Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy transaction method and system, device and storage medium

A transaction method and privacy technology, applied in the computer field, can solve the problems of wasting storage resources and computing resources, cannot guarantee privacy well, and cannot realize transactions.

Pending Publication Date: 2018-12-18
HANGZHOU FUZAMEI TECH CO LTD
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Most of the transactions of the existing blockchain systems will be publicly stored on the blockchain, and anyone can view the relevant information of the transaction on the blockchain. It will not be completely anonymous, and it will not be very good. To achieve non-connectivity (tracking the destination), such transactions cannot guarantee privacy very well
The method mentioned in the patent CN201611107703 scheme uses the account model, and the attacker can easily scan the state changes of all existing accounts to track related transactions. At the same time, using a one-time account address as the account address of the blockchain system will lead to random With more and more transactions in the system, many cold accounts are generated, which wastes unnecessary storage resources and computing resources
Moreover, the existing transfer methods can only be carried out in the form of UTXO to UTXO, or transactions between account models and account models, but transactions between account models and UTXO models cannot be realized.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy transaction method and system, device and storage medium
  • Privacy transaction method and system, device and storage medium
  • Privacy transaction method and system, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0046] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0047] figure 1 It is a flowchart of a private transaction method provided by an embodiment of the present invention.

[0048] like figure 1 As shown, in this embodiment, the present invention provides a private transaction method, including:

[0049] S11. Transfer to the privacy contract;

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy transaction method and system, a device and a storage medium. The method comprises: obtaining a first public key pair of a receiver, generating a first random number,generating an elliptic curve public key according to the first random number, and generating a one-time public key according to the first random number; using the one-time public key as the output destination public key of the privacy transaction, using the elliptic curve public key as the input information of the privacy transaction, and packaging the privacy transaction according to the balanceof the privacy contract. The privacy transaction is sent to the block chain network for consensus, and the receiver verifies the privacy transactions, and generates a one-time private key according tothe first private key pair and the elliptic curve public key after the verification is passed. By using the public key pair to generate the one-time target public key, the receiver is guaranteed notto be traced by others.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a private transaction method, system, device and storage medium. Background technique [0002] Most of the transactions of the existing blockchain systems will be publicly stored on the blockchain, and anyone can view the relevant information of the transaction on the blockchain. It will not be completely anonymous, and it will not be very good. To achieve non-connectivity (tracking the destination), such transactions cannot guarantee privacy very well. The method mentioned in the patent CN201611107703 scheme uses the account model, and the attacker can easily scan the state changes of all existing accounts to track related transactions. At the same time, using a one-time account address as the account address of the blockchain system will lead to random With more and more transactions in the system, many cold accounts are generated, which wastes unnecessary stor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/38H04L9/08H04L9/30
CPCG06Q20/3829G06Q20/389H04L9/0863H04L9/0869H04L9/3066
Inventor 何正军王志文吴思进
Owner HANGZHOU FUZAMEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products