Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Invisible address implementation method capable of being supervised by third party

An implementation method and address technology, which is applied to user identity/authority verification and key distribution, and can solve problems such as impracticality, security risks, and cumbersome proofs

Inactive Publication Date: 2017-05-31
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF3 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing applications based on blockchain technology, due to the characteristics of collective maintenance, openness and transparency, etc., the privacy of users based on this application will not be guaranteed. The core of user privacy on the blockchain is the privacy of user addresses. Because as long as an address can be associated with a user, all users who have access to blockchain data can know the privacy of the user data
Most of the existing methods of protecting user privacy are realized through random addresses and zero-knowledge proofs, but random addresses are pseudo-anonymous in nature, and zero-knowledge proofs are not practical due to their cumbersome proofs
Although the one-time address generation technology adopted by CryptoNote solves the problem of pseudo-anonymity, there is a certain degree of security risk, because when the private key of a user's transaction is leaked, by combining the tracking key of the user, the adversary may obtain the user The complete private key of the user, and then the adversary obtains the knowledge authority of all transactions involving the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invisible address implementation method capable of being supervised by third party

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The core of the present invention is the one-time address generation technology. Since the user's address is identified on the blockchain, and the address is generated by the public key, it is the invention to generate the one-time public key corresponding to a certain transaction for the user. core.

[0015] Specifically, the present invention:

[0016] (1) Utilizing the nature of bilinear pairing, the design not only allows third-party regulatory agencies to perform supervision and audit functions with only one key, but also ensures that the user's address is invisible to third-party observers. (Indirectly protect the privacy of users).

[0017] (2) Based on the characteristics of additive homomorphism in the cyclic group, the transaction receiver can recover the private key corresponding to the stealth address by using the random intermediate value contained in the transaction, the private key in his possession, and the public key of the supervisor to perform algebraic ope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an invisible address implementation method capable of being supervised by a third party. The method comprises the following steps: when a sender initiates a transaction with a receiver, the sender computes a final public key of the receiver by selecting a random value and using the public key of a supervisor and the public key of the receiver; when the receiver receives the transaction initiated by the sender, the receiver computes a private key corresponding to a transaction address including the random value by using the received random value in the transaction, the own private key and the public key of the supervisor; and when the supervisor audits whether the transaction received by the receiver is legal, the supervisor compute the public key corresponding the transaction address including the random value by using the own private key, the random value in the audited transaction and the public key of the audited party. The method provided by the invention has the advantages that the different transaction addresses received by the same user have unconditional unlinkability; and the supervisor can audit and supervise all transactions by only needing to store one main private key, and protection on user privacy is indirectly achieved.

Description

Technical field [0001] The invention relates to a method for realizing a third-party supervisable stealth address. Background technique [0002] Existing applications based on blockchain technology have the characteristics of collective maintenance, openness and transparency, so the privacy of users based on the application cannot be guaranteed. The core of user privacy on the blockchain is the privacy of user addresses. Because as long as an address can be associated with a user, all users who have access to blockchain data can know the privacy of the user's data. The existing methods to protect user privacy are mostly achieved through random addresses and zero-knowledge proofs, but random addresses are essentially pseudo-anonymous, and zero-knowledge proofs are not practical because of their cumbersome proofs. Although the one-time address generation technology adopted by CryptoNote solves the problem of pseudo-anonymity, it has a certain degree of security risks, because when...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/3265H04L9/0869H04L63/06H04L63/0838
Inventor 吴威峰安红章
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products