Disclosure of Invention
The invention mainly aims to provide a hidden static supervision system and method for a block chain supply chain transaction, which aim to solve the technical problems of privacy disclosure and unsupervised caused by clear uplink of transaction data in the block chain supply chain.
To achieve the above object, a first aspect of the present invention provides a blockchain supply chain transaction hidden static supervision system, the system comprising:
The core enterprise node equipment is used for determining verification parameters conforming to EI Gamal promises based on payable promises of a core enterprise to a primary supplier and random numbers selected by the core enterprise, generating non-interactive zero knowledge proof parameters based on the random numbers by utilizing a hash function, signing transaction data comprising the verification parameters and the non-interactive zero knowledge proof parameters and uploading the transaction data to a block chain supply chain platform;
a primary supplier node device for receiving the transaction data using the blockchain supply chain platform and validating the validation parameters based on the non-interactive zero knowledge proof parameters;
a regulatory agency node device for acquiring verification parameters in the transaction data from the blockchain supply chain platform and determining the payable based on the verification parameters to realize the regulation of the payable;
the blockchain supply chain platform is used for storing transaction data.
According to an alternative embodiment of the present invention, the determining, by the core enterprise node device, verification parameters conforming to the EI Gamal commitment based on payable of the core enterprise commitment to the primary provider and the random number selected by the core enterprise includes:
Acquiring a first system parameter, a second system parameter and a third system parameter, wherein the third system parameter is a system parameter calculated by the supervision mechanism by using a private key;
determining a first verification parameter conforming to an ElGamal commitment by using the first system parameter, the second system parameter, the third system parameter, the payable and the selected first random number;
and determining a second verification parameter conforming to the El Gamal commitment by using the first system parameter, the second system parameter and the first random number.
According to an alternative embodiment of the present invention, the generating, by the core enterprise node device, the non-interactive zero knowledge proof parameter using a hash function based on the selected random number includes:
determining a first parameter to be hashed by using the first system parameter, the second system parameter, the third system parameter, the second random number and the third random number;
determining a second parameter to be hashed by using the first system parameter, the second system parameter and the second random number;
calculating hash results of the first parameter to be hashed and the second parameter to be hashed by using the hash function, and taking the hash results as challenge parameters;
The non-interactive zero-knowledge proof parameter is generated using the challenge parameter, the first random number, the second random number, the third random number, and the payable.
According to an alternative embodiment of the present invention, the supervisor node device obtaining the verification parameters in the transaction data from the blockchain supply chain platform and determining the payable based on the verification parameters to enable supervision of the payable comprises:
obtaining the first verification parameter and the second verification parameter from the blockchain supply chain platform;
determining the parameters of the payable by using the first verification parameter, the second verification parameter and the private key of the supervision authority node equipment;
determining the range of payable;
traversing each data within the range until payment due is determined that meets the payment due parameters.
According to an alternative embodiment of the present invention, the primary supplier node apparatus is further configured to:
splitting the UTXO in the transaction data into a first UTXO and a second UTXO, wherein the sum of the amount in the first UTXO and the amount in the second UTXO is equal to the amount in the UTXO;
Transaction is carried out with other block chain entity node equipment based on the first UTXO and the second UTXO;
the first UTXO and the second UTXO are range proven based on the bulettproof.
According to an alternative embodiment of the present invention, the primary supplier node device or the other blockchain entity node device is further configured to honor the payment to the core enterprise node device when the payment is due, and in response to successful redemption of the payment, to invalidate the signature of the UTXO held or return to the core enterprise node device.
According to an alternative embodiment of the invention, the system further comprises:
and the at least one risk assessment mechanism node device is used for reading the transaction data stored on the blockchain supply chain platform, performing risk assessment on the transaction data by using a pre-trained risk assessment model, and transmitting a risk assessment result to the other blockchain entity node devices.
To achieve the above object, a second aspect of the present invention provides a blockchain supply chain transaction hidden static supervision method, the method comprising:
determining verification parameters conforming to EI Gamal promise based on payable promise of a core enterprise to a primary supplier and random numbers selected by the core enterprise through core enterprise node equipment, generating non-interactive zero knowledge proof parameters based on the random numbers by utilizing a hash function, signing transaction data comprising the verification parameters and the non-interactive zero knowledge proof parameters, and uploading the transaction data to a block chain supply chain platform;
Receiving, by a primary supplier node device, the transaction data using the blockchain supply chain platform and validating the validation parameters based on the non-interactive zero knowledge proof parameters;
and acquiring verification parameters in the transaction data from the blockchain supply chain platform through a supervision agency node device, and realizing supervision of payable in the verification parameters based on the non-interactive zero-knowledge proof parameters.
According to an alternative embodiment of the invention, the method further comprises:
splitting the UTXO in the transaction data into a first UTXO and a second UTXO by the primary provider node device, wherein the sum of the amount in the first UTXO and the amount in the second UTXO is equal to the amount in the UTXO;
transaction is carried out with other block chain entity node equipment based on the first UTXO and the second UTXO;
the first UTXO and the second UTXO are range proven based on the bulettproof.
According to an alternative embodiment of the invention, the method further comprises:
and reading transaction data stored on the blockchain supply chain platform through at least one risk assessment mechanism node device, performing risk assessment on the transaction data by using a pre-trained risk assessment model, and transmitting risk assessment results to other blockchain entity node devices.
According to the hidden static supervision system and method for the blockchain supply chain transaction, disclosed by the embodiment of the invention, by introducing the concepts of EI Gamal promise and non-interactive zero knowledge proof, plaintext payable of a core enterprise is encrypted into confidential transaction and is uplink, only two parties of the transaction can decrypt the amount in the confidential transaction, the transaction privacy is protected from being revealed, and the business confidentiality of a blockchain entity is guaranteed. And after the supervision organization obtains the first verification parameter and the second verification parameter, the same parameter is counteracted by calculation and brought into the private key of the supervision organization to determine the transaction data, so that the supervision of the transaction data is realized.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms first and second in the description and claims of the present application and in the above-described figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
FIG. 1 is a schematic diagram of a hidden static supervision system for a blockchain supply chain transaction according to an embodiment of the invention.
The blockchain supply chain transaction hiding static supervisory system 1 may include, but is not limited to: a blockchain supply chain platform 10, a core enterprise node device 11, a primary supplier node device 12, other blockchain entity node devices 13, and a regulatory agency node device 14.
In an alternative embodiment, the other blockchain entity node device 13 may include one or more of the following combinations: secondary provider node devices 13, bank node devices 13, and manager node devices 13. The core enterprise, primary supplier, secondary supplier, bank, and manager are all referred to as blockchain entities. The core enterprise node device 11, the primary supplier node device 12, the secondary supplier node device 13, the bank node device 13, and the manager node device 13 are referred to as blockchain entity node devices.
The blockchain entity applies for digital certificates from certificate authorities (Certificate Authority, CA) prior to accessing the blockchain supply chain platform 10. After the CA judges the identity of the applicant, a public key is allocated to the applicant, and meanwhile, the allocated public key is associated with the identity information of the applicant and signed to form a digital certificate to be sent to the applicant. Subsequently, when a blockchain entity accesses the blockchain supply chain platform 10, the blockchain supply chain platform 10 verifies the signature on the digital certificate of the accessed blockchain entity using the public key of the CA, and when the verification passes, the digital certificate is considered valid, allowing the blockchain entity to access the blockchain supply chain platform 10, and when the verification fails, the digital certificate is considered invalid, denying the blockchain entity to access the blockchain supply chain platform 10. The content of the digital certificate comprises: information of the electronic visa, public key user information, public key, signature and expiration date, and the like.
In some embodiments, the core enterprise node device 11 is configured to determine a verification parameter according to the EI Gamal commitment based on a payable by the core enterprise commitment to the primary vendor and a random number selected by the core enterprise, generate a non-interactive zero knowledge proof parameter based on the random number using a hash function, sign transaction data including the verification parameter and the non-interactive zero knowledge proof parameter, and upload the transaction data to the blockchain supply chain platform 10.
Illustratively, the core enterprise purchases the primary supplier's products and commits to payouts, the primary supplier may purchase the secondary supplier's products based on a portion of the payouts, the secondary supplier may further split the payouts committed by the primary supplier to purchase the other secondary supplier's products, and so on. The manager may purchase payable held by the primary and secondary suppliers. The bank may provide a loan based on the payable of the provider.
In order to avoid the trade privacy being revealed, after the core enterprise purchases the product of the primary supplier and promises to pay, the core enterprise encrypts the pay through the core enterprise node device 11 to obtain confidential trade, so that the trade privacy between the core enterprise and the primary supplier is ensured.
In an alternative embodiment, the determining, by the core enterprise node device 11, the verification parameter that meets the EI Gamal commitment based on the payable of the core enterprise commitment to the primary provider and the random number selected by the core enterprise includes:
acquiring a first system parameter g, a second system parameter n and a third system parameter h, wherein the third system parameter h is a system parameter calculated by the supervision mechanism by using a private key t;
using the first system parameter g, the firstTwo system parameters n, the third system parameter h, the payable x and the selected first random number r determine a first verification parameter e=g conforming to ElGamal promise x h r modn;
Determining a second verification parameter f=g conforming to the El Gamal promise using the first system parameter g, the second system parameter n and the first random number r r modn。
In this alternative embodiment, the first system parameter g, the second system parameter n, and the third system parameter h are all disclosed parameters. The first system parameter g is elliptic curve group generator, the second system parameter n may be a natural number, and the third system parameter h=g t mod n. The first random number r is a number randomly selected by the core enterprise. Since the first verification parameter E and the second verification parameter F are both encrypted data, and the payment x cannot be determined directly by the first verification parameter E and the second verification parameter F, the core enterprise node device 11 uploads the first verification parameter E and the second verification parameter F to the blockchain supply chain platform 10, and after obtaining the transaction data, the primary supplier node device 12 may obtain the first verification parameter E and the second verification parameter F, and use the eigamal promise to verify the authenticity of the transaction data.
In an alternative embodiment, the generating the non-interactive zero knowledge proof parameter by the core enterprise node device 11 using a hash function based on the selected random number includes:
determining a first to-be-hashed parameter w1=g using the first system parameter g, the second system parameter n, the third system parameter h, the second random number ω, and the third random number σ σ h ω modn;
Determining a second to-be-hashed parameter w2=g using the first system parameter g, the second system parameter n, and the second random number ω ω modn;
Calculating hash results of the first parameter to be hashed and the second parameter to be hashed by utilizing the hash function H (), and taking the hash results as challenge parameters c=H (W1||W2);
the challenge parameter c, the first random number r, the second random number ω, the third random number σ, and the payable x are used to generate the non-interactive zero knowledge proof parameter (c, D1), wherein d=ω+cr, d1=σ+cx.
In some embodiments, primary supplier node device 12 is configured to receive the transaction data using the blockchain supply chain platform and verify the verification parameters based on the non-interactive zero-knowledge proof parameters.
Specifically, the primary supplier node device 12 receives the non-interactive zero knowledge proof parameter (c, D1), verifies if c=h (g D1 h D E D-C modn||g D F -C mod n), if the verification passes, the verifier confirms that E and F hide the same first random number r. The primary supplier node apparatus 12 verifies the authenticity of the first verification parameter and the second verification parameter by means of non-interactive zero knowledge proof, thereby ensuring that the payable obtained by calculation of the first verification parameter and the second verification parameter is the real data.
The primary supplier receives the verification parameters transmitted from the core enterprise node device 11 through the primary supplier node device 12 as a receiver of the payment by the core enterprise. The core enterprise may inform the primary provider of the payment x and the first random number r by means of key agreement or the like.
In an alternative embodiment, the primary provider node device 12 is further configured to split the UTXOs in the transaction data into a first UTXO and a second UTXO, and perform transactions with other blockchain entity node devices based on the first UTXO and the second UTXO.
The primary supplier node apparatus 12 transmits transaction data to the blockchain supply chain platform 10 for storage.
In this alternative embodiment, the sum of the amount in the first UTXO and the amount in the second UTXO is equal to the amount in the UTXO.
The primary supplier can split UTXO in the confidential transaction and then send the split UTXO to the secondary supplier, the guarantee manager or a mortgage through a bank. The split UTXO received by the secondary vendor, the guarantee provider, or the bank may further split and transact. Once the split UTXO is used, the original UTXO is no longer available, but transaction data regarding the original UTXO is still recorded on the blockchain supply chain platform for traceability and querying.
In an alternative embodiment, the primary supplier node device 12 is further configured to perform range attestation for the first UTXO and the second UTXO based on a bumetproof.
In this alternative embodiment, when one UTXO0 is split into UTXO1 and UTXO2, the addition homomorphism promised by petersen may be used to obtain utxo0=utxo1+utxo2, and the bulettproof algorithm may be used to prove that the amounts in the split utxo1 and UTXO2 are both legal values, i.e., the amounts in the UTXOs are positive numbers within a certain range.
Exemplary, assume thatThe holder of the UTXO can split it into UTXO 1 And UTXO 2 . Using additive homomorphism yields: /> From this, x is 0 =x 1 +x 2 Thus, the sum of the amounts in the two UTXOs is ensured to be equal to the amount hidden by the original UTXO. At the same time, a range certificate is generated by using the Bulletproof algorithm for proving UTXO 1 And UTXO 2 The amount of (3) is within a reasonable range. For example, the range of the amount may be set to [0,2≡32-1]. The process of generating the scope proof for the Bulletproof algorithm is the prior art, and the present invention is not described in detail.
It should be noted that, in the above embodiment, the UTXOs are split into two sub-UTXOs, which may be split into 3 or more parts by the primary provider node device, so as to perform transactions with the secondary provider more flexibly.
In an alternative embodiment, the primary supplier node device 12 or the other blockchain entity node device 13 is further configured to redeem the payable for the core enterprise node device when the payable expires, and in response to successful redemption of the payable, to invalidate the signature of the UTXO held or return to the core enterprise node device.
The UTXO is marked with an expiration time stamp for the payable.
When the blockchain entity (e.g., primary supplier, secondary supplier, manager, bank, etc.) holding the UTXO determines, via the respective node device, that the payment should expire, the payment may be honored to the core enterprise node device 11 via transaction data recorded on the blockchain supply chain platform 10.
When the core enterprise receives the information of the redemption payment through the core enterprise node device 11, it is confirmed whether the payment has expired. After confirming that the payment due, the debt is paid. The blockchain entity after receipt of the debt signs the receipt of the debt. The blockchain entity holding the UTXO, either simultaneously with or after receiving the debt, invalidates the signature of the UTXO held by itself or returns it to the core business, forming complete transaction data record on the blockchain supply chain platform 10.
The supervisor node device 14 is configured to obtain verification parameters in the transaction data from the blockchain supply chain platform 10, and implement, based on the non-interactive zero-knowledge proof parameters, supervision of payable payments in the verification parameters.
In an alternative embodiment, the supervisor node device 14 obtains the verification parameters in the transaction data from the blockchain supply chain platform, and implementing the supervision of payable amounts in the verification parameters based on the non-interactive zero-knowledge proof parameters includes:
Obtaining the first verification parameter and the second verification parameter from the blockchain supply chain platform;
determining the parameters of the payable by using the first verification parameter, the second verification parameter and the private key of the supervision authority node equipment;
determining the range of payable;
traversing each data within the range until payment due is determined that meets the payment due parameters.
Specifically, e=g x h r modn,F=g r mod n, the parameter g including transaction data can be determined by calculation of x Since in blockchain transactions the transaction data is typically within a limited data range, substituting the data into x by traversing each data within the data range until a data value of g is obtained x X, which is the transaction data, is the value of the coincidence of x.
g x =E/(F t )=g x h r /(g r ) t =g x h r /h r =g x 。
Therefore, the first verification parameter E and the second verification parameter F have the same first system parameter, second system parameter and first random number, and the third system parameter in the first verification parameter is generated by the private key of the supervision-organization node equipment, so that the supervision-organization node equipment can counteract the same parameters through calculation and bring the same parameters into the private key to determine payment, and supervision of corresponding payment is realized. In a blockchain supply chain transaction, payable typically is within a limited data range, and data is brought into payable x by traversing each data within the data range until a sum g is obtained x X, which is the payment due.
It should be noted that the blockchain supply chain transaction conceals that the blockchain supply chain platform 10, the core enterprise node device 11, the primary supplier node device 12, the regulatory agency node device 14, and the other blockchain entity node device 13 in the static regulatory system 1 must exist, and that the other blockchain entity node device 13 may exist. That is, secondary supplier node devices, banking node devices, and underwriter node devices optionally reside in the blockchain supply chain transaction hiding static supervisory system 1.
FIG. 2 is a schematic diagram of a hidden static supervision system for a blockchain supply chain transaction according to an embodiment of the invention.
The blockchain supply chain transaction hiding static supervisory system 1 may include at least one risk assessment agency node device 15 in addition to the blockchain supply chain platform 10, the core enterprise node device 11, the primary supplier node device 12, the other blockchain entity node devices 13, the supervisory agency node device 14 described in fig. 1.
The at least one risk assessment mechanism node device 15 is configured to read transaction data stored on the blockchain supply chain platform 10, perform risk assessment on the transaction data using a pre-trained risk assessment model, and send a risk assessment result to the other blockchain entity node devices 13.
The at least one risk assessment institution node facility 15 may obtain historical transaction data recorded on the blockchain supply chain platform 10 in advance and train a risk assessment model based on the historical transaction data to assess the value of payable in each transaction data.
When at least one risk assessment mechanism node device 15 reads newly recorded transaction data on the blockchain supply chain platform 10, a risk assessment model is used to assess the value of payable in the newly recorded transaction data and send the risk assessment result to a potential purchaser of the UTXO (i.e., payable of the core enterprise) corresponding to the transaction data. The potential purchaser may include, but is not limited to, a secondary supplier, a manager, a bank, etc.
After the secondary provider, the insurance provider, the bank and the like acquire the risk assessment result, the secondary provider, the insurance provider, the bank and the like can select to conduct transactions with the holder of the UTXO, and finally the cashing process of the payable is completed.
In some embodiments, the blockchain supply chain platform 10 may be any UTXO model-based blockchain system as well as blockchain systems that support UTXO account models.
In some embodiments, the blockchain supply chain system 1 may further include: the system comprises a data decryption module, a UTXO (universal time-stamp-of-XO) amount range proving module, a blockchain wallet, a light-weight wallet, a statistical analysis tool, an entity list and the like.
According to the blockchain supply chain privacy transaction static supervision system, by introducing the concepts of EI Gamal promise and non-interactive zero knowledge proof, plaintext payable of a core enterprise is encrypted into confidential transaction and is linked up, only transaction parties can decrypt the amount in the confidential transaction, transaction privacy is protected from being revealed, and blockchain entity business confidentiality is guaranteed. And after the supervision organization obtains the first verification parameter and the second verification parameter, the same parameter is counteracted by calculation and brought into the private key of the supervision organization to determine the transaction data, so that the supervision of the transaction data is realized.
Referring to fig. 3, a flow chart of a hidden static supervision method for blockchain supply chain transactions according to an embodiment of the invention is shown.
The blockchain supply chain transaction hiding static supervision system specifically comprises the following steps, the sequence of the steps in the flow chart can be changed according to different requirements, and certain steps can be omitted.
S31, determining verification parameters conforming to the EI Gamal promise by the core enterprise node equipment based on payable of the core enterprise promise to the primary supplier and the random number selected by the core enterprise.
The core enterprise purchases the products of the primary supplier and commits to pay, the primary supplier can purchase the products of the secondary supplier based on a portion of the payable, the secondary supplier can further split the payable committed by the primary supplier and purchase the products of other secondary suppliers, and so on. The manager may purchase payable held by the primary and secondary suppliers. The bank may provide a loan based on the payable of the provider.
In order to avoid the trade privacy being revealed, after the core enterprise purchases the product of the primary supplier and promises to pay, the core enterprise encrypts the pay through the core enterprise node device 11 to obtain confidential trade, so that the trade privacy between the core enterprise and the primary supplier is ensured.
In an alternative embodiment, the determining, by the core enterprise node device 11, the verification parameter that meets the EI Gamal commitment based on the payable of the core enterprise commitment to the primary provider and the random number selected by the core enterprise includes:
acquiring a first system parameter g, a second system parameter n and a third system parameter h, wherein the third system parameter h is a system parameter calculated by the supervision mechanism by using a private key t;
determining a first verification parameter e=g conforming to ElGamal commitment using the first system parameter g, the second system parameter n, the third system parameter h, the payable x and the selected first random number r x h r modn;
Determining a second verification parameter f=g conforming to the El Gamal promise using the first system parameter g, the second system parameter n and the first random number r r modn。
In this alternative embodiment, the first system parameter g, the second system parameter n, and the third system parameter h are all disclosed parameters. The first system parameter g is elliptic curve group generator, the second system parameter n may be a natural number, and the third system parameter h=g t mod n. The first random number r is a number randomly selected by the core enterprise. Since the first verification parameter E and the second verification parameter F are both encrypted data, and the payment x cannot be determined directly by the first verification parameter E and the second verification parameter F, the core enterprise node device 11 uploads the first verification parameter E and the second verification parameter F to the blockchain supply chain platform 10, and after obtaining the transaction data, the primary supplier node device 12 may obtain the first verification parameter E and the second verification parameter F, and use the eigamal promise to verify the authenticity of the transaction data.
S32, generating a non-interactive zero knowledge proof parameter by the core enterprise node equipment based on the random number by utilizing a hash function.
The core enterprise node equipment adopts the non-interactive zero-knowledge proof parameter to generate the challenge parameter, and the supervision mechanism node equipment and the primary supplier node equipment can directly acquire the challenge parameter, so that the follow-up verification of the first verification parameter and the second verification parameter is more convenient.
In an alternative embodiment, the generating the non-interactive zero knowledge proof parameter by the core enterprise node device 11 using a hash function based on the selected random number includes:
Determining a first to-be-hashed parameter w1=g using the first system parameter g, the second system parameter n, the third system parameter h, the second random number ω, and the third random number σ σ h ω modn;
Determining a second to-be-hashed parameter w2=g using the first system parameter g, the second system parameter n, and the second random number ω ω modn;
Calculating hash results of the first parameter to be hashed and the second parameter to be hashed by utilizing the hash function H (), and taking the hash results as challenge parameters c=H (W1||W2);
the challenge parameter c, the first random number r, the second random number ω, the third random number σ, and the payable x are used to generate the non-interactive zero knowledge proof parameter (c, D1), wherein d=ω+cr, d1=σ+cx.
S33, signing transaction data comprising the verification parameters and the non-interactive zero knowledge proof parameters through the core enterprise node equipment and uploading the transaction data to a blockchain supply chain platform.
The core enterprise signs the verification parameters and the non-interactive zero-knowledge proof parameters by using a digital signature technology through the core enterprise node equipment. The digital signature technology is based on the authentication of the information source and the integrity realized by an asymmetric encryption algorithm and a message digest algorithm, and is also the guarantee that a signer cannot repudiate. There are two roles in a digital signature system, one is the signer of a message and one is the authenticator of a message. The signer of the message can sign the information abstract of a message according to the private key of the signer, and the authenticator of the message verifies the information abstract of a message according to the public key of the signer. If the verification is passed, the source of the message may prove to be the signer of the message, the message digest of the message is the same and the signer is not repudiated.
And S34, receiving the transaction data through the primary provider node equipment and verifying the verification parameters based on the non-interactive zero-knowledge proof parameters.
The primary supplier node device 12 receives the non-interactive zero knowledge proof parameter (c, D1), verifies if c=h (g D1 h D E D-C modn||g D F -C mod n), if the verification passes, the verifier confirms that E and F hide the same first random number r. The primary supplier node apparatus 12 verifies the authenticity of the first verification parameter and the second verification parameter by means of non-interactive zero knowledge proof, thereby ensuring that the payable obtained by calculation of the first verification parameter and the second verification parameter is the real data.
S35, acquiring verification parameters in the transaction data from the blockchain supply chain platform through a supervision agency node device, and supervising payable in the verification parameters based on the non-interactive zero knowledge proof parameters.
In an alternative embodiment, the supervisor node device 14 obtains the verification parameters in the transaction data from the blockchain supply chain platform and implements the supervision of payable of the verification parameters based on the non-interactive zero-knowledge proof parameters comprising:
Obtaining the first verification parameter and the second verification parameter from the blockchain supply chain platform;
determining the parameters of the payable by using the first verification parameter, the second verification parameter and the private key of the supervision authority node equipment;
determining the range of payable;
traversing each data within the range until payment due is determined that meets the payment due parameters.
Specifically, e=g x h r modn,F=g r mod n, the parameter g including transaction data can be determined by calculation of x Since in blockchain transactions, the transaction data is typically within a limited data range, by traversing each data within the data range, substituting the data into the datax until it is equal to g x X, which is the transaction data, is the value of the coincidence of x.
g x =E/(F t )=g x h r /(g r ) t =g x h r /h r =g x 。
Therefore, the first verification parameter E and the second verification parameter F have the same first system parameter, second system parameter and first random number, and the third system parameter in the first verification parameter is generated by the private key of the supervision-organization node equipment, so that the supervision-organization node equipment can counteract the same parameters through calculation and bring the same parameters into the private key to determine payment, and supervision of corresponding payment is realized. In a blockchain supply chain transaction, payable typically is within a limited data range, and data is brought into payable x by traversing each data within the data range until a sum g is obtained x X, which is the payment due.
In an alternative embodiment, the method further comprises:
splitting the UTXO in the transaction data into a first UTXO and a second UTXO by the primary provider node device, wherein the sum of the amount in the first UTXO and the amount in the second UTXO is equal to the amount in the UTXO;
transaction is carried out with other block chain entity node equipment based on the first UTXO and the second UTXO;
the first UTXO and the second UTXO are range proven based on the bulettproof.
The primary supplier can split UTXO in the confidential transaction and then send the split UTXO to the secondary supplier, the guarantee manager or a mortgage through a bank. The split UTXO received by the secondary vendor, the guarantee provider, or the bank may further split and transact. Once the split UTXO is used, the original UTXO is no longer available, but transaction data regarding the original UTXO is still recorded on the blockchain supply chain platform for traceability and querying.
In this alternative embodiment, when one UTXO0 is split into UTXO1 and UTXO2, the addition homomorphism promised by petersen may be used to obtain utxo0=utxo1+utxo2, and the bulettproof algorithm may be used to prove that the amounts in the split utxo1 and UTXO2 are both legal values, i.e., the amounts in the UTXOs are positive numbers within a certain range.
Exemplary, assume thatThe holder of the UTXO can split it into UTXO 1 And UTXO 2 . Using additive homomorphism yields: /> From this, x is 0 =x 1 +x 2 Thus, the sum of the amounts in the two UTXOs is ensured to be equal to the amount hidden by the original UTXO. At the same time, a range certificate is generated by using the Bulletproof algorithm for proving UTXO 1 And UTXO 2 The amount of (3) is within a reasonable range. The range of the amount is set to be [0, 2-32-1 ]]. The process of generating the scope proof for the Bulletproof algorithm is the prior art, and the present invention is not described in detail.
In an alternative embodiment, the method further comprises:
and reading transaction data stored on the blockchain supply chain platform through at least one risk assessment mechanism node device, performing risk assessment on the transaction data by using a pre-trained risk assessment model, and transmitting risk assessment results to other blockchain entity node devices.
When at least one risk assessment mechanism node device 15 reads newly recorded transaction data on the blockchain supply chain platform 10, a risk assessment model is used to assess the value of payable in the newly recorded transaction data and send the risk assessment result to a potential purchaser of the UTXO (i.e., payable of the core enterprise) corresponding to the transaction data. The potential purchaser may include, but is not limited to, a secondary supplier, a manager, a bank, etc.
After the secondary provider, the insurance provider, the bank and the like acquire the risk assessment result, the secondary provider, the insurance provider, the bank and the like can select to conduct transactions with the holder of the UTXO, and finally the cashing process of the payable is completed.
In some embodiments, the blockchain supply chain platform 10 may be any UTXO model-based blockchain system as well as blockchain systems that support UTXO account models.
According to the blockchain supply chain privacy transaction static supervision method, by introducing the concepts of EI Gamal promise and non-interactive zero knowledge proof, plaintext payable of a core enterprise is encrypted into confidential transaction and is linked up, only transaction parties can decrypt the amount in the confidential transaction, transaction privacy is protected from being revealed, and blockchain entity business confidentiality is guaranteed. And after the supervision organization obtains the first verification parameter and the second verification parameter, the same parameter is counteracted by calculation and brought into the private key of the supervision organization to determine the transaction data, so that the supervision of the transaction data is realized.
FIG. 4 is a schematic diagram illustrating an internal structure of a blockchain node device according to an embodiment of the present invention.
In this embodiment, the blockchain node device 4 may include a memory 41, a processor 42, and a bus 43 and transceiver 44.
The blockchain node device 4 may be a core enterprise node device, a regulatory agency node device, or a primary supplier node device, other blockchain entity (e.g., secondary supplier, bank, manager) node device, or the like. When the blockchain node device 4 is a core enterprise node device, executing the functions of the core enterprise node device described in the first embodiment or the second embodiment; when the blockchain node device 4 is a supervisory mechanism node device, executing the function of the supervisory mechanism node device described in the first embodiment or the second embodiment; when the blockchain node device 4 is a primary provider node device, performing the function of the primary provider node device described in the first or second embodiment; when the blockchain node device 4 is another blockchain entity node device, the functions of the other blockchain entity node device described in the first embodiment or the second embodiment are executed.
The memory 41 includes at least one type of readable storage medium including flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 41 may in some embodiments be an internal storage unit of the blockchain node device 4, such as a hard disk of the blockchain node device 4. The memory 41 may also be an external storage device of the blockchain node device 4 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like, which are provided on the blockchain node device 4. Further, the memory 41 may also include both internal storage units and external storage devices of the blockchain node device 4. The memory 41 may be used not only for storing application programs and various types of data installed in the blockchain node device 4, but also for temporarily storing data that has been output or is to be output.
The processor 42 may in some embodiments be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor for executing program code or processing data stored in the memory 41.
The bus 43 may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, or the like. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in fig. 4, but not only one bus or one type of bus.
Further, the blockchain node device 4 may also include a network interface, which may optionally include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), typically used to establish a communication connection between the blockchain node device 4 and other scheduling servers.
Optionally, the block link point device 4 may further comprise a user interface, which may comprise a Display, an input unit, such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an Organic Light-Emitting Diode (OLED) touch, or the like. The display may also be referred to as a display screen or a display unit for displaying messages processed in the scheduling server and for displaying a visual user interface.
Fig. 4 shows only the blockchain node device 4 with components 41-44, it will be understood by those skilled in the art that the configuration shown in fig. 4 is not limiting of the blockchain node device 4, either as a bus-type configuration or as a star-type configuration, and that the blockchain node device 4 may include fewer or more components than shown, or may incorporate some components, or a different arrangement of components. Other electronic products that may be present in the present invention or may later come into existence, as applicable, are also within the scope of the present invention and are incorporated herein by reference.
In the above embodiments, it may be implemented in whole or in part by an application, hardware, firmware, or any combination thereof. When implemented using an application, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in application program functional units.
The integrated units, if implemented in the form of application functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all or part of the technical solution contributing to the prior art, or in the form of an application program product stored in a storage medium, including several instructions for causing a scheduling server (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a hard disk, a Read-Only Memory (ROM), a magnetic disk, an optical disk, or the like, which can store program codes.
It should be noted that, the foregoing reference numerals of the embodiments of the present invention are merely for describing the embodiments, and do not represent the advantages and disadvantages of the embodiments.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.