Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Acentric digital currency transaction method based on public and private key pair derivation

A public-private key pair and digital currency technology, applied in the field of digital currency, can solve the problems of reduced computing efficiency and increased length of digital currency public ledgers, and achieve the effects of reducing space, strong anonymity, and enhanced anonymity

Active Publication Date: 2018-03-09
DATA COMM SCI & TECH RES INST +1
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These decentralized digital currency privacy systems also pay some price while enhancing privacy. For example, the use of zero-knowledge proof increases the length of the digital currency’s public ledger, and the system’s computational efficiency is also reduced a lot.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Acentric digital currency transaction method based on public and private key pair derivation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Preferred embodiments of the present invention will be specifically described below in conjunction with the accompanying drawings, wherein the accompanying drawings constitute a part of the application and are used together with the embodiments of the present invention to explain the principles of the present invention.

[0049] A specific embodiment of the present invention discloses a centerless digital currency transaction method based on public-private key pair derivation.

[0050] The method for deriving the digital currency public-private key pair:

[0051] In the present invention, it is aimed at non-central digital currency, does not require a trusted CA to issue certificates to users, and does not require any trusted nodes to exist. Using the idea of ​​implicit certificates, the payment user actively sends implicit authentication Result (s, Y), said s contains the private key of the paying user, said Y contains the public key of the receiving user, and implies th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an acentric digital currency transaction method based on public and private key pair derivation; a receiver can scan on a public account book to calculate collection public and private key pairs according to the transfer time, thus reducing data storage; each transaction forms a new collection address, thus enhancing the digital currency anonymous property; only one time elliptical curve scalar multiplication calculation is added on the computational complexity in an implicit certificate generation process, thus easily reducing stronger anonymous property; a transaction initiator actively forms a new collection address in the process instead of using the new collection address issued by the receiver; each person only processes a long term public key, and new publicand private key pairs can be calculated according to the public messages on the public account book and the long term public and private key pairs, thus reducing the public and private key pair storage space; transaction graph analysis is hard to receive.

Description

technical field [0001] The present invention relates to the field of digital currency, in particular to a non-central digital currency transaction method based on public-private key pair derivation. Background technique [0002] Bitcoin, proposed in late 2008, was the first widely distributed decentralized digital currency. In Bitcoin, users use pseudonyms. Using the public data on the blockchain, through big data analysis, the structure of transaction graphs and other methods, the pseudonym of Bitcoin can be linked to the real identity of the user. [0003] Therefore, many literatures later conducted research on the privacy of decentralized digital currency and proposed various solutions. Some use hybrid payment methods, such as Mixcoin, Darkcoin, and Coin join, which attempt to scramble the relationship between input and output account numbers for anonymity. [0004] CryptoNote uses ring signatures to hide transaction amounts or individual transactions. Miers et al. pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06Q40/06G06Q20/38
CPCG06Q20/3825G06Q20/3829G06Q40/04G06Q40/06
Inventor 林齐平
Owner DATA COMM SCI & TECH RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products