CN111275406A - Block chain transaction contract auditing method and device, computer equipment and storage medium - Google Patents

Block chain transaction contract auditing method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111275406A
CN111275406A CN202010090456.7A CN202010090456A CN111275406A CN 111275406 A CN111275406 A CN 111275406A CN 202010090456 A CN202010090456 A CN 202010090456A CN 111275406 A CN111275406 A CN 111275406A
Authority
CN
China
Prior art keywords
transaction
private
private asset
certificate
asset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010090456.7A
Other languages
Chinese (zh)
Other versions
CN111275406B (en
Inventor
蒋海
商松
旷凯
朱建国
赵正涌
刘建章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bubi Beijing Network Technology Co ltd
Original Assignee
Bubi Beijing Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bubi Beijing Network Technology Co ltd filed Critical Bubi Beijing Network Technology Co ltd
Priority to CN202010090456.7A priority Critical patent/CN111275406B/en
Publication of CN111275406A publication Critical patent/CN111275406A/en
Application granted granted Critical
Publication of CN111275406B publication Critical patent/CN111275406B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application relates to a block chain transaction contract auditing method, a block chain transaction contract auditing device, computer equipment and a storage medium. The method comprises the following steps: and generating an audit key according to the public key of the transaction auditor and the private key of the target transaction user, and encrypting the user information of the target transaction user according to the audit key to obtain the encrypted user information. And obtaining the private asset amount of the target transaction user, and determining a private asset certificate and a range certificate corresponding to the private asset amount according to the private asset amount. Establishing a transaction contract with a transaction receiver according to the private asset certificate, the range certificate and the encrypted user information; and sending the trading contract to a blockchain system for carrying out the consensus issuing of the whole network. By the private asset certificate and the range certification determined by the transaction initiator, the transaction auditor completes the transaction contract audit by the transaction auditor under the condition that the transaction initiator does not need to disclose the amount of the private asset.

Description

Block chain transaction contract auditing method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method and an apparatus for auditing blockchain transaction contracts, a computer device, and a storage medium.
Background
The block chain technology is taken as a distributed account book technology, brings deep influence to the fields of finance, intelligent manufacturing, supply chains, logistics and the like, and particularly can effectively promote financial institutions to coordinate cross-organization transactions in the aspect of finance.
However, in the transaction process, the blockchain account book needs to be completely disclosed to the transaction auditing party to complete the transaction auditing, which results in disclosure of sensitive private data (such as transaction information such as private asset amount) between the transaction initiating party and the transaction receiving party, and therefore, a scheme for completing the transaction auditing without disclosing the private transaction data to the transaction auditing party is urgently needed.
Disclosure of Invention
In view of the above, it is necessary to provide a method, an apparatus, a computer device and a storage medium for auditing a blockchain transaction contract.
In a first aspect, a method for auditing a blockchain transaction contract is provided, where the method is applied to a transaction initiator in a blockchain system, where the transaction initiator includes at least a target transaction user, and the blockchain system also includes at least a transaction auditor and a transaction receiver, and the method includes:
generating an audit key according to the public key of the transaction auditor and the private key of the target transaction user, and encrypting the user information of the target transaction user according to the audit key to obtain encrypted user information;
acquiring the amount of the private asset of the target transaction user, and determining a private asset certificate and a range certificate corresponding to the amount of the private asset according to the amount of the private asset;
establishing a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information;
and sending the transaction contract to a blockchain system for carrying out whole-network consensus issuing so that the transaction auditor audits the transaction contract.
As an optional implementation manner, the amount of the private asset at least includes an amount of a change-making private asset and an amount of a receiving private asset, the corresponding private asset credentials at least include a change-making private asset credential and a receiving private asset credential, the corresponding range credentials at least include a first range credential corresponding to the change-making private asset credential and a second range credential corresponding to the receiving private asset credential, the obtaining an amount of the private asset of the target transaction user, and determining the private asset credential and the range credential corresponding to the amount of the private asset according to the amount of the private asset, include:
acquiring the amount of the change making private asset, and constructing a change making private asset certificate and a corresponding first range certificate according to a private key of the target transaction user, the amount of the change making private asset and a preset private asset certificate algorithm;
and obtaining the amount of the received private asset, and constructing the received private asset certificate and the corresponding second range certificate according to the private key of the target transaction user, the amount of the received private asset, the public key of the transaction receiver and the preset private asset certificate algorithm.
As an optional implementation, the method further comprises:
receiving an auditing request sent by the transaction auditing party;
calculating the sum of products of a base point in a private asset certificate algorithm and private keys of all transaction users contained in the transaction initiator according to the received audit request;
and sending an audit response to the transaction auditor, wherein the audit response comprises the sum.
In a second aspect, a method for auditing a blockchain transaction contract is provided, where the method is applied to a transaction auditor in a blockchain system, where the blockchain system further includes at least a transaction initiator and a transaction receiver, and the transaction initiator includes at least a target transaction user, and the method includes:
acquiring a transaction contract to be audited, wherein the transaction contract comprises a private asset certificate, a range certificate and encrypted user information of a target transaction user;
generating an audit key according to a private key of the user and a public key of the target transaction user, and decrypting the encrypted user information according to the audit key;
auditing the user information, the private asset certificate and the range certificate to obtain an auditing result;
and if the auditing result is that the auditing is effective, adding an auditing mark into the transaction contract, and sending the transaction contract added with the auditing mark to a block chain system for issuing the whole network.
As an optional implementation manner, after generating an audit key according to a private key of the user and a public key of the target transaction user, and decrypting the encrypted user information according to the audit key, the method further includes:
sending an audit request to the transaction initiator;
receiving an audit response sent by the transaction initiator, wherein the audit response comprises a sum of products of a base point in the private asset certificate algorithm and private keys of all transaction users contained by the transaction initiator;
calculating the sum of public keys of all transaction users in the transaction initiator;
judging whether the sum value is consistent with the sum of the public keys;
and if the sum value is consistent with the sum of the public keys, executing the step of auditing the user information, the private asset certificate and the range certificate to obtain an auditing result.
In a third aspect, there is provided a blockchain transaction contract auditing apparatus, where the apparatus is applied to a transaction initiator in a blockchain system, where the transaction initiator includes at least a target transaction user, and the blockchain system also includes at least a transaction auditor and a transaction receiver, and the apparatus includes:
the encryption module is used for generating an audit key according to the public key of the transaction auditor and the private key of the target transaction user, and encrypting the user information of the target transaction user according to the audit key to obtain encrypted user information;
the determining module is used for acquiring the private asset amount of the target transaction user, and determining a private asset certificate and a range certificate corresponding to the private asset amount according to the private asset amount;
the construction module is used for constructing a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information;
and the sending module is used for sending the transaction contract to a block chain system for carrying out the whole-network consensus issuing so as to ensure that the transaction auditing party audits the transaction contract.
As an optional implementation manner, the amount of the private asset at least includes an amount of a change making private asset and an amount of a receiving private asset, the corresponding private asset credentials at least include a change making private asset credential and a receiving private asset credential, the corresponding range credentials at least include a first range credential corresponding to the change making private asset credential and a second range credential corresponding to the receiving private asset credential, and the determining module is specifically configured to obtain the amount of the change making private asset, and construct the change making private asset credential and the corresponding first range credential according to a private key of the target transaction user, the amount of the change making private asset, and a preset private asset credential algorithm;
and obtaining the amount of the received private asset, and constructing the received private asset certificate and the corresponding second range certificate according to the private key of the target transaction user, the amount of the received private asset, the public key of the transaction receiver and the preset private asset certificate algorithm.
In a fourth aspect, there is provided a blockchain transaction contract auditing apparatus, where the apparatus is applied to a transaction auditor in a blockchain system, where the blockchain system further includes at least a transaction initiator and a transaction receiver, and the transaction initiator includes at least a target transaction user, and the apparatus includes:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring a transaction contract to be audited, and the transaction contract comprises a private asset certificate, a range certificate and encrypted user information of a target transaction user;
the decryption module is used for generating an audit key according to a private key of the decryption module and the public key of the target transaction user and decrypting the encrypted user information according to the audit key;
the auditing module is used for auditing the user information, the private asset certificate and the range certificate to obtain an auditing result;
and the adding module is used for adding an audit mark into the transaction contract if the audit result is that the audit is effective, and sending the transaction contract added with the audit mark to a block chain system for overall network release.
In a fifth aspect, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
generating an audit key according to the public key of the transaction auditor and the private key of the target transaction user, and encrypting the user information of the target transaction user according to the audit key to obtain encrypted user information;
acquiring the amount of the private asset of the target transaction user, and determining a private asset certificate and a range certificate corresponding to the amount of the private asset according to the amount of the private asset;
establishing a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information;
and sending the transaction contract to a blockchain system for carrying out whole-network consensus issuing so that the transaction auditor audits the transaction contract.
In a sixth aspect, there is provided a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
generating an audit key according to the public key of the transaction auditor and the private key of the target transaction user, and encrypting the user information of the target transaction user according to the audit key to obtain encrypted user information;
acquiring the amount of the private asset of the target transaction user, and determining a private asset certificate and a range certificate corresponding to the amount of the private asset according to the amount of the private asset;
establishing a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information;
and sending the transaction contract to a blockchain system for carrying out whole-network consensus issuing so that the transaction auditor audits the transaction contract.
The method is applied to a transaction initiator in a blockchain system, the transaction initiator at least comprises a target transaction user, the blockchain system also at least comprises a transaction auditor and a transaction receiver, the transaction initiator generates an audit key according to a public key of the transaction auditor and a private key of the target transaction user, and encrypts user information of the target transaction user according to the audit key to obtain encrypted user information. And then, the transaction initiator acquires the private asset amount of the target transaction user, and determines a private asset certificate and a range certificate corresponding to the private asset amount according to the private asset amount. The transaction initiator constructs a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information; and finally, the transaction initiator sends the transaction contract to the block chain system for carrying out the whole-network consensus issuing so that the transaction auditor audits the transaction contract. The transaction contract auditing is completed by the transaction initiator under the condition that the transaction initiator does not need to disclose the private asset amount to the transaction auditing party through the private asset certificate and the range certification determined by the transaction initiator.
Drawings
FIG. 1 is a flow chart of a method for auditing blockchain transaction contracts according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram illustrating a cache write process according to an embodiment of the present disclosure;
FIG. 3 is a flow diagram of a method for auditing blockchain transaction contracts according to another embodiment of the present application;
fig. 4 is a schematic diagram of a key exchange process provided in an embodiment of the present application;
FIG. 5 is a diagram illustrating an example of a method for auditing blockchain transaction contracts according to an embodiment of the present disclosure;
FIG. 6 is a block diagram illustrating a block chain transaction contract auditing apparatus according to an embodiment of the present disclosure;
FIG. 7 is a block diagram illustrating a block chain transaction contract auditing apparatus according to another embodiment of the present disclosure;
fig. 8 is an internal structural diagram of a computer device in the embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The block chain transaction contract auditing method can be applied to a transaction initiator in a block chain system, the transaction initiator at least comprises a target transaction user, and the block chain system at least comprises a transaction auditor and a transaction receiver. The transaction initiator generates an audit key according to the public key of the transaction audit party and the private key of the target transaction user, and encrypts the user information of the target transaction user according to the audit key to obtain the encrypted user information. And the transaction initiator acquires the private asset amount of the target transaction user and determines a private asset certificate and a range certificate corresponding to the private asset amount according to the private asset amount. And then, the transaction initiator constructs a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information. And finally, the transaction initiator sends the transaction contract to the block chain system for carrying out the whole-network consensus issuing so that the transaction auditor audits the transaction contract.
The application also provides a block chain transaction contract auditing method which can be applied to a transaction auditing party in a block chain system, wherein the block chain system at least comprises a transaction initiating party and a transaction receiving party. Wherein the transaction initiator at least comprises a target transaction user. The transaction auditing party obtains a transaction contract to be audited, wherein the transaction contract comprises a private asset certificate, a range certificate and encrypted user information of a target transaction user. And the transaction auditing party generates an auditing key according to the private key of the transaction auditing party and the public key of the target transaction user, and decrypts the encrypted user information according to the auditing key. And then, the transaction auditing party audits the user information, the private asset certificate and the range certificate to obtain an auditing result. And finally, if the auditing result is that the auditing is effective, the transaction auditing party adds the auditing mark to the transaction contract and sends the transaction contract added with the auditing mark to the block chain system for issuing the whole network.
An embodiment of the present application provides a blockchain transaction contract auditing method, as shown in fig. 1, where the method is applied to a transaction initiator in a blockchain system, where the transaction initiator at least includes a target transaction user, and the blockchain system also at least includes a transaction auditor and a transaction receiver, and then a specific processing procedure of the method is as follows:
step 101, generating an audit key according to the public key of the transaction auditor and the private key of the target transaction user, and encrypting the user information of the target transaction user according to the audit key to obtain the encrypted user information.
In implementation, the transaction initiator uses the target transaction according to the public key of the transaction auditorAnd the private key of the user generates an audit key. Then, the transaction initiator encrypts the user information of the target transaction user according to the generated audit key for auditing, so that the encrypted user information can be obtained. Specifically, the transaction initiator is bank B, and if there is at least a target transaction user (e.g., user j) in the transaction initiator (bank B), the transaction initiator (bank B) performs the transaction according to the private key (r) of the target transaction user (user j)Bj) And the public key (R) of the transaction auditorAudit) Generating an audit key(s)Bjt) Wherein the secret key s is auditedBjt=rBjRAudit. The corresponding relation between the private key and the public key is the public key RAuditIs equal to the corresponding private key rAuditSummed with base point g of elliptic curve, i.e. RAudit=rAuditg, then audit the secret sBjt=rBjRAudit=rBjrAuditg. Alternatively, the user information of the target transaction user may be, but is not limited to, a user name, an identification number, and the like.
As an optional implementation manner, the encrypted user information may be encrypted by means of an AES (advanced encryption Standard) to form an attribute data field, and the specific expression form is as follows: m isBjnAESEncrypt (from, to, m), where from is a user address of a user j of the bank B (may be an ID number of the user j), to is a user address of a transaction recipient (e.g., a transaction user i in the bank a) (may be an ID number of the user i), and m is encrypted user information.
And 102, acquiring the private asset amount of the target transaction user, and determining a private asset certificate and a range certificate corresponding to the private asset amount according to the private asset amount.
In implementation, in order not to disclose private data such as private asset amount to a transaction auditing party, a transaction initiating party obtains the private asset amount of a target transaction user. And then, the transaction initiator determines a private asset certificate and a range certificate corresponding to the private asset amount according to the private asset amount.
As an optional implementation manner, the amount of the private asset at least includes an amount of a change making private asset and an amount of a receiving private asset, the corresponding private asset credentials at least include a change making private asset credential and a receiving private asset credential, and the corresponding range credentials at least include a first range credential corresponding to the change making private asset credential and a second range credential corresponding to the receiving private asset credential, then the specific processing procedure in step 102 is as follows:
step one, obtaining the amount of the change making private asset, and constructing a change making private asset certificate and a corresponding first range certificate according to a private key of a target transaction user, the amount of the change making private asset and a preset private asset certificate algorithm.
In implementation, a transaction initiator acquires the amount v of the change-making private asset1(also referred to as the amount of remaining private assets) and based on the private key r of the target transaction user (e.g., user j)BjAnd a preset private asset certificate algorithm constructs a change private asset certificate (c)Bjn) And corresponding first range proof (proof)1). In particular, cBjn=rBjg+v1h, wherein g and h are base points on an elliptic curve in the private asset credential algorithm; the first range is proved to be proof1=prove(rBj,v1)。
And step two, obtaining the amount of the received private asset, and constructing a received private asset certificate and a corresponding second range certificate according to the private key of the target transaction user, the amount of the received private asset, the public key of the transaction receiver and a preset private asset certificate algorithm.
In practice, the transaction initiator obtains the amount v of the received private asset2(i.e., the amount of the private asset to be received by the transaction recipient). The transaction initiator then bases its transaction on the private key r of the target transaction user (e.g., user j)BjReceiving the amount v of the private asset2Public key R of the transaction receiverAAnd a preset private asset voucher algorithm is constructed to receive the private asset voucher (c)Ain) And a corresponding second range proof (proof)2) In particular, cAin=(RA+rBjRA)g+v2h. Wherein g and h are base points on an elliptic curve in the private asset credential algorithm; proof of Range2=prove(RA+rBjRA,v2)。
And 103, constructing a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information.
In implementation, the transaction initiator (e.g., bank B) constructs a transaction contract with the transaction recipient based on the derived private asset credentials, the scope attestation, and the encrypted user information. Optionally, the transaction contract may further include a signature performed by the transaction initiator by using its own private key, an identifier of the transaction contract (also referred to as a transaction ledger identifier), an address of the transaction initiator, and the like, and therefore, the embodiment of the present application is not limited.
And 104, sending the transaction contract to the blockchain system for carrying out the whole-network consensus issuing so that the transaction auditor audits the transaction contract.
In implementation, the transaction initiator sends the transaction contract to the blockchain system for global consensus issuing, so that the transaction auditor audits the consensus transaction contract.
As an alternative embodiment, the blockchain system verifies the validity of the transaction contract and performs network-wide consensus distribution.
In implementation, a transaction initiator sends a transaction contract to a blockchain system, then the blockchain system obtains a hash result tx _ hash by calculating the hash of the transaction contract, and constructs a verification body containing a signature of the transaction contract initiator according to the hash result (tx _ hash), specifically, Verify (tx _ hash, signature, RB) Wherein R isBThe signature represents the signature of the transaction initiator for the public key of the transaction initiator. The blockchain system then verifies that the signature of the transaction contract is correct and verifies the transaction contract contents (private asset credentials c) in the transaction contractBjnAnd cAinAnd proof of Range proof of1And proof of2) And if the result is valid, further obtaining a verification result. And finally, the block chain system carries out the whole-network consensus distribution on the verification result. If the verification result is valid, the blockchain system writes the transaction contract into a blockchain storage layer; if the verification result is invalid, the block chain system sends the releaseAbandon the response of the transaction to prompt the transaction initiator.
As an optional implementation manner, the blockchain system sends a cache message to the transaction initiator and the transaction receiver, so that the transaction initiator and the transaction receiver respectively store the transaction contracts belonging to themselves in the transaction contracts of the blockchain system into respective caches.
In implementation, after storing the agreed transaction contracts into the storage layer of the blockchain, the blockchain system sends cache messages to the transaction initiator and the transaction receiver, so that the transaction initiator and the transaction receiver respectively filter the transaction contracts belonging to the transaction initiator and the transaction receiver in all the transaction contracts within a preset time, and write the transaction contracts into respective caches.
Optionally, a two-section cache mechanism is adopted in the present application, the first section cache is a cache of hot audit data (data with high access frequency), the second section cache is a cache of all audit data, and the second section cache adopts a hash table queue structure. When each participant in the transaction accesses the first section of cache, if the audit data is successfully read from the cache, the first section of cache calls the second section of cache, and new hot spot audit data is added into the first section of cache. Specifically, the first section of cache requires fewer caches to meet the requirement of accessing as many as possible, so that all audit data are sorted according to the access frequency, old audit data with low access frequency are evicted, and data existing in the first cache is hot audit data. For example, the size of the first buffer is 4, the audit data write sequence is A, B, C, D, E, D, F, and the access time needs to be updated when writing. When the audit data write reaches the maximum cache, the old data needs to be evicted. Specifically, according to the writing process principle, as shown in fig. 2, A, B, C, D, E, F in fig. 2 is audit data written into the buffer, a (0) indicates that the access frequency of the audit data a is 0 within a preset time, and similarly, a number in a bracket B, C, D, E, F indicates the access frequency of the corresponding audit data within the preset time. When the cache size is not reached, all audit data are stored according to the writing sequence, the writing sequence is recorded, when the audit data E is written, the first cache is full, the audit data E does not appear in the cache, the audit data A with low access frequency needs to be evicted, and the content of the audit data in the cache is E, D, C, B. When next audit data D is written, the audit data D directly updates the access sequence of D in the cache, and the content of the audit data in the cache is D, E, C, B at the moment. And if the next written audit data F and F are not in the cache, the next written audit data F and F are evicted from the audit data B with the lowest access frequency in the cache, and the cache content is F, D, E, C.
As an optional implementation manner, after the transaction contract is sent to the blockchain system for global consensus issuing, an audit request sent by a transaction auditor is received; and calculating the sum of products of the base point in the private asset voucher algorithm and private keys of all transaction users contained in the transaction initiator according to the received audit request, and sending an audit response to the transaction auditor, wherein the audit response contains the sum.
In implementation, because at least one target transaction user is in the transaction initiator, the transaction initiator receives an audit request sent by the transaction auditor after sending the transaction contract to the blockchain system for global consensus issue. Then, the transaction initiator calculates the sum of the base point g in the private asset voucher algorithm and the private keys of the transaction users contained in the transaction initiator according to the received audit request
Figure BDA0002383533280000121
Equivalence relation of the sum
Figure BDA0002383533280000122
Finally, the transaction initiator sends an audit response to the transaction auditor, wherein the audit response contains the sum of the base point calculated by the transaction initiator and the private keys of the transaction users
Figure BDA0002383533280000123
The application provides a blockchain transaction contract auditing method which is applied to a transaction initiator in a blockchain system, wherein the transaction initiator at least comprises a target transaction user. The blockchain system at least comprises a transaction auditor and a transaction receiver. The transaction initiator generates an audit key according to the public key of the transaction audit party and the private key of the target transaction user, and encrypts the user information of the target transaction user according to the audit key to obtain the encrypted user information. And then, the transaction initiator acquires the private asset amount of the target transaction user, and determines a private asset certificate and a range certificate corresponding to the private asset amount according to the private asset amount. The transaction initiator constructs a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information; and finally, the transaction initiator sends the transaction contract to the block chain system for carrying out the whole-network consensus issuing so that the transaction auditor audits the transaction contract. The transaction contract auditing is completed by the transaction initiator under the condition that the transaction initiator does not need to disclose the private asset amount to the transaction auditing party through the private asset certificate and the range certification determined by the transaction initiator.
An embodiment of the present application further provides a method for auditing a blockchain transaction contract, as shown in fig. 3, where the method is applied to a transaction auditor in a blockchain system, and the blockchain system further includes at least a transaction initiator and a transaction receiver, where the transaction initiator includes at least a target transaction user, and then a specific processing procedure is as follows:
step 301, obtaining a transaction contract to be audited, wherein the transaction contract comprises a private asset certificate, a range certificate and encrypted user information of a target transaction user.
In implementation, a transaction auditing party obtains a transaction contract to be audited, wherein the transaction contract comprises a private asset certificate, a range certificate and encrypted user information of a target transaction user. Optionally, the transaction contract may further include a signature of the transaction initiator, the transaction contract identifier, the address of the transaction initiator, and the like, which is not limited in this embodiment.
And step 302, generating an audit key according to the private key of the user and the public key of the target transaction user, and decrypting the encrypted user information according to the audit key.
In implementation, the transaction auditor generates the private key of the transaction auditor and the public key of the target transaction userAnd forming an audit key, and decrypting the encrypted user information according to the audit key. Specifically, the private key of the transaction auditor is rAuditThe public key of the target transaction user (e.g., user j) is RBjIf the generated audit key is SBjt′=rAuditRBj. Then, the transaction auditing party bases on the auditing key sBjt′The encrypted user information is decrypted.
The transaction initiator generates an audit key (step 101) and the transaction auditor generates an audit key (step 302), and a key exchange principle is applied, as shown in fig. 4, two parties of the key exchange are the transaction initiator and the transaction auditor, and an elliptic curve parameter of the shared key is a base point G. The transaction initiator generates a random integer usk(corresponding to the transaction initiator private key), calculate upk=uskG,upkIs the transaction initiator public key. Transaction auditor generating random integer ask(equivalent to the private key of the transaction auditor), calculating apk=askG,apkIs the public key of the transaction auditor. The transaction initiator and the transaction auditor respectively transmit the public key of the transaction initiator and the transaction auditor to the other party (the public key can be transmitted in a public mode, for example, even if an attacker obtains the public key u transmitted by the transaction initiator to the transaction auditorpkDue to the complexity of the discrete logarithm of the elliptic curve, the transaction initiator public key u cannot be calculatedpkU insk(transaction initiator private key). Similarly, the public key a transmitted to the transaction initiator by the transaction auditorpkCan also be delivered publicly without revealing the private key ask) The transaction auditor receives the transaction initiator public key upkWith its own private key askGenerating an audit key Q ═ ask*upkThe transaction initiator receives the public key a of the transaction auditorpkWith its own private key uskGenerating an audit key Q' ═ usk*apk. According to the principle of key exchange, i.e. Q ═ ask*upk=ask*(uskG)=(ask*usk)G=(usk*ask)G=usk(ask*G)=usk*apkQ'. Commutative law and combination due to product operationLaw, both parties get a consistent key.
In particular, the key exchange principle is embodied as s in the present applicationBjt’=rAuditRBj=rAuditrBjg=rBjrAuditg=sBjtTherefore, the key used for auditing by the transaction initiator and the transaction auditor can be judged to be consistent, and therefore, the transaction auditor can use the generated audit key sBjt,The encrypted user information is decrypted.
As an optional implementation manner, after generating an audit key according to the private key of the user and the public key of the target transaction user, and decrypting the encrypted user information according to the audit key, the method further includes: sending an audit request to a transaction initiator; receiving an audit response sent by a transaction initiator, wherein the audit response comprises a sum of products of a base point in a private asset voucher algorithm and private keys of transaction users contained by the transaction initiator; calculating the sum of public keys of all transaction users in a transaction initiator; judging whether the sum is consistent with the sum of the public keys of all transaction users in the transaction initiator; if the sum is consistent with the sum of the public keys of the transaction users in the transaction initiator, step 303 is performed.
In implementation, the transaction auditor sends an audit request to the transaction initiator. The transaction auditor may then receive an audit response (sent by the transaction initiator) to the audit request, where the audit response includes a sum of the products of the base point g in the private asset credential algorithm and the private keys of the transaction users included by the transaction initiator. Specifically, the transaction auditor receives an audit response returned by the transaction initiator (for example, the bank B), and the audit response includes a sum of the product of the base point g and private keys of transaction users (for example, the user 1 to the user n) of the bank B
Figure BDA0002383533280000151
The transaction auditor then calculates the sum of the public keys of each transaction user, specifically,
Figure BDA0002383533280000152
finally, the transaction auditor judgesSum of break value
Figure BDA0002383533280000153
Sum of public keys with each transacting user RBsumWhether it is consistent, i.e. whether it is
Figure BDA0002383533280000154
If the sum value
Figure BDA0002383533280000155
Sum R of public keys of all transaction users in transaction initiatorBsumIf so, the transaction auditor performs step 303.
And 303, auditing the user information, the private asset certificate and the range certificate to obtain an auditing result.
In implementation, the transaction auditing party audits the validity of the user information, the private asset voucher and the range certificate to obtain an auditing result. Optionally, the transaction auditing party audits the transaction contract of all transaction users of the transaction initiating party, and the product of all certificates of the transaction users is
Figure BDA0002383533280000156
Figure BDA0002383533280000157
Auditing whether modification and deletion are carried out in the transaction contract transmission process.
And 304, if the auditing result is that the auditing is effective, adding an auditing mark into the transaction contract, and sending the transaction contract added with the auditing mark to the block chain system for issuing the whole network.
In practice, if all private asset credentials (e.g., c) in the audit result are presentBjnAnd cAin) And proof of range (e.g., proof of1And proof of2) And if the results are all valid, adding the audit mark into the transaction contract through audit, and sending the transaction contract added with the audit mark to the block chain system for issuing the whole network.
The application provides a blockchain transaction contract auditing method which can be applied to a transaction auditing party in a blockchain system, wherein the blockchain system at least comprises a transaction initiating party and a transaction receiving party, and the transaction initiating party at least comprises a target transaction user. And the transaction auditing party acquires a transaction contract to be audited, wherein the transaction contract comprises the private asset certificate, the range certificate and the encrypted user information of the target transaction user. And the transaction auditing party generates an auditing key according to the private key of the transaction auditing party and the public key of the target transaction user, and decrypts the encrypted user information according to the auditing key. Then, the transaction auditing party audits the user information, the private asset certificate and the range certificate to obtain an auditing result; and finally, if the auditing result is that the auditing is effective, the transaction auditing party adds the auditing mark to the transaction contract and sends the transaction contract added with the auditing mark to the block chain system for issuing the whole network. By adopting the method, the transaction initiator can finish the transaction contract audit without disclosing the private asset amount to the transaction auditing party.
It should be understood that although the steps in the flowcharts of fig. 1 and 3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1 and 3 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the sub-steps or stages of other steps.
An example of a block chain transaction contract auditing method is also provided in the embodiments of the present application, as shown in fig. 5, the specific processing procedure is as follows:
step 501, the transaction initiator generates an audit key according to the public key of the transaction auditor and the private key of the target transaction user, and encrypts the user information of the target transaction user according to the audit key to obtain the encrypted user information.
Step 502, the transaction initiator obtains the private asset amount of the target transaction user, and determines the private asset certificate and the range certification corresponding to the private asset amount according to the private asset amount.
Step 503, the transaction initiator constructs a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information, and sends the transaction contract to the blockchain system.
And step 504, the blockchain system verifies the validity of the transaction contract and performs network-wide consensus issuing.
Step 505, the blockchain system sends a cache message to the transaction initiator and the transaction receiver, so that the transaction initiator and the transaction receiver respectively store the transaction contracts belonging to the blockchain system in the transaction contracts to their respective caches.
Step 506, the transaction auditing party obtains the transaction contract to be audited, wherein the transaction contract comprises the private asset certificate, the range certification and the encrypted user information of the target transaction user.
And 507, generating an audit key by the transaction auditor according to the private key of the transaction auditor and the public key of the target transaction user, and decrypting the encrypted user information according to the audit key.
And step 508, the transaction auditing party audits the user information, the private asset certificate and the range certificate to obtain an auditing result.
Step 509, if the auditing result is that the auditing is effective, the transaction auditing party adds the auditing mark to the transaction contract, and sends the transaction contract added with the auditing mark to the block chain system for issuing over the whole network.
An embodiment of the present application further provides a blockchain transaction contract auditing apparatus 600, as shown in fig. 6, where the apparatus is applied to a transaction initiator in a blockchain system, the transaction initiator at least includes a target transaction user, and the blockchain system further at least includes a transaction auditor and a transaction receiver, and the apparatus includes:
the encryption module 610 is configured to generate an audit key according to the public key of the transaction auditor and the private key of the target transaction user, and encrypt the user information of the target transaction user according to the audit key to obtain encrypted user information;
the determining module 620 is configured to obtain the private asset amount of the target transaction user, and determine a private asset credential and a range certificate corresponding to the private asset amount according to the private asset amount;
the construction module 630 is used for constructing a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information;
the sending module 640 is configured to send the transaction contract to the blockchain system for consensus distribution over the whole network, so that the transaction auditor audits the transaction contract.
As an optional implementation manner, the amount of the private asset at least includes an amount of a change making private asset and an amount of a receiving private asset, the corresponding private asset credentials at least include a change making private asset credential and a receiving private asset credential, the corresponding range credentials at least include a first range credential corresponding to the change making private asset credential and a second range credential corresponding to the receiving private asset credential, and the determining module 620 is specifically configured to obtain the amount of the change making private asset, and construct the change making private asset credential and the corresponding first range credential according to a private key of the target transaction user, the amount of the change making private asset and a preset private asset credential algorithm;
and obtaining the amount of the received private asset, and constructing a received private asset certificate and a corresponding second range certificate according to the private key of the target transaction user, the amount of the received private asset, the public key of the transaction receiver and a preset private asset certificate algorithm.
As an optional implementation, the apparatus further comprises:
the receiving module is used for receiving an auditing request sent by a transaction auditing party;
a calculation module for calculating the sum of products of the base point in the private asset certificate algorithm and the private keys of each transaction user included by the transaction initiator according to the received audit request,
and the response module is used for sending an audit response to the transaction auditor, wherein the audit response comprises the sum.
An embodiment of the present application further provides a blockchain transaction contract auditing apparatus 700, as shown in fig. 7, where the apparatus is applied to a transaction auditing party in a blockchain system, the blockchain system further includes at least a transaction initiating party and a transaction receiving party, the transaction initiating party includes at least a target transaction user, and the apparatus includes:
the acquisition module 710 is configured to acquire a transaction contract to be audited, where the transaction contract includes a private asset credential, a range certificate, and encrypted user information of a target transaction user;
the decryption module 720 is configured to generate an audit key according to the private key of the decryption module and the public key of the target transaction user, and decrypt the encrypted user information according to the audit key;
the auditing module 730 is used for auditing the user information, the private asset certificate and the scope certificate to obtain an auditing result;
and the adding module 740 is configured to add the audit flag to the transaction contract if the audit result is that the audit is valid, and send the transaction contract to which the audit flag is added to the block chain system for issuing the whole network.
As an optional implementation, the apparatus further comprises:
the sending module is used for sending an audit request to a transaction initiator;
the receiving module is used for receiving an audit response sent by a transaction initiator, wherein the audit response comprises a sum value of products of a base point in a private asset certificate algorithm and private keys of transaction users contained by the transaction initiator;
the calculation module is used for calculating the sum of public keys of all transaction users in the transaction initiator;
the judging module is used for judging whether the sum value is consistent with the sum of the public keys; if the sum is consistent with the sum of the public keys of all transaction users in the transaction initiator, the auditing module executes the subsequent steps.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program when executed by a processor implements a blockchain transaction contract auditing method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer apparatus, as shown in fig. 8, includes a memory and a processor, the memory having stored thereon a computer program operable on the processor, the processor implementing the steps of the blockchain transaction contract auditing method of any of the above when executing the computer program.
In one embodiment, a computer readable storage medium has stored thereon a computer program that, when executed by a processor, performs the steps of any of the blockchain transaction contract auditing methods described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A blockchain transaction contract auditing method is applied to a transaction initiator in a blockchain system, wherein the transaction initiator at least comprises a target transaction user, and the blockchain system at least comprises a transaction auditor and a transaction receiver, and the method comprises the following steps:
generating an audit key according to the public key of the transaction auditor and the private key of the target transaction user, and encrypting the user information of the target transaction user according to the audit key to obtain encrypted user information;
acquiring the amount of the private asset of the target transaction user, and determining a private asset certificate and a range certificate corresponding to the amount of the private asset according to the amount of the private asset;
establishing a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information;
and sending the transaction contract to a blockchain system for carrying out whole-network consensus issuing so that the transaction auditor audits the transaction contract.
2. The method as claimed in claim 1, wherein the amount of the private asset at least includes an amount of a change private asset and an amount of a receive private asset, the corresponding private asset credentials at least include a change private asset credential and a receive private asset credential, the corresponding range credentials at least include a first range credential corresponding to the change private asset credential and a second range credential corresponding to the receive private asset credential, the obtaining the amount of the private asset of the target transaction user, and determining the private asset credential and the range credential corresponding to the amount of the private asset according to the amount of the private asset comprises:
acquiring the amount of the change making private asset, and constructing a change making private asset certificate and a corresponding first range certificate according to a private key of the target transaction user, the amount of the change making private asset and a preset private asset certificate algorithm;
and obtaining the amount of the received private asset, and constructing the received private asset certificate and the corresponding second range certificate according to the private key of the target transaction user, the amount of the received private asset, the public key of the transaction receiver and the preset private asset certificate algorithm.
3. The method of claim 1, further comprising:
receiving an auditing request sent by the transaction auditing party;
calculating the sum of products of a base point in a private asset certificate algorithm and private keys of all transaction users contained in the transaction initiator according to the received audit request;
and sending an audit response to the transaction auditor, wherein the audit response comprises the sum.
4. A blockchain transaction contract auditing method is applied to a transaction auditing party in a blockchain system, the blockchain system at least comprises a transaction initiating party and a transaction receiving party, the transaction initiating party at least comprises a target transaction user, and the method comprises the following steps:
acquiring a transaction contract to be audited, wherein the transaction contract comprises a private asset certificate, a range certificate and encrypted user information of a target transaction user;
generating an audit key according to a private key of the user and a public key of the target transaction user, and decrypting the encrypted user information according to the audit key;
auditing the user information, the private asset certificate and the range certificate to obtain an auditing result;
and if the auditing result is that the auditing is effective, adding an auditing mark into the transaction contract, and sending the transaction contract added with the auditing mark to a block chain system for issuing the whole network.
5. The method of claim 4, wherein after generating an audit key according to the private key of the user and the public key of the target transaction user and decrypting the encrypted user information according to the audit key, the method further comprises:
sending an audit request to the transaction initiator;
receiving an audit response sent by the transaction initiator, wherein the audit response comprises a sum of products of a base point in a private asset voucher algorithm and private keys of all transaction users contained by the transaction initiator;
calculating the sum of public keys of all transaction users in the transaction initiator;
judging whether the sum value is consistent with the sum of the public keys;
and if the sum value is consistent with the sum of the public keys, the step of auditing the user information, the private asset certificate and the range certificate is executed to obtain an auditing result.
6. A blockchain transaction contract auditing device is applied to a transaction initiator in a blockchain system, wherein the transaction initiator at least comprises a target transaction user, and the blockchain system at least comprises a transaction auditor and a transaction receiver, and the device comprises:
the encryption module is used for generating an audit key according to the public key of the transaction auditor and the private key of the target transaction user, and encrypting the user information of the target transaction user according to the audit key to obtain encrypted user information;
the determining module is used for acquiring the private asset amount of the target transaction user, and determining a private asset certificate and a range certificate corresponding to the private asset amount according to the private asset amount;
the construction module is used for constructing a transaction contract with the transaction receiver according to the private asset certificate, the range certificate and the encrypted user information;
and the sending module is used for sending the transaction contract to a block chain system for carrying out the whole-network consensus issuing so as to ensure that the transaction auditing party audits the transaction contract.
7. The device according to claim 6, wherein the amount of the private asset at least includes an amount of a change private asset and an amount of a receive private asset, the corresponding private asset credentials at least include a change private asset credential and a receive private asset credential, the corresponding range attestation at least includes a first range attestation corresponding to the change private asset credential and a second range attestation corresponding to the receive private asset credential, the determining module is specifically configured to obtain the amount of the change private asset, and construct the change private asset credential and the corresponding first range attestation according to a private key of the target transaction user, the amount of the change private asset, and a preset private asset credential algorithm;
and obtaining the amount of the received private asset, and constructing the received private asset certificate and the corresponding second range certificate according to the private key of the target transaction user, the amount of the received private asset, the public key of the transaction receiver and the preset private asset certificate algorithm.
8. A blockchain transaction contract auditing device is applied to a transaction auditing party in a blockchain system, the blockchain system at least comprises a transaction initiating party and a transaction receiving party, the transaction initiating party at least comprises a target transaction user, and the device comprises:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring a transaction contract to be audited, and the transaction contract comprises a private asset certificate, a range certificate and encrypted user information of a target transaction user;
the decryption module is used for generating an audit key according to a private key of the decryption module and the public key of the target transaction user and decrypting the encrypted user information according to the audit key;
the auditing module is used for auditing the user information, the private asset certificate and the range certificate to obtain an auditing result;
and the adding module is used for adding an audit mark into the transaction contract if the audit result is that the audit is effective, and sending the transaction contract added with the audit mark to a block chain system for overall network release.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any one of claims 1 to 3 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 3.
CN202010090456.7A 2020-02-13 2020-02-13 Blockchain transaction contract auditing method, device, computer equipment and storage medium Active CN111275406B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010090456.7A CN111275406B (en) 2020-02-13 2020-02-13 Blockchain transaction contract auditing method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010090456.7A CN111275406B (en) 2020-02-13 2020-02-13 Blockchain transaction contract auditing method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111275406A true CN111275406A (en) 2020-06-12
CN111275406B CN111275406B (en) 2023-07-28

Family

ID=71003755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010090456.7A Active CN111275406B (en) 2020-02-13 2020-02-13 Blockchain transaction contract auditing method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111275406B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261020A (en) * 2020-10-15 2021-01-22 中国电子科技集团公司第五十四研究所 Distributed remote outsourcing data auditing system and method

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005309788A (en) * 2004-04-21 2005-11-04 Ntt Communications Kk Electronic contract method and system for executing method
US20100080391A1 (en) * 2007-10-30 2010-04-01 Shah Mehul A Auditing Data Integrity
US20170046652A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and method for tracking behavior of networked devices using hybrid public-private blockchain ledgers
US20170178127A1 (en) * 2015-12-18 2017-06-22 International Business Machines Corporation Proxy system mediated legacy transactions using multi-tenant transaction database
WO2017210772A1 (en) * 2016-06-10 2017-12-14 Dark Matter L.L.C. Peer-to-peer security protocol apparatus, computer program, and method
CN107862216A (en) * 2017-10-13 2018-03-30 布比(北京)网络技术有限公司 Method for secret protection, device and the storage medium merchandised for anonymity across chain
CN108400981A (en) * 2018-02-08 2018-08-14 陕西师范大学 The public cloud auditing system and method for lightweight and secret protection in smart city
EP3396612A1 (en) * 2017-04-24 2018-10-31 BlockSettle AB Method and system for creating a user identity
CN108985936A (en) * 2018-07-09 2018-12-11 北京中电普华信息技术有限公司 A kind of auditing method and system based on intelligent contract
US20190124146A1 (en) * 2017-10-24 2019-04-25 0Chain, LLC Systems and methods of blockchain platform for distributed applications
CN109688103A (en) * 2018-11-09 2019-04-26 杭州安恒信息技术股份有限公司 The auditable encryption storage method of one kind and system
CN109685501A (en) * 2018-12-04 2019-04-26 暨南大学 Based on secret protection deep learning platform construction method auditable under block chain incentive mechanism
CN109784920A (en) * 2018-12-27 2019-05-21 上海边界智能科技有限公司 A kind of Transaction Information auditing method and device based on block chain
CN109815747A (en) * 2019-01-17 2019-05-28 重庆金融资产交易所有限责任公司 Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN110210824A (en) * 2019-05-23 2019-09-06 贝壳技术有限公司 Operation flow changing process method and device
CN110288480A (en) * 2019-06-28 2019-09-27 深圳前海微众银行股份有限公司 A kind of Private transaction method and device of block chain
US20190303541A1 (en) * 2018-04-02 2019-10-03 Ca, Inc. Auditing smart contracts configured to manage and document software audits
CN110430161A (en) * 2019-06-27 2019-11-08 布比(北京)网络技术有限公司 It is a kind of that data anonymous sharing method and system are supervised based on block chain
CN110473105A (en) * 2019-08-20 2019-11-19 深圳市网心科技有限公司 A kind of block chain transaction settlement method, system and relevant device

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005309788A (en) * 2004-04-21 2005-11-04 Ntt Communications Kk Electronic contract method and system for executing method
US20100080391A1 (en) * 2007-10-30 2010-04-01 Shah Mehul A Auditing Data Integrity
US20170046652A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and method for tracking behavior of networked devices using hybrid public-private blockchain ledgers
US20170178127A1 (en) * 2015-12-18 2017-06-22 International Business Machines Corporation Proxy system mediated legacy transactions using multi-tenant transaction database
WO2017210772A1 (en) * 2016-06-10 2017-12-14 Dark Matter L.L.C. Peer-to-peer security protocol apparatus, computer program, and method
EP3396612A1 (en) * 2017-04-24 2018-10-31 BlockSettle AB Method and system for creating a user identity
CN107862216A (en) * 2017-10-13 2018-03-30 布比(北京)网络技术有限公司 Method for secret protection, device and the storage medium merchandised for anonymity across chain
US20190124146A1 (en) * 2017-10-24 2019-04-25 0Chain, LLC Systems and methods of blockchain platform for distributed applications
CN108400981A (en) * 2018-02-08 2018-08-14 陕西师范大学 The public cloud auditing system and method for lightweight and secret protection in smart city
US20190303541A1 (en) * 2018-04-02 2019-10-03 Ca, Inc. Auditing smart contracts configured to manage and document software audits
CN108985936A (en) * 2018-07-09 2018-12-11 北京中电普华信息技术有限公司 A kind of auditing method and system based on intelligent contract
CN109688103A (en) * 2018-11-09 2019-04-26 杭州安恒信息技术股份有限公司 The auditable encryption storage method of one kind and system
CN109685501A (en) * 2018-12-04 2019-04-26 暨南大学 Based on secret protection deep learning platform construction method auditable under block chain incentive mechanism
CN109784920A (en) * 2018-12-27 2019-05-21 上海边界智能科技有限公司 A kind of Transaction Information auditing method and device based on block chain
CN109815747A (en) * 2019-01-17 2019-05-28 重庆金融资产交易所有限责任公司 Offline auditing method, electronic device and readable storage medium storing program for executing based on block chain
CN110210824A (en) * 2019-05-23 2019-09-06 贝壳技术有限公司 Operation flow changing process method and device
CN110430161A (en) * 2019-06-27 2019-11-08 布比(北京)网络技术有限公司 It is a kind of that data anonymous sharing method and system are supervised based on block chain
CN110288480A (en) * 2019-06-28 2019-09-27 深圳前海微众银行股份有限公司 A kind of Private transaction method and device of block chain
CN110473105A (en) * 2019-08-20 2019-11-19 深圳市网心科技有限公司 A kind of block chain transaction settlement method, system and relevant device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
童文娟: "区块链技术下企业财务活动的优化", 《商场现代化》, no. 01 *
陈淼绚等: "加快对区块链技术的研究和应用,构建信用社会", 《电脑知识与技术》, no. 12 *
陈锦雯等: "基于可搜索加密技术的区块链密文审计***", 《网络空间安全》, no. 12 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261020A (en) * 2020-10-15 2021-01-22 中国电子科技集团公司第五十四研究所 Distributed remote outsourcing data auditing system and method

Also Published As

Publication number Publication date
CN111275406B (en) 2023-07-28

Similar Documents

Publication Publication Date Title
JP6841911B2 (en) Information protection systems and methods
US10831903B2 (en) Method and apparatus for obtaining input of secure multiparty computation protocol
CN110569668B (en) Data encryption storage method, device, equipment and medium based on block chain
US10079682B2 (en) Method for managing a trusted identity
WO2020024995A1 (en) Privacy transaction method and system, and device
CN104683099A (en) Improved encrypted/decrypted content, and method and apparatus for issuing encrypted content
US20190295069A1 (en) Systems and methods for integrating cryptocurrency wallet identifiers with digital certificates
US20030233542A1 (en) Selectively disclosable digital certificates
TW202008271A (en) Method, apparatus and electronic device for blockchain transactions
TW202023250A (en) Data processing method and device
CN111160908B (en) Supply chain transaction privacy protection system, method and related equipment based on blockchain
KR101825320B1 (en) Method for Providing Certificate Management
WO2020051710A1 (en) System and process for managing digitized security tokens
CN115296838B (en) Block chain-based data sharing method, system and storage medium
KR100947119B1 (en) Verification method, method and terminal for certificate management
CN109615376B (en) Transaction method and device based on zero-knowledge proof
CN113924748A (en) Proof of knowledge
WO2021134897A1 (en) Blockchain supply chain transaction hidden dynamic supervision system and method
TWI734729B (en) Method and device for realizing electronic signature and signature server
CN112948789B (en) Identity authentication method and device, storage medium and electronic equipment
CN111275406B (en) Blockchain transaction contract auditing method, device, computer equipment and storage medium
CN110914826A (en) System and method for distributed data mapping
CN113792282B (en) Identity data verification method and device, computer equipment and storage medium
KR102056612B1 (en) Method for Generating Temporary Anonymous Certificate
CN115208656B (en) Supply chain data sharing method and system based on blockchain and authority management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant