Interactive zero knowledge proof method and device, computer equipment and storage medium

A zero-knowledge proof, computer technology, applied in computing, secure communication devices, user identity/authority verification, etc., can solve problems such as resource transfer risks and inability to establish zero-knowledge proofs

Pending Publication Date: 2020-06-12
PINGAN YIQIANBAO E COMMERCE CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the zero-knowledge proof technology has the above-mentioned advantages, it also has defects. When the computer network applies the zero-knowledge proof technology, it needs to rely on a third party t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interactive zero knowledge proof method and device, computer equipment and storage medium
  • Interactive zero knowledge proof method and device, computer equipment and storage medium
  • Interactive zero knowledge proof method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0052] The interactive zero-knowledge proof method provided by this application can be applied to such as figure 1 shown in the application environment. When a resource transfer (transaction) occurs at a node 122 in the resource transfer network 120, the server 110 obtains the resource transfer data corresponding to this resource transfer event, generates a zero-knowledge proof based on the resource transfer data, and obtains the computer integrity language data corresponding to the zero-knowledge proof , the computer integrity language data are converted into polynomial ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an interactive zero knowledge proof method and device, computer equipment and a storage medium. The method comprises the following steps: converting the resource transfer datainto zero knowledge proof; obtaining computer integrity language data corresponding to the zero knowledge proof; converting the computer integrity language data into a polynomial constraint form; performing a low-degree test on the linear combinatorial polynomial based on an FRI protocol; and sending low-degree test data to the verification node, verifying whether the maximum degree of the linearcombinatorial polynomial is smaller than a preset value or not by the verification node according to the low-degree test data, and judging that the resource transfer is valid when receiving a certification acceptance message fed back by the verification node. In the whole process, a third party does not need to set public parameters, the content needing to be proved is converted into a linear combinatorial polynomial based on the FRI protocol to carry out a low-degree test process, the third party is prevented from being disgusted, and the zero-knowledge proof safety is remarkably improved.

Description

technical field [0001] The present application relates to the technical field of computer encryption, in particular to an interactive zero-knowledge proof method, device, computer equipment and storage medium. Background technique [0002] The current society is in the information age, and the application of cryptography is essential to solve various security problems. At present, cryptography has been widely used in network, communication, payment and other fields, and it is closely related to human life. It can be said that cryptography is one of the core technologies to solve modern information security technology. In transfer networks (such as transaction networks, payment networks, etc.), cryptography is even more important. [0003] In the traditional resource transfer network, the resource transferor may be anonymous or a temporary identity assigned by the network. All resource transfer information made by the identity on the resource transfer network is transparent,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L29/06G06Q20/06G06Q20/38G06Q40/04
CPCG06Q20/065G06Q20/3829G06Q40/04H04L9/3026H04L9/3221H04L63/126
Inventor 袁立威李志辉王凌斌陈海洋
Owner PINGAN YIQIANBAO E COMMERCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products