Homomorphic encryption method for encrypting transaction amount and supporting zero knowledge proof

A zero-knowledge proof and homomorphic encryption technology, applied in the field of information security, can solve problems such as not supporting ciphertext range proof

Active Publication Date: 2019-07-12
HUAZHONG UNIV OF SCI & TECH
View PDF8 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are many additive homomorphic algorithms, and the Paillier homomorphic encryption algorithm has the best overall performance, but it does not support the range proof of ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Homomorphic encryption method for encrypting transaction amount and supporting zero knowledge proof
  • Homomorphic encryption method for encrypting transaction amount and supporting zero knowledge proof
  • Homomorphic encryption method for encrypting transaction amount and supporting zero knowledge proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0041] The Paillier homomorphic encryption algorithm is an additive homomorphic algorithm.

[0042] 1. Key generation

[0043] (1) Randomly select two large prime numbers p and q.

[0044] (2) Calculate n=pq and λ=lcm(p-1, q-1), lcm(·) is the least common multiple of the two parameters.

[0045] (3) Select a random number g, And satisfy μ=(L(gλ mod n 2 )) -1 mod n exists where, is not greater than n 2 The multiplicative group formed by the natural numbers of , L(u)=(u-1) / n.

[0046] At this time, the public key is (n, g), and the private key is (λ, μ).

[0047] 2. Encryption process

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a homomorphic encryption method for encrypting transaction amount and supporting zero knowledge proof, and belongs to the technical field of information security. The method comprises the following steps: generating a public key, a private key and a zero knowledge parameter according to a zero knowledge proof requirement and a Paillier algorithm; according to a given plaintext, using an encryption algorithm, the public key and the zero knowledge parameter for encryption, and outputting a ciphertext (E, c1 and c2); and according to the given ciphertext, using a decryption algorithm and the private key for decryption, and outputting a plaintext. According to the method, the Paillier homomorphic algorithm is improved; the ciphertext is divided into three parts (E, c1 and c2), the three parts can be used for secreting transaction amount on the whole, and the commitment part E can also be used for proving the zero knowledge range of the transaction amount, so that the Pillier algorithm is combined with the zero knowledge range proof based on FO commitment, and the range proof of the ciphertext is supported. The method can be used for transaction amount encryptionand range proof of an account model, and can also be used for transaction amount encryption and range proof of a UTXO model.

Description

technical field [0001] The invention belongs to the technical field of information security, and more specifically relates to a homomorphic encryption method for encrypting transaction amount and supporting zero-knowledge proof. Background technique [0002] The essence of blockchain technology is a continuously growing distributed database jointly maintained by multiple parties. Due to its outstanding features such as decentralization, collective maintenance, openness and transparency, non-tamperability, and quasi-anonymity, it has attracted widespread attention. Among the current blockchain technology platforms, Bitcoin, Ethereum and Hyperledger Fabric are the most representative. [0003] Hyperledger Fabric is an open-source permissioned consortium chain. The entire network consists of consensus services and many channels. All channels share a set of consensus services called order. Each channel maintains its own ledger, which is shared among the channel's member peers. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/32G06Q20/38
CPCG06Q20/3829H04L9/008H04L9/3221
Inventor 王志鹏孟庆树路松峰贺东博王同洋
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products