L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment

A digital currency and verification method technology, applied in the field of information security, can solve problems such as ignoring the anti-counterfeiting value of digital currency, difficult to solve anti-counterfeiting problems, loss of asset ownership, etc., to avoid the problem of massive data downloading, high effectiveness, and less online interaction Effect

Active Publication Date: 2018-04-13
吕文华
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the user's private key is lost, the corresponding asset ownership will also be lost, so there is a security risk
[0008] Looking at the defects of blockchain anti-counterfeiting technology, the root of the problem is that the anti-counterfeiting value of the digital currency itself in the circulation link is ignored, and it is difficult to solve the anti-counterfeiting problem only through bookkeeping

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment
  • L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment
  • L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0109] refer to figure 1 , figure 1 A flow chart of an embodiment of an L algorithm-based digital currency anti-counterfeiting and verification method provided by the present invention is shown. The method includes: step one to step four.

[0110] Step 1. Split the anti-counterfeiting key corresponding to the digital currency public key stored in the trusted center into a stub key stored in the trusted center, a digital currency key stored in the digital currency, and a user key stored in a non-terminal.

[0111] Among them, the digital currency public key stored in the trusted center and its corresponding anti-counterfeiting key satisfy the following relationship:

[0112] [L 0 L 1 L 2 ] -1 G=P+G;

[0113] Among them, L 0 is the stub key; L 1 is the digital currency key; L 2 is the user key; P is the digital currency public key; G is the base point of the elliptic curve. All three keys must be calculated correctly in order to pass the public key verification and ac...

Embodiment 2

[0152] Embodiment 2 of the present invention provides a digital currency anti-counterfeiting and verification method based on the L algorithm. The method is described from the sending end side. The method includes:

[0153] Split the anti-counterfeiting key corresponding to the digital currency public key stored in the trusted center into a stub key stored in the trusted center, a digital currency key stored in the digital currency, and a user key stored in a non-terminal;

[0154] The sending end updates the digital currency key through the stored digital currency key, the sending end user key and the receiving end update parameters sent by the receiving end, and uses the receiving end encrypted public key sent by the receiving end to encrypt the plain text of the digital currency to generate a digital After the currency ciphertext is transferred offline to the receiving end; so that the receiving end can restore the plaintext of the digital currency with the encrypted private k...

Embodiment 3

[0161] Embodiment 3 of the present invention provides a digital currency anti-counterfeiting and verification method based on the L algorithm. The method is described on the receiving side, and the method includes:

[0162] Split the anti-counterfeiting key corresponding to the digital currency public key stored in the trusted center into a stub key stored in the trusted center, a digital currency key stored in the digital currency, and a user key stored in a non-terminal;

[0163] The receiving end uses the receiving end encrypted private key to restore the digital currency ciphertext sent by the sending end to the digital currency plaintext, and performs local banknote verification to verify the authenticity of the digital currency. If the verification fails, an error will be prompted and the process will be terminated; if the verification is successful, the receiving end will pass The once-updated digital currency key in the received digital currency, the receiving end updat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an L algorithm-based digital currency anti-counterfeiting and verification method and system and equipment. The method comprises the following steps of: splitting an anti-counterfeiting secret key corresponding to a digital currency public key stored by a credible center into a stub secret key stored in the credible center, a digital currency secret key stored in a digital currency and a nonterminal stored user secret key; carrying out primary updating on the digital currency secret key by a transmission end so as to generate a digital currency ciphertext, and offline circulating the digital currency ciphertext to a reception end; carrying out local counterfeit currency detection by the reception end so as to verify authenticity of the digital currency, and after theverification succeeds, carrying out secondary updating on the digital currency secret key and sending a first signature and currency number information to the credible center to carry out verification; and verifying state effectiveness by the credible center, if the verification succeeds, verifying a second signature, and if the verification succeeds, updating the digital currency secret key. According to the method and system and the equipment, safety risk of double blossoms is reduced, mass data downloading problems caused by book-entry anti-counterfeiting are avoided, the risk of managingdigital assets via user secret keys is reduced and the safety is high.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an L algorithm-based digital currency anti-counterfeiting and verification method, system and device. Background technique [0002] With the development of computer information technology, the research of digital currency has gradually become a current technology hotspot. Unlike banknotes, digital currency does not require paper media. It can be said to be a piece of digital information without media in essence. How to ensure that this piece of digital information can only be used by its current holders and cannot be misappropriated by others is the responsibility of digital currency. the primary problem faced. Compared with the digitization of photos and music, the digitization of currency is not simply to record patterns or words in digital form. Digital currency must consider currency anti-counterfeiting and transaction security. Therefore, the digitalization of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06F21/60H04L9/30H04L9/08
CPCG06F21/121G06F21/602H04L9/0877H04L9/30
Inventor 吕文华宛海加
Owner 吕文华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products