Safe and efficient unlicensed blockchain condition anonymization method, system and application

A blockchain and security technology, applied in the direction of data processing applications, computer security devices, special data processing applications, etc., can solve problems such as unsatisfactory computing efficiency, difficulty in meeting transaction needs, and hidden transmission of key leakage. Achieve safe and efficient non-permissioned blockchain conditional anonymity, improve throughput and overall efficiency, and avoid key leakage

Pending Publication Date: 2021-11-09
XIDIAN UNIV
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] (1) There are a large number of uncontrolled random numbers that are easy to be used by the adversary in the conditional anonymity scheme in the existing non-permissioned blockchain scenario, causing security issues such as key leakage and concealed transmission
[0012] (2) The conditional anonymity scheme in the existing non-permissioned blockchain scenario uses a large number of complex cryptographic tools, resulting in unsatisfactory computational efficiency of the scheme
[0013] (3) The extra parameters introduced by the existing technology to ensure anonymity make the system throughput of the scheme low, and it is difficult to meet people's transaction needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and efficient unlicensed blockchain condition anonymization method, system and application
  • Safe and efficient unlicensed blockchain condition anonymization method, system and application
  • Safe and efficient unlicensed blockchain condition anonymization method, system and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0079] Aiming at the problems existing in the prior art, the present invention provides a safe and efficient non-permissioned blockchain conditional anonymous method, system and application. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0080] Such as figure 1 As shown, the safe and efficient non-permissioned blockchain conditional anonymous method provided by the embodiment of the present invention includes the following steps:

[0081] S101. Generate a one-time public key and related verification parameters according to the user's long-term public key;

[0082] S10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of blockchain security, and discloses a safe and efficient unlicensed blockchain conditional anonymity method, system and application, and the safe and efficient unlicensed blockchain conditional anonymity method comprises: user one-time public and private key pair generation, anonymous transaction generation, transaction legality verification and user identity tracking; a one-time public key and related verification parameters are generated according to the long-term public key of the user; an anonymous transaction bill, a transaction signature and related verification parameters are generated by adopting a bilinear ring signature technology; the miner node and the supervision mechanism cooperatively verify the legality of the transaction, and respectively package the anonymous transaction and the user identity information into an anonymous unlicensed blockchain and a supervision blockchain; and the supervision mechanism tracks the anonymous identity of the user by using the private key of the supervision mechanism. Anonymity and traceability of the user identity in the unlicensed blockchain can be realized at the same time, introduction of an uncontrolled random number is avoided through the bilinear ring signature and the double-chain structure, and the throughput and the overall efficiency are improved.

Description

technical field [0001] The invention belongs to the technical field of blockchain security, and in particular relates to a safe and efficient method, system and application of non-permissioned blockchain conditional anonymity. Background technique [0002] The existing blockchain conditional anonymity scheme can effectively track the anonymous identity of users on the basis of privacy protection by introducing supervisory agencies with special information. When an honest node publishes a legal transaction, the transaction exists in the form of privacy protection. When special circumstances such as double spending and suspicious transaction content occur, the regulator can use the special information it has to track the anonymous identity of the transaction participants, thereby Achieving conditional anonymity of blockchain user identities. Since in real scenarios, criminals often prefer non-permissioned blockchains with a higher degree of anonymity to carry out illegal tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/64G06Q40/04G06F16/27
CPCG06F21/6245G06F21/64G06F16/27G06Q40/04
Inventor 陈晓峰沈珺李瑞阳王连海
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products