CN110706100A - Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency - Google Patents

Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency Download PDF

Info

Publication number
CN110706100A
CN110706100A CN201910774752.6A CN201910774752A CN110706100A CN 110706100 A CN110706100 A CN 110706100A CN 201910774752 A CN201910774752 A CN 201910774752A CN 110706100 A CN110706100 A CN 110706100A
Authority
CN
China
Prior art keywords
transaction
hash
hash code
authentication
authenticated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910774752.6A
Other languages
Chinese (zh)
Other versions
CN110706100B (en
Inventor
王知康
皮人杰
张玉成
刘文建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201910774752.6A priority Critical patent/CN110706100B/en
Publication of CN110706100A publication Critical patent/CN110706100A/en
Application granted granted Critical
Publication of CN110706100B publication Critical patent/CN110706100B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/31Indexing; Data structures therefor; Storage structures
    • G06F16/316Indexing structures
    • G06F16/325Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a block chain authentication method capable of guaranteeing privacy and being public and transparent. The method comprises the following steps: step 1, generating a corresponding transaction document for each transaction; step 2, the transaction system server generates a hash code for each transaction document, and uploads the hash code, the name of the transaction server and the transaction time to a root hash authentication system to form an effective hash code; step 3, when the transaction document is authenticated, the transaction document to be authenticated is converted into a hash code to be authenticated by using a hash algorithm APP, and the hash code is uploaded to a root hash authentication system; step 4, in the root hash authentication system, carrying out validity authentication on the hash code to be authenticated; and 5, the root hash authentication system returns the authentication result to the hash algorithm APP. The root hash authentication system does not store the transaction document, and only stores the effective hash code. The hash code can not reversely calculate the transaction document, and any party except the transaction parties can not obtain the transaction document, so that the privacy of the transaction parties is ensured.

Description

Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency
Technical Field
The invention relates to the technical field of computers, in particular to a transparent block chain authentication method capable of guaranteeing privacy.
Background
Transaction information made via the internet needs to be recorded in a database for future querying and authentication. However, the content of such transaction information should not be open to the public or to unrelated third parties. Therefore, in the current internet era, it is urgently required to be able to verify and guarantee transaction privacy.
The block chain technology (Blockchain) uses technologies such as distributed data storage and a consensus mechanism, provides ideas and schemes for establishing trust relationships in a decentralized mode, and attracts wide attention of numerous industries. The block chain is a centralization shared general ledger which combines data blocks into a specific data structure in a chain mode according to a time sequence and is ensured in a cryptographic mode to be not falsifiable and not forged, and data which is simple in safe storage, has a precedence relationship and can be verified in a system can be safely stored.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a block chain authentication method which ensures privacy and is public and transparent by using a block chain technology. The invention respectively processes the transaction function and the authentication function, each transaction document generates a corresponding hash code, the transaction document of the user is kept at the user end, and only the hash code is uploaded to the root hash authentication system for future verification and query; since the hash code cannot be inverted, the information can be privacy protected.
In order to achieve the above purposes, the technical scheme adopted by the invention is as follows:
a block chain authentication method for guaranteeing privacy and simultaneously realizing public transparency comprises the following steps:
step 1, when a transaction is generated, the information of the transaction forms a corresponding transaction document, and a transaction user and a transaction system server participating in the transaction respectively store the transaction document;
step 2, the transaction system server generates a unique hash code according to each transaction document and uploads the hash code to a root hash authentication system; meanwhile, uploading the name of the transaction server and the transaction time in the transaction document corresponding to the hash code to a root hash authentication system to form an effective hash code;
step 3, when the transaction document needs to be authenticated, converting the transaction document to be authenticated into a hash code to be authenticated by using a hash algorithm APP at the user side, and uploading the hash code to be authenticated to a root hash authentication system for authentication;
step 4, in the root hash authentication system, carrying out validity authentication on the uploaded hash code to be authenticated: matching the hash code to be authenticated with the valid hash code, if the matched valid hash code is not found, judging that the root hash authentication system is invalid, and returning to be invalid; if the matched effective hash code is found, the transaction system is judged to be effective, and corresponding transaction time and the name of the transaction system server are returned;
and 5, the root hash authentication system returns the authentication result to the hash algorithm APP of the user side, and the validity of the transaction document can be determined through the hash algorithm APP.
On the basis of the above technical solution, in step 1, the transaction system server is a transaction system server based on a block chain.
On the basis of the above technical solution, in step 1, the transaction information includes a transaction server name, transaction time, balance and other related transaction information.
On the basis of the above technical scheme, in step 1, a transaction document database is arranged in the transaction system server and is responsible for storing and maintaining transaction detailed information in the transaction document.
On the basis of the technical scheme, the transaction document database comprises a plurality of independent transaction document sub-databases used for storing transaction documents of different transaction types.
On the basis of the above technical solution, in step 2, the hash code is generated by a hash algorithm operation.
On the basis of the above technical solution, the HASH algorithm is specifically a HASH256 algorithm or a HASH512 algorithm.
On the basis of the technical scheme, the hash algorithm APP is an open-source hash code algorithm APP.
On the basis of the technical scheme, the root hash authentication system comprises a hash code storage database and a hash code authentication part;
the hash code storage database is used for storing the effective hash codes;
the hash code authentication part is used for calling the effective hash code in the hash code storage database when the validity authentication of the hash code to be authenticated is required, and performing matching authentication on the hash code to be authenticated and the called effective hash code.
On the basis of the technical scheme, the hash code storage database comprises a plurality of independent hash code sub-databases with synchronous contents.
The block chain authentication method capable of guaranteeing privacy and simultaneously being public and transparent has the following beneficial effects:
1. the hash code is public, and the transaction document is generated into the hash code through calculation by an existing hash algorithm.
2. The root hash authentication system does not store transaction documents, only has hash codes uploaded by a transaction system server, transaction server names and transaction time, and is completely public and transparent.
3. Only the two parties using the transaction document can obtain the original text of the transaction document. The transaction document of the user is kept at the user side and is completely kept secret, and the hash code is uploaded to the root hash system at the user side through the hash algorithm APP for authentication.
4. The hash code can not reversely calculate the original transaction document, so that except for two transaction parties, any person including a root hash authentication system can not know the specific content of the transaction document, thereby ensuring the privacy of transaction related parties.
Drawings
The invention has the following drawings:
FIG. 1 is a block flow diagram of a method of the present invention;
fig. 2 is a schematic structural diagram of a root hash authentication system according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
As shown in fig. 1 to 2, the block chain authentication method for guaranteeing privacy and simultaneously disclosing transparency according to the present invention includes the following steps:
step 1, when a transaction is generated, the information of the transaction forms a corresponding transaction document, and a transaction user and a transaction system server participating in the transaction respectively store the transaction document;
step 2, the transaction system server generates a unique hash code according to each transaction document and uploads the hash code to a root hash authentication system; meanwhile, uploading the name of the transaction server and the transaction time in the transaction document corresponding to the hash code to a root hash authentication system to form an effective hash code;
step 3, when the transaction document needs to be authenticated, converting the transaction document to be authenticated into a hash code to be authenticated by using a hash algorithm APP at the user side, and uploading the hash code to be authenticated to a root hash authentication system for authentication;
step 4, in the root hash authentication system, carrying out validity authentication on the uploaded hash code to be authenticated: matching the hash code to be authenticated with the valid hash code, if the matched valid hash code is not found, judging that the root hash authentication system is invalid, and returning to be invalid; if the matched effective hash code is found, the transaction system is judged to be effective, and corresponding transaction time and the name of the transaction system server are returned;
and 5, the root hash authentication system returns the authentication result to the hash algorithm APP of the user side, and the validity of the transaction document can be determined through the hash algorithm APP.
On the basis of the above technical solution, in step 1, the transaction system server is a transaction system server based on a block chain.
On the basis of the above technical solution, in step 1, the transaction information includes a transaction server name, transaction time, balance and other related transaction information.
On the basis of the above technical scheme, in step 1, a transaction document database is arranged in the transaction system server and is responsible for storing and maintaining transaction detailed information in the transaction document.
On the basis of the technical scheme, the transaction document database comprises a plurality of independent transaction document sub-databases used for storing transaction documents of different transaction types.
On the basis of the above technical solution, in step 2, the hash code is generated by a hash algorithm operation.
On the basis of the above technical solution, the HASH algorithm is specifically a HASH256 algorithm or a HASH512 algorithm.
On the basis of the technical scheme, the hash algorithm APP is an open-source hash code algorithm APP.
On the basis of the technical scheme, the root hash authentication system comprises a hash code storage database and a hash code authentication part;
the hash code storage database is used for storing the effective hash codes;
the hash code authentication part is used for calling the effective hash code in the hash code storage database when the validity authentication of the hash code to be authenticated is required, and performing matching authentication on the hash code to be authenticated and the called effective hash code.
On the basis of the technical scheme, the hash code storage database comprises a plurality of independent hash code sub-databases with synchronous contents.
In the actual authentication process, the transaction related party can download the existing open-source hash algorithm APP to the user side.
The root hash authentication system does not store transaction documents, only has hash codes uploaded by a transaction system server, transaction server names and transaction time, and is completely public and transparent.
In the whole authentication process, only the transaction related party can obtain the transaction document. The transaction document of the user is kept at the user side and is completely kept secret, and the hash code is uploaded to the root hash system at the user side through the hash algorithm APP for authentication. The hash code can not reversely calculate the original transaction document, so that except for two transaction parties, any person including a root hash authentication system can not know the specific content of the transaction document, thereby ensuring the privacy of transaction related parties.
Those not described in detail in this specification are within the skill of the art.

Claims (10)

1. A block chain authentication method for guaranteeing privacy and simultaneously realizing public transparency is characterized by comprising the following steps:
step 1, when a transaction is generated, the information of the transaction forms a corresponding transaction document, and a transaction user and a transaction system server participating in the transaction respectively store the transaction document;
step 2, the transaction system server generates a unique hash code according to each transaction document and uploads the hash code to a root hash authentication system; meanwhile, uploading the name of the transaction server and the transaction time in the transaction document corresponding to the hash code to a root hash authentication system to form an effective hash code;
step 3, when the transaction document needs to be authenticated, converting the transaction document to be authenticated into a hash code to be authenticated by using a hash algorithm APP at the user side, and uploading the hash code to be authenticated to a root hash authentication system for authentication;
step 4, in the root hash authentication system, carrying out validity authentication on the uploaded hash code to be authenticated: matching the hash code to be authenticated with the valid hash code, if the matched valid hash code is not found, judging that the root hash authentication system is invalid, and returning to be invalid; if the matched effective hash code is found, the transaction system is judged to be effective, and corresponding transaction time and the name of the transaction system server are returned;
and 5, the root hash authentication system returns the authentication result to the hash algorithm APP of the user side, and the validity of the transaction document can be determined through the hash algorithm APP.
2. The method according to claim 1, wherein in step 1, the transaction system server is a blockchain-based transaction system server.
3. The method for guaranteeing privacy while disclosing transparent blockchain authentication as claimed in claim 1, wherein in step 1, the information of the transaction includes a transaction server name and a transaction time.
4. The block chain authentication method for ensuring privacy and simultaneously disclosing transparency as claimed in claim 1, wherein in step 1, a transaction document database is provided in the transaction system server and is responsible for storing and maintaining transaction detail information in the transaction document.
5. The method of claim 4, wherein the transaction document database comprises a plurality of independent transaction document sub-databases for storing transaction documents of different transaction types.
6. The privacy-preserving, public-transparent blockchain authentication method as claimed in claim 1, wherein in step 2, the hash code is generated by a hash algorithm operation.
7. The privacy-preserving, public-transparent blockchain authentication method of claim 6, wherein the HASH algorithm is specifically a HASH256 algorithm or a HASH512 algorithm.
8. The privacy-preserving, public-transparent blockchain authentication method according to claim 1, wherein the hash algorithm APP is an open-source hash code algorithm APP.
9. The privacy-preserving, public-transparent blockchain authentication method of claim 1, wherein the root hash authentication system includes a hash code storage database and a hash code authentication portion;
the hash code storage database is used for storing the effective hash codes;
the hash code authentication part is used for calling the effective hash code in the hash code storage database when the validity authentication of the hash code to be authenticated is required, and performing matching authentication on the hash code to be authenticated and the called effective hash code.
10. The method of claim 9, wherein the hash code storage database comprises a plurality of separate hash code sub-databases with synchronized content.
CN201910774752.6A 2019-08-21 2019-08-21 Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency Active CN110706100B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910774752.6A CN110706100B (en) 2019-08-21 2019-08-21 Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910774752.6A CN110706100B (en) 2019-08-21 2019-08-21 Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency

Publications (2)

Publication Number Publication Date
CN110706100A true CN110706100A (en) 2020-01-17
CN110706100B CN110706100B (en) 2022-07-26

Family

ID=69193219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910774752.6A Active CN110706100B (en) 2019-08-21 2019-08-21 Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency

Country Status (1)

Country Link
CN (1) CN110706100B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112181700A (en) * 2020-09-22 2021-01-05 中国建设银行股份有限公司 Fault transaction isolation method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN108833111A (en) * 2018-05-29 2018-11-16 浪潮软件集团有限公司 Block chain-based file evidence storage and identification realization method
CN109377221A (en) * 2018-10-16 2019-02-22 杭州趣链科技有限公司 A method of the privacy based on alliance's block chain, which is traded, to be protected
CN109583896A (en) * 2018-11-30 2019-04-05 元灵通智能科技(深圳)有限公司 Transaction verification method, block chain node and storage medium
CN110113168A (en) * 2019-04-03 2019-08-09 厦门历思科技服务有限公司 A kind of information authentication method, client, system and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107180350A (en) * 2017-03-31 2017-09-19 唐晓领 A kind of method of the multi-party shared transaction metadata based on block chain, apparatus and system
CN108833111A (en) * 2018-05-29 2018-11-16 浪潮软件集团有限公司 Block chain-based file evidence storage and identification realization method
CN109377221A (en) * 2018-10-16 2019-02-22 杭州趣链科技有限公司 A method of the privacy based on alliance's block chain, which is traded, to be protected
CN109583896A (en) * 2018-11-30 2019-04-05 元灵通智能科技(深圳)有限公司 Transaction verification method, block chain node and storage medium
CN110113168A (en) * 2019-04-03 2019-08-09 厦门历思科技服务有限公司 A kind of information authentication method, client, system and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112181700A (en) * 2020-09-22 2021-01-05 中国建设银行股份有限公司 Fault transaction isolation method and device

Also Published As

Publication number Publication date
CN110706100B (en) 2022-07-26

Similar Documents

Publication Publication Date Title
US11743041B2 (en) Technologies for private key recovery in distributed ledger systems
US10652018B2 (en) Methods and apparatus for providing attestation of information using a centralized or distributed ledger
CN107292181B (en) Database system based on block chain and using method using system
CN111771194B (en) System and method for generating and maintaining a non-variable digital conference record within a distributed network node
CN110400221B (en) Data processing method, system, storage medium and computer equipment
AU2007240567B2 (en) Peer-to-peer contact exchange
JP2020511017A (en) System and method for implementing blockchain-based digital certificates
US11838289B2 (en) Systems and methods for activating an authentication token within a communication platform
EP3948594A1 (en) Blockchain identities
JP2009530906A (en) Endpoint verification using call sign
CN110706100B (en) Block chain authentication method capable of guaranteeing privacy and simultaneously realizing openness and transparency
WO2014165925A1 (en) Method and system for the secure transfer and verification of ownership of digital sequences
CN113761578A (en) Document true checking method based on block chain
JP2021148850A (en) Information processing system, information processing method, information processing program, secure computing system, secure computing method, and secure computing program
CN110728577B (en) Centralized block chain transaction method capable of continuously expanding hierarchical layers
CN112801672B (en) Agricultural product traceability two-dimensional code signature method based on group signature
CN108924104A (en) A kind of method of E-Government encryption and decryption
US20230360093A1 (en) Method and system for encoding and decoding user identities between systems
JP2010034783A (en) Time stamp compression apparatus, verification apparatus, request apparatus, server, control method, program, and storage medium
US11379597B2 (en) Method and system for determination of authenticity of an electronic document or copy thereof by comparing it with an earlier authentic version of the electronic document in question
JP2006302202A (en) Multiple application decision system and method therefor
Yeh et al. Integrating Cellphone-based Hardware Wallet with Visional Certificate Verification System
Gao et al. Similarity-based Secure Deduplication for IIoT Cloud Management System
WO2014204292A1 (en) Non-repudiable collaborative updates of document
WO2023214887A1 (en) Method and system for information exchange encoding and decoding user identities between computer systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant