service request of a service requester, and calling a matching contract to perform service matching after verification is passed; performing key conversion on the public key of the service requester to obtain a re-encryption key, and performing re-encryption on the service data by using the re-encryption key; and the re-encrypted service data ciphertext is published on the proxy chain, the service requester decrypts to obtain the service data plaintext, and data consistency verification is carried out in combination with the verification contract. According to the method, proxy re-encryption is adopted, the request and the service are matched by using the smart contract, and the data consistency and security are ensured through the smart contract and the hash function; the method can be expanded to interconnection and intercommunication of a plurality of application chains, and requests and services can be carried out bidirectionally.

Description

technical field [0001] The present invention relates to the technical field of network communication, in particular to a method and system for providing secure and verifiable services based on blockchain cross-chain. Background technique [0002] With the rapid development of information technology, the intelligence level and deployment scale of the Internet of Things are also growing. In recent years, blockchain technology has been widely used in all walks of life and has achieved huge economic and social benefits. However, in the current IoT service scenario, due to the underlying heterogeneity of the IoT, authentication exists between different trust domains. Different modes and differences in geographical distribution, etc., have resulted in data isolation. Different IoT trust domains are like “information islands” that are difficult to interact with each other. However, the resources in a single trust domain are often unable to meet the needs of users, and complex tasks...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/32G06K9/62G06F21/64G06F21/60
CPCH04L63/0281H04L63/0478H04L9/0861H04L9/3242G06F21/602G06F21/64G06F18/22
Inventor 段莉解宇航胥文耀王伟
Owner BEIJING JIAOTONG UNIV