Crypto-currency transaction privacy protection method and system based on block chain

A privacy protection, blockchain technology, applied in the privacy protection field of cryptocurrency transactions based on blockchain, can solve the problems of loss of anonymity effect of transactions, destruction of data privacy and security, etc.

Active Publication Date: 2018-11-02
深圳市有芯电子有限公司
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious users can associate the receiver and sender of the identified transaction through background knowledge attacks, transaction graph analysis attacks, etc. Once the real account information is leaked, the transaction will lose its anonymity and data privacy will be destroyed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Crypto-currency transaction privacy protection method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to have a clearer understanding of the technical features, purposes and effects of the invention, the specific implementation of the invention will now be described in detail with reference to the accompanying drawings. figure 1 It is an execution flowchart of the embodiment of the present invention, including the following steps:

[0027] (1) Form a mixed currency group:

[0028] Within a fixed period of time, 3 nodes are randomly selected to broadcast a coin mixing request to the nodes of the whole network (for example: IWANT TO MIX SOME COIN), and the 3 nodes can form a coin mixing group PGROUP, and the 3 nodes are randomly generated Numbers P1, P2, and P3 are generated sequentially.

[0029] (2) Create a mixer wallet:

[0030] The coin-mixing group PGROUP randomly selects a coin-mixing node, and the coin-mixing group PGROUP selects a prime number p and a public primitive element g∈Zp* (for example: randomly selects a coin-mixing node P1, selects p=19, g=3) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a crypto-transaction privacy protection method and system based on a block chain. The method comprises the following steps: forming a currency mixing group, creating a currencymixer wallet, summarizing currency, sending a currency mixing demand, receiving the currency mixing demand, creating the currency mixing transaction, performing currency mixing transaction signature,sending transaction information and verifying the currency mixing information. The method provided by the invention can be used for protecting the block chain transaction privacy information, the designed currency mixing method based on the random node can split the direct contact between both transaction parties, the association between a sender and a receiver in the transaction information is eliminated, and the aim of protecting the crypto-currency transaction privacy is achieved.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a method and system for protecting the privacy of encrypted currency transactions based on block chains. Background technique [0002] For ledger-based blockchain cryptocurrencies (such as Bitcoin), all transaction information is recorded in each participating node in the form of a public ledger. In the public ledger, each transaction information includes: the hash value of the previous transaction, the signature of the payer, the wallet address of the payee, and the hash value of the transaction. Malicious users can identify the receiver and sender of a transaction through background knowledge attacks, transaction graph analysis attacks, and other means. Once the real account information is leaked, the transaction will lose its anonymity and data privacy will be destroyed. How to effectively protect the security of transaction privacy information on the blockchain ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L29/06G06Q20/38G06Q20/06G06F21/64
CPCG06F21/64G06Q20/065G06Q20/3829H04L9/0643H04L9/0869H04L63/0428
Inventor 任伟肖睿阳
Owner 深圳市有芯电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products