Zero knowledge proving method suitable for protecting privacy of block chain, and medium

A zero-knowledge proof, privacy protection technology, applied in user identity/authority verification, payment system, transmission system, etc., can solve problems such as large computing resources and time, inadequate risk assessment, and single usage scenarios

Active Publication Date: 2018-08-17
JUZIX TECH SHENZHEN CO LTD +1
View PDF10 Cites 110 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method is highly anonymous, its risk assessment is not in place, and an anonymous third party must be relied on
[0007] 2. The balance on the public ledger is directly encrypted, and only the node itself or the relevant party that grants the rights can see the transaction information, and the rest of the nodes cannot operate the data, and the ledger information is difficult to maintain consistency
For example, Zcash is a cryptocurrency that achieves zero-knowledge anonymity by introducing the zero-knowledge proof technology zk-SNARKs. When using Zcash for transactions, neither the addresses of the parties to the transaction nor the transaction amount will be exposed, but Zcash uses The scenario is relatively limited. ZCash is only aimed at the UTXO model of Bitcoin, and cannot be extended to the balance model of Ethereum, and cannot support smart contracts well; in terms of performance, Zcash needs circuit conversion when generating proofs, and the calculations consumed The resources and time are very large, so Zcash light nodes do not use SNARK technology at all when initiating transactions, but only full nodes use SNARK technology; when generating system parameters, Zcash must have one or more strong centers to generate system parameters, There is also a trapdoor that controls the entire system hidden in the system parameters; and its usage scenarios are relatively simple, and the SNARK technology in Zcash currently has no other applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero knowledge proving method suitable for protecting privacy of block chain, and medium
  • Zero knowledge proving method suitable for protecting privacy of block chain, and medium
  • Zero knowledge proving method suitable for protecting privacy of block chain, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0172] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. Note that the aspects described below in conjunction with the drawings and specific embodiments are only exemplary, and should not be construed as limiting the protection scope of the present invention.

[0173] In the solution of the present invention, an additive homomorphic encryption algorithm is used to encrypt private data in the block chain, and a non-interactive zero-knowledge proof is generated during the transaction process to prove the validity of the transaction.

[0174] For the sake of simplicity, the embodiments mentioned below only consider two parties, Users A and B, in the smart contract. Suppose the plaintext space is [0,2 β ], where β=ε·γ (if β≠ε·γ, the scope can be appropriately enlarged to make β=ε·γ established). The implementation steps of the (non-interactive) zero-knowledge proof method suitable for blockchain privac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a zero knowledge proving method suitable for protecting the privacy of a block chain, and a medium. UTXO of Bitcoins and a balance model of Ethereum can be supported, and wellcombined with a smart contract, so that the security of the scheme can be further enhanced, the application scene of the scheme can be extended, and aiming at a zero knowledge certificate designed bya specific algebraic structure of a transaction, even a light node can also generate a proving process. The technical scheme is as follows: the method comprises a system parameter in an initializationphase (including a generation process and meaning of the parameter), a specific process of generating the zero knowledge certificate in a certificate generating phase (including ciphertext generatedin the process, and involved formula and parameter), and a verification phase (including verification formula and condition).

Description

technical field [0001] The invention relates to the privacy protection technology of the block chain, in particular to a zero-knowledge proof method in the privacy protection of the block chain. Background technique [0002] As a public account book, the blockchain system solves the consensus problem established by the trust of all parties. Every participant can obtain a complete data backup, and all transaction data is open and transparent, which is an advantage of the blockchain, but on the other hand, for many blockchain applications, this feature is fatal of. Because in many cases, not only users themselves want their account privacy and transaction information to be protected, but as far as commercial organizations are concerned, many account and transaction information are important assets and business secrets of these organizations, and they do not want to share them publicly with peers, especially for sensitive Data needs to balance privacy protection and complianc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06Q20/38G06Q20/40
CPCG06Q20/3825G06Q20/405H04L9/3218H04L9/3221H04L9/3247H04L63/0435H04L63/0869
Inventor 邓燚马顺利何德彪张江陈泌文谢翔李升林孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products