L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment
A digital currency and verification method technology, applied in the field of information security, can solve problems such as ignoring the anti-counterfeiting value of digital currency, difficult to solve anti-counterfeiting problems, loss of asset ownership, etc., to avoid the problem of massive data downloading, high effectiveness, and less online interaction Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0108] Example one
[0109] Reference figure 1 , figure 1 It shows a flowchart of an embodiment of a digital currency anti-counterfeiting and verification method based on the L algorithm provided by the present invention. The method includes steps one to four.
[0110] Step 1: Split the anti-counterfeiting key corresponding to the digital currency public key stored in the trusted center into the stub key stored in the trusted center, the digital currency key stored in the digital currency, and the user key stored in the non-terminal.
[0111] Among them, the digital currency public key stored in the trusted center and its corresponding anti-counterfeiting key satisfy the following relationship:
[0112] [L 0 L 1 L 2 ] -1 G=P+G;
[0113] Among them, L 0 Is the stub key; L 1 Is the digital currency key; L 2 Is the user key; P is the digital currency public key; G is the base point of the elliptic curve. All three keys must be calculated correctly to pass public key verification and achi...
Example Embodiment
[0151] Example two
[0152] The second embodiment of the present invention provides a digital currency anti-counterfeiting and verification method based on the L algorithm. The method is explained on the sender side, and the method includes:
[0153] Split the anti-counterfeiting key corresponding to the digital currency public key stored in the trusted center into the stub key stored in the trusted center, the digital currency key stored in the digital currency, and the user key stored in the non-terminal;
[0154] The sender updates the digital currency key once through the stored digital currency key, the sender user key, and the receiver update parameters sent by the receiver, and uses the receiver encryption public key sent by the receiver to encrypt the plaintext of the digital currency to generate numbers After the currency ciphertext is flowed offline to the receiving end; so that the receiving end can use the receiving end to encrypt the private key to restore the digital cu...
Example Embodiment
[0160] Example three
[0161] The third embodiment of the present invention provides a digital currency anti-counterfeiting and verification method based on the L algorithm. The method is explained on the receiving end side. The method includes:
[0162] Split the anti-counterfeiting key corresponding to the digital currency public key stored in the trusted center into the stub key stored in the trusted center, the digital currency key stored in the digital currency, and the user key stored in the non-terminal;
[0163] The receiver uses the receiver's encrypted private key to restore the digital currency ciphertext sent by the sender to the plaintext of the digital currency, and performs local currency verification to verify the authenticity of the digital currency. If the verification fails, an error will be prompted and the process will be aborted; if the verification is successful, the receiver will pass The first updated digital currency key, the receiving end update parameter, ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap