Ciphertext analysis method and system for data transaction
1. A ciphertext parsing system for data transactions, comprising:
the data encryption module is used for registering and simultaneously encrypting the data assets, and the registered data asset information forms a registration block chain;
the data security module is used for performing data security on the data assets, and the data asset information after the security forms a security block chain;
the data evaluation module is used for carrying out price evaluation on the data assets by using an AHP analysis method, and the evaluated data asset information forms an evaluation block chain;
the platform establishing module is used for connecting the registration block chain, the preservation block chain and the evaluation block chain to form a block chain rope network through the block chain and a CA algorithm, and establishing a data transaction platform based on the block chain rope network;
the ciphertext analysis module is used for acquiring the block containing the variable information from the data transaction platform, analyzing the block containing the variable information, acquiring a ciphertext message and a ciphertext list of the variable information, and acquiring a plaintext message of the variable information according to the ciphertext list and the ciphertext message; the variable information is divided into regular quality sensitivity variable information and regular quantity sensitivity variable information.
2. The ciphertext parsing system for data transaction as claimed in claim 1, wherein the ciphertext parsing module is configured to obtain the corresponding key ciphertext and the public key used for encryption from the ciphertext list, and decrypt the key ciphertext according to the corresponding private key of the public key used for encryption to obtain the transaction key; and the ciphertext analysis module decrypts the ciphertext message by using the transaction key to obtain the plaintext message of the variable information.
3. The ciphertext parsing system of claim 2, wherein the ciphertext parsing module is configured to obtain the plurality of public keys in sequence, perform asymmetric encryption on the transaction key using the public keys to obtain corresponding key ciphertexts, and compose the plurality of key ciphertexts into a ciphertext list.
4. A ciphertext parsing system for data transaction as claimed in claim 3, wherein the ciphertext parsing module is configured to generate a random number as a transaction key of the plaintext message, and symmetrically encrypt the plaintext message according to the transaction key to obtain a ciphertext message corresponding to the changeable information.
5. The ciphertext parsing method for data transaction is characterized by comprising the following steps:
s1, registering and simultaneously encrypting the data assets, wherein the registered data asset information forms a registration block chain;
s2, carrying out data preservation on the data assets, and forming a preservation block chain by the preserved data asset information;
s3, carrying out price evaluation on the data assets by adopting an AHP analysis method, and forming an evaluation block chain by the evaluated data asset information;
s4, connecting the registration block chain, the preservation block chain and the evaluation block chain by adopting a block chain and CA algorithm to form a block chain rope network, and establishing a data transaction platform based on the block chain rope network;
s5, acquiring a block containing variable information from the data transaction platform, analyzing the block containing variable information, acquiring a ciphertext message and a ciphertext list of the variable information, and acquiring a plaintext message of the variable information according to the ciphertext list and the ciphertext message; the variable information is divided into regular quality sensitivity variable information and regular quantity sensitivity variable information.
6. The ciphertext parsing method for data transaction as claimed in claim 5, wherein in S5, the corresponding key ciphertext and the public key used for encryption are obtained from the ciphertext list, and the key ciphertext is decrypted according to the corresponding private key of the public key used for encryption to obtain the transaction key; and the transaction key is used for decrypting the ciphertext message to obtain the plaintext message of the variable information.
7. The ciphertext parsing method for data transaction as claimed in claim 6, wherein in S5, the plurality of public keys are sequentially obtained, the transaction key is asymmetrically encrypted using the public keys to obtain corresponding key ciphertexts, and the plurality of key ciphertexts are combined into the ciphertext list.
8. The ciphertext parsing method for data transaction as claimed in claim 7, wherein in S5, a random number is generated as a transaction key of the plaintext message, and the plaintext message is symmetrically encrypted according to the transaction key to obtain the ciphertext message corresponding to the changeable information.
Background
With the rapid development of information technology, big data has become a new element of social development, a new engine of industrial development and a new power for governing modernization, and various business opportunities can be obtained by reasonably utilizing the big data, so that the data has become a necessary development trend as a new asset. Because the data type, the real-time performance, the reliability, the quantity, the quality, the format, the acquirability and the cross-border degree are different, the data pricing is very complex and lacks the standard specification, and a unified and standardized pricing model and strategy are established, thereby being beneficial to forming a reasonable data price range and forming a relatively reasonable data price system.
To this end, the chinese patent discloses a block chain-based data asset transaction method, including the steps of: carrying out data asset registration encryption, registering data assets, encrypting the data assets at the same time of registration, and forming a registration block chain by the registered data asset information; performing data preservation on the processed data assets, and forming a preservation block chain by the preserved data asset information; carrying out data asset price evaluation on the processed data assets by using an AHP analysis method, and forming an evaluation block chain by using the evaluated data asset information; and connecting the registration block chain, the preservation block chain and the evaluation block chain to form a block chain rope network in a block chain CA algorithm authentication mode, and establishing a data transaction platform based on the block chain rope network.
In the technical scheme, each area chain is connected into a block chain rope network through a CA algorithm authentication mode, a data transaction platform is established based on the block chain rope network, a directly usable data asset transaction platform is provided, and the safety of data assets can be ensured. However, the key variable information is not encrypted in the transaction, which may possibly result in the variable information being exposed, and thus, the application range in the commercial field is limited.
Disclosure of Invention
The invention provides a ciphertext analysis method and system for data transaction, which solve the technical problem that the prior art may cause variable information exposure.
The basic scheme provided by the invention is as follows: a ciphertext parsing system for data transactions, comprising:
the data encryption module is used for registering and simultaneously encrypting the data assets, and the registered data asset information forms a registration block chain;
the data security module is used for performing data security on the data assets, and the data asset information after the security forms a security block chain;
the data evaluation module is used for carrying out price evaluation on the data assets by using an AHP analysis method, and the evaluated data asset information forms an evaluation block chain;
the platform establishing module is used for connecting the registration block chain, the preservation block chain and the evaluation block chain to form a block chain rope network through the block chain and a CA algorithm, and establishing a data transaction platform based on the block chain rope network;
the ciphertext analysis module is used for acquiring the block containing the variable information from the data transaction platform, analyzing the block containing the variable information, acquiring a ciphertext message and a ciphertext list of the variable information, and acquiring a plaintext message of the variable information according to the ciphertext list and the ciphertext message; the variable information is divided into regular quality sensitivity variable information and regular quantity sensitivity variable information.
The working principle and the advantages of the invention are as follows: adopting a block chain and a CA algorithm to link a registration block chain, a security block chain and an evaluation block chain to form a block chain rope network, and establishing a data transaction platform based on the block chain rope network; and acquiring a block containing variable information from the data transaction platform, analyzing the block containing the variable information, acquiring a ciphertext message and a ciphertext list of the variable information, and acquiring a plaintext message of the variable information according to the ciphertext list and the ciphertext message. In this way, the transaction key randomly generated in each transaction can be used for encrypting the plaintext of the variable information, and the exposure risk of the variable information is reduced.
The invention encrypts the variable information plaintext by using the transaction key randomly generated in each transaction, reduces the risk of variable information exposure, and solves the technical problem that the variable information exposure may be caused in the prior art.
Further, the ciphertext analysis module is used for acquiring a corresponding key ciphertext and a public key used for encryption from the ciphertext list, and decrypting the key ciphertext according to a corresponding private key of the public key used for encryption to acquire a transaction key; and the ciphertext analysis module decrypts the ciphertext message by using the transaction key to obtain the plaintext message of the variable information.
Has the advantages that: firstly, decrypting a key ciphertext according to a private key to obtain a transaction key; then, the transaction key is used for decrypting the ciphertext message to obtain a plaintext message of the variable information; the whole decryption process comprises two processes, and the plaintext message of the variable information can be obtained only if the two processes are successfully decrypted, so that the difficulty of decryption can be improved and the leakage risk of the variable information can be reduced in each transaction.
Further, the ciphertext analysis module is used for sequentially obtaining a plurality of public keys, asymmetrically encrypting the transaction key by using the public keys to obtain a corresponding key ciphertext, and forming a ciphertext list from the plurality of key ciphertexts.
Has the advantages that: the public key is used for carrying out asymmetric encryption on the transaction key, a public key (public key) and a corresponding private key (private key) are required in the encryption process, and if the public key is used for carrying out encryption, only the corresponding private key can be used for decryption; on the contrary, if the private key is used for encryption, only the corresponding public key can be used for decryption; therefore, the difficulty of decryption or cracking can be improved, the leakage of variable information can be effectively prevented, and the realization and the operation are facilitated.
Further, the ciphertext analysis module is used for generating a random number as a transaction key of the plaintext message, and symmetrically encrypting the plaintext message according to the transaction key to obtain a ciphertext message corresponding to the changeable information.
Has the advantages that: random numbers are generated in a random mode to serve as the transaction key of the plaintext message, so that the transaction key of the plaintext message is prevented from presenting a rule; symmetric encryption is performed by using a transaction key generated randomly, so that the encryption effect can be improved.
Based on the ciphertext parsing system for data transaction, the invention also provides a ciphertext parsing method for data transaction, which comprises the following steps:
s1, registering and simultaneously encrypting the data assets, wherein the registered data asset information forms a registration block chain;
s2, carrying out data preservation on the data assets, and forming a preservation block chain by the preserved data asset information;
s3, carrying out price evaluation on the data assets by adopting an AHP analysis method, and forming an evaluation block chain by the evaluated data asset information;
s4, connecting the registration block chain, the preservation block chain and the evaluation block chain by adopting a block chain and CA algorithm to form a block chain rope network, and establishing a data transaction platform based on the block chain rope network;
s5, acquiring a block containing variable information from the data transaction platform, analyzing the block containing variable information, acquiring a ciphertext message and a ciphertext list of the variable information, and acquiring a plaintext message of the variable information according to the ciphertext list and the ciphertext message; the variable information is divided into regular quality sensitivity variable information and regular quantity sensitivity variable information.
The working principle and the advantages of the invention are as follows: and acquiring a block containing variable information from the data transaction platform, analyzing the block containing the variable information, acquiring a ciphertext message and a ciphertext list of the variable information, and acquiring a plaintext message of the variable information according to the ciphertext list and the ciphertext message. Therefore, the transaction key randomly generated in each transaction is used for encrypting the plaintext of the variable information, so that the exposure risk of the variable information can be reduced.
Further, in S5, a corresponding key ciphertext and a public key used for encryption are obtained from the ciphertext list, and the key ciphertext is decrypted according to a corresponding private key of the public key used for encryption to obtain a transaction key; and the transaction key is used for decrypting the ciphertext message to obtain the plaintext message of the variable information.
Has the advantages that: firstly, decrypting a key ciphertext according to a private key to obtain a transaction key; then, the transaction key is used for decrypting the ciphertext message to obtain a plaintext message of the variable information; the two processes are successfully decrypted to obtain the plaintext message of the variable information, so that the decryption difficulty can be improved, and the leakage risk of the variable information is reduced.
Further, in S5, a plurality of public keys are sequentially obtained, the public keys are used to perform asymmetric encryption on the transaction key, so as to obtain a corresponding key ciphertext, and the plurality of key ciphertexts are combined into a ciphertext list.
Has the advantages that: the public key is used for carrying out asymmetric encryption on the transaction key, and if the public key is used for carrying out encryption, only the corresponding private key can be used for decryption; on the contrary, if the private key is used for encryption, only the corresponding public key can be used for decryption; therefore, the difficulty of decryption or cracking can be improved, and the leakage of variable information can be effectively prevented.
Further, in S5, a random number is generated as a transaction key of the plaintext message, and the plaintext message is symmetrically encrypted according to the transaction key to obtain a ciphertext message corresponding to the changeable information.
Has the advantages that: the random number is generated in a random mode to serve as the transaction key of the plaintext message, so that the transaction key of the plaintext message is prevented from showing a rule, and the effect of symmetrically encrypting the plaintext message is improved.
Drawings
Fig. 1 is a block diagram of a system structure of an embodiment of a ciphertext parsing system for data transaction according to the present invention.
Detailed Description
The following is further detailed by the specific embodiments:
example 1
An embodiment is substantially as shown in figure 1, comprising:
the data encryption module is used for registering and simultaneously encrypting the data assets, and the registered data asset information forms a registration block chain;
the data security module is used for performing data security on the data assets, and the data asset information after the security forms a security block chain;
the data evaluation module is used for carrying out price evaluation on the data assets by using an AHP analysis method, and the evaluated data asset information forms an evaluation block chain;
the platform establishing module is used for connecting the registration block chain, the preservation block chain and the evaluation block chain to form a block chain rope network through the block chain and a CA algorithm, and establishing a data transaction platform based on the block chain rope network;
the ciphertext analysis module is used for acquiring the block containing the variable information from the data transaction platform, analyzing the block containing the variable information, acquiring a ciphertext message and a ciphertext list of the variable information, and acquiring a plaintext message of the variable information according to the ciphertext list and the ciphertext message.
In this embodiment, the data encryption module, the data security module, the data evaluation module, the platform establishment module, and the ciphertext analysis module are all integrated on the server, and the functions thereof are implemented by software/program/code/computer instructions.
The specific implementation process is as follows:
and S1, the data encryption module registers and encrypts the data assets at the same time, and the registered data asset information forms a registration block chain. For example, before the data assets are registered, the data assets are audited; after the verification is passed, the private key is used for encryption by adopting an RSA algorithm, the signed data can be verified and used by the public key through a public verification algorithm, and the identity information of the nodes in the block chain exists in a private key form, so that the possibility of private use and data tampering is avoided.
And S2, the data preservation module preserves data of the data assets, and the preserved data asset information forms a preservation block chain. For example, the data security is realized by adopting a block chain double-authentication and double-key verification technology for authentication, after the identity authentication is performed on the user node, a unique time stamp is generated in the authentication process, each operation is recorded in an irreversible log form, and the record of the operation is prevented from being forged.
And S3, the data evaluation module evaluates the price of the data assets by using an AHP analysis method, and the evaluated data asset information forms an evaluation block chain. In this embodiment, the AHP analysis, that is, the analytic hierarchy process, refers to a decision-making method that decomposes elements always related to decision-making into levels such as a target, a criterion, and a scheme, and performs qualitative and quantitative analysis on the basis of the levels, and specific principles, modes, and steps of performing price evaluation on data assets by the AHP analysis method can be implemented by referring to the prior art, and are not described herein again.
S4, the platform establishment module links the registration block chain, the preservation block chain and the evaluation block chain through the block chain and a CA algorithm to form a block chain rope network, and establishes a data transaction platform based on the block chain rope network. In this embodiment, for the CA algorithm, that is, the Certificate Authority authentication center, a pki (public Key infrastructure) public Key infrastructure technology is adopted to provide the network identity authentication service, which may refer to the prior art. For example, the data transaction platform established based on the block chain rope network comprises a data browsing unit, a data management unit, a clearing and settlement unit, a transaction unit, a conversion unit and a wind control unit, and the data transaction platform is established by data asset registration, data asset security encryption, data asset price evaluation and data asset block chain rope network, and the safety of the data assets, the identity authentication of an asset owner and the asset value evaluation are comprehensively considered, so that the whole data asset transaction can be successfully and safely realized; meanwhile, the block chain ropes are connected in a CA algorithm authentication mode, and the provided data asset transaction platform can be directly used.
S5, the ciphertext analysis module obtains the block containing the variable information from the data transaction platform, analyzes the block containing the variable information, obtains the ciphertext message and the ciphertext list of the variable information, and obtains the plaintext message of the variable information according to the ciphertext list and the ciphertext message.
In this embodiment, other steps can be implemented with reference to the prior art, and the key steps are as follows:
firstly, a ciphertext analysis module sequentially obtains a plurality of public keys, uses the public keys to carry out asymmetric encryption on a transaction key to obtain corresponding key ciphertexts, and combines a plurality of key ciphertexts into a ciphertext list. The public key is used for carrying out asymmetric encryption on the transaction key, a public key (public key) and a corresponding private key (private key) are required in the encryption process, and if the public key is used for carrying out encryption, only the corresponding private key can be used for decryption; on the contrary, if the private key is used for encryption, only the corresponding public key can be used for decryption; therefore, the difficulty of decryption or cracking can be improved, and the leakage of variable information can be effectively prevented.
Then, the ciphertext analysis module acquires a corresponding key ciphertext and a public key used for encryption from the ciphertext list, and decrypts the key ciphertext according to a corresponding private key of the public key used for encryption to acquire a transaction key; and the transaction key is used for decrypting the ciphertext message to obtain the plaintext message of the variable information. The whole decryption process comprises two processes, and the plaintext message of the variable information can be obtained only if the two processes are successfully decrypted, so that the difficulty of decryption can be improved and the leakage risk of the variable information can be reduced in each transaction.
Example 2
The difference from embodiment 1 is that the ciphertext parsing module generates a random number as a transaction key of the plaintext message, and symmetrically encrypts the plaintext message according to the transaction key to obtain a ciphertext message corresponding to the changeable information. Generating a random number as a transaction key of the plaintext message in a random manner, so as to avoid the transaction key of the plaintext message from presenting a rule; symmetric encryption is performed by using a transaction key generated randomly, so that the encryption effect can be improved.
Example 3
The only difference from embodiment 2 is that at each transaction time, the variable information during the transaction is related to the rules at the time of the transaction, that is, the variable information has rule sensitivity. Therefore, the same transaction information is not determined as variable information in the last transaction, but may be determined as variable information in the current transaction due to the change of the rule; similarly, the same transaction information is not determined as the variable information at this time, but may be determined as the variable information at the next transaction due to a change in the rule. In the present embodiment, after obtaining the plaintext message of the variable information, the variable information is divided into the rule quality sensitivity variable information and the rule quantity sensitivity variable information.
In this embodiment, the variable information includes three types, which are respectively type a transaction information, type B transaction information, and type C transaction information; the type A transaction information is identity information of both transaction parties, including name, gender, age, identification card number and family address; the type B transaction information is basic information of a transaction product, including the name, the production place, the grade and the notice of the product; type C transaction information is the core information of a transaction order, including quantity, mode of transportation, duration of fulfillment, location of fulfillment, mode of fulfillment, insurance, and dispute resolution.
Therefore, the rule sensitivity of the variable information includes two levels, specifically as follows:
first, the sensitivity of the variable information to the regularity is changed, the number of the variable information is not changed, and the type of the variable information is changed. For example, in the last transaction, the type a transaction information is determined as the number of variable information Δ J, and the type B transaction information is determined as the number of variable information Δ K; in the current transaction, because the rule changes, the type A transaction information is judged to be variable information, and the type C transaction information is judged to be variable information, wherein the number of the variable information is delta M; then, Δ J + Δ K ═ Δ M + Δ N holds. In this case, it is said that Δ J + Δ K is Δ M + Δ N in both the previous transaction and the current transaction, but the variable information in the previous transaction is the type a transaction information and the type B transaction information, and the variable information in the current transaction is the type a transaction information and the type C transaction information, so the type B transaction information and the type C transaction information in this example are the regular quality sensitivity variable information.
Second, the sensitivity of the variable information to the rule amount is not changed, the type of the variable information is not changed, and the number of the variable information is changed. For example, in the last transaction, the type a transaction information is determined as the number of variable information Δ J, and the type B transaction information is determined as the number of variable information Δ K; in the current transaction, because the rule changes, the type A transaction information is judged to be variable information, and the type B transaction information is judged to be variable information, wherein the number of the variable information is delta M; then, Δ J + Δ K ≠ Δ M + Δ N holds. In this case, the variable information includes only the type a transaction information and the type B transaction information, but since Δ J + Δ K ≠ Δ M + Δ N and the number thereof is changed, the type a easy information and the type B transaction information in this example are regular quantity sensitivity variable information.
In addition, both the regular quality sensitivity variable information and the regular quantity sensitivity variable information have temporal dynamics. For example, since the rule changes with time, and Δ J, Δ K, Δ M, and Δ N also change with time, Δ J, Δ K, Δ M, and Δ N are functions of time, and Δ J, Δ K, Δ M, and Δ N may be referred to as Δ J ═ Δ J (t), Δ K ═ Δ K (t), Δ M ═ Δ M (t), and Δ N ═ Δ N (t), respectively.
Similarly, the rule sensitivity of the variable information includes two levels, except that here the dynamic influence of time t needs to be considered:
first, when determining the sensitivity of the variable information to the regular quality, the type of the variable information changes because the amount of the variable information does not change, and Δ j (t) + Δ k (t) ═ Δ m (t) + Δ n (t) holds;
when the sensitivity of the variable information to the rule amount is determined, the number of the variable information changes because the type of the variable information does not change, and Δ j (t) + Δ k (t) ≠ Δ m (t) + Δ n (t) is established.
By the method, after the plaintext message of the variable information is obtained, the variable information is divided into the rule quality sensitivity variable information and the rule quantity sensitivity variable information, so that the rule quality sensitivity variable information can be encrypted independently, and the leakage risk of the confidential information is greatly reduced.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.