CN111898926B - Food safety assessment method and device - Google Patents
Food safety assessment method and device Download PDFInfo
- Publication number
- CN111898926B CN111898926B CN202010810552.4A CN202010810552A CN111898926B CN 111898926 B CN111898926 B CN 111898926B CN 202010810552 A CN202010810552 A CN 202010810552A CN 111898926 B CN111898926 B CN 111898926B
- Authority
- CN
- China
- Prior art keywords
- assessment
- service data
- node
- supervision
- function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Game Theory and Decision Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a food safety assessment method and a device, which relate to the technical field of safety supervision and comprise the following steps of: determining a service data abstract based on the original service data, and uplink the service data abstract and receiving an uplink certificate; receiving an assessment evaluation function and a certification key sent by a supervision node, calculating an assessment evaluation result according to the original service data and the assessment evaluation function, and generating zero knowledge certification information based on the certification key; the uplink certificate, the assessment result and the zero knowledge proof information are sent to the supervision node, so that the supervision node verifies the validity of the assessment result according to the uplink certificate and the zero knowledge proof information, and under the condition that a downstream ring node enterprise is not required to report original service data, the supervision department can obtain the assessment result and verify the credibility of the assessment result, the worry of the enterprise is solved, the data accuracy is improved, and further the supervision is convenient to strengthen.
Description
Technical Field
The invention relates to the technical field of safety supervision, in particular to a food safety assessment method and device.
Background
In the food industry, the safety assessment and evaluation of enterprises in the upstream and downstream links of food are mainly based on the business data actively reported by the participating enterprises. However, enterprises can have worry of exposing core confidential information, so that reporting will is not strong, and even the problems of missing report and conceal data for coping by the enterprises occur, so that the supervision effect of the food industry is not in place.
Disclosure of Invention
The invention aims to provide a food safety assessment method and device, which enable a supervision department to obtain an assessment result and verify the credibility of the assessment result under the condition that a downstream ring enterprise is not required to report original business data, solve the worry of the enterprise, improve the data accuracy and further facilitate the reinforcement supervision.
In a first aspect, an embodiment of the present invention provides a food security assessment method, applied to an enterprise node to be assessed, including:
Determining a service data abstract based on original service data, and uplink the service data abstract and receiving an uplink certificate;
Receiving an assessment evaluation function and a certification key sent by a supervision node, calculating an assessment evaluation result according to the original service data and the assessment evaluation function, and generating zero knowledge certification information based on the certification key;
And sending the uplink certificate, the assessment result and the zero knowledge proof information to the supervision node so that the supervision node verifies the validity of the assessment result according to the uplink certificate and the zero knowledge proof information.
With reference to the first aspect, an embodiment of the present invention provides a first possible implementation manner of the first aspect, where the steps of determining a service data digest based on original service data, and uplink the service data digest, and receiving an uplink credential include:
acquiring original service data and storing the original service data;
performing abstract calculation on the original business data to generate a business data abstract, and submitting the business data abstract to a link;
After the block chain system is successfully uplink, a returned uplink certificate is received and used for inquiring the uplink certificate of the business data abstract, wherein the uplink certificate comprises a block number and a transaction merck tree path.
With reference to the first aspect, an embodiment of the present invention provides a second possible implementation manner of the first aspect, where the steps of receiving an assessment function and a certification key sent by a supervisory node, calculating an assessment result according to the original service data and the assessment function, and generating zero knowledge proof information based on the certification key include:
receiving an assessment function and a certification key sent by a supervision node;
Inputting the original service data, the service data abstract and the proving key into the assessment function, and verifying the matching of the original service data and the service data abstract to obtain an assessment result and zero knowledge proving information.
With reference to the first aspect, an embodiment of the present invention provides a third possible implementation manner of the first aspect, where the step of sending the uplink credential, the assessment result and the zero-knowledge proof information to the supervisory node, so that the supervisory node verifies validity of the assessment result according to the uplink credential and the zero-knowledge proof information includes:
And sending the uplink certificate, the assessment result and the zero knowledge proof information to the supervision node so that the supervision node obtains the service data abstract according to the uplink certificate, and inputting the service data abstract, the zero knowledge proof information and a verification key corresponding to the proof key into a verification function to verify the validity of the assessment result.
With reference to the first aspect, an embodiment of the present invention provides a fourth possible implementation manner of the first aspect, wherein the service data digest includes a one-way hash function.
With reference to the first aspect, an embodiment of the present invention provides a fifth possible implementation manner of the first aspect, where the assessment function is a general assessment function defined by the supervision node.
With reference to the first aspect, an embodiment of the present invention provides a sixth possible implementation manner of the first aspect, where the assessment function is a specific assessment function defined by the supervision node for the enterprise node to be examined.
With reference to the first aspect, an embodiment of the present invention provides a seventh possible implementation manner of the first aspect, wherein the attestation key and the verification key are generated by the policing node during preprocessing based on the generic checking function.
With reference to the first aspect, an embodiment of the present invention provides an eighth possible implementation manner of the first aspect, wherein the attestation key and the verification key are generated by the policing node during preprocessing based on the specific checking function.
In a second aspect, an embodiment of the present invention further provides a food security assessment apparatus, which is applied to an enterprise node to be assessed, including:
The uplink module is used for determining a service data abstract based on original service data, uplink the service data abstract and receiving an uplink certificate;
The assessment module is used for receiving an assessment evaluation function and a certification key sent by the supervision node, calculating an assessment evaluation result according to the original service data and the assessment evaluation function, and generating zero knowledge certification information based on the certification key;
And the verification module is used for sending the uplink certificate, the assessment and evaluation result and the zero knowledge proof information to the supervision node so that the supervision node verifies the validity of the assessment and evaluation result according to the uplink certificate and the zero knowledge proof information.
The embodiment of the invention provides a food safety assessment method and a device, wherein enterprise nodes in each link submit assessment results calculated according to an assessment function provided by a supervision node, and meanwhile, the abstract storage certificate of original business data is linked. The supervision node can obtain the assessment and evaluation result and verify the credibility of the assessment and evaluation result under the condition that the original service data is not needed, so that the worry of enterprises is solved, the data accuracy is improved, and further the supervision is convenient to strengthen.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a food safety assessment method provided by an embodiment of the invention;
fig. 2 is a schematic diagram of a service data summary uplink provided in an embodiment of the present invention;
FIG. 3 is a schematic diagram of generating an examination result according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of verification of an examination result according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a zero knowledge proof provided by an embodiment of the present invention;
FIG. 6 is a functional block diagram of a food safety assessment device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The existing food safety assessment is that business data are reported by enterprises in all links, and a supervision organization carries out regular food safety assessment according to the reported data. The food safety assessment proposed by the prior or other patents is mainly composed of the following two types:
scheme one: the supervision organization builds a unified assessment platform, and links enterprises to report data;
and each enterprise reports data through a unified data reporting interface provided by the supervision organization. The data is concentrated into a database of the supervision authorities, and the supervision authorities periodically generate assessment results according to the unified assessment method.
Scheme II: constructing a food tracing alliance chain, and enabling enterprises in all links to link data;
Each link enterprise builds a food tracing alliance, the enterprise links the business data, and the supervision authorities regularly generate the assessment results based on the link data according to the unified assessment method.
Both of the above-mentioned existing food safety assessment schemes have certain limitations:
scheme one: the supervision organization builds a unified assessment platform, and link enterprises report data through a reporting interface;
Reporting data to a centralized database of a supervision organization, wherein the business data comprises enterprise core confidentiality, and the possibility of leakage exists, so that the enterprise has weak data reporting will, and the situation of missing report, report hiding or false report data occurs.
Scheme II: constructing a food tracing alliance chain, and respectively linking the data by enterprises in each link;
Enterprises link own business data, and there is concern that the data is acquired by other on-link enterprises so as to misuse the problem. The existing block chain platform cannot support large service data volume in the food industry, and has high requirements on resources and performance of the block chain platform.
Based on the above, the food safety assessment method and device provided by the embodiment of the invention enable the supervision department to obtain the assessment result and verify the credibility of the assessment result without reporting the original business data by the downstream ring enterprise, thereby solving the worry of the enterprise, improving the data accuracy and further being convenient for strengthening supervision.
In order to facilitate understanding of the embodiment, firstly, a food safety assessment method disclosed by the embodiment of the invention is described in detail, and the scheme mainly comprises two participation subjects, an enterprise node and a supervision node, wherein the enterprise node is an examined person, and participates in enterprises for each link of the food industry, and a producer and an owner of business data; the supervision node is an examiner, and a supervision department for providing business data for each enterprise to examine is a supervision party for examining the enterprise node.
Fig. 1 is a flowchart of a food safety assessment method according to an embodiment of the present invention.
Referring to fig. 1, an embodiment of the present invention provides a food safety assessment method, which is applied to an enterprise node to be assessed, including:
Step S102, based on original service data, determining a service data abstract, and uplink the service data abstract and receiving an uplink certificate;
Step S104, receiving an assessment function and a certification key sent by a supervision node, calculating an assessment result according to the original service data and the assessment function, and generating zero knowledge certification information based on the certification key;
Step S106, the uplink certificate, the assessment and evaluation result and the zero knowledge proof information are sent to the supervision node, so that the supervision node verifies the validity of the assessment and evaluation result according to the uplink certificate and the zero knowledge proof information.
In a preferred embodiment of practical application, enterprise nodes in each link submit an assessment result calculated according to an assessment function provided by a supervision node, and meanwhile, a summary storage certificate of original business data is linked. The supervision node can obtain the assessment and evaluation result and verify the credibility of the assessment and evaluation result under the condition that the original service data is not needed, so that the worry of enterprises is solved, the data accuracy is improved, and further the supervision is convenient to strengthen.
In some embodiments, step S102 further includes the steps of:
Step 1.1), obtaining original service data, and storing the original service data;
the enterprise node generates original service data in a service system, and the original data is stored in the service system of the enterprise node;
Step 1.2), performing abstract calculation on the original business data to generate a business data abstract, and submitting the business data abstract to a link;
The service system performs abstract calculation on service original data, generates an original data abstract and submits the abstract to the uplink;
Step 1.3), after the block chain system is successfully uplink, receiving a returned uplink certificate, wherein the uplink certificate is used for inquiring the business data abstract and comprises a block number and a transaction merck tree path.
Here, the blockchain system returns the uplink credential after successful uplink, and the on-chain credential includes the blocknumber (blockdigest) and the transaction merck tree path (consisting of a series of digests to the merck tree root node that are formed with the related transaction). Through the certificate, the corresponding original data digest can be queried on the blockchain.
In this process, the enterprise node only needs to provide the following contents: service data digests and on-chain credentials for service data digests.
In the embodiment of the invention, the enterprise node is required to submit the business data abstract for examination (as the public data participating in the zero knowledge proof process) to the blockchain, and the on-chain credential is used for locating and acquiring the public data on the chain. The on-chain voucher comprises the block number of the exchange, the transaction abstract and the corresponding merck tree path. The merck tree path is formed from the transaction abstract, the adjacent transaction abstract and the merck tree root abstract. The path shown by the bold line box in fig. 4 is the merck tree path corresponding to transaction Tx-D.
The enterprise node does not need to directly submit the original service data to the uplink, and only needs to uplink the abstract a of the service data for certification, so as to obtain the uplink certificate b. In some embodiments, wherein the traffic data digest comprises a one-way hash function. The expression form of a can be a one-way HASH function like HASH (data), and the result is generated and verified as public data participation check result. b is used to indicate the position of digest a on the chain, record the block location where the digest is located (denoted as block digest), the transaction index (typically denoted as the merck tree path for locating transactions in the block).
In some embodiments, step S104 includes:
Step 2.1), receiving an assessment function and a certification key sent by a supervision node;
And 2.2), inputting the original service data, the service data abstract and the proving key into the assessment function, and verifying the matching of the original service data and the service data abstract to obtain an assessment result and zero knowledge proving information.
As shown in fig. 2, during the assessment, the monitoring node sends the corresponding assessment function f () and the proof key for generating the proof to the enterprise node, the enterprise node only needs to autonomously calculate the to-be-verified assessment result by the food safety assessment function of the monitoring node, and generates zero knowledge proof information of the assessment result and the original data storage evidence to be delivered to the monitoring node, and the monitoring node verifies the assessment result according to the information and the on-link business data summary information to ensure the real validity of the assessment result.
In some embodiments, wherein the assessment function is a generic assessment function defined by the supervising node.
In some embodiments, the assessment function is a specific assessment function defined by the supervising node for the enterprise node under examination.
The checking function f () is provided by a checking party, and the checking function receives original data from the enterprise (the original data is generated from daily operations of the enterprise, and summaries of the original data are submitted to the blockchain), and calculates a checking result according to a corresponding checking rule. An audit function is performed on the enterprise node to avoid leakage of the original data of the enterprise. The assessment function may be a general assessment function defined by a regulatory agency, or may be a specific assessment function defined for an enterprise being assessed.
Wherein the checking function is essentially a function that has been converted into a quadratic equation (Quadratic Arithmetic Program, QAP), i.e., a problem equation.
Before applying zero knowledge proof, we need to transform the computation function (here the check function f ()) into a QAP, which essentially transforms a computation into a polynomial NP problem, introducing polynomial computation with its solution unchanged. Based on the QAP problem, the subsequent zero knowledge proof algorithm can simplify the verification calculation by sampling, and at the same time, due to the computational completeness of the QAP problem, it is difficult for the prover to construct a fake proof under limited computational resources.
In some embodiments, wherein the attestation key and the verification key are generated by the policing node during preprocessing based on the generic checking function.
In some embodiments, wherein the attestation key and the verification key are generated by the policing node during preprocessing based on the particular assessment function.
The certification key is generated through a preprocessing process, is generated by a supervision party and is sent to an enterprise as a public parameter. The supervisor can set different examination functions for different enterprises and generate corresponding proving keys and verification keys, and can set a general examination function and generate public proving keys and verification keys.
The generation process of the certification is essentially that of the execution process of the checking function, during which the enterprise needs to provide private original data, public data (original data digest), and a certification key as parameters to obtain the checking result and the corresponding zero knowledge certification. The zero knowledge proof (including declaration output information of the function) is transmitted to the checking party for verification along with the credentials of the relevant public data.
As shown in FIG. 5, zk-SNARKs is a variation of zero knowledge proof that enables the prover to concisely trust the validity of a given assertion by any verifier and to enable computation of zero knowledge without requiring interaction between the prover and any verifier. zk-SNARKs can be used to prove and verify the integrity of the computation and is expressed in terms of NP declarations. A prover grasping knowledge of the verification portion of the NP claim can generate a concise proof that verifies the authenticity of the NP claim. The following schematic shows the relevant concepts and processes of zk-SNARK:
During preprocessing, the function G () accepts a secret parameter λ and a calculation equation (here, the QAP equation converted by the checking function) to generate a pair of keys, respectively a certification key and a verification key. The pair of keys is a public parameter that need only be generated once for one calculation equation. The secret parameter lambda therein needs to be kept secret in order to avoid constructing a false proof by means of the parameter. Different algorithms adopt different preprocessing modes, such as a GM17 algorithm adopts a multipartite computing technology, and Groth16 adopts a prime order bidirectional linear mapping method.
During the proof generation algorithm, the function P () is performed by the prover to produce a corresponding zero knowledge proof. The parameters include a certification key generated in the preprocessing process, declaration output of a function, public data, private data and the like.
In the proof verification process, the function V () is executed by a verifier. The parameters include verification key generated by preprocessing process, function output, public data and zero knowledge proof provided by prover.
In some embodiments, step S106 may further be implemented by the following steps, including:
And 3.1), sending the uplink certificate, the assessment result and the zero knowledge proof information to the supervision node, so that the supervision node obtains the service data abstract according to the uplink certificate, and inputting the service data abstract, the zero knowledge proof information and a verification key corresponding to the proof key into a verification function to verify the validity of the assessment result.
The input content in the verification process includes: the verification result is obtained through the input content by inquiring the obtained abstract a' through the certificate-storing certificate submitted by the enterprise on the chain and verifying the key through the zero knowledge certificate and the checking function submitted by the enterprise, and the validity of the checking result can be judged.
In the embodiment of the present invention, as shown in fig. 3, the supervisor is a verifier, wherein the public data parameter is the on-chain digest a' of the private data of the enterprise, and the supervisor can independently obtain from the blockchain according to the on-chain credential of the public data transmitted by the enterprise. The supervisor performs the verification function with the verification key (generated during preprocessing), the public data digest a' and the zero knowledge proof (including the assessment result data) as parameters. According to the characteristics of the zero-knowledge algorithm, when verification is successful, the enterprise uses the correct private data parameters and faithfully executes the assessment function, so that the assessment result is reliable and effective.
The embodiment of the invention is based on a blockchain and zero knowledge proof technology, and a supervision organization can obtain the checking result and verify the credibility of the checking result without submitting the original transaction data by an enterprise, thereby meeting the requirement of protecting the core data of the enterprise, solving the problem that the enterprise worry about the leakage of the core confidentiality caused by reporting the data, and improving the authenticity of the checking data; the checking mechanism and the verification mechanism are transparent, so that the checking effectiveness is improved, and the checking result is convenient to follow; and the original data is not required to be uplink, so that the resource and performance pressure of the block chain platform are reduced.
As shown in fig. 6, an embodiment of the present invention further provides a food security assessment device, which is applied to an enterprise node to be assessed, including:
The uplink module is used for determining a service data abstract based on original service data, uplink the service data abstract and receiving an uplink certificate;
The assessment module is used for receiving an assessment evaluation function and a certification key sent by the supervision node, calculating an assessment evaluation result according to the original service data and the assessment evaluation function, and generating zero knowledge certification information based on the certification key;
And the verification module is used for sending the uplink certificate, the assessment and evaluation result and the zero knowledge proof information to the supervision node so that the supervision node verifies the validity of the assessment and evaluation result according to the uplink certificate and the zero knowledge proof information.
In some embodiments, the uplink module is further specifically configured to obtain original service data, and store the original service data; performing abstract calculation on the original business data to generate a business data abstract, and submitting the business data abstract to a link; after the block chain system is successfully uplink, a returned uplink certificate is received and used for inquiring the uplink certificate of the business data abstract, wherein the uplink certificate comprises a block number and a transaction merck tree path.
In some embodiments, the assessment module is further specifically configured to receive an assessment function and a certification key sent by the supervision node; inputting the original service data, the service data abstract and the proving key into the assessment function, and verifying the matching of the original service data and the service data abstract to obtain an assessment result and zero knowledge proving information.
In some embodiments, the verification module is further specifically configured to send the uplink credential, the assessment result and the zero knowledge proof information to the supervisory node, so that the supervisory node obtains the service data abstract according to the uplink credential, and inputs the service data abstract, the zero knowledge proof information and a verification key corresponding to the verification key into a verification function to verify the validity of the assessment result.
In some embodiments, wherein the traffic data digest comprises a one-way hash function.
In some embodiments, wherein the assessment function is a generic assessment function defined by the supervising node.
In some embodiments, the assessment function is a specific assessment function defined by the supervising node for the enterprise node under examination.
In some embodiments, wherein the attestation key and the verification key are generated by the policing node during preprocessing based on the generic checking function.
In some embodiments, wherein the attestation key and the verification key are generated by the policing node during preprocessing based on the particular assessment function.
The food safety assessment device provided by the embodiment of the invention has the same technical characteristics as the food safety assessment method provided by the embodiment, so that the same technical problems can be solved, and the same technical effects can be achieved.
The computer program product of the method and apparatus for evaluating food safety assessment provided in the embodiments of the present invention includes a computer readable storage medium storing program codes, where the instructions included in the program codes may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment and will not be described herein.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described system and apparatus may refer to corresponding procedures in the foregoing method embodiments, which are not described herein again.
In addition, in the description of embodiments of the present invention, unless explicitly stated and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In the description of the present invention, it should be noted that the directions or positional relationships indicated by the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. are based on the directions or positional relationships shown in the drawings, are merely for convenience of describing the present invention and simplifying the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
The embodiment of the invention also provides electronic equipment, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes the steps of the food safety assessment method provided by the embodiment when executing the computer program.
The embodiment of the invention also provides a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and the computer program executes the steps of the food safety assessment method of the embodiment when being run by a processor.
Finally, it should be noted that: the above examples are only specific embodiments of the present invention, and are not intended to limit the scope of the present invention, but it should be understood by those skilled in the art that the present invention is not limited thereto, and that the present invention is described in detail with reference to the foregoing examples: any person skilled in the art may modify or easily conceive of the technical solution described in the foregoing embodiments, or perform equivalent substitution of some of the technical features, while remaining within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention, and are intended to be included in the scope of the present invention.
Claims (6)
1. The food safety assessment method is characterized by being applied to enterprise nodes to be assessed and supervision nodes, wherein the enterprise nodes are assessed persons, and participate in enterprises for each link of the food industry, and are the producer and the owner of original business data; the supervision node is an examiner, and a supervision department for providing business data for each enterprise is a supervision party for examining the enterprise node, and the method comprises the following steps:
The enterprise node determines a service data abstract based on original service data, links the service data abstract, and receives a uplink certificate, wherein the original service data is generated for daily operation of the enterprise node;
The supervision node sends a food safety assessment function and a proof secret key, wherein the food safety assessment function is a specific assessment function and a general assessment function defined by the supervision node aiming at the enterprise node to be examined, and the assessment function is a function of a problem equation; the supervision node generates the proving key and the verification key based on the specific assessment function or the assessment evaluation function in the preprocessing process;
The enterprise node receives the food safety assessment function and the proving key sent by the supervision node, calculates an assessment result according to the original service data and the assessment function, and generates zero knowledge proving information based on the proving key;
the enterprise node sends the uplink certificate, the assessment result and the zero knowledge proof information to the supervision node;
and the supervision node verifies the validity of the assessment result according to the uplink certificate and the zero knowledge proof information.
2. The food safety assessment method according to claim 1, wherein the steps of determining a service data digest based on original service data, and uplink the service data digest and receiving an uplink credential, comprise:
acquiring original service data and storing the original service data;
performing abstract calculation on the original business data to generate a business data abstract, and submitting the business data abstract to a link;
After the block chain system is successfully uplink, a returned uplink certificate is received and used for inquiring the uplink certificate of the business data abstract, wherein the uplink certificate comprises a block number and a transaction merck tree path.
3. The food safety assessment method according to claim 2, wherein the step of the enterprise node receiving the food safety assessment function and the certification key transmitted by the supervision node, calculating an assessment result from the original service data and the assessment function, and generating zero knowledge certification information based on the certification key, comprises:
receiving an assessment function and a certification key sent by a supervision node;
Inputting the original service data, the service data abstract and the proving key into the assessment function, and verifying the matching of the original service data and the service data abstract to obtain an assessment result and zero knowledge proving information.
4. A food safety assessment method according to claim 3, wherein the step of the supervising node verifying the validity of the assessment result according to the up-link credential, the zero knowledge proof information comprises:
And sending the uplink certificate, the assessment result and the zero knowledge proof information to the supervision node so that the supervision node obtains the service data abstract according to the uplink certificate, and inputting the service data abstract, the zero knowledge proof information and a verification key corresponding to the proof key into a verification function to verify the validity of the assessment result.
5. The food safety assessment method according to claim 2, wherein the traffic data digest comprises a one-way hash function.
6. The food safety assessment device is characterized by being applied to enterprise nodes to be assessed and supervision nodes, wherein the enterprise nodes are assessed persons, participate in enterprises for each link of the food industry, and are the producer and the owner of original business data; the supervision node is an examiner, and is a supervision department for providing business data for each enterprise to examine, and is a supervision party for examining the enterprise node, and the device comprises:
The system comprises a service data summarization module, a link module and a link module, wherein the service data summarization module is used for determining service data summarization based on original service data, linking the service data summarization and receiving a link credential, and the original service data is generated for daily operation of the enterprise node;
The assessment module is used for sending a food safety assessment function and a proving secret key by the supervision node, wherein the food safety assessment function is a specific assessment function and a general assessment function defined by the supervision node for the enterprise node to be examined; the checking function is a function of a problem equation; the supervision node generates the proving key and the verification key based on the specific assessment function or the assessment evaluation function in the preprocessing process; the enterprise node receives an assessment function and a certification key sent by a supervision node, calculates an assessment result according to the original service data and the assessment function, and generates zero knowledge certification information based on the certification key;
And the verification module is used for sending the uplink certificate, the assessment and evaluation result and the zero knowledge proof information to the supervision node by the enterprise node so that the supervision node verifies the validity of the assessment and evaluation result according to the uplink certificate and the zero knowledge proof information.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010810552.4A CN111898926B (en) | 2020-08-12 | 2020-08-12 | Food safety assessment method and device |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010810552.4A CN111898926B (en) | 2020-08-12 | 2020-08-12 | Food safety assessment method and device |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111898926A CN111898926A (en) | 2020-11-06 |
| CN111898926B true CN111898926B (en) | 2024-11-15 |
Family
ID=73230185
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010810552.4A Active CN111898926B (en) | 2020-08-12 | 2020-08-12 | Food safety assessment method and device |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111898926B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114257381B (en) * | 2021-12-21 | 2023-11-21 | 四川启睿克科技有限公司 | Yield calculation method based on zero knowledge proof |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109559224A (en) * | 2018-10-26 | 2019-04-02 | 阿里巴巴集团控股有限公司 | Reference appraisal procedure and device, electronic equipment |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| AU2018347185A1 (en) * | 2018-11-07 | 2020-05-21 | Alibaba Group Holding Limited | Regulating blockchain confidential transactions |
| CN110855631B (en) * | 2019-10-24 | 2022-05-17 | 南京可信区块链与算法经济研究院有限公司 | Method, system and storage medium for verifying supervision-capable zero knowledge in block chain |
| CN111160909B (en) * | 2019-12-31 | 2024-01-16 | 深圳市迅雷网络技术有限公司 | Blockchain supply chain transaction hidden static supervision system and method |
| CN111444550A (en) * | 2020-03-24 | 2020-07-24 | 腾讯科技(深圳)有限公司 | Block chain-based service data verification method and device and readable storage medium |
-
2020
- 2020-08-12 CN CN202010810552.4A patent/CN111898926B/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109559224A (en) * | 2018-10-26 | 2019-04-02 | 阿里巴巴集团控股有限公司 | Reference appraisal procedure and device, electronic equipment |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111898926A (en) | 2020-11-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lin et al. | EBCPA: Efficient blockchain-based conditional privacy-preserving authentication for VANETs | |
| KR102173426B1 (en) | Privacy preserving public key infrastructure based self sign and verification system and method in decentralized identity | |
| Barthe et al. | Verified computational differential privacy with applications to smart metering | |
| Kakei et al. | Cross-certification towards distributed authentication infrastructure: A case of hyperledger fabric | |
| CN101394283A (en) | A Trusted Platform Verification Method Based on Ternary Peer Authentication (TePA) | |
| JP7649678B2 (en) | A system for multi-party zero-knowledge proofs | |
| CN114866259B (en) | Block chain controlled traceable identity privacy method based on secret sharing | |
| CN114240439B (en) | Cross-chain transaction rollback method and device based on threshold signature and double hash chain mode | |
| Zhou et al. | Fair cloud auditing based on blockchain for resource-constrained IoT devices | |
| CN114006702B (en) | Zero knowledge proof segmentation circuit and information verification method | |
| CN117829841A (en) | Business transaction supervision method and device based on blockchain and electronic equipment | |
| CN111898926B (en) | Food safety assessment method and device | |
| Dadeau et al. | Model‐based mutation testing from security protocols in HLPSL | |
| CN116975936B (en) | Finance qualification proving method and finance qualification verifying method | |
| CN117972717A (en) | A trusted and secure multi-party computing method and device based on blockchain | |
| CN117792656A (en) | Cross-chain data interactive sharing method and system | |
| Liu et al. | BAST: blockchain-assisted secure and traceable data sharing scheme for vehicular networks | |
| CN112436944B (en) | POW-based block chain consensus method and device | |
| CN119691808A (en) | Multi-party vertical federated learning method based on data alignment and privacy protection | |
| Man et al. | Emission Impossible: privacy-preserving carbon emissions claims | |
| CN115051810A (en) | Interface type digital object authenticity verification method and device based on remote certification | |
| Saarela | Practical Zero-Knowledge within the European Digital Identity Framework: Implementing Privacy-Preserving Identity Checks | |
| CN119520124B (en) | Business system login method, device, storage medium and electronic device | |
| CN115333786B (en) | Electric vehicle identity authentication method, system, device and storage medium | |
| Liu et al. | Blockchain-based efficient and traceable data sharing scheme for vehicular networks |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |