Movatterモバイル変換


[0]ホーム

URL:


CN111008836A - Privacy safe transfer payment method, device and system based on monitorable block chain and storage medium - Google Patents

Privacy safe transfer payment method, device and system based on monitorable block chain and storage medium
Download PDF

Info

Publication number
CN111008836A
CN111008836ACN201911120359.1ACN201911120359ACN111008836ACN 111008836 ACN111008836 ACN 111008836ACN 201911120359 ACN201911120359 ACN 201911120359ACN 111008836 ACN111008836 ACN 111008836A
Authority
CN
China
Prior art keywords
transaction
privacy
mintette
central bank
transfer payment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911120359.1A
Other languages
Chinese (zh)
Other versions
CN111008836B (en
Inventor
蒋琳
王轩
吴大龙
吕佳卓
张丁文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology Shenzhen
Original Assignee
Harbin Institute of Technology Shenzhen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology ShenzhenfiledCriticalHarbin Institute of Technology Shenzhen
Priority to CN201911120359.1ApriorityCriticalpatent/CN111008836B/en
Publication of CN111008836ApublicationCriticalpatent/CN111008836A/en
Application grantedgrantedCritical
Publication of CN111008836BpublicationCriticalpatent/CN111008836B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本发明提供了一种基于可监管区块链的隐私安全转账支付方法、装置、系统及存储介质,该隐私安全转账支付方法包括:交易金额的隐私保护步骤:对交易中的交易金额进行隐私保护;交易地址保护步骤:对交易双方的地址进行保护;以及交易监管步骤。本发明的有益效果是:本发明解决了传统转账支付方案中过度依赖第三方机构的问题;明确了交易中需要保护的隐私信息,针对交易块中的交易金额、交易双方的交易余额、交易发起方的地址信息和交易接收方的地址信息,设计了相对应的隐私保护方案;建立对区块链用户监管体系,监管者可以保留追究在区块链上进行买卖双方的责任。

Figure 201911120359

The present invention provides a privacy and security transfer payment method, device, system and storage medium based on a supervised blockchain. The privacy security transfer payment method includes: a privacy protection step of transaction amount: privacy protection of transaction amount in the transaction ; Transaction address protection steps: protect the addresses of both parties to the transaction; and transaction supervision steps. The beneficial effects of the present invention are: the present invention solves the problem of over-reliance on third-party institutions in the traditional transfer payment scheme; clarifies the privacy information that needs to be protected in the transaction, and aims at the transaction amount in the transaction block, the transaction balance of both parties, and the transaction initiation. According to the address information of the party and the address information of the transaction recipient, a corresponding privacy protection scheme has been designed; a supervision system for blockchain users has been established, and the supervisor can retain the responsibility of both buyers and sellers on the blockchain.

Figure 201911120359

Description

Privacy safe transfer payment method, device and system based on monitorable block chain and storage medium
Technical Field
The invention relates to the technical field of network transfer payment, in particular to a private safe transfer payment method, device and system based on a supervisor block chain and a storage medium.
Background
Abbreviations and key term definitions:
UTXO: unused Transaction Output.
Ring signature: ring signatures are a digital signature scheme, originally proposed by Rivest et al, which is a simplified group signature in which only ring members have no administrator and no cooperation between ring members is required.
Homomorphic encryption: homomorphic encryption is a cryptographic technique based on the theory of computational complexity of mathematical problems. The homomorphic encrypted data is processed to produce an output, which is decrypted, the result being the same as the output obtained by processing the unencrypted original data in the same way.
The following detailed description of the background art is provided:
1. background of the related Art (background of the invention)
With the development of the internet, the life style of people is greatly influenced, and most commodity transactions are carried out in a mode of network transfer payment. In conventional transfer payment transaction systems, when a transaction is made, the transaction is confirmed by a third party institution, and the asset is also stored in a database of the third party institution. This storage and transaction approach places high demands on the stability and security of third party institutions. On one hand, since the system is completely centralized and has only one central mechanism, the system needs to confirm all transactions in the system, and once a fault occurs, the whole system is paralyzed and cannot operate normally. On the other hand, an attacker and a manager can modify the database data, and the data recovery difficulty and the cost of the database are high. Therefore, the traditional transfer payment system depends on the trust and the safety of a third party, and certain potential safety hazards exist.
In 2008, NakamotoS published a paper about electronic cash systems, and the paper proposed bitcoin network. With the advent and development of cryptocurrency such as Bingpene, blockchain technology is slowly known, and more experts and scholars are beginning to research and explore blockchain related technologies and applications. The blockchain technique is generated by combining database techniques and various cryptographic techniques, including elliptic curve encryption, asymmetric key encryption mechanisms, hash algorithms, consensus algorithms, and the like. The blockchain may be regarded as a Distributed Shared Ledger (Distributed Shared Ledger), and the recording and storing of transaction information are jointly performed by all nodes in the blockchain network. That is, any node in the blockchain network can record the transaction information in the transaction block and write the transaction information into the blockchain after the transaction information passes the verification, instead of a completely centralized third-party organization completing the confirmation and recording of the transaction information; any node in the blockchain network may store all transaction information after the self-created block, rather than being centrally stored by a fully centralized third party. The transaction data of the block chain is stored according to the time sequence, and the adjacent transaction blocks are mutually connected through the cryptography technology, so that the formed block chain is credible and cannot be tampered.
The blockchain fundamentally solves the problem of relying on a third party in the transfer payment transaction, and modern cryptography which is proved to be safe by theory and practice is used. The method has higher safety and can protect the privacy of the identity of the user transaction to a certain extent. The distributed account book reduces the pressure of storing asset transaction information in the traditional database, and the stability of a block chain system is ensured through multi-node combined maintenance.
In the blockchain, accounts of the blockchain are commonly maintained by all nodes in the network, any node can participate in the generation of the block and connect the block to the blockchain, and even nodes which are not trusted mutually can verify transaction data in the block and achieve the agreement through a consensus mechanism. The account balance of the user can be checked in the blockchain, and the plaintext information is not encrypted, so that all nodes in the blockchain can obtain the public information. Meanwhile, when the user conducts the transfer payment transaction, the verification of the transaction needs to be participated by other nodes on the chain, so that the information such as the transaction amount in the block main body is also in the clear text. This results in the user's transaction privacy data being exposed on the blockchain, and it is clear that no one wishes to have his own privacy information revealed. For example, from the generation of the BiBingche System founded blocks to date, all transaction data in the system was roughly 190G. If the attacker analyzes and integrates the historical transaction data, all transaction information of any one designated account can be acquired. Even if the same user has a plurality of account addresses, the adversary can analyze which addresses belong to the same user with high probability through technologies such as clustering-based behavior analysis and the like. And since all transactions conducted with the corresponding account addresses can be found in the blockchain, if the transactions are associated with real identities, the identity information of the transactants in the transactions and the related transaction records can be revealed.
Therefore, on the basis of the blockchain technology, the characteristics of anonymity, distrust removal, non-tampering and the like of the blockchain are researched, and privacy protection is carried out on transaction data through a technical means, so that the blockchain technology can be more reasonably applied to the aspect of transfer payment transaction. Due to the fully decentralized nature of blockchain, which results in illegal transactions on the chain not being effectively supervised, the supervision of blockchain technology also needs to be studied from a technical level.
2. Prior art relating to the invention
2.1) technical solution of the prior art
Payment is the fundamental link in the circulation of funds. In the cross-border transfer and clearing field, the transaction has the problems of high cost, time consumption, safety and the like. With the development of the blockchain technology, underlying technology developers and traditional financial institutions pay attention to the blockchain, and whether the blockchain can play advantages in aspects of reducing settlement risks, improving payment efficiency, saving bank resources and the like is achieved, so that the existing transfer payment mode is improved. The characteristics of decentralization, distrust, collective maintenance, data transparency and the like of the block chain can be well combined with the financial field, particularly in the aspect of transfer payment transaction. The data of fund transfer is completely recorded on a digital classification book, and each transaction can be traced, so that the safety and reliability of the transaction are ensured; by using the block chain and distributed account book technology, an intermediate mechanism does not exist, the step of manual processing by bank staff does not exist, the transfer payment becomes point-to-point, and the processing time is directly reduced; canceling an intermediate mechanism to ensure that the transaction flows and the transaction information of payment and collection are transparent to both transaction parties; and no intermediate mechanism participates, so that the cost is reduced, and the operating efficiency of the system is improved.
2.2) evaluation of the disadvantages of the prior art
Existing blockchain techniques do not provide privacy protection well for users. Androuaki E et al evaluate the ability of traditional blockchain techniques to protect user privacy by simulating the trading of bitcoin, and experimental results show that 40% of users' true identities can be exposed through a behavior-based clustering method. There are two main reasons why user privacy is compromised. One is open transaction amount, transaction metadata and a whole network ledger, which allows an attacker to acquire a large amount of identity information about a user, and the other is obvious correlation characteristics between an account of a transaction initiator and an account of a transaction receiver in a transaction, so that the attacker can trace corresponding historical transactions.
The prior art has no effective supervision mechanism. In addition to paying attention to the development and application of the block chain technology, the illegal transactions on the chain cannot be effectively supervised and cannot be checked for sensitive transactions due to the completely decentralized characteristic of the block chain.
Disclosure of Invention
The invention provides a private safe transfer payment method based on a manageable block chain, which comprises the following steps:
privacy protection of transaction amount: privacy protection is carried out on the transaction amount in the transaction;
transaction address protection: protecting the addresses of both parties of the transaction;
transaction supervision steps: the system comprises a central bank, three roles of an mintette and a user, wherein the mintette is authorized by the central bank to record transactions, a central bank can generate a public key for each mintette and regularly issues an authorized mintettes list to the whole system, each mintette maintains a low-level account book, direct or indirect communication is realized among the mintettes, the mintettes can send the low-level account books to the central bank in the process of regulation, so that a global account book is generated, and the global account book has visibility to the outside.
As a further improvement of the invention, in the privacy protection step of the transaction amount, a privacy protection algorithm based on homomorphic encryption is adopted: let x be1,y1,x2,y2Each represents P1Pre-transaction balance, P2Pre-transaction balance, P1Post-transaction balance and P2Post-transaction balance of), P)1And P2Respectively representing two institutions participating in the transfer transaction, there being currently two pairs of cryptograms (E)pk(x1),Epk(y1)),(Epk(x2),Epk(y2) The goal is to guarantee x1,y1,x2,y2While privacy is obtainedpk(x1+y1),Epk(x2+y2) And judges whether the two are equal.
As a further improvement of the invention, the transaction address protection step adopts a mixed currency algorithm based on a one-time hidden address, P1Initiating a transaction to P2Payment, P1By analysis of P2Wallet address of P2The public key (a, B) of (a), wherein a ═ aG, B ═ bG; p1Generating a random number r e [1, l-1 ∈ ]]And calculates a one-time public key P ═ Hs(rA)G+B;P1Using P as the output destination address public key, and writing R-rG into the transaction block, and aiming at the same address, P1Different one-time public key addresses, P, can be generated by selecting different random numbers r1Will be provided with
Figure RE-GDA0002401989390000041
And
Figure RE-GDA0002401989390000042
writing the result into the transaction block; p1Broadcasting the transaction all over the network; p2Calculate P' ═ H using his private key (a, b)s(aR) G + B when P is detected1The transaction issued to him, P' ═ P since aR arG rA; p2Calculating a disposable private key x H corresponding to the disposable public key P xG according to the private keys (a, b)s(aR)+b;P2Received P using its one-time public key1Payment of (2); for other users in the system, the one-time public key address of the transaction is not related to the true identity of the user;
Figure RE-GDA0002401989390000043
and
Figure RE-GDA0002401989390000044
for supervision by a third-party supervision authority, the supervision party uses the sk when the current transaction needs to be reviewedBCPCan be decrypted to obtain r and rA, combined with P ═ Hs(rA) G + B to obtain (A, B), namely the real address of the receiver;
g represents a base point of the elliptic curve, l represents a prime order of the base point, HsRepresenting an encrypted hash function 0,1*→FqAnd E represents an elliptic curve expression.
As a further improvement of the present invention, the transaction address protection step adopts a mixed currency algorithm based on revocable anonymity ring signature, which includes: (x, P) ← Gen (1)k) Gen is a polynomial time algorithm, k is a security parameter, a pair of keys (x, P) is output, x is a private key, P is a public key, and a key image I is obtained through calculation according to (x, P);
σ←Sig(1kx, L, m), Sig is a polynomial time algorithm, k is a security parameter, x is a private key, L is n user public key sets participating in ring signature, the user public key sets comprise public keys corresponding to x, m is a signed message, and the output is signature sigma;
1/0←Ver(1kl, m, σ), Ver is a polynomial time algorithm, k is a security parameter, L is a set of n user public keys participating in ring signature, m is a signed message, σ is a signature, output 1 indicates that the verification is passed, and output 0 indicates that the verification is not passed;
1/0←Lnk(1kk, σ), Lnk is a polynomial time algorithm, K is a security parameter, K is the set of all I generated by the history, σ is a signature, output 1 indicates that the signature is linked, and output 0 indicates that the signature is not linked;
1/0←Rev(1kσ, sk), Rev is a polynomial time algorithm, k is a security parameter, σ is a signature, sk is a private key in the hands of the supervisor, output 1 indicates that the signature is valid and the identity of the signer is confirmed, and output 0 indicates that the signature is invalid.
As a further improvement of the invention, in the transaction supervision step, the minsites are firstly divided into a plurality of groups, and the minsites of each group only maintain the account book content in the jurisdiction area; when a user initiates a transaction, the system delivers corresponding mintes to process according to corresponding rules; the information exchange between the end user and the central bank does not take place directly, but the transaction records are summarized through this mintettes middle layer; the central bank plays a vital role in the system, and has unique supervision and audit authority on the global account book when transaction disputes or illegal transactions occur; in the transaction in each mintette jurisdiction range, if the transaction flow is according to a previously designed transfer payment transaction scheme, the verification and confirmation of the user transfer payment transaction are completed by other users in the system, the mintette does not independently verify and record the transaction, but plays a role in bottom layer supervision, and sends a low-layer ledger to a central bank in a specific time period; the transactions in different mintette areas are not interfered with each other, each mintette can only decrypt the transaction data in the jurisdiction area, and the central bank has the highest supervision right and can decrypt any transaction data.
The invention also provides a private safe transfer payment system based on the supervisor block chain, which comprises:
privacy protection module of transaction amount: the system is used for privacy protection of transaction amount in the transaction;
the transaction address protection module: the system is used for protecting the addresses of both transaction parties;
the transaction supervision module: the system comprises a central bank, three roles of an mintette and a user, wherein the mintette is authorized by the central bank to record transactions, a central bank can generate a public key for each mintette and regularly issues an authorized mintettes list to the whole system, each mintette maintains a low-level account book, direct or indirect communication is realized among the mintettes, the mintettes can send the low-level account books to the central bank in the process of regulation, so that a global account book is generated, and the global account book has visibility to the outside.
As a further improvement of the invention, in the privacy protection module of the transaction amount, a privacy protection algorithm based on homomorphic encryption is adopted: let x be1,y1,x2,y2Each represents P1Pre-transaction balance, P2Pre-transaction balance, P1Post-transaction balance and P2Post-transaction balance of), P)1And P2Respectively representing two institutions participating in the transfer transaction, there being currently two pairs of cryptograms (E)pk(x1),Epk(y1)),(Epk(x2),Epk(y2) The goal is to guarantee x1,y1,x2,y2While privacy is obtainedpk(x1+y1),Epk(x2+y2) And judges whether the two are equal.
As a further improvement of the invention, in the transaction supervision module, the minutes are firstly divided into a plurality of groups, and the minutes of each group only maintain the account book content in the jurisdiction area; when a user initiates a transaction, the system delivers corresponding mintes to process according to corresponding rules; the information exchange between the end user and the central bank does not take place directly, but the transaction records are summarized through this mintettes middle layer; the central bank plays a vital role in the system, and has unique supervision and audit authority on the global account book when transaction disputes or illegal transactions occur; in the transaction in each mintette jurisdiction range, if the transaction flow is according to a previously designed transfer payment transaction scheme, the verification and confirmation of the user transfer payment transaction are completed by other users in the system, the mintette does not independently verify and record the transaction, but plays a role in bottom layer supervision, and sends a low-layer ledger to a central bank in a specific time period; the transactions in different mintette areas are not interfered with each other, each mintette can only decrypt the transaction data in the jurisdiction area, and the central bank has the highest supervision right and can decrypt any transaction data.
The invention also provides a private safe transfer payment device based on the supervisor block chain, which comprises: memory, a processor, and a computer program stored on the memory, the computer program configured to implement the steps of the private secure transfer payment method of the present invention when invoked by the processor.
The present invention also provides a computer readable storage medium having stored thereon a computer program configured to, when invoked by a processor, perform the steps of the private secure transfer payment method of the present invention.
The invention has the beneficial effects that: the invention solves the problem that the traditional transfer payment scheme excessively depends on a third party mechanism; defining privacy information to be protected in the transaction, and designing a corresponding privacy protection scheme aiming at the transaction amount in a transaction block, the transaction balance of both transaction parties, the address information of a transaction initiator and the address information of a transaction receiver; a block chain user supervision system is established, and a supervisor can reserve the responsibility of researching both parties of buying and selling on the block chain.
Drawings
FIG. 1 is a diagram of a melting block chain model.
Fig. 2 is a schematic diagram of a standard transaction structure.
Fig. 3 is a two-level policing architecture diagram.
Fig. 4 is a system architecture diagram.
Fig. 5 is a method flow diagram.
Fig. 6 is a schematic diagram of an initialization phase.
Fig. 7 is a schematic diagram of a ring signature.
Fig. 8 is a schematic diagram of the verification phase.
Detailed Description
The invention discloses a private safe transfer payment method based on a monitorable block chain, which is specifically explained as follows:
brief description of the technical principles:
in the transfer payment transaction scenario, assume that the participant has P1,P2,P3Three institutions and a supervisor S, as shown in fig. 1. When P is present1To P2A transaction is made with a transfer amount x, then the account T ═ P1,P2X) will be broadcast in the network, P1,P2,P3T transactions are received. However, the transaction is only P1,P2Transaction between, and P3Has no relation, therefore P3The actual content of the transaction should not be known. But P is3It is still necessary to record the transaction, ensure the ledger record and P1,P2The account book is consistent.
(1) At the moment of unknown P1,P2In the case of address information and transaction contents, P3The legitimacy of the transfer may be confirmed. Here, legitimacy has two implications: p1The method can prove that the user owns one asset, the asset is abstracted to an asset identifier corresponding to a certain specific and globally unique ID, and the asset identifier is still invisible and hidden for others; p1The assets can be proved to be legal in the network, namely, the assets have uniqueness and are not used, P1A proof needs to be provided.
(2) At the moment of unknown P1,P2In the case of inter-transaction amounts, P3The fund transaction settlement of the account book can be carried out, and the accounting balance is confirmed. According to accounting rules, P1And P2After the transaction, the balance totals of the assets (e.g., deposits) in hand are equal. That is, the following equation holds:
P1(Pre-transaction balance) + P2(Pre-trade balance) P1(post-transaction balance) + P2(post-transaction balance)
(3) And the supervisor party S can decrypt all encrypted transaction data and perform supervision and audit on each transaction.
1. The invention is directed to transaction amountsThe disclosed problem is to provide a privacy protection algorithm based on homomorphic encryption, and the validity of the transaction can be verified under the condition of protecting transaction data by utilizing homomorphic characteristics of the algorithm. Specifically, assume x1,y1,x2,y2Each represents P1(Pre-transaction balance), P2(Pre-transaction balance), P1(post-transaction balance) and P2(post-transaction balance). There are currently two pairs of ciphertext (E)pk(x1),Epk(y1)),(Epk(x2),Epk(y2) The goal is to guarantee x1,y1,x2,y2While privacy is obtainedpk(x1+y1),Epk(x2+y2) And judges whether the two are equal.
2. Aiming at the problem of address disclosure of two parties of a transaction, the invention provides a mixed currency algorithm based on a one-time hidden address and a mixed currency algorithm based on a revocable anonymous ring signature on the basis of a CryptoNote protocol, and the address of a transaction initiator can be effectively protected by utilizing the characteristic of the ring signature, and meanwhile, a signer needs to encrypt a private key to participate in the construction of the signature, thereby guaranteeing the revocation of the anonymity under special conditions.
Based on the mixed currency algorithm of the one-time hidden address, in the process of generating the one-time public key, EdDSA is selected as the digital signature algorithm of the scheme, and the meanings of relevant parameters are shown in Table 1.
TABLE 1 EdDSA related parameters and meanings
Figure RE-GDA0002401989390000081
1)P1Initiating a transaction to P2And (6) payment. P1By analysis of P2Wallet address of P2The public key (a, B) of (a), wherein a ═ aG, B ═ bG;
2)P1generating a random number r e [1, l-1 ∈ ]]And calculates a one-time public key P ═ Hs(rA)G+B;
3)P1Using P as outputAnd writing R-rG into the transaction block. Here, P is for the same address1Different one-time public key addresses can be generated by choosing different random numbers r. Furthermore, to ensure effective supervision of the transaction, P1Need to be provided with
Figure RE-GDA0002401989390000082
And
Figure RE-GDA0002401989390000083
writing the result into the transaction block;
4)P1broadcasting the transaction all over the network;
5)P2calculate P' ═ H using his private key (a, b)s(aR) G + B when P is detected1The transaction issued to him, P' ═ P since aR arG rA;
6)P2the private key (a, b) may be used to calculate a private key x ═ H corresponding to public one-time key P ═ xGs(aR) + b, which also means that he has the right to own and use the money.
FIG. 2 is a diagram of a standard transaction structure, to which, P2Received P using its one-time public key1The payment of (2). The one-time public key address of the transaction is not associated with the user's true identity to other users in the system.
Figure RE-GDA0002401989390000084
And
Figure RE-GDA0002401989390000085
for supervision by a third-party supervision authority, the supervision party uses the sk when the current transaction needs to be reviewedBCPCan be decrypted to obtain r and rA, combined with P ═ Hs(rA) G + B in turn gets (A, B), the real address of the recipient.
The use of ring signatures is to hide the connection between user input and output addresses (untraceability). With ring signatures, a user can sign a message anonymously, and others can verify the signature without knowing which member of the ring the signature was signed by. Although ring signatures guarantee the anonymity of the users, they present another problem, how to prevent "double spending", which prevents the sender from sending the same money to different recipients. We can improve the traditional ring signature to have linkability, that is, if the user creates multiple ring signatures using the same private key of the user (the public keys of other users in the ring signatures can be arbitrarily selected), the signatures will be linked together, which represents that the user has double cost for an asset.
To make ring signatures linkable, we introduce the concept of key mirroring, which is a special label that the user generates when creating ring signatures. The private key and the public key of the user are subjected to one-way hash operation by a certain rule to obtain a value, namely the key image. Unidirectional here means that an attacker cannot reverse derive the user's private key simply by key mirroring and other public information. The key image can be regarded as an anonymous mark of the private key of the signer, all users keep the key images generated in all historical transactions in the system, and when the validity of the ring signature is verified, if the key images are already present in the historical key image library, the new ring signature is rejected whether the new ring signature is verified or not.
In the following, a mixed currency scheme is designed by using the characteristic of the ring signature, and the anonymity of the block chain is enhanced by hiding the transaction address of the user. The safety model of the scheme comprises the following five algorithms:
1)(x,P)←Gen(1k) Gen is a polynomial time algorithm, k is a security parameter; and outputting a pair of secret keys (x, P), wherein x is a private key, P is a public key, and I is obtained by calculation according to (x, P).
2)σ←Sig(1kX, L, m) Sig is a polynomial time algorithm, k is a security parameter, x is a private key, L is n user public key sets (including public keys corresponding to x) participating in ring signature, and m is a signed message; the output is the signature σ.
3)1/0←Ver(1kL, m, σ) Ver is a polynomial time algorithm, k is a security parameter, L is a set of n user public keys participating in ring signature, m is a signed message, and σ is a signature; output 1 represents verificationAn output of 0 indicates that the verification failed.
4)1/0←Lnk(1kK, σ) Lnk is a polynomial time algorithm, K is a security parameter, K is the set of all I generated historically, σ is a signature; output 1 indicates that the signature is linked and output 0 indicates that the signature is not linked.
5)1/0←Rev(1kσ, sk) Rev is a polynomial time algorithm, k is a security parameter, σ is a signature, sk is a private key in the hands of a supervisor; an output of 1 indicates that the signature is valid and the identity of the signer is confirmed, and an output of 0 indicates that the signature is invalid.
3. The invention provides a scheme of a two-stage supervision architecture aiming at the problem of transaction supervision on a block chain, and a supervisor can reserve the responsibility of pursuing buyers and sellers on the block chain.
The system comprises three roles, namely a central bank, a mintette and a user. At first sight mintette and miners look like they are both to confirm the occurrence of the transaction and then to bill. However, the most critical point is that mintette does not solve the computational difficulty problem, but is authorized by the central bank to record the transaction. The authorization is completed by PK public key encryption, and the central bank generates a public key for each mintette and periodically issues an authorized mintettes list to the whole system. Each mintette maintains a low-level ledger, with direct or indirect communication between mintettes. At a specific time, minsites can send the low-level accounts to a central bank, so that a global account is generated, and the global account has visibility to the outside.
FIG. 3 is a diagram of a two-level supervisory architecture, wherein the system utilizes multi-thread design to improve the processing power of the system. Firstly, the mintettes are divided into a plurality of groups, and the mintettes of each group only maintain the account book content in the jurisdiction area. When a user initiates a transaction, the system is processed by corresponding minutes according to corresponding rules, so that the operating efficiency of the system can be greatly improved. The exchange of information between the end user and the central bank does not take place directly, but the transaction records are aggregated through this mintettes middle layer. The central bank plays a vital role in the system, and has unique supervision and audit authority on the global account book when transaction disputes or illegal transactions occur.
In the transaction in each mintette jurisdiction, if the transaction flow is according to the previously designed transfer payment transaction scheme, the verification and confirmation of the user transfer payment transaction are completed by other users in the system, the mintette does not verify and record the transaction independently, but plays a bottom layer supervision role, and sends a low-layer ledger to a central bank in a specific time period. The transactions in different mintette areas are not interfered with each other, each mintette can only decrypt the transaction data in the jurisdiction area, and the central bank has the highest supervision right and can decrypt any transaction data.
For the privacy protection step of the transaction amount, a zero-knowledge proof scheme with better privacy protection effect can be used for privacy protection of the transaction amount in the transaction, but the performance of the system can be reduced.
For the transaction address protection step of the present invention, other mixed currency schemes, such as a Mixcoin protocol, a coin shuffle protocol, a coin protocol, etc., may also be adopted for the protection of the addresses of both parties to the transaction.
The invention also discloses a private safe transfer payment system based on the supervisor block chain, which comprises:
privacy protection module of transaction amount: the system is used for privacy protection of transaction amount in the transaction;
the transaction address protection module: the system is used for protecting the addresses of both transaction parties;
the transaction supervision module: the system comprises a central bank, three roles of an mintette and a user, wherein the mintette is authorized by the central bank to record transactions, a central bank can generate a public key for each mintette and regularly issues an authorized mintettes list to the whole system, each mintette maintains a low-level account book, direct or indirect communication is realized among the mintettes, the mintettes can send the low-level account books to the central bank in the process of regulation, so that a global account book is generated, and the global account book has visibility to the outside.
In the amount of the transactionIn the privacy protection module, a privacy protection algorithm based on homomorphic encryption is adopted: let x be1,y1,x2,y2Each represents P1Pre-transaction balance, P2Pre-transaction balance, P1Post-transaction balance and P2Post-transaction balance of), P)1And P2Respectively representing two institutions participating in the transfer transaction, there being currently two pairs of cryptograms (E)pk(x1),Epk(y1)),(Epk(x2),Epk(y2) The goal is to guarantee x1,y1,x2,y2While privacy is obtainedpk(x1+y1),Epk(x2+y2) And judges whether the two are equal.
The transaction address protection module adopts a mixed currency algorithm based on a one-time hidden address, P1Initiating a transaction to P2Payment, P1By analysis of P2Wallet address of P2The public key (a, B) of (a), wherein a ═ aG, B ═ bG; p1Generating a random number r e [1, l-1 ∈ ]]And calculates a one-time public key P ═ Hs(rA)G+B;P1Using P as the output destination address public key, and writing R-rG into the transaction block, and aiming at the same address, P1By selecting different random numbersrGenerating different one-time public key addresses, P1Will be provided with
Figure RE-GDA0002401989390000111
And
Figure RE-GDA0002401989390000112
writing the result into the transaction block; p1Broadcasting the transaction all over the network; p2Calculate P' ═ H using his private key (a, b)s(aR) G + B when P is detected1The transaction issued to him, P' ═ P since aR arG rA; p2Calculating a disposable private key x H corresponding to the disposable public key P xG according to the private keys (a, b)s(aR)+b;P2Received P using its one-time public key1Payment of (2); for in the systemFor other users, the one-time public key address of the transaction is not related to the real identity of the user;
Figure RE-GDA0002401989390000113
and
Figure RE-GDA0002401989390000114
for supervision by a third-party supervision authority, the supervision party uses the sk when the current transaction needs to be reviewedBCPCan be decrypted to obtain r and rA, combined with P ═ Hs(rA) G + B to obtain (A, B), namely the real address of the receiver;
g represents a base point of the elliptic curve, l represents a prime order of the base point, HsRepresenting an encrypted hash function 0,1*→FqAnd E represents an elliptic curve expression.
The transaction address protection module adopts a mixed currency algorithm based on a revocable anonymity ring signature, and comprises the following steps: (x, P) ← Gen (1)k) Gen is a polynomial time algorithm, k is a security parameter, a pair of keys (x, P) is output, x is a private key, P is a public key, and a key image I is obtained through calculation according to (x, P);
σ←Sig(1kx, L, m), Sig is a polynomial time algorithm, k is a security parameter, x is a private key, L is n user public key sets participating in ring signature, the user public key sets comprise public keys corresponding to x, m is a signed message, and the output is signature sigma;
1/0←Ver(1kl, m, σ), Ver is a polynomial time algorithm, k is a security parameter, L is a set of n user public keys participating in ring signature, m is a signed message, σ is a signature, output 1 indicates that the verification is passed, and output 0 indicates that the verification is not passed;
1/0←Lnk(1kk, σ), Lnk is a polynomial time algorithm, K is a security parameter, K is the set of all I generated by the history, σ is a signature, output 1 indicates that the signature is linked, and output 0 indicates that the signature is not linked;
1/0←Rev(1kσ, sk), Rev is a polynomial time algorithm, k is a security parameter, σ is a signature, sk is a supervisorThe private key in the hand, output 1 indicates that the signature is valid and the identity of the signer is confirmed, and output 0 indicates that the signature is invalid.
In the transaction supervision module, firstly, minutes are divided into a plurality of groups, and the minutes of each group only maintain the account book content in the jurisdiction area of the group; when a user initiates a transaction, the system delivers corresponding mintes to process according to corresponding rules; the information exchange between the end user and the central bank does not take place directly, but the transaction records are summarized through this mintettes middle layer; the central bank plays a vital role in the system, and has unique supervision and audit authority on the global account book when transaction disputes or illegal transactions occur; in the transaction in each mintette jurisdiction range, if the transaction flow is according to a previously designed transfer payment transaction scheme, the verification and confirmation of the user transfer payment transaction are completed by other users in the system, the mintette does not independently verify and record the transaction, but plays a role in bottom layer supervision, and sends a low-layer ledger to a central bank in a specific time period; the transactions in different mintette areas are not interfered with each other, each mintette can only decrypt the transaction data in the jurisdiction area, and the central bank has the highest supervision right and can decrypt any transaction data.
The invention also discloses a private safe transfer payment device based on the supervisor block chain, which comprises: memory, a processor, and a computer program stored on the memory, the computer program configured to, when invoked by the processor, perform the steps of the private secure transfer payment method of the present invention.
The invention also discloses a computer readable storage medium storing a computer program configured to, when invoked by a processor, perform the steps of the private secure transfer payment method of the invention.
The invention has the beneficial effects that: the invention solves the problem that the traditional transfer payment scheme excessively depends on a third party mechanism; defining privacy information to be protected in the transaction, and designing a corresponding privacy protection scheme aiming at the transaction amount in a transaction block, the transaction balance of both transaction parties, the address information of a transaction initiator and the address information of a transaction receiver; a block chain user supervision system is established, and a supervisor can reserve the responsibility of researching both parties of buying and selling on the block chain.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (10)

Translated fromChinese
1.一种基于可监管区块链的隐私安全转账支付方法,其特征在于,包括:1. A privacy security transfer payment method based on a regulated blockchain, characterized in that, comprising:交易金额的隐私保护步骤:对交易中的交易金额进行隐私保护;Privacy protection steps of transaction amount: privacy protection of transaction amount in transaction;交易地址保护步骤:对交易双方的地址进行保护;Transaction address protection steps: protect the addresses of both parties to the transaction;交易监管步骤:包括中心银行、mintette和用户三种角色,mintette被中心银行授权来记录交易,中心银行会对每一个mintette生成公钥,并定期向整个系统发布授权的mintettes列表,每个mintette都维护一个低层账本,mintettes之间会有直接或间接的交流,在规定的时候,mintettes会把这些低层账本发给中心银行,从而生成全局账本,全局账本才对外界具有可见性。Transaction supervision steps: including three roles of central bank, mintette and user. Mintette is authorized by the central bank to record transactions. The central bank will generate a public key for each mintette and regularly publish a list of authorized mintettes to the entire system. To maintain a low-level ledger, there will be direct or indirect communication between mintettes. When specified, mintettes will send these low-level ledger to the central bank to generate a global ledger, which is visible to the outside world.2.根据权利要求1所述的隐私安全转账支付方法,其特征在于,在交易金额的隐私保护步骤中,采用基于同态加密的隐私保护算法:假设x1,y1,x2,y2分别代表P1的交易前余额、P2的交易前余额、P1的交易后余额和P2的交易后余额),P1和P2分别表示参加转账交易的两家机构,当前有两对密文(Epk(x1),Epk(y1)),(Epk(x2),Epk(y2)),目标是在保证x1,y1,x2,y2隐私性的同时,得到Epk(x1+y1),Epk(x2+y2)并判断两者是否相等;2. The privacy security transfer payment method according to claim 1, wherein in the privacy protection step of the transaction amount, a privacy protection algorithm based on homomorphic encryption is adopted: assuming x1 , y1 , x2 , y2 respectively represent the pre-transaction balance of P1 , the pre-transaction balance of P2 , the post-transaction balance of P1 and the post-transaction balance of P2 ), P1 and P2 respectively represent the two institutions participating in the transfer transaction, and there are currently two pairs of Ciphertext (Epk (x1 ),Epk (y1 )),(Epk (x2 ),Epk (y2 )), the goal is to guarantee the privacy of x1 ,y1 ,x2 ,y2 At the same time, get Epk (x1 +y1 ), Epk (x2 +y2 ) and judge whether the two are equal;Epk(x1)表示用密钥pk加密x1所得到的密文,Epk(y1)表示用密钥pk加密y1所得到的密文,Epk(x2)表示用密钥pk加密x2所得到的密文,Epk(y1)表示用密钥pk加密y1所得到的密文。Epk (x1 ) represents the ciphertext obtained by encrypting x1 with the key pk, Epk (y1 ) represents the ciphertext obtained by encrypting y1 with the key pk, and Epk (x2 ) represents the ciphertext encrypted with the key pk For the ciphertext obtained by x2, Epk (y1 ) represents the ciphertext obtained by encrypting y1 with the key pk.3.根据权利要求1所述的隐私安全转账支付方法,其特征在于,所述交易地址保护步骤采用基于一次性隐匿地址的混币算法,P1发起一笔交易,需要向P2付款,P1通过分析P2的钱包地址得到P2的公钥(A,B),其中A=aG,B=bG,(a,b)表示P2的私钥;P1产生一个随机数r∈[1,l-1],并计算一次性公钥P=Hs(rA)G+B,rA表示随机数r与A在椭圆曲线上的乘积;P1使用P作为输出的目的地址公钥,同时将R=rG写入交易块,R为公共参数,针对同一个地址,P1可以通过选取不同的随机数r产生不同的一次性公钥地址,P1
Figure FDA0002275299500000011
Figure FDA0002275299500000012
结果写入交易块,
Figure FDA0002275299500000013
Figure FDA0002275299500000014
表示使用BCP公钥加密得到的密文;P1全网广播这笔交易;P2使用他的私钥(a,b)计算P′=Hs(aR)G+B,P′表示交易的接收者通过计算得到的一次性公钥,用来验证交易发送者发送的信息是否正确,当检测到P1发给他的这笔交易,由于aR=arG=rA,所以P′=P;P2根据私钥(a,b)计算出一次性公钥P=xG对应的一次性私钥x=Hs(aR)+b;P2使用自己的一次性公钥收到了P1的付款;对于系统中的其他用户来说,该笔交易的一次性公钥地址与用户的真实身份是不关联的;
Figure FDA0002275299500000021
Figure FDA0002275299500000022
用于第三方监管机构的监管,当需要对当前交易进行审计时,监管方使用skBCP可解密得到r及rA,结合P=Hs(rA)G+B进而得到(A,B),即接收方的真实地址,skBCP表示BCP私钥;G表示椭圆曲线的一个基点,l表示基点的一个素数阶,Hs表示一个加密的哈希函数{0,1}*→Fq,E表示一个椭圆曲线表达式。3. The privacy and security transfer payment method according to claim 1, wherein the transaction address protection step adopts a currency mixing algorithm based on a one-time hidden address, and P1 initiates a transaction and needs to pay to P2 , and P1 Obtain the public key (A, B) of P2 by analyzing the wallet address of P2 , where A=aG, B=bG, (a, b) represents the private key of P2 ; P1 generates a random number r∈[ 1,l-1], and calculate the one-time public key P=Hs (rA)G+B, rA represents the product of the random number r and A on the elliptic curve; P1 uses P as the output destination address public key, At the same time, R=rG is written into the transaction block, R is a public parameter, for the same address, P1 can generate different one-time public key addresses by selecting different random numbers r, and P1 will
Figure FDA0002275299500000011
and
Figure FDA0002275299500000012
The result is written into the transaction block,
Figure FDA0002275299500000013
and
Figure FDA0002275299500000014
Represents the ciphertext encrypted with the BCP public key; P1 broadcasts the transaction on the entire network; P2 uses his private key (a, b) to calculate P′=Hs (aR)G+B, P′ represents the transaction The one-time public key obtained by the receiver through calculation is used to verify whether the information sent by the transaction sender is correct. When the transaction sent to him by P1 is detected, since aR=arG=rA, P′=P; P2 Calculate the one-time private key x=Hs (aR)+b corresponding to the one-time public key P=xG according to the private key (a, b); P2 uses its one-time public key to receive the payment from P1 ; For other users in the system, the one-time public key address of the transaction is not associated with the real identity of the user;
Figure FDA0002275299500000021
and
Figure FDA0002275299500000022
It is used for the supervision of third-party regulators. When the current transaction needs to be audited, the regulator can decrypt r and rA using skBCP , and combine P=Hs (rA)G+B to obtain (A, B), namely The real address of the receiver, skBCP represents the BCP private key; G represents a base point of the elliptic curve, l represents a prime order of the base point, Hs represents an encrypted hash function {0,1}* →Fq , E represents An elliptic curve expression.4.根据权利要求1所述的隐私安全转账支付方法,其特征在于,所述交易地址保护步骤采用基于可撤销匿名性环签名的混币算法,包括:(x,P)←Gen(1k),Gen是一个多项式时间算法,k是安全参数,输出一对密钥(x,P),x为私钥,P为公钥,根据(x,P)计算得到密钥镜像I;4. The privacy and security transfer payment method according to claim 1, wherein the transaction address protection step adopts a currency mixing algorithm based on a revocable anonymous ring signature, comprising: (x, P)←Gen(1k ), Gen is a polynomial time algorithm, k is a security parameter, outputs a pair of keys (x, P), x is the private key, P is the public key, and the key image I is calculated according to (x, P);σ←Sig(1k,x,L,m),Sig是一个多项式时间算法,k是安全参数,x为私钥,L为参与环签名的n个用户公钥集合,用户公钥集合包含x对应的公钥,m为签名的消息,输出为签名σ;σ←Sig(1k ,x,L,m), Sig is a polynomial time algorithm, k is the security parameter, x is the private key, L is the public key set of n users participating in the ring signature, and the user public key set contains x The corresponding public key, m is the signed message, and the output is the signature σ;1/0←Ver(1k,L,m,σ),Ver是一个多项式时间算法,k是安全参数,L为参与环签名的n个用户公钥集合,m为签名的消息,σ为签名,输出1表示验证通过,输出0表示验证不通过;1/0←Ver(1k ,L,m,σ), Ver is a polynomial time algorithm, k is a security parameter, L is the public key set of n users participating in the ring signature, m is the signed message, and σ is the signature , the output 1 indicates that the verification is passed, and the output 0 indicates that the verification is not passed;1/0←Lnk(1k,K,σ),Lnk是一个多项式时间算法,k是安全参数,K为历史产生的所有I的集合,σ为签名,输出1表示签名被链接,输出0表示签名未被链接;1/0←Lnk(1k ,K,σ), Lnk is a polynomial time algorithm, k is the security parameter, K is the set of all Is generated in history, σ is the signature, the output 1 means the signature is linked, and the output 0 means The signature is not linked;1/0←Rev(1k,σ,sk),Rev是一个多项式时间算法,k是安全参数,σ为签名,sk是监管者手中的私钥,输出1表示签名有效且签名者的身份被确认,输出0表示签名无效。1/0←Rev(1k ,σ,sk), Rev is a polynomial time algorithm, k is the security parameter, σ is the signature, sk is the private key in the hands of the supervisor, the output 1 indicates that the signature is valid and the identity of the signer is confirmed. Confirm, output 0 means the signature is invalid.5.根据权利要求1至4任一项所述的隐私安全转账支付方法,其特征在于,在所述交易监管步骤中,首先将mintettes分成多个小组,每个小组的mintettes只维护自己管辖区域内的账本内容;当用户发起交易时,系统按照相应的规则交由对应的mintettes来处理;最终用户和中心银行之间的信息交换不是直接发生的,而是通过这个mintettes中间层来汇总交易记录;中心银行在系统中有着至关重要的作用,当出现交易纠纷或者不合法的交易时,中心银行对全局账本有唯一的监管和审计权限;在每个mintette管辖范围内的交易,如果交易流程按照之前设计的转账支付交易方案,用户转账支付交易的验证和确认由系统中的其他用户完成,mintette不再单独验证和记录交易,而是起到一个底层的监管作用,在特定时间段将低层账本发送给中心银行;不同mintette区域的交易互不干扰,每个mintette只能解密自己管辖区域的交易数据,中心银行具有最高的监管权,它可对任意一笔交易数据进行解密。5. The privacy security transfer payment method according to any one of claims 1 to 4, characterized in that, in the transaction supervision step, mintettes are first divided into multiple groups, and the mintettes of each group only maintain their own jurisdiction area When a user initiates a transaction, the system hands it over to the corresponding mintettes for processing according to the corresponding rules; the information exchange between the end user and the central bank does not happen directly, but through the middle layer of the mintettes to aggregate transaction records ; The central bank plays a vital role in the system. When there is a transaction dispute or illegal transaction, the central bank has the only supervision and audit authority for the global ledger; transactions within the jurisdiction of each mintette, if the transaction process According to the previously designed transfer payment transaction scheme, the verification and confirmation of the user's transfer payment transaction is completed by other users in the system. Mintette no longer verifies and records the transaction separately, but plays an underlying supervisory role. The ledger is sent to the central bank; transactions in different mintette areas do not interfere with each other, each mintette can only decrypt the transaction data in its own jurisdiction, and the central bank has the highest supervision power, which can decrypt any transaction data.6.一种基于可监管区块链的隐私安全转账支付系统,其特征在于,包括:交易金额的隐私保护模块:用于对交易中的交易金额进行隐私保护;6. A privacy security transfer payment system based on a regulated blockchain, characterized in that it comprises: a privacy protection module for transaction amount: for privacy protection of transaction amount in the transaction;交易地址保护模块:用于对交易双方的地址进行保护;Transaction address protection module: used to protect the addresses of both parties to the transaction;交易监管模块:包括中心银行、mintette和用户三种角色,mintette被中心银行授权来记录交易,中心银行会对每一个mintette生成公钥,并定期向整个系统发布授权的mintettes列表,每个mintette都维护一个低层账本,mintettes之间会有直接或间接的交流,在规定的时候,mintettes会把这些低层账本发给中心银行,从而生成全局账本,全局账本才对外界具有可见性。Transaction supervision module: including three roles of central bank, mintette and user. The mintette is authorized by the central bank to record transactions. The central bank will generate a public key for each mintette and regularly publish a list of authorized mintettes to the entire system. To maintain a low-level ledger, there will be direct or indirect communication between mintettes. When specified, mintettes will send these low-level ledger to the central bank to generate a global ledger, which is visible to the outside world.7.根据权利要求6所述的隐私安全转账支付系统,其特征在于,在交易金额的隐私保护模块中,采用基于同态加密的隐私保护算法:假设x1,y1,x2,y2分别代表P1的交易前余额、P2的交易前余额、P1的交易后余额和P2的交易后余额),P1和P2分别表示参加转账交易的两家机构,当前有两对密文(Epk(x1),Epk(y1)),(Epk(x2),Epk(y2)),目标是在保证x1,y1,x2,y2隐私性的同时,得到Epk(x1+y1),Epk(x2+y2)并判断两者是否相等;7. The privacy security transfer payment system according to claim 6, wherein, in the privacy protection module of the transaction amount, a privacy protection algorithm based on homomorphic encryption is adopted: assuming x1 , y1 , x2 , y2 respectively represent the pre-transaction balance of P1 , the pre-transaction balance of P2 , the post-transaction balance of P1 and the post-transaction balance of P2 ), P1 and P2 respectively represent the two institutions participating in the transfer transaction, and there are currently two pairs of Ciphertext (Epk (x1 ),Epk (y1 )),(Epk (x2 ),Epk (y2 )), the goal is to guarantee the privacy of x1 ,y1 ,x2 ,y2 At the same time, get Epk (x1 +y1 ), Epk (x2 +y2 ) and judge whether the two are equal;Epk(x1)表示用密钥pk加密x1所得到的密文,Epk(y1)表示用密钥pk加密y1所得到的密文,Epk(x2)表示用密钥pk加密x2所得到的密文,Epk(y1)表示用密钥pk加密y1所得到的密文。Epk (x1 ) represents the ciphertext obtained by encrypting x1 with the key pk, Epk (y1 ) represents the ciphertext obtained by encrypting y1 with the key pk, and Epk (x2 ) represents the ciphertext encrypted with the key pk For the ciphertext obtained by x2, Epk (y1 ) represents the ciphertext obtained by encrypting y1 with the key pk.8.根据权利要求6至7任一项所述的隐私安全转账支付系统,其特征在于,在所述交易监管模块中,首先将mintettes分成多个小组,每个小组的mintettes只维护自己管辖区域内的账本内容;当用户发起交易时,系统按照相应的规则交由对应的mintettes来处理;最终用户和中心银行之间的信息交换不是直接发生的,而是通过这个mintettes中间层来汇总交易记录;中心银行在系统中有着至关重要的作用,当出现交易纠纷或者不合法的交易时,中心银行对全局账本有唯一的监管和审计权限;在每个mintette管辖范围内的交易,如果交易流程按照之前设计的转账支付交易方案,用户转账支付交易的验证和确认由系统中的其他用户完成,mintette不再单独验证和记录交易,而是起到一个底层的监管作用,在特定时间段将低层账本发送给中心银行;不同mintette区域的交易互不干扰,每个mintette只能解密自己管辖区域的交易数据,中心银行具有最高的监管权,它可对任意一笔交易数据进行解密。8. The privacy security transfer payment system according to any one of claims 6 to 7, characterized in that, in the transaction supervision module, mintettes are first divided into multiple groups, and the mintettes of each group only maintain their own jurisdiction When a user initiates a transaction, the system hands it over to the corresponding mintettes for processing according to the corresponding rules; the information exchange between the end user and the central bank does not happen directly, but through the middle layer of the mintettes to aggregate transaction records ; The central bank plays a vital role in the system. When there is a transaction dispute or illegal transaction, the central bank has the only supervision and audit authority for the global ledger; transactions within the jurisdiction of each mintette, if the transaction process According to the previously designed transfer payment transaction scheme, the verification and confirmation of the user's transfer payment transaction is completed by other users in the system. Mintette no longer verifies and records the transaction separately, but plays an underlying supervisory role. The ledger is sent to the central bank; transactions in different mintette areas do not interfere with each other, each mintette can only decrypt the transaction data in its own jurisdiction, and the central bank has the highest supervision power, which can decrypt any transaction data.9.一种基于可监管区块链的隐私安全转账支付装置,其特征在于:包括:存储器、处理器以及存储在所述存储器上的计算机程序,所述计算机程序配置为由所述处理器调用时实现权利要求1-5中任一项所述的隐私安全转账支付方法的步骤。9. A privacy and security transfer payment device based on a supervised blockchain, characterized in that it comprises: a memory, a processor and a computer program stored on the memory, the computer program being configured to be called by the processor When implementing the steps of the privacy and security transfer payment method described in any one of claims 1-5.10.一种计算机可读存储介质,其特征在于:所述计算机可读存储介质存储有计算机程序,所述计算机程序配置为由处理器调用时实现权利要求1-5中任一项所述的隐私安全转账支付方法的步骤。10 . A computer-readable storage medium, characterized in that: the computer-readable storage medium stores a computer program, and the computer program is configured to implement the method according to any one of claims 1 to 5 when invoked by a processor. The steps of the privacy and secure transfer payment method.
CN201911120359.1A2019-11-152019-11-15Privacy security transfer payment method, device, system and storage mediumActiveCN111008836B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201911120359.1ACN111008836B (en)2019-11-152019-11-15Privacy security transfer payment method, device, system and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201911120359.1ACN111008836B (en)2019-11-152019-11-15Privacy security transfer payment method, device, system and storage medium

Publications (2)

Publication NumberPublication Date
CN111008836Atrue CN111008836A (en)2020-04-14
CN111008836B CN111008836B (en)2023-09-05

Family

ID=70112661

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201911120359.1AActiveCN111008836B (en)2019-11-152019-11-15Privacy security transfer payment method, device, system and storage medium

Country Status (1)

CountryLink
CN (1)CN111008836B (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111585992A (en)*2020-04-262020-08-25数网金融有限公司Method, client and storage medium for detecting network attack
CN111598701A (en)*2020-05-222020-08-28深圳市网心科技有限公司Information monitoring method, system, equipment and storage medium
CN111654363A (en)*2020-06-182020-09-11福建师范大学 A Consortium Chain Privacy Protection Method Based on Group Signature and Homomorphic Encryption
CN111683070A (en)*2020-05-282020-09-18平安科技(深圳)有限公司Data transmission method and device based on identity encryption and storage medium
CN111698084A (en)*2020-06-042020-09-22电子科技大学Block chain-based concealed communication method
CN111709738A (en)*2020-05-182020-09-25杜晓楠Method for hiding transaction amount in blockchain system, computer readable storage medium and blockchain system
CN111709740A (en)*2020-05-182020-09-25杜晓楠Method for hiding transaction address in blockchain system, computer readable storage medium and blockchain system
CN111738726A (en)*2020-08-042020-10-02卓尔智联(武汉)研究院有限公司Resource verification method and device based on block chain and computer equipment
CN111797164A (en)*2020-06-242020-10-20北京荷月科技有限公司 A blockchain-based cross-chain transaction supervision method and system
CN111932258A (en)*2020-08-182020-11-13广西捷算资产交易市场服务有限公司Block chain based encrypted payment tamper-proof technical method for enterprise bank transfer
CN112073484A (en)*2020-08-282020-12-11武汉大学GDPR compliance supervision method and system based on alliance chain
CN112235278A (en)*2020-10-102021-01-15杭州溪塔科技有限公司Method and device for monitoring address information of trader and electronic equipment
CN112329032A (en)*2020-10-292021-02-05暨南大学Privacy mirror image financial auditing method and system based on function encryption
CN112700332A (en)*2021-01-112021-04-23北京金色大数据有限公司Bit currency account clustering method based on graph calculation
CN112734424A (en)*2021-01-052021-04-30重庆邮电大学Privacy protection payment method and system based on block chain
CN112766943A (en)*2021-01-182021-05-07西安电子科技大学Anonymous computing block chain data processing method, system, medium, device and application
CN113656828A (en)*2021-07-202021-11-16北京理工大学 Lattice cipher-based blockchain privacy protection method for financial system transactions
CN113972984A (en)*2020-07-242022-01-25中国移动通信集团浙江有限公司 ElGamal ciphertext equivalence judgment method and device
WO2022036909A1 (en)*2020-08-212022-02-24中诚区块链研究院(南京)有限公司High security transaction block system
WO2022134612A1 (en)*2020-12-252022-06-30杭州复杂美科技有限公司Confidential authorized transfer method, device, and storage medium
CN114757773A (en)*2022-04-062022-07-15浙江数秦科技有限公司Block chain based associated transaction tracing method
WO2022178999A1 (en)*2021-02-252022-09-01平安科技(深圳)有限公司Blockchain-based logistics intermodal transportation data monitoring method, and related device
CN115412254A (en)*2022-08-152022-11-29延安大学 A Two-Party Cooperative EdDSA Signature Algorithm Against Differential Fault Attacks
TWI810464B (en)*2020-06-052023-08-01鴻海精密工業股份有限公司A blockchain-based transaction method, a blockchain-based transaction device and electronic device
CN117196626A (en)*2023-11-062023-12-08北京天润基业科技发展股份有限公司Transfer data processing method and device and electronic equipment

Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100017870A1 (en)*2008-07-182010-01-21Agnik, LlcMulti-agent, distributed, privacy-preserving data management and data mining techniques to detect cross-domain network attacks
US20110178943A1 (en)*2009-12-172011-07-21New Jersey Institute Of TechnologySystems and Methods For Anonymity Protection
CN104683336A (en)*2015-02-122015-06-03中国科学院信息工程研究所 A security domain-based Android privacy data protection method and system
CN106960388A (en)*2017-03-012017-07-18中钞信用卡产业发展有限公司北京智能卡技术研究院The method and apparatus of the digital asset circulation of transregional piece of chain
CN106982205A (en)*2017-03-012017-07-25中钞信用卡产业发展有限公司北京智能卡技术研究院Digital asset treating method and apparatus based on block chain
CN107239951A (en)*2017-06-072017-10-10北京天德科技有限公司A kind of expansible Central Bank's digital cash method of commerce based on third generation block chain
CN108418689A (en)*2017-11-302018-08-17矩阵元技术(深圳)有限公司 A zero-knowledge proof method and medium suitable for blockchain privacy protection
CN109508552A (en)*2018-11-092019-03-22江苏大学The method for secret protection of distributed cloud storage system
CN109658075A (en)*2018-12-132019-04-19广东工业大学Method for secret protection and product for block chain family micro-capacitance sensor electricity transaction
CN109840771A (en)*2019-04-012019-06-04西安电子科技大学A kind of block chain intimacy protection system and its method based on homomorphic cryptography
CN109919756A (en)*2019-02-222019-06-21西南财经大学Fund transfer system, checking method and method of commerce based on Merkle tree backtracking location technology
US20190238311A1 (en)*2018-01-262019-08-01Alibaba Group Holding LimitedBlockchain system and data processing method for blockchain system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100017870A1 (en)*2008-07-182010-01-21Agnik, LlcMulti-agent, distributed, privacy-preserving data management and data mining techniques to detect cross-domain network attacks
US20110178943A1 (en)*2009-12-172011-07-21New Jersey Institute Of TechnologySystems and Methods For Anonymity Protection
CN104683336A (en)*2015-02-122015-06-03中国科学院信息工程研究所 A security domain-based Android privacy data protection method and system
CN106960388A (en)*2017-03-012017-07-18中钞信用卡产业发展有限公司北京智能卡技术研究院The method and apparatus of the digital asset circulation of transregional piece of chain
CN106982205A (en)*2017-03-012017-07-25中钞信用卡产业发展有限公司北京智能卡技术研究院Digital asset treating method and apparatus based on block chain
CN107239951A (en)*2017-06-072017-10-10北京天德科技有限公司A kind of expansible Central Bank's digital cash method of commerce based on third generation block chain
CN108418689A (en)*2017-11-302018-08-17矩阵元技术(深圳)有限公司 A zero-knowledge proof method and medium suitable for blockchain privacy protection
US20190238311A1 (en)*2018-01-262019-08-01Alibaba Group Holding LimitedBlockchain system and data processing method for blockchain system
CN109508552A (en)*2018-11-092019-03-22江苏大学The method for secret protection of distributed cloud storage system
CN109658075A (en)*2018-12-132019-04-19广东工业大学Method for secret protection and product for block chain family micro-capacitance sensor electricity transaction
CN109919756A (en)*2019-02-222019-06-21西南财经大学Fund transfer system, checking method and method of commerce based on Merkle tree backtracking location technology
CN109840771A (en)*2019-04-012019-06-04西安电子科技大学A kind of block chain intimacy protection system and its method based on homomorphic cryptography

Cited By (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111585992A (en)*2020-04-262020-08-25数网金融有限公司Method, client and storage medium for detecting network attack
CN111709738A (en)*2020-05-182020-09-25杜晓楠Method for hiding transaction amount in blockchain system, computer readable storage medium and blockchain system
CN111709740A (en)*2020-05-182020-09-25杜晓楠Method for hiding transaction address in blockchain system, computer readable storage medium and blockchain system
CN111598701A (en)*2020-05-222020-08-28深圳市网心科技有限公司Information monitoring method, system, equipment and storage medium
CN111598701B (en)*2020-05-222023-09-19深圳市迅雷网络技术有限公司 An information monitoring method, system, equipment and storage medium
CN111683070A (en)*2020-05-282020-09-18平安科技(深圳)有限公司Data transmission method and device based on identity encryption and storage medium
CN111683070B (en)*2020-05-282022-07-15平安科技(深圳)有限公司Data transmission method and device based on identity encryption and storage medium
CN111698084A (en)*2020-06-042020-09-22电子科技大学Block chain-based concealed communication method
TWI810464B (en)*2020-06-052023-08-01鴻海精密工業股份有限公司A blockchain-based transaction method, a blockchain-based transaction device and electronic device
CN111654363A (en)*2020-06-182020-09-11福建师范大学 A Consortium Chain Privacy Protection Method Based on Group Signature and Homomorphic Encryption
CN111654363B (en)*2020-06-182023-12-29福建师范大学Group signature and homomorphic encryption-based alliance chain privacy protection method
CN111797164A (en)*2020-06-242020-10-20北京荷月科技有限公司 A blockchain-based cross-chain transaction supervision method and system
CN113972984B (en)*2020-07-242024-03-19中国移动通信集团浙江有限公司ElGamal ciphertext equivalent judgment method and device
CN113972984A (en)*2020-07-242022-01-25中国移动通信集团浙江有限公司 ElGamal ciphertext equivalence judgment method and device
CN111738726A (en)*2020-08-042020-10-02卓尔智联(武汉)研究院有限公司Resource verification method and device based on block chain and computer equipment
CN111932258A (en)*2020-08-182020-11-13广西捷算资产交易市场服务有限公司Block chain based encrypted payment tamper-proof technical method for enterprise bank transfer
WO2022036909A1 (en)*2020-08-212022-02-24中诚区块链研究院(南京)有限公司High security transaction block system
CN112073484A (en)*2020-08-282020-12-11武汉大学GDPR compliance supervision method and system based on alliance chain
CN112235278B (en)*2020-10-102022-03-25杭州溪塔科技有限公司Method and device for monitoring address information of trader and electronic equipment
CN112235278A (en)*2020-10-102021-01-15杭州溪塔科技有限公司Method and device for monitoring address information of trader and electronic equipment
CN112329032A (en)*2020-10-292021-02-05暨南大学Privacy mirror image financial auditing method and system based on function encryption
CN112329032B (en)*2020-10-292023-03-10暨南大学 A privacy mirroring financial audit method and system based on function encryption
WO2022134612A1 (en)*2020-12-252022-06-30杭州复杂美科技有限公司Confidential authorized transfer method, device, and storage medium
CN112734424B (en)*2021-01-052023-09-26重庆邮电大学 A privacy-protecting payment method and system based on blockchain
CN112734424A (en)*2021-01-052021-04-30重庆邮电大学Privacy protection payment method and system based on block chain
CN112700332A (en)*2021-01-112021-04-23北京金色大数据有限公司Bit currency account clustering method based on graph calculation
CN112766943A (en)*2021-01-182021-05-07西安电子科技大学Anonymous computing block chain data processing method, system, medium, device and application
WO2022178999A1 (en)*2021-02-252022-09-01平安科技(深圳)有限公司Blockchain-based logistics intermodal transportation data monitoring method, and related device
CN113656828A (en)*2021-07-202021-11-16北京理工大学 Lattice cipher-based blockchain privacy protection method for financial system transactions
CN113656828B (en)*2021-07-202023-04-07北京理工大学Block chain privacy protection method based on lattice code and oriented to financial system transaction
CN114757773A (en)*2022-04-062022-07-15浙江数秦科技有限公司Block chain based associated transaction tracing method
CN115412254A (en)*2022-08-152022-11-29延安大学 A Two-Party Cooperative EdDSA Signature Algorithm Against Differential Fault Attacks
CN117196626A (en)*2023-11-062023-12-08北京天润基业科技发展股份有限公司Transfer data processing method and device and electronic equipment
CN117196626B (en)*2023-11-062024-02-02北京天润基业科技发展股份有限公司Transfer data processing method and device and electronic equipment

Also Published As

Publication numberPublication date
CN111008836B (en)2023-09-05

Similar Documents

PublicationPublication DateTitle
CN111008836B (en)Privacy security transfer payment method, device, system and storage medium
CN108009917A (en)The transaction verification and register method and system of digital cash
TW200820108A (en)Method for automatically validating a transaction, electronic payment system and computer program
IslamA privacy-preserving transparent central bank digital currency system based on consortium blockchain and unspent transaction outputs
Hwang et al.Securing on-line credit card payments without disclosing privacy information
Li et al.An efficient identity tracing scheme for blockchain-based systems
US11424938B1 (en)Credentialed miners for a blockchain
CN111523892A (en)Block chain cross-chain transaction method and device
Wu et al.The survey on the development of secure multi-party computing in the blockchain
Gao et al.Secure, fair and instant data trading scheme based on bitcoin
Zhou et al.Distributed bitcoin account management
CN111369251B (en)Block chain transaction supervision method based on user secondary identity structure
Sui et al.AuxChannel: Enabling efficient bi-directional channel for scriptless blockchains
Park et al.Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization.
CN114866289B (en)Privacy credit data security protection method based on alliance chain
CN112990928B (en)Safety protection method for digital currency transaction data
CN115131018A (en)Block chain based private transaction method and related product
Abadi et al.Payment with dispute resolution: A protocol for reimbursing frauds victims
Sentamilselvan et al.Security threats and privacy challenges in the quantum blockchain: A contemporary survey
Jiang et al.Enhancing Copyright Protection Through Blockchain and Ring Signature Algorithm From Lattice
CN116094726A (en) A Partially Blind Signature Method and System Based on Lattice Public Key Cryptography
Zhou et al.Eisdspa: an Efficient and Secure Blockchain-Based Donation Scheme with Privacy Protection and Auditability
Xie et al.A Traceable Privacy-Preserving Transaction Protocol With Evolutionary Threshold Authentication
Clack et al.Distributed Ledger Privacy: Ring Signatures, M\" obius and CryptoNote
Vangujar et al.Secure E-Auctions: A Blockchain-Based Cluster Consensus Identity-Based Identification Scheme

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp