Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Zero-knowledge proof data interaction method, node and equipment

A technology of zero-knowledge proof and data interaction, which is applied in the field of zero-knowledge proof data interaction methods, equipment, and nodes, and can solve problems such as personal privacy leakage

Active Publication Date: 2020-02-07
北京八分量信息科技有限公司
View PDF8 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Anyone who enters a wallet address can find out all the transaction details of this address (amount, quantity, time, where the money is received, and where it is transferred), resulting in personal privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero-knowledge proof data interaction method, node and equipment
  • Zero-knowledge proof data interaction method, node and equipment
  • Zero-knowledge proof data interaction method, node and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The implementation mode of the present invention is illustrated by specific specific examples below, and those who are familiar with this technology can easily understand other advantages and effects of the present invention from the contents disclosed in this description. Obviously, the described embodiments are a part of the present invention. , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0062] Please refer to figure 1 , figure 2 , image 3 , figure 1 Provide a trust challenge node flowchart of a zero-knowledge proof data interaction method for an embodiment of the present invention; figure 2 Provide a signature data verification flowchart of a zero-knowledge proof data interaction method for an embodiment of the present invention; image 3 An AIK certificate verification ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a zero-knowledge proof data interaction method, which is used for a trust challenge node and comprises the following steps of sending a zero-knowledge challenge request to a trust challenged node, wherein the challenge request comprises a random number and specified position data, so that the trusted challenged node signs the data of the specified positionby using a trusted platform module (TPM) of the trusted challenged node and the random number to obtain specified position signature data; receiving the specified position signature data sent by the trusted challenged node, and a measurement log ML and an AIK certificate recorded by the trusted platform module TPM; verifying whether the trust challenge node verifies that the specified position signature data and the measurement log ML recorded by the trusted platform module TPM are consistent with the AIK certificate or not; and according to the verification result, determining whether the trusted challenged node is trusted or not, so as to determine whether to transmit the (pk, vk) in the zero-knowledge verification application stored in the TEE security area to the trusted challenged node or not.

Description

technical field [0001] The embodiment of the present invention relates to the field of information security technology, and in particular to a zero-knowledge proof data interaction method, node, and device. Background technique [0002] Bitcoin does have a certain degree of anonymity, but the anonymity of Bitcoin is not impeccable. As we all know, due to the openness and traceability of the blockchain ledger, anyone can follow through the public information of the Bitcoin blockchain browser to find out all the Bitcoin accounts that have a relationship with it. Anyone who enters a wallet address can find out all the transaction details (amount, quantity, time, where the money is received from, and where it is transferred to) that occurred at this address, resulting in personal privacy disclosure. Anonymous currency makes it impossible for casual people not related to the transaction to spy on the specific information of the transaction: such as the size of the transaction am...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/3221H04L9/3239H04L9/3247H04L9/3268H04L9/0869H04L9/0877H04L63/0407H04L2209/127H04L9/50
Inventor 胡志琳阮安邦魏明刘斌陈凯钟梦婷马飞
Owner 北京八分量信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products