Querying transaction information in blockchain network
It mainly proposes a new blockchain architecture and query mechanism to protect the privacy of transaction information. The following is a summary of the key points of the document:
Blockchain network architecture:
Accounting node subnetwork: responsible for recording data blocks on the blockchain, including multiple accounting nodes, which maintain the integrity and consistency of the blockchain through a consensus mechanism.
Business node subnetwork: including business nodes that verify the data blocks recorded by accounting nodes on the blockchain. These nodes interact with the accounting node subnetwork through proxy nodes to ensure the transparency and credibility of transaction information.
Smart contract mechanism:
Smart contract generation: Each business node and the blockchain operator agree on permissions through a smart contract. The contract contains the target business node permission data of the business node, which defines the scope of transaction information that the business node can query.
Permission data synchronization: After the smart contract is generated, it is synchronized to each accounting node in the accounting node subnetwork for storage, so that the permission data can be quickly obtained when processing query requests.
Transaction information query process:
Receiving query requests: The accounting node receives transaction information query requests from the business node.
Permission verification: According to the permission data in the smart contract, verify whether the business node has the right to query the target transaction information.
Return query results: If the business node has the right to query, the corresponding transaction information is returned; otherwise, only the hash value of the transaction information is returned to protect the privacy of the transaction content.
Security and privacy protection:
Identity authentication: When receiving a query request, the public key and private key are used for identity authentication to ensure the authenticity of the query request.
Data encryption: Use summary and signature algorithms to encrypt and verify transaction information to ensure the security and integrity of data during transmission.
Application scenarios:
Supply chain finance: In the supply chain finance scenario, blockchain technology is used to realize the transparency and credibility verification of transaction information such as contracts and payments.
Electronic invoices: In electronic invoice management, the authenticity and traceability of invoice information are ensured to prevent invoice information from being tampered with or forged.
Legal digital currency: In legal digital currency transactions, the privacy and security of transaction information are guaranteed to prevent transaction information from being leaked.
Accounting node selection mechanism:
Processing load and distance considerations: When selecting accounting nodes to process query requests, the processing load of accounting nodes and the distance from business nodes are comprehensively considered to optimize query efficiency and load balancing.
Technical implementation details:
Block structure: Describes the structure of data blocks and smart contract blocks in detail, including the content and function of block headers and block bodies.
Signature verification process: Describes in detail how to use public and private keys to generate and verify signatures to ensure the authenticity and integrity of transaction information.
The document effectively solves the problem of insufficient privacy protection of transaction information in traditional blockchain networks by proposing a new blockchain network architecture and smart contract mechanism, and provides a safer and more efficient solution for applications in multiple fields such as supply chain finance, electronic invoice management, and legal digital currency.