Block chain digital asset privacy protection method and device, equipment and storage medium
A technology for privacy protection and digital assets, applied in the field of information security, it can solve the problems of transaction supervision difficulties and privacy leakage of blockchain digital asset transactions, and achieve the effect of ensuring reliability and non-repudiation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
like figure 1 As shown, a blockchain digital asset privacy protection method includes the following steps:
S110, obtaining the first generator and the second generator of the elliptic curve;
S120. Based on the first generator and the second generator, use the Pedersen commitment to construct the sender's holding amount commitment, the transfer amount commitment, and the change amount commitment, and generate the sender's holding amount commitment, Proof of the respective scopes of the transfer amount commitment and the change amount commitment;
S130, generating the respective symmetric keys of the sender, the receiver and the supervisor according to the elliptic curve key exchange system, and respectively calculating the ciphertext of the transfer amount, the ciphertext of the change amount and the supervisory ciphertext according to the symmetric key;
S140. Sign the constructed commitment and the calculated ciphertext to obtain a signed message, and send the signed message...
Embodiment 2
like figure 2 As shown, a blockchain digital asset privacy protection device, including:
an acquisition module 10, for acquiring the first generator and the second generator of the elliptic curve;
The construction module 20 is configured to construct the sender's holding amount commitment, the transfer amount commitment and the change amount commitment by using the Pedersen commitment based on the first generator and the second generator, and generate the sender's holding amount commitment. Proof of the respective scopes of the amount commitment, the transfer amount commitment and the change amount commitment;
The calculation module 30 is configured to generate the respective symmetric keys of the sender, the receiver and the supervisor according to the elliptic curve key exchange system, and calculate the ciphertext of the transfer amount, the ciphertext of the change amount and the supervisory cipher respectively according to the symmetric key. arts;
The judgment modu...
Embodiment 3
like image 3As shown, an electronic device includes a memory 301 and a processor 302, the memory 301 is used to store one or more computer instructions, wherein the one or more computer instructions are executed by the processor 302 to achieve the above A privacy protection method for blockchain digital assets. Those skilled in the art can clearly understand that, for the convenience and brevity of description, for the specific working process of the electronic device described above, reference may be made to the corresponding process in the foregoing method embodiments, which will not be repeated here. A computer-readable storage medium storing a computer program, the computer program enables a computer to implement the above-mentioned method for privacy protection of blockchain digital assets. Exemplarily, the computer program can be divided into one or more modules / units, one or more modules / units are stored in the memory 301 and executed by the processor 302, and the data...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


