Block chain-based V2G transaction privacy protection method, device and system

A blockchain and block technology, applied in the field of blockchain and privacy protection, can solve problems such as energy waste, achieve the effect of ensuring flexibility and security, saving transaction costs, and solving trust problems

Active Publication Date: 2020-07-17
SHANDONG UNIV
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And when grid demand is low, electricity usage is lower than the output of baseload power plants, so that unused energy is wasted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based V2G transaction privacy protection method, device and system
  • Block chain-based V2G transaction privacy protection method, device and system
  • Block chain-based V2G transaction privacy protection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Embodiment 1, this embodiment provides a V2G transaction privacy protection method based on blockchain;

[0044] A blockchain-based V2G transaction privacy protection method, including:

[0045] The blockchain node receives the transaction parameters sent anonymously by the buyer client, and records the transaction parameters and the first zero-knowledge proof generated by the buyer client on the blockchain; the blockchain node verifies the correctness of the first zero-knowledge proof , and record the verified transaction parameters on the blockchain;

[0046] The blockchain node receives the guarantee fee sent anonymously by the buyer client, and records the guarantee fee and the second zero-knowledge proof generated by the buyer client on the blockchain in the form of a smart contract; the blockchain node verifies the second zero-knowledge proof The correctness of the knowledge proof, and the verification fee is recorded on the blockchain;

[0047] The blockchain n...

Embodiment 11

[0134] Consider the specific actions of the seller in the transaction. User A is an electric car user, and the zero-knowledge balance in his account is cmt A =SHA256(v A , sn A ,r A ), he wants to sell the electricity in the electric car to user B, including the following steps:

[0135] 1.1.1 User A and user B negotiate the transaction parameter cmt offline c , N, pk A , pk B , and then wait for user B to deploy the smart contract in the blockchain;

[0136] 1.1.2 After the smart contract is deployed on the blockchain, user A checks whether the transaction parameters in the contract are the same as those previously negotiated by the two parties, and checks whether there is a correct amount of guarantee fee in the contract.

[0137] If the parameters are the same and the amount of guarantee fee is correct, proceed to the next step of the transaction;

[0138] If the parameters are different or the amount of guarantee fee is incorrect, it is considered that user B has c...

Embodiment 12

[0144] Consider the specific actions of the buyer in the transaction. User B is an electric car user, and the zero-knowledge balance in his account is cmt B =SHA256(v B , sn B ,r B ), he wants to purchase electricity from user A, including the following steps:

[0145] 1.2.1 User B generates a guarantee fee certificate cmt c =SHA256(amt,r c ), negotiate the transaction parameters cmt with user A offline c , N, pk A , pk B , then user B generates a hash chain of length N with hash root h 0 .

[0146] 1.2.2 User B generates parameters and constructs a zero-knowledge amount cmt v =SHA256(amt,sn v ,r v ), and construct a zero-knowledge balance cmt using B ’=SHA256(v B ’, sn B ’, r B '). User B generates a zero-knowledge proof π based on these parameters convert , and put sn B , cmt B , cmt v , cmt B ’ and π convert , sent to the blockchain, after waiting for miners to verify, cmt v Become an effective zero-knowledge amount.

[0147] 1.2.3 User B deploys a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a V2G transaction privacy protection method, device and system based on a block chain. The method comprises the steps: enabling a block chain node to receive a transaction parameter anonymously transmitted by a buyer client, and recording the transaction parameter and a first zero-knowledge proof generated by the buyer client on the block chain in a form of an intelligent contract; the blockchain node verifies the correctness of the first zero-knowledge proof, and records the transaction parameters passing the verification on the blockchain; the block chain node receives guarantee expenses anonymously sent by the buyer client, and records the guarantee expenses passing the verification on the block chain; the blockchain node receives a payment voucher for settlementanonymously sent by the seller client, and records the payment voucher passing the verification on a blockchain; converting the payment voucher into a corresponding amount of funds based on the intelligent contract of the blockchain; the fund of the corresponding amount is sent to the seller client; and sending the guarantee fee to the buyer client.

Description

technical field [0001] The present disclosure relates to the technical fields of blockchain and privacy protection, and in particular, relates to a blockchain-based V2G transaction privacy protection method, a blockchain-based V2G transaction privacy protection system, electronic equipment, and a storage medium. Background technique [0002] The statements in this section merely mention background art related to the present disclosure and do not necessarily constitute prior art. [0003] As one of the important components of the smart grid, V2G technology is developing rapidly and has gradually become a hot topic in related industries. V2G technology, or Vehicle-to-Grid, is a technical solution that uses a large number of electric vehicles as energy reserves for the grid to provide a buffer for the grid and other renewable energy. When grid demand exceeds the capacity of baseload power plants, because the grid itself does not have enough energy storage, peaking plants come ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/64G06Q40/04
CPCG06F21/6254G06F21/64G06Q40/04
Inventor 万志国张桐刘卫壮
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products