Anonymous multi-signature method, computer equipment and storage medium

A multi-signature and algorithm technology, applied in the Internet field, can solve problems such as leakage and achieve the effect of ensuring feasibility

Pending Publication Date: 2021-07-09
HANGZHOU FUZAMEI TECH CO LTD
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The prover proves to the verifier and makes him believe that he knows or has a certain message, but the proof process cannot leak any information about the proven message to the verifier

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous multi-signature method, computer equipment and storage medium
  • Anonymous multi-signature method, computer equipment and storage medium
  • Anonymous multi-signature method, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0033] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0034] figure 1 It is a flowchart of an anonymous multi-signature method provided by an embodiment of the present invention.

[0035] Such as figure 1 As shown, in this embodiment, the present invention provides an anonymous multi-signature method suitable for the client. An anonymous multi-sign...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anonymous multi-signature method, computer equipment and a storage medium. The method comprises the following steps: generating a first repeated verification hash according to a second private key and a first ID; taking the first ID, the first repeated verification hash and the root of the first Merkel tree as public input of a circuit certification algorithm, and taking the second private key, the second address and the path information as private input to generate first certification information; generating a first anonymous multi-signature transaction comprising the first ID, the first repeated verification hash, the tree root and the first certification information, sending the first anonymous multi-signature transaction to the block chain network for execution by the node, and inputting each item of second repeated verification hash, the verification parameter, the first ID, the first repeated verification hash, the tree root and the first certification information into a circuit verification algorithm for verification; if yes, storing the first repeated verification Hash into the contract, and judging whether the number of the repeated verification Hash accords with a verification threshold or not; if yes, determining that the multi-signature verification succeeds. According to the invention, anonymous multiple signatures on the block chain are realized.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to an anonymous multi-signature method, computer equipment and storage media. Background technique [0002] The current blockchain multi-signature schemes are public signature schemes: [0003] Users participating in multi-signatures sign with their own private keys and generate transactions and send them to the blockchain network; [0004] The blockchain node executes the transaction through a multi-signature contract, and verifies the signature through the user's public key: if the verification is successful, the user's signature is recorded in the contract; [0005] When the number of signing users recorded in the contract exceeds the number of users required by multi-signature, for example, 2 / 3 of the total number of users, the multi-signature verification is successful. [0006] The above scheme very clearly exposes which users participate in multi-signature an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/3825G06Q20/3827G06Q20/3829
Inventor 马登极王志文吴思进
Owner HANGZHOU FUZAMEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products