Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain digital asset privacy protection method and device, equipment and storage medium

A technology for privacy protection and digital assets, applied in the field of information security, it can solve the problems of transaction supervision difficulties and privacy leakage of blockchain digital asset transactions, and achieve the effect of ensuring reliability and non-repudiation.

Pending Publication Date: 2022-06-03
浙江甲骨文超级码科技股份有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a privacy protection method for blockchain digital assets, which aims to solve the problems in the prior art that the transaction privacy of blockchain digital assets is seriously leaked and transaction supervision is difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain digital asset privacy protection method and device, equipment and storage medium
  • Block chain digital asset privacy protection method and device, equipment and storage medium
  • Block chain digital asset privacy protection method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

like figure 1 As shown, a blockchain digital asset privacy protection method includes the following steps:

S110, obtaining the first generator and the second generator of the elliptic curve;

S120. Based on the first generator and the second generator, use the Pedersen commitment to construct the sender's holding amount commitment, the transfer amount commitment, and the change amount commitment, and generate the sender's holding amount commitment, Proof of the respective scopes of the transfer amount commitment and the change amount commitment;

S130, generating the respective symmetric keys of the sender, the receiver and the supervisor according to the elliptic curve key exchange system, and respectively calculating the ciphertext of the transfer amount, the ciphertext of the change amount and the supervisory ciphertext according to the symmetric key;

S140. Sign the constructed commitment and the calculated ciphertext to obtain a signed message, and send the signed message...

Embodiment 2

like figure 2 As shown, a blockchain digital asset privacy protection device, including:

an acquisition module 10, for acquiring the first generator and the second generator of the elliptic curve;

The construction module 20 is configured to construct the sender's holding amount commitment, the transfer amount commitment and the change amount commitment by using the Pedersen commitment based on the first generator and the second generator, and generate the sender's holding amount commitment. Proof of the respective scopes of the amount commitment, the transfer amount commitment and the change amount commitment;

The calculation module 30 is configured to generate the respective symmetric keys of the sender, the receiver and the supervisor according to the elliptic curve key exchange system, and calculate the ciphertext of the transfer amount, the ciphertext of the change amount and the supervisory cipher respectively according to the symmetric key. arts;

The judgment modu...

Embodiment 3

like image 3As shown, an electronic device includes a memory 301 and a processor 302, the memory 301 is used to store one or more computer instructions, wherein the one or more computer instructions are executed by the processor 302 to achieve the above A privacy protection method for blockchain digital assets. Those skilled in the art can clearly understand that, for the convenience and brevity of description, for the specific working process of the electronic device described above, reference may be made to the corresponding process in the foregoing method embodiments, which will not be repeated here. A computer-readable storage medium storing a computer program, the computer program enables a computer to implement the above-mentioned method for privacy protection of blockchain digital assets. Exemplarily, the computer program can be divided into one or more modules / units, one or more modules / units are stored in the memory 301 and executed by the processor 302, and the data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain digital asset privacy protection method, and relates to the technical field of information security, and the method comprises the following steps: obtaining a first generator and a second generator of an elliptic curve; constructing a sender holding amount commitment, a transfer amount commitment and a change amount commitment by using a Pederson commitment on the basis of the first generator and the second generator, and generating respective range proof; generating respective symmetric keys of a sender, a receiver and a supervisor according to an elliptic curve key exchange system, and calculating a transfer amount ciphertext, a change amount ciphertext and a supervisor ciphertext; and signing the constructed commitment and the calculated ciphertext, and sending a signature result to the block chain, so that a supervisor verifies the legality of the transaction and audits the transaction. According to the method, the transaction amount of the digital assets and the identity of the receiver are protected by using the Pederson commitment, and the supervision role is introduced, so that the supervision party realizes supervision on the transaction in the consensus process, and the supervision reliability and non-repudiation are ensured.

Description

technical field [0001] This application relates to the technical field of information security, and in particular, to a method, device, device and storage medium for privacy protection of blockchain digital assets. Background technique [0002] In recent years, data security incidents have occurred frequently, and data security threats have become increasingly severe. In 2021, the state officially promulgated the "Personal Information Protection Law". The promulgation of this regulation puts forward new requirements for the development of the Internet technology-based industry: enterprises must not compromise personal privacy. [0003] However, in the field of electronic payment, the issue of privacy protection is still serious. First of all, any purchases made by consumers on the website must be registered first. The registration information is public to the website, and every consumption will be recorded in the website. In the website database, the existing payment system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06Q40/04
CPCG06F21/6245G06Q40/04
Inventor 顾惠波岳晓兰孙海锋
Owner 浙江甲骨文超级码科技股份有限公司