Unlock instant, AI-driven research and patent intelligence for your innovation.

Self-adaptive combinable chain privacy protection transaction system and method

A privacy protection and transaction method technology, applied in the field of self-adaptive and composable privacy protection transaction systems on the chain, can solve the problems of single privacy protection method, restrictions on the establishment of distributed platforms and decentralized multi-party agreements, and limited channels to achieve The effect of protecting transaction privacy and solving privacy protection problems

Pending Publication Date: 2021-07-16
XIDIAN UNIV +1
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) In order to ensure the open and verifiable nature in the distributed scenario, all information on the chain of the blockchain is public, and the transaction data is transparent and checkable, which leads to the easy exposure of private data on the blockchain, and the privacy information of traders cannot be effectively obtained Protect
[0006] (2) The blockchain transaction model under the existing privacy protection mode only focuses on privacy protection in a specific mode, and the privacy protection methods between the various models cannot be effectively adapted, resulting in a single privacy protection method on the current chain And the way is limited, unable to adapt to the current privacy protection mode under different needs
[0007] (3) The current privacy protection schemes on the blockchain are all at the cost of giving up the programmability of the blockchain, and cannot effectively protect the privacy of the blockchain smart contract, resulting in some privacy protection requirements and based on smart contracts. Applications and scenarios cannot be realized on existing blockchain platforms
However, in order to ensure its verifiable and computable properties, transactions under the current blockchain system and information in smart contracts are all presented in plain text, and the privacy of participants cannot be guaranteed, which also limits distributed platforms and smart contracts with privacy protection requirements. Establishment of a decentralized multi-party protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-adaptive combinable chain privacy protection transaction system and method
  • Self-adaptive combinable chain privacy protection transaction system and method
  • Self-adaptive combinable chain privacy protection transaction system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0134] The invention aims to solve the privacy protection problem in the block chain electronic currency system, and solve the privacy protection problem of the block chain smart contract while protecting transaction privacy.

[0135]The present invention proposes four different privacy protection modes: Plaintext Mode (Plaintext), Secret Mode (Secret), Anonymous Mode (Anonymous), Confusion Mode (Obscure), and different privacy modes through commitment technology and zero-knowledge proof technology It is instantiated in the transaction model, account model and contract model of the blockchain to meet the personalized privacy protection needs of users in different situations. During the instantiation process, the privacy protection mode and its corresponding instantiation modules are self-adaptive and combinable, which ensures that users can select an appropriate privacy mode to instantiate different modules one by one according to their own unique privacy protection needs. And...

Embodiment 2

[0215] Example 2: Crowdfunding and Private Equity

[0216] A user A plans to initiate a crowdfunding project (fundraiser, the fundraising amount is disclosed) and another private equity project (fundraiser, the fundraising amount is kept secret), and the user has a private key sk and the corresponding public key ( g, h) and address addr, the following users need to participate in these two projects:

[0217] User D needs to remit money to the crowdfunding project;

[0218] User E needs to remit money to the private placement project, and needs to cover up his address and remittance amount during the remittance process;

[0219] User F needs to remit money to the private equity project, not only needs to cover up his address and remittance amount during the remittance process, but also needs to cover up the remittance behavior.

[0220] The specific implementation process is as follows:

[0221] 1. User A writes the crowdfunding project contract Contract_1 and specifies its ex...

Embodiment 3

[0246] Example 3: Privacy-protected on-chain lottery game

[0247] There is an existing lottery game on the chain. The rules of the game are: all users on the chain can participate in the game by betting. After a certain period of time, the system will randomly select a winning user among all users participating in the betting (the user’s winning probability is equal to the The user's betting accounted for the total share), the user will get the amount of all user bets during this period.

[0248] Privacy requirements: Betting users can freely choose the Plaintext / Secret / Anonymous / Obscure mode to participate in betting; bettors cannot be members of the contract committee. Assumptions:

[0249] User A participates in betting through Plaintext's deposit / deposit mode (without privacy protection);

[0250] User B participates in betting through the deposit / deposit mode of Secret (protecting the privacy of the betting amount);

[0251] User D participates in betting through the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of privacy protection and block chain intelligent contracts, and discloses a self-adaptive and combinable on-chain privacy protection transaction system and method. The method comprises the steps: providing a privacy protection mode through a privacy protection mode setting module; anonymization establishment of a user model, a transaction model, a mining model and a contract model in a privacy protection mode is supported by utilizing properly set system parameters through a system parameter setting module; proposing a user state in an AnymousState storage anonymous mode through an account model setting module; proposing a standard transaction model in a privacy protection mode through an adaptive transaction model construction module; the mining model is designed in the privacy protection mode through the mining model construction module; and providing an intelligent contract model in a privacy protection mode through an intelligent contract model construction module. According to the invention, the privacy protection problem in the block chain electronic currency system can be solved.

Description

technical field [0001] The invention belongs to the technical field of privacy protection and blockchain smart contracts, and in particular relates to an adaptive and combinable on-chain privacy protection transaction system and method. Background technique [0002] At present, the birth of blockchain technology provides a new way for distributed decentralized transactions, and the realization of smart contract technology on the chain is even more for the establishment of distributed trusted scenarios such as decentralized application Dapp and distributed organization DAO. It has laid a solid and solid foundation for improvement and improvement. However, in order to ensure the open and verifiable nature of distributed scenarios, all information on the chain of the blockchain is made public, and the transaction data is transparent and checkable. As a result, private data on the blockchain will be easily exposed, and the private information of traders cannot be effectively pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/10G06Q20/38G06Q40/04H04L9/32G06F21/60G06F21/62
CPCG06Q20/10G06Q20/3829G06Q20/3825G06Q20/3827G06Q40/04G06F21/6254G06F21/602H04L9/3218H04L9/3247H04L9/3236
Inventor 裴庆祺李嘉和刘雪峰马立川王乐
Owner XIDIAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More