Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Alliance chain privacy protection method based on secure multi-party computing

A secure multi-party computing and privacy protection technology, applied in the field of alliance chain privacy protection, to achieve the effect of untraceability and verifiability

Pending Publication Date: 2021-11-12
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to solve the technical problems of identity privacy protection, transaction privacy protection, identity tracking and transaction verifiability faced by the alliance chain, and to provide a privacy protection method for the alliance chain based on secure multi-party computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alliance chain privacy protection method based on secure multi-party computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0061] like figure 1 As shown, this embodiment elaborates on the privacy protection in the multi-party computing scenario empowered by the alliance chain. For example, in a multi-party voting scenario, voters who do not trust each other have needs such as identity information privacy protection, voting data privacy protection, and voting verification.

[0062] This embodiment describes the use of the method of the present invention to realize the anonymous security voting system in the alliance chain, including the following process:

[0063] Step 1: Voters preprocess the identity information to realize anonymous voting on the alliance chain, which specifically includes the following sub-steps:

[0064] Step 1.1: Each voter must present a certificate that can prove his true identity to the credential management agency, so as to obtain an authentication certificate. and each authenticated voter P i (i=1,2,...,n) will be assigned a processing tool AT i , thereafter, voter P ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an alliance chain privacy protection method based on secure multi-party computing, and belongs to the technical field of alliance chain privacy protection. According to the method, the commitment and zero-knowledge proof technology is adopted to hide the identity information of the user, and the legality of the identity of the user is proved to the alliance chain, so that the anonymous transaction of the user on the alliance chain is realized; secret sharing, commitment, homomorphic encryption and other technologies are adopted to hide sensitive data of a user from other users. And meanwhile, the user can participate in a multi-party computing task by utilizing the sensitive data under the condition that real data is not exposed, and the user can only obtain own computing result and cannot see secure multi-party computing protocol output data of other users, so that alliance chain user transaction data privacy protection under the secure multi-party computing protocol is realized. Meanwhile, according to the method, the untraceability and verifiability of the user identity are realized.

Description

technical field [0001] The invention relates to a privacy protection method of alliance chain, in particular to a privacy protection method of alliance chain using secure multi-party computing technology, belonging to the technical field of privacy protection of alliance chain. Background technique [0002] As a decentralized distributed ledger technology, blockchain technology provides a new solution for the storage and dissemination of modern information data. At the same time, the underdeveloped blockchain technology also brings security difficulties different from the previous centralized traditional technology. [0003] At present, there are still many security flaws in blockchain technology, among which privacy leakage has always been one of the technical problems that are difficult to solve. The consortium chain is a type of blockchain technology. The consortium chain requires the participants to enter the consortium chain. Only members who have been audited and pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/32G06F21/62G06F21/60G06F21/31
CPCH04L9/008H04L9/0869H04L9/3247H04L9/3218G06F21/6254G06F21/602G06F21/31H04L2209/46H04L9/50
Inventor 盖珂珂周雨佳祝烈煌
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products