A secure fine-grained prepayment method and device
A fine-grained, pre-paid technology, applied in the field of information security in communication systems, can solve problems such as high transaction costs and slow transactions, and achieve the effect of improving liquidity and enhancing user privacy protection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0067] Such as Figure 5 As shown, a safe fine-grained prepayment method, the payment method is applied to the payment system, and the payment method includes:
[0068] Step S210: Obtain the public parameters of the payment system, the public key and private key of the registration authority, the public key and private key of the system participants, and generate accounts according to the public keys of the system participants; the system participants include payment endorsers, payers, Beneficiary;
[0069] Step S220: The system participant interacts with the registration authority to obtain a public key certificate;
[0070] Step S230: The payer sets preset information, the preset information is the payee, locked amount and deadline conditions, and the payee sets new preset information as a new payer to form a corresponding off-chain payment chain ;
[0071] Step S240: The payment endorser verifies the validity of the payer public key certificate and the preset information...
Embodiment 2
[0113] combine figure 2 As shown, each module of the system of the present invention involves cryptographic tools, so before introducing the system, first understand the basic cryptographic tools that need to be used, including one-way function, digital signature, and aggregate signature cryptographic tools.
[0114] Define one-way functions, digital signatures, aggregate signatures:
[0115] Let f denote a one-way function.
[0116] Order Π 1 =(KGen, Sig, Ver) represents a digital signature scheme, where KGen, Sig, Ver are the secret key generation algorithm, signature algorithm and verification algorithm respectively.
[0117] Order Π 2 =(KGen, ASig, AVer, AggSig, AggVer) represents an aggregated signature scheme, where KGen, ASig, AVer, AggSig, and AggVer are respectively the secret key generation algorithm, signature algorithm, verification algorithm, aggregation algorithm, and aggregation verification algorithm.
[0118] One-way Function
[0119] A one-way function ...
specific Embodiment
[0141] Such as figure 1 As shown, according to the secure fine-grained prepayment system 100 according to an embodiment of the present invention, the system structure of the present invention can be given by the above-mentioned cryptographic basic tools. Define Ω=(initialization, registration, preset, verification, payment, collection, settlement) as the basic structure, and summarize the system into 7 algorithm modules, including: initialization module 110, registration module 120, preset module 130, verification module module 140, payment module 150, collection module 160, settlement module 170.
[0142] Among them, the initialization module is used to generate system public parameters, registration authority public key and private key, system participant public key and private key, and generate an account according to the system participant public key. System participants refer to payment endorsers, payers, and payees; registration modules are used for system participants ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


