Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Private transaction generation and verification method and system based on block chain

A blockchain and transaction technology, applied in the blockchain field, can solve problems such as security risks, algorithm differences, cut off transaction tracking, etc., and achieve the effects of avoiding security risks, high credibility, and preventing transaction fraud

Pending Publication Date: 2022-08-02
胡恒浩
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the blockchain privacy protection mechanism based on currency mixing is the most widely used and easy to implement, but it requires third-party credit institutions to provide currency mixing services or to gather and run a certain currency mixing protocol spontaneously through third-party communication tools, which is obviously different from regional The characteristics of blockchain decentralization are contrary to
The blockchain privacy protection mechanism based on zero-knowledge proof guarantees that no useful information will be leaked through the zero-knowledge feature. The most typical one is Zcash (zero currency) based on zk-SNARK, but only the transaction sender can provide proof for Zerocash transactions. And the real digital digital currency address is still stored in zk-SNARK as part of the proof, which creates a new security risk
The privacy protection mechanism based on the ring signature can overcome the shortcomings of currency mixing and zero-knowledge proof. It does not require a third-party organization to provide currency mixing services, nor does it need to generate public system parameters. It uses ring signatures to hide the real input of transactions in Among mixed addresses, transaction tracking is cut off, making it difficult for attackers to generate transaction graphs
At present, the most successful implementation of the ring signature-based blockchain privacy protection mechanism is Monero (Monero), which was launched in April 2014, based on the CryptoNote protocol, and has a significant algorithm in blockchain fuzzing differences, but there are still disadvantages
The biggest attack affecting the security of Monero is the zero-mix transaction, which leads to the cracking of the transaction identity
For this reason, strengthening unlinkability and untraceability is still a difficult problem to be solved in today's blockchain privacy protection technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private transaction generation and verification method and system based on block chain
  • Private transaction generation and verification method and system based on block chain
  • Private transaction generation and verification method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to make the objectives, technical solutions and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below with reference to the accompanying drawings.

[0075] The Zerocash protocol is a digital currency based on zk-SNARK, which uses zero-knowledge proof as a verification method in transactions. In the specific Zerocash transfer process, it can be understood that the prover is the sender of the Zerocash transaction, the verifier is the maintenance node of the blockchain, and the message to be verified is the transaction transfer information. The sender of the transaction provides a proof, and other users cannot infer the transfer information (including the sender's address and transaction amount) through this proof, but the blockchain node can still verify the legitimacy of each transaction transfer. As the earliest widely used zk-SNARK in the digital currency system, Zcash aims to provide us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the private transaction generation and verification method and system based on the block chain provided by the invention, the random number shared by two transaction parties is utilized to generate the real collection address pair with randomness, the corresponding commitment component is generated for the random number, the commitment component is subjected to homomorphic addition to obtain the homomorphic addition commitment, and the privacy transaction is verified through the homomorphic addition commitment. Executing a Zerohash protocol and generating a digital currency, and injecting the digital currency into a transaction and a corresponding transaction commitment; the collection node compares the commitment added by the random numbers exchanged by the two transaction parties with the homomorphic addition commitment in the digital currency, and generates a corresponding commitment component after confirming that the commitment is consistent with the homomorphic addition commitment, and further verifies the validity of the transaction commitment; meanwhile, signature data with zk-SNARK certification can be provided for other member nodes on the block chain, so that a transaction data verification function is realized; according to the privacy transaction process, the non-linkability of block transaction data and the non-traceability of transaction identities can be completely realized, and meanwhile, the privacy transaction process is compatible with a traditional block data structure.

Description

technical field [0001] The invention relates to the technical field of blockchain, in particular to a method and system for generating and verifying privacy transactions based on blockchain. Background technique [0002] Blockchain data refers to block data recorded on blockchain nodes, including transactions, timestamps, block headers and other information in the block. The consensus mechanism is used between nodes to jointly maintain the consistency and integrity of data, so that the data recorded in the longest chain cannot be deleted by a single node, but this feature also brings other security threats to the blockchain ecosystem, especially More and more attention has been paid to the privacy of both parties to the transaction. [0003] Taking traditional digital currency as an example, the user of each transaction uses the transaction account or transaction address generated by its own public key to conduct anonymous transactions. Anonymization of transactions. Howe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/20H04L9/32G06Q20/38
CPCH04L9/008H04L9/0869H04L9/0656H04L9/3247H04L9/3218H04L9/3239G06Q20/3825G06Q20/3827G06Q20/3829
Inventor 胡恒浩姚建峰
Owner 胡恒浩
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products