L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment

A digital currency and verification method technology, applied in the field of information security, can solve problems such as ignoring the anti-counterfeiting value of digital currency, difficult to solve anti-counterfeiting problems, loss of asset ownership, etc., to avoid the problem of massive data downloading, high effectiveness, and less online interaction Effect

Active Publication Date: 2018-04-13
吕文华
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the user's private key is lost, the corresponding asset ownership will also be lost, so there is a security risk
[0008] Looking at the defects of blockchain anti-counterfeiting technology, the root o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment
  • L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment
  • L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0108] Example one

[0109] Reference figure 1 , figure 1 It shows a flowchart of an embodiment of a digital currency anti-counterfeiting and verification method based on the L algorithm provided by the present invention. The method includes steps one to four.

[0110] Step 1: Split the anti-counterfeiting key corresponding to the digital currency public key stored in the trusted center into the stub key stored in the trusted center, the digital currency key stored in the digital currency, and the user key stored in the non-terminal.

[0111] Among them, the digital currency public key stored in the trusted center and its corresponding anti-counterfeiting key satisfy the following relationship:

[0112] [L 0 L 1 L 2 ] -1 G=P+G;

[0113] Among them, L 0 Is the stub key; L 1 Is the digital currency key; L 2 Is the user key; P is the digital currency public key; G is the base point of the elliptic curve. All three keys must be calculated correctly to pass public key verification and achi...

Example Embodiment

[0151] Example two

[0152] The second embodiment of the present invention provides a digital currency anti-counterfeiting and verification method based on the L algorithm. The method is explained on the sender side, and the method includes:

[0153] Split the anti-counterfeiting key corresponding to the digital currency public key stored in the trusted center into the stub key stored in the trusted center, the digital currency key stored in the digital currency, and the user key stored in the non-terminal;

[0154] The sender updates the digital currency key once through the stored digital currency key, the sender user key, and the receiver update parameters sent by the receiver, and uses the receiver encryption public key sent by the receiver to encrypt the plaintext of the digital currency to generate numbers After the currency ciphertext is flowed offline to the receiving end; so that the receiving end can use the receiving end to encrypt the private key to restore the digital cu...

Example Embodiment

[0160] Example three

[0161] The third embodiment of the present invention provides a digital currency anti-counterfeiting and verification method based on the L algorithm. The method is explained on the receiving end side. The method includes:

[0162] Split the anti-counterfeiting key corresponding to the digital currency public key stored in the trusted center into the stub key stored in the trusted center, the digital currency key stored in the digital currency, and the user key stored in the non-terminal;

[0163] The receiver uses the receiver's encrypted private key to restore the digital currency ciphertext sent by the sender to the plaintext of the digital currency, and performs local currency verification to verify the authenticity of the digital currency. If the verification fails, an error will be prompted and the process will be aborted; if the verification is successful, the receiver will pass The first updated digital currency key, the receiving end update parameter, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment. The method comprises the following steps of: splitting an anti-counterfeiting secret key corresponding to a digital currency public key stored by a credible center into a stub secret key stored in the credible center, a digital currency secret key stored in a digital currency and a nonterminal stored user secret key; carrying out primary updating on the digital currency secret key by a transmission end so as to generate a digital currency ciphertext, and offline circulating the digital currency ciphertext to a reception end; carrying out local counterfeit currency detection by the reception end so as to verify authenticity of the digital currency, and after theverification succeeds, carrying out secondary updating on the digital currency secret key and sending a first signature and currency number information to the credible center to carry out verification; and verifying state effectiveness by the credible center, if the verification succeeds, verifying a second signature, and if the verification succeeds, updating the digital currency secret key. According to the method and system and the equipment, safety risk of double blossoms is reduced, mass data downloading problems caused by book-entry anti-counterfeiting are avoided, the risk of managingdigital assets via user secret keys is reduced and the safety is high.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an L algorithm-based digital currency anti-counterfeiting and verification method, system and device. Background technique [0002] With the development of computer information technology, the research of digital currency has gradually become a current technology hotspot. Unlike banknotes, digital currency does not require paper media. It can be said to be a piece of digital information without media in essence. How to ensure that this piece of digital information can only be used by its current holders and cannot be misappropriated by others is the responsibility of digital currency. the primary problem faced. Compared with the digitization of photos and music, the digitization of currency is not simply to record patterns or words in digital form. Digital currency must consider currency anti-counterfeiting and transaction security. Therefore, the digitalization of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06F21/60H04L9/30H04L9/08
CPCG06F21/121G06F21/602H04L9/0877H04L9/30
Inventor 吕文华宛海加
Owner 吕文华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products