[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113343251A - Energy transaction processing method and system based on block chain - Google Patents

Energy transaction processing method and system based on block chain Download PDF

Info

Publication number
CN113343251A
CN113343251A CN202110557145.1A CN202110557145A CN113343251A CN 113343251 A CN113343251 A CN 113343251A CN 202110557145 A CN202110557145 A CN 202110557145A CN 113343251 A CN113343251 A CN 113343251A
Authority
CN
China
Prior art keywords
transaction
information
user
illegal
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110557145.1A
Other languages
Chinese (zh)
Inventor
陈军
伍江瑶
苏凯
温柏坚
张琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southern Power Grid Digital Grid Group Co ltd
Guangdong Power Grid Co Ltd
Original Assignee
Guangdong Power Grid Co Ltd
Southern Power Grid Digital Grid Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Power Grid Co Ltd, Southern Power Grid Digital Grid Research Institute Co Ltd filed Critical Guangdong Power Grid Co Ltd
Priority to CN202110557145.1A priority Critical patent/CN113343251A/en
Publication of CN113343251A publication Critical patent/CN113343251A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • Databases & Information Systems (AREA)
  • Water Supply & Treatment (AREA)
  • Public Health (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

本申请涉及一种基于区块链的能源交易处理方法和系统,该方法包括:能源交易的交易双方分别将交易信息利用审计方的公钥加密后广播至交易区块链,所述交易信息包括交易内容以及交易用户信息;通过所述交易区块链,审计方获取交易信息,利用自身私钥对所述交易信息进行解密,得到交易双方的交易内容和交易用户信息,若根据所述交易内容审计所述交易为非法交易,则审计方根据所述交易用户信息确定非法交易用户。该方法通过利用区块链技术,保护了交易双方的隐私信息,同时通过审计实现对交易的监督,及时监察出非法交易。

Figure 202110557145

The present application relates to a blockchain-based energy transaction processing method and system. The method includes: two parties to an energy transaction respectively encrypt the transaction information with the public key of the auditor and broadcast it to the transaction blockchain, where the transaction information includes: Transaction content and transaction user information; through the transaction blockchain, the auditor obtains transaction information, decrypts the transaction information with its own private key, and obtains the transaction content and transaction user information of both parties. If the transaction is audited as an illegal transaction, the auditor determines the illegal transaction user according to the transaction user information. The method protects the privacy information of both parties by using the blockchain technology, and at the same time realizes the supervision of the transaction through auditing, and detects illegal transactions in time.

Figure 202110557145

Description

Energy transaction processing method and system based on block chain
Technical Field
The application relates to the technical field of block chains and power grids, in particular to a block chain-based energy transaction processing method and system.
Background
With the market development of power systems, new concepts such as novel energy sources and smart power grids are emerging continuously, and various renewable energy sources, novel energy storage systems and smart power equipment tend to be mature and applied. With the deepening of the electric power market reform policy, the micro-grid or the user with distributed power generation is allowed to be used as an electric power selling party to carry out electric power market transaction, and an electric power consumer may become an electric power market participant integrating consumption and production and is no longer in a single consumer role. However, with the development of energy reform, the conversion of complex electricity purchasing and selling modes and user identities, how to ensure user privacy and supervise energy transactions becomes a problem which needs to be solved urgently.
Disclosure of Invention
In view of the foregoing, there is a need to provide a block chain-based energy transaction processing method and system capable of guaranteeing user privacy and supervising energy transactions.
A blockchain-based energy transaction processing method, the method comprising:
the method comprises the following steps that two transaction parties of the energy transaction respectively encrypt transaction information by using a public key of an auditor and then broadcast the encrypted transaction information to a transaction block chain, wherein the transaction information comprises transaction content and transaction user information;
and through the transaction block chain, the auditing party acquires transaction information, decrypts the transaction information by using a private key of the auditing party to obtain transaction contents and transaction user information of both transaction parties, and if the transaction is audited to be illegal according to the transaction contents, the auditing party determines an illegal transaction user according to the transaction user information.
A blockchain-based energy transaction processing system, comprising: the energy resource management system comprises a transaction information block chain, nodes of both energy transaction parties and nodes of an auditing party;
the energy transaction system comprises a transaction block chain, a transaction information database and a transaction information database, wherein the transaction information database is used for storing transaction information of energy transaction parties, and the transaction information database is used for storing transaction information of energy transaction parties;
and through the transaction block chain, the auditing party acquires transaction information, decrypts the transaction information by using a private key of the auditing party to obtain transaction contents and transaction user information of both transaction parties, and if the transaction is audited to be illegal according to the transaction contents, the auditing party determines an illegal transaction user according to the transaction user information.
According to the energy transaction processing method and system based on the blockchain, both sides of the energy transaction broadcast the transaction information to the blockchain after encrypting the transaction information by using the public key of the auditing party, the safety of the basic information of the user and the transaction information of the user can be ensured by using the blockchain technology, and then the auditing party acquires the transaction information from the transaction blockchain by using the traceability characteristic, decrypts the transaction information by using the private key of the auditing party to obtain the transaction content and the transaction user information, audits whether the transaction is illegal or not according to the transaction content, and determines the illegal transaction user when the illegal transaction exists. By utilizing the block chain technology, the privacy information of both transaction parties is protected, and meanwhile, the transaction is supervised through auditing, so that illegal transactions are monitored in time.
Drawings
FIG. 1 is a block chain based energy transaction processing system in one embodiment;
FIG. 2 is a flow diagram illustrating a method for energy transaction processing based on blockchains in one embodiment;
FIG. 3 is a diagram illustrating a transaction information chaining and auditing process according to one embodiment;
FIG. 4 is a schematic flow chart illustrating the manner in which an audit transaction is conducted on the basis of the contents of the transaction to determine whether the transaction is illegal or not in another embodiment;
FIG. 5 is a flow diagram illustrating a process for uplink of user information in one embodiment;
FIG. 6 is a flow chart illustrating uplink of user information in another embodiment;
FIG. 7 is a schematic diagram of a round key generation scheme in one embodiment;
fig. 8 is a block chain-based energy transaction processing system according to another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The energy transaction processing method based on the block chain can be applied to the energy transaction processing system based on the block chain shown in fig. 1. As shown in fig. 1, the energy transaction processing system based on blockchain is a dual blockchain system, and the system includes 2 blockchains and 3 types of roles. The 2 chains are respectively a user block chain and a transaction block chain, and the 3 types of roles are respectively a user, an auditor and a monitor. Wherein, the user block chain: the system is used for storing the basic user information, each block contains some basic user information, and the block header of the next block contains the hash value of the previous block, so that the link ensures that the basic user information is not illegally tampered, and the identity inquiry can be performed by a supervisor. Transaction block chaining: the method can be used for browsing the content of the initiated transaction and storing transaction information, the transaction information can be decrypted and checked by the auditing party, and the auditing party audits whether the transaction amount is legal or not. The user: transaction participants in a dual blockchain system include the initiator and recipient of the transaction. The initiator of the transaction comprises the initiation of electricity selling transaction and the initiation of electricity purchasing transaction, and the party receiving the initiation of the transaction is the receiver. And (4) an auditor: the system is trusted, has an auditing function, and audits transactions on the block chain. In practical application, the auditor is generally each power operator. And (4) a supervision party: trustable, has a supervision function, and can query and track the identity of illegal traders in the blockchain. In practical application, the supervising party is generally a power grid company or a subsidiary power grid company.
In one embodiment, as shown in fig. 2, a block chain-based energy transaction processing method is provided, which is described by taking the system in fig. 1 as an example, and includes the following steps:
step 202, the two parties of the energy transaction respectively encrypt the transaction information by using the public key of the auditing party and then broadcast the encrypted transaction information to the transaction block chain, wherein the transaction information comprises transaction content and transaction user information.
The user transaction information chaining and auditing process mainly includes operations such as broadcasting, browsing and auditing, as shown in fig. 3. The two parties of the energy transaction comprise a transaction initiator and a transaction object, wherein the transaction initiator is a buyer and the transaction object is a seller.
The two transaction parties carry out transaction, the transaction initiator broadcasts transaction contents to the transaction block chain, and the transaction contents comprise transaction time, transaction addresses, transaction amount and transaction quantity. At this time, the transaction object can browse the contents on the chain, and the chain contents of the transaction initiator can not be counterfeited. The transaction initiator and the transaction object pack transaction user information and transaction content to the auditor at the same time, and the transaction content and the transaction information are encrypted by the public key of the auditor and then broadcast to the transaction block chain.
And step 204, acquiring transaction information by the auditing party through the transaction block chain, decrypting the transaction information by using a private key of the auditing party to obtain transaction content and transaction user information, and if the auditing transaction is illegal according to the transaction content, determining an illegal transaction user by the auditing party according to the transaction user information.
Among them, the block chain technology, as an emerging technology, plays a great role in technical innovation and industrial innovation, and has characteristics of decentralization, tamper resistance, and the like, and is widely concerned in many fields. Compared with the traditional centralized management mechanism, the development of the block chain technology reduces the risks of centralized service data crash and malicious attack. The block chain technology is applied to energy transaction, the transaction mode does not need centralized financial institution supervision, and both transaction parties realize point-to-point transaction and can protect the privacy security of transaction users through a consensus mechanism, an encryption technology and a privacy protection technology.
And the auditing party acquires the transaction information from the transaction block chain, and decrypts the transaction information by using a private key of the auditing party to obtain transaction content and transaction user information. The auditing party decrypts the transaction information of the two transaction parties respectively by using the private keys of the auditing party to obtain the transaction content and the transaction user information of the transaction initiator and the transaction content and the transaction user information of the transaction object. The transaction initiator comprises electricity selling transaction initiation and electricity purchasing transaction initiation, and the party receiving the transaction initiation is a receiver.
And the auditing party audits whether the transaction is illegal according to the transaction content, if so, the transaction is illegal, and the corresponding transaction user is determined to be an illegal transaction user. Specifically, the transaction initiator and the transaction object of the transaction are determined as illegal transaction users.
According to the energy transaction processing method of the block chain, the two parties of the energy transaction broadcast the transaction information to the block chain after encrypting the transaction information by using the public key of the auditing party, the safety of the basic information of the user and the transaction information of the user can be ensured by using the block chain technology, the auditing party obtains the transaction information from the transaction block chain by using the traceable characteristic, the transaction information is decrypted by using the private key of the auditing party to obtain the transaction content and the transaction user information, whether the auditing is illegal transaction or not is judged according to the transaction content, and the illegal transaction user is determined when the illegal transaction exists. By utilizing the block chain technology, the privacy information of both transaction parties is protected, and meanwhile, the transaction is supervised through auditing, so that illegal transactions are monitored in time.
In another embodiment, as shown in fig. 4, a method for auditing whether a transaction is an illegal transaction according to the contents of the transaction includes:
s402, comparing the transaction content and the transaction information of the two transaction parties respectively.
And the auditing party decrypts the transaction content by using the private key, compares whether the transaction user information and the transaction content sent by the two transaction parties are consistent or not, and if the transaction user information and the transaction content are consistent, the transaction user information and the transaction information are falsified with a very small probability.
If the transaction information is consistent with the transaction information, executing step S404, and if the transaction information is not consistent with the transaction information, respectively encrypting the transaction information by using the public key of the auditor and broadcasting the encrypted transaction information to the transaction block chain.
And S404, auditing whether the transaction is illegal according to the transaction content.
Specifically, the transaction content includes a transaction amount and a transaction amount; auditing whether the transaction is illegal according to the transaction content, wherein the auditing step comprises the following steps: comparing whether the transaction amount is matched with the transaction amount, whether the transaction amount exceeds the limit and whether the transaction amount exceeds the limit; and if the transaction amount does not match the transaction amount, or the transaction amount exceeds the limit, determining that the transaction is illegal.
And if the transaction is illegal, executing the step that the auditing party determines the illegal transaction user according to the information of the transaction user.
Specifically, the public key of the auditor is PK _ s, and the private key is SK _ s. Because the transaction content is encrypted by the transaction user by using the public key of the auditing party, the auditing party can know the transaction information through the private key and audit. Setting the electricity price of a single transaction as P _ pr, the single transaction amount as n, the single transaction limit amount as HP _ pr, the transaction amount limit amount as lambda, and defining an auditing algorithm as follows:
Audit{P_pr,n|(P_pr,n)=decrypt[SK_s,C_text],(P_pr≤HP_pr)∪(n≤λ)},
if the algorithm output does not have the output value meeting the condition, the illegal transaction is determined. That is, the transaction amount P _ pr and the transaction amount n of a single transaction are obtained from the ciphertext decrypted by the private key of the auditor, and if any value exceeds the limit, the transaction is determined to be an illegal transaction.
In one embodiment, when illegal transactions are tracked, the information of transaction objects and transaction details is also ensured to be concealed, but illegal user information can be disclosed by auditing the illegal electric power transaction tracking. Based on this, in this embodiment, the transaction user information uploaded to the transaction block chain by the transaction parties is pseudonym information of the transaction user, where the pseudonym information is distributed to the registered user by the supervisor using the supervisor key during registration.
In particular, the pseudonym is relative to the true username of the transacting user. The pseudonym is assigned by the supervisor to the registered user using the supervisor key at the time of registration of the user. By using the pseudonymous name information to spread on the transaction block chain, even if the system is attacked maliciously, the transaction content cannot be known.
Specifically, as shown in fig. 5 and fig. 6, the user registration process, which involves 5 basic operations of registration, verification, authorization, pseudonym allocation, encryption and uplink, includes the following steps:
s502, the user sends a registration request to the user information chain.
Specifically, a user participating in an energy transaction performs identity registration and sends a request to join a user information chain.
S504, after the supervisor receives the registration request based on the user information link, the supervisor verifies the identity of the user, and if the verification is successful, pseudonym information is randomly distributed and returned to the user.
And the supervisor executes the identity information verification after receiving the request information, randomly allocates a pseudonym to the user if the identity verification is successful, and feeds back the pseudonym to the user if the verification is not successful, and the step S502 is executed again. The user identity information verification here may be to invoke a national identity card system to verify whether the user is a real user.
S506, after receiving the verification success and the pseudonym information, the user selects a user key, encrypts the user information and the pseudonym information according to the user key to obtain a first ciphertext, encrypts the user key by using a public key of the monitor to obtain a second ciphertext, and sends the first ciphertext and the second ciphertext to the monitor.
After receiving the verification success and the pseudonym information, the user selects a user key by himself, wherein the user key can be a first ciphertext cipher _ user obtained by encrypting the user information and the pseudonym by using a lightweight cryptographic algorithm and uploading the ciphertext cipher _ user to the user block chain. And then encrypting the key user _ key by using the public key of the monitor to obtain a second ciphertext _ user _ key, and sending the second ciphertext _ user _ key to the monitor.
Specifically, the uplink of the user identity information is executed by a registered user, the user is required to select a user key by himself in the uplink process and encrypt the identity information and the pseudonym, the privacy of uplink data only needs to be guaranteed here, but in order to accelerate the encryption speed, the user key adopts a lightweight block cipher algorithm LBlock, and the algorithm is a symmetric encryption algorithm and is characterized by being high in operation speed and high in safety. The user key generation method comprises the following steps:
(1) the user identity information is converted into a string of binary bit sequences, and each 64 bits are divided into m groups. The user selects an 80-bit KEY as an initial KEY, which is also a KEY to be sent to a supervisor later;
(2) let P _ text be X1||X0Representing a set of 64-bit plaintext, P1And P0Representing the left 32 bits and right 32 bits of plaintext, respectively. The initial KEY KEY is recorded as KEY ═ k79k78...k0Taking the first 32 bits of the initial key as the round key K of the first round1
(3) The whole operation is iterated for 32 rounds, and each round has a round key KiParticipation makes the initial key mix-in difficult to calculate statistically or algorithmically. Round key KiIs the subkey KEYiThe first 32-bit round key generation scheme is as shown in fig. 7, where S is a substitution operation in a Func function, and in order to make the algorithm lighter and have a certain security effect and improve the operating efficiency of the whole system, only the first S box of 10S boxes designed by the algorithm is used as the substitution operation.
(4) The following iterative calculations are then performed: xi=Func(Xi-1,Ki-1)⊕(Xi-1<<<8) 2,3, 33, where Func denotes a round function, KiIndicating the round key. C _ text ═ X32| | | X33 represents a 64-bit ciphertext output, X32And X33Representing the left 32 bits and right 32 bits of the ciphertext, respectively. The Func function comprises digital substitution and position substitution, and the numerical substitution and the position substitution are operated by taking hexadecimal as a unit;
(5) since the binary bit sequence of the user information is divided into m groups, a total of m 32 rounds of iterative encryption operations are performed. And finally combining the m groups of obtained ciphertexts together.
S508, the supervisor receives the second ciphertext, decrypts the second ciphertext by using the own secret key to obtain a user secret key, decrypts the first ciphertext by using the user secret key to obtain user information and pseudonym information, detects whether the pseudonym information obtained by decryption corresponds to pseudonym information distributed during registration, and if so, successfully links the user information.
And the supervisor receives the second ciphertext _ user _ key, decrypts the first ciphertext _ user by using the user key, and checks whether the pseudonym in the first ciphertext corresponds to the identity information. If the user block link information is not corresponding to the user block link information, the pseudonym information is redistributed according to the registered user information.
The block chains are linked together through the hash value, so that the block chains can be used for checking information and ensuring that the information is not tampered. In the user basic information uplink operation, only the operation between a supervisor and a user is carried out, and an auditor does not participate.
As shown in fig. 1 and 8, after the auditor confirms the illegal transaction user, the method further includes:
s802, an identity tracking request is sent to the supervising party, and the identity tracking request carries the pseudonym information, the signature of the auditing party and the pseudonym information of the illegal transaction user.
Due to the fact that the pseudonym information is used, even if a malicious attacker or a supervision party knows the packaged information, the malicious attacker or the supervision party cannot know the transaction content and is connected with the pseudonym identity, and privacy is improved. The auditor audits and finds the illegal transaction user, and immediately sends the auditor signature, the transaction user pseudonym and the tracking request to the supervising party. The tracking algorithm is participated by an auditor and a monitor together, and because the auditor masters the pseudonym information of the users in the user block chain, when the auditor sends a request for tracking the identity of an illegal user, the information of the user can be inquired according to the pseudonym information, and corresponding measures are taken.
And S804, the supervising party verifies the signature of the auditing party, decrypts the pseudonym information of the illegal transaction user according to the secret key of the supervising party after the signature is verified, so as to obtain the real user information of the illegal transaction user, and feeds back the real user information of the illegal transaction user to the auditing party.
Specifically, after receiving a tracking request of an auditor, a supervising party verifies the signature. If the verification fails, the data is fed back to the auditor and is required to be sent again; and after verification, the supervising party finds out a corresponding user real identity information ciphertext on the user block chain according to the pseudonym information sent by the auditing party, decrypts by using a private key, and tracks the user real information.
Specifically, the input information in the algorithm is a message REQ _ text (a request for tracking pseudonym user information) and an auditor public key PK _ s, that is, the auditor sends an encrypted message hash, a message original text, and an auditor public key to a supervisor. If DEC [ PK _ s, CRY (SK _ s, hash (REQ _ text)) ] ═ hash (REQ _ text) is met, the verification passes, namely, a monitor decrypts by using a public key of an auditor to obtain the hash (REQ _ text), then the received message original text is operated by using the same hash algorithm, if two digest values are consistent, the verification passes, and then the monitor can use the pseudonym information in the message to inquire the identity of an illegal user.
In another embodiment, the method further comprises: and the auditing party records the illegal transaction user and marks the illegal transaction user when the recorded illegal transaction times reach a set value.
Specifically, the marking process may be that, if the user has an illegal transaction record, the user is given an alarm once and records, and after the alarm is given twice, the transaction right is cancelled and the user information is marked.
In another embodiment, the transaction information is broadcast to the transaction blockchain using an asymmetric encryption algorithm. Wherein, the transmission of the key also adopts an asymmetric encryption algorithm.
Specifically, a knapsack algorithm is used for generating a public key and a private key, and the public key and the private key are used for encryption and decryption, and the algorithm is high in encryption speed and high in safety performance.
(1) Generation of public and private keys
The receiver constructs a non-conflict non-supersequence X ═ X1,x2,...,xn]And a random sequence Y ═ Y1,y2,...,yn]While simultaneously letting Z ═ Y + α X, whichWherein Z is (Z)1,z2,...,zn),
Figure BDA0003077592460000081
The recipient saves Z as a public key and Y and alpha as private keys.
(2) Encryption and decryption process
Encryption: converting the transmitted information into binary bit sequence, dividing every n bits, and using P _ text ═ P for each group of information1,p2,...,pn]And (4) showing. The sender encrypts each group of plaintext information by using the public key Z to obtain a ciphertext C _ text ═ Z1p1+z2p2+...+znpn
And (3) decryption: the receiver uses Y and alpha for decryption, having
Pt_text=C_text(modα)
=(z1p1+z2p2+...+znpn)(modα)
((y1+αx1)p1+(y2+αx2)p2+...+(yn+αxn)pn)(modα)
=y1p1+y2p2+...+ynpn(modα)
Obtaining original sending information P _ text [ P ]) according to the following steps1,p2,...,pn],
Figure BDA0003077592460000091
As shown in fig. 1, the energy transaction processing method based on the block chain includes the following steps:
step 1: before a user participating in energy transaction joins a system, identity registration is needed, a supervisor checks identity information, after the check is passed, the user is allocated with a pseudonym, the user encrypts the identity information and the pseudonym and uploads the encrypted information to a user block chain, and key information is encrypted and sent to the supervisor.
Step 2: the transaction initiator initiates a transaction and broadcasts transaction information to a transaction block chain, and the transaction parties encrypt transaction contents and respective pseudonymous information by using a public key of an auditor.
And step 3: the auditing party decrypts the transaction information by using the private key of the auditing party and audits the transaction amount, and if the transaction amount is extremely mismatched with the transaction amount or the transaction amount exceeds a limit amount, the auditing party is considered to be illegal transaction.
And 4, step 4: when the illegal transaction is judged, the auditing party sends an illegal transaction user identity tracking request to the supervising party, and the pseudonym information of the transaction user and the signature of the auditing party are sent to the supervising party together.
And 5: after the supervising party checks the signature, the supervising party starts to inquire and track the user information, uses the private key of the supervising party to decrypt the key information of the user, then uses the private key of the user to decrypt the user information, and feeds back the information to the auditing party after the decryption is successful so as to reveal the illegal user.
Compared with the related technology, the energy transaction processing method based on the block chain has the advantages that a double-block chain system model facing the privacy protection of the energy transaction at the user side is constructed, the double chains are respectively introduced into the auditor and the monitor to realize the legality judgment of the energy transaction and the identity tracking of the illegal user, the separation of the basic identity information of the transaction user and the transaction information of the user is realized, and the privacy of the user information is guaranteed. Meanwhile, an encryption module combining a lightweight cryptographic algorithm and an asymmetric cryptographic algorithm is constructed, so that privacy security and data transmission security of user information are realized. The invention has the following beneficial effects:
(1) in an energy user transaction network, on one hand, registered users store basic identity information into a user block chain to prevent user information from being illegally tampered, and a supervisor can conveniently inquire and trace illegal user information; on the other hand, the transaction content issued by the transaction initiator is uploaded to the transaction block chain, the transaction amount and the transaction amount are audited by the auditing party, and whether illegal transactions exist is judged. In the double-block chain system model, an auditing party can only know the transaction amount and the transaction amount, a supervising party can only know the user identity participating in the transaction, and two parties cannot simultaneously master all information of the user, so that the separation of the user identity information and the user transaction information is realized.
(2) An encryption algorithm module for protecting user information and user data transmission is designed, the module combines a symmetric cryptographic algorithm and an asymmetric cryptographic algorithm, and is respectively applied to different encryption scenes, so that the security of encryption information and a secret key is ensured, and the operation efficiency of the algorithm is improved. A lightweight cryptographic algorithm is introduced to realize information encryption, an asymmetric algorithm encryption key and information chaining are adopted, an encryption algorithm module realizes privacy protection of user basic information and transaction information, and low efficiency of the system caused by slow algorithm operation is relatively guaranteed.
It should be understood that although the various steps in the flowcharts of fig. 2, 4-8 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2, 4-8 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps or stages.
In one embodiment, as shown in fig. 1, there is provided a block chain-based energy transaction processing method system: the method comprises the following steps: the energy resource management system comprises a transaction information block chain, nodes of both energy transaction parties and nodes of an auditing party.
The energy transaction system comprises a transaction block chain, a transaction information database and a transaction information database, wherein the transaction information database is used for storing transaction information of energy transaction parties, and the transaction information database is used for storing transaction information of energy transaction parties;
and through the transaction block chain, the auditing party acquires transaction information, decrypts the transaction information by using a private key of the auditing party to obtain transaction contents and transaction user information of both transaction parties, and if the transaction is audited to be illegal according to the transaction contents, the auditing party determines an illegal transaction user according to the transaction user information.
According to the energy transaction processing system based on the blockchain, two parties of the energy transaction broadcast the transaction information to the blockchain after encrypting the transaction information by using the public key of the auditing party, the safety of the basic information of the user and the transaction information of the user can be ensured by using the blockchain technology, the auditing party obtains the transaction information from the transaction blockchain by using the traceable characteristic, the transaction information is decrypted by using the private key of the auditing party to obtain the transaction content and the transaction user information, whether the auditing is illegal transaction or not is judged according to the transaction content, and the illegal transaction user is determined when the illegal transaction exists. By utilizing the block chain technology, the privacy information of both transaction parties is protected, and meanwhile, the transaction is supervised through auditing, so that illegal transactions are monitored in time.
In another embodiment, the system further comprises: a node of a supervisor;
the transaction user information is pseudonymous name information of the transaction user, and the pseudonymous name information is distributed to the registered user by a supervisor through a supervisor key during registration;
after an auditor confirms an illegal transaction user, sending an identity tracking request to a supervisor, wherein the identity tracking request carries an auditor signature and an auditor public key; the signature of the auditor is obtained by encrypting the pseudonym information of the illegal transaction user by using the public key of the auditor;
and the supervising party verifies the signature of the auditing party, decrypts the pseudonym information of the illegal transaction user according to the secret key of the supervising party after the signature is verified, so as to obtain the real user information of the illegal transaction user, and feeds back the real user information of the illegal transaction user to the auditing party.
In another embodiment, the system further comprises a user information chain for storing user information, wherein the user sends a registration request to the user information chain;
after receiving the registration request based on the user information link, the supervisor verifies the identity of the user, and if the verification is successful, pseudonym information is randomly distributed to return to the user;
after receiving verification success and pseudonym information, a user selects a user key, encrypts the user information and the pseudonym information according to the user key to obtain a first ciphertext, encrypts the user key by using a public key of a monitor to obtain a second ciphertext, and sends the first ciphertext and the second ciphertext to the monitor;
and the supervisor receives the second ciphertext, decrypts the second ciphertext by using the own key to obtain a user key, decrypts the first ciphertext by using the user key to obtain user information and pseudonym information, detects whether the pseudonym information obtained by decryption corresponds to pseudonym information distributed during registration, and if so, successfully links the user information.
The detailed method is described in the embodiments related to the method, and is not described herein again.
According to the energy transaction processing based on the block chain, in the energy user transaction network, on one hand, a registered user stores basic identity information into a user block chain, so that the user information is prevented from being illegally tampered, and a supervisor can conveniently inquire and trace the illegal user information; on the other hand, the transaction content issued by the transaction initiator is uploaded to the transaction block chain, the transaction amount and the transaction amount are audited by the auditing party, and whether illegal transactions exist is judged. In the double-block chain system model, an auditing party can only know the transaction amount and the transaction amount, a supervising party can only know the user identity participating in the transaction, and two parties cannot simultaneously master all information of the user, so that the separation of the user identity information and the user transaction information is realized.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A blockchain-based energy transaction processing method, the method comprising:
the method comprises the following steps that two transaction parties of the energy transaction respectively encrypt transaction information by using a public key of an auditor and then broadcast the encrypted transaction information to a transaction block chain, wherein the transaction information comprises transaction content and transaction user information;
and through the transaction block chain, the auditing party acquires transaction information, decrypts the transaction information by using a private key of the auditing party to obtain transaction contents and transaction user information of both transaction parties, and if the transaction is audited to be illegal according to the transaction contents, the auditing party determines an illegal transaction user according to the transaction user information.
2. The method according to claim 1, wherein the transaction user information is pseudonym information of the transaction user, and the pseudonym information is distributed to the registered user by a supervisor through a supervisor key at registration;
the method further comprises the following steps: after an auditing party confirms an illegal transaction user, sending an identity tracking request to a supervising party, wherein the identity tracking request carries an auditing party signature and pseudonym information;
and the supervising party verifies the signature of the auditing party, decrypts the pseudonym information of the illegal transaction user according to the secret key of the supervising party after the signature is verified, so as to obtain the real user information of the illegal transaction user, and feeds back the real user information of the illegal transaction user to the auditing party.
3. The method of claim 2, further comprising:
a user sends a registration request to a user information chain;
after receiving the registration request based on the user information link, the supervisor verifies the identity of the user, and if the verification is successful, pseudonym information is randomly distributed to return to the user;
after receiving verification success and pseudonym information, a user selects a user key, encrypts the user information and the pseudonym information according to the user key to obtain a first ciphertext, encrypts the user key by using a public key of a monitor to obtain a second ciphertext, and sends the first ciphertext and the second ciphertext to the monitor;
and the supervisor receives the second ciphertext, decrypts the second ciphertext by using the own key to obtain a user key, decrypts the first ciphertext by using the user key to obtain user information and pseudonym information, detects whether the pseudonym information obtained by decryption corresponds to pseudonym information distributed during registration, and if so, successfully links the user information.
4. The method of claim 1, wherein auditing whether the transaction is an illegal transaction based on the contents of the transaction comprises:
comparing the transaction contents and the transaction information of both transaction parties respectively;
if the transaction is consistent with the illegal transaction, auditing whether the transaction is illegal according to the transaction content;
and if the transaction is illegal, the auditing party determines an illegal transaction user according to the transaction user information.
5. The method of claim 4, wherein the transaction content includes a transaction amount and a transaction amount; the auditing whether the transaction is illegal according to the transaction content comprises the following steps:
comparing whether the transaction amount is matched with the transaction amount, whether the transaction amount exceeds a limit and whether the transaction amount exceeds the limit;
and if the transaction amount is not matched with the transaction amount, or the transaction amount exceeds a limit, determining that the transaction is illegal.
6. The method of claim 2, further comprising:
and the auditing party records the illegal transaction user and marks the illegal transaction user when the recorded illegal transaction times reach a set value.
7. The method of claim 1, wherein the transaction information is broadcast to a chain of transaction blocks using an asymmetric encryption algorithm.
8. A blockchain-based energy transaction processing system, comprising: the energy resource management system comprises a transaction information block chain, nodes of both energy transaction parties and nodes of an auditing party;
the energy transaction system comprises a transaction block chain, a transaction information database and a transaction information database, wherein the transaction information database is used for storing transaction information of energy transaction parties, and the transaction information database is used for storing transaction information of energy transaction parties;
and through the transaction block chain, the auditing party acquires transaction information, decrypts the transaction information by using a private key of the auditing party to obtain transaction contents and transaction user information of both transaction parties, and if the transaction is audited to be illegal according to the transaction contents, the auditing party determines an illegal transaction user according to the transaction user information.
9. The system of claim 8, further comprising: a node of a supervisor;
the transaction user information is pseudonymous name information of the transaction user, and the pseudonymous name information is distributed to the registered user by a supervisor through a supervisor key during registration;
after an auditing party confirms an illegal transaction user, sending an identity tracking request to a supervising party, wherein the identity tracking request carries an auditing party signature and pseudonym information;
and the supervising party verifies the signature of the auditing party, decrypts the pseudonym information of the illegal transaction user according to the secret key of the supervising party after the signature is verified, so as to obtain the real user information of the illegal transaction user, and feeds back the real user information of the illegal transaction user to the auditing party.
10. The system of claim 9, further comprising the system further comprising a user information chain for storing user information, wherein,
a user sends a registration request to a user information chain;
after receiving the registration request based on the user information link, the supervisor verifies the identity of the user, and if the verification is successful, pseudonym information is randomly distributed to return to the user;
after receiving verification success and pseudonym information, a user selects a user key, encrypts the user information and the pseudonym information according to the user key to obtain a first ciphertext, encrypts the user key by using a public key of a monitor to obtain a second ciphertext, and sends the first ciphertext and the second ciphertext to the monitor;
and the supervisor receives the second ciphertext, decrypts the second ciphertext by using the own key to obtain a user key, decrypts the first ciphertext by using the user key to obtain user information and pseudonym information, detects whether the pseudonym information obtained by decryption corresponds to pseudonym information distributed during registration, and if so, successfully links the user information.
CN202110557145.1A 2021-05-21 2021-05-21 Energy transaction processing method and system based on block chain Pending CN113343251A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110557145.1A CN113343251A (en) 2021-05-21 2021-05-21 Energy transaction processing method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110557145.1A CN113343251A (en) 2021-05-21 2021-05-21 Energy transaction processing method and system based on block chain

Publications (1)

Publication Number Publication Date
CN113343251A true CN113343251A (en) 2021-09-03

Family

ID=77470564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110557145.1A Pending CN113343251A (en) 2021-05-21 2021-05-21 Energy transaction processing method and system based on block chain

Country Status (1)

Country Link
CN (1) CN113343251A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN110009347A (en) * 2019-03-20 2019-07-12 深圳前海微众银行股份有限公司 A method and device for auditing blockchain transaction information
CN110383311A (en) * 2018-11-07 2019-10-25 阿里巴巴集团控股有限公司 Supervise the transaction of block chain secret
CN110765485A (en) * 2019-10-21 2020-02-07 武汉大学 Condition anonymous payment device based on NIZK
CN110933045A (en) * 2019-11-08 2020-03-27 中国电子科技网络信息安全有限公司 Block chain digital asset privacy protection method based on commitment
CN112039870A (en) * 2020-08-28 2020-12-04 武汉见邦融智科技有限公司 Privacy protection-oriented vehicle-mounted network authentication method and system based on block chain
CN112347508A (en) * 2020-11-04 2021-02-09 汪秀英 Block chain data sharing encryption and decryption method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN110383311A (en) * 2018-11-07 2019-10-25 阿里巴巴集团控股有限公司 Supervise the transaction of block chain secret
CN110009347A (en) * 2019-03-20 2019-07-12 深圳前海微众银行股份有限公司 A method and device for auditing blockchain transaction information
CN110765485A (en) * 2019-10-21 2020-02-07 武汉大学 Condition anonymous payment device based on NIZK
CN110933045A (en) * 2019-11-08 2020-03-27 中国电子科技网络信息安全有限公司 Block chain digital asset privacy protection method based on commitment
CN112039870A (en) * 2020-08-28 2020-12-04 武汉见邦融智科技有限公司 Privacy protection-oriented vehicle-mounted network authentication method and system based on block chain
CN112347508A (en) * 2020-11-04 2021-02-09 汪秀英 Block chain data sharing encryption and decryption method and system

Similar Documents

Publication Publication Date Title
CN107483198B (en) A Supervisable Blockchain System and Method
CN109145612B (en) Block chain-based cloud data sharing method for preventing data tampering and user collusion
CA2197915C (en) Cryptographic key recovery system
JP5562687B2 (en) Securing communications sent by a first user to a second user
CN111130757A (en) Multi-cloud CP-ABE access control method based on block chain
CN113364576A (en) Data encryption evidence storing and sharing method based on block chain
CN108632292A (en) Data sharing method based on alliance&#39;s chain and system
HU225077B1 (en) Method and apparatus for providing for the recovery of a cryptographic key
JP2017022773A (en) Method for generating encryption/decryption key
CN113312608B (en) Electric power metering terminal identity authentication method and system based on time stamp
Koko et al. Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication
CN111526197A (en) Cloud data secure sharing method
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN113162751B (en) Encryption method and system with homomorphism and readable storage medium
CN109104476B (en) A blockchain-based power information security system
CN116760651A (en) Data encryption method and device, electronic equipment and readable storage medium
CN114900283B (en) Deep learning user gradient aggregation method based on multiparty security calculation
Tian et al. Amount-based covert communication over blockchain
Hwang et al. Robust stream‐cipher mode of authenticated encryption for secure communication in wireless sensor network
CN113079177B (en) A Remote Sensing Data Sharing Method Based on Time and Decryption Times Limitation
CN111526131B (en) Anti-quantum-computation electronic official document transmission method and system based on secret sharing and quantum communication service station
US6823070B1 (en) Method for key escrow in a communication system and apparatus therefor
US20040039918A1 (en) Secure approach to send data from one system to another
CN106612173A (en) Encryption scheme for trusted key in cloud storage
CN113691373B (en) A quantum-resistant key escrow system and method based on consortium blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 510030 no.757, Dongfeng East Road, Yuexiu District, Guangzhou City, Guangdong Province

Applicant after: GUANGDONG POWER GRID Co.,Ltd.

Applicant after: Southern Power Grid Digital Grid Research Institute Co.,Ltd.

Address before: 510030 no.757, Dongfeng East Road, Yuexiu District, Guangzhou City, Guangdong Province

Applicant before: GUANGDONG POWER GRID Co.,Ltd.

Country or region before: China

Applicant before: Southern Power Grid Digital Grid Research Institute Co.,Ltd.

CB02 Change of applicant information
TA01 Transfer of patent application right

Effective date of registration: 20241119

Address after: 510030 no.757, Dongfeng East Road, Yuexiu District, Guangzhou City, Guangdong Province

Applicant after: GUANGDONG POWER GRID Co.,Ltd.

Country or region after: China

Applicant after: Southern Power Grid Digital Grid Group Co.,Ltd.

Address before: 510030 no.757, Dongfeng East Road, Yuexiu District, Guangzhou City, Guangdong Province

Applicant before: GUANGDONG POWER GRID Co.,Ltd.

Country or region before: China

Applicant before: Southern Power Grid Digital Grid Research Institute Co.,Ltd.

TA01 Transfer of patent application right