CN110009499B - Transaction method and system based on block chain and hidden address - Google Patents

Transaction method and system based on block chain and hidden address Download PDF

Info

Publication number
CN110009499B
CN110009499B CN201910308303.2A CN201910308303A CN110009499B CN 110009499 B CN110009499 B CN 110009499B CN 201910308303 A CN201910308303 A CN 201910308303A CN 110009499 B CN110009499 B CN 110009499B
Authority
CN
China
Prior art keywords
transaction
node
hidden address
encrypted hidden
envelope
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910308303.2A
Other languages
Chinese (zh)
Other versions
CN110009499A (en
Inventor
胡志琳
阮安邦
魏明
尹朝明
陈旭明
马飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Beijing Octa Innovations Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Octa Innovations Information Technology Co Ltd filed Critical Beijing Octa Innovations Information Technology Co Ltd
Priority to CN201910308303.2A priority Critical patent/CN110009499B/en
Publication of CN110009499A publication Critical patent/CN110009499A/en
Application granted granted Critical
Publication of CN110009499B publication Critical patent/CN110009499B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a transaction method and a system based on a block chain and a hidden address, wherein the method comprises the following steps: the node initiating the transaction stores the transaction information into a block chain, and determines a hidden address in which the transaction information is stored; the node initiating the transaction encrypts the hidden address, and sends the encrypted hidden address to a node receiving the transaction through a down-link verification network; the node receiving the transaction receives the encrypted hidden address through the under-link verification network and decrypts the encrypted hidden address; and the node receiving the transaction acquires the transaction information from the block chain according to the decrypted hidden address. The invention provides a transaction method and a transaction system based on a block chain and a hidden address, which can reduce the calculation amount for realizing transaction based on the block chain.

Description

Transaction method and system based on block chain and hidden address
Technical Field
The invention relates to the technical field of block chains, in particular to a transaction method and a transaction system based on a block chain and a hidden address.
Background
In existing privacy transactions based on blockchain and hidden address schemes, a node in the blockchain needs to traverse all transactions in the blockchain to determine whether there is a transaction belonging to itself. Specifically, the node receiving the transaction can only traverse all transactions on the block chain to obtain the account transferred by others to the node, and whether the transaction address belongs to the node is judged every time. Assuming that there are N nodes in the blockchain network, and M transactions are generated every second, the N nodes perform N × M hidden address verifications in total.
As can be seen from the above description, in the prior art, the amount of computation for implementing transactions based on blockchain and hidden address schemes is very large.
Disclosure of Invention
The embodiment of the invention provides a transaction method and a transaction system based on a block chain and a hidden address, which can reduce the transaction calculation amount based on a block chain and hidden address scheme.
In one aspect, an embodiment of the present invention provides a transaction method based on a block chain and a hidden address, including:
the node initiating the transaction stores the transaction information into a block chain, and determines a hidden address in which the transaction information is stored;
the node initiating the transaction encrypts the hidden address, and sends the encrypted hidden address to a node receiving the transaction through a down-link verification network;
the node receiving the transaction receives the encrypted hidden address through the under-link verification network and decrypts the encrypted hidden address;
and the node receiving the transaction acquires the transaction information from the block chain according to the decrypted hidden address.
Preferably, the first and second electrodes are formed of a metal,
the sending the encrypted hidden address to a node receiving a transaction through a down-link verification network includes:
the node initiating the transaction randomly sends the encrypted hidden address to at least one node in the downlink verification network;
further comprising:
each node receiving the encrypted hidden address executes: verifying the received encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, if so, decrypting the encrypted hidden address, otherwise, randomly sending the encrypted hidden address to at least one node in the downlink verification network;
the node receiving the transaction receives the encrypted hidden address through the downlink verification network, and decrypts the encrypted hidden address, including:
and when the node receiving the transaction receives the encrypted hidden address, verifying the encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, and if so, decrypting the encrypted hidden address.
Preferably, the first and second electrodes are formed of a metal,
the node initiating the transaction randomly sends the encrypted hidden address to at least one node in the downlink verification network, and the method comprises the following steps:
the node initiating the transaction generates a transaction envelope and randomly sends the transaction envelope to at least one node in the downlink verification network, wherein the transaction envelope comprises: the encrypted hidden address, and plaintext metadata for verification and decryption;
and each node receiving the encrypted hidden address executes: verifying the received encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, if so, decrypting the encrypted hidden address, otherwise, randomly sending the encrypted hidden address to at least one node in the downlink verification network, and including:
each node receiving the encrypted hidden address executes: verifying the transaction envelope by using the received plaintext metadata in the transaction envelope, judging whether the transaction envelope needs to be decrypted by the node, if so, decrypting the encrypted hidden address by using the plaintext metadata, otherwise, randomly sending the transaction envelope to at least one node in the downlink verification network;
when the node receiving the transaction receives the encrypted hidden address, the node verifies the encrypted hidden address, judges whether the encrypted hidden address needs to be decrypted by the node, and if so, decrypts the encrypted hidden address, including:
and the node receiving the transaction verifies the transaction envelope by using the received plaintext metadata in the transaction envelope, judges whether the transaction envelope needs to be decrypted by the node, and decrypts the encrypted hidden address by using the plaintext metadata if the transaction envelope needs to be decrypted by the node.
Preferably, the first and second electrodes are formed of a metal,
the clear text metadata includes: at least one target topic, expiration date;
further comprising:
each node receiving the encrypted hidden address executes: judging whether the current time is before the expiration date, if so, executing the verification of the transaction envelope by using the received plaintext metadata in the transaction envelope, and if not, ending the current process;
and each node receiving the encrypted hidden address executes: the step of verifying the transaction envelope by using the received plaintext metadata in the transaction envelope and judging whether the transaction envelope needs to be decrypted by the node comprises the following steps:
each node receiving the encrypted hidden address executes: and judging whether the transaction envelope has a theme concerned by the node according to the received at least one target theme in the transaction envelope, and if not, determining that the transaction envelope does not need to be decrypted by the node.
Preferably, the first and second electrodes are formed of a metal,
executing, at each node that receives the encrypted hidden address: before verifying the received encrypted hidden address, the method further includes:
each node receiving the encrypted hidden address executes: and determining the received hash value of the transaction envelope, judging whether the hash value which is the same as the hash value of the transaction envelope is recorded in the node, if so, determining that the transaction envelope has been received, and ending the current process, otherwise, recording the hash value of the transaction envelope, and executing the verification of the received encrypted hidden address.
In another aspect, an embodiment of the present invention provides a transaction system based on a blockchain and a hidden address, including:
at least two nodes;
the node initiating the transaction in the at least two nodes is used for storing transaction information into a block chain when initiating the transaction, determining a hidden address in which the transaction information is stored, encrypting the hidden address, and sending the encrypted hidden address to a node receiving the transaction through a down-link verification network;
and the node for receiving the transaction in the at least two nodes is used for receiving the encrypted hidden address through the under-link verification network when receiving the transaction, decrypting the encrypted hidden address and acquiring the transaction information from the block chain according to the decrypted hidden address.
Preferably, the first and second electrodes are formed of a metal,
the node initiating the transaction, when executing the sending of the encrypted hidden address to the node receiving the transaction through the downlink verification network, is specifically configured to:
randomly sending the encrypted hidden address to at least one node in the downlink verification network;
each node receiving the encrypted hidden address is configured to: verifying the received encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, if so, decrypting the encrypted hidden address, otherwise, randomly sending the encrypted hidden address to at least one node in the downlink verification network;
the node receiving the transaction, when executing the receiving of the encrypted hidden address through the link verification network and decrypting the encrypted hidden address, is specifically configured to:
and when the encrypted hidden address is received, verifying the encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, and if so, decrypting the encrypted hidden address.
Preferably, the first and second electrodes are formed of a metal,
the node that initiates the transaction, when executing the random sending of the encrypted hidden address to at least one node in the downlink authentication network, is specifically configured to:
generating a transaction envelope, and randomly sending the transaction envelope to at least one node in the downlink verification network, wherein the transaction envelope comprises: the encrypted hidden address, and plaintext metadata for verification and decryption;
each node receiving the encrypted hidden address is configured to: verifying the transaction envelope by using the received plaintext metadata in the transaction envelope, judging whether the transaction envelope needs to be decrypted by the node, if so, decrypting the encrypted hidden address by using the plaintext metadata, otherwise, randomly sending the transaction envelope to at least one node in the downlink verification network;
and the node for receiving the transaction is used for verifying the transaction envelope by using the received plaintext metadata in the transaction envelope, judging whether the transaction envelope needs to be decrypted by the node, and if so, decrypting the encrypted hidden address by using the plaintext metadata.
Preferably, the first and second electrodes are formed of a metal,
the clear text metadata includes: at least one target topic, expiration date;
each node receiving the encrypted hidden address is further configured to: judging whether the current time is before the expiration date, if so, executing the verification of the transaction envelope by using the received plaintext metadata in the transaction envelope, and if not, ending the current process;
each node receiving the encrypted hidden address is configured to: and judging whether the transaction envelope has a theme concerned by the node according to the received at least one target theme in the transaction envelope, and if not, determining that the transaction envelope does not need to be decrypted by the node.
Preferably, the first and second electrodes are formed of a metal,
each node receiving the encrypted hidden address is further configured to: and determining the received hash value of the transaction envelope, judging whether the hash value which is the same as the hash value of the transaction envelope is recorded in the node, if so, determining that the transaction envelope has been received, and ending the current process, otherwise, recording the hash value of the transaction envelope, and executing the verification of the received encrypted hidden address.
In the embodiment of the invention, the node initiating the transaction sends the hidden address to the node receiving the transaction through the under-chain verification network, the node receiving the transaction does not need to traverse each transaction, only needs to process the received hidden address, and obtains the transaction information from the block chain based on the decrypted hidden address to realize the transaction.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a transaction method based on a blockchain and a hidden address according to an embodiment of the present invention;
fig. 2 is a flowchart of another transaction method based on a blockchain and a hidden address according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a transaction system based on a blockchain and a hidden address according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.
As shown in fig. 1, an embodiment of the present invention provides a transaction method based on a blockchain and a hidden address, which may include the following steps:
step 101: the node initiating the transaction stores the transaction information into a block chain, and determines a hidden address in which the transaction information is stored;
step 102: the node initiating the transaction encrypts the hidden address, and sends the encrypted hidden address to a node receiving the transaction through a down-link verification network;
step 103: the node receiving the transaction receives the encrypted hidden address through the under-link verification network and decrypts the encrypted hidden address;
step 104: and the node receiving the transaction acquires the transaction information from the block chain according to the decrypted hidden address.
In the embodiment of the invention, the node initiating the transaction sends the hidden address to the node receiving the transaction through the under-chain verification network, the node receiving the transaction does not need to traverse each transaction, only needs to process the received hidden address, and obtains the transaction information from the block chain based on the decrypted hidden address to realize the transaction.
In the embodiment of the invention, when the transaction occurs among the nodes, the hidden address does not need to be transmitted through a network of a block chain, the hidden address only needs to be transmitted through a verification network under the chain, and the nodes do not need to traverse all transactions, only the hidden address transmitted through the verification network under the chain needs to be processed, thereby greatly reducing the calculation amount.
In an embodiment of the present invention, the sending the encrypted hidden address to a node receiving a transaction through a downlink authentication network includes:
the node initiating the transaction randomly sends the encrypted hidden address to at least one node in the downlink verification network;
further comprising:
each node receiving the encrypted hidden address executes: verifying the received encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, if so, decrypting the encrypted hidden address, otherwise, randomly sending the encrypted hidden address to at least one node in the downlink verification network;
the node receiving the transaction receives the encrypted hidden address through the downlink verification network, and decrypts the encrypted hidden address, including:
and when the node receiving the transaction receives the encrypted hidden address, verifying the encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, and if so, decrypting the encrypted hidden address.
In the embodiment of the invention, a plurality of nodes form a down-link verification network, the encrypted hidden address is transmitted in the plurality of nodes in the down-link verification network, each node directly and randomly forwards the encrypted hidden address to other nodes when sending and receiving the encrypted hidden address without decryption of the node, and the other nodes can be randomly selected from the plurality of nodes in the down-link verification network. And after receiving the encrypted hidden address, the node receiving the transaction decrypts the encrypted hidden address without forwarding.
In an embodiment of the present invention, the randomly sending, by the node initiating the transaction, the encrypted hidden address to at least one node in the downlink authentication network includes:
the node initiating the transaction generates a transaction envelope and randomly sends the transaction envelope to at least one node in the downlink verification network, wherein the transaction envelope comprises: the encrypted hidden address, and plaintext metadata for verification and decryption;
and each node receiving the encrypted hidden address executes: verifying the received encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, if so, decrypting the encrypted hidden address, otherwise, randomly sending the encrypted hidden address to at least one node in the downlink verification network, and including:
each node receiving the encrypted hidden address executes: verifying the transaction envelope by using the received plaintext metadata in the transaction envelope, judging whether the transaction envelope needs to be decrypted by the node, if so, decrypting the encrypted hidden address by using the plaintext metadata, otherwise, randomly sending the transaction envelope to at least one node in the downlink verification network;
when the node receiving the transaction receives the encrypted hidden address, the node verifies the encrypted hidden address, judges whether the encrypted hidden address needs to be decrypted by the node, and if so, decrypts the encrypted hidden address, including:
and the node receiving the transaction verifies the transaction envelope by using the received plaintext metadata in the transaction envelope, judges whether the transaction envelope needs to be decrypted by the node, and decrypts the encrypted hidden address by using the plaintext metadata if the transaction envelope needs to be decrypted by the node.
In the embodiment of the invention, the encrypted hidden address is transmitted in the link verification network in an envelope mode, if the node cannot decrypt the envelope, the node knows nothing about the content of the message in the envelope, and the node does not influence the forwarding diffusion of the message.
The envelope may be transported in RLP (Recursive Length Prefix) encoded format [ Version, Expiry, TTL, Topic, AESNonce, Data, EnvNonce ].
In the embodiment of the invention, after the nodes except the node for receiving the transaction receive the transaction envelope, the hidden address cannot be decrypted according to the clear text metadata. Decrypting the hidden address process requires clear metadata in the transaction envelope and also information about the node receiving the transaction, such as: a private key of a node receiving the transaction, etc.
In an embodiment of the present invention, the clear text metadata includes: at least one target topic, expiration date;
further comprising:
each node receiving the encrypted hidden address executes: judging whether the current time is before the expiration date, if so, executing the verification of the transaction envelope by using the received plaintext metadata in the transaction envelope, and if not, ending the current process;
and each node receiving the encrypted hidden address executes: the step of verifying the transaction envelope by using the received plaintext metadata in the transaction envelope and judging whether the transaction envelope needs to be decrypted by the node comprises the following steps:
each node receiving the encrypted hidden address executes: and judging whether the transaction envelope has a theme concerned by the node according to the received at least one target theme in the transaction envelope, and if not, determining that the transaction envelope does not need to be decrypted by the node.
In the embodiment of the invention, each node in the down-link verification network can pay attention to the corresponding theme, and if the transaction envelope does not have the theme concerned by the node, the transaction envelope is directly forwarded to other nodes, so that the processing speed of each node on the received transaction envelope is greatly improved.
The expiration date in the plaintext metadata specifies whether the transaction envelope is valid, if so, the transaction envelope is valid and processing continues, and if not, the transaction envelope is invalid and processing does not continue (i.e., no verification and no forwarding is required). For example, the expiration date in the transaction envelope is 10 o' clock 10 minutes 10 seconds on 1/2019, and if the expiration date has passed when the current node receives the transaction envelope, the transaction envelope is invalid, and if the expiration date has not been exceeded, the transaction envelope is valid.
When the node initiating the transaction generates the transaction envelope, the node receiving the transaction encapsulates at least one topic concerned by the node receiving the transaction into the transaction envelope, so that the node receiving the transaction does not miss the transaction envelope.
In an embodiment of the present invention, at each node that receives the encrypted hidden address, performing: before verifying the received encrypted hidden address, the method further includes:
each node receiving the encrypted hidden address executes: and determining the received hash value of the transaction envelope, judging whether the hash value which is the same as the hash value of the transaction envelope is recorded in the node, if so, determining that the transaction envelope has been received, and ending the current process, otherwise, recording the hash value of the transaction envelope, and executing the verification of the received encrypted hidden address.
In the embodiment of the invention, each node randomly selects at least one node when forwarding the transaction envelope, so that some nodes may repeatedly receive the same transaction envelope, determine whether the transaction envelope has been received before by calculating the hash value of the received transaction envelope, if so, do not need to process, if not, record the hash value of the transaction envelope, and then perform subsequent processing such as verification.
The following takes three nodes as an example to explain in detail that the embodiment of the present invention provides a transaction method based on a block chain and a hidden address. These three nodes are node a, node B and node C, respectively, which are all in the verification network under the chain. Node a initiates a transaction to node B, i.e., node a is the node that initiated the transaction and node B is the node that receives the transaction. And the node A randomly sends the transaction envelope to at least one node, wherein the at least one node comprises a node C, the node C randomly sends the transaction envelope to the at least one node, and the at least one node comprises a node B.
As shown in fig. 2, an embodiment of the present invention provides a transaction method based on a blockchain and a hidden address, which may include the following steps:
step 201: and the node A stores the transaction information into the blockchain and determines the hidden address in which the transaction information is stored.
Step 202: the node A encrypts the hidden address to generate a transaction envelope, and randomly sends the transaction envelope to at least one node in the down-link verification network, wherein the transaction envelope comprises: the encrypted hidden address, at least one target subject, and an expiration date, wherein the at least one node comprises a node C.
Step 203: and C, judging whether the current time is before the expiration date in the transaction envelope, if so, executing the step 204, and otherwise, ending the current process.
Step 204: and the node C determines the hash value of the received transaction envelope, judges whether the hash value which is the same as the hash value of the transaction envelope is recorded in the node C, if so, ends the current process, otherwise, executes the step 205.
Step 205: node C records the hash value of the transaction envelope and executes step 206.
Step 206: the node C judges whether the transaction envelope has a theme concerned by the node according to at least one target theme in the received transaction envelope, if not, step 207 is executed;
step 207: and the node C randomly sends the transaction envelope to at least one node in the down-link verification network, wherein the at least one node comprises the node B.
Step 208: node B determines whether the current time is before the expiration date in the transaction envelope, if so, step 209 is performed, otherwise, the current flow ends.
Step 209: and the node B determines the hash value of the received transaction envelope, judges whether the hash value which is the same as the hash value of the transaction envelope is recorded in the node B, if so, ends the current process, and otherwise, executes the step 210.
Step 210: the node B records the hash value of the transaction envelope and performs step 211.
Step 211: and the node B judges whether the transaction envelope has a theme concerned by the node according to at least one target theme in the received transaction envelope, and if so, executes the step 212.
Step 212: and the node B decrypts the encrypted hidden address in the transaction envelope and acquires transaction information from the block chain according to the decrypted hidden address.
In the embodiment of the invention, based on the down-link verification network, the node initiating the transaction generates one transaction each time, and simultaneously, the address information of the transaction is directly pushed to the node receiving the transaction. Thus, the node receiving the transaction no longer needs to brute force traverse each transaction on the blockchain, and only needs to verify the transaction sent by the node receiving the transaction on the network from the chain. Thus, each node receiving the transaction only needs to be verified after receiving the specified transaction information, and the verification calculation amount is reduced to the minimum.
In the embodiment of the invention, the down-link authentication network is achieved based on the consensus of each node, so that an authentication channel is established. When the two parties of the transaction carry out the transaction, on one hand, the transaction is recorded on the blockchain, and meanwhile, an authentication channel is established. Because the verification channel is always kept open, both parties can conduct unlimited transactions at any time. The verification can be completed in time within milliseconds by the down-link verification network without worrying about the time loss of all block scanning on the block chain. And the security of the intelligent contract is extremely high under the protection of the intelligent contract and the ECDH, and the verification behavior can be completed without a trusteeship service, so that a node receiving the transaction does not need to process any transaction verification information in an uplink, and a block chain only exists as an information storage network for ensuring the data security.
The downlink authentication network is a message network based on complete ID, and is an asynchronous broadcast network among a set of p2p nodes. The messages on the down-link authentication network are transmitted in an encrypted mode and can be completely exposed to the public network for transmission.
In the embodiment of the invention, the basic form of data transmission by taking envelopes as each node in the downlink verification network is adopted.
In the embodiment of the invention, each node can be provided with a message queue, the transaction envelope needing to be sent out is stored in the message queue, and the node can regularly process the transaction envelope in the message queue.
In the embodiment of the invention, when the message is transmitted in the network under the chain verification, the gray scale control, namely the configurability of the privacy degree can be carried out based on the transaction envelope. In the process of message transmission, the public key and the security level are controlled by configuring the theme and the authority level, so that other nodes can be selected to know the transaction verification message of the corresponding authority of the nodes. If fully encrypted, the message delivery is 100% dark, and it is also possible to choose to have some messages fully or partially open in the verification network.
As shown in fig. 3, the transaction system based on the blockchain and the hidden address provided in this embodiment includes:
at least two nodes 301;
the node initiating the transaction in the at least two nodes is used for storing transaction information into a block chain when initiating the transaction, determining a hidden address in which the transaction information is stored, encrypting the hidden address, and sending the encrypted hidden address to a node receiving the transaction through a down-link verification network;
and the node for receiving the transaction in the at least two nodes is used for receiving the encrypted hidden address through the under-link verification network when receiving the transaction, decrypting the encrypted hidden address and acquiring the transaction information from the block chain according to the decrypted hidden address.
In the embodiment of the invention, the nodes in the system are in the same under-chain verification network and the same block chain network.
There are shown 3 nodes 301.
In an embodiment of the present invention, when the node that initiates the transaction executes the sending of the encrypted hidden address to the node that receives the transaction through the downlink authentication network, the node that initiates the transaction is specifically configured to:
randomly sending the encrypted hidden address to at least one node in the downlink verification network;
each node receiving the encrypted hidden address is configured to: verifying the received encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, if so, decrypting the encrypted hidden address, otherwise, randomly sending the encrypted hidden address to at least one node in the downlink verification network;
the node receiving the transaction, when executing the receiving of the encrypted hidden address through the link verification network and decrypting the encrypted hidden address, is specifically configured to:
and when the encrypted hidden address is received, verifying the encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, and if so, decrypting the encrypted hidden address.
In an embodiment of the present invention, when the node that initiates the transaction executes the random sending of the encrypted hidden address to at least one node in the downlink authentication network, the node is specifically configured to:
generating a transaction envelope, and randomly sending the transaction envelope to at least one node in the downlink verification network, wherein the transaction envelope comprises: the encrypted hidden address, and plaintext metadata for verification and decryption;
each node receiving the encrypted hidden address is configured to: verifying the transaction envelope by using the received plaintext metadata in the transaction envelope, judging whether the transaction envelope needs to be decrypted by the node, if so, decrypting the encrypted hidden address by using the plaintext metadata, otherwise, randomly sending the transaction envelope to at least one node in the downlink verification network;
and the node for receiving the transaction is used for verifying the transaction envelope by using the received plaintext metadata in the transaction envelope, judging whether the transaction envelope needs to be decrypted by the node, and if so, decrypting the encrypted hidden address by using the plaintext metadata.
In an embodiment of the present invention, the clear text metadata includes: at least one target topic, expiration date;
each node receiving the encrypted hidden address is further configured to: judging whether the current time is before the expiration date, if so, executing the verification of the transaction envelope by using the received plaintext metadata in the transaction envelope, and if not, ending the current process;
each node receiving the encrypted hidden address is configured to: and judging whether the transaction envelope has a theme concerned by the node according to the received at least one target theme in the transaction envelope, and if not, determining that the transaction envelope does not need to be decrypted by the node.
In an embodiment of the present invention, each node that receives the encrypted hidden address is further configured to: and determining the received hash value of the transaction envelope, judging whether the hash value which is the same as the hash value of the transaction envelope is recorded in the node, if so, determining that the transaction envelope has been received, and ending the current process, otherwise, recording the hash value of the transaction envelope, and executing the verification of the received encrypted hidden address.
Because the information interaction, execution process, and other contents between the units in the device are based on the same concept as the method embodiment of the present invention, specific contents may refer to the description in the method embodiment of the present invention, and are not described herein again.
The embodiments of the invention have at least the following beneficial effects:
1. in the embodiment of the invention, the node initiating the transaction sends the hidden address to the node receiving the transaction through the under-chain verification network, the node receiving the transaction does not need to traverse each transaction, only needs to process the received hidden address, and obtains the transaction information from the block chain based on the decrypted hidden address to realize the transaction.
2. In the embodiment of the invention, based on the down-link verification network, the node initiating the transaction generates one transaction each time, and simultaneously, the address information of the transaction is directly pushed to the node receiving the transaction. Thus, the node receiving the transaction no longer needs to brute force traverse each transaction on the blockchain, and only needs to verify the transaction sent by the node receiving the transaction on the network from the chain. Thus, each node receiving the transaction only needs to be verified after receiving the specified transaction information, and the verification calculation amount is reduced to the minimum.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other similar elements in a process, method, article, or apparatus that comprises the element.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it is to be noted that: the above description is only a preferred embodiment of the present invention, and is only used to illustrate the technical solutions of the present invention, and not to limit the protection scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (4)

1. A transaction method based on a blockchain and a hidden address, comprising:
the node initiating the transaction stores the transaction information into a block chain, and determines a hidden address in which the transaction information is stored;
the node initiating the transaction encrypts the hidden address, and sends the encrypted hidden address to a node receiving the transaction through a down-link verification network;
the node receiving the transaction receives the encrypted hidden address through the under-link verification network and decrypts the encrypted hidden address;
the node receiving the transaction acquires the transaction information from the block chain according to the decrypted hidden address;
the sending the encrypted hidden address to a node receiving a transaction through a down-link verification network includes:
the node initiating the transaction randomly sends the encrypted hidden address to at least one node in the downlink verification network;
further comprising:
each node receiving the encrypted hidden address executes: verifying the received encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, if so, decrypting the encrypted hidden address, otherwise, randomly sending the encrypted hidden address to at least one node in the downlink verification network;
the node receiving the transaction receives the encrypted hidden address through the downlink verification network, and decrypts the encrypted hidden address, including:
when the node receiving the transaction receives the encrypted hidden address, the encrypted hidden address is verified, whether the encrypted hidden address needs to be decrypted by the node is judged, and if yes, the encrypted hidden address is decrypted;
the node initiating the transaction randomly sends the encrypted hidden address to at least one node in the downlink verification network, and the method comprises the following steps:
the node initiating the transaction generates a transaction envelope and randomly sends the transaction envelope to at least one node in the downlink verification network, wherein the transaction envelope comprises: the encrypted hidden address, and plaintext metadata for verification and decryption;
and each node receiving the encrypted hidden address executes: verifying the received encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, if so, decrypting the encrypted hidden address, otherwise, randomly sending the encrypted hidden address to at least one node in the downlink verification network, and including:
each node receiving the encrypted hidden address executes: verifying the transaction envelope by using the received plaintext metadata in the transaction envelope, judging whether the transaction envelope needs to be decrypted by the node, if so, decrypting the encrypted hidden address by using the plaintext metadata and a private key of the node receiving the transaction, otherwise, randomly sending the transaction envelope to at least one node in the under-link verification network;
when the node receiving the transaction receives the encrypted hidden address, the node verifies the encrypted hidden address, judges whether the encrypted hidden address needs to be decrypted by the node, and if so, decrypts the encrypted hidden address, including:
the node receiving the transaction verifies the transaction envelope by using the received plaintext metadata in the transaction envelope, judges whether the transaction envelope needs to be decrypted by the node, and if so, decrypts the encrypted hidden address by using the plaintext metadata and a private key of the node receiving the transaction;
the clear text metadata includes: at least one target topic, expiration date;
further comprising:
each node receiving the encrypted hidden address executes: judging whether the current time is before the expiration date, if so, executing the verification of the transaction envelope by using the received plaintext metadata in the transaction envelope, and if not, ending the current process;
and each node receiving the encrypted hidden address executes: the step of verifying the transaction envelope by using the received plaintext metadata in the transaction envelope and judging whether the transaction envelope needs to be decrypted by the node comprises the following steps:
each node receiving the encrypted hidden address executes: judging whether the transaction envelope has a theme concerned by the node according to the received at least one target theme in the transaction envelope, and if not, determining that the transaction envelope does not need to be decrypted by the node;
wherein the downlink authentication network is achieved based on the consensus of each node, the downlink authentication network is an ID-based message network and is an asynchronous broadcast network among a set of p2p nodes.
2. The method of claim 1,
executing, at each node that receives the encrypted hidden address: before verifying the received encrypted hidden address, the method further includes:
each node receiving the encrypted hidden address executes: and determining the received hash value of the transaction envelope, judging whether the hash value which is the same as the hash value of the transaction envelope is recorded in the node, if so, determining that the transaction envelope has been received, and ending the current process, otherwise, recording the hash value of the transaction envelope, and executing the verification of the received encrypted hidden address.
3. A blockchain and hidden address based transaction system, comprising:
at least two nodes;
the node initiating the transaction in the at least two nodes is used for storing transaction information into a block chain when initiating the transaction, determining a hidden address in which the transaction information is stored, encrypting the hidden address, and sending the encrypted hidden address to a node receiving the transaction through a down-link verification network;
the node for receiving the transaction in the at least two nodes is used for receiving the encrypted hidden address through the under-link verification network when receiving the transaction, decrypting the encrypted hidden address and acquiring the transaction information from the block chain according to the decrypted hidden address;
the node initiating the transaction, when executing the sending of the encrypted hidden address to the node receiving the transaction through the downlink verification network, is specifically configured to:
randomly sending the encrypted hidden address to at least one node in the downlink verification network;
each node receiving the encrypted hidden address is configured to: verifying the received encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, if so, decrypting the encrypted hidden address, otherwise, randomly sending the encrypted hidden address to at least one node in the downlink verification network;
the node receiving the transaction, when executing the receiving of the encrypted hidden address through the link verification network and decrypting the encrypted hidden address, is specifically configured to:
when the encrypted hidden address is received, verifying the encrypted hidden address, judging whether the encrypted hidden address needs to be decrypted by the node, and if so, decrypting the encrypted hidden address;
the node that initiates the transaction, when executing the random sending of the encrypted hidden address to at least one node in the downlink authentication network, is specifically configured to:
generating a transaction envelope, and randomly sending the transaction envelope to at least one node in the downlink verification network, wherein the transaction envelope comprises: the encrypted hidden address, and plaintext metadata for verification and decryption;
each node receiving the encrypted hidden address is configured to: verifying the transaction envelope by using the received plaintext metadata in the transaction envelope, judging whether the transaction envelope needs to be decrypted by the node, if so, decrypting the encrypted hidden address by using the plaintext metadata and a private key of the node receiving the transaction, otherwise, randomly sending the transaction envelope to at least one node in the under-link verification network;
the node for receiving the transaction is used for verifying the transaction envelope by using the received plaintext metadata in the transaction envelope, judging whether the transaction envelope needs to be decrypted by the node, and if so, decrypting the encrypted hidden address by using the plaintext metadata and a private key of the node for receiving the transaction;
the clear text metadata includes: at least one target topic, expiration date;
each node receiving the encrypted hidden address is further configured to: judging whether the current time is before the expiration date, if so, executing the verification of the transaction envelope by using the received plaintext metadata in the transaction envelope, and if not, ending the current process;
each node receiving the encrypted hidden address is configured to: judging whether the transaction envelope has a theme concerned by the node according to the received at least one target theme in the transaction envelope, and if not, determining that the transaction envelope does not need to be decrypted by the node;
wherein the downlink authentication network is achieved based on the consensus of each node, the downlink authentication network is an ID-based message network and is an asynchronous broadcast network among a set of p2p nodes.
4. The system of claim 3,
each node receiving the encrypted hidden address is further configured to: and determining the received hash value of the transaction envelope, judging whether the hash value which is the same as the hash value of the transaction envelope is recorded in the node, if so, determining that the transaction envelope has been received, and ending the current process, otherwise, recording the hash value of the transaction envelope, and executing the verification of the received encrypted hidden address.
CN201910308303.2A 2019-04-17 2019-04-17 Transaction method and system based on block chain and hidden address Active CN110009499B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910308303.2A CN110009499B (en) 2019-04-17 2019-04-17 Transaction method and system based on block chain and hidden address

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910308303.2A CN110009499B (en) 2019-04-17 2019-04-17 Transaction method and system based on block chain and hidden address

Publications (2)

Publication Number Publication Date
CN110009499A CN110009499A (en) 2019-07-12
CN110009499B true CN110009499B (en) 2021-05-11

Family

ID=67172481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910308303.2A Active CN110009499B (en) 2019-04-17 2019-04-17 Transaction method and system based on block chain and hidden address

Country Status (1)

Country Link
CN (1) CN110009499B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245569B (en) * 2020-01-14 2021-04-27 中国科学院软件研究所 Block chain network covert communication method based on node uniqueness identifier arrangement
CN111507711B (en) * 2020-04-08 2023-12-15 青岛科技大学 Business interaction method and system based on block chain invisible address
CN114614981B (en) * 2022-02-21 2023-12-19 北京航空航天大学 Hidden information transmission method and device based on-chain negotiation
CN114844729B (en) * 2022-07-04 2022-09-30 中国人民解放军国防科技大学 Network information hiding method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678175A (en) * 2013-12-05 2014-03-26 长城信息产业股份有限公司 Address concealing method and embedded equipment based on address concealing technology
CN107742212A (en) * 2017-10-13 2018-02-27 深圳怡化电脑股份有限公司 Assets verification method, apparatus and system based on block chain
CN108833522A (en) * 2018-06-06 2018-11-16 北京八分量信息科技有限公司 A kind of believable system and method for determining node

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102130768B (en) * 2010-12-20 2012-11-07 西安西电捷通无线网络通信股份有限公司 Terminal equipment having capability of encrypting and decrypting link layer and data processing method thereof
CN106788985A (en) * 2016-11-25 2017-05-31 中国电子科技集团公司第三十研究所 The stealthy address implementation method that a kind of third party can supervise
GB201705621D0 (en) * 2017-04-07 2017-05-24 Nchain Holdings Ltd Computer-implemented system and method
WO2019127531A1 (en) * 2017-12-29 2019-07-04 深圳前海达闼云端智能科技有限公司 Block chain-based data processing method and apparatus, storage medium and electronic device
CN108632254B (en) * 2018-04-03 2020-09-25 电子科技大学 Access control method of intelligent home environment based on private chain
CN108600199A (en) * 2018-04-08 2018-09-28 国网浙江省电力有限公司电力科学研究院 A kind of transmission method and system of the Audit data based on block chain
CN108711105A (en) * 2018-05-16 2018-10-26 四川吉鼎科技有限公司 A kind of Secure Transaction verification method and system based on block chain
CN109034801A (en) * 2018-07-31 2018-12-18 杭州复杂美科技有限公司 A kind of privacy method of commerce and system, equipment and can storage medium
CN109508552B (en) * 2018-11-09 2021-04-30 江苏大学 Privacy protection method of distributed cloud storage system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103678175A (en) * 2013-12-05 2014-03-26 长城信息产业股份有限公司 Address concealing method and embedded equipment based on address concealing technology
CN107742212A (en) * 2017-10-13 2018-02-27 深圳怡化电脑股份有限公司 Assets verification method, apparatus and system based on block chain
CN108833522A (en) * 2018-06-06 2018-11-16 北京八分量信息科技有限公司 A kind of believable system and method for determining node

Also Published As

Publication number Publication date
CN110009499A (en) 2019-07-12

Similar Documents

Publication Publication Date Title
CN110009499B (en) Transaction method and system based on block chain and hidden address
CN110719165B (en) Block chain distributed dynamic network key generation and encryption method
US9672514B2 (en) Systems and methods for conducting transactions and communications using a trusted third party
US8359360B2 (en) Electronic message system with federation of trusted senders
US6260142B1 (en) Access and storage of secure group communication cryptographic keys
US7376835B2 (en) Implementing nonrepudiation and audit using authentication assertions and key servers
US7325127B2 (en) Security server system
EP0861541B1 (en) Root key compromise recovery
EP4002181A1 (en) A consensus method and framework for a blockchain system
US7277549B2 (en) System for implementing business processes using key server events
EP3149887B1 (en) Method and system for creating a certificate to authenticate a user identity
KR100684079B1 (en) System and method for detecting the exposure of ocsp responder's session private key
US10756896B2 (en) Trustless account recovery
CN110233850B (en) Registration method, application server, user side and system based on alliance chain
CN113708929B (en) Method for regularly pushing quantum key by edge gateway of Internet of things
CN111914291A (en) Message processing method, device, equipment and storage medium
TW201014312A (en) Transmission/reception system, transmission device, reception device, authentication device, user equipment, method executed using these, and program
CN113556362B (en) Encryption session establishment and maintenance method based on block chain intelligent contract
WO2022265945A1 (en) Methods, mediums, and systems for verifying devices in an encrypted messaging system
CN114142995A (en) Key secure distribution method and device for block chain relay communication network
GB2587541A (en) A consensus method and framework for a blockchain system
US11848930B1 (en) Methods, mediums, and systems for verifying devices in an encrypted messaging system
US11658955B1 (en) Methods, mediums, and systems for verifying devices in an encrypted messaging system
AU2012210978B2 (en) Controlled security domains
US11843636B1 (en) Methods, mediums, and systems for verifying devices in an encrypted messaging system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant