TEE-based privacy protection distributed account book auditing method and system

A privacy-preserving and distributed technology, applied in the field of privacy-preserving distributed ledger auditing methods and systems, can solve problems such as the inability of auditing efficiency to adapt to the magnitude of big data, low auditing efficiency, and lack of universal value, achieving efficient and Generalized audit function, ideal efficiency, effect of enhancing robustness and completeness

Pending Publication Date: 2022-08-09
JINAN UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, compliance auditing of distributed ledgers often faces the following challenges: 1) The degree of protection of user privacy is insufficient. In order to ensure that auditors complete the audit tasks correctly, auditors may have access to user data beyond the necessary level; 2) The limitations of the audit function, when the user data is encrypted, the audit work under privacy protection is often only applicable to specific audit categories, and has no general value; 3) Audit efficiency is low, and audit work under privacy protection often relies on zero For complex calculations such as knowledge proof, the audit efficiency cannot adapt to the data volume in the era of big data
Existing solutions still do not solve this type of problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TEE-based privacy protection distributed account book auditing method and system
  • TEE-based privacy protection distributed account book auditing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0067] like figure 1 As shown, the TEE-based privacy-preserving distributed ledger auditing method includes the following steps:

[0068] Step S1: The user submits a registration application to the service provider, and the approved user obtains the service provider's signature certification σ.

[0069] In this embodiment, the user presents the service provider with personal identity information and relevant certification materials, including but not limited to pictures, text (WORD, PDF, etc.), and the service provider will identify the user's unique identifier U after the application materials are approved. Make a digital signature σ=∑.Sig(ssk P , U), if a user can register multiple different accounts with a single service provider, a timestamp or other identification can be added to the signature content to distinguish it. After the user receives the signature, verify ∑.Vf(spk P , U, σ) = 1;

[0070] Among them, ∑ is the signature scheme used by P, Sig is the signature a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection distributed account book auditing method and system based on TEE, and the method comprises the steps: firstly selecting a proper service provider by a customer, and registering as a legal user; in order to process a user service request, a service provider successfully runs a transaction verification program in a trusted execution environment after being authorized by a supervisor; before a service request is initiated, a user reads the latest state of the distributed account book and obtains confidential information to which the user belongs; the user anonymously obtains the latest identity certificate from the supervisor; and the user requests the service provider for the available trusted execution environment, and finally, the user sends an identity certificate and a transaction request to the trusted execution environment to complete the transaction. In an auditing link, an auditor describes an auditing task by using an executable file, and if a supervisor approves auditing, the auditor can obtain an auditing result but cannot access the auditing process. According to the method, the efficient and generalized auditing function can be realized on the premise of fully protecting the privacy of the user.

Description

technical field [0001] The invention belongs to the technical field of distributed ledgers, and in particular relates to a TEE-based privacy protection distributed ledger audit method and system. Background technique [0002] Audit generally refers to the inspection or review of a specific process, quality system or compliance, which plays an irreplaceable role in deterring or exposing illegal and fraudulent behavior, and is also one of the main means to solve the "information asymmetry" dilemma. one. For example, financial regulators in major economies around the world generally require listed companies to regularly disclose audited financial reports to investors and other stakeholders to protect stakeholders from major economic losses. The emergence of distributed ledger technology (such as blockchain technology, etc.) has brought about a turning point for the auditing work. Its record cannot be tampered with, which can effectively prevent the data to be audited from bein...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06F21/62G06Q20/40
CPCG06Q20/3825G06Q20/3829G06Q20/3823G06F21/6245G06Q20/401G06Q20/3827
Inventor 吴永东叶竹风刘志全田湘岚吴正豪江滋可李明
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products