Fair safe electronic exchange method without third party

A safe transaction and fair technology, applied in the field of information security, can solve problems such as the inability to guarantee that the third party will not make mistakes, deceive or even collude, the third party cannot be reassuring, and the buyers and sellers cannot trust each other. The effect of realizing and enhancing security

Inactive Publication Date: 2006-10-11
XIDIAN UNIV
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] All of the above transaction methods involve a trusted third party. In fact, people have doubts about the fair exchange scheme involving a trusted third party. The reason is that in the trustless environment of the Internet, not only buyers and sellers cannot trust each other , any third party that may enter the transaction process cannot be reassuring, because no one can guarantee that the third party will not make mistakes, cheat or even collude

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fair safe electronic exchange method without third party
  • Fair safe electronic exchange method without third party
  • Fair safe electronic exchange method without third party

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to illustrate the implementation of the present invention more clearly, the principle of concurrently valid signatures is firstly introduced here. The simultaneous effective signature consists of five parts, which are described in detail as follows:

[0047] 1) Establish all parameters including keys

[0048] First choose two large prime numbers p, q, and satisfy q|p-1, g is the group Z p * A q-order element of ;

[0049] Then choose two one-way Hash functions H 1 , H 2 : {0, 1} * → Z q ;

[0050] Then select the private key x∈Z q , public key y=g x mod p;

[0051] Assuming that the party participating in the exchange is Party A, and the other party participating in the exchange is Party B, then Party A will get the private key x A ∈ Z q and public key y A = g x A mod p , And party B will get the priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an equal safety electric business method, which can solve the problem that worse equality caused by the third part of electric business cahoots to cheat. The invention can avoid the third part, to directly process the electric business between the buyer and the seller when there is not safe network, that the buyer and the seller use code algorism especially the synchronous effective sign algorism to process the trade information as electric order, electric check, etc, and transmit the result to opposite part via network; and they both keep the trade evidence, to realize the equal and safe business of digital goods and solid goods. The invention has simple process, high equality, while buyer can obtain digital goods when the electric check becomes effective, and obtain solid goods, when the seller shows key evidence that the electric check is effective.

Description

technical field [0001] The invention belongs to the field of information security and relates to e-commerce, in particular to a fair and safe e-commerce transaction method without a third party, which can be used for e-commerce transactions of various physical commodities and digital commodities. Background technique [0002] With the development of computer network and communication technology, people gradually communicate and exchange their own information through the network. New forms of exchange such as online payment and e-commerce have emerged. At present, the security problem of electronic payment has increasingly become the bottleneck restricting the development of e-commerce. This problem is prominently reflected in the realization of the fairness of electronic payment in our country. Fraud in real-world exchanges has not disappeared in the network environment. On the contrary, due to changes in the form of participants and changes in exchange methods, fraud has b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00
Inventor 李华平寇卫东樊凯
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products