Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fully homomorphic block chain privacy protection method based on Shamir threshold secret sharing

A threshold secret and privacy protection technology, which is applied in the field of Internet privacy protection, can solve the problems of difficulty in taking into account the availability of blockchain, the confidentiality of private information, and the difficulty of satisfying the verifiability and computability of ciphertext at the same time, so as to improve the effectiveness and The effect of privacy, meeting confidentiality, and guaranteeing availability

Pending Publication Date: 2022-06-07
CHONGQING JIAOTONG UNIVERSITY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this contradicts the basic principles of the blockchain to a certain extent, because the blockchain is a distributed database whose blocks must be generally approved and maintained, and it is difficult for existing schemes to satisfy the verifiability of ciphertexts at the same time. and computability, especially when the ciphertext is encrypted by different keys, making it difficult to balance the usability of the blockchain and the confidentiality of private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fully homomorphic block chain privacy protection method based on Shamir threshold secret sharing
  • Fully homomorphic block chain privacy protection method based on Shamir threshold secret sharing
  • Fully homomorphic block chain privacy protection method based on Shamir threshold secret sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0079] This embodiment discloses a fully homomorphic blockchain privacy protection method based on Shamir threshold secret sharing.

[0080] like figure 1 As shown, a fully homomorphic blockchain privacy protection method based on Shamir threshold secret sharing, including:

[0081] S1: Use the participants in the transaction as nodes to build the corresponding physical chain, and at the same time build the logical chain corresponding to each physical chain;

[0082] S2: The balance information of the node is divided into corresponding balance secret shares based on Shamir threshold secret sharing, and the balance secret share is stored in the physical chain of the corresponding node; in this embodiment, the local physical chain of each node stores all nodes The balance of the secret share.

[0083] S3: The payer and the earner of the transaction publish the secret share of the transaction amount about the transaction amount to other nodes as participants;

[0084] S4: Base...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of Internet privacy protection, in particular to a fully homomorphic block chain privacy protection method based on Shamir threshold secret sharing, and the method specifically comprises the steps: taking participants in a transaction as nodes to construct corresponding physical chains, and constructing logic chains corresponding to the physical chains at the same time; the balance information of the nodes is divided into corresponding balance secret shares based on secret sharing of a Shamir threshold, and the balance secret shares are stored in physical chains of the corresponding nodes; the payment party and the revenue direction of the transaction are used as other nodes of participants to publish transaction amount secret shares about the transaction amount; and each participant verifies whether the transaction amounts published by the payer and the income party are equal and whether the balance of the payer is greater than the transaction amounts based on the transaction amount secret share, and judges whether the transaction is legal according to the verification result of each participant. According to the method, the availability of the block chain and the confidentiality of privacy information can be considered, so that the effectiveness and privacy of transactions can be improved.

Description

technical field [0001] The invention relates to the technical field of Internet privacy protection, in particular to a fully homomorphic blockchain privacy protection method based on Shamir threshold secret sharing. Background technique [0002] With the rise of Bitcoin technology, blockchain, as the core technology of the underlying support, has attracted widespread attention in the industry. A blockchain is a shared, distributed database that records transactions between various participants. Due to the advantages of blockchain technology such as decentralization, trustworthiness, transparency, security and efficiency, more and more fields have begun to explore the application of blockchain and seek effective solutions. As blockchain technology gradually becomes an important strategy for distributed storage, its application model will also expand rapidly, and the provision of storage services and access services will also be refined. It is foreseeable that more and more ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08G06Q20/06G06Q20/38
CPCH04L9/085H04L9/0894H04L9/008G06Q20/06G06Q20/382H04L2209/08H04L2209/56
Inventor 米波吴冰清黄大荣李阳肖国梅
Owner CHONGQING JIAOTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products