WO2021042685A1 - 一种区块链的交易方法、装置及*** - Google Patents
一种区块链的交易方法、装置及*** Download PDFInfo
- Publication number
- WO2021042685A1 WO2021042685A1 PCT/CN2020/077637 CN2020077637W WO2021042685A1 WO 2021042685 A1 WO2021042685 A1 WO 2021042685A1 CN 2020077637 W CN2020077637 W CN 2020077637W WO 2021042685 A1 WO2021042685 A1 WO 2021042685A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target
- transaction
- public key
- sender
- receiver
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Definitions
- this application provides a blockchain transaction method, device, and system to realize the concealment of the sender, receiver, and actual transaction amount in the blockchain transaction process to achieve privacy in the transaction process Protection, the specific plan is as follows:
- a blockchain transaction method including:
- the sender uses a preset second encryption method to hide the actual amount of the transaction, including:
- the sender sends the signature, the recipient’s target public key, the hidden actual transaction amount, the target range, and the encrypted blind factor as transaction content to the target blockchain, with For the recipient to verify the validity of the transaction content, and when the verification is passed, record the transaction content on the ledger of the target blockchain;
- the target private key generating unit is configured to generate a target private key corresponding to the target public key according to the master private key.
- the signature verification unit is configured to generate a signature according to the target private key, and verify the ownership of the transaction output according to the signature;
- the encryption unit is used to encrypt the blind factor according to the recipient's target public key when the proof is passed.
- a blockchain transaction system including regulators, senders and receivers, among them:
- the receiver is used to receive the encrypted actual transaction amount, and decrypt the encrypted actual transaction amount to obtain the actual transaction amount.
- FIG. 4 is a flowchart of another method of a blockchain transaction method disclosed in an embodiment of the application.
- Fig. 5 is a block diagram of a block chain transaction device disclosed in an embodiment of the application.
- the supervisory authority is configured to generate the master public key and the master private key, the public key and the private key, and obtain the identity information of the sender and the receiver, according to the public key pair The identity information is hidden;
- the regulatory agency needs to generate two pairs of public and private keys, one is the master public key MPK and the master private key MSK; the other is the public key PPK and the private key PSK. Then the users in the system apply to the regulatory agency for key distribution through identity information, where the users include senders and receivers, and the identity information can be ID, e-mail, ID number, etc. Take ID as an example. Description. After the regulatory agency authenticates and encrypts the user's ID information, it first uses the probabilistic encryption public key PPK to encrypt the user's ID information, and generates the target public key UPK for the encrypted user.
- the IBC cryptographic mechanism is used to generate the corresponding target private key USK according to the target public key UPK of the encrypted user, that is, UPK and USK are respectively used as the target public key and private target key of the encrypted user.
- the ID can be effectively hidden, and the user’s identity information can be protected.
- the same ID can generate an unlimited number of the target public key UPK, and the target public key UPK cannot be mutually exclusive. Differentiate, can effectively realize the privacy protection of the user's identity.
- the generation of the master public key MPK and the master private key MSK by identity-based cryptography (IBC) is taken as an example for description.
- the generation process is as follows:
- KGC Key Generation Center
- KGC Key Generation Center
- the public key and the private key are generated based on a probabilistic public key cryptosystem as an example.
- Probabilistic public key encryption is a non-deterministic cipher.
- the ciphertext generated from the same plaintext changes randomly. Under the assumption of computational security, it is impossible to obtain any valid information of the plaintext through ciphertext-related attacks in polynomial time.
- the Blum-Goldwasser scheme is mainly used to encrypt the user's identity information. The detailed algorithm process is as follows:
- the recipient performs verification based on the UPK in the transaction content and the target public key UPK of the recipient. When the two are the same, it can confirm that the received transaction content is correct, and then use the transaction content.
- the recipient's target private key USK decrypts X, and obtains the actual transaction amount received.
- a block chain transaction method is also provided.
- the execution flow of the transaction method is shown in FIG. 3 and includes the steps:
- the regulatory agency uses the preset first encryption method to hide the identity information of the sender and receiver;
- the master public key and the master private key in order to ensure that the identity information of the sender and the receiver is hidden during the transaction, the master public key and the master private key, the public key and the private key can be obtained Encrypt the identity information of the sender and the receiver according to the public key to generate a target public key, and generate a target private key corresponding to the target public key according to the master private key.
- the sender when the sender and the receiver conduct a transaction based on the target blockchain, the sender generates a signature according to the target private key, and performs ownership of the transaction output according to the signature.
- Verification is mainly to verify whether the output of the previous transaction process can be used as the input of this transaction process.
- a zero-knowledge proof is adopted for the range of the actual transaction amount to obtain the target range.
- the actual transaction amount and the blind factor are compared with the target public key of the recipient. Encryption, on the contrary, when the proof fails, it means that the actual transaction amount is abnormal, and you can choose to abandon the transaction.
- the recipient performs verification based on the UPK in the transaction content and the target public key UPK of the recipient. When the two are the same, it can confirm that the received transaction content is correct, and then use the transaction content.
- the recipient's target private key USK decrypts X, and obtains the actual transaction amount received.
- This application discloses a blockchain transaction method, including: a regulatory agency adopts a preset first encryption method to hide the identity information of the sender and the receiver; when the sender and the receiver are based on the target area
- the sender uses a preset second encryption method to hide the actual amount of the transaction; the sender sends the hidden actual transaction amount to the receiver.
- the sender, the receiver, and the actual transaction amount are hidden, which realizes the protection of privacy in the blockchain transaction process.
- the target blockchain is used to process the current transaction of the sender and the receiver.
- the verification process for the validity of the transaction content is as follows: unlock the UXTO account model transaction output for the signature, and verify the target public key of the recipient in the transaction content and the recipient If the target public key of the target public key is the same, verify whether the target range is within a preset threshold range, where the preset threshold range can be set according to empirical values or actual conditions.
- the specific range of the set threshold range is not limited.
- the recipient when the verification is passed, the recipient receives the encrypted actual amount of the target blockchain transaction content, uses the recipient's target private key USK to decrypt the encrypted actual amount, and obtains all State the actual transaction amount.
- an embodiment of the present application provides a blockchain transaction device.
- the structural block diagram of the transaction device is shown in FIG. 5 and includes:
- the first hiding module 301 The first hiding module 301, the second hiding module 302, and the sending module 303.
- the first hiding module 301 is configured to use a preset first encryption method to hide the identity information of the sender and receiver;
- the second hiding module 302 is configured to use a preset second encryption method to hide the actual amount of the transaction when the sender and the receiver conduct a transaction based on the target blockchain;
- the sending module 303 is used to send the hidden transaction amount to the recipient.
- the acquisition unit 304 the target public key generation unit 305, and the target private key generation unit 306.
- the target public key generating unit 305 is configured to encrypt the identity information of the sender and the receiver according to the public key to generate a target public key; and use the target public key to compare the identity of the sender and the receiver Information hiding;
- the target private key generating unit 306 is configured to generate a target private key corresponding to the target public key according to the master private key.
- the second hiding module 302 includes:
- the signature verification unit 307 the hiding unit 308, the realization unit 309, and the encryption unit 310.
- the signature verification unit 307 is configured to generate a signature according to the target private key, and verify the ownership of the transaction output according to the signature;
- the encryption unit 310 is configured to encrypt the actual transaction amount and the blind factor according to the target public key of the recipient when the proof is passed.
- the sending module 303 includes:
- the sending unit 311 is configured to send the signature, the recipient's target public key, the hidden actual transaction amount, the target range, and the encrypted blind factor to the target area as transaction content A block chain for the recipient to verify the validity of the transaction content, and when the verification is passed, the transaction content is recorded on the ledger of the target blockchain;
- the sending unit 311 is further configured to send the encrypted actual transaction amount in the ledger of the target blockchain to the recipient.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims (10)
- 一种区块链的交易方法,包括:监管机构采用预设的第一加密方法对发送者和接收者的身份信息进行隐藏;当所述发送者和所述接收者基于目标区块链进行交易时,所述发送者采用预设的第二加密方法对交易的实际金额进行隐藏;所述发送者将隐藏后的实际交易金额发送给所述接收者。
- 根据权利要求1所述的方法,其中,监管机构采用预设的第一加密方法对发送者和接收者的身份信息进行隐藏,包括:监管机构获取主公钥和主私钥、公钥和私钥;依据所述公钥加密所述发送者和所述接收者的身份信息,生成目标公钥;利用所述目标公钥对发送者和接收者的身份信息进行隐藏。
- 根据权利要求2所述的方法,其中,所述发送者采用预设的第二加密方法对交易的实际交易金额进行隐藏,包括:所述发送者依据所述主私钥生成与所述目标公钥对应的目标私钥;依据所述目标私钥生成签名,依据所述签名对交易输出的所有权进行验证;当验证通过时,采用预设的公式P=xG+rH对所述实际交易金额进行隐藏,其中:G和H为椭圆曲线中密码中的基点,r为盲因子,x为实际交易金额,P为隐藏后的实际交易金额;对所述实际交易金额的范围采用零知识证明,得到目标范围;当证明通过时,依据所述接收者的目标公钥对所述盲因子进行加密。
- 根据权利要求3所述的方法,其中,所述发送者将隐藏后的实际交易金额发送给所述接收者,包括:所述发送者将所述签名、所述接收者的目标公钥、所述隐藏后的实际交易金额、所述目标范围、加密后的盲因子作为交易内容发送给所述目标 区块链,以供所述接收者对所述交易内容的有效性进行验证,当验证通过时,将所述交易内容记录在所述目标区块链的账本上;将所述目标区块链的账本中隐藏后的实际交易金额发送给所述接收者。
- 一种区块链的交易装置,包括:第一隐藏模块,用于采用预设的第一加密方法对发送者和接收者的身份信息进行隐藏;第二隐藏模块,用于当所述发送者和所述接收者基于目标区块链进行交易时,采用预设的第二加密方法对交易的实际金额进行隐藏;发送模块,用于将隐藏后的交易金额发送给所述接收者。
- 根据权利要求5所述的装置,其中,所述第一隐藏模块包括:获取单元,用于获取主公钥和主私钥、公钥和私钥;目标公钥生成单元,用于依据所述公钥加密所述发送者和所述接收者的身份信息,生成目标公钥;并利用所述目标公钥对发送者和接收者的身份信息进行隐藏;目标私钥生成单元,用于依据所述主私钥生成与所述目标公钥对应的目标私钥。
- 根据权利要求6所述的装置,其中,所述第二隐藏模块包括:签名验证单元,用于依据所述目标私钥生成签名,依据所述签名对交易输出的所有权进行验证;隐藏单元,用于当验证通过时,采用预设的公式P=xG+rH对所述实际交易金额进行隐藏,其中:G和H为椭圆曲线中密码中的基点,r为盲因子,x为实际交易金额,P为交易金额;实现单元,用于对所述实际交易金额的范围采用零知识证明,得到目标范围;加密单元,用于当证明通过时,依据所述接收者的目标公钥对所述盲因子进行加密。
- 根据权利要求7所述的装置,其中,所述发送模块包括:发送单元,用于将所述签名、所述接收者的目标公钥、所述隐藏后的实际交易金额、所述目标范围、加密后的盲因子作为交易内容发送给所述目标区块链,以供所述接收者对所述交易内容的有效性进行验证,当验证通过时,将所述交易内容记录在所述目标区块链的账本上;还用于将所述目标区块链的账本中隐藏后的实际交易金额发送给所述接收者。
- 一种区块链的交易***,包括,监管机构,发送者和接收者,其中:所述监管机构,用于生成所述公钥和所述主私钥、所述公钥和所述私钥,并获取所述发送者和所述接收者身份信息,依据所述公钥对所述身份信息进行隐藏;所述发送者,用于依据所述主私钥对交易过程中的实际交易金额进行加密后发送给所述接收者;所述接收者,用于接收加密后的实际交易金额,并对所述加密后的实际交易金额进行解密,得到实际交易金额。
- 根据权利要求9所述的***,其中,所述监管机构还用于对交易过程中的所述交易者、所述接收者和所述实际交易金额进行监管。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910837063.5A CN110545279A (zh) | 2019-09-05 | 2019-09-05 | 兼具隐私和监管功能的区块链交易方法、装置及*** |
CN201910837063.5 | 2019-09-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021042685A1 true WO2021042685A1 (zh) | 2021-03-11 |
Family
ID=68712600
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/077637 WO2021042685A1 (zh) | 2019-09-05 | 2020-03-03 | 一种区块链的交易方法、装置及*** |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110545279A (zh) |
WO (1) | WO2021042685A1 (zh) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110545279A (zh) * | 2019-09-05 | 2019-12-06 | 国网区块链科技(北京)有限公司 | 兼具隐私和监管功能的区块链交易方法、装置及*** |
CN111224961A (zh) * | 2019-12-30 | 2020-06-02 | 航天信息股份有限公司 | 一种基于标识密码的更新区块链的方法及*** |
CN111160908B (zh) * | 2019-12-31 | 2023-11-17 | 深圳市迅雷网络技术有限公司 | 基于区块链的供应链交易隐私保护***、方法及相关设备 |
WO2021134473A1 (zh) * | 2019-12-31 | 2021-07-08 | 深圳市网心科技有限公司 | 一种区块链信息监管方法、***、装置及计算机存储介质 |
CN111161075B (zh) * | 2019-12-31 | 2024-04-05 | 深圳市迅雷网络技术有限公司 | 区块链交易数据证明监管方法、***及相关设备 |
CN111311265B (zh) * | 2020-02-13 | 2023-07-25 | 布比(北京)网络技术有限公司 | 区块链私密交易证明方法、装置、计算机设备和存储介质 |
CN111340488B (zh) * | 2020-02-21 | 2023-11-14 | 数据通信科学技术研究所 | 一种可监管的密态交易金额的生成方法和装置 |
CN111709738B (zh) * | 2020-05-18 | 2023-08-01 | 杜晓楠 | 区块链***中隐藏交易金额的方法、计算机可读存储介质和区块链*** |
CN112288434B (zh) * | 2020-11-20 | 2023-07-25 | 网易(杭州)网络有限公司 | 隐私交易方法、装置、零知识证明***和隐私交易架构模型 |
CN112418857B (zh) * | 2020-11-30 | 2023-06-30 | 北京八分量信息科技有限公司 | 基于utxo模型的隐藏交易方法、装置及相关产品 |
CN112953888B (zh) * | 2020-12-29 | 2023-10-31 | 合肥达朴汇联科技有限公司 | 应用于区块链客户端的区块链匿名用户审计方法、*** |
CN112819467A (zh) * | 2021-02-23 | 2021-05-18 | 中国信息通信研究院 | 一种隐私交易方法、装置及*** |
CN114092242A (zh) * | 2021-11-03 | 2022-02-25 | 支付宝(杭州)信息技术有限公司 | 基于范围证明实现隐私交易的方法和*** |
CN114580029A (zh) * | 2022-04-28 | 2022-06-03 | 浙江甲骨文超级码科技股份有限公司 | 一种区块链数字资产隐私保护方法、装置、设备及存储介质 |
CN117499159B (zh) * | 2023-12-27 | 2024-03-26 | 杭州字节方舟科技有限公司 | 一种基于区块链的数据交易方法、装置及电子设备 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549749A (zh) * | 2016-12-06 | 2017-03-29 | 杭州趣链科技有限公司 | 一种基于加法同态加密的区块链隐私保护方法 |
CN106790253A (zh) * | 2017-01-25 | 2017-05-31 | 中钞***产业发展有限公司北京智能卡技术研究院 | 基于区块链的认证方法和装置 |
CN108764874A (zh) * | 2018-05-17 | 2018-11-06 | 深圳前海微众银行股份有限公司 | 基于区块链的匿名转账方法、***及存储介质 |
WO2019072300A2 (en) * | 2018-12-21 | 2019-04-18 | Alibaba Group Holding Limited | BLOCK CHAIN DATA PROTECTION BASED ON A GENERIC ACCOUNT MODEL AND A HOMOMORPHIC ENCRYPTION |
CN110089069A (zh) * | 2018-11-27 | 2019-08-02 | 阿里巴巴集团控股有限公司 | 用于信息保护的***和方法 |
CN110545279A (zh) * | 2019-09-05 | 2019-12-06 | 国网区块链科技(北京)有限公司 | 兼具隐私和监管功能的区块链交易方法、装置及*** |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2703719C (en) * | 2007-10-26 | 2014-07-08 | Telcordia Technologies, Inc. | Method and system for secure session establishment using identity-based encryption (vdtls) |
CN106296138A (zh) * | 2016-08-09 | 2017-01-04 | 西安电子科技大学 | 基于部分盲签名技术的比特币支付***及其方法 |
CN107147720B (zh) * | 2017-05-16 | 2018-07-03 | 安徽大学 | 一种云存储数据共享中可追踪的有效公开审计方法和*** |
EP3866382B1 (en) * | 2018-11-27 | 2023-06-21 | Advanced New Technologies Co., Ltd. | System and method for information protection |
-
2019
- 2019-09-05 CN CN201910837063.5A patent/CN110545279A/zh active Pending
-
2020
- 2020-03-03 WO PCT/CN2020/077637 patent/WO2021042685A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549749A (zh) * | 2016-12-06 | 2017-03-29 | 杭州趣链科技有限公司 | 一种基于加法同态加密的区块链隐私保护方法 |
CN106790253A (zh) * | 2017-01-25 | 2017-05-31 | 中钞***产业发展有限公司北京智能卡技术研究院 | 基于区块链的认证方法和装置 |
CN108764874A (zh) * | 2018-05-17 | 2018-11-06 | 深圳前海微众银行股份有限公司 | 基于区块链的匿名转账方法、***及存储介质 |
CN110089069A (zh) * | 2018-11-27 | 2019-08-02 | 阿里巴巴集团控股有限公司 | 用于信息保护的***和方法 |
WO2019072300A2 (en) * | 2018-12-21 | 2019-04-18 | Alibaba Group Holding Limited | BLOCK CHAIN DATA PROTECTION BASED ON A GENERIC ACCOUNT MODEL AND A HOMOMORPHIC ENCRYPTION |
CN110545279A (zh) * | 2019-09-05 | 2019-12-06 | 国网区块链科技(北京)有限公司 | 兼具隐私和监管功能的区块链交易方法、装置及*** |
Also Published As
Publication number | Publication date |
---|---|
CN110545279A (zh) | 2019-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021042685A1 (zh) | 一种区块链的交易方法、装置及*** | |
CN107483212B (zh) | 一种双方协作生成数字签名的方法 | |
CN107733648B (zh) | 一种基于身份的rsa数字签名生成方法及*** | |
JP3560439B2 (ja) | 暗号キーの回復を実行する装置 | |
CN113364576B (zh) | 一种基于区块链的数据加密存证与共享方法 | |
CN110138567B (zh) | 一种基于ecdsa的协同签名方法 | |
CN112202544B (zh) | 一种基于Paillier同态加密算法的智能电网数据安全聚合方法 | |
CN111797427A (zh) | 一种兼顾隐私保护的区块链用户身份监管方法及*** | |
JP2002534701A (ja) | 寄託されない署名専用キーを用いた自動回復可能な自動可能暗号システム | |
EP4144040A1 (en) | Generating shared private keys | |
Tanwar et al. | Efficient and secure multiple digital signature to prevent forgery based on ECC | |
CN111355582A (zh) | 基于sm2算法的两方联合签名和解密的方法及*** | |
CN114726546A (zh) | 数字身份认证方法、装置、设备和存储介质 | |
Mu et al. | Secure two-party SM9 signing | |
CN113132104A (zh) | 一种主动安全的ecdsa数字签名两方生成方法 | |
Shankar et al. | Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward‐Curve Digital Signature Algorithm | |
Han | Generalization of signcryption for resources‐constrained environments | |
WO2023016729A1 (en) | Generating digital signature shares | |
Ahirwal et al. | Signcryption scheme that utilizes elliptic curve for both encryption and signature generation | |
Ebrahimi et al. | Enhancing cold wallet security with native multi-signature schemes in centralized exchanges | |
CN114066449A (zh) | 多中心协同监管的区块链用户身份匿名和追踪方法及*** | |
Omono et al. | Implicit Certificate Based Signcryption for a Secure Data Sharing in Clouds | |
CN110572257A (zh) | 基于身份的抗量子计算数据来源鉴别方法和*** | |
Anusree et al. | A security framework for brokerless publish subscribe system using identity based signcryption | |
Chen et al. | An efficient electronic cash scheme with multiple banks using group signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20861811 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20861811 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 05/08/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20861811 Country of ref document: EP Kind code of ref document: A1 |