Blockchain account private data query method
Private data query method:
Query process: When receiving a query transaction initiated by the query party for the target private data, obtain the relevant historical transactions through the historical transaction ID, and then determine the blockchain account of the initiator, and determine whether the query party has the right to query the target private data based on the query permissions recorded in the account.
Permission control: Permissions can be recorded in the blockchain account in the form of a whitelist or as query conditions. Only query parties that meet the conditions are allowed to query.
Data decryption: The target private data is decrypted in the trusted execution environment (TEE) for the query party to view.
Technical background and challenges:
Blockchain technology: It is built on a transmission network (such as a peer-to-peer network), uses a chain data structure to verify and store data, and uses a distributed node consensus algorithm to generate and update data.
Privacy and performance challenges: Enterprise-level blockchain platform technology is often difficult to solve both privacy and performance at the same time. Common encryption technologies such as homomorphic encryption and zero-knowledge proof are highly complex and affect performance.
Trusted Execution Environment (TEE): As another way to solve privacy issues, TEE can provide security isolation at the hardware level to ensure the efficiency and security of data processing.
Method extension and application:
Transaction type extension: support updating whitelist transaction types, allowing the initiator of historical transactions to update the whitelist in their own blockchain account.
Smart contract application: implement permission control logic through smart contracts (business contracts), and the query permissions of different transaction-related data can be controlled by different users.
Specific implementation details:
Digital envelope encryption: query transactions and historical transactions can ensure data transmission security through digital envelope encryption, combining symmetric encryption and asymmetric encryption technology.
Data storage and encryption: blockchain nodes encrypt and store transaction execution results (such as receipts) and related data (such as account attribute information, contract code, contract status data), and only authorized users can decrypt and view them.
Permission query and decryption: After the query transaction and target private data are received by the blockchain node, the permission query is first performed. After confirming the query permission, the private data is decrypted in the TEE for the query party to use.
System architecture and equipment:
System architecture: The document describes the overall architecture of the blockchain-based private data query system, including blockchain nodes, TEE environment, smart contracts and other components.
Device implementation: A private data query device applied to blockchain nodes is proposed, including a transaction reading unit, a permission query unit, a data acquisition unit, etc., which is used to implement the above query method.
Legend and process description:
Legend explanation: The document provides multiple flow charts (as shown in Figure 1-11), which detail the processes of smart contract creation, calling, private data query, etc.
Process steps: From query transaction reception, historical transaction acquisition, permission query, data decryption to query result return, each step details the implementation method and expected effect.
Advantages and application prospects:
Security and performance: The private data query method combined with TEE reduces performance loss while ensuring privacy security, and improves the overall efficiency of the blockchain system.
Application field: This technology can be widely used in blockchain application scenarios that require high privacy protection and data security, such as finance, medical care, supply chain and other fields.
The document elaborates on a private data query mechanism based on blockchain. By expanding transaction types, applying smart contracts, and combining TEE environment, efficient and secure private data access control is achieved, providing new ideas for privacy protection of blockchain technology.
The following are the answers to the short-answer questions based on the document content:
What is the main process of the private data query method?
The main process of the private data query method includes: receiving the query transaction, reading the historical transaction ID contained in the query transaction; obtaining the historical transaction according to the historical transaction ID, and determining the blockchain account of the initiator of the historical transaction; judging whether the query party has the right to query the target private data according to the query permissions recorded in the account; if the query party has the right to query, the target private data is decrypted in the trusted execution environment (TEE) for the query party to view.
What are the main challenges facing blockchain technology in terms of privacy protection?
The main challenge facing blockchain technology in terms of privacy protection is the balance between privacy and performance. Most solutions either sacrifice performance for privacy or ignore privacy in pursuit of performance. Common encryption technologies such as homomorphic encryption and zero-knowledge proof can solve privacy problems, but they are highly complex and may cause serious performance losses.
What is a trusted execution environment (TEE) and what is its role in blockchain?
A trusted execution environment (TEE) is an execution environment that provides secure isolation at the hardware level, which ensures that the code and data executed in the environment cannot be peeped or tampered with by the outside. In blockchain, TEE can be used as a way to solve privacy issues. By processing sensitive data (such as decrypting private data) in TEE, the efficiency and security of data processing can be guaranteed, and the performance loss caused by complex encryption operations can be reduced.
How is the "whitelist" mentioned in the document applied in private data query?
The "whitelist" mentioned in the document is recorded in the blockchain account in the form of a list, which is used to control which users have the right to query the private data of the account. During the private data query process, if the query party is recorded in the initiator's whitelist, it is determined that the query party has the right to query the target private data. In addition, the document also mentions that the transaction type can be extended to support transactions that update the whitelist, allowing the initiator of historical transactions to dynamically update the whitelist in its blockchain account.
What role does the smart contract play in private data query?
Smart contracts (also called business contracts in the document) play the role of implementers of permission control logic in private data query. By defining permission control codes in smart contracts, the query permissions of different transaction-related data can be flexibly controlled. When the querying party requests to query other transaction-related data other than the historical transaction itself, the blockchain node will determine the smart contract to be called based on the historical transactions and execute the permission control logic defined in the smart contract to determine whether the querying party has the right to query the target private data.