CN109729041B - Method and device for issuing and acquiring encrypted content - Google Patents
Method and device for issuing and acquiring encrypted content Download PDFInfo
- Publication number
- CN109729041B CN109729041B CN201711025270.8A CN201711025270A CN109729041B CN 109729041 B CN109729041 B CN 109729041B CN 201711025270 A CN201711025270 A CN 201711025270A CN 109729041 B CN109729041 B CN 109729041B
- Authority
- CN
- China
- Prior art keywords
- key
- content
- receiver
- target content
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The application discloses a method for issuing and acquiring encrypted content, which is applied to a decentralized system based on a block chain and comprises the following steps: the sender encrypts the target content by using a first key by adopting a first encryption method; the sender uses the receiver public key of the receiver of the target content to encrypt and calculate the first secret key by adopting a second encryption method to obtain a second secret key; the sender issues the encrypted target content and the second key to a decentralized system based on the block chain; the receiver acquires the encrypted target content and the second key which are recorded in the block chain; the receiver decrypts the second key by adopting a second decryption method based on a receiver private key corresponding to the held receiver public key to obtain a first key; when the decryption is successful, the receiver decrypts the target content by using the first key and adopting a first decryption method to obtain the original content of the target content.
Description
Technical Field
The present application relates to the field of computer application technologies, and in particular, to a method and an apparatus for issuing and acquiring encrypted content.
Background
The block chain technology is an emerging technology which is commonly participated in accounting by a plurality of computing devices and commonly maintains a complete distributed database. Because the block chain technology has the characteristics of decentralization and openness, each computing device can participate in database recording, and data synchronization can be rapidly performed among the computing devices, a decentralization system is built by using the block chain technology, and various execution programs are recorded in a distributed database of a block chain for automatic execution, so that the block chain technology is widely applied in numerous fields; for example, in the field of financial technology, a P2P payment platform is built by using a blockchain technology, and an execution program such as an intelligent contract is issued on the blockchain, so that point-to-point secure payment between different users can be realized without going through financial institutions such as banks.
Disclosure of Invention
The application provides an encrypted content publishing method, which is applied to a block chain-based decentralized system and comprises the following steps:
encrypting the target content by using a first encryption method by using a first key;
encrypting and calculating the first secret key by using a receiver public key of a receiver of the target content by adopting a second encryption method to obtain a second secret key;
and issuing the encrypted target content and the second key to the block chain-based decentralized system so that the decentralized system records the encrypted target content and the second key to the block chain.
The application also provides an encrypted content acquisition method, which is used for a block chain-based decentralized system, and the method comprises the following steps:
acquiring target content recorded in the block chain, which is encrypted by using a first key through a first encryption method; and a second key obtained by encrypting and calculating the first key by using a receiver public key of the receiver of the target content by adopting a second encryption method;
the receiver decrypts the second key by adopting a second decryption method based on a receiver private key corresponding to the receiver public key, so as to obtain the first key;
and when the decryption is successful, decrypting the target content by using the first key by adopting a first decryption method to obtain the original content of the target content.
The present application further provides an apparatus for distributing encrypted content, which is applied to a block chain-based decentralized system, the apparatus including:
the first encryption module is used for encrypting the target content by using a first key and adopting a first encryption method;
the second encryption module is used for carrying out encryption calculation on the first secret key by using a receiver public key of a receiver of the target content by adopting a second encryption method to obtain a second secret key;
and the issuing module is used for issuing the encrypted target content and the second key to the block chain-based decentralized system so that the decentralized system records the encrypted target content and the second key into the block chain.
This application should propose an acquisition device of encrypted content, be applied to the decentralized system based on block chain, the device includes:
an obtaining module, configured to obtain target content included in the block chain, which is encrypted by using a first key and using a first encryption method; and a second key obtained by encrypting and calculating the first key by using a receiver public key of the receiver of the target content by adopting a second encryption method;
the first decryption module is used for decrypting the second key by the receiving party by adopting a second decryption method based on a receiving party private key corresponding to the held receiving party public key so as to obtain the first key;
and the second decryption module is used for decrypting the target content by adopting a first decryption method by using the first key when the decryption is successful, and acquiring the original content of the target content.
In the application, a technical scheme for performing secondary encryption on a decryption key of encrypted content to improve data security when the encrypted content is distributed to a blockchain is provided. When target content is issued to the blockchain, the target content can be encrypted by using a first key and adopting a first encryption method, a receiver public key of a receiver of the target content is used for carrying out encryption calculation by using a second key and adopting a second encryption method to obtain a second key, and then the encrypted target content and the second key are issued to the blockchain; the receiver may obtain the encrypted target content and the second key included in the blockchain, decrypt the second key by using a second decryption method based on a receiver private key corresponding to the held receiver public key to obtain a first key, decrypt the encrypted target content by using the first decryption method based on the decrypted first key, and further obtain the original content of the encrypted target content;
on one hand, because the first key used for encrypting the target content is secondarily encrypted based on the public key of the receiver, and the issuer of the target content has the authority of decrypting the encrypted first key only by the receiver which holds the private key of the receiver corresponding to the public key of the receiver used for encrypting the first key after publicly issuing the encrypted target content in the blockchain, the encrypted content can be successfully decrypted only by the correct receiver, and the data security when the encrypted content is publicly issued in the blockchain can be obviously improved;
on the other hand, only the receiver holding the receiver private key corresponding to the receiver public key used for encrypting the first key has the right to decrypt the first key, so that when the encrypted content is released in the blockchain, the encrypted content only needs to be disclosed to the blockchain in a broadcast mode, and the receiver does not need to be actively notified; moreover, the encrypted content published in the blockchain can not carry the identity information of the receiver any more, so that the problem of identity information leakage of the receiver caused by publishing the encrypted content to the blockchain in a public manner can be avoided.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic flowchart illustrating a method for issuing and acquiring encrypted content according to an embodiment of the present application;
fig. 2 is a logic block diagram of an apparatus for distributing encrypted content according to an embodiment of the present application;
fig. 3 is a hardware architecture diagram of an electronic device carrying the distribution apparatus of the encrypted content according to an embodiment of the present application;
fig. 4 is a logic block diagram of an apparatus for acquiring encrypted content according to an embodiment of the present application;
fig. 5 is a diagram illustrating a hardware architecture of an electronic device carrying the apparatus for acquiring encrypted content according to an embodiment of the present application.
Detailed Description
In a decentralized system built based on the blockchain technology, when some confidential content needs to be issued to the blockchain, a sender may generally encrypt the confidential content, and then issue the encrypted content and a decryption key corresponding to the encrypted content on the blockchain based on address information (such as a public key derivative address) of a receiver, and transmit the encrypted content and the decryption key to the receiver.
However, since the blockchain has the characteristic of being transparent, after the sender issues the encrypted content and the corresponding decryption key to the blockchain, all the node devices in the blockchain except the designated receiver can obtain the encrypted content and the corresponding decryption key by accessing the distributed database of the blockchain;
on the other hand, users other than the designated receiver can decrypt the encrypted content by using the decryption key to obtain the original content of the encrypted content, thereby causing the leakage of the confidential content.
On the other hand, when the encrypted content is distributed in the blockchain, the address information of the receiver is usually specified, and the address information of the receiver is usually related to the personal identity information of the receiver; therefore, when other users except the designated receiver access the distributed database of the blockchain, the address information of the receiver corresponding to the encrypted content can also be acquired, thereby causing the problem of leakage of the personal identity information of the receiver.
In view of this, the present application provides a technical solution for performing secondary encryption on a decryption key of an encrypted content when the encrypted content is distributed to a blockchain to improve data security.
When the method is implemented, when an issuer issues target content to a blockchain, the issuer may encrypt the target content by using a first encryption method using a first secret key, and encrypt and calculate the second secret key by using a second encryption method using a receiver public key of a receiver of the target content to obtain a second secret key, and then issue the encrypted target content and the second secret key to the blockchain; the receiver may obtain the encrypted target content and the second key included in the blockchain, decrypt the second key by using a second decryption method based on a receiver private key corresponding to a held receiver public key to obtain a first key, decrypt the encrypted target content by using the first decryption method based on the decrypted first key, and further obtain the original content of the encrypted target content;
on one hand, because the first key used for encrypting the target content is secondarily encrypted based on the public key of the receiver, and the issuer of the target content has the authority of decrypting the encrypted first key only by the receiver which holds the private key of the receiver corresponding to the public key of the receiver used for encrypting the first key after publicly issuing the encrypted target content in the blockchain, the encrypted content can be successfully decrypted only by the correct receiver, and the data security when the encrypted content is publicly issued in the blockchain can be obviously improved;
on the other hand, only the receiver holding the receiver private key corresponding to the receiver public key used for encrypting the first key has the right to decrypt the first key, so that when the encrypted content is released in the blockchain, the encrypted content only needs to be disclosed to the blockchain in a broadcast mode, and the receiver does not need to be actively notified; moreover, the encrypted content published in the blockchain can not carry the identity information of the receiver any more, so that the problem of identity information leakage of the receiver caused by publishing the encrypted content to the blockchain in a public manner can be avoided.
The present application is described below with reference to specific embodiments and specific application scenarios.
Referring to fig. 1, fig. 1 is a block chain-based decentralized system for distributing and acquiring encrypted content according to an embodiment of the present application, and the method includes the following steps:
102, the issuer uses the public key of the receiver of the target content to encrypt and calculate the first key by a second encryption method to obtain a second key;
103, issuing the encrypted target content and the second key to the block chain-based decentralized system, so that the decentralized system records the encrypted target content and the second key into the block chain;
and 106, when the decryption is successful, decrypting the target content by using the first key by adopting a first decryption method to obtain the original content of the target content.
The decentralized system may be a distributed network system built based on a block chain technology, and is "decentralized".
In the decentralized system, node devices may be included, and these node devices may exhibit a highly autonomous "decentralized" feature, and may publish locally generated data or published execution programs to the blockchain through a consensus mechanism (such as a specific consensus negotiation algorithm) of the blockchain, and be included in a newly generated new block by an "bookkeeper" (colloquially referred to as "miner") of the new block, and each node accessing the blockchain may synchronize all contents in the block to its local site, thereby forming a distributed database of the blockchain.
In this way, a user does not need to deploy a large-scale server cluster in the background as a "data center", and any form of front-end device (such as a mobile terminal and a PC terminal) on the user side can be used as one node device in the decentralized system.
The target content may include any form of confidential content that needs to be delivered to the receiving party through the blockchain and may be recorded and stored in a distributed database of the blockchain.
For example, the target content may be specifically a protocol document or other form of confidential content published to a block chain based decentralized system. In the present application, in order to improve the data security level when the encrypted content is distributed to the blockchain, when the sender distributes the target content to the blockchain, the sender may encrypt the target content itself and may perform secondary encryption on a decryption key corresponding to the encrypted target content.
On one hand, when the sender issues the target content to the blockchain, the sender may first encrypt the original target content by using a first encryption method based on the first key to obtain the encrypted target content.
The first key is an encryption key used for encrypting original target content; the first encryption method is an encryption method used for encrypting the original target content.
On the other hand, after the sender uses the first key to encrypt the target content by using the first encryption method, the receiver public key of the receiver of the target content may be further used to perform encryption calculation on the first key by using the second encryption method to obtain the second key.
The second key is the encrypted first key obtained by encrypting the first key; the second encryption method is an encryption method used when encrypting the first key.
Since there may be numerous recipients for the targeted content; the receiver public key held by the receiver is completely different for different receivers; therefore, after the sender encrypts the first key based on the above-described encryption method, the obtained second keys corresponding to different receivers will certainly be different; thus, in this case, different second keys can be generated for different recipients of the target content, respectively, so as to achieve the effect of "one person and one secret".
It should be noted that the encryption method supported by the decentralized system may cover any form of asymmetric encryption method, and may also cover any form of symmetric encryption algorithm; for example, the decentralized system may support mainstream asymmetric encryption algorithms such as an ECC (Elliptic curve Cryptography) series algorithm and an RSA encryption algorithm which are mainstream at present; symmetric encryption algorithms such as DES, 3DES, and AES, etc. may also be supported.
In this application, when the destination block chain issues the destination content, the destination content and the decryption key may be encrypted by using a symmetric encryption algorithm or an asymmetric encryption algorithm.
Note that, the first encryption method used by the sender to encrypt the target content may be the same as or different from the second encryption method used by the sender to encrypt the first key, and is not particularly limited in this application.
For example, in practical applications, the original target content is encrypted by using a general symmetric encryption method; the encryption of the first key may be a symmetric encryption method using the product of the sender's private key and the receiver's public key to obtain the ECDH exchange key; alternatively, an asymmetric encryption method in which encryption is performed using a public key of the receiver, or the like may be used. The above various scenarios are described below separately by different embodiments.
In an embodiment shown, the first encryption method may specifically include a general symmetric encryption method, which is not particularly limited in this application; for example, the first encryption method described above may be a method of encrypting original target content using mainstream symmetric encryption algorithms such as DES, 3DES, and AES.
Correspondingly, the first key may be a symmetric key used for encrypting the original content of the target content in any form, and is not particularly limited in this application; for example, in practical applications, the symmetric key may be a randomly generated character string that is not known to a third party, or a password.
When the sender needs to distribute the target content to the blockchain, the sender may encrypt the target content by using the first key and using a first encryption method to obtain the encrypted target content. After the target content is encrypted, the first key may be further encrypted by using a second encryption method using a receiver public key of the receiver of the target content to obtain a second key.
In an embodiment shown, the second encryption method may specifically be a symmetric encryption method that uses a symmetric exchange key obtained by multiplying a sender private key and a receiver public key to perform encryption; for example, in one implementation, the second encryption method may specifically be a symmetric key agreement method based on the ECDH algorithm.
The ECDH algorithm is an algorithm for key negotiation used in combination of an ECC algorithm and a DH (Diffie-Hellman) key exchange algorithm. Through the ECDH algorithm, two key exchange parties can negotiate a symmetric key without sharing any secret.
The key negotiation process of the ECDH algorithm comprises the following processes:
the two sides of the key exchange are assumed to be an A user and a B user, and the A user and the B user both have some sharing curve parameters; such as an elliptic curve E, an order N, and a base point G.
The user A can generate a random number a as a private key based on an ECC algorithm, and the random number a is multiplied by a point G to obtain a public key A (a G) of the user A;
the user B can generate a random number B as a private key based on an ECC algorithm, and the random number B is multiplied by the point G to obtain a public key B (B) G of the user B;
the user A can transmit the public key A to the user B; the B user may pass the public key B to the a user.
After receiving the public key B of the user B, the user a may multiply the public key B with its own private key a to obtain a symmetric public key Q ═ B × a;
after receiving the public key a of the user a, the user B may multiply the public key a with its own private key B to obtain a symmetric public key Q' ═ a × B;
based on the commutative and associative laws, Q ═ B ═ a ═ B ═ G ═ a ═ B ═ Q', so that user a and user B can negotiate an identical symmetric key Q by passing public keys generated based on the ECC algorithm between each other.
In this application, if the decentralized system supports the ECC family algorithm, the sender of the target content may construct a completely symmetric ECDH exchange key by multiplying the sender private key and the receiver public key to encrypt the first key. At this time, the ECDH exchange key is an encryption key for encrypting the first key. After receiving the encrypted target content and the second key, the receiver multiplies the public key of the sender by the own private key to obtain the ECDH exchange key for decrypting the second key.
In this case, after the sender encrypts the target content using the first key by the first encryption method, the sender may calculate the ECDH exchange key by multiplying a random private key generated by an ECC algorithm by a public key generated by the receiver of the target content based on the same algorithm, and encrypt the first key as an encryption key to obtain the second key.
In this scheme, the sender may randomly generate different private keys according to specific security requirements, such as different receivers or different sending time periods, so as to generate different ECDH exchange keys for encrypting the first key, and therefore, when the sender issues content to the blockchain, in addition to the encrypted target content and the second key, the sender may also issue a public key corresponding to the random private key and related to the ECDH exchange key of the encrypted first key to the blockchain, so that the receiver may multiply the public key corresponding to the random private key by using its own private key to obtain the same ECDH exchange key to decrypt the second key, thereby obtaining the first key.
Of course, as well known to those skilled in the art, the sender may also directly use the private key associated with its own identity on the blockchain to generate the ECDH exchange key, and since the public key associated with its identity on the blockchain is usually searchable, the public key associated with its identity may no longer be sent in the release content of the sender, so as to save space of the blockchain.
In another embodiment shown, the second encryption method may be a symmetric encryption method that uses a public key of a receiver of the receiving party to perform encryption. At this time, the receiver public key held by the receiver is the encryption key for encrypting the first key.
In this case, after the sender uses the first key to encrypt the target content by the first encryption method, the sender may query the public key of the receiver that is disclosed by the receiver, and then encrypt the first key to obtain the second key by using the public key of the receiver as the encryption key.
In this example, after the sender encrypts the first key, the second key obtained by encrypting the first key and the target content encrypted based on the first key may be distributed to the decentralized system, so that the decentralized system may include the encrypted target content and the second key in the distributed database of the blockchain. In addition, in practical applications, after the sender issues the encrypted target content and the second key to the blockchain, if the public key of the receiver is updated (for example, the receiver changes the authorized identity), the sender may use the updated public key of the receiver according to the above-described encryption method, perform encryption calculation on the first key again by using the updated public key of the receiver according to the second encryption method to obtain the updated second key, and then reissue the updated second key to the decentralized system based on the blockchain to update the original second key included in the blockchain.
Correspondingly, if a receiver is newly added to the target content in the blockchain, at this time, the sender may still use the public key of the receiver newly added according to the encryption manner described above, perform encryption calculation on the first key again by using the second encryption method to obtain the updated second key, and then reissue the updated second key to the decentralized system based on the blockchain to perform recording and broadcasting in the blockchain.
In general, the encrypted target content and the second key may be distributed in a content record (i.e., Transaction or Transaction) in the same blockchain for the purpose of easy acquisition and review by the receiving party. If there are more receivers facing the same target content, the data volume required for distribution exceeds the upper limit of the volume of one content record, or the receivers increase or change in the later period, the encrypted target content and the second key can be distributed in different content records (i.e. transactions or transactions).
In one embodiment shown, since the corresponding recipients may change for the targeted content; for example, a new recipient may be added; therefore, when the receiver of the target content changes, the sender is generally required to be able to timely distribute the second key and the target content corresponding to the receiver to the blockchain.
In this case, in order to flexibly distribute the second key corresponding to the receiver of the target content to the blockchain, the sender may adopt a separate distribution method when distributing the encrypted target content and the second key to the blockchain; that is, the sender can distribute the encrypted target content and the second key in the block chain through different content records;
for example, in implementation, the sender may first distribute the encrypted target content as a content record to the decentralized system based on the blockchain, and after the target content is successfully recorded into the blockchain, the sender may generate the second key for each receiver based on the actual situation of the receiver of the target content, and then distribute the generated second key to the blockchain.
In this way, the second keys corresponding to the receivers are independently issued without being issued with the encrypted target content, so that the second keys corresponding to the receivers can be flexibly updated, and when the receivers of the target content change, the second keys corresponding to the receivers can be only reissued to the blockchain.
In this example, after the sender distributes the encrypted target content and the second key to the blockchain, the encrypted target content and the second key may be recorded in a newly generated "bookkeeper" of the new block, and each node accessing the blockchain may synchronize all the content in the block to its local place.
In an embodiment, the encrypted target content and the second key may be included in different content records in a block;
for example, in one implementation, the sender may first distribute the encrypted target content to a decentralized system based on a block chain, and an "bookkeeper" of a newly generated new block records the encrypted content in a first content record in the block, and returns identification information of the block or identification information of the first content record to the sender; for example, the identification information of the tile may specifically be a tile height, an address hash value, a tile hash value, or an ipv4 address; in the transaction system built based on the block chain, the identification information of the first content record may be a transaction hash TXID.
After the encrypted target content is successfully recorded in the first content record, the sender may further issue the generated second key and the identification information of the first content record returned by the blockchain system to the decentralized system based on the blockchain, and an "bookkeeper" of a newly generated new block may record the second key and the identification information of the first content record in the second content record in the block.
After receiving the second content record in the blockchain, the receiving side may query the blockchain for the encrypted target content according to the identification information (e.g., TXID) of the first content record described in the second content record, thereby further completing decryption of the target content.
Therefore, the encrypted target content and the second secret key are issued on the block chain by using the technical scheme, the target content can be issued only once, and the second secret key is linked with the target content only by adopting a method for recording the identification information in the subsequent authorization of the receiver (the second secret key is issued to be regarded as the authorization of the receiver), so that the encrypted target content is prevented from being repeatedly issued on the block chain, the space of the block chain is greatly saved, and the technical effects of 'one-time encryption, multiple-time authorization, one-way communication, safety and convenience' are achieved.
In one embodiment shown, the recipient of the targeted content may hold multiple sets of public keys; for example, for the same user, there may be multiple authorization identities on the blockchain, where each authorization identity is independent of an independent public key and private key; therefore, when the sender encrypts the first key based on the second encryption method, the receiver public key used may be only one of the public keys held by the receiver.
In this case, when the sender distributes the encrypted target content and the second key to the blockchain, the sender may also distribute a generation algorithm ID (i.e., an algorithm ID of a generation public key) corresponding to the receiver public key used when the sender encrypts the first key based on the second encryption method to the blockchain, so that the receiver can determine the receiver public key used when the sender encrypts the first key based on the second encryption method based on the generation algorithm ID.
Specifically, when the encrypted target content and the second key are issued to the blockchain, the generation algorithm ID may be carried in the encrypted target content or in the second key; for example, the encrypted internal standard content and the second key may be field-expanded, and the generation algorithm ID may be filled in the encrypted target content or the second key as one field. Of course, in implementation, the generation algorithm ID may be carried in the encrypted target content and the second key at the same time.
In another embodiment, when the sender distributes the encrypted target content and the second key to the blockchain, the sender may distribute the second encryption method ID to the blockchain in addition to the generation algorithm ID corresponding to the public key of the receiver used when the sender encrypts the first key based on the second encryption method, so that the receiver can determine the second decryption method corresponding to the second encryption method based on the second encryption method ID and decrypt the second key.
The second encryption method ID may specifically be a specific algorithm ID; for example, when the second encryption method is a symmetric key agreement method based on the ECDH algorithm, the second encryption method ID may specifically be an algorithm ID of the ECDH algorithm; alternatively, in practical applications, the second encryption method ID may be another type of unique identifier that is established by both the sender and the receiver and that can uniquely identify the second encryption method, and is not particularly limited in this application.
In the technical solution for issuing encrypted target content to a blockchain according to the present application, since a sender and a receiver do not interact any content in advance (identity information of the receiver is completely hidden), the sender sends the encrypted target content in a unidirectional manner and authorizes the receiver in a broadcast manner on the blockchain, any node on the blockchain can receive any message issued by the sender, and in order to enable the receiver to determine that the encrypted target content is indeed information that the sender authorizes the receiver, in practical applications, when the sender issues the target content to the blockchain, the sender may also issue corresponding verification information calculated based on original content of the target content; for example, the check information may specifically be a discrete value obtained by the sender performing hash calculation on the original content based on a hash algorithm; after the sender encrypts the target content, the sender may carry the verification information in the encrypted target content.
In this way, after any receiver completes decryption of the original target content, information verification can be performed by using the decrypted target content, for example, hash calculation is performed on the decrypted target content, and if the verification result is the same as the verification information carried in the original encrypted target content, it indicates that the receiver succeeds in decryption of the encrypted target content.
The verification information may be specifically issued in a plaintext form, or may be issued by a sender in an encrypted manner, which is not particularly limited in this application.
In another embodiment shown, when the sender publishes the target content to the blockchain, in addition to the original content of the target content, in practical application, the sender may publish only the access address of the target content to the blockchain; such as URL links to the original target content, etc. In this case, when the recipient decrypts the distributed target content in the manner described above, the access address of the original content of the target content can be obtained, and the original content of the target content can be obtained by accessing the access address.
In this example, when the sender successfully distributes the encrypted target content and the second key to the blockchain and successfully records the encrypted target content and the second key in the distributed database of the blockchain, the receiver of the target content may obtain the encrypted target content and the second key that are already recorded in the blockchain and attempt to decrypt the second key based on the held public key of the receiver.
In one embodiment, it is assumed that the encrypted target content and the second key are recorded in different content records in the same block;
for example, the encrypted target content may be included in a first content record in the block, and the second key and the identification information of the first content record may be included in a second content record in the block.
In this case, after receiving the second content record, the receiving side may read the identification information (such as TXID) of the first content record described in the second content record and the second key, and query the blockchain for the first content record based on the identification information of the first content record.
When the first content record is queried, the encrypted target content may be read from the first content record and included therein, and then the decryption of the encrypted target content may be completed based on the second key read from the second content record.
In another embodiment shown, after the receiving side reads the encrypted target content and the second key from the blockchain, the receiving side may read a generation algorithm ID corresponding to a public key of the receiving side used by the transmitting side to encrypt the first key based on the second encryption method and the second encryption method ID from the encrypted target content and/or the second key, respectively;
on one hand, the receiver can determine a receiver public key used when the second key is obtained through encryption calculation based on the read generation algorithm ID; for example, the receiving party may hold a plurality of receiving party public keys, and may determine, based on the generated algorithm ID, a receiving party public key for decrypting the second key;
on the other hand, the receiving party may determine a second decryption method corresponding to the encryption method based on the read second encryption method ID; for example, when the second encryption method is a symmetric key agreement method based on the ECDH algorithm, the second encryption method ID may specifically be an algorithm ID of the ECDH algorithm; the receiver may determine, based on the algorithm ID, that the ECDH algorithm is to be used to decrypt the second key.
Further, after the receiving party determines the receiving party public key and the second decryption method for decrypting the second key, the receiving party public key and the second decryption method may be used to decrypt the second key to obtain the first key;
on one hand, if the second encryption method is a symmetric key agreement method based on the ECDH algorithm, the receiver may multiply the random private key generated based on the ECC algorithm by the public key calculated based on the ECC algorithm and issued by the sender to calculate the ECDH exchange key, and then may decrypt the second key by using the ECDH exchange key generated by calculation as a decryption key by using a symmetric decryption method of the ECDH algorithm to obtain the first key.
On the other hand, if the second encryption method is a symmetric encryption method that uses the receiver public key of the receiver to perform encryption, the receiver may use the receiver private key corresponding to the determined receiver public key as a decryption key, and decrypt the second key by using an asymmetric decryption method that performs decryption based on the receiver private key corresponding to the receiver public key, to obtain the first key.
In this example, if the second key is successfully decrypted to obtain the first key, the receiving party may further decrypt the encrypted target content based on the first key and a first decryption method corresponding to the first encryption method to obtain an original content of the target content; the specific decryption process corresponds to the encryption process, and is not described in detail in this application.
In another embodiment shown, after the receiving party successfully obtains the encrypted content of the target content, the receiving party may calculate the original content to obtain the check information, and then confirm whether the check information is consistent with the check information carried in the encrypted target content, so as to perform integrity check on the original content of the target content; if the two are consistent, the target content is the information authorized by the sender to the receiver and is legal target content; otherwise, it indicates that the target content may have been tampered by an illegal user and is not a legal target content, in which case, the receiver may directly discard the decrypted target content.
As can be seen from the foregoing embodiments, on one hand, since the first key used for encrypting the target content is secondarily encrypted based on the receiver public key of the receiver, and after the issuer of the target content publishes the encrypted target content in the blockchain, only the receiver having the receiver private key corresponding to the receiver public key used for encrypting the first key has the right to decrypt the encrypted first key, it can be ensured that the encrypted content can be successfully decrypted only by the correct receiver, and the data security when the encrypted content is publicly distributed in the blockchain can be significantly improved;
for example, although an illegal user on another node device in the blockchain accesses the distributed database of the blockchain, the encrypted target content can be obtained, and the decryption can be attempted based on a private key corresponding to a public key held by the illegal user; however, in the decentralized system built based on the blockchain, the private key has uniqueness, and even if an illegal user can obtain confidential target content, the illegal user cannot normally decrypt the encrypted target content, so that in this way, the security level of the encrypted target content which is already recorded in the distributed database can be improved in a network environment where the blockchain is public and transparent.
On the other hand, only the receiver holding the receiver private key corresponding to the receiver public key used for encrypting the first key has the right to decrypt the first key, so that when the encrypted content is released in the blockchain, the encrypted content only needs to be disclosed to the blockchain in a broadcast mode, and the receiver does not need to be actively notified; moreover, the encrypted content published in the blockchain can not carry the identity information of the receiver any more, so that the problem of identity information leakage of the receiver caused by publishing the encrypted content to the blockchain in a public manner can be avoided.
For example, when the sender transmits the encrypted target content to the receiver through the blockchain, since only the correct private key held by the receiver can successfully decrypt the encrypted target content, it is not necessary for the sender to actively notify the receiver, and it is not necessary for the encrypted target content to carry address information of the receiver. After the encrypted target content is recorded into the distributed database of the blockchain, for a potential receiver (covering all users in the blockchain) of the encrypted target content, an attempt to decrypt the encrypted target content may be made based on the held private key; if the decryption is successful, it may be determined to be a legitimate recipient of the encrypted target content itself. Therefore, by the method, when the receiver releases the encrypted target content to the blockchain, the encrypted target content only needs to be disclosed to the blockchain in a broadcasting mode, and the address of the receiver can not be appointed in the encrypted target content any more, so that the problem of identity information leakage of the receiver can be avoided.
Corresponding to the method embodiment, the application also provides an embodiment of the device.
Referring to fig. 2, the present application provides an apparatus 20 for distributing encrypted content, which is applied in a block chain based decentralized system;
referring to fig. 3, the hardware architecture of the electronic device as the distribution apparatus 20 carrying the encrypted content generally includes a processor, a memory, a non-volatile memory, a network interface, an internal bus, and the like; taking a software implementation as an example, the distribution device 20 of the encrypted content may be generally understood as a computer program loaded in a memory, and a logic device formed by combining software and hardware after being executed by a processor, where the distribution device 20 of the encrypted content includes:
a first encryption module 201, configured to encrypt target content by using a first encryption method using a first key;
a second encryption module 202, configured to perform encryption calculation on the first key by using a public key of a receiver of the target content using a second encryption method to obtain a second key;
the publishing module 203 is configured to publish the encrypted target content and the second key to the block chain based decentralized system, so that the decentralized system records the encrypted target content and the second key to the block chain.
In this embodiment, the issuing module 203 further:
and respectively issuing the encrypted target content and the second key to the block chain-based decentralized system.
In this embodiment, the second encryption module 202 further:
if the receiver public key of the receiver of the target content is updated, the updated receiver public key is used for carrying out encryption calculation on the first secret key again by adopting a second encryption method to obtain an updated second secret key, and the updated second secret key is issued to the block chain-based decentralized system so as to update the original second secret key included in the block chain;
and when a receiver is newly added to the target content, carrying out encryption calculation on the first key by using a receiver public key of the newly added receiver by adopting a second encryption method to obtain a newly added second key, and issuing the newly added second key to the block chain-based decentralized system.
In this embodiment, the issuing module 203 further:
the encrypted target content is firstly issued to the block chain-based decentralized system so as to record the encrypted content into a first content record in a block of the block chain;
and issuing the identification information of the first content record and the second key to the decentralized system based on the block chain, so as to record the identification information of the first content record and the second key into the second content record of the block chain.
In this embodiment, the encrypted target content and/or the second key, which are issued to the block chain-based decentralized system, carry a generation algorithm ID corresponding to the recipient public key of the recipient.
In this embodiment, the encrypted target content and/or the second key issued to the block chain-based decentralized system carry the second encryption method ID.
In this embodiment, the first encryption method is a symmetric encryption method; the second encryption method is a symmetric encryption method for encrypting by using a symmetric exchange key obtained by multiplying a sender private key and a receiver public key; or, the second encryption method is an asymmetric encryption method that uses a public key of a receiver to perform encryption.
In this embodiment, the second encryption method is a symmetric key agreement method based on the ECDH algorithm.
In this embodiment, the encrypted target content further includes verification information calculated based on the original content of the target content.
Referring to fig. 4, the present application provides an apparatus 40 for obtaining encrypted content, which is applied in a block chain based decentralized system;
referring to fig. 5, a hardware architecture of an electronic device serving as the obtaining apparatus 40 for carrying the encrypted content generally includes a processor, a memory, a non-volatile memory, a network interface, an internal bus, and the like; taking a software implementation as an example, the encrypted content obtaining apparatus 40 may be generally understood as a computer program loaded in a memory, and a logic apparatus formed by a combination of software and hardware after being executed by a processor, where the encrypted content obtaining apparatus 40 includes:
an obtaining module 401, configured to obtain target content included in the block chain, where the target content is encrypted by using a first key and using a first encryption method; and a second key obtained by encrypting and calculating the first key by using a receiver public key of the receiver of the target content by adopting a second encryption method;
the first decryption module 402, where the receiving party decrypts the second key by using a second decryption method based on a receiving party private key corresponding to the held receiving party public key to obtain the first key;
the second decryption module 403, when the decryption succeeds, decrypts the target content by using the first key and using the first decryption method, and obtains the original content of the target content.
In this embodiment, the encrypted target content is included in a first content record in a block; the identification information of the first content record and the second key are recorded in a second content record in the block;
the obtaining module 401:
reading the second key from the second content record when the receiver hears the second content record in the blockchain; and the number of the first and second groups,
reading identification information of the first content record from the second content record;
and further searching the first content record in a block chain based on the identification information of the first content record, and reading the encrypted target content included in the first content record.
In this embodiment, the encrypted target content and/or the second key carries a generation algorithm ID corresponding to the public key of the receiving party used for obtaining the second key through encryption calculation;
the second decryption module 403 further:
reading the generation algorithm ID from the encrypted target content and/or the second key before decrypting the second key by adopting a second decryption method based on a receiver private key corresponding to the receiver public key; and determining the public key of the receiver used when the second secret key is obtained through encryption calculation based on the read generation algorithm ID.
In this embodiment, the encrypted target content and/or the second key carries the second encryption method ID.
The second decryption module 403 further:
reading the second encryption method ID from the encrypted target content and/or the second key before decrypting the second key by adopting a second decryption method based on a receiver private key corresponding to the receiver public key; and determining a second decryption method corresponding to the second encryption method based on the read second encryption method ID.
In this embodiment, the first encryption method is a symmetric encryption method, and the first decryption method is a symmetric decryption method.
In this embodiment, the second encryption method is a symmetric encryption method that uses a symmetric exchange key obtained by multiplying a sender private key and a receiver public key to perform encryption; the second decryption method is a symmetric decryption method for decrypting by using a symmetric exchange key obtained by multiplying a receiving party private key and a sending party public key.
In this embodiment, the second encryption method and the second decryption method are symmetric key agreement methods based on the ECDH algorithm.
In this embodiment, the second encryption method is an asymmetric encryption method that uses a public key of a receiver to perform encryption; the second decryption method is an asymmetric decryption method that uses a recipient private key for decryption.
In this embodiment, the encrypted target content further includes check information calculated based on an original content of the target content;
the second decryption module 403 further:
calculating verification information based on the acquired original content of the target content;
determining whether the calculated check information is consistent with the check information carried in the encrypted target content; if the target content is consistent with the legal target content, determining that the target content is legal target content; otherwise, the target content is discarded.
The systems and modules illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer or server. The specific form of computer may be a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices. From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described apparatus embodiments are merely illustrative, and the modules described as separate components may or may not be physically separate, and the functions of the modules may be implemented in one or more software and/or hardware when implementing the solution of the present application. And part or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is directed to embodiments of the present application and it is noted that numerous modifications and adaptations may be made by those skilled in the art without departing from the principles of the present application and are intended to be within the scope of the present application.
Claims (12)
1. A distribution method of encrypted content, applied to a block chain-based decentralized system, the method comprising:
encrypting the target content by using a first encryption method by using a first key;
publishing the encrypted target content to the block chain based decentralized system to include the encrypted content into a first content record within a block of the block chain; the first content record also comprises verification information calculated based on the original content of the target content, and the first content record does not specify the identity information of a target receiver receiving the target content;
respectively using public keys of any receiver held by each target receiver of the target content to perform encryption calculation on the first secret key by adopting a second encryption method to obtain a second secret key, wherein the second secret key carries a second encryption method ID; the encrypted target content and/or the second key carry a generation algorithm ID corresponding to a receiver public key of the receiver;
and issuing the identification information of the first content record and the second key to the blockchain-based decentralized system to include the identification information of the first content record and the second key in a second content record of the blockchain.
2. The method of claim 1, further comprising:
when the receiver public key of the receiver of the target content is updated, carrying out encryption calculation on the first secret key again by using the updated receiver public key by adopting a second encryption method to obtain an updated second secret key, and issuing the updated second secret key to the block chain-based decentralized system so as to update the original second secret key included in the block chain;
and when a receiver is newly added to the target content, carrying out encryption calculation on the first secret key by using a receiver public key of the newly added receiver by adopting a second encryption method to obtain a newly added second secret key, and issuing the newly added second secret key to the block chain-based decentralized system.
3. The method of claim 1, wherein the first encryption method is a symmetric encryption method.
4. The method according to claim 1, wherein the second encryption method is a symmetric encryption method that uses a symmetric exchange key obtained by multiplying a sender private key and a receiver public key for encryption; or, the second encryption method is an asymmetric encryption method that uses a public key of a receiver to perform encryption.
5. The method according to claim 4, wherein the second encryption method is a symmetric key agreement method based on the ECDH algorithm.
6. The method for acquiring the encrypted content is applied to a decentralized system based on a block chain, and the encrypted target content is recorded in a first content record in a block; the identification information of the first content record and any receiver public key held by each target receiver using the target content respectively adopt a second encryption method to encrypt and calculate the first key to obtain a second key, and the second key is recorded in a second content record in the block; the first content record also comprises verification information calculated based on the original content of the target content, and the first content record does not specify the identity information of a target receiver for receiving the target content; the encrypted target content and/or the second key carry a generation algorithm ID corresponding to the public key of the receiver used when the second key is obtained through encryption calculation;
the method comprises the following steps:
reading the second key from the second content record when the receiver hears the second content record in the blockchain; reading the second encryption method ID from the second key; determining a second decryption method corresponding to the second encryption method based on the read second encryption method ID; and the number of the first and second groups,
reading identification information of the first content record from the second content record;
based on the identification information of the first content record, further searching the first content record in a block chain, and reading the encrypted target content included in the first content record;
reading the generation algorithm ID from the encrypted target content and/or the second key;
determining the public key of the receiver used when the second secret key is obtained through encryption calculation based on the read generation algorithm ID;
the receiver decrypts the second key by adopting a second decryption method based on a receiver private key corresponding to the receiver public key, so as to obtain the first key;
when the decryption is successful, the target content is decrypted by using the first key and adopting a first decryption method, and the original content of the target content is obtained;
calculating verification information based on the acquired original content of the target content;
determining whether the calculated check information is consistent with the check information carried in the encrypted target content; if the target content is consistent with the target content, determining that the target content is legal target content, and the target receiver comprises the receiver; otherwise, the target content is discarded.
7. The method of claim 6, wherein the first encryption method is a symmetric encryption method and the first decryption method is a symmetric decryption method.
8. The method according to claim 6, wherein the second encryption method is a symmetric encryption method that uses a symmetric exchange key obtained by multiplying a sender private key and a receiver public key to perform encryption; the second decryption method is a symmetric decryption method for decrypting by using a symmetric exchange key obtained by multiplying a receiving party private key and a sending party public key.
9. The method according to claim 8, wherein the second encryption method and the second decryption method are symmetric key agreement methods based on ECDH algorithm.
10. The method of claim 6, wherein the second encryption method is an asymmetric encryption method that uses a public key of a receiver for encryption; the second decryption method is an asymmetric decryption method that uses a recipient private key for decryption.
11. An apparatus for distributing encrypted content, applied to a block chain based decentralized system, the apparatus comprising:
the first encryption module is used for encrypting the target content by using a first key and adopting a first encryption method;
the publishing module is used for publishing the encrypted target content to the block chain-based decentralized system so as to include the encrypted content into a first content record in a block of the block chain; the first content record also comprises verification information calculated based on the original content of the target content, and the first content record does not specify the identity information of a target receiver receiving the target content;
a second encryption module, configured to perform encryption calculation on the first key by using a second encryption method using a public key of any one receiver held by each target receiver of the target content, respectively, to obtain a second key, where the second key carries the second encryption method ID; the encrypted target content and/or the second key carry a generation algorithm ID corresponding to a receiver public key of the receiver;
a publishing module, configured to publish the identification information of the first content record and the second key to the block chain-based decentralized system, so as to include the identification information of the first content record and the second key in a second content record of the block chain.
12. An encrypted content acquisition device is applied to a block chain-based decentralized system, and encrypted target content is recorded in a first content record in a block; the identification information of the first content record and any receiver public key held by each target receiver using the target content respectively adopt a second encryption method to encrypt and calculate the first key to obtain a second key, and the second key is recorded in a second content record in the block; the first content record also comprises verification information calculated based on the original content of the target content, and the first content record does not specify the identity information of a target receiver for receiving the target content; the encrypted target content and/or the second key carry a generation algorithm ID corresponding to the public key of the receiver used when the second key is obtained through encryption calculation;
the device comprises:
an obtaining module, configured to read the second key from the second content record when the receiving side hears the second content record in the block chain; reading the second encryption method ID from the second key; determining a second decryption method corresponding to the second encryption method based on the read second encryption method ID; and reading the identification information of the first content record from the second content record; based on the identification information of the first content record, further searching the first content record in a block chain, and reading the encrypted target content included in the first content record; reading the generation algorithm ID from the encrypted target content and/or the second key; determining the public key of the receiver used when the second secret key is obtained through encryption calculation based on the read generation algorithm ID;
the first decryption module is used for decrypting the second key by the receiving party by adopting a second decryption method based on a receiving party private key corresponding to the held receiving party public key so as to obtain the first key;
the second decryption module is used for decrypting the target content by using the first key and adopting a first decryption method when the decryption is successful, and acquiring the original content of the target content;
the second decryption module further:
calculating verification information based on the acquired original content of the target content; determining whether the calculated check information is consistent with the check information carried in the encrypted target content; if the target content is consistent with the target content, determining that the target content is legal target content and the target receiver comprises the receiver; otherwise, the target content is discarded.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711025270.8A CN109729041B (en) | 2017-10-27 | 2017-10-27 | Method and device for issuing and acquiring encrypted content |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711025270.8A CN109729041B (en) | 2017-10-27 | 2017-10-27 | Method and device for issuing and acquiring encrypted content |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109729041A CN109729041A (en) | 2019-05-07 |
CN109729041B true CN109729041B (en) | 2022-03-18 |
Family
ID=66292032
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711025270.8A Expired - Fee Related CN109729041B (en) | 2017-10-27 | 2017-10-27 | Method and device for issuing and acquiring encrypted content |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109729041B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109544129B (en) | 2018-10-26 | 2021-04-27 | 创新先进技术有限公司 | Block chain transaction method and device and electronic equipment |
CN110290113B (en) * | 2019-06-03 | 2023-09-01 | 深圳巴克云网络科技有限公司 | PoW algorithm-based device identification construction method and device and computer-readable storage medium |
CN110380863B (en) * | 2019-07-02 | 2022-12-02 | 银清科技有限公司 | Cross-border payment message notification processing method and device based on block chain architecture |
CN110708291B (en) * | 2019-09-10 | 2022-09-02 | 平安普惠企业管理有限公司 | Data authorization access method, device, medium and electronic equipment in distributed network |
CN110826082A (en) * | 2019-09-29 | 2020-02-21 | 核芯互联科技(青岛)有限公司 | Privacy protection method and device for block chain |
CN111355645A (en) * | 2020-03-06 | 2020-06-30 | 海信(广东)空调有限公司 | Household appliance, cloud server and corresponding data transmission method thereof |
CN111506661B (en) * | 2020-04-22 | 2021-09-28 | 腾讯科技(深圳)有限公司 | Content access management method, device and storage medium |
CN111740827B (en) * | 2020-07-28 | 2022-10-28 | 北京金山云网络技术有限公司 | Data transmission method and device, computer equipment and storage medium |
CN112235261B (en) * | 2020-09-26 | 2023-04-07 | 建信金融科技有限责任公司 | Message encryption and decryption method and device, electronic equipment and readable storage medium |
WO2022193068A1 (en) * | 2021-03-15 | 2022-09-22 | 深圳市艾比森光电股份有限公司 | Content publishing method and led display screen |
CN116301961A (en) * | 2023-01-05 | 2023-06-23 | 台达电子企业管理(上海)有限公司 | Online updating method and device of network power supply program and network power supply |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1832398A (en) * | 2006-04-14 | 2006-09-13 | 中国软件与技术服务股份有限公司 | Method and system of file encipher share |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107220820A (en) * | 2017-05-16 | 2017-09-29 | 腾讯科技(深圳)有限公司 | Resource transfers method, device and storage medium |
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6249866B1 (en) * | 1997-09-16 | 2001-06-19 | Microsoft Corporation | Encrypting file system and method |
US9858569B2 (en) * | 2014-03-21 | 2018-01-02 | Ramanan Navaratnam | Systems and methods in support of authentication of an item |
CN111585749B (en) * | 2016-10-26 | 2023-04-07 | 创新先进技术有限公司 | Data transmission method, device, system and equipment |
-
2017
- 2017-10-27 CN CN201711025270.8A patent/CN109729041B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1832398A (en) * | 2006-04-14 | 2006-09-13 | 中国软件与技术服务股份有限公司 | Method and system of file encipher share |
CN107220820A (en) * | 2017-05-16 | 2017-09-29 | 腾讯科技(深圳)有限公司 | Resource transfers method, device and storage medium |
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
Also Published As
Publication number | Publication date |
---|---|
CN109729041A (en) | 2019-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109729041B (en) | Method and device for issuing and acquiring encrypted content | |
CN110033258B (en) | Service data encryption method and device based on block chain | |
US20240185191A1 (en) | Web3 Decentralized Blockchain Based NFT Framework... Applications | |
CN113095749B (en) | Logistics information transmission method, system and device based on blockchain | |
Rezaeighaleh et al. | New secure approach to backup cryptocurrency wallets | |
US11880831B2 (en) | Encryption system, encryption key wallet and method | |
US9485096B2 (en) | Encryption / decryption of data with non-persistent, non-shared passkey | |
Gao et al. | BSSPD: A Blockchain‐Based Security Sharing Scheme for Personal Data with Fine‐Grained Access Control | |
CN103918219B (en) | Method and device for electronic content distribution based on secret sharing | |
JP6882705B2 (en) | Key exchange system and key exchange method | |
WO2021174927A1 (en) | Blockchain-based identity verification method and apparatus, device, and storage medium | |
US20210035090A1 (en) | System and method for secure data delivery | |
CN110599342B (en) | Block chain-based identity information authorization method and device | |
EP3455763B1 (en) | Digital rights management for anonymous digital content sharing | |
CN108155987A (en) | Group message sending method, method of reseptance and its system and communicating terminal | |
CN112507296B (en) | User login verification method and system based on blockchain | |
US20220286291A1 (en) | Secure environment for cryptographic key generation | |
CN113225302A (en) | Data sharing system and method based on proxy re-encryption | |
CN112418850A (en) | A transaction method, device and electronic device based on blockchain | |
CN110716724B (en) | Method and device for realizing privacy block chain based on FPGA | |
KR20200020559A (en) | The Method to prove an Existence utilizing Hybrid bloc-chain | |
Sans et al. | A decentralized mnemonic backup system for non-custodial cryptocurrency wallets | |
US12170720B2 (en) | Location-key encryption system | |
Van Oorschot | Public key cryptography’s impact on society: how Diffie and Hellman changed the world | |
CN115361147A (en) | Device registration method and device, computer device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20220318 |
|
CF01 | Termination of patent right due to non-payment of annual fee |