CN112950338A - Block chain-based sealed bidding domain name auction method - Google Patents

Block chain-based sealed bidding domain name auction method Download PDF

Info

Publication number
CN112950338A
CN112950338A CN202110222627.1A CN202110222627A CN112950338A CN 112950338 A CN112950338 A CN 112950338A CN 202110222627 A CN202110222627 A CN 202110222627A CN 112950338 A CN112950338 A CN 112950338A
Authority
CN
China
Prior art keywords
domain name
function
bidding
bidder
auction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110222627.1A
Other languages
Chinese (zh)
Inventor
张艺
陆根花
陆忠祥
邵俊
魏贵义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Gongshang University
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN202110222627.1A priority Critical patent/CN112950338A/en
Publication of CN112950338A publication Critical patent/CN112950338A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0611Request for offers or quotes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • H04L61/3015Name registration, generation or assignment
    • H04L61/3025Domain name generation or assignment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/466Electronic auction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of block chains, in particular to a block chain-based sealed bidding domain name auction method, which comprises the following steps: in a block chain, a domain name owner creates a domain name auction contract, and adopts a consensus mechanism to check the validity of the domain name auction contract and record the information of bidders; when the bidders find out the domain name auction contract existing on the block chain, the bidders call and verify the commitment, and participate in bidding after the verification is passed; after the bidding time is over, each bidder finishes uncovering after passing the checking of the consensus mechanism; after the bidding is uncovered, anyone can view the bidding records, bidders complete bidding according to respective states, and the auction is ended. The invention realizes the transaction fairness, the competitive bidding fairness, the fund guarantee and the fund privacy in the domain name auction transfer process.

Description

Block chain-based sealed bidding domain name auction method
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain-based sealed bidding domain name auction method.
Background
The Domain Name System (DNS) is one of the important infrastructures of the internet. Because of its advent, people no longer use IP addresses that are difficult to remember to access websites, but use domain names that are easy to understand and remember. The basic function of DNS is to manage root and top domain names, which are currently mainly maintained by the internet name and number assignment authority (ICANN), so that such a centralized architecture is vulnerable to attacks such as single point of failure and power abuse. A well-known DNS single point failure event is the 2016 Dyn network attack event. Com, GitHub, Twitter and Reddit are converted to inaccessible when accessing their corresponding domain names by many web sites due to DNS failures provided by Dyn. The idea to solve the above problem is naturally to introduce a decentralized architecture into the DNS. Meanwhile, over the past decade, blockchains have become the most famous and successful decentralized architecture. Thus, many scholars suggest introducing blockchains into DNS. In DNS, domain name auction is the main way to acquire domain names, however, the existing block chain based DNS system cannot provide corresponding functions, and cannot achieve the expected effect:
namecoin, Consortium DNS, EmerDNS and Blockstack focus primarily on domain name registration, ignoring the process of domain name auctions;
ethereum Name Service (ENS) implements the auction function for cryptocurrency addresses, but does not provide the auction function for domain names;
handshake implements a domain name auction that seals bids and does not reveal any one person's bid until all bids are committed. The main advantage of sealed bid domain auctions is that bidders are more willing to bid according to the true value of the asset. However, since the current highest bid is predictable, the last bidder in the Handshake can always win the auction with a reasonable bid.
Therefore, the existing block chain based DNS scheme lacks the process of domain name auction or cannot guarantee fairness during the process of domain name auction.
Disclosure of Invention
In order to solve the technical problems in the prior art, the invention provides a block chain-based sealed bidding domain name auction method, which has the following specific technical scheme:
the sealed bidding domain name auction method based on the block chain comprises the following steps:
the method comprises the following steps that firstly, in a block chain, a domain name owner creates a domain name auction contract, a consensus mechanism is adopted to carry out validity check on the domain name auction contract, and information of bidders is recorded;
the second stage, when the bidder finds out the domain name auction contract existing on the block chain, the bidder calls and verifies the commitment, and participates in bidding after the verification is passed;
in the third stage, after the bidding time is cut off, each bidder finishes uncovering after passing the check of the consensus mechanism;
and fourthly, after the bidding is uncovered, anyone can view the bidding records, bidders complete bidding according to respective states, and the auction is ended.
Further, the domain owner calls the function Create (T)1,T2Name, delta) to Create a domain name auction contract, the function Create (T)1,T2T in name, delta)1Indicates the deadline of the bid, T2Indicating an unmarked deadline, name referring to a domain name to be auctioned by a domain name owner, and delta being a signature of an account owner owning the domain name on the intelligent contract by using a public key of the account owner;
the adoption of the consensus mechanism to carry out validity check on the domain name auction contract specifically comprises the following steps: consensus node checks (T) when a consensus node in a blockchain receives a Create function call1,T2Name, delta), and whether the auction contract corresponding to the name is set in the block chain, when the check is passedIf so, the consensus node continues to run the Create function, otherwise, the consensus node stops running the function;
and recording information related to the bidder by adopting a bidder [ ] array, wherein the information comprises a public key corresponding to a certain account of the bidder, the commitment of the bidder to the bid amount and data used for uncovering the bid by the bidder.
Further, bidders call the commitment function
Figure BDA0002953759880000021
To participate in bidding, wherein pk is a public key corresponding to a certain account of a bidder;
Figure BDA0002953759880000022
representing bids
Figure BDA0002953759880000023
The commitment of (a); σ is the signature of the smart contract using pk; ZKP is to
Figure BDA0002953759880000024
Figure BDA0002953759880000025
Wherein c refers to the balance in the account corresponding to pk;
when the consensus node in the block chain receives the call of the Commit function, the consensus node checks whether the array bidider [ ] does not contain pk, whether the time T for calling the function is in the validity period, and the validity of (sigma, ZKP), and when the check is passed, the consensus node continues to run the Commit function; otherwise, the consensus node will stop running the function.
Further, the third stage specifically includes: when the bidding time is over, the bidding phase is stopped and each bidder calls the unmasking function
Figure BDA0002953759880000026
Uncovering the bid, wherein pk is the same public key used by the bidder when invoking the Commit function,
Figure BDA0002953759880000031
for opening commitments
Figure BDA0002953759880000032
When the consensus node receives a call to the recent function, the consensus node checks whether the time T of the call is within the validity period, in the number of sets of bidider 2]Whether there is a commitment corresponding to pk in
Figure BDA0002953759880000033
And
Figure BDA0002953759880000034
if the promise can be opened, when the check is passed, the consensus node will run the function of the Reveal function; otherwise, the consensus node will stop running the Reveal function.
Further, the fourth stage specifically includes: after the bidding is uncovered, anyone can judge who is the winner according to the record in the array bid [ ], the winner calls a Finailize function, when the consensus node receives the function call, the consensus node checks whether the auction completion time is up or not according to the deadline of the uncovering, and checks whether the current intelligent contract is in a running state or not, when the check is passed, the consensus node continues to run the Finailize function, the fund with the second highest bid amount is transferred to the domain name owner, and the domain name is transferred to the winner from the domain name owner; otherwise, stopping running; when the bidder fails to uncover the bid, the bidder is penalized by deducting part of the funds; when the bidder is a miss bid, the system is inoperative.
All fund operations on the blockchain of the invention are account-based, and the funds in the system are anonymous; the auction function for the domain name is realized, and the domain name owner can obtain corresponding funds once the domain name is transferred to the winner, and vice versa; the bidding probability of the auction is irrelevant to the bidding time, namely bidders bidding later are not more advantageous than bidders bidding first out; no one can infer from the auction process how much funds a bidder has in the blockchain system, but one can verify during the auction whether the bidder has sufficient funds to bid on.
Drawings
FIG. 1 is a system model diagram of an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and technical effects of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings.
The invention constructs an account-based blockchain system which supports intelligent contracts, funds in the system are anonymous, and a consensus mechanism is not limited to PoW any more, but can be realized through a alliance chain. Meanwhile, an account-based alliance chain is combined with anonymous fund, an intelligent contract, zero-knowledge proof and a ring signature, so that a block chain-based sealed bidding domain name auction method is provided, and transaction fairness, bidding fairness, fund guarantee and fund privacy are realized.
The block chain system comprises: the system comprises an account structure module, a transaction propagation module and a transaction packaging module.
The account structure module is provided with:
account ID: the public key of the user or the hash function of the public key;
fund fand: the amount of funds the address has, recorded in anonymous form;
domain name list name: storing the domain name owned by the account.
The transaction structure module has the following data messages:
transaction source: an account ID of the transaction initiator;
transaction amount: a numerical value expressed in anonymous or clear form;
the transaction is going to: an account ID of the transaction recipient;
signature: the initiator needs to sign the whole message by using a private key of the initiator;
zero knowledge proves that: the transaction initiator's zero knowledge demonstrates that the account amount is greater than the transaction amount.
The zero knowledge proof is specifically: the invention uses proof of zero knowledge about the inequality between two positive integers, assuming
Figure BDA0002953759880000041
Where g and h are as defined in the Pedersen commitment and l is a large integer greater than all possible funds in the system. Knowing x1、r1And
Figure BDA0002953759880000042
certifying that
Figure BDA0002953759880000043
The whole process comprises the following two parts.
In the first part, given c,
Figure BDA0002953759880000044
and
Figure BDA0002953759880000045
the prover corresponds to the public key by providing
Figure BDA0002953759880000046
To prove
Figure BDA0002953759880000047
If it is not
Figure BDA0002953759880000048
The prover knows
Figure BDA0002953759880000049
Figure BDA00029537598800000410
Otherwise the prover is unknown because loghg is agnostic to anyone.
In the second part, the prover proves that all aiAnd biAll belong to {0, 1 }. With aiFor example, the prover only needs to provideIs prepared from (h, c'2i) And
Figure BDA00029537598800000411
a ring signature for a public key.
The ring signature scheme allows a verifier to check the validity of a signature without exposing a public key corresponding to a true signature key. If a isiLog is known to the prover as 0hc′2i=r′2i(ii) a If a isiWhen 1, the verifier knows
Figure BDA00029537598800000412
For other cases, because loghg is agnostic to anyone, so the prover does not know loghc′2iOr
Figure BDA00029537598800000413
Finally, the verifier can check ai∈{0,1}。
The Pedersen commitment is a cryptology commitment which is widely used at present, and the construction of the Pedersen commitment is divided into 3 stages:
an initialization stage: selecting multiplicative groups G, G and h of order large prime q as two generators within the cyclic group, the public tuple (G, h, q);
committed stage camm: the committer selects a random number r as a blind factor and calculates a committed value comm ═ g for the message mmhrmod q, then send comm to the recipient;
opening phase open: the committer sends (m, r) to the receiver, which verifies if camm equals gmhrmod q, accept if equal, otherwise deny commitment.
The transaction propagation module is specifically as follows: the transaction initiator submits the transaction to the consensus nodes, each consensus node immediately verifies the validity of the transaction after receiving the transaction, the validity comprises the validity of zero knowledge proof and the validity of the digital signature, if the consensus nodes are valid, the consensus nodes store a copy and transmit the copy to all neighbor nodes, and meanwhile, the amount of the corresponding account is updated.
The transaction packaging module is used for finally containing the valid transaction in a transaction block and permanently recording the transaction in the block chain.
As shown in fig. 1, the system model of the embodiment of the present invention can obtain a block chain-based auction method for sealed bid domain names, which specifically includes the following steps:
first phase, creating an auction:
after deploying the smart contract, the domain owner calls the function Create (T)1,T2Name, delta) creates an auction, where T1、T2Two time points, T, specified for the system1Indicates the deadline of the bid, T2Indicating a de-branding deadline; name refers to the domain name that the domain owner is about to auction for; δ is the signature of the account owner owning the domain name on the smart contract using its public key. When a consensus node in the blockchain system receives the function call, the consensus node checks (T)1,T2Name, delta), and whether an auction contract corresponding to the name is set in the blockchain. If the check is passed, the consensus node continues to run the Create function; otherwise, the consensus node will stop running the function. Then, the bidder bid is used]The array records information related to the bidders, including public keys pk corresponding to certain accounts of the bidders, and commitment commit of the bidders to the bid amount, wherein m and r correspond to data used for uncovering the bids by the bidders. The state of the intelligent contract comprises: an active state and an off state.
And in the second stage, submitting bids:
when a bidder discovers an auction contract for a certain domain name on a blockchain, the bidder may call a function
Figure BDA0002953759880000051
To participate in the bidding. Where pk is a public key corresponding to a certain account of the bidder;
Figure BDA0002953759880000061
representing bids
Figure BDA0002953759880000062
The commitment of (a); σ is the signature of the smart contract using pk; ZKP is to
Figure BDA0002953759880000063
Wherein c refers to the balance in the account corresponding to pk;
when the consensus node receives the call of the Commit function, the consensus node checks whether the array bidider [ ] does not contain pk, whether the time T of calling the function is within the validity period, and the validity of (σ, ZKP). If the check is passed, the consensus node continues to run the Commit function; otherwise, the consensus node will stop running the function.
And a third stage, revealing a bid:
when T is1After the time for bidding expires, the bidding phase is stopped and each bidder can call a function
Figure BDA0002953759880000064
Uncovering the bid, wherein pk is the same public key used by the bidder when invoking the Commit function,
Figure BDA0002953759880000065
for opening commitments
Figure BDA0002953759880000066
When the consensus node receives a call to the recent function, the consensus node checks whether the time T of the call is within the validity period, in the number of sets of bidider 2]Whether there is a commitment corresponding to pk in
Figure BDA0002953759880000067
And
Figure BDA0002953759880000068
whether the commitment can be opened. If the check is passed, the consensus node runs the function of the Reveal function; otherwise, the consensus node will stop running the Reveal function.
The fourth stage, the auction ends:
after the third stage, anyone canCan be according to the array bidider [, [ 2 ]]The record in (1) judges who is the winning bid, under the condition, the winning bid will call the Finailize function, and when the consensus node receives the function call, the consensus node receives the function call according to the T2And (4) uncovering the deadline, checking whether the time for completing the auction is up, and checking whether the current intelligent contract is in a running state. If the check is passed, the consensus node continues to run the Finailize function; otherwise, the operation will be stopped.
Wherein, different processing methods are proposed according to three states of bidders: the first is the case where a bidder is unable to uncover the bid in the third stage, the bidder will be penalized by deducting some of the funds. The second is for the case of the winning bidder, where funds with the second highest bid amount will be transferred to the domain owner, from which the domain name is transferred to the winning bidder. The last case corresponds to a person following the agreement but not winning the bid, in which case we do nothing.
And finally, closing the intelligent contract.

Claims (5)

1. The block chain-based sealed bidding domain name auction method is characterized by comprising the following steps of:
the method comprises the following steps that firstly, in a block chain, a domain name owner creates a domain name auction contract, a consensus mechanism is adopted to carry out validity check on the domain name auction contract, and information of bidders is recorded;
the second stage, when the bidder finds out the domain name auction contract existing on the block chain, the bidder calls and verifies the commitment, and participates in bidding after the verification is passed;
in the third stage, after the bidding time is cut off, each bidder finishes uncovering after passing the check of the consensus mechanism;
and fourthly, after the bidding is uncovered, anyone can view the bidding records, bidders complete bidding according to respective states, and the auction is ended.
2. The block chain based sealed bid domain name auction method of claim 1, wherein the domain name owner calls the function Create (T)1,T2Name, delta) to Create a domain name auction contract, the function Create (T)1,T2T in name, delta)1Indicates the deadline of the bid, T2Indicating an unmarked deadline, name referring to a domain name to be auctioned by a domain name owner, and delta being a signature of an account owner owning the domain name on the intelligent contract by using a public key of the account owner;
the adoption of the consensus mechanism to carry out validity check on the domain name auction contract specifically comprises the following steps: consensus node checks (T) when a consensus node in a blockchain receives a Create function call1,T2Name, delta), and whether an auction contract corresponding to the name is set in the block chain, when the check is passed, the consensus node continues to run the Create function, otherwise, the consensus node stops running the function;
and recording information related to the bidder by adopting a bidder [ ] array, wherein the information comprises a public key corresponding to a certain account of the bidder, the commitment of the bidder to the bid amount and data used for uncovering the bid by the bidder.
3. The method of block chain based sealed bid domain auction of claim 2, characterized in that bidders call the commitment function
Figure FDA0002953759870000011
To participate in bidding, wherein pk is a public key corresponding to a certain account of a bidder;
Figure FDA0002953759870000012
representing bids
Figure FDA0002953759870000013
The commitment of (a); σ is the signature of the smart contract using pk; ZKP is to
Figure FDA0002953759870000014
Wherein c refers to the balance in the account corresponding to pk;
when the consensus node in the block chain receives the call of the Commit function, the consensus node checks whether the array bidider [ ] does not contain pk, whether the time T for calling the function is in the validity period, and the validity of (sigma, ZKP), and when the check is passed, the consensus node continues to run the Commit function; otherwise, the consensus node will stop running the function.
4. The method for sealed bid domain name auction based on block chain according to claim 2, characterized by the third stage being specifically: when the bidding time is over, the bidding phase is stopped and each bidder calls the unmasking function
Figure FDA0002953759870000021
Uncovering the bid, wherein pk is the same public key used by the bidder when invoking the Commit function,
Figure FDA0002953759870000022
for opening commitments
Figure FDA0002953759870000023
When the consensus node receives a call to the recent function, the consensus node checks whether the time T of the call is within the validity period, in the number of sets of bidider 2]Whether there is a commitment corresponding to pk in
Figure FDA0002953759870000024
And
Figure FDA0002953759870000025
if the promise can be opened, when the check is passed, the consensus node will run the function of the Reveal function; otherwise, the consensus node will stop running the Reveal function.
5. The block chain-based sealed bid domain name auction method of claim 2, wherein the fourth stage is specifically: after the bidding is uncovered, anyone can judge who is the winner according to the record in the array bid [ ], the winner calls a Finailize function, when the consensus node receives the function call, the consensus node checks whether the auction completion time is up or not according to the deadline of the uncovering, and checks whether the current intelligent contract is in a running state or not, when the check is passed, the consensus node continues to run the Finailize function, the fund with the second highest bid amount is transferred to the domain name owner, and the domain name is transferred to the winner from the domain name owner; otherwise, stopping running; when the bidder fails to uncover the bid, the bidder is penalized by deducting part of the funds; when the bidder is a miss bid, the system is inoperative.
CN202110222627.1A 2021-02-26 2021-02-26 Block chain-based sealed bidding domain name auction method Pending CN112950338A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110222627.1A CN112950338A (en) 2021-02-26 2021-02-26 Block chain-based sealed bidding domain name auction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110222627.1A CN112950338A (en) 2021-02-26 2021-02-26 Block chain-based sealed bidding domain name auction method

Publications (1)

Publication Number Publication Date
CN112950338A true CN112950338A (en) 2021-06-11

Family

ID=76246794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110222627.1A Pending CN112950338A (en) 2021-02-26 2021-02-26 Block chain-based sealed bidding domain name auction method

Country Status (1)

Country Link
CN (1) CN112950338A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115034867A (en) * 2022-06-15 2022-09-09 上海交通大学 Block chain sealing bid auction and fraud prevention method applied to edge computing system
CN115603900A (en) * 2022-08-24 2023-01-13 深圳市领存技术有限公司(Cn) Fair bidding method, device and storage medium based on cryptology commitment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109447791A (en) * 2018-11-09 2019-03-08 北京邮电大学 A kind of funds transaction method and device based on block chain
CN109903159A (en) * 2019-01-31 2019-06-18 中国互联网络信息中心 Domain name method of commerce and device based on block chain
KR20190109914A (en) * 2018-03-19 2019-09-27 상명대학교 천안산학협력단 System and method for trading power based on blockchain smart contract
US20200136815A1 (en) * 2017-06-19 2020-04-30 nChain Holdings Limited Computer-implemented system and method for time release encryption over a blockchain network
CN111090697A (en) * 2019-11-13 2020-05-01 中国地质大学(北京) Ticket system based on alliance chain
CN111612600A (en) * 2020-05-29 2020-09-01 深圳市网心科技有限公司 Block chain auction method, equipment, storage medium and block chain system
CN111639924A (en) * 2020-05-29 2020-09-08 上海旺链信息科技有限公司 Artwork auction method and system based on block chain
CN111769945A (en) * 2019-06-28 2020-10-13 北京沃东天骏信息技术有限公司 Auction processing method based on block chain and block chain link point

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200136815A1 (en) * 2017-06-19 2020-04-30 nChain Holdings Limited Computer-implemented system and method for time release encryption over a blockchain network
KR20190109914A (en) * 2018-03-19 2019-09-27 상명대학교 천안산학협력단 System and method for trading power based on blockchain smart contract
CN109447791A (en) * 2018-11-09 2019-03-08 北京邮电大学 A kind of funds transaction method and device based on block chain
CN109903159A (en) * 2019-01-31 2019-06-18 中国互联网络信息中心 Domain name method of commerce and device based on block chain
CN111769945A (en) * 2019-06-28 2020-10-13 北京沃东天骏信息技术有限公司 Auction processing method based on block chain and block chain link point
CN111090697A (en) * 2019-11-13 2020-05-01 中国地质大学(北京) Ticket system based on alliance chain
CN111612600A (en) * 2020-05-29 2020-09-01 深圳市网心科技有限公司 Block chain auction method, equipment, storage medium and block chain system
CN111639924A (en) * 2020-05-29 2020-09-08 上海旺链信息科技有限公司 Artwork auction method and system based on block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WANG X: "ConsortiumDNS: a distributed domain name service based on consortium chain", 《HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS》, pages 617 - 620 *
余瑞成: "基于安全比较协议的区块链密封式拍卖方案研究", 《中国优秀硕士学位论文全文数据库 信息科技辑 (月刊) 》, vol. 2019, no. 8, pages 14 - 36 *
朱岩等: "基于安全多方计算的区块链智能合约执行***", 《密码学报》, vol. 6, no. 2, pages 246 - 256 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115034867A (en) * 2022-06-15 2022-09-09 上海交通大学 Block chain sealing bid auction and fraud prevention method applied to edge computing system
CN115603900A (en) * 2022-08-24 2023-01-13 深圳市领存技术有限公司(Cn) Fair bidding method, device and storage medium based on cryptology commitment

Similar Documents

Publication Publication Date Title
US11388152B2 (en) Manicoding for communication verification
Wang et al. A blockchain based privacy-preserving incentive mechanism in crowdsensing applications
Ruffing et al. Coinshuffle: Practical decentralized coin mixing for bitcoin
CN109246211B (en) Resource uploading and resource requesting method in block chain
US8010782B2 (en) Method and system for mediated secure computation
WO2020133326A1 (en) Blockchain generation method and system, and computer storage medium and electronic device
TW201928743A (en) System and method for authenticating off-chain data based on proof verification
Chadha et al. Inductive methods and contract-signing protocols
CN112950338A (en) Block chain-based sealed bidding domain name auction method
Dreier et al. Formal verification of e-auction protocols
Sun et al. Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets
CN115633035B (en) Improved PBFT (physical layer transmission) based block chain consensus algorithm for Internet of things
CN111656731A (en) System and method for encryption selection mechanism
CN111260348B (en) Fair payment system based on intelligent contract in Internet of vehicles and working method thereof
Seike et al. Blockchain-based ubiquitous code ownership management system without hierarchical structure
AU2021105670A4 (en) A Blockchain-Based Method For Domain Name Auction By Means Of Sealed-Bid
Wu et al. Privacy-preserving voluntary-tallying leader election for internet of things
CN116546499B (en) Mobile terminal identity authentication method based on lightweight Bayesian fault tolerance
CN116821952A (en) Privacy data calculation traceability system and method based on block chain consensus mechanism
Wu et al. Blockchain consensus mechanism for distributed energy transactions
CN112995356B (en) Domain name resolution service system and method based on block chain
Rotem et al. Non-malleable vector commitments via local equivocability
Anceaume et al. Extending signatures of reputation
Lu et al. A domain name management system based on account-based consortium blockchain
Vyshegorodtsev et al. Reputation scoring system using an economic trust model: a distributed approach to evaluate trusted third parties on the internet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination