Subsidizing method capable of hiding real names based on matrix alliance chain

文档序号:1954367 发布日期:2021-12-10 浏览:19次 中文

阅读说明:本技术 一种基于矩阵联盟链的可隐藏实名的资助方法 (Subsidizing method capable of hiding real names based on matrix alliance chain ) 是由 陈龙 黄海平 杨健 王小露 黄启萌 肖甫 陈伟 薛凌妍 于 2021-11-10 设计创作,主要内容包括:本发明提出了一种基于矩阵联盟链的可隐藏实名的资助方法,通过联盟链系统将公益机构、企业、个人、政府和监管机构等多个行为体聚集在一起,设计矩阵联盟链,优化结构,组建联盟,资助人和受助人可隐藏实名信息,但不影响资助信息的透明度和真实性,确保可追溯、追责;优化共识机制,促进资助人行为诚信。本发明充分发挥区块链在公益场景中的优势,有效保护用户隐私。(The invention provides a subsidizing method of a concealable real name based on a matrix alliance chain, which is characterized in that a plurality of behavior bodies such as public welfare agencies, enterprises, individuals, governments, supervision agencies and the like are gathered together through an alliance chain system, a matrix alliance chain is designed, a structure is optimized, an alliance is established, and real name information can be concealed by a sponsor and a receiver without influencing the transparency and authenticity of the subsidizing information, so that traceability and tracing are ensured; and (4) optimizing a consensus mechanism and promoting the behavior integrity of the sponsor. The invention gives full play to the advantages of the block chain in public service scenes and effectively protects the privacy of users.)

1. A subsidizing method of a concealable real name based on a matrix alliance chain is characterized in that the steps of the method are as follows,

s1, initializing a alliance chain system to generate public parameters, wherein participants of the alliance chain comprise a person to be helped, a supervision mechanism and a key generation center;

s2, constructing a dream block to form a transverse chain in the matrix union chain; person to be helpedSubmitting application and subsidization information to the alliance chain system, and supervising the nodeThe application and the subsidy information are audited and verified, and the dreamy transaction information issued by the subsidee is packagedAnd generating a copy of the transactionThe supervisory node broadcasts transaction informationAnd transaction copiesThe consensus node compares the transaction information according to a consensus mechanismAnd transaction copiesPerforming verification and sending the verified transaction informationAnd transaction copiesWriting a dream block;

s3, constructing a subsidy block to form a vertical chain in the matrix alliance chain; help peopleFinish the person who is helpedAfter the subsidization, acquiring the subsidized certificate issued and endorsed by the supervision nodeSupervision node broadcasts subsidized transactionsAnd transactional copies thereofThe consensus node proceeds with the subsidized transaction according to the consensus mechanismAnd transactional copies thereofPerforming verification and verifying the dataFacilitating transactionsAnd transactional copies thereofStoring the data into a transaction pool; the main consensus node will be the person under investigationIDAnd the subsidized types are packaged into blocks, broadcast to the block chain network, verify the correctness of the blocks from the consensus nodes and vote that the number of tickets exceeds the threshold valueThe chain can be wound;

s4 qualified personWhen the subsidy information is wanted to be hidden, the subsidy person sends out a transaction modification request to supervise the nodeAfter receiving the request, quickly positioning the coordinates of the block where the transaction is locatedAfter verifying the identity of the sponsor, a pseudo-identity is generated for the sponsorAnd issuing a new certificate of subsidyAfter the verification of the consensus node is passed, modifying the transaction information on the link to hide the real name according to the consensus mechanism through the whole network broadcasting; after the real name is hidden, the sponsor can still apply for recovering the real name information from the supervision node for tracing and checking;

s5 qualified personWhen wanting to hide the subsidized information, the person to be subsidizedAfter receiving the subsidization, initiating a request for deleting the subsidization release, and supervising the nodeAfter receiving the request, the uplink inquires the transaction data of the person to be helped, and after verifying the information of the person to be helped, the supervisory nodeAnd initiating a deletion transaction, and modifying the dream block after the consensus node verifies according to the consensus mechanism.

2. The subsidizing method of concealable real names based on the matrix federation chain as claimed in claim 1, wherein the specific steps of S1 are:

s1-1, each participating user generates character string associated with own identityThe character strings generated by the sponsor, the supervising authority and the key generation center and associated with the identity information are respectively expressed as:

s1-2, inputting safety parametersSelecting addition cycle groupsAnd multiplication loop groupAnd is andis composed ofThe large prime number of bits is the number of bits,into a groupAnd define such a bilinear map

S1-3, selecting random number at random by key generation centerAs the system master key, and calculates its public key asDefining 6 secure hash functions, which are respectively:

and a pair of encryption and decryption algorithmsDisclosure of system parametersAnd is recorded on the block chain,display moduleThe multiplicative group of the remaining class ring of (c),which represents the public key(s),indicating indefinite lengthA string of bits is then transmitted through the bit string,to represent(ii) a Of a long bit lengthA bit string;

s1-4, the key generation center provides the identity character string according to each participated userComputingAnd anWherein, in the step (A),is a public and private key pair of a user,for the user block chain public key address,is the user's registration certificate, is generated by the private key signature of the key generation center,in order to be the registration number,is a universal hash function and then is transmitted through a secure channelAnd sending the data to the user.

3. The subsidizing method of concealable real names based on the matrix federation chain as claimed in claim 1, wherein the specific content of S2 is:

s2-1, the person of interestPackaging personal registration information, dream content and type generating messagesAnd calculating the digital signature thereofWherein, in the step (A),sending messages for current timestampsTo a blockchain network;

s2-2, supervision nodeReceiving the person to be helpedMessageThen, first, the current timestamp is selectedDefinition ofIs the effective difference between the timestamp of the message and the timestamp of the received message, ifIf the message is valid, otherwise, the dialog is terminated, and then the following formula is calculated to verify the correctness of the message:

if the above formula is established, receiving the message, verifying that the dream content and type of the person to be helped are correct, and returning confirmation information;

s2-3, supervision nodePacking the patrons according to the trading format of the dream blocksSubmitted information and generating a transaction copy, as follows:

wherein the content of the first and second substances,containing personal real information of a sponsorAndto trade a copy, not including both strings,is a label for supervising node to dealThe name of the person to be named,the time is generated for the transaction,the label is a label of the dream block chain and is used for positioning block coordinates and a transaction position when the block chain is edited subsequently;

s2-4, supervision nodeBroadcasting the transaction and the transaction copy, verifying the transaction and the transaction copy by the consensus node according to the consensus mechanism, and verifying the transaction and the transaction copy according to the consensus mechanism after the verification is passedThe label is written into the dream block and an index list is establishedSaved as down-link data to a local database, whereinThe height of the block is used for fast positioning of the process of generating the subsidized chain, and two merkleroots are stored in the data structure of the block and are respectivelyCorrespondingly, the block header will store two hash values of the previous block, and the blocks are linked by the light chain and the dark chain, so as to ensure that the block chain structure is not damaged when modifying the contents of the block chain, that is:

wherein the content of the first and second substances,which represents the current block of the video stream,two hash values representing the previous block,a random number representing the current block is generated,representing the generation timestamp of the block.

4. The subsidizing method of concealable real names based on the matrix federation chain as claimed in claim 1, wherein the specific steps of S3 are:

s3-1, sponsorFinish the person who is helpedFunds transfer or service to a blockchain address of the mobile station, generating subsidy informationTo supervision nodeSending a generate funding certificate request

Wherein the content of the first and second substances,the presentation of the sponsored content is performed,representing an encryption algorithm, the supervisory node executing a decryption algorithm upon receipt of a requestTo obtainIf and subsidizing the messageIs directly formed byCalculated valueIf they are equal, the request is confirmed to be received and the certificate of subsidy is issuedWhereinGenerating time for the certificate and endorsing;

s3-2, supervision nodeGenerating transactions according to the transaction format of the funded blockAnd copies of transactionsAnd broadcast to the whole network, verified by the consensus node according to the consensus mechanism, and in addition, the supervision nodeAnd also provide subsidized objectsRelated information ofFor block positioning;

wherein the content of the first and second substances,transaction copyDoes not include the personal related information of the sponsorRepresenting the supervisory node's signature on the transaction,means that the sponsor's public key is used to encrypt the corresponding certificate, and the certificate is used for receiving the certificate and then decrypting the certificate with the own private key to obtain the sponsorship certificate,representing a transaction generation time;

s3-3, after the transaction and the copy verification are passed, the main consensus node will trade according to the consensus mechanismAnd copiesIs deposited into a transaction pool and then willTo the same person under charge within a period of timeThe subsidized transactions are packaged into blocks and broadcast to a network of block chains, the blocks are verified from consensus nodes, and votes are cast over a thresholdThen, calculate the indexPositioningHeight of the blockheightLinking the block to a corresponding subsidized chain, the height of which is defined asdepthBlock coordinates of a transaction in the matrix federation chain: (height, depth) (ii) a Similarly, there are two merkleroot values in the block data structure of the grant chain, which are respectivelyAndand the previous oneTwo hash values of the blocks, and the blocks are linked by a light chain and a dark chain.

5. The subsidizing method of the concealable real name based on the matrix federation chain as claimed in claim 1, wherein the specific steps of S4 are:

s4-1, sponsorInitiating an anonymous modification request

WhereinIn order to modify the coordinates of the block where the transaction is located,in order to be able to use the encryption algorithm,a certificate of subsidy is represented and,is the current timestamp;

s4-2, supervision nodeReceive toFirst, select the current timestampIf, ifThe message is valid, according toQuery local database to obtainExecuting a decryption algorithm

If it isIf true, the sponsor is indicatedThe message is correct for a legal user;

s4-3, after the message passes the verification, the supervision nodeFor the person of interestGenerating a pseudo-identityAnd issue a new certificate of subsidyEndorse in parallel, then supervise the nodeGenerating new transaction data

WhereinWhereinWhich represents the time at which the transaction was generated,a digital signature is represented for the transaction,represents a chain tag; furthermore, a supervisory nodeThe coordinate of the block where the transaction to be modified is located is also provided to the consensus nodeAnd modifying the identity information of the request originator

S4-4, identifying the node pair for transaction according to the identification mechanismAfter the verification is passed, according toAndquickly inquiring the transaction to be modified and then sending the transaction to be modifiedIs replaced byRecalculating the value of merklerootAt this time, the bright chain between the block and the subsequent block is broken due to the change in the value of merkleroot, andthe value of (d) remains unchanged, so the dark chain maintains the integrity of the subsidized chain; if it isIf the block is also changed, the block is indicated to be subjected to unauthorized tampering;

s4-5, qualified personWhen the real name is needed again, a modification request is sent, and the node is monitoredRelevant endorsement content can be obtained by searching a local database, and steps S4-1 to S4-3 are carried out after identity verification to complete real name modification.

6. The subsidizing method of the concealable real name based on the matrix federation chain as claimed in claim 1, wherein the specific steps of S5 are:

s5-1, the person of interestInitiating a delete request

WhereinThe height of the dream block is the height of the dream block,a timestamp of the current request;

s5-2, supervision nodePerson receiving the informationAfter the sent deleting request, the current time is selected firstIf, ifIf the request is valid, then the uplink query obtains the transaction data

CalculatingIf, ifIf yes, the identity of the person to be helped is credible; otherwise, the person is illegal orIf the value is subject to unauthorized tampering, the session is terminated;

s5-3, qualified personIdentity verification deviceOutdated, supervisory nodeGenerating new transaction dataBroadcasting, and providing the height of the block to be modified

S5-4, according to the consensus mechanism, after the consensus node is verified, the block to be modified is deleted, specifically, the original block is deletedIs replaced byAnd recalculated

7. The fundation method based on the concealable real names of the matrix alliance chain as claimed in any one of claims 1 to 6, wherein the consensus mechanism is a practical Byzantine fault-tolerant mechanism based on multi-factor voting, and the consensus nodes are a sponsor and a helped person; the common knowledge of the common knowledge node is obtained when the transaction is issued or modified on the chain, and the common knowledge node calculates the matching degree through synthesisSDSubsidy limitSACredit rating of the sponsorCSThree-factor voting before rank selectionThe consensus node of the bit participates in consensus, each timeHour(s)And finally, reorganizing the election voting.

8. The subsidizing method of concealable real names based on the matrix federation chain as claimed in claim 7, wherein according to the consensus mechanism, the step of verifying the consensus node is:

s6-1, when the matrix alliance chain is cold-started, the supervising nodeWriting the subsidized transaction information into the founding block; the key generation center KGC distributes independent block chain addresses to each nodePrivate keyAnd public keyThe public key of the sponsor is only published for the supervision node and the consensus node, the account address written into the block is publicly visible, and the account address not written into the block cannot be displayed in the network;

s6-2, third party credit organization in supervision organizationTo newly joined subsidized nodeCredit awarding score(ii) a Supervision nodeReading sponsoring nodesCertificate of subsidization ofRecording the subsidy value of the nodeAccording to the type of subsidizationtypeCalculating subsidized matching degree score

S6-3, when entering into the voting time, the supervision nodeCalculating a composite score for the election node(ii) a Wherein the content of the first and second substances,is toThe result of the normalization processing is selected before the grade sortingThe node of the bit acts as a consensus node;

s6-4, after the first group of consensus nodes are generated, the method is carried outWithin the time, the consensus nodes sequentially act as the main nodes according to the ranking; master nodeSPSubsidized transaction to be validatedPacking the information into a block, generatingSending the data to other slave nodes; the next node behind the main node is a secondary main node, and is packed with the main node at the same time, and blocks generated by the main node can be sent out when the main node has errors;

s6-5, and the rest slave nodesAfter receiving the pre-prepared message sent by the main node, verifying the signature, and if the verification is passed and the block uplink is approved, sending a confirmation messageForwarding to other consensus nodes, and sending if overtime or disapproval

S6-6, after each consensus node receives the preparation message, when the number of the received effective preparation messages is largeWhereinCalculating approval for the maximum number of malicious nodesAnd disfavorDetermining the number of tickets in the acknowledgment messageValue, node broadcast acknowledgement informationConfirmWhen an acknowledgement message is receivedIf so, executing the request;

s6-7, if the client receivesIf the responses are the same, the request initiated by the client side is proved to have the common consensus of the whole network, otherwise, the request needs to be sent again;is the number of system nodes, if the maximum number of malicious nodes allowed by the systemThen, it requires

S6-8, if the malicious node is found, updating the credit scoreWherein, in the step (A),and sending the credit to a third party credit facility(ii) a If finishedIf the node is in the round of consensus, the credit score of the node is updated to be

Technical Field

The invention relates to the technical field of alliance chains, in particular to a subsidizing method capable of hiding real names based on a matrix alliance chain.

Background

The traditional public welfare charitable organization has low information disclosure transparency, a supervision mechanism is in short position, and public trust is insufficient. The 'fund going and using condition' and 'benevolence source' of the public welfare organization are always the focus of public attention, but the conventional public welfare organization often has insufficient information disclosure and weak social supervision strength, thereby influencing the confidence and the support degree of the public welfare organization. Most of the traditional public welfare charitable organizations are not transformed by digital technology, the traditional donation flow is complicated, the technical means is backward, and the efficiency is low; meanwhile, the rapid development of Chinese economy brings about the ever-increasing public demand of the masses. In recent years, the total value of social public welfare and the number of social organizations are continuously increased, the individual donation amount keeps better acceleration, and the scale of the individual donation assets, particularly the network donation, is widely seen in the future. With the rapid development of the internet and the wide application of information technology, the network public welfare crowd-funding platform develops rapidly such as easy funding, water droplet funding, love funding and the like, but due to the open characteristics of the internet, the crowd-funding platform is difficult to effectively screen information of an initiator and a beneficiary, and problems that individual recourse persons falsely build illness states, partial platform online business processes are not in compliance, user data are abused, individual platforms are involved in illegal funding and the like are frequently generated. The method not only damages the basic rights and interests of the donors, but also weakens the trust of the masses on the network public welfare and crowd raising activities, and restricts the sustainable development of the public welfare industry. In addition, in the existing public welfare scenario, including the products of block chains and public welfare, the financial and physical subsidies of money and objects are mainly focused, and the help of service resources such as 'volunteer time', 'online courses', 'experience knowledge' and the like which can be given by people is ignored. In the process of consolidating and expanding the poverty-escaping attack and hardening result and promoting the pleasure of the country, the public welfare scene of realizing the dream of children in the country is considered, and the property and service are considered.

The block chain technology is a distributed account book technology, is commonly maintained by multiple parties, uses cryptography to ensure transmission and access safety, can realize the accounting technology of data consistent storage, difficult tampering and prevention of repudiation, has the properties of decentralization, openness and transparency, traceable information and tamper resistance, can effectively ensure the openness and transparency of public service projects, and can be used for a donor to inquire each transaction and trace the issuing information, the use condition and the like of goods and money. The block chain has great application potential as a new digital technology, the block chain is gradually applied to the social public service field at present, however, in order to better and more publicly disclose the block chain to the public, the existing public service block chain system can record complete information of a sponsor and a sponsor in the block chain, and due to the characteristic that the block chain can not be tampered, the information of a user can be permanently kept in the block chain. For privacy protection, the sponsor or sponsor should be able to request to delete or hide private data records related to themselves, i.e. the user should be able to choose real names or hide real names to participate in the records of the blockchain without affecting the public transparency and tamper resistance of the sponsored data, so as to protect the privacy and anonymity of the user. Compared with the public chain, the admission mechanism of the alliance chain is more suitable for public service scenes, and public service platforms, government regulatory departments and credit department doors which have good credit and accord with the qualification are allowed to enter to participate in consensus. However, based on the existing alliance chain system, only the subsidy transaction information is continuously recorded in the block, all the subsidy information of a certain subsidy person cannot be accurately associated, a certain specific subsidy transaction cannot be positioned to realize on-chain modification, and real-name information of the subsidy person and the subsidy person cannot be protected.

Disclosure of Invention

In order to solve the technical problems, the invention provides a subsidizing method of a concealable real name based on a matrix alliance chain, after real name registration and authentication, a sponsor can subsidize the property or service of the sponsor, and by optimizing a block structure and a chain structure, real name information stored on the block chain is allowed to be concealed without influencing the whole structure of the chain, and meanwhile, the subsidizing information can be traced and accountable, and personal privacy information is effectively protected; optimizing a consensus mechanism, introducing the matching degree of the subsidy type and the credit score of an authoritative credit department, promoting the subsidiary to implement the integrity behavior, and feeding back the loss behavior to the integrity file of a credit unit to promote the integrity subsidization.

The invention relates to a subsidizing method of a concealable real name based on a matrix alliance chain, which comprises the following steps,

s1, initializing a alliance chain system to generate public parameters, wherein participants of the alliance chain comprise a person to be helped, a supervision mechanism and a key generation center;

s2, constructing a dream block to form a transverse chain in the matrix union chain; person to be helpedSubmitting application and subsidization information to the alliance chain system, and supervising the nodeThe application and the subsidy information are audited and verified, and the dreamy transaction information issued by the subsidee is packagedAnd generating a copy of the transactionThe supervisory node broadcasts transaction informationAnd transaction copiesThe consensus node compares the transaction information according to a consensus mechanismAnd transaction copiesPerforming verification and sending the verified transaction informationAnd transaction copiesWriting a dream block;

s3, constructing a subsidy block to form a vertical chain in the matrix alliance chain; help peopleFinish the person who is helpedAfter the subsidization, acquiring the subsidized certificate issued and endorsed by the supervision nodeSupervision node broadcasts subsidized transactionsAnd transactional copies thereofThe consensus node proceeds with the subsidized transaction according to the consensus mechanismAnd transactional copies thereofPerforming verification and subsidizing the transaction after verificationAnd transactional copies thereofStoring the data into a transaction pool; the main consensus node is based on the person under investigationIDAnd subsidized type of packagingBlocks broadcast to a blockchain network, verifying the correctness of the blocks from consensus nodes and voting, the number of votes exceeding a thresholdThe chain can be wound;

s4 qualified personWhen the subsidy information is wanted to be hidden, the subsidy person sends out a transaction modification request to supervise the nodeAfter receiving the request, quickly positioning the coordinates of the block where the transaction is locatedAfter verifying the identity of the sponsor, a pseudo-identity is generated for the sponsorAnd issuing a new certificate of subsidyAfter the mutual identification node passes the verification, the mutual identification node modifies the transaction information on the chain to hide the real name according to a mutual identification mechanism through the whole network broadcasting, and the sponsor can still apply for recovering the real name information from the supervision node after hiding the real name;

s5 qualified personWhen wanting to hide the subsidized information, the person to be subsidizedAfter receiving the subsidization, initiating a request for deleting the subsidization release, and supervising the nodeAfter receiving the request, the uplink inquires the transaction data of the person to be helped, and after verifying the information of the person to be helped, the supervisory nodeAnd initiating a deletion transaction, and modifying the dream block after the consensus node verifies according to the consensus mechanism.

Further, the specific step of S1 is:

s1-1, each participating user generates character string associated with own identityThe character strings generated by the sponsor, the supervising authority and the key generation center and associated with the identity information are respectively expressed as:

s1-2, inputting safety parametersSelecting addition cycle groupsAnd multiplication loop groupAnd is andis composed ofThe large prime number of bits is the number of bits,into a groupAnd define such anBilinear mapping

S1-3, selecting random number at random by key generation centerAs the system master key, and calculates its public key asDefining 6 secure hash functions, which are respectively:

and a pair of encryption and decryption algorithmsDisclosure of system parametersAnd is recorded on the block chain,display moduleThe multiplicative group of the remaining class ring of (c),which represents the public key(s),indicating indefinite lengthA string of bits is then transmitted through the bit string,to represent(ii) a Of a long bit lengthA bit string;

s1-4, the key generation center provides the identity character string according to each participated userComputingAnd anWherein, in the step (A),is a public and private key pair of a user,for the user block chain public key address,is the user's registration certificate, is generated by the private key signature of the key generation center,in order to be the registration number,is a universal hash function and then is transmitted through a secure channelAnd sending the data to the user.

Further, the step of S2 is:

s2-1, the person of interestPackaging personal registration information, dream content and type generating messagesAnd calculating the digital signature thereofWherein, in the step (A),sending messages for current timestampsTo a blockchain network;

s2-2, supervision nodeReceiving the person to be helpedMessageThen, first, the current timestamp is selectedDefinition ofIs the effective difference between the timestamp of the message and the timestamp of the received message, ifIf the message is valid, otherwise, the dialog is terminated, and then the following formula is calculated to verify the correctness of the message:

(ii) a If the above formula is established, receiving the message, verifying that the dream content and type of the person to be helped are correct, and returning confirmation information;

s2-3, supervision nodePacking the patrons according to the trading format of the dream blocksSubmitted information and generating a transaction copy, as follows:

wherein the content of the first and second substances,containing personal real information of a sponsorAndfor transaction copiesAnd the two character strings are not included,is the signature of the supervising node on the transaction,the time is generated for the transaction,the label is a label of the dream block chain and is used for positioning block coordinates and a transaction position when the block chain is edited subsequently;

s2-4, supervision nodeBroadcasting the transaction and the transaction copy, verifying the transaction and the transaction copy by the consensus node according to the consensus mechanism, and verifying the transaction and the transaction copy according to the consensus mechanism after the verification is passedThe label is written into the dream block and an index list is establishedSaved as down-link data to a local database, whereinThe height of the block is used for fast positioning of the process of generating the subsidized chain, and two merkleroots are stored in the data structure of the block and are respectivelyCorrespondingly, the block header will store two hash values of the previous block, and the blocks are linked by the light chain and the dark chain, so as to ensure that the block chain structure is not damaged when modifying the contents of the block chain, that is:

wherein the content of the first and second substances,which represents the current block of the video stream,two hash values representing the previous block,a random number representing the current block is generated,representing the generation timestamp of the block.

Further, the step of S3 is:

s3-1, sponsorFinish the person who is helpedFunds transfer or service to a blockchain address of the mobile station, generating subsidy informationTo supervision nodeSending a generate funding certificate request

Wherein the content of the first and second substances,the presentation of the sponsored content is performed,representing cryptographic algorithms, supervisory nodesAfter receiving the request, executing the decryption algorithmTo obtainIf and subsidizing the messageIs directly formed byCalculated valueIf they are equal, the request is confirmed to be received and the certificate of subsidy is issuedWhereinGenerating time for the certificate and endorsing;

s3-2, supervision nodeGenerating transactions according to the transaction format of the funded blockAnd copies of transactionsAnd broadcast to the whole network, verified by the consensus node according to the consensus mechanism, and in addition, the supervision nodeAnd also provide subsidized objectsRelated information ofFor block positioning;

wherein the content of the first and second substances,transaction copyDoes not include the personal related information of the sponsorRepresenting the supervisory node's signature on the transaction,means that the sponsor's public key is used to encrypt the corresponding certificate, and the certificate is used for receiving the certificate and then decrypting the certificate with the own private key to obtain the sponsorship certificate,representing a transaction generation time;

s3-3, after the transaction and the copy verification are passed, the main consensus node will trade according to the consensus mechanismAnd copiesIs deposited into a transaction pool and then willTo the same person under charge within a period of timeThe subsidized transactions are packaged into blocks and broadcast to a network of block chains, the blocks are verified from consensus nodes, and votes are cast over a thresholdThen, calculate the indexPositioningHeight of the blockheightLinking the block to a corresponding subsidized chain, the height of which is defined asdepthBlock coordinates of a transaction in the matrix federation chain: (height, depth) (ii) a Similarly, there are two merkleroot values in the block data structure of the grant chain, which are respectivelyAndand two hash values of the previous block, and the blocks are linked by a light chain and a dark chain.

Further, the specific content of S4 is:

s4-1, sponsorInitiating an anonymous modification request

WhereinIn order to modify the coordinates of the block where the transaction is located,in order to be able to use the encryption algorithm,a certificate of subsidy is represented and,is the current timestamp;

s4-2, supervision nodeReceive toFirst, select the current timestampIf, ifThe message is valid, according toQuery local database to obtainExecuting a decryption algorithm

If it isIf true, the sponsor is indicatedThe message is correct for a legal user;

s4-3, after the message passes the verification, the supervision nodeFor the person of interestGenerating a pseudo-identityAnd issue a new certificate of subsidyEndorse in parallel, then supervise the nodeGenerating new transaction data

WhereinWhereinWhich represents the time at which the transaction was generated,a digital signature is represented for the transaction,represents a chain tag; furthermore, a supervisory nodeThe coordinate of the block where the transaction to be modified is located is also provided to the consensus nodeAnd modifying the identity information of the request originator

S4-4, recognizing according to a recognition mechanismNode-to-node transactionsAfter the verification is passed, according toAndquickly inquiring the transaction to be modified and then sending the transaction to be modifiedIs replaced byRecalculating the value of merklerootAt this time, the bright chain between the block and the subsequent block is broken due to the change in the value of merkleroot, andthe value of (d) remains unchanged, so the dark chain maintains the integrity of the subsidized chain; if it isIf the block is also changed, the block is indicated to be subjected to unauthorized tampering;

s4-5, qualified personWhen the real name is needed again, a modification request is sent, and the node is monitoredRelevant endorsement content can be obtained by searching a local database, and steps S4-1 to S4-3 are carried out after identity verification to complete real name modification. When the information is subjected to false information or public welfare disputes, the information can still be checked, and traceability and accountability are ensured.

Further, the specific step of S5 is:

s5-1, the person of interestInitiating a delete request

WhereinThe height of the dream block is the height of the dream block,a timestamp of the current request;

s5-2, supervision nodePerson receiving the informationAfter the sent deleting request, the current time is selected firstIf, ifIf the request is valid, then the uplink query obtains the transaction data

ComputingIf, ifIf yes, the identity of the person to be helped is credible; otherwise, the person is illegal orIf the value is subject to unauthorized tampering, the session is terminated;

s5-3, qualified personWhen the identity verification passes, the node is supervisedGenerating new transaction dataBroadcasting, and providing the height of the block to be modified

S5-4, according to the consensus mechanism, after the consensus node is verified, the block to be modified is deleted, specifically, the original block is deletedIs replaced byAnd recalculatedDue to this value change, for the dream chain, the latter blockCurrent block stored thereinThe first hash value is changed, and the second hash value is kept unchanged, so that the structure of the dream chain is kept complete; similarly, for the subsidy chain, the second hash value stored in the first subsidy block is unchanged, and the structure of the subsidy block is complete; because the transaction content on the subsidized chain does not contain the person to be subsidizedThe corresponding subsidy certificate is encrypted, only the subsidy node with the corresponding private key can see the corresponding subsidy certificate, and the subsidy person cannot be inquired by other nodesThe related information of (2).

Further, the consensus mechanism is a practical Byzantine fault-tolerant mechanism based on multi-factor voting, and the consensus nodes are a sponsor and a helped person; the common knowledge of the common knowledge node is obtained when the transaction is issued or modified on the chain, and the common knowledge node calculates the matching degree through synthesisSDSubsidy limitSACredit rating of the sponsorCSThree-factor voting before rank selectionThe consensus node of the bit participates in consensus, each timeAnd (5) when the hour changes, reorganizing the election voting.

Further, according to the consensus mechanism, the step of verifying the consensus node is as follows:

s6-1, when the matrix alliance chain is cold-started, the supervising nodeWriting the subsidized transaction information into the founding block; the key generation center KGC distributes independent block chain addresses to each nodePrivate keyAnd public keyThe public key of the sponsor is only to the monitorThe management node and the consensus node are public, the account address written into the block is public and visible, and the account address not written into the block is not displayed in the network;

s6-2, third party credit organization in supervision organizationTo newly joined subsidized nodeCredit awarding score(ii) a Supervision nodeReading sponsoring nodesCertificate of subsidization ofRecording the subsidy value of the nodeAccording to the type of subsidizationtypeCalculating subsidized matching degree score

S6-3, when entering into the voting time, the supervision nodeCalculating a composite score for the election node(ii) a Wherein the content of the first and second substances,is toThe result of the normalization processing is selected before the grade sortingThe node of the bit acts as a consensus node;

s6-4, after the first group of consensus nodes are generated, the method is carried outWithin the time, the consensus nodes sequentially act as the main nodes according to the ranking; master nodeSPSubsidized transaction to be validatedPacking the information into a block, generatingSending the data to other slave nodes; the next node behind the main node is a secondary main node, and is packed with the main node at the same time, and blocks generated by the main node can be sent out when the main node has errors;

s6-5, and the rest slave nodesAfter receiving the pre-prepared message sent by the main node, verifying the signature, and if the verification is passed and the block uplink is approved, sending a confirmation messageForwarding to other consensus nodes, and sending if overtime or disapproval

S6-6, after each consensus node receives the preparation message, when the number of the received effective preparation messages is large(maximum number of malicious nodes)) Calculate approvalAnd disfavorDetermining the number of tickets in the acknowledgment messageValue, node broadcast acknowledgement informationConfirmWhen an acknowledgement message is receivedIf so, executing the request;

s6-7, if the client receivesIf the responses are the same, the request initiated by the client side is proved to have the common consensus of the whole network, otherwise, the request needs to be sent again;is the number of system nodes, if the maximum number of malicious nodes allowed by the systemThen, it requires

S6-8, if the malicious node is found, updating the credit scoreWherein, in the step (A),and sending the credit to a third party credit facility(ii) a If it is finishedIf the node is in the round of consensus, the credit score of the node is updated to be

The invention has the beneficial effects that: 1. the method is different from the traditional subsidized public welfare mode, introduces the subsidizing type in the block subsidizing transaction of the method, adds the service subsidization, provides more subsidizing ways for the masses with more enthusiasm public welfare, fully exerts the enthusiasm of the subsidiaries and helps the subsidiaries more pertinently;

2. based on the scene classification subsidy mode, the consensus nodes are selected according to the subsidy matching degree, the credit value and other factors, so that each node is facilitated to participate in consensus, the influence of the credit value on the consensus is enhanced, the advantage that the node is easier to acquire the bookkeeping right due to multiple participation in the consensus is weakened, and the fair and justice of the consensus is facilitated;

3. based on the privacy protection of the sponsor and the sponsor, the sponsor and the sponsor can select to hide the personal real name information on the alliance chain through the optimized block chain structure so as to avoid being permanently recorded by the network and permanently concerned by the public; but can still ensure that the subsidizing and subsidized information is just public and transparent and traceable, and avoid public welfare disputes caused by false behaviors such as forged information or deception; on the premise of ensuring traceability, selecting whether real-name published rights are handed back to the user;

4. establishing a matrix alliance chain, and enabling a supervision node and a consensus node to quickly locate the position of a block to be modified in a transaction through coordinate information of the block on the chain and a down-chain index list, so that the improvement of block modification efficiency is facilitated;

5. an authoritative credit department, such as a Chinese people bank, a public security bureau or a payment treasure, is introduced to participate in supervision, endorsement authentication of dreams and dreams patrons is performed, credit scoring is granted to patrons, and when the patrons have distrust or malicious behaviors in a alliance chain, the credit is recorded in an integrity file of the real world at the same time, so that integrity of the patrons is facilitated to be used, and an effective credit feedback supervision mechanism is formed;

6. through a cryptographic method, any attacker cannot acquire real subsidy information or judge the real identity through the data operation of the dreams or the dreams, and the data privacy of the dreams and the dreams is protected.

Drawings

In order that the present invention may be more readily and clearly understood, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings.

FIG. 1 is a diagram of a model of the system of the present invention;

FIG. 2 is a block structure diagram;

FIG. 3 is a diagram of a matrix federation chain structure;

fig. 4 is a flow chart of the present invention.

Detailed Description

The important terms and constraints of the present invention are as follows:

federation chain: the block chain is a block chain type data structure which is not counterfeitable, difficult to tamper and traceable and is constructed through transparent and credible rules under a peer-to-peer network environment, and the mode of generating, accessing and using credible data is realized and managed. A federation chain generally refers to a chain formed by multiple parties after multiple entities reach a certain agreement or after a service federation is established, and members joining the federation chain need to be verified. The generation of each block is determined by all preselected nodes in common (preselected nodes participate in the consensus process), other access nodes can participate in the transaction, but no billing process is asked, and anyone else can make a qualified query through the API opened by the blockchain.

Matrix federation chain: the method comprises the steps of constructing a transverse chain (dream chain) and a longitudinal chain (subsidizing chain) in the alliance chain, wherein the transverse chain takes the height of a dream block as a transverse coordinate, the longitudinal chain takes the depth of the subsidizing block as a longitudinal coordinate, the unique position of the block in the alliance chain can be located through the block coordinate, and the practical meaning of the coordinate is a certain subsidizing behavior for a dream of a dream. This type of federation chain and block is called a "matrix federation chain" because its representational form is similar to a matrix.

A hash function: the binary value string with any length is mapped into the binary value string with fixed length, and the mapping rule is the hash algorithm. And the binary value string obtained after mapping through the original data is the hash value.

Tree: the Merkle tree is a hashed binary tree, which is a data structure used for rapid generalization and checking of large-scale data integrity. Such a binary tree contains cryptographic hash values. The term "tree" is commonly used in computer science to describe a data structure with branches.

A consensus mechanism: the consensus mechanism is that the transaction is verified and confirmed in a short time through the voting of special nodes; if several nodes with irrelevant interests can achieve consensus on a transaction, the whole network can be considered to achieve consensus on the node.

Practical Byzantine fault-tolerant algorithm: PBFT, Practical Byzantine factory Tolerance. PBFT is a practical consensus mechanism for implementing byzantine fault tolerance, where one node in the system is treated as the master node, while the other nodes are all child nodes. All nodes in the system communicate with each other, and the final goal is to achieve the consensus of data by a few principles subject to majority; PBFT requires a total number of nodes of

23页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:消费数据处理方法与系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!