Method for protecting privacy of smart contract of block chain, and medium
A technology of smart contracts and protected areas, applied in the field of blockchain, can solve the problems of inability to confirm transaction consistency, lack of transaction validity verification links, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0104] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. Note that the aspects described below in conjunction with the drawings and specific embodiments are only exemplary, and should not be construed as limiting the protection scope of the present invention.
[0105] figure 1 The process flow of an embodiment of the method for protecting the privacy of blockchain smart contracts of the present invention is shown, please refer to figure 1 , the following is a detailed description of the implementation steps of the method of this embodiment.
[0106] Step 1: Prove that the public-private key pair of the node is (sk1,pk1), and obtain the public key pk2 of the transfer node.
[0107] Step 2: Obtain the ciphertext Enc_1(t1)=C of the balance t1 of the proof node encrypted with pk1 in its public ledger, where Enc_A(X) means to perform additive homomorphic encryption on the plaintext X using the public ke...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com