Supervisable distributed confidential transaction system and method

A transaction method and distributed technology, applied in the direction of payment system, payment system structure, protocol authorization, etc., can solve the problems that the regulator cannot implement penetrating supervision, damage the security of the transaction system, and the usability is not ideal, so as to ensure timely effectiveness and effectiveness, improve user experience, and improve supervision efficiency

Active Publication Date: 2021-04-13
SHANDONG UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The distributed confidential transaction system uses public key encryption technology to protect the transaction amount. While providing confidentiality protection, it also makes it impossible for regulators to effectively supervise encrypted transactions
[0004] As far as the inventor knows, the current common solution is to require the user to entrust the decryption private key to the supervisor, but this solution has some disadvantages. First, the supervision relies on the active cooperation of the user, and the supervisor cannot implement penetrating supervision, and the usability is not ideal ; Second, the supervisor needs to manage a large-scale decryption private key database, which leads to low efficiency of global supervision; third, the supervisor implements supervision by mastering the user's private key, which may be corrupted and damage the security of the transaction system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Supervisable distributed confidential transaction system and method
  • Supervisable distributed confidential transaction system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] A regulated distributed confidential transaction method, executed from a supervisory party, comprising the following steps:

[0058] Generate public parameters using a non-interactive zero-knowledge proof system generation algorithm;

[0059] Using the integrated encryption signature method, a public-private key pair is generated, and the private key is used as the global supervision private key;

[0060] Receive the registration request of the participating parties, and obtain the public and private key pairs, encrypted balances and public account information of the participating parties;

[0061] Monitor the transactions of the participating parties, confirm whether the transaction amount and the account balance of the transaction originator are within a reasonable range, or receive confirmation results of whether the transaction amount and the account balance of the transaction originator are within a reasonable range;

[0062] If the confirmation result is passed, ...

Embodiment 2

[0069] A regulated distributed confidential transaction method, executed from participating parties, comprising the following steps:

[0070] Send a registration request, send your own public / private key pair, encrypted balance and account public information;

[0071] Receive public parameters, generate or receive transaction requests, and confirm whether the transaction amount and the balance of the transaction originator are within a reasonable range, or, receive the confirmation result of whether the transaction amount and the account balance of the transaction originator are within a reasonable range;

[0072] If the confirmation result is passed, the confidential transaction will be carried out, and the account status will be updated according to the confidential transaction record verified by the legitimacy, otherwise the confidential transaction will be abandoned.

Embodiment 3

[0074] A regulated distributed confidential transaction method such as figure 1 shown, including the following steps:

[0075] (1) Perform system generation.

[0076] The system is designed based on an integrated cryptographic signature scheme (in which the cryptographic components support additive homomorphism) and a non-interactive zero-knowledge proof protocol.

[0077] Specifically, the supervisor performs the following operations:

[0078] (1-1) Run the system generation algorithm integrating the encrypted signature scheme and the non-interactive zero-knowledge proof respectively, and generate the corresponding public parameters pp_ise and pp_nizk;

[0079] (1-2) Run the key generation algorithm of the integrated encryption signature scheme to generate a public-private key pair (pk_a, sk_a);

[0080] (1-3) Publish pp=(pp_ise, pp_nizk, pk_a) as the public parameter of the system, and secretly hold sk_a as the global supervision private key.

[0081] (2) Account registr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a supervisable distributed confidential transaction method and system. A supervisor generates public parameters by using a non-interactive zero-knowledge proof system generation algorithm, generates public and private key pairs by using an integrated encryption signature method, and uses a private key as a global supervision private key; the participant generates a registration request, and sends a public and private key pair, a secret balance and account public information to the supervisor for registration; the supervisor monitors the transaction of the participant transaction party and confirms whether the transaction amount and the account balance of the transaction initiator are in a reasonable interval; and if the confirmation result is passed, confidential transaction is carried out between the participant transaction parties, confidential transaction records passing validity verification is uploaded, and the account state of each participant transaction party is updated by each participant transaction party. According to the invention, confidentiality protection can be provided for a user, and a supervisor is allowed to implement efficient penetration type global supervision.

Description

technical field [0001] The invention belongs to the technical field of information monitoring, and in particular relates to a supervised distributed confidential transaction system and method. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] In recent years, distributed transaction systems based on blockchain have received unprecedented attention, and two major issues that need to be solved urgently are privacy protection and regulatory auditing. The distributed confidential transaction system uses public key encryption technology to protect the transaction amount, which not only provides confidentiality protection, but also makes it impossible for regulators to effectively supervise confidential transactions. [0004] According to the inventor's knowledge, the currently commonly used solution is to require users to entrust the decryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q20/38G06Q40/04
CPCG06Q20/405G06Q20/38215G06Q20/389G06Q40/04
Inventor 陈宇
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products