WO2021134897A1 - 区块链供应链交易隐藏动态监管***及方法 - Google Patents

区块链供应链交易隐藏动态监管***及方法 Download PDF

Info

Publication number
WO2021134897A1
WO2021134897A1 PCT/CN2020/077624 CN2020077624W WO2021134897A1 WO 2021134897 A1 WO2021134897 A1 WO 2021134897A1 CN 2020077624 W CN2020077624 W CN 2020077624W WO 2021134897 A1 WO2021134897 A1 WO 2021134897A1
Authority
WO
WIPO (PCT)
Prior art keywords
parameter
signature
node device
candidate
utxo
Prior art date
Application number
PCT/CN2020/077624
Other languages
English (en)
French (fr)
Inventor
辛佳骏
张骁
来鑫
Original Assignee
深圳市网心科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市网心科技有限公司 filed Critical 深圳市网心科技有限公司
Publication of WO2021134897A1 publication Critical patent/WO2021134897A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Definitions

  • the present invention relates to the technical field of block chains, in particular to a dynamic supervision system and method for block chain supply chain transaction hiding.
  • the existing blockchain supply chain system connects core enterprise node equipment, supplier node equipment, factor node equipment, and bank node equipment through the blockchain.
  • core enterprise node equipment, supplier node equipment, factorer node equipment, and bank node equipment are used as blockchain nodes to join the blockchain supply chain system, they need to be authorized to join, and there is a certain degree of trust between the blockchain nodes Basically, the credibility of the data is enhanced by the way of transaction data on the chain such as accounts receivable, bill vouchers, and mortgage goods vouchers.
  • the main purpose of the present invention is to provide a block chain supply chain transaction hidden dynamic supervision system and method, which aims to solve the technical problem of privacy leakage and no supervision caused by the clear text of transaction data in the block chain supply chain.
  • the first aspect of the present invention provides a blockchain supply chain transaction hidden dynamic supervision system, the system includes:
  • the supervisory authority node device is used to send multiple signature parameters when receiving a signature parameter application from the core enterprise node device;
  • the core enterprise node device is used to use Pedersen's commitment to encrypt the payables promised by the core enterprise to the first-tier supplier to obtain confidential transactions; use Bulletproof range certification to calculate the certification parameters based on the multiple signature parameters and the generated random numbers; Sign the confidential transaction and the certification parameters and upload the signed transaction data to the blockchain supply chain platform;
  • a first-level supplier node device configured to use the blockchain supply chain platform to receive the transaction data, decrypt it, and output it to the first-level supplier;
  • the regulatory agency node device is also used to obtain the transaction data from the blockchain supply chain platform; obtain confidential transactions and certification parameters in the transaction data, and determine the confidential transaction based on the certification parameters Payables in to achieve the supervision of said payables;
  • the blockchain supply chain platform is used to store the transaction data; verify the correctness of the transaction data and the legitimacy of the signature of the regulatory agency node device.
  • the multiple signature parameters include a first signature parameter, a second signature parameter, and a third signature parameter, and the random number includes a first random number and a second random number;
  • Pedersen's commitment to encrypt the payables promised by the core enterprise to the first-tier suppliers to obtain confidential transactions includes:
  • the core enterprise node equipment uses the Bulletproof range to prove that the calculation proof parameters based on the multiple signature parameters and the generated random numbers include:
  • the target certification parameter is calculated based on the first calculation number and the second signature parameter.
  • the calculating target certification parameters based on the first calculation number and the second signature parameter includes:
  • the target certification parameter is calculated based on the first calculation number, the second signature parameter, the first public parameter, and the second public parameter.
  • sending multiple signature parameters includes:
  • first candidate parameter Generate a first candidate parameter, a second candidate parameter, and a third candidate parameter; sign the first candidate parameter to obtain a first signature parameter, sign the second candidate parameter to obtain a second signature parameter, and perform a signature on the first candidate parameter; Signing the three candidate parameters to obtain the third signature parameter; when receiving the signature parameter application of the core enterprise node device, send the first signature parameter, the second signature parameter, and the third signature parameter; or
  • the first-level supplier node device is further configured to:
  • the first-level supplier node device or the other blockchain entity node device is also used to pay the core enterprise node device to the core enterprise node device when the payable is due
  • the UTXO held is invalidated and signed or returned to the core enterprise node device.
  • system further includes:
  • At least one risk assessment agency node device used to read transaction data stored on the blockchain supply chain platform, use a pre-trained risk assessment model to perform risk assessment on the transaction data, and send the risk assessment result to The other blockchain entity node devices.
  • the second aspect of the present invention provides a dynamic supervision method for block chain supply chain transaction hiding, and the method includes:
  • the supervisory authority node device When the supervisory authority node device receives the signature parameter request of the core enterprise node device, sending the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device;
  • the core enterprise node device uses Pedersen's commitment to encrypt the payables promised by the core enterprise to the primary supplier to obtain confidential transactions;
  • the core enterprise node device uses the Bulletproof range certificate to calculate the proof parameter based on the multiple signature parameters and the generated random number;
  • the core enterprise node device signs the confidential transaction and the certification parameters and uploads the signed transaction data to the blockchain supply chain platform;
  • the first-level supplier node device uses the blockchain supply chain platform to receive the transaction data, decrypt it, and output it to the first-level supplier;
  • the regulatory agency node device obtains the transaction data from the blockchain supply chain platform; obtains the confidential transaction and certification parameters in the transaction data, and determines the payable in the confidential transaction based on the certification parameters In order to achieve the supervision of the said payables.
  • the supervisory authority node device when the supervisory authority node device receives the signature parameter request of the core enterprise node device, it sends the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device include:
  • first candidate parameter Generate a first candidate parameter, a second candidate parameter, and a third candidate parameter; sign the first candidate parameter to obtain a first signature parameter, sign the second candidate parameter to obtain a second signature parameter, and perform a signature on the first candidate parameter; Signing the three candidate parameters to obtain the third signature parameter; when receiving the signature parameter application of the core enterprise node device, send the first signature parameter, the second signature parameter, and the third signature parameter; or
  • the certification parameter is signed and the signature and the corresponding first candidate parameter, the second candidate parameter, and the third candidate parameter are saved; when a signature parameter request from the core enterprise node device is received, the The first candidate parameter is used as the first signature parameter, the second candidate parameter is used as the second signature parameter, and the third candidate parameter is used as the third signature parameter and sent to the core enterprise node device.
  • the method further includes:
  • the UTXO in the transaction data is split into a first UTXO and a second UTXO through the first-level supplier node device, wherein the sum of the amount in the first UTXO and the amount in the second UTXO is equal to the The amount in UTXO;
  • the method further includes:
  • the blockchain supply chain transaction hidden dynamic supervision system and method according to the embodiment of the present invention, by introducing the concepts of Pedersen commitment and Bulletproof scope proof, encrypts the plaintext payables of core enterprises into confidential transactions and puts them on the chain. Only both parties can Decrypt the amount in the transaction data, protect the transaction privacy from being leaked, and protect the business secrets of the blockchain entity. After obtaining the confidential transaction and Bulletproof scope certificate, the supervisory authority will supervise the confidential transaction through the Bulletproof scope certificate.
  • FIG. 1 is a schematic diagram of the architecture of a dynamic supervision system for block chain supply chain transaction hiding according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of the architecture of a dynamic supervision system for block chain supply chain transaction hiding according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart of a method for dynamic supervision of transaction hiding in a blockchain supply chain according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of the structure of a blockchain node device according to an embodiment of the present invention.
  • FIG. 1 it is a schematic diagram of the architecture of a dynamic supervision system for blockchain supply chain transaction hiding according to an embodiment of the present invention.
  • the block chain supply chain transaction hidden dynamic supervision system 1 can include, but is not limited to: block chain supply chain platform 10, core enterprise node equipment 11, first-tier supplier node equipment 12, other block chain entity node equipment 13 and supervision Institutional node equipment 14.
  • the other block chain entity node device 13 may include one or a combination of the following: a secondary supplier node device 13, a bank node device 13, and a factor node device 13.
  • the core enterprises, primary suppliers, secondary suppliers, banks, and factoring companies are all referred to as blockchain entities.
  • the core enterprise node equipment 11, the first-level supplier node equipment 12, the second-level supplier node equipment 13, the bank node equipment 13, and the factoring company node equipment 13 are referred to as blockchain entity node equipment.
  • the blockchain entity Before accessing the blockchain supply chain platform 10, the blockchain entity first applies for a digital certificate from a certificate authority (CA). After the CA determines the identity of the applicant, it assigns a public key to the applicant, and at the same time associates the distributed public key with the applicant's identity information and signs it to form a digital certificate and send it to the applicant. Subsequently, when the blockchain entity is connected to the blockchain supply chain platform 10, the blockchain supply chain platform 10 uses the public key of the CA to verify the signature on the digital certificate of the connected blockchain entity, and when the verification passes , The digital certificate is considered valid and the blockchain entity is allowed to access the blockchain supply chain platform 10. When the verification fails, the digital certificate is considered invalid and the blockchain entity is denied access to the blockchain supply chain Platform 10.
  • the content of the digital certificate includes: information of the electronic visa authority, public key user information, public key, signature, validity period, and so on.
  • the core enterprise node device 11 is used to apply to the regulatory agency node device 14 for multiple signature parameters and generate random numbers; Pedersen promises to encrypt the payables promised by the core enterprise to the first-tier suppliers to obtain confidential transactions Use Bulletproof range proof to calculate proof parameters based on the multiple signature parameters and the random number; sign the confidential transaction and the proof parameters and upload the signed transaction data to the blockchain supply chain platform 10.
  • the core enterprise purchases the products of the first-tier supplier and promises to pay
  • the first-tier supplier can purchase the products of the second-tier supplier based on a part of the said payables
  • the second-tier supplier can further split the payables promised by the first-tier supplier Purchase products from other second-tier suppliers after distribution, and so on.
  • Factors can purchase payables held by primary and secondary suppliers.
  • the bank can provide loans based on the supplier's payables.
  • the core company After the core company purchases the products of the first-tier supplier and promises to pay, the core company encrypts the payables through the core company node device 11 to obtain confidential transactions, ensuring that the core company and the first-tier supplier Privacy of transactions between.
  • the core enterprise may apply for the first signature parameter ⁇ , the second signature parameter s L, and the third signature parameter s R from the node device of the regulatory agency before proceeding with the proof of the transaction data range.
  • the signature parameter refers to a plurality of candidate parameters selected by a regulatory agency node device, and parameters obtained after signing the multiple candidate parameters; or, a plurality of candidate parameters selected by a regulatory agency node device based on multiple candidate parameters
  • the parameter calculates the proof parameter, signs the proof parameter and saves the signature. At this time, the candidate parameter corresponding to the signature is used as the signature parameter.
  • the core enterprise node device 11 may calculate the first calculation number and the second calculation number based on the transaction data, and generate the first random number and the second random number.
  • the core enterprise node device may use a random number generation algorithm to generate random numbers in advance. For example, a first random number r and a second random number ⁇ are generated.
  • the second random number ⁇ is a number within Z p.
  • the Z p is an integer modulo p additive group.
  • the calculation of the first calculation number and the second calculation number based on the transaction data includes:
  • the difference between the first calculation number and the unit array is calculated to obtain the second calculation number.
  • the first calculation number a L is an n-dimensional array composed of binary numbers 0 or 1, and the product of each number in the n-dimensional array and 2 n corresponds to the data at the same position in the transaction data .
  • the second calculated number 1 n is an n-dimensional array composed of binary numbers 1.
  • a L ⁇ 0,1,1,...0,1,0 ⁇
  • a R ⁇ -1,0,0,...-1,0,-1 ⁇ .
  • the core enterprise node device 11 is used to use Pedersen's commitment to encrypt the payables promised by the core enterprise to the primary supplier to obtain confidential transactions.
  • the core enterprise node device can then choose to decrypt the promised value. Once the promise is issued, the core enterprise node device cannot find another value that still has the same promise calculation result.
  • the first system parameter g and the second system parameter h are the basis of discrete logarithms, and are a system parameter that is published worldwide.
  • the core enterprise node device 11 uses Bulletproof range certification to calculate a first certification parameter based on the first random number, the second random number, and the first calculation number.
  • Bulletproof is the most efficient range proof algorithm currently used to prove that the value of a promise is between [0, 2 n -1].
  • the first certification parameter wherein, g and h are all public system parameters, ⁇ is the second random number, a L is the first calculation number, and a R is the second calculation number.
  • system parameters g and h in this embodiment are different from the first system parameter g and the second system parameter h.
  • the core enterprise node device 11 uses the Bulletproof range proof to calculate a second proof parameter based on the first signature parameter, the second signature parameter, and the third signature parameter.
  • the second certification parameter Where ⁇ is the first signature parameter, s L is the second signature parameter, and s R is the third signature parameter.
  • the core enterprise node device 11 calculates a target certification parameter based on the first calculation number and the second signature parameter.
  • the core enterprise node device 11 calculating target certification parameters based on the first calculation number and the second signature parameter includes:
  • the target proof parameter P a L -z ⁇ 1 n +s L ⁇ x is calculated, where z Is the first public parameter, and x is the second public parameter.
  • the core enterprise node device sends the first certification parameter to the supervisory authority node device
  • the second proof parameter The node device of the regulatory agency dynamically selects a random number z as the first public number and publicly responds to the node device of the core enterprise, where the random number
  • the core enterprise node device 11 generates a fifth random number ⁇ 1 and a sixth random number ⁇ 2 , and the fifth random number ⁇ 1 and the sixth random number ⁇ 2 are both numbers within Z p .
  • the core enterprise node device 11 may use the Pedersen commitment to calculate the first commitment based on the fifth random number, the first system parameter g, and the second system parameter h Use the Pedersen promise to calculate the second promise based on the sixth random number, the first system parameter g, and the second system parameter h
  • the core enterprise node device 11 sends the first promise and the second promise to the supervisory authority node device 14.
  • the regulatory agency node device 14 dynamically selects a random number x as the second public number and publicly responds to the core enterprise node device, where the random number
  • the core enterprise node device 11 sends the confidential transaction, the first certification parameter, the second certification parameter, and the target certification parameter to the regulatory agency node device 14, so that the regulatory agency node device 14 is based on the The target proof parameter, the first public parameter, and the second public parameter determine the payable in the confidential transaction, so as to realize the supervision of the payable.
  • the primary supplier node device 12 is configured to use the blockchain supply chain platform 10 to receive the transaction data, decrypt it, and output it to the primary supplier.
  • the first-level supplier as the recipient of the payable by the core enterprise, receives the verification parameters sent by the core enterprise node device 11 through the first-level supplier node device 12.
  • the core enterprise can inform the primary supplier of the payment and the first random number r through key agreement and other methods.
  • the first-level supplier node device 12 is also used to split the UTXO in the transaction data into a first UTXO and a second UTXO, based on the first UTXO and the second UTXO.
  • UTXO conducts transactions with other blockchain entity node devices.
  • the primary supplier node device 12 sends the transaction data to the blockchain supply chain platform 10 for storage.
  • the sum of the amount in the first UTXO and the amount in the second UTXO is equal to the amount in the UTXO.
  • the primary supplier can split the UTXO in the transaction data and trade it to secondary suppliers, factoring companies, or mortgage loans through banks.
  • the secondary supplier, factor or bank can further split and trade the UTXO after receiving the split.
  • the first-tier supplier node device 12 is also used to perform range certification on the first UTXO and the second UTXO based on Bulletproof.
  • the amount is a legal value, that is, the amount in UTXO is a positive number within a certain range.
  • the splitting of UTXO into two sub-UTXOs is taken as an example.
  • the first-tier supplier node device can also split UTXO into 3 or more parts for more flexibility. Deal with secondary suppliers.
  • the first-level supplier node device when the first-level supplier node device splits the UTXO into multiple sub-UTXOs, it can also initiate a supervisable confidential transaction based on the sub-UTXO, and initiate a supervisable confidential transaction with the core enterprise node device Similarly, the first-tier supplier node device also needs to first apply for the first signature parameter, the second signature parameter, and the third signature parameter from the regulatory agency node device, and then initiate a supervisable secret transaction according to the method of the core enterprise node device to initiate a supervisable secret transaction. Confidential transactions.
  • supplier node devices including primary, secondary, tertiary or even lower-level supplier node devices
  • the first-level supplier node device 12 or the other blockchain entity node device 13 is also used to pay the core enterprise node device when the payable is due The payable, in response to the successful redemption of the payable, invalidate the UTXO held or return it to the core enterprise node device.
  • the due time stamp of the payment is marked in the UTXO.
  • the core enterprise When the core enterprise receives the information of redemption of the payable through the core enterprise node device 11, it confirms whether the payable is due. After confirming that the due payment is due, the debt is redeemed. After receiving the debt, the blockchain entity signs, indicating that the debt has been received. When or after receiving the debt, the blockchain entity holding the UTXO invalidates the UTXO signature or returns it to the core enterprise to form a complete transaction data record on the blockchain supply chain platform 10.
  • the regulatory agency node device 14 is configured to send multiple signature parameters when receiving a signature parameter application from the core enterprise node device.
  • sending multiple signature parameters includes:
  • first candidate parameter Generate a first candidate parameter, a second candidate parameter, and a third candidate parameter; sign the first candidate parameter to obtain a first signature parameter, sign the second candidate parameter to obtain a second signature parameter, and perform a signature on the first candidate parameter;
  • the three candidate parameters are signed to obtain the third signature parameter; upon receiving the signature parameter application of the core enterprise node device, the first signature parameter, the second signature parameter, and the third signature parameter are sent.
  • the regulatory agency node device respectively signs the first candidate parameter, the second candidate parameter, and the third candidate parameter, and sends the first candidate parameter, the second candidate parameter, and the third candidate parameter and their respective Sign to the core enterprise node device.
  • sending multiple signature parameters includes:
  • the regulatory agency node device sets the second certification parameter
  • the signature of and multiple signature parameters are sent to the core enterprise node device, and the core enterprise node device verifies the signature of the second certification parameter to determine the authenticity of the three signature parameters. Since only the second proof parameter needs to be signed, there is no need to sign the first candidate parameter, the second candidate parameter, and the third candidate parameter, which reduces the number of signatures; and sends multiple unsigned candidate parameters as multiple signature parameters For core enterprise node devices, the amount of information transmission is reduced, and the efficiency of sending signature parameters is improved.
  • first signature parameter p the second signature parameter s L, and the third signature parameter s R are all numbers within the range of Z p.
  • These signature parameters are all dynamically generated one-time random numbers.
  • the supervisory authority node device 14 uses Bulletproof range proof to calculate proof parameters based on the first signature parameter, the second signature parameter, and the third signature parameter.
  • the supervisory authority node device 14 uses a private key to sign the certification parameter and saves the signature and the corresponding first signature parameter, the second signature parameter, and the third signature parameter.
  • the regulatory agency node device 14 uses digital signature technology to sign the certification parameters.
  • Digital signature technology is based on asymmetric encryption algorithm and message digest algorithm to achieve the authentication of the source and integrity of the message, and at the same time, it is a guarantee that the signer cannot deny.
  • There are two roles in a digital signature system one is the signer of the message and the other is the authenticator of the message.
  • the signer of the message can sign the information digest of a message according to his private key, and the authenticator of the message verifies the information digest of a message according to his public key. If the verification is passed, it can be proved that the source of the message is the signer of the message, the information digest of the message is the same and the signer cannot deny it.
  • the supervisory authority node device 14 is further configured to send the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device when a signature parameter request from the core enterprise node device is received. Signature parameters.
  • the transaction data sender Before the transaction data sender performs the transaction data range certification, it applies to the regulatory agency node device for signature parameters through the core enterprise node device, and the regulatory agency node device sends the signed certification parameters to the first signature parameter, the second signature parameter, and The third signature parameter is sent to the supervisory authority node device.
  • the supervisory authority node device 14 is further configured to reply to the first certification parameter and the second certification parameter sent by the core enterprise node device.
  • One public parameter One public parameter.
  • the core enterprise node device sends the first certification parameter to the supervisory authority node device And the second proof parameter
  • the node device of the regulatory agency dynamically selects a random number z as the first public number and publicly responds to the node device of the core enterprise, where the random number
  • the regulatory agency node device 14 is further configured to reply to the second public parameter when the first commitment parameter and the second commitment parameter sent by the core enterprise node device are received.
  • the core enterprise node device sends the first promise and the second promise to the supervisory authority node device.
  • the regulatory agency node device dynamically selects a random number x as the second public number and publicly responds to the core enterprise node device, where the random number
  • the random number y is a one-time random number dynamically and randomly generated when the regulatory agency node device 14 receives the first certification parameter and the second certification parameter sent by the core enterprise node device
  • the random number x is the A one-time random number dynamically and randomly generated when the regulatory agency node device 14 receives the first commitment parameter and the second commitment parameter.
  • the regulatory agency node device 14 is also used to obtain the transaction data from the blockchain supply chain platform; obtain confidential transactions and certification parameters in the transaction data, and determine the confidentiality based on the certification parameters Payables in the transaction to achieve the supervision of said payables.
  • the supervisory authority node device 14 determining the payable in the confidential transaction based on the certification parameter to implement the supervision of the payable includes:
  • the target random number is an n-dimensional array composed of 0 or 1, and the product of each number in the n-dimensional array and 2n corresponds to the data at the same position in the payable.
  • the supervisory authority node device can calculate the transaction data v in the certificate according to the signature in the certificate and the parameter P in the certificate. Since a L is the binary form of transaction data v, P, x, and z are all public values, so the regulator node device can calculate the value of a L according to the value of the random number s L possessed, and then calculate the payable v .
  • multiple signature parameters are selected by the regulatory agency node device and the certification parameters are calculated. After signing the calculated certification parameters, the signed multiple signature parameters can be sent to the core enterprise node device, so that the core enterprise node The device calculates the certification parameters based on multiple signature parameters. Since the supervisory authority node equipment and the core enterprise node equipment use the same multiple signature parameters to calculate the same proof parameters, when the confidential transaction is reversed on the blockchain network, the supervisory authority node equipment can supervise the core enterprise node equipment Proof parameters, thus realizing the supervision of confidential transactions.
  • the blockchain supply chain platform 10 is used to store the transaction data; verify the correctness of the transaction data and the legitimacy of the signature of the regulatory agency node device.
  • the blockchain supply chain platform 10 the core enterprise node equipment 11, the first-tier supplier node equipment 12, and the regulatory agency node equipment 14 in the blockchain supply chain transaction hidden dynamic supervision system 1 must If it exists, the other blockchain entity node device 13 optionally exists. That is, the secondary supplier node equipment, bank node equipment, and factor node equipment may optionally exist in the blockchain supply chain transaction hidden dynamic supervision system 1.
  • FIG. 2 it is a schematic diagram of another architecture of the blockchain supply chain transaction hiding dynamic supervision system according to an embodiment of the present invention.
  • the blockchain supply chain transaction hidden dynamic supervision system 1 includes the blockchain supply chain platform 10, core enterprise node equipment 11, first-tier supplier node equipment 12, and other blockchain entity node equipment 13, which are described in Figure 1.
  • the regulatory agency node device 14 may also include at least one risk assessment agency node device 15.
  • the at least one risk assessment agency node device 15 is used to read transaction data stored on the blockchain supply chain platform 10, use a pre-trained risk assessment model to perform risk assessment on the transaction data, and The risk assessment result is sent to the other blockchain entity node device 13.
  • At least one risk assessment agency node device 15 can obtain the historical transaction data recorded on the blockchain supply chain platform 10 in advance, and train a risk assessment model based on the historical transaction data to evaluate the value of the payment in each transaction data.
  • At least one risk assessment agency node device 15 When at least one risk assessment agency node device 15 reads the newly recorded transaction data on the blockchain supply chain platform 10, it uses a risk assessment model to evaluate the value of the payable in the newly recorded transaction data, and evaluate the risk The result is sent to potential purchasers of UTXO (that is, the payable of the core enterprise) corresponding to the transaction data.
  • the potential purchasers may include, but are not limited to, secondary suppliers, factoring companies, banks, etc.
  • the blockchain supply chain platform 10 may be a blockchain system based on any UTXO model and a blockchain system supporting the UTXO account model.
  • the blockchain supply chain system 1 may further include: a data decryption module, a UTXO amount range certification module, a blockchain wallet, a lightweight wallet, a statistical analysis tool, an entity list, etc.
  • one-time signature parameters dynamically selected by the regulatory agency and proof parameters based on random number calculations need to be obtained and signed in advance, and the blockchain entity generates Bulletproof based on the one-time signature parameters. Prove that it has the characteristics of forward security.
  • the blockchain supply chain platform also verifies the legitimacy of the signature of the regulatory agency. Since the signature parameter is a one-time number dynamically generated by the regulatory agency, when the regulatory agency's key is leaked, it will not cause a wide range of transaction data to be leaked.
  • the blockchain supply chain privacy transaction dynamic supervision system described in this embodiment introduces the concepts of Pedersen commitment and Bulletproof scope proof, encrypts the plaintext payables of core enterprises into confidential transactions and uploads them to the chain. Only both parties to the transaction can decrypt the transaction data The amount in the transaction privacy is protected from being leaked, and the business secrets of the blockchain entity are protected. After obtaining the confidential transaction and Bulletproof scope certificate, the supervisory authority will supervise the confidential transaction through the Bulletproof scope certificate.
  • FIG. 3 is a schematic flowchart of a method for dynamic supervision of transaction hiding in a blockchain supply chain disclosed in an embodiment of the present invention.
  • the block chain supply chain transaction concealment dynamic supervision method is applied to a block chain supply chain network.
  • the block chain supply chain transaction concealment dynamic supervision method specifically includes the following steps. According to different needs, the steps in the flowchart The order can be changed, and some steps can be omitted.
  • S31 When the supervisory authority node device receives the signature parameter request of the core enterprise node device, it sends the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device.
  • the supervisory authority node device when the supervisory authority node device receives the signature parameter request of the core enterprise node device, it sends the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device.
  • the supervisory authority node device when the supervisory authority node device receives the signature parameter request of the core enterprise node device, it sends the first signature parameter, the second signature parameter, and the third signature parameter to the core enterprise node device.
  • first candidate parameter Generate a first candidate parameter, a second candidate parameter, and a third candidate parameter; sign the first candidate parameter to obtain a first signature parameter, sign the second candidate parameter to obtain a second signature parameter, and perform a signature on the first candidate parameter;
  • the three candidate parameters are signed to obtain the third signature parameter; upon receiving the signature parameter application of the core enterprise node device, the first signature parameter, the second signature parameter, and the third signature parameter are sent.
  • the first candidate parameter, the second candidate parameter, and the third candidate parameter are generated; the Bulletproof range proof is based on the first candidate parameter, the second candidate parameter, and the third candidate parameter Calculate the certification parameters; use the private key to sign the certification parameters and save the signature and the corresponding first candidate parameter, the second candidate parameter, and the third candidate parameter; when the core enterprise node device is received When requesting signature parameters, send the first candidate parameter as the first signature parameter, the second candidate parameter as the second signature parameter, and the third candidate parameter as the third signature parameter.
  • Core enterprise node equipment When requesting signature parameters, send the first candidate parameter as the first signature parameter, the second candidate parameter as the second signature parameter, and the third candidate parameter as the third signature parameter.
  • the core enterprise node device uses Pedersen's commitment to encrypt the payables promised by the core enterprise to the first-tier supplier to obtain confidential transactions.
  • the core enterprise node device uses Bulletproof range proof to calculate proof parameters based on the multiple signature parameters and the generated random numbers.
  • the core enterprise node device signs the confidential transaction and the certification parameters and uploads the signed transaction data to the blockchain supply chain platform.
  • the first-level supplier node device uses the blockchain supply chain platform to receive the transaction data, decrypt it, and output it to the first-level supplier.
  • the regulatory agency node device obtains the transaction data from the blockchain supply chain platform; obtains the confidential transaction and certification parameters in the transaction data, and determines the confidential transaction in the confidential transaction based on the certification parameters. Payables to achieve the supervision of said payables.
  • the method further includes:
  • the UTXO in the transaction data is split into a first UTXO and a second UTXO through the first-level supplier node device, wherein the sum of the amount in the first UTXO and the amount in the second UTXO is equal to the The amount in UTXO;
  • the method further includes:
  • the blockchain supply chain privacy transaction dynamic supervision method described in this embodiment introduces the concepts of Pedersen commitment and Bulletproof scope proof, encrypts the plaintext payables of core companies into confidential transactions and uploads them to the chain. Only both parties to the transaction can decrypt the transaction data The amount in the transaction privacy is protected from being leaked, and the business secrets of the blockchain entity are protected. After obtaining the confidential transaction and Bulletproof scope certificate, the supervisory authority will supervise the confidential transaction through the Bulletproof scope certificate.
  • FIG. 4 is a schematic diagram of the internal structure of a blockchain node device disclosed in an embodiment of the present invention.
  • the blockchain node device 4 may include a memory 41, a processor 42, a bus 43, and a transceiver 44.
  • the blockchain node device 4 may be a core enterprise node device, a regulatory agency node device, or a first-tier supplier node device, other blockchain entities (for example, a second-tier supplier, bank, factor) Node equipment, etc.
  • the blockchain node device 4 is a core enterprise node device, the function of the core enterprise node device described in Embodiment 1 or Embodiment 2 is performed;
  • the blockchain node device 4 is a regulatory agency node device , Execute the function of the regulatory agency node device described in the first embodiment or the second embodiment;
  • the blockchain node device 4 is the first-tier supplier node device, execute the function described in the first embodiment or the second embodiment
  • the function of the first-level supplier node device; when the blockchain node device 4 is another blockchain entity node device, the function of the other blockchain entity node device described in the first embodiment or the second embodiment is performed.
  • the memory 41 includes at least one type of readable storage medium, and the readable storage medium includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, and the like.
  • the memory 41 may be an internal storage unit of the blockchain node device 4 in some embodiments, for example, the hard disk of the blockchain node device 4.
  • the memory 41 may also be an external storage device of the blockchain node device 4, for example, a plug-in hard disk equipped on the blockchain node device 4, a smart memory card (Smart Media Card, SMC). ), Secure Digital (SD) card, Flash Card, etc.
  • the memory 41 may also include not only the internal storage unit of the blockchain node device 4, but also an external storage device.
  • the memory 41 can be used not only to store application programs and various data installed in the blockchain node device 4, but also to temporarily store data that has been output or will be output.
  • the processor 42 may be a central processing unit (CPU), controller, microcontroller, or microprocessor in some embodiments, and is used to run program codes or process data stored in the memory 41.
  • CPU central processing unit
  • controller microcontroller
  • microprocessor in some embodiments, and is used to run program codes or process data stored in the memory 41.
  • the bus 43 may be a peripheral component interconnect standard (PCI) bus or an extended industry standard architecture (EISA) bus, etc.
  • PCI peripheral component interconnect standard
  • EISA extended industry standard architecture
  • the bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 4 to represent it, but it does not mean that there is only one bus or one type of bus.
  • the blockchain node device 4 may also include a network interface, and the network interface may optionally include a wired interface and/or a wireless interface (such as a WI-FI interface, a Bluetooth interface, etc.), which is usually used in the block
  • the link node device 4 establishes a communication connection with other dispatch servers.
  • the blockchain node device 4 may also include a user interface.
  • the user interface may include a display (Display) and an input unit, such as a keyboard (Keyboard).
  • the user interface may also include a standard wired interface, wireless interface.
  • the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an organic light-emitting diode (OLED) touch device, and the like.
  • the display may also be called a display screen or a display unit, which is used to display the messages processed in the dispatch server and to display a visualized user interface.
  • FIG. 4 only shows the blockchain node device 4 with components 41-44.
  • the structure shown in FIG. 4 does not constitute a limitation on the blockchain node device 4. It may be a bus-type structure or a star-shaped structure.
  • the blockchain node device 4 may also include fewer or more components than shown in the figure, or a combination of certain components, or a different component arrangement.
  • Other existing or future electronic products that can be adapted to the present invention should also be included in the protection scope of the present invention, and are included here by reference.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website site, computer, server or data center via wired (for example, coaxial cable, optical fiber, digital subscriber line) or wireless (for example, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state disk (SSD)).
  • the disclosed system, device, and method may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or application program functional unit.
  • the integrated unit is implemented in the form of an application function unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • a computer readable storage medium includes several instructions to make a dispatch server (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, hard disk, Read-Only Memory (Read-Only Memory, ROM), magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

一种区块链供应链交易隐藏动态监管***及方法,包括:监管机构节点设备,用于在接收到核心企业节点设备的签名参数申请时,发送多个签名参数;核心企业节点设备,用于利用Pedersen承诺对应付款进行加密得到机密交易;利用Bulletproof范围证明基于多个签名参数及随机数计算证明参数;签名机密交易及证明参数并上链;一级供应商节点设备,用于接收交易数据并解密;监管机构节点设备,还用于获取机密交易及证明参数,并基于证明参数确定应付款以实现应付款的监管;区块链供应链平台,用于存储交易数据,验证交易数据及签名的正确性。该方法能够将区块链供应链中应付款加密上链以免隐私泄露,且对应付款进行监管。

Description

区块链供应链交易隐藏动态监管***及方法 技术领域
本发明涉及区块链技术领域,尤其涉及一种区块链供应链交易隐藏动态监管***及方法。
背景技术
现有的区块链供应链***,将核心企业节点设备、供应商节点设备、保理商节点设备及银行节点设备等通过区块链联系了起来。核心企业节点设备、供应商节点设备、保理商节点设备及银行节点设备等作为区块链节点加入区块链供应链***时,需要经过授权才能加入,区块链节点之间具有一定的信任基础,通过应收账款、票据凭证、抵押货物凭证等交易数据上链的方式增强了数据的可信性。
然而,这些交易数据中往往存在商业机密,将交易数据明文上链,导致了商业机密和个人隐私的泄露,且没有监管机构的监管。
因此,有必要提供一种区块链供应链交易隐藏动态监管方案。
发明内容
本发明的主要目的在于提供一种区块链供应链交易隐藏动态监管***及方法,旨在解决区块链供应链中交易数据明文上链导致隐私泄露且无监管的技术问题。
为实现上述目的,本发明的第一方面提供一种区块链供应链交易隐藏动态监管***,所述***包括:
监管机构节点设备,用于在接收到核心企业节点设备的签名参数申请时,发送多个签名参数;
所述核心企业节点设备,用于利用Pedersen承诺对核心企业承诺给一级供应商的应付款进行加密得到机密交易;利用Bulletproof范围证明基于所述多个签名参数及生成的随机数计算证明参数;对所述机密交易及所述证明参数进行签名并将签名后的交易数据上传至区块链供应链平台;
一级供应商节点设备,用于利用所述区块链供应链平台接收所述交易数据并解密后输出给所述一级供应商;
所述监管机构节点设备,还用于从所述区块链供应链平台上获取所述交易数据;获取所述交易数据中的机密交易及证明参数,并基于所述证明参数确定所述机密交易中的应付款以实现所述应付款的监管;
所述区块链供应链平台,用于存储所述交易数据;验证所述交易数据的正确性及所述监管机构节点设备签名的合法性。
根据本发明的一个可选实施例,所述多个签名参数包括第一签名参数、第二签名参数及第三签名参数,所述随机数包括第一随机数及第二随机数;
所述利用Pedersen承诺对核心企业承诺给一级供应商的应付款进行加密得到机密交易包括:
利用Pedersen承诺基于所述应付款及所述第一随机数加密得到机密交易;
所述核心企业节点设备利用Bulletproof范围证明基于所述多个签名参数及生成的随机数计算证明参数包括:
基于所述交易数据计算得到第一计算数及第二计算数;
利用Bulletproof范围证明基于所述第一计算数、所述第二计算数及所述第二随机数计算第一证明参数;
利用所述Bulletproof范围证明基于所述第一签名参数、所述第二签名参数及所述第三签名参数计算第二证明参数;
基于所述第一计算数及所述第二签名参数计算目标证明参数。
根据本发明的一个可选实施例,所述基于所述第一计算数及所述第二签名参数计算目标证明参数包括:
向所述监管机构节点设备发送所述第一证明参数和所述第二证明参数并接收所述监管机构节点设备回复的第一公开参数;
利用Pedersen承诺随机计算第一承诺参数和第二承诺参数;
向所述监管机构节点设备发送所述第一承诺参数和所述第二承诺参数并接收所述监管机构节点设备回复的第二公开参数;
基于所述第一计算数、所述第二签名参数、所述第一公开参数和所述第二公开参数计算目标证明参数。
根据本发明的一个可选实施例,所述监管机构节点设备在接收到所述核心企业节点设备的签名参数申请时,发送多个签名参数包括:
生成第一候选参数、第二候选参数及第三候选参数;对所述第一候选参数进行签名得到第一签名参数,对所述第二候选参数进行签名得到第二签名参数及对所述第三候选参数进行签名得到第三签名参数;在接收到所述核心企业节点设备的签名参数申请时,发送所述第一签名参数、所述第二签名参数及所述第三签名参数;或者
生成第一候选参数、第二候选参数及第三候选参数;利用Bulletproof范围证明基于所述第一候选参数、所述第二候选参数及所述第三候选参数计算第二证明参数;使用私钥对所述第二证明参数进行签名并保存所述签名及对应的所述第一候选参数、所述第二候选参数及所述第三候选参数;当接收到核心企业节点设备的签名参数请求时,将所述第一候选参数作为第一签名参数、所述第二候选参数作为所述第二签名参数及所述第三候选参数作为所述第三签名参数发送给所述核心企业节点设备,并将所述第二证明参数的签名一并发送给所述核心企业节点设备。
根据本发明的一个可选实施例,所述一级供应商节点设备,还用于:
将所述交易数据中的UTXO拆分为第一UTXO和第二UTXO,其中,所述第一UTXO中的金额和第二UTXO中的金额之和等于所述UTXO中的金额;
基于所述第一UTXO和第二UTXO与其他区块链实体节点设备进行交易;
基于Bulletproof对所述第一UTXO和第二UTXO进行范围证明。
根据本发明的一个可选实施例,所述一级供应商节点设备或者所述其他区块链实体节点设备,还用于当所述应付款到期后,向所述核心企业节点设备兑付应付款,响应于所述应付款兑付成功,将持有的UTXO进行无效化签名或者返还给所述核心企业节点设备。
根据本发明的一个可选实施例,所述***还包括:
至少一个风险评估机构节点设备,用于读取所述区块链供应链平台上存储的交易数据,使用预先训练好的风险评估模型对所述交易数据进行风险评估,并将风险评估结果发送给所述其他区块链实体节点设备。
本发明的第二方面提供一种区块链供应链交易隐藏动态监管方法,所述方法包括:
当所述监管机构节点设备接收到核心企业节点设备的签名参数请求时,向所述核心企业节点设备发送第一签名参数、第二签名参数及第三签名参数;
所述核心企业节点设备利用Pedersen承诺对核心企业承诺给一级供应商的应付款进行加密得到机密交易;
所述核心企业节点设备利用Bulletproof范围证明基于所述多个签名参数及生成的 随机数计算证明参数;
所述核心企业节点设备对所述机密交易及所述证明参数进行签名并将签名后的交易数据上传至区块链供应链平台;
一级供应商节点设备利用所述区块链供应链平台接收所述交易数据并解密后输出给所述一级供应商;
所述监管机构节点设备从所述区块链供应链平台上获取所述交易数据;获取所述交易数据中的机密交易及证明参数,并基于所述证明参数确定所述机密交易中的应付款以实现所述应付款的监管。
根据本发明的一个可选实施例,所述监管机构节点设备接收到核心企业节点设备的签名参数请求时,向所述核心企业节点设备发送第一签名参数、第二签名参数及第三签名参数包括:
生成第一候选参数、第二候选参数及第三候选参数;对所述第一候选参数进行签名得到第一签名参数,对所述第二候选参数进行签名得到第二签名参数及对所述第三候选参数进行签名得到第三签名参数;在接收到所述核心企业节点设备的签名参数申请时,发送所述第一签名参数、所述第二签名参数及所述第三签名参数;或者
生成第一候选参数、第二候选参数及第三候选参数;利用Bulletproof范围证明基于所述第一候选参数、所述第二候选参数及所述第三候选参数计算证明参数;使用私钥对所述证明参数进行签名并保存所述签名及对应的所述第一候选参数、所述第二候选参数及所述第三候选参数;当接收到核心企业节点设备的签名参数请求时,将所述第一候选参数作为第一签名参数、所述第二候选参数作为所述第二签名参数及所述第三候选参数作为所述第三签名参数发送给所述核心企业节点设备。
根据本发明的一个可选实施例,所述方法还包括:
通过所述一级供应商节点设备将所述交易数据中的UTXO拆分为第一UTXO和第二UTXO,其中,所述第一UTXO中的金额和第二UTXO中的金额之和等于所述UTXO中的金额;
基于所述第一UTXO和第二UTXO与其他区块链实体节点设备进行交易;
基于Bulletproof对所述第一UTXO和第二UTXO进行范围证明。
根据本发明的一个可选实施例,所述方法还包括:
通过至少一个风险评估机构节点设备读取所述区块链供应链平台上存储的交易数据,使用预先训练好的风险评估模型对所述交易数据进行风险评估,并将风险评估结果发送给所述其他区块链实体节点设备。
本发明实施例所述的区块链供应链交易隐藏动态监管***及方法,通过引入Pedersen承诺和Bulletproof范围证明的概念,将核心企业的明文应付款加密成机密交易并上链,只有交易双方能够解密交易数据中的金额,保护了交易隐私不被泄露,保障了区块链实体商业机密。而监管机构在获取到机密交易和Bulletproof范围证明后,通过Bulletproof范围证明对机密交易进行监管。
附图说明
图1为本发明实施例的区块链供应链交易隐藏动态监管***的架构示意图;
图2为本发明实施例的区块链供应链交易隐藏动态监管***的架构示意图;
图3为本发明实施例的区块链供应链交易隐藏动态监管方法的流程示意图;
图4为本发明实施例的区块链节点设备的结构示意图。
具体实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对 本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本发明,并不用于限定本发明。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、***、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本发明要求的保护范围之内。
实施例一
如图1所示,为本发明实施例的区块链供应链交易隐藏动态监管***的架构示意图。
区块链供应链交易隐藏动态监管***1可以包括,但不限于:区块链供应链平台10、核心企业节点设备11、一级供应商节点设备12、其他区块链实体节点设备13及监管机构节点设备14。
在一个可选的实施例中,所述其他区块链实体节点设备13可以包括以下一种或多种的组合:二级供应商节点设备13、银行节点设备13、保理商节点设备13。所述核心企业、一级供应商、二级供应商、银行、保理商均称之为区块链实体。所述核心企业节点设备11、一级供应商节点设备12、二级供应商节点设备13、银行节点设备13、保理商节点设备13称之为区块链实体节点设备。
区块链实体在接入区块链供应链平台10之前,先向证书颁发机构(Certificate Authority,CA)申请数字证书。CA在判明申请者的身份后,便为申请者分配一个公钥,同时将分配的公钥与申请者的身份信息关联起来并签字后形成数字证书发给申请者。后续,当区块链实体接入区块链供应链平台10时,区块链供应链平台10使用CA的公钥对接入的区块链实体的数字证书上的签字进行验证,当验证通过,则数字证书被认为是有效的,允许区块链实体接入区块链供应链平台10,当验证失败,则数字证书被认为是无效的,拒绝区块链实体接入区块链供应链平台10。所述数字证书的内容包括:电子签证机关的信息、公钥用户信息、公钥、签字和有效期等等。
在一些实施例中,核心企业节点设备11,用于向监管机构节点设备14申请多个签名参数及生成随机数;利用Pedersen承诺对核心企业承诺给一级供应商的应付款进行加密得到机密交易;利用Bulletproof范围证明基于所述多个签名参数及所述随机数计算证明参数;对所述机密交易及所述证明参数进行签名并将签名后的交易数据上传至区块链供应链平台10。
核心企业购买一级供应商的产品并承诺应付款,一级供应商可基于所述应付款的一部分购买二级供应商的产品,二级供应商可以进一步将一级供应商承诺的应付款拆分后购买其他二级供应商的产品,以此类推。保理商可以购买一级供应商、二级供应商持有的应付款。银行可以基于供应商的应付款提供贷款。
为了避免交易隐私被泄露,核心企业购买一级供应商的产品并承诺应付款之后,核心企业通过核心企业节点设备11对所述应付款进行加密得到机密交易,确保了核心企业与一级供应商之间的交易隐私。
核心企业在进行交易数据范围证明之前,可以预先向监管机构节点设备申请第一签 名参数ρ、第二签名参数s L及第三签名参数s R
由于签名参数与交易数据证明值无关,所以可以提前申请多个签名参数并保存在本地,最后离线使用这些签名参数并生成证明参数。所述签名参数是指通过监管机构节点设备选取的多个候选参数,并对多个候选参数进行签名后得到的参数;或者,通过监管机构节点设备选取的多个候选参数,并基于多个候选参数计算证明参数,对证明参数签名并保存签名,此时与签名对应的候选参数作为签名参数。
在一个可选的实施例中,所述核心企业节点设备11可以基于所述交易数据计算得到第一计算数及第二计算数,并生成第一随机数及第二随机数。
核心企业节点设备可以预先使用随机数生成算法生成随机数。例如,生成第一随机数r,第二随机数α。
其中,所述第二随机数α为在Z p内的一个数。所述Z p为整数模p加法群。
在本发明的一个可选实施例中,所述基于所述交易数据计算得到第一计算数及第二计算数包括:
对所述交易数据进行二进制展开;
计算展开后的交易数据中的每一个二进制数与2 n的商值得到所述第一计算数;
计算所述第一计算数与单位数组的差值得到所述第二计算数。
所述第一计算数a L为由二进制数0或者1组成的一个n维数组,且所述n维数组中的每一个数与2 n的乘积与所述交易数据中相同位置处的数据对应。
示例性的,假设n维数组a L={0,1,1,…0,1,0},那么{0*2 0,1*2 1,1*2 2,…,0*2 n-2,1*2 n-1}=v,v为应付款。
在本发明的一个可选实施例中,所述第二计算数
Figure PCTCN2020077624-appb-000001
1 n为由二进制数1组成的n维数组。
示例性的,假设n维数组a L={0,1,1,…0,1,0},那么a R={-1,0,0,…-1,0,-1}。
在一个可选的实施例中,所述核心企业节点设备11用于利用Pedersen承诺对核心企业承诺给一级供应商的应付款进行加密得到机密交易。
Pedersen承诺将一个交易数据隐藏进一个加密后的密文中。核心企业节点设备可以之后选择解密承诺的数值。承诺一旦发出,则核心企业节点设备无法找到另外一个数值依然具有相同的承诺计算结果。
机密交易是指使用Pedersen承诺隐藏交易数据,使得只有交易双方可以看到交易数据,而其他人看不到交易数据,同时双方无法伪造交易数据。
在具体实施时,利用Pedersen承诺基于所述应付款及所述第一随机数加密得到的机密交易中的UTXO=g vh r,其中,v为所述应付款,v∈[0,2 n-1],r为所述第一随机数。
第一***参数g和第二***参数h是离散对数的基,是一个全世界范围内公开的***参数。
所述核心企业节点设备11利用Bulletproof范围证明基于所述第一随机数、所述第二随机数及所述第一计算数计算第一证明参数。
Bulletproof是当前最高效的范围证明算法,用于证明一个承诺的值处于[0,2 n-1]之间。
在本发明的一个可选实施例中,所述第一证明参数
Figure PCTCN2020077624-appb-000002
其中,g、h均为公开的***参数,α为所述第二随机数,a L为所述第一计算数,a R为所述第二计算数。
需要注意的是,本实施例中***参数g、h与第一***参数g和第二***参数h不同。
所述核心企业节点设备11利用所述Bulletproof范围证明基于所述第一签名参数、所述第二签名参数及所述第三签名参数计算第二证明参数。
在本发明的一个可选实施例中,所述第二证明参数
Figure PCTCN2020077624-appb-000003
其中,ρ为所述第一签名参数,s L为所述第二签名参数,s R为所述第三签名参数。
所述核心企业节点设备11基于所述第一计算数及所述第二签名参数计算目标证明参数。
具体的,所述核心企业节点设备11基于所述第一计算数及所述第二签名参数计算目标证明参数包括:
向所述监管机构节点设备14发送所述第一证明参数A和所述第二证明参数S并接收所述监管机构节点设备回复的第一公开参数z;
利用Pedersen承诺随机计算第一承诺参数
Figure PCTCN2020077624-appb-000004
和第二承诺参数
Figure PCTCN2020077624-appb-000005
向所述交易数据监管方节点设备发送所述第一承诺参数和所述第二承诺参数并接收所述交易数据监管方节点设备回复的第二公开参数x;
基于所述第一计算数、所述第二签名参数、所述第一公开参数和所述第二公开参数计算目标证明参数P=a L-z·1 n+s L·x,其中,z为所述第一公开参数,x为所述第二公开参数。
在该可选的实施例中,核心企业节点设备向监管机构节点设备发送所述第一证明参数
Figure PCTCN2020077624-appb-000006
所述第二证明参数
Figure PCTCN2020077624-appb-000007
所述监管机构节点设备动态选择一个随机数z作为第一公开数并公开回复给核心企业节点设备,其中随机数
Figure PCTCN2020077624-appb-000008
核心企业节点设备11生成第五随机数τ 1和第六随机数τ 2,第五随机数τ 1和第六随机数τ 2均为在Z p内的一个数。
核心企业节点设备11可以利用Pedersen承诺基于所述第五随机数、第一***参数g和第二***参数h计算第一承诺
Figure PCTCN2020077624-appb-000009
利用Pedersen承诺基于所述第六随机数、第一***参数g和第二***参数h计算第二承诺
Figure PCTCN2020077624-appb-000010
核心企业节点设备11将第一承诺和第二承诺发送给监管机构节点设备14。所述监管机构节点设备14动态选择一个随机数x作为第二公开数并公开回复给核心企业节点设备,其中随机数
Figure PCTCN2020077624-appb-000011
核心企业节点设备11发送所述机密交易、所述第一证明参数、所述第二证明参数及所述目标证明参数至所述监管机构节点设备14,使得所述监管机构节点设备14基于所述目标证明参数、第一公开参数及第二公开参数确定所述机密交易中的应付款,从而实现对所述应付款的监管。
在一些实施例中,一级供应商节点设备12用于利用所述区块链供应链平台10接收所述交易数据并解密后输出给所述一级供应商。
一级供应商作为核心企业应付款的接收方,通过一级供应商节点设备12接收核心企业节点设备11发送的验证参数。核心企业可以通过密钥协商等方式告知一级供应商应付款及第一随机数r。
在一个可选的实施例中,所述一级供应商节点设备12,还用于将所述交易数据中的UTXO拆分为第一UTXO和第二UTXO,基于所述第一UTXO和第二UTXO与其他区块链实体节点设备进行交易。
所述一级供应商节点设备12将交易数据发送给所述区块链供应链平台10进行存储。
在该可选的实施例中,所述第一UTXO中的金额和第二UTXO中的金额之和等于所述UTXO中的金额。
一级供应商可以将交易数据中的UTXO拆分后交易给二级供应商、保理商或者通过银行进行抵押贷款。二级供应商、保理商或者银行接收到拆分后的UTXO可以进一步进行拆分并交易。一旦拆分后的UTXO被使用后,原来的UTXO就不再可用,但是关于原来的UTXO的交易数据依旧会记录在区块链供应链平台上,供溯源和查询。
在一个可选的实施例中,所述一级供应商节点设备12,还用于基于Bulletproof对所述第一UTXO和第二UTXO进行范围证明。
在该可选的实施例中,当一笔UTXO0拆分成UTXO1和UTXO2时,可以使用加法同态性,得到UTXO0=UTXO1+UTXO2,并且可以使用Bulletproof算法证明拆分后的UTXO1和UTXO2中的金额均为合法值,即UTXO中的金额为一定范围内的正数。
示例性的,假设
Figure PCTCN2020077624-appb-000012
该UTXO的持有者可以将其拆分为UTXO 1和UTXO 2。使用加法同态性得到:
Figure PCTCN2020077624-appb-000013
由此可见,x 0=x 1+x 2,如此保证了两笔UTXO中的金额之和等于原UTXO所隐藏的金额。于此同时,使用Bulletproof算法生成范围证明,用于证明UTXO 1和UTXO 2中的金额在合理范围内。举例来说,金额的范围可以设置为[0,2^32-1]。关于Bulletproof算法生成范围证明的过程,为现有技术,本发明不再详细赘述。
需要说明的是,上述实施例中以将UTXO拆分为两个子UTXO为例进行了说明,实际上一级供应商节点设备也可以将UTXO拆分成3份或者更多份,以更灵活的与二级供应商进行交易。
需要说明的是,本实施例中,一级供应商节点设备在将UTXO拆分为多个子UTXO时,还可以基于子UTXO发起可监管机密交易,与核心企业节点设备发起可监管机密交易的方法相同,一级供应商节点设备也需要先向监管机构节点设备先申请第一签名参数、第二签名参数及第三签名参数,然后按照前述核心企业节点设备发起可监管机密交易的方法发起可监管机密交易,同样的,其它的供应商节点设备(包括一级、二级、三级甚至更低级的供应商节点设备)在获取到UTXO后同样能按照前述方法发起可监管机密交易,这样整个***中的机密交易都处于监管机构节点设备的监管之下。
在一个可选的实施例中,所述一级供应商节点设备12或者所述其他区块链实体节点设备13,还用于当所述应付款到期后,向所述核心企业节点设备兑付应付款,响应于所述应付款兑付成功,将持有的UTXO进行无效化签名或者返还给所述核心企业节点设备。
所述UTXO中标记了应付款的到期时间戳。
当持有UTXO的区块链实体(例如,一级供应商、二级供应商、保理商、银行等)通过各自的节点设备确定应付款到期后,可以通过所述区块链供应链平台10上记录的交易数据向所述核心企业节点设备11兑付应付款。
核心企业通过核心企业节点设备11接收到兑付应付款的信息时,确认应付款是否到期。在确认应付款到期后,兑付债款。收到债款后的区块链实体进行签名,表示已经收到了债款。持有UTXO的区块链实体在收到债款的同时或者之后,将自身所持有的UTXO无效化签名或者返还给核心企业,形成完整的交易数据记录在区块链供应链平台10上。
所述监管机构节点设备14,用于在接收到所述核心企业节点设备的签名参数申请时,发送多个签名参数。
在一个可选的实施例中,所述监管机构节点设备在接收到所述核心企业节点设备的签名参数申请时,发送多个签名参数包括:
生成第一候选参数、第二候选参数及第三候选参数;对所述第一候选参数进行签名得到第一签名参数,对所述第二候选参数进行签名得到第二签名参数及对所述第三候选参数进行签名得到第三签名参数;在接收到所述核心企业节点设备的签名参数申请时,发送所述第一签名参数、所述第二签名参数及所述第三签名参数。
在该可选的实施例中,监管机构节点设备分别对第一候选参数、第二候选参数及第三候选参数进行签名,发送第一候选参数、第二候选参数及第三候选参数及各自的签名给核心企业节点设备。
在一个替代的实施例中,所述监管机构节点设备在接收到所述核心企业节点设备的 签名参数申请时,发送多个签名参数包括:
生成第一候选参数、第二候选参数及第三候选参数;利用Bulletproof范围证明基于所述第一候选参数、所述第二候选参数及所述第三候选参数计算第二证明参数;使用私钥对所述第二证明参数进行签名并保存所述签名及对应的所述第一候选参数、所述第二候选参数及所述第三候选参数;当接收到核心企业节点设备的签名参数请求时,将所述第一候选参数作为第一签名参数、所述第二候选参数作为所述第二签名参数及所述第三候选参数作为所述第三签名参数发送给所述核心企业节点设备,并将所述第二证明参数的签名一并发送给所述核心企业节点设备。
在该可选的实施例中,监管机构节点设备将第二证明参数
Figure PCTCN2020077624-appb-000014
的签名及多个签名参数发送给核心企业节点设备,核心企业节点设备验证第二证明参数的签名即可确定上述三个签名参数的真实性。由于仅需对第二证明参数进行签名,无需对第一候选参数、第二候选参数及第三候选参数进行签名,减少了签名次数;且将未签名的多个候选参数作为多个签名参数发送给核心企业节点设备,减少了信息的传输量,提高了签名参数的发送效率。
其中,所述第一签名参数ρ、所述第二签名参数s L及所述第三签名参数s R均为Z p范围内的数。这些签名参数都是动态生成的一次性随机数。
所述监管机构节点设备14利用Bulletproof范围证明基于所述第一签名参数、所述第二签名参数及所述第三签名参数计算证明参数。
在本发明的一个可选实施例中,所述第二证明参数
Figure PCTCN2020077624-appb-000015
其中,h是离散对数的基,是一个全世界范围内公开的***参数,g、h均为公开的***参数,ρ为所述第一签名参数,s L为所述第二签名参数,s R为所述第三签名参数。
所述监管机构节点设备14使用私钥对所述证明参数进行签名并保存所述签名及对应的所述第一签名参数、所述第二签名参数及所述第三签名参数。
监管机构节点设备14使用数字签名技术对证明参数进行签名。数字签名技术是基于非对称加密算法和信息摘要算法实现的对于消息来源及完整性的认证,同时是签名者不可抵赖的保证。在一个数字签名***中有两个角色,一个是消息的签名者,一个是消息的认证者。消息的签名者根据自己的私钥可以对一条消息的信息摘要进行签名,消息的认证者根据自己的公钥对一条消息的信息摘要进行验证。如果验证通过则可证明该消息的来源是消息的签名者,消息的信息摘要相同且签名者不可抵赖。
所述监管机构节点设备14,还用于当接收到核心企业节点设备的签名参数请求时,向所述核心企业节点设备发送所述第一签名参数、所述第二签名参数及所述第三签名参数。
交易数据发送方在进行交易数据范围证明之前,通过核心企业节点设备向监管机构节点设备申请签名参数,监管机构节点设备将签名过的证明参数对应的第一签名参数、所述第二签名参数及所述第三签名参数发送给监管机构节点设备。
在本发明的一个可选实施例中,所述监管机构节点设备14,还用于当接收到所述核心企业节点设备发送的所述第一证明参数和所述第二证明参数时,回复第一公开参数。
在该可选的实施例中,核心企业节点设备向监管机构节点设备发送第一证明参数
Figure PCTCN2020077624-appb-000016
和第二证明参数
Figure PCTCN2020077624-appb-000017
所述监管机构节点设备动态选择一个随机数z作为第一公开数并公开回复给核心企业节点设备,其中随机数
Figure PCTCN2020077624-appb-000018
在本发明的一个可选实施例中,所述监管机构节点设备14,还用于当接收到所述核心企业节点设备发送的第一承诺参数和第二承诺参数时,回复第二公开参数。
在该可选的实施例中,核心企业节点设备将第一承诺和第二承诺发送给监管机构节点设备。所述监管机构节点设备动态选择一个随机数x作为第二公开数并公开回复给核 心企业节点设备,其中随机数
Figure PCTCN2020077624-appb-000019
由此可见,随机数y是所述监管机构节点设备14在接收到核心企业节点设备发送的第一证明参数和第二证明参数时动态并随机产生的一次性随机数,随机数x是所述监管机构节点设备14在接收到第一承诺参数和第二承诺参数时动态并随机产生的一次性随机数。
所述监管机构节点设备14,还用于从所述区块链供应链平台上获取所述交易数据;获取所述交易数据中的机密交易及证明参数,并基于所述证明参数确定所述机密交易中的应付款以实现所述应付款的监管。
在本发明的一个可选实施例中,所述监管机构节点设备14基于所述证明参数确定所述机密交易中的应付款以实现所述应付款的监管包括:
将所述第一公开参数、所述第二公开参数及所述第二签名参数带入所述目标证明参数中,计算得到目标随机数;
根据所述目标随机数计算出所述机密交易中的交易数据;
其中,所述目标随机数为由0或者1组成的n维数组,且所述n维数组中的每一个数与2 n的乘积与所述应付款中相同位置处的数据对应。
在该可选的实施例中,监管机构节点设备根据证明中的签名及证明中的参数P即可推算出证明中的交易数据v。由于a L是交易数据v的二进制形式,P,x,z均为公开值,因而监管机构节点设备可以根据所拥有的随机数s L的值计算出a L的值,进而推算出应付款v。
本实施例,通过监管机构节点设备选取多个签名参数并计算出证明参数,对计算得到的证明参数进行签名后即可将签名后的多个签名参数发给核心企业节点设备,使得核心企业节点设备根据多个签名参数计算证明参数。由于监管机构节点设备与核心企业节点设备均使用相同的多个签名参数计算得到相同的证明参数,因而在区块链网络上进行机密交易扭转时,监管机构节点设备便能够监管到核心企业节点设备的证明参数,从而实现了机密交易的监管。
所述区块链供应链平台10,用于存储所述交易数据;验证所述交易数据的正确性及所述监管机构节点设备签名的合法性。
需要说明的是,所述区块链供应链交易隐藏动态监管***1中的区块链供应链平台10、核心企业节点设备11、一级供应商节点设备12、所述监管机构节点设备14必须存在的,所述其他区块链实体节点设备13可选的存在。即,二级供应商节点设备、银行节点设备、保理商节点设备可选的存在于所述区块链供应链交易隐藏动态监管***1中。
允许监管机构动态监管,不需要对每笔交易进行审核,通过预先分发的一次性随机数进行监管,具有完美前向安全的特性。
实施例二
如图2所示,为本发明实施例的区块链供应链交易隐藏动态监管***的另一架构示意图。
区块链供应链交易隐藏动态监管***1除了包括图1中所述的区块链供应链平台10、核心企业节点设备11、一级供应商节点设备12、其他区块链实体节点设备13、监管机构节点设备14,还可以包括至少一个风险评估机构节点设备15。
其中,所述至少一个风险评估机构节点设备15,用于读取所述区块链供应链平台10上存储的交易数据,使用预先训练好的风险评估模型对所述交易数据进行风险评估,并将风险评估结果发送给所述其他区块链实体节点设备13。
至少一个风险评估机构节点设备15可以事先获取所述区块链供应链平台10上记录的历史交易数据,并基于历史交易数据训练风险评估模型,来评估每笔交易数据中的应 付款的价值。
至少一个风险评估机构节点设备15读取到所述区块链供应链平台10上新记录的交易数据时,使用风险评估模型来评估新记录的交易数据中的应付款的价值,并将风险评估结果发送给交易数据对应的UTXO(即核心企业的应付款)的潜在购买者。所述潜在购买者可以包括,但不限于二级供应商,保理商,银行等。
二级供应商,保理商,银行等获取了风险评估结果后,可以选择与UTXO的持有者进行交易,并最终完成应付款的兑付过程。
在一些实施例中,所述区块链供应链平台10,可以是基于任何UTXO模型的区块链***以及支持UTXO账户模型的区块链***。
在一些实施例中,所述区块链供应链***1还可以包括:数据解密模块,UTXO金额范围证明模块,区块链钱包,轻量钱包,统计分析工具,实体列表等。
需要说明的是,所有区块链实体的交易上链之前,需要提前获取监管机构动态选取的一次性签名参数及基于随机数计算的证明参数并签名,区块链实体基于一次性签名参数生成Bulletproof证明,具有前向安全的特性。区块链供应链平台除了验证交易数据的正确性以外,还要验证监管机构签名的合法性。由于签名参数是由监管机构动态生成的一次性数,当监管机构的密钥泄露,不会导致大范围的交易数据泄露。
本实施例所述的区块链供应链隐私交易动态监管***,通过引入Pedersen承诺和Bulletproof范围证明的概念,将核心企业的明文应付款加密成机密交易并上链,只有交易双方能够解密交易数据中的金额,保护了交易隐私不被泄露,保障了区块链实体商业机密。而监管机构在获取到机密交易和Bulletproof范围证明后,通过Bulletproof范围证明对机密交易进行监管。
实施例三
参阅图3所示,为本发明实施例揭露的区块链供应链交易隐藏动态监管方法的流程示意图。
所述区块链供应链交易隐藏动态监管方法,应用于区块链供应链网络中,所述区块链供应链交易隐藏动态监管方法具体包括以下步骤,根据不同的需求,该流程图中步骤的顺序可以改变,某些步骤可以省略。
S31,当所述监管机构节点设备接收到核心企业节点设备的签名参数请求时,向所述核心企业节点设备发送第一签名参数、第二签名参数及第三签名参数。
在一个可选的实施例中,,所述监管机构节点设备接收到核心企业节点设备的签名参数请求时,向所述核心企业节点设备发送第一签名参数、第二签名参数及第三签名参数包括:
生成第一候选参数、第二候选参数及第三候选参数;对所述第一候选参数进行签名得到第一签名参数,对所述第二候选参数进行签名得到第二签名参数及对所述第三候选参数进行签名得到第三签名参数;在接收到所述核心企业节点设备的签名参数申请时,发送所述第一签名参数、所述第二签名参数及所述第三签名参数。
在一个可选的实施例中,生成第一候选参数、第二候选参数及第三候选参数;利用Bulletproof范围证明基于所述第一候选参数、所述第二候选参数及所述第三候选参数计算证明参数;使用私钥对所述证明参数进行签名并保存所述签名及对应的所述第一候选参数、所述第二候选参数及所述第三候选参数;当接收到核心企业节点设备的签名参数请求时,将所述第一候选参数作为第一签名参数、所述第二候选参数作为所述第二签名参数及所述第三候选参数作为所述第三签名参数发送给所述核心企业节点设备。
S32,所述核心企业节点设备利用Pedersen承诺对核心企业承诺给一级供应商的应付款进行加密得到机密交易。
S33,所述核心企业节点设备利用Bulletproof范围证明基于所述多个签名参数及生成的随机数计算证明参数。
S34,所述核心企业节点设备对所述机密交易及所述证明参数进行签名并将签名后的交易数据上传至区块链供应链平台。
S35,一级供应商节点设备利用所述区块链供应链平台接收所述交易数据并解密后输出给所述一级供应商。
S36,所述监管机构节点设备从所述区块链供应链平台上获取所述交易数据;获取所述交易数据中的机密交易及证明参数,并基于所述证明参数确定所述机密交易中的应付款以实现所述应付款的监管。
在一个可选的实施例中,所述方法还包括:
通过所述一级供应商节点设备将所述交易数据中的UTXO拆分为第一UTXO和第二UTXO,其中,所述第一UTXO中的金额和第二UTXO中的金额之和等于所述UTXO中的金额;
基于所述第一UTXO和第二UTXO与其他区块链实体节点设备进行交易;
基于Bulletproof对所述第一UTXO和第二UTXO进行范围证明。
在一个可选的实施例中,所述方法还包括:
通过至少一个风险评估机构节点设备读取所述区块链供应链平台上存储的交易数据,使用预先训练好的风险评估模型对所述交易数据进行风险评估,并将风险评估结果发送给所述其他区块链实体节点设备。
关于实施例三所述的区块链供应链隐私交易动态监管方法中的各个实施例的具体过程可参见实施例一及实施例二的相应描述,本发明不再详细阐述。
需要说明的是,所有区块链实体的交易上链之前,需要提前获取监管机构动态生成的一次性签名参数及基于随机数计算的证明参数并签名,区块链实体基于一次性签名参数生成Bulletproof证明,具有前向安全的特性。区块链供应链平台除了验证交易数据的正确性以外,还要验证监管机构签名的合法性。由于签名参数是由监管机构动态生成的一次性数,当监管机构的密钥泄露,不会导致大范围的交易数据泄露。
本实施例所述的区块链供应链隐私交易动态监管方法,通过引入Pedersen承诺和Bulletproof范围证明的概念,将核心企业的明文应付款加密成机密交易并上链,只有交易双方能够解密交易数据中的金额,保护了交易隐私不被泄露,保障了区块链实体商业机密。而监管机构在获取到机密交易和Bulletproof范围证明后,通过Bulletproof范围证明对机密交易进行监管。
实施例四
图4为本发明实施例揭露的区块链节点设备的内部结构示意图。
在本实施例中,所述区块链节点设备4可以包括存储器41、处理器42和总线43及收发器44。
所述区块链节点设备4可以为核心企业节点设备,还可以为监管机构节点设备,或者一级供应商节点设备,其他区块链实体(例如,二级供应商,银行,保理商)节点设备等。当所述区块链节点设备4为核心企业节点设备时,执行实施例一或者实施例二中所述的核心企业节点设备的功能;当所述区块链节点设备4为监管机构节点设备时,执行实施例一或者实施例二中所述的监管机构节点设备的功能;当所述区块链节点设备4为一级供应商节点设备时,执行实施例一或者实施例二中所述的一级供应商节点设备的功能;当所述区块链节点设备4为其他区块链实体节点设备时,执行实施例一或者实施例二中所述的其他区块链实体节点设备的功能。
其中,存储器41至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、 硬盘、多媒体卡、卡型存储器(例如,SD或DX存储器等)、磁性存储器、磁盘、光盘等。存储器41在一些实施例中可以是所述区块链节点设备4的内部存储单元,例如所述区块链节点设备4的硬盘。存储器41在另一些实施例中也可以是所述区块链节点设备4的外部存储设备,例如所述区块链节点设备4上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,存储器41还可以既包括所述区块链节点设备4的内部存储单元,也包括外部存储设备。存储器41不仅可以用于存储安装于所述区块链节点设备4的应用程序及各类数据,还可以用于暂时地存储已经输出或者将要输出的数据。
处理器42在一些实施例中可以是一中央处理器(Central Processing Unit,CPU)、控制器、微控制器、微处理器,用于运行存储器41中存储的程序代码或处理数据。
该总线43可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。为便于表示,图4中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
进一步地,所述区块链节点设备4还可以包括网络接口,网络接口可选的可以包括有线接口和/或无线接口(如WI-FI接口、蓝牙接口等),通常用于在该区块链节点设备4与其他调度服务器之间建立通信连接。
可选地,该区块链节点设备4还可以包括用户接口,用户接口可以包括显示器(Display)、输入单元,比如键盘(Keyboard),可选的,用户接口还可以包括标准的有线接口、无线接口。可选地,在一些实施例中,显示器可以是LED显示器、液晶显示器、触控式液晶显示器以及有机发光二极管(Organic Light-Emitting Diode,OLED)触摸器等。其中,显示器也可以称为显示屏或显示单元,用于显示在所述调度服务器中处理的消息以及用于显示可视化的用户界面。
图4仅示出了具有组件41-44的所述区块链节点设备4,本领域技术人员可以理解的是,图4示出的结构并不构成对所述区块链节点设备4的限定,既可以是总线型结构,也可以是星形结构,所述区块链节点设备4还可以包括比图示更少或者更多的部件,或者组合某些部件,或者不同的部件布置。其他现有的或今后可能出现的电子产品如可适应于本发明,也应包含在本发明的保护范围以内,并以引用方式包含于此。
在上述实施例中,可以全部或部分地通过应用程序、硬件、固件或者其任意组合来实现。当使用应用程序实现时,可以全部或部分地以计算机程序产品的形式实现。
所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如,同轴电缆、光纤、数字用户线)或无线(例如,红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带),光介质(例如,DVD),或者半导体介质(例如,固态硬盘(Solid State Disk,SSD))等。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的***,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的***,装置和方法,可以 通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个***,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例中的方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用应用程序功能单元的形式实现。
所述集成的单元如果以应用程序功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以应用程序产品的形式体现出来,该计算机应用程序产品存储在一个存储介质中,包括若干指令用以使得一台调度服务器(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、硬盘、只读存储器(Read-Only Memory,ROM)、磁碟或者光盘等各种可以存储程序代码的介质。
需要说明的是,上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (11)

  1. 一种区块链供应链交易隐藏动态监管***,其特征在于,所述***包括:
    监管机构节点设备,用于在接收到核心企业节点设备的签名参数申请时,发送多个签名参数;
    所述核心企业节点设备,用于利用Pedersen承诺对核心企业承诺给一级供应商的应付款进行加密得到机密交易;利用Bulletproof范围证明基于所述多个签名参数及生成的随机数计算证明参数;对所述机密交易及所述证明参数进行签名并将签名后的交易数据上传至区块链供应链平台;
    一级供应商节点设备,用于利用所述区块链供应链平台接收所述交易数据并解密后输出给所述一级供应商;
    所述监管机构节点设备,还用于从所述区块链供应链平台上获取所述交易数据;获取所述交易数据中的机密交易及证明参数,并基于所述证明参数确定所述机密交易中的应付款以实现所述应付款的监管;
    所述区块链供应链平台,用于存储所述交易数据;验证所述交易数据的正确性及所述监管机构节点设备签名的合法性。
  2. 如权利要求1所述的区块链供应链交易隐藏动态监管***,其特征在于,所述多个签名参数包括第一签名参数、第二签名参数及第三签名参数,所述随机数包括第一随机数及第二随机数;
    所述利用Pedersen承诺对核心企业承诺给一级供应商的应付款进行加密得到机密交易包括:
    利用Pedersen承诺基于所述应付款及所述第一随机数加密得到机密交易;
    所述核心企业节点设备利用Bulletproof范围证明基于所述多个签名参数及生成的随机数计算证明参数包括:
    基于所述交易数据计算得到第一计算数及第二计算数;
    利用Bulletproof范围证明基于所述第一计算数、所述第二计算数及所述第二随机数计算第一证明参数;
    利用所述Bulletproof范围证明基于所述第一签名参数、所述第二签名参数及所述第三签名参数计算第二证明参数;
    基于所述第一计算数及所述第二签名参数计算目标证明参数。
  3. 如权利要求2所述的区块链供应链交易隐藏动态监管***,其特征在于,所述基于所述第一计算数及所述第二签名参数计算目标证明参数包括:
    向所述监管机构节点设备发送所述第一证明参数和所述第二证明参数并接收所述监管机构节点设备回复的第一公开参数;
    利用Pedersen承诺随机计算第一承诺参数和第二承诺参数;
    向所述监管机构节点设备发送所述第一承诺参数和所述第二承诺参数并接收所述监管机构节点设备回复的第二公开参数;
    基于所述第一计算数、所述第二签名参数、所述第一公开参数和所述第二公开参数计算目标证明参数。
  4. 如权利要求3所述的区块链供应链交易隐藏动态监管***,其特征在于,所述监管机构节点设备在接收到所述核心企业节点设备的签名参数申请时,发送多个签名参数包括:
    生成第一候选参数、第二候选参数及第三候选参数;对所述第一候选参数进行签名得到第一签名参数,对所述第二候选参数进行签名得到第二签名参数及对所述第三候选参数进行签名得到第三签名参数;在接收到所述核心企业节点设备的签名参数申请时, 发送所述第一签名参数、所述第二签名参数及所述第三签名参数;或者
    生成第一候选参数、第二候选参数及第三候选参数;利用Bulletproof范围证明基于所述第一候选参数、所述第二候选参数及所述第三候选参数计算第二证明参数;使用私钥对所述第二证明参数进行签名并保存所述签名及对应的所述第一候选参数、所述第二候选参数及所述第三候选参数;当接收到核心企业节点设备的签名参数请求时,将所述第一候选参数作为第一签名参数、所述第二候选参数作为所述第二签名参数及所述第三候选参数作为所述第三签名参数发送给所述核心企业节点设备,并将所述第二证明参数的签名一并发送给所述核心企业节点设备。
  5. 如权利要求1所述的区块链供应链交易隐藏动态监管***,其特征在于,所述一级供应商节点设备,还用于:
    将所述交易数据中的UTXO拆分为第一UTXO和第二UTXO,其中,所述第一UTXO中的金额和第二UTXO中的金额之和等于所述UTXO中的金额;
    基于所述第一UTXO和第二UTXO与其他区块链实体节点设备进行交易;
    基于Bulletproof对所述第一UTXO和第二UTXO进行范围证明。
  6. 如权利要求5所述的区块链供应链交易隐藏动态监管***,其特征在于,所述一级供应商节点设备或者所述其他区块链实体节点设备,还用于当所述应付款到期后,向所述核心企业节点设备兑付应付款,响应于所述应付款兑付成功,将持有的UTXO进行无效化签名或者返还给所述核心企业节点设备。
  7. 如权利要求5或6所述的区块链供应链交易隐藏动态监管***,其特征在于,所述***还包括:
    至少一个风险评估机构节点设备,用于读取所述区块链供应链平台上存储的交易数据,使用预先训练好的风险评估模型对所述交易数据进行风险评估,并将风险评估结果发送给所述其他区块链实体节点设备。
  8. 一种区块链供应链交易隐藏动态监管方法,其特征在于,所述方法包括:
    当监管机构节点设备接收到核心企业节点设备的签名参数请求时,向所述核心企业节点设备发送第一签名参数、第二签名参数及第三签名参数;
    所述核心企业节点设备利用Pedersen承诺对核心企业承诺给一级供应商的应付款进行加密得到机密交易;
    所述核心企业节点设备利用Bulletproof范围证明基于所述多个签名参数及生成的随机数计算证明参数;
    所述核心企业节点设备对所述机密交易及所述证明参数进行签名并将签名后的交易数据上传至区块链供应链平台;
    一级供应商节点设备利用所述区块链供应链平台接收所述交易数据并解密后输出给所述一级供应商;
    所述监管机构节点设备从所述区块链供应链平台上获取所述交易数据;获取所述交易数据中的机密交易及证明参数,并基于所述证明参数确定所述机密交易中的应付款以实现所述应付款的监管。
  9. 如权利要求8所述的区块链供应链交易隐藏动态监管方法,其特征在于,所述监管机构节点设备接收到核心企业节点设备的签名参数请求时,向所述核心企业节点设备发送第一签名参数、第二签名参数及第三签名参数包括:
    生成第一候选参数、第二候选参数及第三候选参数;对所述第一候选参数进行签名得到第一签名参数,对所述第二候选参数进行签名得到第二签名参数及对所述第三候选参数进行签名得到第三签名参数;在接收到所述核心企业节点设备的签名参数申请时,发送所述第一签名参数、所述第二签名参数及所述第三签名参数;或者
    生成第一候选参数、第二候选参数及第三候选参数;利用Bulletproof范围证明基于所述第一候选参数、所述第二候选参数及所述第三候选参数计算证明参数;使用私钥对所述证明参数进行签名并保存所述签名及对应的所述第一候选参数、所述第二候选参数及所述第三候选参数;当接收到核心企业节点设备的签名参数请求时,将所述第一候选参数作为第一签名参数、所述第二候选参数作为所述第二签名参数及所述第三候选参数作为所述第三签名参数发送给所述核心企业节点设备。
  10. 如权利要求8或9所述的区块链供应链交易隐藏动态监管方法,其特征在于,所述方法还包括:
    通过所述一级供应商节点设备将所述交易数据中的UTXO拆分为第一UTXO和第二UTXO,其中,所述第一UTXO中的金额和第二UTXO中的金额之和等于所述UTXO中的金额;
    基于所述第一UTXO和第二UTXO与其他区块链实体节点设备进行交易;
    基于Bulletproof对所述第一UTXO和第二UTXO进行范围证明。
  11. 如权利要求8或9所述的区块链供应链交易隐藏动态监管方法,其特征在于,所述方法还包括:
    通过至少一个风险评估机构节点设备读取所述区块链供应链平台上存储的交易数据,使用预先训练好的风险评估模型对所述交易数据进行风险评估,并将风险评估结果发送给所述其他区块链实体节点设备。
PCT/CN2020/077624 2019-12-31 2020-03-03 区块链供应链交易隐藏动态监管***及方法 WO2021134897A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911416606.2 2019-12-31
CN201911416606.2A CN111079190A (zh) 2019-12-31 2019-12-31 区块链供应链交易隐藏动态监管***及方法

Publications (1)

Publication Number Publication Date
WO2021134897A1 true WO2021134897A1 (zh) 2021-07-08

Family

ID=70320948

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/077624 WO2021134897A1 (zh) 2019-12-31 2020-03-03 区块链供应链交易隐藏动态监管***及方法

Country Status (2)

Country Link
CN (1) CN111079190A (zh)
WO (1) WO2021134897A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112990928B (zh) * 2021-05-10 2021-08-24 南开大学 一种数字货币交易数据的安全保护方法
CN113657914A (zh) * 2021-08-26 2021-11-16 卓尔智联(武汉)研究院有限公司 基于区块链的商品溯源方法、计算机装置及存储介质
CN116389164B (zh) * 2023-05-26 2023-09-12 建信金融科技有限责任公司 数据的检测方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418689A (zh) * 2017-11-30 2018-08-17 矩阵元技术(深圳)有限公司 一种适合区块链隐私保护的零知识证明方法和介质
CN109377215A (zh) * 2018-08-06 2019-02-22 阿里巴巴集团控股有限公司 区块链交易方法及装置、电子设备
CN109584055A (zh) * 2018-09-20 2019-04-05 阿里巴巴集团控股有限公司 基于区块链的交易方法、装置和汇出方设备
CN110383311A (zh) * 2018-11-07 2019-10-25 阿里巴巴集团控股有限公司 监管区块链机密交易
CN110505046A (zh) * 2019-07-29 2019-11-26 深圳壹账通智能科技有限公司 多数据提供方加密数据跨平台零知识校验方法、装置及介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418689A (zh) * 2017-11-30 2018-08-17 矩阵元技术(深圳)有限公司 一种适合区块链隐私保护的零知识证明方法和介质
CN109377215A (zh) * 2018-08-06 2019-02-22 阿里巴巴集团控股有限公司 区块链交易方法及装置、电子设备
CN109584055A (zh) * 2018-09-20 2019-04-05 阿里巴巴集团控股有限公司 基于区块链的交易方法、装置和汇出方设备
CN110383311A (zh) * 2018-11-07 2019-10-25 阿里巴巴集团控股有限公司 监管区块链机密交易
CN110505046A (zh) * 2019-07-29 2019-11-26 深圳壹账通智能科技有限公司 多数据提供方加密数据跨平台零知识校验方法、装置及介质

Also Published As

Publication number Publication date
CN111079190A (zh) 2020-04-28

Similar Documents

Publication Publication Date Title
US10673632B2 (en) Method for managing a trusted identity
US10547446B2 (en) Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items
TWI725124B (zh) 決定用於資訊的安全交換的共同私密,及階層化的決定性加密金鑰
US11095449B2 (en) System and method for securely processing an electronic identity
US11625490B2 (en) Method and apparatus for obtaining input of secure multiparty computation protocol
TWI709314B (zh) 資料處理方法和裝置
US11251937B2 (en) Distributed security mechanism for blockchains and distributed ledgers
WO2021134900A1 (zh) 区块链供应链交易隐藏静态监管***及方法
US20150193744A1 (en) Methods and systems for creating and using massless currency
CN111160908B (zh) 基于区块链的供应链交易隐私保护***、方法及相关设备
WO2021134897A1 (zh) 区块链供应链交易隐藏动态监管***及方法
US8220040B2 (en) Verifying that group membership requirements are met by users
CN111105235B (zh) 基于区块链的供应链交易隐私保护***、方法及相关设备
TWI622949B (zh) 具多重密鑰的kyc資料標記之爭議救濟系統及其方法
WO2021114495A1 (zh) 基于区块链的供应链交易隐私保护***、方法及相关设备
CN112435026A (zh) 用零知识证明保护文件交易信息的方法、装置和电子设备
Cebeci et al. Secure e-commerce scheme
TWI734729B (zh) 實現電子簽章的方法、裝置及簽章伺服器
CN114514550A (zh) 将请求分区成区块链的交易
CN113342802A (zh) 区块链数据存储的方法和装置
US20220092587A1 (en) Verification systems for blockchains and distributed ledgers
CN112950356B (zh) 基于数字身份的个人贷款处理方法及***、设备、介质
CN115310978A (zh) 一种数字资产的交易方法及装置
CN111429119B (zh) 区块链技术用于数字货币的加密、支付、查询和提交方法
US20230124498A1 (en) Systems And Methods For Whitebox Device Binding

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20910638

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20910638

Country of ref document: EP

Kind code of ref document: A1