CN109388960A - Information sharing and multi-party computations model based on block chain - Google Patents

Information sharing and multi-party computations model based on block chain Download PDF

Info

Publication number
CN109388960A
CN109388960A CN201811237887.0A CN201811237887A CN109388960A CN 109388960 A CN109388960 A CN 109388960A CN 201811237887 A CN201811237887 A CN 201811237887A CN 109388960 A CN109388960 A CN 109388960A
Authority
CN
China
Prior art keywords
data
node
chain
model
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811237887.0A
Other languages
Chinese (zh)
Inventor
路成业
王凌
王童
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201811237887.0A priority Critical patent/CN109388960A/en
Publication of CN109388960A publication Critical patent/CN109388960A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of information sharing based on block chain and Secure Multi-party Computation Protocols, mainly solve the problems, such as that existing multi-party computations be easy to cause user to be unable to autonomous control data and easily obtain data by third party, the technical solution of proposition are as follows: 1) construct storage model, index table information on chain is stored with the mode that database under chain combines.2) data sharing model is constructed, user can also withdraw permission by authorizing third party to access its data at any time.3) guarantee the consistency between node using the common recognition mechanism of block chain;4) on the basis of node correctness, using MapReduce programming model, model is divided into two stages of Map and Reduce, the task that host node carries out Map and Reduce to node is distributed;5) Map node carries out computations using improved homomorphic encryption algorithm;6) encrypted data are carried out integration output data file by Reduce node.

Description

Information sharing and multi-party computations model based on block chain
Technical field
The invention belongs to field of information security technology, are related to a kind of shared and multi-party computations mould based on block chain Type.
Background technique
As today's society rapidly develops, digitlization and information-based degree are higher and higher, and data-privacy is to life and work It has a huge impact, in medical treatment & health, the fields such as finance, data-privacy protection has become the most important thing.Different from tradition He believes that mechanism, block chain technology have the total letter characteristic for going to trusted third party for the centralization of system, controls user oneself The data of oneself.The data of block chain disclose owner, anyone can be by disclosed interface polls data, entirely System information highly transparent.Therefore it is flat can to construct feasible safety calculating for the account book that block chain can verify that as a distribution The basis of platform.
Multi-party computations refer to that in a distributed network, multiple users respectively hold some data inputs, it is desirable to altogether With the calculating of complete paired data, while requiring each user that cannot know any inputs of other users in addition to calculated result Information.The simple privacy that will not reveal user to a certain extent using multi-party computations, but user cannot be from master control Data processed, the third-party institution is probably because oneself interests obtains data.Therefore both block chain and multi-party computations are mutually tied It closes, both protects privacy, while user also being made to possess the control to data.
But the characteristics of block chain decentralization, determines that any one participant cannot be trusted, it is possible that Malicious node and because benefits of different parties it is inconsistent caused by data disagreement the problems such as.As any distributed system, block chain The problems such as system can face network delay, security breaches.And existing high-performance calculation mostly uses and concentrates shared storage system System, this architecture centered on storing simplifies the complexity of programming, when handling large-scale data, easily reduces Systematic entirety energy, mean free error time shorten, system availability decline.How to solve the problems, such as to trust each other between node And realize that multi-party computations are the technical issues that need to address using high-performance calculation on the basis of mutual trust.
Summary of the invention
It is an object of the invention to propose a kind of information sharing based on block chain and multi-party computations model, pass through The method that block chain is combined with multi-party computations, being calculated in many ways solving conventional security prevents user from autonomous control number The problem of probably obtaining data because of oneself interests according to, the third-party institution.
Technical thought of the invention is: knowing mechanism in all to each node in block chain, first with common recognition on block chain Mechanism solves the problems, such as to trust each other between block chain node.On the basis of mutual trust, each node of multi-party computations is utilized The functional value for needing to obtain is calculated jointly, i.e., is utilized the input of user using the parallel frame model of MapReduce improved Homomorphic encryption algorithm is calculated, and returns result to user, will not reveal any privacy information in the process.User The encryption that new encryption key carries out data is generated, is stored under chain and is saved, and accessed according to the request of user Data permission is authorized.
According to above-mentioned thinking, realization step of the invention includes the following:
1) storage model of block chain is constructed:
It is stored in such a way that index table information on chain is combined with database under chain.Concordance list storage on chain Index information (index classification and the address for encrypting file), and form index block and be stored on block chain.Concordance list will be inquired The information category of person's inquiry is corresponding with storage address value, and small part memory is occupied on chain.Data database storing under chain The data file encryption that owner uploads, guarantees the safety of data.
2) data sharing model is constructed:
User can also withdraw permission at any time, cancel third party to data by authorizing third party to access its data Access.
3) the common recognition algorithm model of block chain is constructed:
3a) common recognition system is made of n common recognition node, provides the f=fault-tolerant ability of (n-1)/3.Node synchronizing process is adopted It completes to synchronize with the mode for asking for block and verification to other nodes.
3b) view replacement process is to carry out attempting to cut on the basis of combining block to generate agreement, then using timeout mechanism It changes.It reduces to a certain extent and calculates power expense and volume of transmitted data.
4) multi-party computations model is constructed:
MapReduce programming model 4a) is utilized, model is divided into two stages of Map and Reduce, host node is to node Carry out the task distribution of Map and Reduce.
It is 4b) several small files by raw data file cutting fragment, gives Map node and carry out parallel processing, Map Data are carried out multi-party computations by node, and the result after improved homomorphic encryption algorithm cryptographic calculation is given Reduce node carries out the output data file for integrating to the end.
Compared with the prior art, the present invention has the following advantages:
The characteristics of present invention is by utilizing the decentralization of block chain, is stored in nothing on block chain for the public information of user Method is tampered, and under the premise of ensuring the correctness and safety of node using common recognition mechanism, the distributed structure of block chain makes It obtains data and is dispersed in different nodes, be not easily susceptible to attack, single-point threat does not interfere with whole network.It is used using block chain Family can be with autonomous control data, and the third-party institution cannot obtain data because of oneself interests.
The present invention utilizes improved homomorphism when the data of user's input are handled by improved homomorphic encryption algorithm The available relatively small ciphertext length of Encryption Algorithm and public key size are more suitable for big number when data volume is king-sized According to processing.Can be with parallel data processing using MapReduce programming model, processing speed is faster in big data processing.
Detailed description of the invention
Fig. 1 is data storage and shared flow chart;
Fig. 2 is the common recognition algorithm flow chart in the present invention kind common recognition model;
Fig. 3 is MapReduce frame process in the present invention;
Fig. 4 is the flow chart that the node in the present invention on block chain participates in calculating safely;
Fig. 5 is the safety analysis comparison diagram of two kinds of multi-party computations;
Fig. 6 is the information sharing secret protection frame model figure based on block chain;
Specific embodiment
Steps are as follows for realization of the invention:
Step 1, Data Storage Models under chain are constructed
This step stores sensitive information and the biggish information of data volume under chain, and user and text are stored on chain The lesser information of index information and data volume of shelves.Whether user itself or mechanism using data is needed, it all cannot be with Meaning change data, thereby ensure that the safety of data.
User classifies to the file information to be uploaded, such as business information, medical information etc., and externally announces classification, Then the data in corresponding classification are encrypted with public key and is stored and form encryption file under chain in database, later will The address value of storage is back on chain and is stored in concordance list.As shown in Figure 1, the specific steps are as follows:
1a) data owner is classified data are uploaded (t1, t2...), returned data classification
1b) different classes of data are encrypted with public key, database under storing to chain
1c) address value that different classes of information stores is back on chain, creates concordance list
Step 2, data sharing model is constructed
By taking medical scene as an example, patient is controlled the access right of data by user oneself completely, and patient can be by awarding Power third party accesses its medical records, can also withdraw permission at any time, cancels access of the third party to medical records.
When information sharing, if inquiry wants query-relevant data information, inquiry can issue information to block chain Inquiry request can carry out searching encryption file in database under chain by the address value in concordance list after through authorization, The re-encrypted private key generated using private key for user and inquiry's public key is back to inquiry to encryption file secondary encryption, with looking into Acquisition information is decrypted in the private key of inquiry person.
Step 3, the common recognition model of block chain is constructed.
This step first carries out the correctness that the common recognition between node determines node, such as schemes before carrying out multi-party computations Shown in 2, it is divided into following two step and carries out:
3a) node synchronizing process is completed to synchronize by the way of asking for block and verification to other nodes, and node synchronized Journey is as shown in figure 3, steps are as follows:
When 3a1) user initiates a transaction, after private key signature, broadcasted to the whole network.When node receives one After transaction, host node is judged whether it is.If not host node, then forward.If host node, then need to verify transaction Legitimacy is then stored in memory, is recorded in the transaction field of block data structures, if it is illegal, directly if legal It abandons.
3a2) host node sends common recognition motion by time t<PrepareRequest, h, v, P, block,<block>>, Other from node after receiving the common recognition motion that host node sends over, to motion inspection be very after, to go out oneself except from Node and its host node send common recognition confirmation message<PrepareResponse, h, v, i, block,<block>>
If finding not to be true after 3b) checking motion, suspect that host node, broadcast transmission view replace information from node.Depending on Figure replacement process is as shown in Fig. 2, steps are as follows:
3b1) enable k=1, vk=v ,+k
Wherein, v indicates the number of view, vkIndicate the size of view number
3b2) node i issue view replacement request be<changeview, h, v, i, vk>
Wherein, h indicates the height of block,
3b3) arbitrary node receives at least n-f identical v from different ikAfterwards, view replacement is reached, and v=v is enabledkStart Common recognition
If 3b4) existedAfter time interval, view is not reached yet, then k is incremented by and returns to 3b2 step
3b5) in network arbitrary node is thought that common recognition is reached, can be issued after receiving 2f identical confirmation messages Carry out the block block of autonomous node, remaining node is after receiving block, it is believed that wheel common recognition task is completed, by oneself memory Transaction in block is deleted, and next round common recognition is started.
Step 4, after carrying out correct verification to block chain interior joint, improvement is utilized on the basis of MapReduce model Homomorphic encryption algorithm to carry out multi-party computations model building.
MapReduce Computational frame is a kind of multiple programming mould that can handle mass data operated on clustered node Type and frame, this step carries out homomorphic cryptography using parallel MapReduce model, as shown in figure 4, its process is as follows:
4a) task that host node carries out Map and Reduce to node is distributed.Original input data file is cut first Fragment is several small documents, gives Map node and carries out parallel processing, data are carried out homomorphic cryptography operation by Map node
An integer 4b) is constructed on the basis of original Somewhat homomorphism scheme based on MapReduce Computational frame x′I, j, k=xI, 0·xJ, 1·xK, 2mod x0, it is in this way generation τ=β3A x 'I, j, kFor encrypting, 3 β need to be only stored in public key A xI, b, public key size also just drops to from τAnd the algorithm Modulo-two operation is changed to mould 2kOperation, improved algorithm can be with Primary encryption k bit
Wherein τ is the number of public key, and η is the bit length of private key, and ρ is the bit length of noise,
4b1) key schedule: the prime number p of a bit, p ∈ [2 is randomly generatedη-1, 2η), enable x0=q0P, q0It is [0,2γ/ p) inner odd-integral number.Generate integer xI, b=pqI, b+2k·rI, b, and 1≤i≤β, 0≤b≤2
Wherein qI, bIt isRandom integers, rI, bIt is (- 2ρ, 2ρ) in integer, enable key sk=p, pk=(x0, x1,0, x1,1, x1,2..., xβ,0xβ, 1xβ, 2)
4b2) Encryption Algorithm: one is randomly generated having a size of τ=β3Vector b=(bI, j, k), vector coefficient is [0,2α) Generate a random integers r ∈ (- 2ρ′, 2ρ′), output ciphertext is
4b3) assessment algorithm: the circuit C, t ciphertext C of given binary system t outputiBy the addition and multiplication gate circuit in C It is operated for ciphertext, all operations are executed on integer, returned the result as integer
4b4) decipherment algorithm: output m ← (c mod p) mod 2k
4c) the cryptographic calculation result after multi-party computations will be used to give Reduce node to carry out integrating to the end Output data, be then passed to user
If encrypted to individual bit, and component form is linear in public key, so the ciphertext meeting that encryption obtains It is very big.Encrypting plaintext bit number of the present invention is k bit, and the form of component uses three times in public key, and ciphertext length is made to become smaller, Public key size is opposite to become smaller, and when data volume is king-sized, is more suitable for the processing of big data.
Advantages of the present invention can be illustrated by the safety comparison diagram of Fig. 5:
There may be the security risks of participant collusion altered data for traditional multi-party computations.Using block chain as The basis of multi-party computations, before homomorphic cryptography calculating, node synchronizing process uses to other nodes and asks for block and school The mode tested is completed to synchronize, and confirms the correctness of a node jointly, and then just can be carried out homomorphic cryptography calculating, guarantees transaction Safety.
The common data of user is stored on block chain, and since block chain is disclosed account book, public information discloses nothing Method is distorted, and ensure that the safety of storage.It is then stored under chain after data encryption, since user is possessed of control power to data, Even if enemy obtains data from storage, what it is due to storage record is ciphertext, can not also obtain true data information, So that it is guaranteed that the safety of data.
User is independent of believable third party, and in conjunction with multi-party computations, user can be with the data of autonomous control oneself Information has the ownership to data, and is all safe in the generation and use process of data.User can agree to Data consumer accesses to oneself data, can also cancel its access right.Information itself is encrypted be stored under chain, only There is access request of the user by user, can just decrypt cleartext information and obtain truthful data.

Claims (6)

1. information sharing and multi-party computations model based on block chain, comprising:
1) storage model of block chain is constructed:
It is stored in such a way that index table information on chain is combined with database under chain.Concordance list storage index letter on chain Breath (index classification and the address for encrypting file), and form index block and be stored on block chain.Concordance list inquires inquiry Information category it is corresponding with storage address value, on chain occupy small part memory.Data database storing owner under chain The data file encryption of upload guarantees the safety of data.
2) data sharing model is constructed:
User can also withdraw permission at any time, cancel visit of the third party to data by authorizing third party to access its data It asks.
3) the common recognition algorithm model of block chain is constructed:
3a) common recognition system is made of n common recognition node, provides the f=fault-tolerant ability of (n-1)/3.Node synchronizing process use to Other nodes ask for block and the mode verified is completed to synchronize.
3b) view replacement process is to carry out attempting to switch on the basis of combining block to generate agreement, then using timeout mechanism.? It reduces to a certain extent and calculates power expense and volume of transmitted data.
4) multi-party computations model is constructed:
MapReduce programming model 4a) is utilized, model is divided into two stages of Map and Reduce, host node carries out node The task of Map and Reduce is distributed.
It is 4b) several small files by raw data file cutting fragment, gives Map node and carry out parallel processing, Map node will Data carry out multi-party computations, by the result after improved homomorphic encryption algorithm cryptographic calculation give Reduce node into The output data file that row is integrated to the end.
2. according to the method described in claim 1, wherein step 1) is to utilize lower point of chain to keep the access to encryption data The storage of cloth Hash, carries out as follows:
2a) data owner is classified data are uploaded (t1, t2...), returned data classification
2b) different classes of data are encrypted with public key, database under storing to chain
2c) address value that different classes of information stores is back on chain, creates concordance list.
3. according to the method described in claim 1, wherein in step 2) in order to make user to the access rights of data completely by with Family oneself controls data sharing model, is performed as follows: when information sharing, if inquiry wants query-relevant data information, Inquiry can issue information inquiring request to block chain, can be by the address value in concordance list under chain after through authorization It carries out searching encryption file in database, the re-encrypted private key generated using private key for user and inquiry's public key is to encryption file two Secondary encryption is back to inquiry, and acquisition information is decrypted with the private key of inquiry.
4. according to the method described in claim 1, wherein step 3a) in node synchronizing process, carry out as follows:
When 4a) user initiates a transaction, after private key signature, broadcasted to the whole network.After node receives a transaction, Judge whether it is host node, if host node, then host node sends common recognition motion by time t
4b) other from node after receiving the common recognition motion that host node sends over, to motion inspection be very after, to going out oneself it Outer slave node and its host node send common recognition confirmation message.
5. according to the method described in claim 1, wherein step 3b) in if suspecting host node, broadcast transmission view from node Information is replaced, view replacement is carried out, is carried out as follows:
5a) enable k=1, vk=v+k
Wherein, v indicates the number of view, vkIndicate the size of view number
5b) node i issue view replacement request be<changeview, h, v, i, vk>
Wherein, h indicates the height of block,
5c) arbitrary node receives at least n-f identical v from different ikAfterwards, view replacement is reached, and v=v is enabledkStart to know together
If 5d) existedAfter time interval, view is not reached yet, then k is incremented by and returns to 3b step.
6. according to the method described in claim 1, wherein step 4b) in it is small in order to obtain ciphertext length, public key size is relatively small Ciphertext, carry out the improvement of homomorphic encryption algorithm, as follows carry out:
4a) key schedule: the prime number p of a bit, p ∈ [2 is randomly generatedη-1, 2η), enable x0=q0P, q0It is [0,2γ/ P) odd-integral number in.Generate integer xI, b=pqI, b+2k·rI, b, wherein qI, bIt is random integers, rI, bIt is (- 2ρ, 2ρ) in it is whole Number, enables key sk=p, pk=(x0, x1,0, x1,1, x1,2..., xβ, 0xβ, 1xβ, 2)
4b) Encryption Algorithm: one is randomly generated having a size of τ=β3Vector b=(bI, j, k), vector coefficient is [0,2α) generate one Random integers r ∈ (- 2ρ′, 2ρ′), output ciphertext is
4c) assessment algorithm: the circuit C, t ciphertext C of given binary system t outputiBy in C addition and multiplication gate circuit be used for it is close Text operation, all operations are executed on integer, are returned the result as integer
4d) decipherment algorithm: output m ← (c mod p) mod 2k
CN201811237887.0A 2018-10-24 2018-10-24 Information sharing and multi-party computations model based on block chain Pending CN109388960A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811237887.0A CN109388960A (en) 2018-10-24 2018-10-24 Information sharing and multi-party computations model based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811237887.0A CN109388960A (en) 2018-10-24 2018-10-24 Information sharing and multi-party computations model based on block chain

Publications (1)

Publication Number Publication Date
CN109388960A true CN109388960A (en) 2019-02-26

Family

ID=65426871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811237887.0A Pending CN109388960A (en) 2018-10-24 2018-10-24 Information sharing and multi-party computations model based on block chain

Country Status (1)

Country Link
CN (1) CN109388960A (en)

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714165A (en) * 2019-02-28 2019-05-03 矩阵元技术(深圳)有限公司 The key management method and electronic equipment of each self-generating key components of client
CN109981592A (en) * 2019-02-28 2019-07-05 矩阵元技术(深圳)有限公司 Multi-client multiserver joint generates the method and electronic equipment of key
CN110138802A (en) * 2019-06-02 2019-08-16 四川虹微技术有限公司 User's characteristic information acquisition methods, device, block chain node and storage medium
CN110147994A (en) * 2019-04-13 2019-08-20 山东公链信息科技有限公司 A kind of instant execution method of the block chain based on homomorphic cryptography
CN110166220A (en) * 2019-05-06 2019-08-23 山东公链信息科技有限公司 A kind of sharding method carrying out cutting according to the hashed value of subregion key
CN110334543A (en) * 2019-06-20 2019-10-15 广东技术师范大学天河学院 A kind of block chain knowledge system and its application method based on calculation power
CN110532734A (en) * 2019-07-12 2019-12-03 中国科学院信息工程研究所 A kind of digital publishing rights method and system of the privacy timestamp based on multi-party computations
CN111064579A (en) * 2019-12-11 2020-04-24 北京金汤科技有限公司 Block chain-based secure multi-party computing method, system and storage medium
CN111327627A (en) * 2020-03-04 2020-06-23 西安热工研究院有限公司 Block chain-based network security assessment data processing method
CN111368320A (en) * 2020-03-06 2020-07-03 同盾控股有限公司 Secure multiparty computing method and device based on homomorphic encryption
CN111464500A (en) * 2020-03-06 2020-07-28 深圳壹账通智能科技有限公司 Method, device, equipment and storage medium for sharing protocol data
CN111506435A (en) * 2019-07-31 2020-08-07 阿里巴巴集团控股有限公司 Method, apparatus, device and medium for detecting deadlock in real-time full settlement system
CN111539041A (en) * 2020-07-08 2020-08-14 支付宝(杭州)信息技术有限公司 Safety selection method and system
CN111541737A (en) * 2020-03-25 2020-08-14 广东工业大学 AED equipment position sharing method based on block chain
WO2020172886A1 (en) * 2019-02-28 2020-09-03 云图有限公司 Data processing method and apparatus, user terminal, management platform, and service device
CN111723384A (en) * 2019-03-22 2020-09-29 阿里巴巴集团控股有限公司 Data processing method, system and equipment
CN112000962A (en) * 2020-07-13 2020-11-27 广发银行股份有限公司 Data encryption processing method, device and system based on block chain
CN112182628A (en) * 2020-10-27 2021-01-05 安信数字(广州)科技有限公司 Privacy information security access method and device
CN112182644A (en) * 2020-09-11 2021-01-05 华控清交信息科技(北京)有限公司 Data processing method and device and electronic equipment
CN112187443A (en) * 2020-10-13 2021-01-05 成都数融科技有限公司 Citizen data cross-domain security joint calculation method and system based on homomorphic encryption
CN112395642A (en) * 2020-11-20 2021-02-23 湖南智慧政务区块链科技有限公司 Secure multi-party privacy calculation method, device, equipment and storage medium
CN112507387A (en) * 2021-02-04 2021-03-16 北京全息智信科技有限公司 Distributed data and model calculation method and device based on block chain
CN112788107A (en) * 2020-12-29 2021-05-11 长威信息科技发展股份有限公司 Method and system for secure multi-party computing and data sharing
CN112804365A (en) * 2021-04-14 2021-05-14 浙江数秦科技有限公司 Private data distribution method for secure multi-party computing
CN112835915A (en) * 2019-11-25 2021-05-25 ***通信集团辽宁有限公司 MPP database system, data storage method and data query method
CN112906041A (en) * 2021-03-31 2021-06-04 上海简苏网络科技有限公司 Dynamic multi-party signature encryption and decryption method and system
CN112926051A (en) * 2021-03-25 2021-06-08 支付宝(杭州)信息技术有限公司 Multi-party security computing method and device
CN113343283A (en) * 2021-07-30 2021-09-03 深圳前海微众银行股份有限公司 Data processing method
CN113449336A (en) * 2021-06-11 2021-09-28 电子科技大学 Shared data processing method based on safe multi-party privacy protection in block chain
CN114218322A (en) * 2021-12-13 2022-03-22 深圳市电子商务安全证书管理有限公司 Data display method, device, equipment and medium based on ciphertext transmission
CN114726858A (en) * 2022-03-31 2022-07-08 蚂蚁区块链科技(上海)有限公司 Data processing method and device, electronic equipment and storage medium
CN115544171A (en) * 2022-11-24 2022-12-30 中国电子信息产业集团有限公司第六研究所 Heterogeneous physical resource data processing method and device, electronic equipment and storage medium
CN116109372A (en) * 2022-12-05 2023-05-12 淮阴工学院 Cold chain logistics product federal recommendation method and device based on multi-level block chain

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682530A (en) * 2017-01-10 2017-05-17 杭州电子科技大学 Method and device for medical information sharing privacy protection based on blockchain technology

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682530A (en) * 2017-01-10 2017-05-17 杭州电子科技大学 Method and device for medical information sharing privacy protection based on blockchain technology

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
徐文玉 等: "基于区块链和同态加密的电子健康记录隐私保护方案", 《计算机研究与发展》 *
陈志伟 等: "基于 ElGamal变体同态的安全两方计算协议设计", 《通信学报》 *

Cited By (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981592A (en) * 2019-02-28 2019-07-05 矩阵元技术(深圳)有限公司 Multi-client multiserver joint generates the method and electronic equipment of key
CN109981592B (en) * 2019-02-28 2021-07-16 矩阵元技术(深圳)有限公司 Method and electronic equipment for generating key by combining multiple clients and multiple servers
CN109714165B (en) * 2019-02-28 2021-12-07 矩阵元技术(深圳)有限公司 Key management method for client to generate key components respectively and electronic equipment
WO2020172886A1 (en) * 2019-02-28 2020-09-03 云图有限公司 Data processing method and apparatus, user terminal, management platform, and service device
CN109714165A (en) * 2019-02-28 2019-05-03 矩阵元技术(深圳)有限公司 The key management method and electronic equipment of each self-generating key components of client
CN111723384B (en) * 2019-03-22 2024-04-02 阿里巴巴集团控股有限公司 Data processing method, system and equipment
CN111723384A (en) * 2019-03-22 2020-09-29 阿里巴巴集团控股有限公司 Data processing method, system and equipment
CN110147994A (en) * 2019-04-13 2019-08-20 山东公链信息科技有限公司 A kind of instant execution method of the block chain based on homomorphic cryptography
CN110166220A (en) * 2019-05-06 2019-08-23 山东公链信息科技有限公司 A kind of sharding method carrying out cutting according to the hashed value of subregion key
CN110166220B (en) * 2019-05-06 2022-05-06 山东公链信息科技有限公司 Slicing method for slicing according to hash value of partition key
CN110138802A (en) * 2019-06-02 2019-08-16 四川虹微技术有限公司 User's characteristic information acquisition methods, device, block chain node and storage medium
CN110138802B (en) * 2019-06-02 2021-09-24 四川虹微技术有限公司 User characteristic information acquisition method, device, block chain node, network and storage medium
CN110334543B (en) * 2019-06-20 2023-01-17 广东技术师范大学天河学院 Calculation power-based block chain knowledge system and use method thereof
CN110334543A (en) * 2019-06-20 2019-10-15 广东技术师范大学天河学院 A kind of block chain knowledge system and its application method based on calculation power
CN110532734B (en) * 2019-07-12 2021-03-09 中国科学院信息工程研究所 Digital copyright method and system based on secure multi-party calculation privacy timestamp
CN110532734A (en) * 2019-07-12 2019-12-03 中国科学院信息工程研究所 A kind of digital publishing rights method and system of the privacy timestamp based on multi-party computations
CN111506435A (en) * 2019-07-31 2020-08-07 阿里巴巴集团控股有限公司 Method, apparatus, device and medium for detecting deadlock in real-time full settlement system
CN112835915B (en) * 2019-11-25 2023-07-18 ***通信集团辽宁有限公司 MPP database system, data storage method and data query method
CN112835915A (en) * 2019-11-25 2021-05-25 ***通信集团辽宁有限公司 MPP database system, data storage method and data query method
CN111064579A (en) * 2019-12-11 2020-04-24 北京金汤科技有限公司 Block chain-based secure multi-party computing method, system and storage medium
CN111327627A (en) * 2020-03-04 2020-06-23 西安热工研究院有限公司 Block chain-based network security assessment data processing method
CN111327627B (en) * 2020-03-04 2022-02-22 西安热工研究院有限公司 Block chain-based network security assessment data processing method
CN111368320B (en) * 2020-03-06 2022-05-13 同盾控股有限公司 Secure multiparty computing method and device based on homomorphic encryption
CN111464500B (en) * 2020-03-06 2023-03-17 深圳壹账通智能科技有限公司 Method, device, equipment and storage medium for sharing protocol data
CN111368320A (en) * 2020-03-06 2020-07-03 同盾控股有限公司 Secure multiparty computing method and device based on homomorphic encryption
CN111464500A (en) * 2020-03-06 2020-07-28 深圳壹账通智能科技有限公司 Method, device, equipment and storage medium for sharing protocol data
CN111541737A (en) * 2020-03-25 2020-08-14 广东工业大学 AED equipment position sharing method based on block chain
CN111541737B (en) * 2020-03-25 2023-10-10 广东工业大学 AED equipment position sharing method based on blockchain
CN111539041A (en) * 2020-07-08 2020-08-14 支付宝(杭州)信息技术有限公司 Safety selection method and system
CN111539041B (en) * 2020-07-08 2020-11-13 支付宝(杭州)信息技术有限公司 Safety selection method and system
CN112000962B (en) * 2020-07-13 2024-02-27 广发银行股份有限公司 Data encryption processing method, device and system based on block chain
CN112000962A (en) * 2020-07-13 2020-11-27 广发银行股份有限公司 Data encryption processing method, device and system based on block chain
CN112182644A (en) * 2020-09-11 2021-01-05 华控清交信息科技(北京)有限公司 Data processing method and device and electronic equipment
CN112182644B (en) * 2020-09-11 2023-05-12 华控清交信息科技(北京)有限公司 Data processing method and device and electronic equipment
CN112187443A (en) * 2020-10-13 2021-01-05 成都数融科技有限公司 Citizen data cross-domain security joint calculation method and system based on homomorphic encryption
CN112182628A (en) * 2020-10-27 2021-01-05 安信数字(广州)科技有限公司 Privacy information security access method and device
CN112182628B (en) * 2020-10-27 2024-05-10 安信数字(广州)科技有限公司 Privacy information security access method and device
CN112395642A (en) * 2020-11-20 2021-02-23 湖南智慧政务区块链科技有限公司 Secure multi-party privacy calculation method, device, equipment and storage medium
CN112395642B (en) * 2020-11-20 2024-02-13 湖南智慧政务区块链科技有限公司 Secure multiparty privacy computing method, device, equipment and storage medium
CN112788107A (en) * 2020-12-29 2021-05-11 长威信息科技发展股份有限公司 Method and system for secure multi-party computing and data sharing
CN112507387B (en) * 2021-02-04 2021-06-01 北京全息智信科技有限公司 Distributed data and model calculation method and device based on block chain
CN112507387A (en) * 2021-02-04 2021-03-16 北京全息智信科技有限公司 Distributed data and model calculation method and device based on block chain
CN112926051A (en) * 2021-03-25 2021-06-08 支付宝(杭州)信息技术有限公司 Multi-party security computing method and device
CN112906041A (en) * 2021-03-31 2021-06-04 上海简苏网络科技有限公司 Dynamic multi-party signature encryption and decryption method and system
CN112804365A (en) * 2021-04-14 2021-05-14 浙江数秦科技有限公司 Private data distribution method for secure multi-party computing
CN112804365B (en) * 2021-04-14 2021-07-13 浙江数秦科技有限公司 Private data distribution method for secure multi-party computing
CN113449336A (en) * 2021-06-11 2021-09-28 电子科技大学 Shared data processing method based on safe multi-party privacy protection in block chain
CN113343283B (en) * 2021-07-30 2021-10-15 深圳前海微众银行股份有限公司 Data processing method
CN113343283A (en) * 2021-07-30 2021-09-03 深圳前海微众银行股份有限公司 Data processing method
CN114218322A (en) * 2021-12-13 2022-03-22 深圳市电子商务安全证书管理有限公司 Data display method, device, equipment and medium based on ciphertext transmission
CN114726858A (en) * 2022-03-31 2022-07-08 蚂蚁区块链科技(上海)有限公司 Data processing method and device, electronic equipment and storage medium
CN115544171A (en) * 2022-11-24 2022-12-30 中国电子信息产业集团有限公司第六研究所 Heterogeneous physical resource data processing method and device, electronic equipment and storage medium
CN116109372B (en) * 2022-12-05 2023-09-29 淮阴工学院 Cold chain logistics product federal recommendation method and device based on multi-level block chain
CN116109372A (en) * 2022-12-05 2023-05-12 淮阴工学院 Cold chain logistics product federal recommendation method and device based on multi-level block chain

Similar Documents

Publication Publication Date Title
CN109388960A (en) Information sharing and multi-party computations model based on block chain
US10673626B2 (en) Threshold secret share authentication proof and secure blockchain voting with hardware security modules
WO2022007889A1 (en) Searchable encrypted data sharing method and system based on blockchain and homomorphic encryption
TWI714219B (en) Block chain-based business data encryption method and device
CN109478279B (en) Method and system for realizing block chain
KR102025409B1 (en) Data access management system based on blockchain and method thereof
Zyskind et al. Decentralizing privacy: Using blockchain to protect personal data
US10810315B2 (en) Enabling access to data
CN102932136B (en) Systems and methods for managing cryptographic keys
US20200401726A1 (en) System and method for private integration of datasets
Fan et al. TraceChain: A blockchain‐based scheme to protect data confidentiality and traceability
CN108737374A (en) The method for secret protection that data store in a kind of block chain
CN103384196A (en) Secure data parser method and system
US11038676B2 (en) Cryptographic systems and methods using distributed ledgers
CN113987443A (en) Multi-cloud and multi-chain collaborative electronic medical data security sharing method
JP2023500570A (en) Digital signature generation using cold wallet
CN114338038B (en) Storage system for secret inquiry of block chain data and careless transmission method
CN115766098A (en) Personal health data sharing method based on block chain and proxy re-encryption
Mahalakshmi et al. Effectuation of secure authorized deduplication in hybrid cloud
Mittal et al. A novel two-level secure access control approach for blockchain platform in healthcare
Gennaro et al. Two-phase cryptographic key recovery system
CN113676453B (en) Data encryption system and method for secure access of data resources
Bharat et al. A Secured and Authorized Data Deduplication in Hybrid Cloud with Public Auditing
Zhang et al. Attribute Based Conjunctive Keywords Search with Verifiability and Fair Payment Using Blockchain
US20220368527A1 (en) Location key search of encrypted files without decryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190226