Homomorphic encryption-based virtual asset anonymous ranking method

A virtual asset, homomorphic encryption technology, applied in the field of cryptography, can solve the problems of vulnerable storage servers, unfavorable promotion and use, and narrow application scope.

Active Publication Date: 2017-03-15
XIDIAN UNIV
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The patented client will directly hand over the private key to the proxy server, causing the proxy server to completely replace the client, which will cause fatal privacy leakage problems;
[0006] 2. Only a single client completes the sequencing of ciphertexts, and the scope of application is too narrow, which is not conducive to promotion and use;
[0007] 3. Proxy server and storage server can collude and be vulnerable to attack, which brings great security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Homomorphic encryption-based virtual asset anonymous ranking method
  • Homomorphic encryption-based virtual asset anonymous ranking method
  • Homomorphic encryption-based virtual asset anonymous ranking method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0052] refer to figure 1 , the realization steps of the present invention are as follows.

[0053] Step 1, system initialization.

[0054] (1a) Authorization center CA runs Sig_Gen CA () algorithm, that is, first select two prime numbers P and Q with different values ​​satisfying the formula ed=1mod((P-1)·(Q-1)), and two positive integers e and d with different values, and then calculate Modulus N=PQ, generate the authentication public key (N, e) and signature private key d of the authorization center itself, and keep the signature private key d secretly;

[0055] (1b) The authorization center CA selects an odd number t and a set of integers that satisfy security Define user public and private key selection set And select the set of user public and private keys Limited to the range of (-t / 2,t / 2];

[0056] (1c) The authorization center CA selects a c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a homomorphic encryption-based virtual asset anonymous ranking method. The main objective of the invention is to solve the problems of user privacy disclosure and the narrow range of single-client ciphertext ranking which are caused by a condition that a private key is directly handed over to a proxy server in the prior art. The implementation process of the method includes the following steps that: 1) a system is initialized, and the signature public and private key and some public parameters of an authorization center (CA) are determined; 2) a user carries out identity registration application in the authorization center (CA); 3) the authorization center (CA) issue a key to the registered user; 4) the user uses his or her own key to participate in asset ranking and directly encrypts his or her asset data through a learning with error (LWE)-based homomorphic encryption algorithm, and ciphertexts are processed, the ranking of virtual assets is realized. With the method of the invention adopted, the protection of the privacy of the user can be realized, and the universality and anti-conspiracy attack ability of ciphertext ranking can be improved. The method can be used for asset supervision in a bitcoin network.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and further relates to an anonymous sorting method of virtual assets based on homomorphic encryption in the technical field of cryptography, which can be used for asset supervision in the bitcoin network. Background technique [0002] Bitcoin is a P2P form of digital encryption currency. Compared with other virtual currencies, Bitcoin is a point-to-point electronic cash system. It is not based on credit but on the principle of cryptography, so that any two parties who reach an agreement do not need a third party. With the participation of , the transaction can be carried out directly. Point-to-point transmission means a decentralized global payment system that does not depend on a specific currency issuer. Bitcoin adopts a fully distributed topology structure, using a distributed database composed of many nodes in the entire P2P network to confirm and record transaction information, and the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00H04L29/06
CPCH04L9/008H04L9/3236H04L9/3249H04L9/3263H04L63/0421H04L63/0442
Inventor 高军涛王丹妮王誉晓王笠燕李雪莲
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products