Method for implementing blockchain dual-key hidden address protocol without temporary key leakage

A technology of temporary keys and implementation methods, which is applied in the direction of instruments, payment systems, data processing applications, etc., can solve the problems of user privacy security threats, loss of private information, unrecognizable hidden transactions and hidden transactions, etc., to solve privacy security issues Effect

Active Publication Date: 2020-01-10
SICHUAN NORMAL UNIVERSITY
View PDF10 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] To sum up, the problem existing in the existing technology is: in DKSAP, a temporary public key R must be added every time a hidden transaction is made, so that the hidden transaction can be easily identified through the public key R, that is, R indicates that the corresponding transaction is a hidden transaction, and the corresponding output address is not the real recipient address of the transaction, resulting in the loss of some private information. For example, an attacker can maliciously analyze the transaction through data mining and other related technologies to obtain the IP address, user Private information of users such as fund flow trajectory, user trading habits, etc., which poses a serious threat to user privacy and security
[0018] After solving the problem of leaking the temporary public key of the transaction in the widely used dual-key hidden address protocol (DKSAP), the structure of hidden transactions and non-hidden transactions is consistent, and attackers cannot identify hidden transactions and hidden transactions, making it difficult to mine users. private information, which will greatly improve security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing blockchain dual-key hidden address protocol without temporary key leakage
  • Method for implementing blockchain dual-key hidden address protocol without temporary key leakage
  • Method for implementing blockchain dual-key hidden address protocol without temporary key leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0064] Aiming at the problems existing in the prior art, the present invention provides a method for implementing a blockchain dual-key hidden address protocol without temporary key leakage. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0065] The present invention is achieved in this way, the system architecture diagram of PDKSAP is as follows figure 2 As shown, the entities involved are the sender, receiver and blockchain of the transaction, where ST means the sender of the transaction, RT means the receiver of the transaction, and BC means the blockchain.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of blockchain privacy information processing, and discloses a method for implementing a blockchain dual-key hidden address protocol without temporary key leakage, which comprises the following steps of initializing, generating a dual-key pair of a sender and a receiver of a transaction, and publishing the dual public keys on a blockchain; maintaining atransaction record database, enabling each user in the system to maintain a local transaction record database, and encrypting and storing the transaction times in the local transaction record databases; and hiding the transaction, hiding the address of the transaction receiver when the transfer transaction is carried out. According to the invention, the correct operation of the transaction can beensured under the condition that the transaction temporary key is not leaked, and the privacy security problem caused by the leakage of the transaction temporary key in a double-key hidden address protocol which is widely used at present is effectively solved; in addition, an enemy or an attacker cannot construct a transaction temporary output address same as that of the sender, and cannot calculate a transaction confirmation private key corresponding to the transaction temporary output address.

Description

technical field [0001] The invention belongs to the technical field of block chain privacy information processing, and in particular relates to a method for realizing a block chain dual-key hidden address protocol without temporary key leakage. Background technique [0002] Currently, the closest existing technology: In recent years, many encryption technologies have been applied to the privacy protection of the blockchain, such as zero-knowledge proof, ring signature and hidden address protocol are used to realize the transaction amount, transaction sender address and transaction Privacy of recipient address. The key work of privacy protection is the hidden address protocol. The hidden address protocol requires the sender to generate a one-time temporary output address of the transaction every time it conducts a transaction, thereby hiding the real output address of the transaction and destroying the gap between the transaction input address and the real output address. Re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06Q20/38G06F21/62G06F21/60
CPCG06Q40/04G06Q20/3829G06F21/602G06F21/6245
Inventor 谭良肖欢
Owner SICHUAN NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products