Privacy protection method and device based on blockchain smart contract

A smart contract, privacy protection technology, applied in the field of blockchain, to achieve the effect of fast proof and verification process

Pending Publication Date: 2020-06-12
BUBI BEIJING NETWORK TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, Mimble-wimble can be used to solve the blockchain privacy problem. Mimble-wimble provides a solution that significantly optimizes Bitcoin. Using Pedersen commitments, range proofs, and interactive communication can also achieve hidden addresses and transfer amounts. , but both parties need to be online at the same time and interact

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and device based on blockchain smart contract
  • Privacy protection method and device based on blockchain smart contract
  • Privacy protection method and device based on blockchain smart contract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] figure 1 It shows a schematic flowchart of the implementation of the privacy protection method based on the blockchain smart contract in Embodiment 1 of the present application.

[0039] As shown in the figure, the privacy protection method based on blockchain smart contract includes:

[0040] Step 101, the privacy module generates the public-private key pair E(r based on elliptic curve cryptography in advance) 发 , R发 ) and the public-private key pair E(r 收 , R 收 ) to convert asset exchange content; R 发 = r 发 *G,R 收 = r 收 *G, r 发 、r 收 Both are random numbers, and G is a base point on the elliptic curve;

[0041] Step 102, the sender uses the input certificate key S to sign the asset exchange content, and uses the encrypted asset exchange content to trigger the smart contract;

[0042] Step 103, the smart contract verifies the legality of the asset exchange content through the privacy module, and updates the account information of the sender and receiver;

[0...

Embodiment 2

[0071] Based on the same inventive concept, the embodiment of the present application provides a privacy protection device based on a blockchain smart contract. The principle of the device to solve technical problems is similar to a privacy protection method based on a blockchain smart contract. Let me repeat.

[0072] figure 2 A schematic structural diagram of a privacy protection device based on a blockchain smart contract in Embodiment 2 of the present application is shown.

[0073] As shown in the figure, the privacy protection device based on blockchain smart contract includes:

[0074] The privacy module is used for the public-private key pair E(r 发 , R 发 ) and the public-private key pair E(r 收 , R 收 ) to convert asset exchange content; R 发 = r 发 *G,R 收 = r 收 *G, r 发 、r 收 Both are random numbers, and G is a base point on the elliptic curve;

[0075] The sender module is used to sign the asset exchange content with the input credential key S, and use the encr...

Embodiment 3

[0097] Based on the same inventive concept, an embodiment of the present application further provides a computer storage medium, which will be described below.

[0098] The computer storage medium has a computer program stored thereon, and when the computer program is executed by the processor, the steps of the privacy protection method based on the blockchain smart contract as described in Embodiment 1 are implemented.

[0099] Using the computer storage medium provided in the embodiment of this application, according to the homomorphic nature of the ECC algorithm, it is implemented using simple cryptographic primitives, and can completely hide identity information and asset exchange content information. The asset transfer process does not require interaction between the two parties, proof and The verification process is fast and can be completed within milliseconds.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a privacy protection method and device based on a blockchain smart contract. The method comprises the steps that a privacy module converts asset exchange content according to apublic and private key pair based on elliptic curve cryptography and pre-generated by a sender and a public and private key pair based on elliptic curve cryptography and pre-generated by a receiver;the sender signs the asset exchange content by using the input voucher key, and triggers an intelligent contract by using the encrypted asset exchange content; the smart contract verifies the legalityof the asset exchange content through the privacy module, and updates the account information of the sender and the receiver; and the receiver decrypts and confirms that the received assets are correct through the privacy module. By adopting the scheme, the identity information and the asset exchange content information can be completely hidden, the asset transfer process does not need interaction between two parties, and the certification and verification processes are quick and can be completed within milliseconds.

Description

technical field [0001] The present application relates to blockchain technology, in particular, to a privacy protection method and device based on blockchain smart contracts. Background technique [0002] Blockchain is a decentralized and trustless distributed accounting technology, which can be applied to digital finance, Internet of Things, intelligent manufacturing, supply chain management and other industries to improve efficiency, reduce costs, and improve data security. However, due to its open and transparent nature, it also faces serious privacy leakage problems. Privacy in the blockchain mainly involves identity and transaction content, which may cause harm to users if leaked. [0003] Since blockchain transactions are publicly available and usually record all transactions in plain text, analysts can obtain the transfer track of funds by collecting all transactions related to a certain ID. Most blockchains do not provide anonymity. Function. [0004] At present, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/08
CPCH04L9/3066H04L9/3252H04L67/10H04L9/50
Inventor 蒋海旷凯商松赵正涌朱建国刘建章
Owner BUBI BEIJING NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products