CN111242453A - Financial evaluation method and system based on block chain - Google Patents

Financial evaluation method and system based on block chain Download PDF

Info

Publication number
CN111242453A
CN111242453A CN202010012650.3A CN202010012650A CN111242453A CN 111242453 A CN111242453 A CN 111242453A CN 202010012650 A CN202010012650 A CN 202010012650A CN 111242453 A CN111242453 A CN 111242453A
Authority
CN
China
Prior art keywords
evaluation
data
financial
enterprise
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010012650.3A
Other languages
Chinese (zh)
Other versions
CN111242453B (en
Inventor
王永春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
T Chain Beijing Technology Co ltd
Original Assignee
T Chain Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by T Chain Beijing Technology Co ltd filed Critical T Chain Beijing Technology Co ltd
Priority to CN202010012650.3A priority Critical patent/CN111242453B/en
Publication of CN111242453A publication Critical patent/CN111242453A/en
Application granted granted Critical
Publication of CN111242453B publication Critical patent/CN111242453B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Educational Administration (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Quality & Reliability (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Technology Law (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application relates to a financial evaluation method and an evaluation system based on a block chain, wherein the financial evaluation method based on the block chain comprises the steps of acquiring data and an evaluation model required by evaluation from the block chain; evaluating data required by evaluation according to the evaluation model to obtain a first evaluation analysis result; acquiring a plaintext calculation result from the enterprise to be evaluated, and carrying out privacy calculation on the plaintext calculation result to obtain a second evaluation analysis result; and comparing the first evaluation analysis result with the second evaluation analysis result, and if the first evaluation analysis result is consistent with the second evaluation analysis result, taking a plaintext calculation result as an enterprise financial evaluation result. The financial data of the enterprise can be protected from being disclosed, the financial evaluation can be automatically completed on the block chain under the condition that the business secret of the enterprise is not revealed, the timeliness and the authenticity required by an evaluator are met, the operation activity of the enterprise cannot be influenced, and the accuracy of the evaluation result can be improved by verifying the evaluation result of an evaluator.

Description

Financial evaluation method and system based on block chain
Technical Field
The application belongs to the technical field of finance, and particularly relates to a financial evaluation method and an evaluation system based on a block chain.
Background
The financial operation condition is a life line of enterprise development and dominates the development trend of the enterprise. The financial condition of an enterprise can be accurately analyzed, the enterprise production value can be enlarged, profits can be obtained, the enterprise value can be improved, and the shareholder wealth can be increased, so that the assessment of the enterprise financial is a very important item of each enterprise. In the traditional enterprise financial evaluation method, the financial condition of an enterprise is statistically calculated by financial staff in a third-party evaluation or audit organization, so that a large amount of manpower resources are consumed to analyze the financial, and the subjectivity of a plurality of financial staff is doped in the financial analysis, so that the financial analysis result has large errors; meanwhile, due to limited human resources, only single type of financial data can be counted in a short time, so that the financial analysis result has a large one-sidedness.
In the related art, the financial evaluation system is used for performing financial evaluation on the enterprise to analyze the operation condition of the enterprise, or the financial auditing system is used for auditing the operation activities of the enterprise. However, since the accounting activity of the enterprise is recorded by the internal personnel of the enterprise, the financial evaluation system or the financial auditing system used by the company manager and the external personnel (such as investors) cannot confirm whether the financial data is tampered when the enterprise is subjected to financial evaluation and audit. Moreover, the enterprise to be evaluated or audited only provides limited data at a specific time, the data providing is delayed, and managers and external personnel cannot actively select the evaluation time, so that whether historical data is tampered or modified is difficult to guarantee. Meanwhile, based on business confidentiality requirements, an enterprise cannot completely disclose internal information, and an evaluation organization or an auditing organization can only carry out limited verification from limited data, so that evaluation information is insufficient, and an evaluation result is influenced.
Disclosure of Invention
In order to overcome the defects that the financial evaluation system in the related art cannot confirm that the evaluated data is limited, data supply is delayed, an administrator and external personnel cannot actively select evaluation time, and whether historical data is tampered or decorated is difficult to guarantee at least to a certain extent. Meanwhile, based on business confidentiality requirements, an enterprise cannot completely disclose internal information, and an evaluation organization or an auditing organization can only perform limited verification from limited data, so that the problems of insufficient evaluation information and influence on evaluation results are solved.
In a first aspect, the present application provides a block chain-based financial assessment method, including:
acquiring data and an evaluation model required by evaluation from a block chain;
evaluating the data required by the evaluation according to the evaluation model to obtain a first evaluation analysis result;
obtaining a plaintext calculation result from an evaluated enterprise, and carrying out privacy calculation on the plaintext calculation result to obtain a second evaluation analysis result;
and comparing the first evaluation analysis result with the second evaluation analysis result, and if the first evaluation analysis result is consistent with the second evaluation analysis result, taking the plaintext calculation result as an enterprise financial evaluation result.
Further, the data required for evaluation is an enterprise financial data ciphertext, the evaluation model includes a statistical analysis template and a calculation logic, and obtaining a first evaluation analysis result according to the data required for evaluation includes:
and calculating the enterprise financial data ciphertext according to the statistical analysis template and the calculation logic to generate a ciphertext calculation result, and taking the ciphertext calculation result as a first evaluation analysis result.
Further, the data required for evaluation is hash data, the evaluation model includes a statistical analysis template and a calculation logic, and obtaining a first evaluation analysis result according to the data required for evaluation includes:
acquiring an enterprise financial data ciphertext from the evaluated enterprise according to the hash data;
and calculating the enterprise financial data ciphertext according to the statistical analysis template and the calculation logic to generate a ciphertext calculation result, and taking the ciphertext calculation result as a first evaluation analysis result.
Further, the enterprise financial data cryptograph includes: and performing homomorphic encryption according to the original financial data to obtain a financial data ciphertext and performing precomputation on the original financial data to obtain a financial index ciphertext.
Further, the privacy calculation of the plaintext calculation result to obtain a second evaluation analysis result includes:
obtaining a plaintext calculation result, and carrying out homomorphic encryption on the plaintext calculation result to generate a second evaluation analysis result;
and/or (c) and/or,
acquiring a ciphertext of a plaintext calculation result, and decrypting the ciphertext of the plaintext calculation result to obtain a plaintext calculation result;
and carrying out homomorphic encryption on the plaintext calculation result to generate a second evaluation analysis result.
Further, the acquiring data and an evaluation model required for evaluation from the blockchain includes:
and verifying the authenticity of the data required by the evaluation and the evaluation model according to the intelligent contract.
Further, the hash data includes:
generating a financial data ciphertext according to the original financial data;
and inserting a salt value into the financial data ciphertext, and performing hash calculation on the financial data ciphertext added with the salt value to obtain hash data.
In a second aspect, the present application provides another block chain-based financial assessment method, including:
uploading data and an evaluation model required by evaluation to a block chain;
evaluating the original financial data according to the evaluation model to obtain a plaintext calculation result;
and sending the plaintext calculation result to an evaluator.
In a third aspect, the present application provides a method for financial assessment based on a blockchain, including:
the enterprise uploads data and an evaluation model required by evaluation to a block chain;
the assessment party acquires data and an assessment model required by assessment from the block chain, and assesses the data required by the assessment according to the assessment model to obtain a first assessment analysis result;
the method comprises the steps that an enterprise evaluates original financial data according to an evaluation model to obtain a plaintext calculation result, and the plaintext calculation result is sent to an evaluator;
and the evaluator performs privacy calculation on the plaintext calculation result to obtain a second evaluation analysis result, compares the first evaluation analysis result with the second evaluation analysis result, and if the first evaluation analysis result is consistent with the second evaluation analysis result, takes the plaintext calculation result as an enterprise financial evaluation result.
In a fourth aspect, the present application provides a blockchain-based financial assessment system, comprising:
an enterprise client, an evaluator client and a blockchain;
the enterprise client and the evaluator client perform data transmission through the blockchain, and/or,
and the enterprise client and the evaluator client perform data transmission point to point.
The financial evaluation method and the evaluation system based on the block chain provided by the embodiment of the invention have the advantages that an evaluator acquires data and an evaluation model required by evaluation from the block chain, the block chain technology is used for realizing the non-falsification of financial historical data, a plaintext calculation result is acquired from an evaluated enterprise, a second evaluation analysis result is obtained by performing privacy calculation on the plaintext calculation result, the plaintext calculation result is directly acquired from the lower part of the block chain, the transmission of the plaintext calculation result on the block chain is avoided, the privacy of the enterprise is ensured, the statistical analysis and evaluation on the enterprise financial under the condition of not revealing the business secret of the enterprise can be further realized by the privacy calculation technology, the financial evaluation can be automatically completed on the block chain, the timeliness and the authenticity required by an evaluator are met, the operation activity of the enterprise is not influenced, and the first evaluation analysis result and the second evaluation analysis result are compared, if the evaluation result is consistent with the evaluation result, the clear text calculation result is used as the enterprise financial evaluation result, so that secondary verification of the evaluation result can be realized, and the accuracy of the evaluation result is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a flowchart of a block chain-based financial evaluation method according to an embodiment of the present application.
Fig. 2 is a flowchart of a block chain-based financial evaluation method according to another embodiment of the present application.
Fig. 3 is a flowchart of a block chain-based financial evaluation method according to another embodiment of the present application.
Fig. 4 is a flowchart of a block chain-based financial evaluation method according to another embodiment of the present application.
Fig. 5 is a flowchart of another block chain-based financial evaluation method according to another embodiment of the present application.
Fig. 6 is a flowchart of another block chain-based financial evaluation method according to another embodiment of the present application.
Fig. 7 is a functional block diagram of a block chain-based financial evaluation system according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail below. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present application.
Fig. 1 is a flowchart of a block chain-based financial evaluation method according to an embodiment of the present application, and as shown in fig. 1, the block chain-based financial evaluation method includes:
s11: acquiring data and an evaluation model required by evaluation from a block chain;
s12: evaluating data required by evaluation according to the evaluation model to obtain a first evaluation analysis result;
s13: acquiring a plaintext calculation result from the enterprise to be evaluated, and carrying out privacy calculation on the plaintext calculation result to obtain a second evaluation analysis result;
s14: and comparing the first evaluation analysis result with the second evaluation analysis result, and if the first evaluation analysis result is consistent with the second evaluation analysis result, taking a plaintext calculation result as an enterprise financial evaluation result.
The block chain technology (Blockchain technology) is a distributed database which is recorded and maintained by a plurality of parties together, a chain data structure is formed through hash indexes, and the integrity of the data is protected through cryptography, so that any party is difficult to tamper, repudiate and counterfeit. The block chain technology has the characteristics of decentralization, openness and non-tamper-ability. The block chain system enables each node on the chain to participate in data recording, and does not need an intermediary, so that credit loss caused by the cost of the intermediary and the asymmetry of information is solved.
The block chain in this embodiment is a federation chain, and the members need to be approved when entering, so that the security of the enterprise financial data is protected. It should be noted that, the present application does not limit the types of the blockchains, and those skilled in the art can select the blockchains according to actual needs.
In the existing financial evaluation system based on the block chain, the accounting data is directly recorded on the block chain in a clear text, and the block chain can ensure that the accounting data is not tampered, but cannot protect the business secret of an enterprise. In this embodiment, a privacy calculation is used to encrypt the financial data and the plaintext calculation result, and the privacy calculation is also called privacy protection calculation or security calculation, which refers to a technique for processing data to obtain a required result on the premise that data or calculation logic is in an encrypted state and is not leaked to a partner.
Meanwhile, the block chain and the privacy calculation are combined, so that the contradiction problem of authenticity verification and privacy protection of the financial data is solved.
As an optional implementation manner of the invention, the data required for evaluation is an enterprise financial data ciphertext, and the enterprise financial data ciphertext includes but is not limited to a financial data ciphertext obtained by homomorphic encrypting the original financial data and a financial index homomorphic ciphertext obtained by pre-calculating the original financial data.
In some embodiments, the privacy calculation is an addition homomorphic encryption algorithm, and since the addition homomorphic encryption algorithm is used, the original financial data related to multiplication or division cannot be directly uploaded to the block chain, the precalculation may be performed first to obtain the corresponding financial index, and the financial index is uploaded to the block chain after the addition homomorphic encryption calculation is performed. Correspondingly, if the multiplication homomorphic encryption algorithm is used, the addition or subtraction method is pre-calculated to meet the requirement of the multiplication homomorphic encryption algorithm. For the fully homomorphic encryption algorithm, in some cases, in order to reduce the consumption of computing resources of private computation, pre-computation is also performed so as to simplify the complexity of ciphertext computation during evaluation.
In some embodiments, raw financial data, including but not limited to accounting and business data, may be obtained from accounting systems and business management systems within the enterprise. )
Accounting data of enterprise calculates according to the formula of setting for and obtains financial index, such as financial ratio, statistical value etc. financial index and original financial data generate financial data cryptograph after carrying out addition homomorphic encryption, and the enterprise is at the operation in-process, and financial data cryptograph is constantly uploaded to the block chain to prevent that financial data from being tampered with. Through setting up financial index, can reduce the direct use raw data on the one hand, protect enterprise privacy to the financial index is carried out the preliminary treatment to raw financial data earlier, can reduce the calculation degree of difficulty, and on the other hand can satisfy addition homomorphic encryption algorithm requirement. It should be noted that, different encryption algorithms have different required financial indexes, and those skilled in the art can adjust the financial indexes according to the privacy encryption algorithm.
Homomorphic Encryption (Homomorphic Encryption) is an Encryption technique that allows cryptographic data to be directly operated to obtain a ciphertext result, and the result of decrypting the ciphertext calculation result is the same as the result of performing the same operation on plaintext data.A cryptographic function having Homomorphic properties means that two plaintexts a, b satisfy the Encryption function of Dec (En (a) ⊙ En (b) a ⊕ b), where En () is an Encryption operation and Dec () is a decryption operation, ⊙, ⊕ correspond to operations on the ciphertext and plaintext fields, respectively.A ⊕ represents addition, the Encryption is referred to as additonal Homomorphic Encryption, when ⊙ represents multiplication, the Encryption is referred to as multiplicative Homomorphic Encryption, and when both addition and multiplicative Homomorphic Encryption are satisfied, the algorithm is referred to as Homomorphic Encryption, allowing calculation on ciphertext, a target function and encrypted data are input to generate an Encryption result.
It should be noted that the privacy computation technology further includes Trusted Execution Environment (TEE), secure multi-party computation (mpc), zero-knowledge proof (zk-SNARK), and other technologies, and the algorithm used in the privacy computation is not limited in this application, and those skilled in the art may use other privacy computation technologies or a combination of several privacy computation technologies to achieve data privacy protection based on experience.
The evaluation model comprises a statistical analysis template and a calculation logic, and obtains a first evaluation analysis result according to data required by evaluation, wherein the evaluation model comprises the following steps:
and calculating the enterprise financial data ciphertext according to the statistical analysis template and the calculation logic to generate a ciphertext calculation result, and taking the ciphertext calculation result as a first evaluation analysis result.
The statistical analysis template comprises the calculation logic of the financial statistical analysis set by the system according to the requirements of a data user, the input is financial data, and the output is the results of a financial statement, a statistical statement and a financial model, and various statistical analysis templates such as an asset liability statement, a profit and loss statement, various investment analysis models and the like can be set.
The evaluation party evaluates through the statistical analysis template, calculation can be carried out without decrypting the homomorphic ciphertext, and the evaluation model and the used privacy calculation algorithm are the same, so that the ciphertext calculation result after the homomorphic encryption by the addition is consistent with the plaintext calculation result after the homomorphic addition homomorphic encryption.
If not, sending the verification failure message to the enterprise to be evaluated, and uploading the data required by evaluation again after the enterprise checks.
As an optional implementation manner of the present invention, the data required for evaluation is hash data, the evaluation model includes a statistical analysis template and a calculation logic, and a first evaluation analysis result is obtained according to the data required for evaluation, including:
acquiring an enterprise financial data ciphertext corresponding to the hash from the evaluated enterprise according to the hash data;
and calculating the enterprise financial data ciphertext according to the statistical analysis template and the calculation logic to generate a ciphertext calculation result, and taking the ciphertext calculation result as a first evaluation analysis result.
And uploading the hash data to the block chain to avoid chaining the financial data ciphertext, and on one hand, when the evaluator evaluates, the evaluator needs to obtain the financial data ciphertext according to the hash data after being agreed by the evaluation enterprise, so that the evaluator is limited to evaluate the enterprise on the one hand. On the other hand, the hash data occupies less resources, so that the load of a block chain can be reduced, and the data transmission efficiency is improved.
In some embodiments, the hash generation step comprises:
generating a financial data ciphertext according to the original financial data;
and inserting a salt value into the financial data ciphertext, and performing hash calculation on the financial data ciphertext inserted with the salt value to obtain hash data.
Salt values are inserted into the enterprise financial data ciphertext, and can be random numbers, so that the repeated hash data can be avoided, and the uniqueness of the data required by evaluation is ensured.
The process of performing privacy computation on the plaintext computation result to obtain the second evaluation analysis result includes, but is not limited to, the following two ways:
the first method is as follows: obtaining a plaintext calculation result, and carrying out homomorphic encryption on the plaintext calculation result to generate a second evaluation analysis result;
the second method comprises the following steps: acquiring a ciphertext of the plaintext calculation result, and decrypting the ciphertext of the plaintext calculation result to obtain a plaintext calculation result; the ciphertext of the plaintext calculation result can be encrypted and generated according to the block chain public key of the evaluator, and the evaluator decrypts the ciphertext by using the block chain private key to obtain the plaintext calculation result; and carrying out homomorphic encryption on the plaintext calculation result to generate a second evaluation analysis result.
The acquiring data and an evaluation model required by evaluation from the blockchain further comprises:
and verifying and evaluating the required data and the authenticity of the evaluation model according to the intelligent contract.
And setting an intelligent contract on the block chain, verifying whether data submitted by the enterprise client and the evaluator client, such as a signature, a timestamp and an enterprise address, are correct by the intelligent contract, and identifying the data to the block chain by the block chain link points after the data are verified.
In some embodiments, the method further comprises:
sending evaluation request information to the evaluated enterprise through the block chain, wherein the evaluation request information can comprise an evaluation model;
encrypting the evaluation request information by using a blockchain public key of the evaluated enterprise;
the evaluation request message is signed using the evaluator blockchain private key.
When a participant such as an evaluator or an enterprise to be evaluated on the blockchain joins the blockchain, a random number-elliptic curve technology is used to generate a key pair and an address, called a blockchain key pair, wherein the address is an identifier of the participant on the blockchain. The enterprise as a financial data provider needs to generate a homomorphic key in addition to the blockchain key for encrypting financial data. The homomorphic secret key is generated by using a homomorphic encryption algorithm, a block chain secret key pair, namely a public key and a private key, needs to be set when data uploading and data acquisition are carried out on a block chain, after an enterprise to be evaluated receives a request of an evaluator, the authenticity of the information of the evaluator is verified by using the public key of the evaluator, and then the request information is decrypted by using the private key of the block chain, so that the data privacy is protected.
In the embodiment, an evaluator acquires data and an evaluation model required for evaluation from a blockchain, uses a blockchain technology to realize non-falsification of financial historical data, acquires a plaintext calculation result from an evaluated enterprise, performs privacy calculation on the plaintext calculation result to obtain a second evaluation analysis result, directly acquires the plaintext calculation result from the blockchain, avoids the transmission of the plaintext calculation result on the blockchain, ensures enterprise privacy, further realizes statistical analysis and evaluation on enterprise financial affairs under the condition of not revealing enterprise business secrets through the privacy calculation technology, and can not only meet the timeliness and authenticity required by an evaluator but also not influence the operation activities of the enterprise because financial evaluation can be automatically completed on the blockchain, and compares the first evaluation analysis result with the second evaluation analysis result, if the results are consistent, takes the plaintext calculation result as an enterprise financial evaluation result, the secondary verification of the evaluation result can be realized, so that the accuracy of the evaluation result is improved.
An embodiment of the present invention provides another financial evaluation method based on a block chain, as shown in a flowchart in fig. 2, where the financial evaluation method based on a block chain includes:
s21: uploading data and an evaluation model required by evaluation to a block chain;
s22: evaluating the original financial data according to the evaluation model to obtain a plaintext calculation result;
s23: and sending the plaintext calculation result to the evaluator.
Because the evaluation model based on the evaluation analysis result of the plaintext is the same as that of the evaluator, the consistency of evaluation of the two evaluators can be ensured.
And after the enterprise to be evaluated agrees with the evaluation request, signing the plaintext calculation result by using the block chain private key and submitting the plaintext calculation result to the evaluating party. If the data required by the evaluation acquired by the evaluator is hash data, the enterprise also needs to sign the data such as the accounting data and the financial index encrypted by using the homomorphic public key with the block chain private key and submit the data to the evaluator.
Referring to fig. 3, in some embodiments, the step of uploading the data required for evaluation to the blockchain by the evaluated enterprise may be implemented by, but is not limited to, the following processes:
s31: carrying out homomorphic encryption on the original financial data to generate an enterprise financial data ciphertext;
the homomorphic encryption algorithm consists of four parts, namely a key generation algorithm, an encryption algorithm, a decryption algorithm and a ciphertext calculation algorithm. Key generation algorithm KeyGen (λ): the input is a security parameter lambda, and the output is a pair of secret keys (PK, SK), wherein PK is a public key, and SK is a private key;
encryption algorithm Enc (PK, m): the input is a public key PK and a plaintext, and the output is a ciphertext;
decryption algorithm Dec (SK, c): the input is a private key SK and a ciphertext, and the output is a plaintext;
ciphertext computation algorithm Eval (PK, F, c1, …, cn): the input is the public key PK, the function F () and the ciphertext c1, …, cn, and the output is a ciphertext cF. Function F () is ciphertext computational logic.
Because the homomorphic encryption algorithm has limitation on the calculation mode, and meanwhile, compared with the increase of the calculation amount of an algebraic calculation formula, the calculation amount of the corresponding ciphertext calculation is exponentially increased, so that the homomorphic encryption algorithm needs to be met, the resource consumption is reduced, the operation logic needs to be optimized and preprocessed before homomorphic encryption is used, and on one hand, the homomorphic encryption algorithm is adapted, for example, multiplication operation is converted into addition operation to adapt to the addition homomorphic algorithm, or data is pre-calculated to reduce the times and the difficulty of the homomorphic calculation logic.
The method is characterized in that a Paillier encryption algorithm is used for illustrating a homomorphic encryption implementation process, the Paillier algorithm has an addition homomorphic attribute and comprises the following algorithms:
key generation algorithm KeyGen (λ): independently and randomly generating two large prime numbers p and q, wherein the lengths of the two prime numbers are the same, calculating n ═ p × q, λ ═ lcm (p-1, q-1), lcm () is the least common multiple, and randomly selecting an integer g to satisfy the requirement of the common multiple
Figure BDA0002357705380000111
Let the functions L (x) to (x-1)/n, and μ to (L (g)λmodn2))-1modn exists, wherein
Figure BDA0002357705380000112
Is not more than n2A multiplicative group formed by the natural numbers of (1); the public key PK is set to (n, g),the private key SK ═ (λ, μ); encryption algorithm Enc (PK, m): for plaintext m, m ∈ ZnSelecting a random number r (0)<r<n), the encryption process is that c is gmrnmodn2(ii) a Decryption algorithm Dec (SK, c): for ciphertext
Figure BDA0002357705380000113
m=L(cλmodn2)*μ*modn。
It should be noted that the Paillier homomorphic encryption algorithm is an addition homomorphic encryption, that is: for any given c1 ═ Enc (PK, m1), c2 ═ Enc (PK, m2), mF ═ m1+ m2, cF ═ c1+ c2, then mF ═ Dec (SK, cF). The application does not limit the type of homomorphic algorithm used, and a person skilled in the art can adopt a corresponding homomorphic encryption algorithm according to actual data.
In some embodiments, the processed data may be uploaded to the local database before being uploaded to the blockchain.
S32: selecting a chain-up mode, wherein the chain-up mode comprises ciphertext chain-up or Hash chain-up;
and when the ciphertext chaining mode is used, the financial data ciphertext is transmitted on the block chain, and when the Hash chaining mode is used, the Hash data is transmitted on the block chain.
S33: packaging and signing data required by evaluation;
s34: and checking the data to be uploaded through the intelligent contract, and uploading the data required by evaluation to the block chain after the checking is passed.
According to the financial evaluation method based on the block chain, an evaluated enterprise can select the chaining mode, data safety is further protected, and after the Hash chaining mode is selected, the Hash data can be prevented from being repeated by inserting the salt value into an enterprise financial data ciphertext, and data verification reliability is further enhanced.
Fig. 4 is a flowchart of a block chain-based financial evaluation method according to another embodiment of the present application, and as shown in fig. 4, the block chain-based financial evaluation method includes:
s41: the enterprise uploads data and an evaluation model required by evaluation to a block chain;
s42: the assessment party acquires data and an assessment model required by assessment from the block chain, and assesses the data required by the assessment according to the assessment model to obtain a first assessment analysis result;
and after the verification is passed, the enterprise financial data ciphertext is evaluated and analyzed according to the statistical analysis template and the evaluation calculation logic to obtain a first evaluation analysis result.
S43: the enterprise evaluates the original financial data according to the evaluation model to obtain a plaintext calculation result, and sends the plaintext calculation result to an evaluator;
s44: and the evaluator performs privacy calculation on the plaintext calculation result to obtain a second evaluation analysis result, compares the first evaluation analysis result with the second evaluation analysis result, and takes the plaintext calculation result as the enterprise financial evaluation result if the first evaluation analysis result is consistent with the second evaluation analysis result.
In some embodiments, referring to fig. 5, before performing the evaluation, the evaluator needs to send evaluation request information to the evaluated enterprise through the blockchain, where the evaluation request information includes an evaluation model, and the sent information is encrypted using a blockchain public key of the evaluated enterprise and signed with an evaluator blockchain private key.
After the evaluation enterprises agree, the two parties start the intelligent contract. Uploading homomorphically encrypted financial data by an evaluated enterprise according to an intelligent contract, wherein the financial data ciphertext can be obtained by an evaluator or a third-party trusted computing mechanism, the third-party trusted computing mechanism calculates the ciphertext according to an evaluation model when the third-party trusted computing mechanism calculates, and after the calculation is finished, the third-party trusted computing mechanism encrypts a ciphertext calculation result by using an evaluator block chain public key; and the signature is sent to the evaluator by using the private key of the block chain of the third-party trusted computing mechanism.
After the evaluator calculates and obtains the calculation result of the ciphertext or receives the calculation result of the ciphertext sent by the third-party trusted calculation mechanism and the plaintext calculation result sent by the enterprise to be evaluated, the evaluator verifies the signatures of the third-party trusted calculation mechanism and the enterprise to be evaluated respectively by using the block chain public keys of the third-party trusted calculation mechanism and the enterprise to be evaluated, and confirms the sender of the information; after the verification is passed, the evaluator decrypts the plaintext calculation result and the ciphertext calculation result respectively by using the own block chain private key; and encrypting the plaintext calculation result by using the homomorphic public key of the enterprise, comparing the encrypted plaintext result with the ciphertext result, if the results are consistent, judging that the evaluation is correct, if the plaintext result is the evaluation result, generating an evaluation report, if the results are inconsistent, returning the verification information to the enterprise to be evaluated, and uploading the evaluation data again after the enterprise to be evaluated checks.
In some embodiments, referring to fig. 6, the uploading of the evaluation data in the hash uplink mode selected by the evaluated enterprise includes the following specific steps:
step 1: after an evaluated enterprise agrees with an evaluation request, an intelligent contract is triggered, a data list and a calculation logic required by the template are set in the intelligent contract, the evaluated enterprise sends the data list and the calculation logic to a third-party trusted computing mechanism and an evaluating party according to the intelligent contract, and the third-party trusted computing mechanism captures a hash value contained in the data list from a block chain according to the data list.
Step 2: and the evaluated enterprise selects homomorphic ciphertext corresponding to the hash value and the salt value from the local uplink database according to the data list, encrypts the data by using the block chain public key of the third-party trusted computing agency, signs by using the block chain private key of the evaluated enterprise, and sends the signed result to the third-party trusted computing agency.
And step 3: after verifying the signature of the data sent by the enterprise to be evaluated, the third-party trusted computing agency decrypts the homomorphic ciphertext sent by the enterprise to be evaluated by using the block chain private key of the third-party trusted computing agency, inserts the salt ciphertext to obtain the hash value, compares the hash value with the hash value obtained on the block chain, if the two are consistent, the verification is passed, and if the two are not consistent, the result is fed back to the enterprise, and the evaluation process is terminated.
And 4, step 4: after the Hash verification is passed, the third-party trusted computing agency removes salt values from homomorphic ciphertexts sent by the enterprise to be evaluated according to the evaluation model, then carries out computation, encrypts the cipher text computation results by using the block chain public key of the evaluating party, signs by using the block chain private key of the third-party trusted computing agency, and sends the cipher text computation results to the evaluating party.
And 5: after the evaluation party verifies the signatures of the evaluated enterprise and the trusted computing organization of the third party respectively, the cipher text computing result and the plaintext computing result are decrypted respectively by using the private key of the block chain of the evaluation party, the plaintext computing result is encrypted by using the homomorphic public key of the enterprise, the encrypted plaintext computing result and the encrypted ciphertext computing result are compared, if the two are consistent, the verification is passed, and the plaintext computing result is the evaluation result. If the two are not consistent, the verification fails, the evaluator encrypts the verification result by using the enterprise blockchain public key, signs by using the own blockchain private key, returns the verification information to the enterprise to be evaluated, and uploads the evaluation data again after the evaluation data is checked by the enterprise to be evaluated.
In the financial evaluation method based on the block chain provided by this embodiment, an enterprise to be evaluated uploads an enterprise financial data ciphertext to the block chain, an evaluator obtains the enterprise financial data ciphertext from the block chain, evaluates and analyzes the financial data ciphertext to obtain a first evaluation analysis result, the enterprise to be evaluated evaluates and analyzes original enterprise financial data according to an evaluation model to obtain a plaintext evaluation analysis result, the evaluation analysis result is directly sent to the evaluator, the evaluator encrypts the plaintext evaluation analysis to generate a second evaluation analysis result, verifies the first evaluation analysis result and the second evaluation analysis result, and if the results are verified, an evaluation report is generated, so that the financial evaluation is automatically completed on the block chain, the timeliness and the authenticity required by the evaluator are met, and the operation activities of the enterprise are not affected, and, through verifying the evaluators' assessment results, can improve the accuracy of the assessment results.
An embodiment of the present invention provides a financial evaluation system based on a block chain, as shown in a functional structure diagram of fig. 7, where the financial evaluation system based on the block chain includes:
enterprise client 71, evaluator client 72, and blockchain 73;
data transfer between the enterprise client 71 and the evaluator client 72 includes, but is not limited to, the following two ways:
the first method is as follows: the enterprise client 71 and the evaluator client 72 perform data transmission through a block chain 73;
the second method comprises the following steps: the enterprise client 71 performs point-to-point data transmission with the evaluator client 72.
The enterprise client 71 sends the plaintext calculation result to the evaluation party client 72 in a point-to-point transmission manner, so that the plaintext calculation result can be prevented from being transmitted on a block chain, and the enterprise privacy is further ensured.
The client is installed in the local or cloud of an enterprise and comprises functional modules for acquiring data, processing, encrypting data, processing calculation results, communicating, checking and the like.
The enterprise client 71 is used for uploading data required by evaluation and an evaluation model to the blockchain; evaluating the original financial data according to the evaluation model to obtain a plaintext calculation result; and sending the plaintext calculation result to the evaluator.
The evaluator client 72 is used for acquiring data and an evaluation model required by evaluation from the blockchain; evaluating data required by evaluation according to the evaluation model to obtain a first evaluation analysis result; acquiring a plaintext calculation result from the enterprise to be evaluated, and carrying out privacy calculation on the plaintext calculation result to obtain a second evaluation analysis result; and comparing the first evaluation analysis result with the second evaluation analysis result, and if the first evaluation analysis result is consistent with the second evaluation analysis result, taking a plaintext calculation result as an enterprise financial evaluation result.
As an optional implementation manner of this embodiment, the system further includes a third-party Trusted computing authority client 74, configured to compute the enterprise financial data ciphertext to generate a ciphertext computation result and send the ciphertext computation result to the evaluator client 72, where the third-party Trusted computing authority client 74 provides security protection through hardware and software, such as SE (Secure Element), TEE (Trusted Execution Environment), and protects a key from being cracked.
By introducing the third-party trusted computing agency client 74 to calculate the financial data ciphertext, the situation that an evaluator acquires the financial data ciphertext can be further avoided, the privacy of the financial data can be further guaranteed, and the fairness of evaluation can be guaranteed.
The block chain comprises: modules such as intelligent contracts, consensus algorithms, distributed networking, cryptography, block structures, P2P (peer) propagation and the like; the client comprises modules of login, data processing, network communication, calculation, homomorphic encryption and database, P2P (peer to peer) propagation and the like, wherein the evaluated enterprise is connected with a financial management system inside the enterprise through an API. The block chain is used for recording data, ensuring that the data can be traced and cannot be tampered, and connecting the block chain to a local client to perform data processing and data communication.
With regard to the above related embodiments of the block chain-based financial evaluation system, the specific implementation related thereto has been described in detail in the related method embodiments, and will not be elaborated herein.
The financial evaluation system based on the block chain provided by the embodiment is composed of an uplink block chain network and a downlink block chain network, the block chain network is used for recording data, data traceability and data falsification are guaranteed, a local client is connected with the block chain network and can also process the data in the downlink block chain network, and the timeliness and the trueness required by an evaluator are met while the operation activities of enterprises are not influenced.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the terms "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
While embodiments of the present application have been shown and described above, it is understood that the above embodiments are illustrative and not to be construed as limiting the present application and that changes, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the scope of the present application.
It should be noted that the present invention is not limited to the above-mentioned preferred embodiments, and those skilled in the art can derive other products in various forms without departing from the spirit of the present invention, but any changes in shape or structure can be made within the scope of the present invention with the same or similar technical solutions as those of the present invention.

Claims (10)

1. A block chain based financial assessment method, comprising:
acquiring data and an evaluation model required by evaluation from a block chain;
evaluating the data required by the evaluation according to the evaluation model to obtain a first evaluation analysis result;
obtaining a plaintext calculation result from an evaluated enterprise, and carrying out privacy calculation on the plaintext calculation result to obtain a second evaluation analysis result;
and comparing the first evaluation analysis result with the second evaluation analysis result, and if the first evaluation analysis result is consistent with the second evaluation analysis result, taking the plaintext calculation result as an enterprise financial evaluation result.
2. The method according to claim 1, wherein the data required for evaluation is ciphertext of enterprise financial data, the evaluation model comprises a statistical analysis template and a calculation logic, and the obtaining a first evaluation analysis result according to the data required for evaluation comprises:
and calculating the enterprise financial data ciphertext according to the statistical analysis template and the calculation logic to generate a ciphertext calculation result, and taking the ciphertext calculation result as a first evaluation analysis result.
3. The method according to claim 1, wherein the data required for evaluation is hash data, the evaluation model includes a statistical analysis template and a calculation logic, and the obtaining a first evaluation analysis result according to the data required for evaluation includes:
acquiring an enterprise financial data ciphertext from the evaluated enterprise according to the hash data;
and calculating the enterprise financial data ciphertext according to the statistical analysis template and the calculation logic to generate a ciphertext calculation result, and taking the ciphertext calculation result as a first evaluation analysis result.
4. The blockchain-based financial assessment method according to any one of claims 2 or 3, wherein said enterprise financial data cryptogram comprises: and performing homomorphic encryption according to the original financial data to obtain a financial data ciphertext and performing precomputation on the original financial data to obtain a financial index ciphertext.
5. The method according to claim 1, wherein said privacy-based computation of said plaintext computation result to obtain a second evaluation analysis result comprises:
obtaining a plaintext calculation result, and carrying out homomorphic encryption on the plaintext calculation result to generate a second evaluation analysis result;
and/or (c) and/or,
acquiring a ciphertext of a plaintext calculation result, and decrypting the ciphertext of the plaintext calculation result to obtain a plaintext calculation result;
and carrying out homomorphic encryption on the plaintext calculation result to generate a second evaluation analysis result.
6. The blockchain-based financial assessment method according to claim 1, wherein said obtaining assessment required data and assessment models from blockchains comprises:
and verifying the authenticity of the data required by the evaluation and the evaluation model according to the intelligent contract.
7. The blockchain-based financial assessment method according to claim 3 wherein said hashing data comprises:
generating a financial data ciphertext according to the original financial data;
and inserting a salt value into the financial data ciphertext, and performing hash calculation on the financial data ciphertext added with the salt value to obtain hash data.
8. A block chain based financial assessment method, comprising:
uploading data and an evaluation model required by evaluation to a block chain;
evaluating the original financial data according to the evaluation model to obtain a plaintext calculation result;
and sending the plaintext calculation result to an evaluator.
9. A block chain based financial assessment method, comprising:
the enterprise uploads data and an evaluation model required by evaluation to a block chain;
the assessment party acquires data and an assessment model required by assessment from the block chain, and assesses the data required by the assessment according to the assessment model to obtain a first assessment analysis result;
the method comprises the steps that an enterprise evaluates original financial data according to an evaluation model to obtain a plaintext calculation result, and the plaintext calculation result is sent to an evaluator;
and the evaluator performs privacy calculation on the plaintext calculation result to obtain a second evaluation analysis result, compares the first evaluation analysis result with the second evaluation analysis result, and if the first evaluation analysis result is consistent with the second evaluation analysis result, takes the plaintext calculation result as an enterprise financial evaluation result.
10. A blockchain-based financial assessment system, comprising:
an enterprise client, an evaluator client and a blockchain;
the enterprise client and the evaluator client perform data transmission through the blockchain,
and/or (c) and/or,
and the enterprise client and the evaluator client perform data transmission point to point.
CN202010012650.3A 2020-01-07 2020-01-07 Financial evaluation method and evaluation system based on block chain Active CN111242453B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010012650.3A CN111242453B (en) 2020-01-07 2020-01-07 Financial evaluation method and evaluation system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010012650.3A CN111242453B (en) 2020-01-07 2020-01-07 Financial evaluation method and evaluation system based on block chain

Publications (2)

Publication Number Publication Date
CN111242453A true CN111242453A (en) 2020-06-05
CN111242453B CN111242453B (en) 2023-10-24

Family

ID=70872315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010012650.3A Active CN111242453B (en) 2020-01-07 2020-01-07 Financial evaluation method and evaluation system based on block chain

Country Status (1)

Country Link
CN (1) CN111242453B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364370A (en) * 2020-10-14 2021-02-12 天津大学 Privacy protection cloud auditing method based on block chain
CN113259084A (en) * 2021-06-09 2021-08-13 江苏苏宁银行股份有限公司 Method and device for pre-warning of mortgage risk of movable property, computer equipment and storage medium
CN113420307A (en) * 2021-06-28 2021-09-21 未鲲(上海)科技服务有限公司 Ciphertext data evaluation method and device, computer equipment and storage medium
CN114118455A (en) * 2021-10-22 2022-03-01 中国联合重型燃气轮机技术有限公司 Intelligent operation and maintenance system of gas turbine based on block chain
CN114205155A (en) * 2021-12-07 2022-03-18 四川启睿克科技有限公司 Supplier risk assessment system and method based on safe multi-party calculation
CN114257381A (en) * 2021-12-21 2022-03-29 四川启睿克科技有限公司 Non-knowledge proof based yield calculation method
CN114723200A (en) * 2021-01-05 2022-07-08 ***通信有限公司研究院 Data value evaluation method and device
CN116911809A (en) * 2023-08-25 2023-10-20 广东宏航供应链科技集团有限公司 Human resource management system for supply chain enterprises based on block chain technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8521628B1 (en) * 2007-08-22 2013-08-27 United Services Automobile Association (Usaa) Systems and methods for financial assessment specific advice
CN109194641A (en) * 2018-08-27 2019-01-11 广东工业大学 A kind of transmission method of business datum, device, equipment and storage medium
CN110113203A (en) * 2019-04-30 2019-08-09 阿里巴巴集团控股有限公司 A kind of method and apparatus of the safety evaluation for Encryption Model
CN110287260A (en) * 2019-06-28 2019-09-27 通链(北京)科技有限公司 Independent management entity management method and system based on block chain technology
CN110533419A (en) * 2019-07-24 2019-12-03 阿里巴巴集团控股有限公司 Sharing method, device and the server of air control model based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8521628B1 (en) * 2007-08-22 2013-08-27 United Services Automobile Association (Usaa) Systems and methods for financial assessment specific advice
CN109194641A (en) * 2018-08-27 2019-01-11 广东工业大学 A kind of transmission method of business datum, device, equipment and storage medium
CN110113203A (en) * 2019-04-30 2019-08-09 阿里巴巴集团控股有限公司 A kind of method and apparatus of the safety evaluation for Encryption Model
CN110287260A (en) * 2019-06-28 2019-09-27 通链(北京)科技有限公司 Independent management entity management method and system based on block chain technology
CN110533419A (en) * 2019-07-24 2019-12-03 阿里巴巴集团控股有限公司 Sharing method, device and the server of air control model based on block chain

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364370A (en) * 2020-10-14 2021-02-12 天津大学 Privacy protection cloud auditing method based on block chain
CN114723200A (en) * 2021-01-05 2022-07-08 ***通信有限公司研究院 Data value evaluation method and device
CN113259084A (en) * 2021-06-09 2021-08-13 江苏苏宁银行股份有限公司 Method and device for pre-warning of mortgage risk of movable property, computer equipment and storage medium
CN113420307A (en) * 2021-06-28 2021-09-21 未鲲(上海)科技服务有限公司 Ciphertext data evaluation method and device, computer equipment and storage medium
CN114118455A (en) * 2021-10-22 2022-03-01 中国联合重型燃气轮机技术有限公司 Intelligent operation and maintenance system of gas turbine based on block chain
CN114205155A (en) * 2021-12-07 2022-03-18 四川启睿克科技有限公司 Supplier risk assessment system and method based on safe multi-party calculation
CN114205155B (en) * 2021-12-07 2023-09-15 四川启睿克科技有限公司 Provider risk assessment system and method based on secure multiparty calculation
CN114257381A (en) * 2021-12-21 2022-03-29 四川启睿克科技有限公司 Non-knowledge proof based yield calculation method
CN114257381B (en) * 2021-12-21 2023-11-21 四川启睿克科技有限公司 Yield calculation method based on zero knowledge proof
CN116911809A (en) * 2023-08-25 2023-10-20 广东宏航供应链科技集团有限公司 Human resource management system for supply chain enterprises based on block chain technology

Also Published As

Publication number Publication date
CN111242453B (en) 2023-10-24

Similar Documents

Publication Publication Date Title
CN111242453B (en) Financial evaluation method and evaluation system based on block chain
Backes et al. ADSNARK: Nearly practical and privacy-preserving proofs on authenticated data
US10846372B1 (en) Systems and methods for trustless proof of possession and transmission of secured data
US8654975B2 (en) Joint encryption of data
Li et al. Eunomia: Anonymous and secure vehicular digital forensics based on blockchain
CN110011781A (en) A kind of homomorphic cryptography method encrypting and support zero-knowledge proof for transaction amount
CN1937496A (en) Extensible false name certificate system and method
JP2006511104A (en) Encryption method and encryption apparatus for secure authentication
Cha et al. Blockchain based sensitive data management by using key escrow encryption system from the perspective of supply chain
Xu et al. Multi-candidate voting model based on blockchain
CN113420886B (en) Training method, device, equipment and storage medium for longitudinal federal learning model
US20230237437A1 (en) Apparatuses and methods for determining and processing dormant user data in a job resume immutable sequential listing
US11323489B1 (en) Scalable auditability of monitoring process using public ledgers
CN110380845A (en) Quantum secret communication alliance chain method of commerce based on group&#39;s pool of symmetric keys, system, equipment
Gong et al. A data privacy protection scheme for Internet of things based on blockchain
Panwar et al. Sampl: Scalable auditability of monitoring processes using public ledgers
Nguyen et al. WI is almost enough: Contingent payment all over again
US20240187256A1 (en) Systems and methods for enforcing cryptographically secure actions in public, non-permissioned blockchains using bifurcated self-executing programs comprising shared digital signature requirements
Zhang et al. Data security in cloud storage
CN115883102B (en) Cross-domain identity authentication method and system based on identity credibility and electronic equipment
CN114866289B (en) Privacy credit data security protection method based on alliance chain
CN116432204A (en) Supervision transaction privacy protection method based on homomorphic encryption and zero knowledge proof
US11856095B2 (en) Apparatus and methods for validating user data by using cryptography
Lee Guideline for implementing cryptography in the federal government
Zhao et al. A regulatable mechanism for transacting data assets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant