CN117474543A - Digital asset processing method based on block chain network and related equipment - Google Patents

Digital asset processing method based on block chain network and related equipment Download PDF

Info

Publication number
CN117474543A
CN117474543A CN202311437771.2A CN202311437771A CN117474543A CN 117474543 A CN117474543 A CN 117474543A CN 202311437771 A CN202311437771 A CN 202311437771A CN 117474543 A CN117474543 A CN 117474543A
Authority
CN
China
Prior art keywords
address
digital asset
private key
blockchain network
encrypted message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311437771.2A
Other languages
Chinese (zh)
Inventor
聂凯轩
梁军
王宗友
吴方
蔡庆普
时一防
朱耿良
刘区城
廖志勇
刘汉卿
黄杨峻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202311437771.2A priority Critical patent/CN117474543A/en
Publication of CN117474543A publication Critical patent/CN117474543A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The application discloses a digital asset processing method and related equipment based on a blockchain network, wherein the method comprises the following steps: the first device obtains an asset transfer request initiated by a first object, the asset transfer request being for indicating: transferring a target digital asset held by the first object in a blockchain network to a second object; negotiating a stealth address and a temporary private key for controlling the stealth address with a second device used by the second object in response to the asset transfer request; the invisible address refers to: an account address for hiding object information of the second object; transferring the target digital asset to the stealth address, causing the second object to obtain ownership of the target digital asset in the stealth address by the second device using the temporary private key. According to the method and the device, related information of the asset receiver can be hidden when the digital asset is transferred, and the confidentiality of the digital asset transfer is improved.

Description

Digital asset processing method based on block chain network and related equipment
Technical Field
The application relates to the technical field of Internet, in particular to the technical field of blockchain, and especially relates to a digital asset processing method based on a blockchain network and related equipment.
Background
With the continued development of blockchain technology, more and more objects (users) conduct transactions of digital assets in a blockchain network. Currently, when an object wants to transfer a digital asset that it holds in a blockchain network to another object, the object is to transfer the corresponding digital asset directly to another object's common account address that is disclosed in the blockchain network. Such a manner of transferring digital assets may expose information about the asset recipient (i.e., expose who the asset recipient is), resulting in a lower privacy of the digital asset transfer.
Disclosure of Invention
The embodiment of the application provides a digital asset processing method and related equipment based on a blockchain network, which can hide related information of an asset receiver when transferring digital assets and improve the privacy of digital asset transfer.
In one aspect, an embodiment of the present application provides a digital asset processing method based on a blockchain network, the method including:
the first device obtains an asset transfer request initiated by a first object, the asset transfer request being for indicating: transferring a target digital asset held by the first object in a blockchain network to a second object;
Negotiating a stealth address and a temporary private key for controlling the stealth address with a second device used by the second object in response to the asset transfer request; the invisible address refers to: an account address for hiding object information of the second object;
transferring the target digital asset to the stealth address, causing the second object to obtain ownership of the target digital asset in the stealth address by the second device using the temporary private key.
In another aspect, embodiments of the present application provide a digital asset processing device based on a blockchain network, the device comprising:
an obtaining unit, configured to obtain an asset transfer request initiated by a first object, where the asset transfer request is used to indicate: transferring a target digital asset held by the first object in a blockchain network to a second object;
the processing unit is used for responding to the asset transfer request, negotiating a stealth address with a second device used by the second object and a temporary private key used for controlling the stealth address; the invisible address refers to: an account address for hiding object information of the second object;
The processing unit is further configured to transfer the target digital asset to the stealth address, and cause the second object to obtain ownership of the target digital asset in the stealth address by the second device using the temporary private key.
In yet another aspect, embodiments of the present application provide a computer device including an input interface and an output interface, the computer device further including:
a processor and a computer storage medium;
wherein the processor is adapted to implement one or more instructions, the computer storage medium having stored thereon one or more instructions adapted to be loaded by the processor and to perform the above-mentioned blockchain network-based digital asset processing method.
In yet another aspect, embodiments of the present application provide a computer storage medium storing one or more instructions adapted to be loaded by a processor and to perform the above-mentioned blockchain network-based digital asset processing method.
In yet another aspect, embodiments of the present application provide a computer program product comprising one or more instructions; one or more instructions in the computer program product, when executed by a processor, implement the blockchain network-based digital asset processing method mentioned above.
When the first object wants to transfer the target digital asset held in the blockchain network to the second object, the first device used by the first object and the second device used by the second object negotiate a stealth address and enable the second object to hold a temporary private key for controlling the stealth address, so that the first object can send the target digital asset to be transferred to the stealth address through the first device, and the second object can obtain ownership of the target digital asset in the stealth address by using the temporary private key. Because the invisible address is an account address for hiding the object information of the second object, even if other objects know the operation of the first object to transfer the target digital asset to the invisible address, the address holder of the invisible address cannot be known, so that it cannot be known to which object the target digital asset is transferred; it can be seen that, in the embodiment of the present application, when transferring digital assets, related information of the asset receiver (i.e. the second object) is hidden, so as to improve the privacy of digital asset transfer.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1a is an architecture diagram of an asset transaction system provided by an embodiment of the present application;
FIG. 1b is a schematic diagram of a blockchain provided in an embodiment of the present application;
FIG. 1c is a schematic diagram of generating a new block according to an embodiment of the present application;
FIG. 2 is a flow chart of a digital asset processing method based on a blockchain network according to an embodiment of the present application;
FIG. 3a is a schematic diagram of delivering a first encrypted message according to an embodiment of the present application;
FIG. 3b is a schematic diagram of delivering a second encrypted message according to an embodiment of the present application;
FIG. 4 is a flow chart of a digital asset processing method based on a blockchain network according to another embodiment of the present application;
fig. 5 is a schematic flow chart of negotiating a hidden address and a corresponding temporary private key by using a second device and a first device according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a digital asset processing device based on a blockchain network according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
The embodiment of the application provides a digital asset privacy transaction scheme based on a hidden address based on a blockchain network, so that related information of an asset receiver can be hidden when digital assets are transferred, and the privacy of digital asset transfer is improved. Wherein reference herein to a covert address is to be understood as an account address that does not reveal information about the recipient of the asset and is used to store the digital asset, i.e., an account address that supports hiding information about the recipient of the asset and is used to store the digital asset. While a digital asset is understood to be an asset that exists in electronic form in a blockchain network, it may be an electronic resource, or a resource credential of any resource, etc.; by resource credential is meant a proof of digital ownership (i.e., token) of a resource over a blockchain network, which is a non-replaceable and unique credential of interest. It will be appreciated that references to "transactions" in the embodiments of the present application are terms of the art of blockchain, which do not necessarily mean the transfer of property; which may be a transaction, a message, or data sent by an object to other objects, etc.
Specifically, the general principle of the digital asset private transaction scheme is as follows: when an object (hereinafter referred to as a first object) wants to transfer a target digital asset held in a blockchain network to another object (hereinafter referred to as a second object), a device (hereinafter referred to as a first device) used by the first object negotiates a hidden address with a device (hereinafter referred to as a second device) used by the second object, and the second object holds a temporary private key for controlling the hidden address, so that the first object can send the target digital asset to be transferred to the hidden address through the first device, and the second object obtains ownership (i.e. rights such as occupation, use, transfer, transaction, etc. enjoyed by the target digital asset) of the target digital asset in the hidden address through the second device, thereby realizing a private transaction of digital asset transfer between the first object and the second object, so that the transaction can hide relevant information of an asset receiver (i.e. the second object) and protect privacy of the asset receiver.
As can be seen, the digital asset private transaction scheme provided in the embodiment of the present application may be applied to the following application scenarios: suppose object a wants to give object B a digital asset, which may be a certain number of electronic resources or may be a resource credential for a certain resource. If the object B does not want to know that the digital asset is obtained worldwide, that is, does not want to know that the object a transfers the digital asset to him worldwide, then since all transaction events (such as an event of transferring the digital asset, an event of storing a certain data, etc.) need to be signed and uplink (i.e. upload to a blockchain for storing), it is impossible to hide the transaction event of transferring the digital asset, then the digital asset private transaction scheme proposed in the embodiment of the present application can be applied at this time, and by transferring the digital asset to an invisible address, who is the recipient of the digital asset is hidden, thereby improving the privacy of the digital asset transfer.
In a specific implementation, the digital asset private transaction scheme proposed in the embodiment of the present application may be applied to an asset transaction system as shown in fig. 1 a; referring to FIG. 1a, the asset transaction system may comprise: a first device 11, a second device 12, and a blockchain network 13. Where a first device refers to a device used by an asset transferor (i.e., a first object) and a second device refers to a device used by an asset receiver (i.e., a second object). The blockchain network may include a plurality of blockchain nodes (i.e., devices located in the blockchain network) including at least one consensus node (e.g., the node identified by reference numeral 131 in fig. 1 a), each of which stores one and the same blockchain, and any of which may be responsible for directly or indirectly receiving transaction events submitted by any device, executing transaction events, and consensus-linking transaction events, etc. It is understood that transaction events herein refer to any event that requires a consensus uplink, which does not necessarily mean transfer of an asset, e.g., a transaction event may be an event that stores some information, an event that one object sends a message to another object, etc. As can be seen, one or more stored transaction events may be included in the blockchain stored by the consensus node; in addition, one or more smart contracts and other information may be recorded in the blockchain. So-called smart contracts are automated contracts written in the form of computer programs that are innovations based on blockchain technology to manage, verify or execute terms and conditions in the contract in a code-executing and automated manner; intelligent contracts use the distributed and non-tamperable nature of blockchains to make contract execution more transparent, reliable, and decentralised.
It is understood that the blockchain referred to in the embodiments of the present application is a concatenated literal record consisting of a plurality of blocks that are concatenated and protected by cryptography. Referring to FIG. 1b, the first block in the blockchain may be referred to as the start block. The starting block comprises a block head and a block main body, wherein the block head stores an input information characteristic value, a version number, a time stamp and a difficulty value, and the block main body stores input information. The next block of the starting block takes the starting block as a father block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the father block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain are associated with the block data stored in the father block, and the safety of the input information in the block is ensured.
When each block in the blockchain is generated, referring to fig. 1c, when receiving input information, a consensus node where the blockchain is located checks the input information, stores the input information into a memory pool after the checking is completed, and updates a hash tree used for recording the input information; then, updating the update time stamp to the time of receiving the input information, trying different random numbers, and calculating the characteristic value for a plurality of times, so that the calculated characteristic value can meet the following formula:
SHA256(SHA256(version+prev_hash+merkle_root+ntime+nbits+x))<TARGET
Wherein SHA256 is a eigenvalue algorithm used to calculate eigenvalues; version (version number) is version information of the related block protocol in the block chain; the prev_hash is the block header characteristic value of the parent block of the current block; the merkle_root is a characteristic value of input information; ntime is the update time of the update timestamp; the nbits is the current difficulty, is a fixed value in a period of time, and is determined again after exceeding a fixed period of time; x is a random number; TARGET is a eigenvalue threshold that can be determined from nbits.
Thus, when the random number meeting the formula is calculated, the information can be correspondingly stored to generate the block head and the block main body, and the current block is obtained. And then, the common node where the block chain is located sends the newly generated block to other common nodes according to the node identification of other common nodes in the base layer chain, the other common nodes verify the newly generated block, and the newly generated block is added into the block chain stored by the newly generated block after the verification is completed. It can be seen that each block contains a cryptographic hash of the previous block, a corresponding time stamp, and input information (typically represented by a hash value calculated by the merck tree algorithm), which is designed to make the contents of the block difficult to tamper with; the distributed ledgers serially connected by blockchain technique enable two parties to record transactions effectively and to check the transactions permanently. The blockchain is a safe shared decentralized data account, all data are stored in a chain mode through blocks, and the data are traceable, non-repudiatable, non-counterfeit, non-tamperable and decentralized by utilizing an encryption technology.
It should be noted that any device (such as the first device, the second device, or the consensus node) in the asset transaction system according to the embodiments of the present application may be a terminal or a server, which is not limited thereto. The terminal can be a smart phone, a computer (such as a tablet computer, a notebook computer, a desktop computer and the like), an intelligent wearable device (such as an intelligent watch and intelligent glasses), an intelligent voice interaction device, an intelligent household appliance (such as an intelligent television), a vehicle-mounted terminal or an aircraft and the like; the server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs (Content Delivery Network, content delivery networks), basic cloud computing services such as big data and artificial intelligent platforms, and the like. The devices may communicate with each other by any communication method, such as mobile communication based on the fourth generation mobile communication technology (the 4th Generation Mobile Communication Technology,4G), the fifth generation mobile communication technology (the 5th Generation Mobile Communication Technology,5G), long term evolution (Long Term Evolution, LTE), worldwide interoperability for microwave access (Worldwide Interoperability for Microwave Access, wiMAX), or computer network communication based on the TCP/IP protocol family (TCP/IP Protocol Suite, TCP/IP), user datagram protocol (User Datagram Protocol, UDP), or the like.
It should be emphasized that in the embodiments of the present application, related data (such as digital assets of any object, public and private keys and addresses of any object) of user information (i.e., object information) and the like are involved, and when any method embodiment proposed in the embodiments of the present application is applied to a specific product or technology, the related data is collected under the condition that a user license or consent is obtained, and the collection, use and processing of the related data complies with related laws and regulations and standards of related countries and regions.
Based on the above-mentioned description of the digital asset privacy trading scheme, embodiments of the present application propose a blockchain network-based digital asset processing method that may be performed by a first device used by a first object (i.e., an asset transferor). Referring to fig. 2, the digital asset processing method based on the blockchain network according to the embodiment of the present application may include the following steps S201 to S203:
s201, acquiring an asset transfer request initiated by a first object, wherein the asset transfer request is used for indicating: a target digital asset held by a first object in a blockchain network is transferred to a second object.
In particular implementations, when a first object wants to transfer a target digital asset that it holds in a blockchain network to a second object, the first object may initiate an asset transfer request in a first device such that the first device obtains the asset transfer request. Wherein the target digital asset may be any digital asset held by the first object in the blockchain network. For example, the target digital asset may be at least one electronic resource selected from among the electronic resources held by the first object in the blockchain network; as another example, the target digital asset may be one of the resource vouchers selected to be taken from among the resource vouchers held by the first object in the blockchain network, and so on. It is understood that the first object has a common account address in which each digital asset held by the first object in the blockchain network is located; wherein, the common account address refers to: account addresses of address holders are disclosed in a blockchain network.
S202, in response to the asset transfer request, negotiating a stealth address and a temporary private key for controlling the stealth address with a second device used by a second object.
As can be seen from the foregoing, the invisible address herein refers to: an account address for hiding object information of the second object; it may be calculated from a temporary public key, which may be understood as a calculated public key temporarily (i.e., just prior to the transfer of the target digital asset). The temporary public key corresponds to a temporary private key (i.e. a private key calculated temporarily (i.e. when a target digital asset is transferred) and, for a hidden address generated based on the temporary public key, if a transaction event (such as an event of transferring a digital asset in the hidden address, an event of using a digital asset in the hidden address, etc.) is to be executed on the hidden address, the transaction event needs to be signed by using the temporary private key, the signed transaction event is sent to a blockchain node (such as a consensus node) in the blockchain network, and the blockchain node executes the transaction event only after verifying that the signed transaction event carries signature information obtained by signing by using the temporary private key; it follows that the temporary private key corresponding to the temporary public key can be used to control the invisible address.
In one embodiment, the first device negotiates a hidden address with the second device used by the second object, and the temporary private key for controlling the hidden address may be as follows:
the first device may generate a temporary private key and a temporary public key corresponding to the temporary private key; and performing address calculation by using the temporary public key to obtain the invisible address controlled by the temporary private key. And then, encrypting the temporary private key by using a fixed public key of a second object disclosed in the blockchain network to obtain a first encrypted message, and transmitting the first encrypted message to second equipment used by the second object, so that the second equipment decrypts the first encrypted message by using the fixed private key of the second object to obtain the temporary private key for controlling the invisible address. The fixed public key of the second object refers to a constant public key held by the second object, the fixed private key of the second object refers to a constant private key held by the second object, the fixed public key of the second object and the fixed private key of the second object are corresponding to each other, and form a key pair, and the fixed private key of the second object can be used for decrypting any data obtained by encrypting the fixed public key of the second object. It can be appreciated that, in this embodiment, the embodiment of the present application does not limit the point in time when the fixed public key of the second object is disclosed in the blockchain network; for example, the second device may disclose the fixed public key of the second object in the blockchain network before the first device performs step S202; as another example, the second device may disclose the fixed public key of the second object in the blockchain network, etc., while the first device performs step S202 (i.e., during the negotiation process).
The specific way for the second device to disclose the fixed public key of the second object in the blockchain network may be: the second device may create an account for the second object, resulting in a fixed account for the second object; the fixed account of the second object includes: a fixed private key and a corresponding fixed public key of the second object. The second device may then register the fixed public key of the second object in the blockchain network to disclose the fixed public key of the second object in the blockchain network. Specifically, the second device may generate a registration request, where the registration request may carry the fixed public key of the second object and the object identifier of the second object; and then, the second device sends the registration request to a blockchain node (such as a consensus node) in the blockchain network, so that the blockchain node performs consensus processing on the registration request, after the registration request passes the consensus, the blockchain node can store the registration request onto the blockchain, and register the fixed public key of the second object in the blockchain based on the registration request, thereby disclosing the fixed public key of the second object in the blockchain network. Alternatively, the second device may also disclose the fixed public key of the second object in other ways; for example, the second device generates a public key public message using the fixed public key of the second object, and sends the public key public message to the blockchain nodes in the blockchain network, so that the blockchain nodes broadcast the public key public message to each device in the access blockchain network, thereby disclosing the fixed public key of the second object.
Further, when the first device transmits the first encrypted message to the second device used by the second object, if the first device directly transmits the first encrypted message to the second device in the blockchain network, the transmitting action is uplink, so that other objects know that the first device and the second device interact, and the second device receives the first encrypted message, so that other objects infer that the second device has a certain relationship with the invisible address, and the second object corresponding to the second device is exposed. Therefore, in order not to reveal that the recipient of the first encrypted message is the second device, so that other objects cannot infer who can obtain the digital asset from the invisible address based on the recipient of the first encrypted message, thereby further ensuring that the asset recipient is not exposed, promoting the privacy of the digital asset transfer, the first device may communicate the first encrypted message through an intelligent contract in the blockchain network.
Specifically, see fig. 3 a: the first device may send the first encrypted message to a smart contract in the blockchain network to add the first encrypted message to the smart contract such that a second device used by the second object obtains the first encrypted message from the smart contract; since the intelligent contract does not record the relevant information of the acquirer of the encrypted message when any device acquires the encrypted message from the intelligent contract, the operation of the second device for acquiring the first encrypted message from the intelligent contract can be a private operation, and other objects do not know that the second device acquires the first encrypted message from the intelligent contract. Alternatively, the smart contract may record the sender of any encrypted message; in this case, the second device may determine the first encrypted message from among the encrypted messages newly added in the smart contract based on the sender of the encrypted messages recorded in the smart contract, thereby acquiring the first encrypted message. Alternatively, to further enhance privacy, the smart contract may not record the sender of any encrypted message; in this case, the second device cannot determine which newly added encrypted message is sent by the first device, so that all newly added encrypted messages in the corresponding contract can be obtained from the smart contract, and the obtained encrypted messages are decrypted by using the fixed private key of the second object, so that the successfully decrypted encrypted message is determined as the first encrypted message.
It will be appreciated that, in addition to the above-mentioned manner of delivering the first encrypted message via the smart contract, the first device may also deliver the first encrypted message to the second device in other manners and make it impossible for other objects to learn that communication interactions have been performed between the first device and the second device. For example, the first encrypted message is communicated based on a private communication connection, which is a communication connection not disclosed in the blockchain network. Specifically, when the first device transmits the first encrypted message to the second device used by the second object, a private communication connection may be established between the first device and the second device used by the second object, and based on the private communication connection, the first encrypted message may be sent to the second device used by the second object. In addition, in other embodiments, the first device may also directly send the temporary private key to the second device used by the second object based on the private communication connection mode, without encrypting and retransmitting the temporary private key, so as to save processing resources.
In another embodiment, the first device negotiates a hidden address with the second device used by the second object, and the temporary private key for controlling the hidden address may be as follows:
The first device obtains a second encrypted message generated by a second device used by the second object, wherein the second encrypted message is obtained by encrypting the temporary public key by using a fixed public key of the first object disclosed in the blockchain network after the second device generates the temporary private key and the corresponding temporary public key. The fixed public key of the first object refers to a constant public key held by the first object, the fixed private key of the first object refers to a constant private key held by the first object, the fixed public key of the first object and the fixed private key of the first object are corresponding to each other, and form a key pair, and the fixed private key of the first object can be used for decrypting any data obtained by encrypting the fixed public key of the first object. It can be appreciated that, in this embodiment, the embodiment of the present application does not limit the point in time when the fixed public key of the first object is disclosed in the blockchain network; for example, the first device may disclose the fixed public key of the first object in the blockchain network prior to performing step S202; as another example, the first device may disclose the fixed public key of the first object in the blockchain network, and so on, while performing step S202 (i.e., during the negotiation process).
Similar to the foregoing manner of delivering the first encrypted message, the second device may send the second encrypted message to the smart contract after generating the second encrypted message, so as to newly add the second encrypted message to the smart contract, so that the first device may obtain the second encrypted message from the smart contract, as shown in fig. 3 b. Specifically, if the intelligent contract records the sender of each encrypted message, when the first device obtains the second encrypted message generated by the second device used by the second object, the first device may determine, based on the sender of each encrypted message recorded by the intelligent contract, the second encrypted message from each newly added encrypted message in the intelligent contract, so as to obtain the second encrypted message. If any sender of the encrypted message is not recorded in the intelligent contract, when the first device acquires the second encrypted message generated by the second device used by the second object, each newly added encrypted message in the intelligent contract can be acquired from the intelligent contract in the blockchain network, the acquired encrypted messages are decrypted by adopting the fixed private key of the first object, and the successfully decrypted encrypted message is determined to be the second encrypted message generated by the second device used by the second object. Alternatively, the second device may establish a private communication connection with the first device, such that the second encrypted message is sent to the first device based on the private communication connection, such that the first device obtains the second encrypted message.
After the first device obtains the second encrypted message, the first device may determine a decryption result obtained by decrypting the second encrypted message using the fixed private key of the first object, where the decryption result includes the temporary public key. It can be understood that, if the first device obtains all newly added encrypted messages from the smart contract, and encrypts each obtained encrypted message by using the fixed private key of the first object, so as to obtain the second encrypted message, since the second encrypted message has been decrypted by using the fixed private key of the first object in the process of obtaining the second encrypted message, the manner of determining the decryption result in this case may be: directly obtaining a decryption result corresponding to the second encrypted message; if the first device obtains the second encrypted message directly from the smart contract or based on the private communication connection, the manner of determining the decryption result in this case may be: and decrypting the second encrypted message by using the fixed private key of the first object to obtain a decryption result.
After obtaining the temporary public key in the decryption result, the first device can use the temporary public key to perform address calculation to obtain an invisible address controlled by the temporary private key; it should be noted that the specific implementation manner of this step is not limited by the examples of the present application. For example, the temporary public key may be hashed to obtain a hash result, where the hash result includes a target number of bytes (e.g., 32 bytes), such that the hash result is used as a hidden address controlled by the temporary private key; or perturbing the hash operation result (such as removing at least one Byte, or exchanging at least two bytes) to obtain a hidden address controlled by the temporary private key; or a compression algorithm (such as SHA256 algorithm, RIPEMD160 or Base58 algorithm) can be called to compress the hash operation result to obtain the invisible address controlled by the temporary private key. For another example, other address generation algorithms may be invoked to perform address calculation according to the temporary public key, to obtain the invisible address controlled by the temporary private key.
Therefore, under the condition that the first object obtains the invisible address, the temporary private key is only known by the second object, so that the first object is prevented from knowing the temporary private key, and the condition that the first object transfers the target digital asset to the invisible address and then uses the temporary private key to transfer the target digital asset out of the invisible address, thereby causing asset loss of the second object is avoided. Therefore, by the negotiation mode, the asset security of the second object can be effectively improved.
Based on the above, it should also be noted that: an embodiment of disclosing a fixed public key of a first object in a blockchain network is the same as an embodiment of disclosing a fixed public key of a second object in a blockchain network; taking the fixed public key of the first object as an example, an explanation is given below of how the fixed public key of the first object is disclosed in the blockchain network. Specifically, the first device may create an account for the first object, to obtain a fixed account of the first object; the fixed account of the first object includes: a fixed private key and a corresponding fixed public key of the first object. The first device may then register the fixed public key of the first object in the blockchain network to disclose the fixed public key of the first object in the blockchain network. Specifically, the first device may generate a registration request, where the registration request may carry a fixed public key of the first object and an object identifier of the first object; the first device then sends the registration request to a blockchain node (e.g., a consensus node) in the blockchain network, so that the blockchain node performs a consensus process on the registration request, and after the registration request passes the consensus, the blockchain node may store the registration request on the blockchain and register the fixed public key of the first object in the blockchain based on the registration request, thereby disclosing the fixed public key of the first object in the blockchain network. Alternatively, the first device may also disclose the fixed public key of the first object in other ways; for example, the first device generates a public key public message using the fixed public key of the first object, and sends the public key public message to a blockchain node in the blockchain network, so that the blockchain node broadcasts the public key public message to each device in the access blockchain network, thereby disclosing the fixed public key of the first object.
S203, transferring the target digital asset to the invisible address, and enabling the second object to obtain ownership of the target digital asset in the invisible address by using the temporary private key through the second device.
From the foregoing, it can be seen that the target digital asset is located in a common account address of the first object. In a specific implementation of step S203, the first device may generate an asset transfer transaction event for the target digital asset, the asset transfer transaction event being for indicating transfer of the target digital asset from the common account address to the stealth address of the first object. The first device may then send the asset transfer transaction event to a blockchain node in the blockchain network, cause the blockchain node to perform consensus processing on the asset transfer transaction event, and after the asset transfer transaction event passes the consensus, perform the asset transfer transaction event to transfer the target digital asset from the common account address of the first object to the invisible address, and store the asset transfer transaction event on a blockchain in the blockchain network, such that the second device, upon monitoring that the asset transfer transaction event is newly added on the blockchain, may determine the invisible address and determine that the first device has transferred the target digital asset to the invisible address, such that the temporary private key may be used to obtain ownership of the target digital asset in the invisible address.
Optionally, the first device may also generate a zero knowledge proof of the target digital asset. So-called zero knowledge proof is a cryptographic concept for proving the authenticity of a certain statement without revealing the specific content or additional information of the statement, in which the prover can prove to the verifier that a certain assertion is authentic without revealing specific details about the assertion to it; based on this, the zero knowledge proof of the target digital asset is used to prove that the first object holds the target digital asset without revealing asset information of the first object. Then, the first device may send the zero-knowledge proof of the target digital asset to the blockchain node, so that the blockchain node verifies the zero-knowledge proof of the target digital asset, and after the zero-knowledge proof of the target digital asset passes the verification, triggers the step of performing the consensus processing on the asset transfer event, so that the situation that the processing resource is wasted by the blockchain node to perform the consensus processing on the asset transfer event due to the first object not holding the target digital asset can be avoided.
When the first object wants to transfer the target digital asset held in the blockchain network to the second object, the first device used by the first object and the second device used by the second object negotiate a stealth address and enable the second object to hold a temporary private key for controlling the stealth address, so that the first object can send the target digital asset to be transferred to the stealth address through the first device, and the second object can obtain ownership of the target digital asset in the stealth address by using the temporary private key. Because the invisible address is an account address for hiding the object information of the second object, even if other objects know the operation of the first object to transfer the target digital asset to the invisible address, the address holder of the invisible address cannot be known, so that it cannot be known to which object the target digital asset is transferred; it can be seen that, in the embodiment of the present application, when transferring digital assets, related information of the asset receiver (i.e. the second object) is hidden, so as to improve the privacy of digital asset transfer.
Based on the method embodiment shown in fig. 2, another digital asset processing method based on a blockchain network is proposed in the embodiment of the present application, and the method may be executed by a second device used by a second object (i.e., an asset receiver). Referring to fig. 4, the digital asset processing method based on the blockchain network according to the embodiment of the present application may include the following steps S401 to S402:
s401, when the first object wants to transfer the target digital asset held by the first object in the blockchain network to the second object, negotiating a stealth address and a temporary private key for controlling the stealth address with the first device used by the first object.
For example, a specific process of negotiating the invisible address and the corresponding temporary private key by the second device and the first device may be shown in fig. 5. As shown in fig. 5: a fixed account for the second object may be created by the second device, the fixed account for the second object comprising: the fixed private key Sk1 of the second object and the fixed public key Pk1 of the second object, and registering the fixed public key Pk1 by the second device to disclose the fixed public key of the second object, so that the first device can acquire the fixed public key Pk1 of the second object. The first device may then generate a temporary private key Sk0 and a corresponding temporary public key Pk0, and calculate a stealth address a using the temporary public key Pk 0; and encrypting the temporary private key Sk0 by using the fixed public key Pk1 of the second object to obtain a first encrypted message M, sending the first encrypted message M to an intelligent contract in the blockchain network, so that the second device can acquire all newly added encrypted messages from the intelligent contract, then decrypting each encrypted message by using the fixed private key Sk1 of the second object held by the second device, and taking the decryption result of the encrypted message capable of being decrypted as the temporary private key Sk0, namely, the successfully encrypted data is the temporary private key Sk0. Thus, the second device obtains the temporary private key, and can control the invisible address, so that after the first object sends the target digital asset to the invisible address through the first device, the second object can obtain the ownership of the target digital asset through the second device by using the temporary private key.
S402, after the first device transfers the target digital asset to the stealth address, the ownership of the target digital asset in the stealth address is obtained using the temporary private key. Wherein the second device obtaining ownership of the target digital asset in the invisible address means that the second object can perform at least one of the following operations: acquiring the target digital asset in the stealth address, using the target digital asset in the stealth address, transferring the target digital asset in the stealth address, trading the target digital asset in the stealth address, and so forth.
Optionally, in order to prevent the disclosure of the temporary private key, and enable other objects to use the temporary private key to obtain the target digital asset, the embodiment of the present application may support the second device to monitor, in real time, the action of the first device sending the target digital asset to the invisible address, and once the action is monitored, determine the private key pair held by the second object immediately, and use the temporary private key to request the blockchain network to lock the target digital asset in the invisible address by using the public key in the private key pair, so as to improve the asset security. That is, after the target digital asset is transferred to the invisible address, the second device may be configured to determine a private key pair held by the second object, and use the temporary private key to request the blockchain network to lock the target digital asset in the invisible address using the public key in the private key pair, so that the locked target digital asset supports the second device to unlock using the private key in the private key pair. The private key pair refers to an unpublished key pair, and may be a key pair generated in history, or a new key pair generated in real time after determining that the target digital asset is transferred to the invisible address, which is not limited thereto.
Further, the second device uses the temporary private key to request the blockchain network to lock the target digital asset in the invisible address by adopting the public key in the private key pair, which comprises the following steps: generating a locking transaction event with respect to the target digital asset using the public key of the private key pair; and signing the locking transaction event by using the temporary private key to obtain the signed locking transaction event. And then, the signed locking transaction event can be sent to the blockchain network, so that the blockchain network locks the target digital asset in the invisible address by adopting the public key in the corresponding locking transaction event after verifying that the signed locking transaction event has credibility based on the invisible address.
Optionally, in order to prevent the temporary private key from being revealed, and in the case that the temporary private key is used by other objects to obtain the target digital asset, the embodiment of the application may also support the second device to monitor the action of the first device to send the target digital asset to the stealth address in real time, and once the action is monitored, the target digital asset may be immediately transferred from the stealth address to the private account address held by the second object, so as to improve the asset security. That is, after the target digital asset is transferred to the stealth address, the second device is operable to transfer the target digital asset from the stealth address to the private account address of the second object using the temporary private key; wherein the private account address of the second object refers to: the account address of the address holder is not disclosed in the blockchain network. It can be seen that even though the transfer of the target digital asset from the invisible address to the private account address is linked, the other objects cannot know who the address holder of the private account address is, so that the other objects cannot know who obtains the target digital asset, and the privacy of the digital asset transaction is not affected when the security of the target digital asset is improved.
When the first object wants to transfer the target digital asset held in the blockchain network to the second object, the first device used by the first object and the second device used by the second object negotiate a stealth address and enable the second object to hold a temporary private key for controlling the stealth address, so that the first object can send the target digital asset to be transferred to the stealth address through the first device, and the second object can obtain ownership of the target digital asset in the stealth address by using the temporary private key. Because the invisible address is an account address for hiding the object information of the second object, even if other objects know the operation of the first object to transfer the target digital asset to the invisible address, the address holder of the invisible address cannot be known, so that it cannot be known to which object the target digital asset is transferred; it can be seen that, in the embodiment of the present application, when transferring digital assets, related information of the asset receiver (i.e. the second object) is hidden, so as to improve the privacy of digital asset transfer.
Based on the description of the digital asset processing method embodiment based on the blockchain network, the embodiment of the application also discloses a digital asset processing device based on the blockchain network; the blockchain network-based digital asset processing device may be a computer program (including one or more instructions) running in a computer apparatus, and the blockchain network-based digital asset processing device may perform the steps of the above-described method flow. Referring to fig. 6, the blockchain network-based digital asset processing device may operate as follows:
An obtaining unit 601, configured to obtain, by a first device, an asset transfer request initiated by a first object, where the asset transfer request is used to indicate: transferring a target digital asset held by the first object in a blockchain network to a second object;
a processing unit 602, configured to negotiate a stealth address with a second device used by the second object and a temporary private key for controlling the stealth address in response to the asset transfer request; the invisible address refers to: an account address for hiding object information of the second object;
the processing unit 602 is further configured to transfer the target digital asset to the stealth address, and cause the second object to obtain ownership of the target digital asset in the stealth address using the temporary private key through the second device.
In one embodiment, the processing unit 602, when configured to negotiate a hidden address with the second device used by the second object and a temporary private key for controlling the hidden address, may be specifically configured to:
generating a temporary private key and a temporary public key corresponding to the temporary private key; performing address calculation by using the temporary public key to obtain an invisible address controlled by the temporary private key;
Encrypting the temporary private key by using a fixed public key of the second object disclosed in the blockchain network to obtain a first encrypted message;
and transmitting the first encrypted message to second equipment used by the second object, so that the second equipment uses a fixed private key of the second object to decrypt the first encrypted message, and a temporary private key for controlling the invisible address is obtained.
In another embodiment, the processing unit 602, when configured to transfer the first encrypted message to the second device used by the second object, may be specifically configured to:
sending the first encrypted message to a smart contract in the blockchain network to add the first encrypted message to the smart contract so that a second device used by the second object obtains the first encrypted message from the smart contract;
and if any sender of the encrypted message is not recorded in the intelligent contract, the second device used by the second object acquires all the newly-added encrypted messages in the corresponding contract from the intelligent contract, and decrypts each acquired encrypted message by using the fixed private key of the second object so as to determine the successfully decrypted encrypted message as the first encrypted message.
In another embodiment, the processing unit 602, when configured to transfer the first encrypted message to the second device used by the second object, may be specifically configured to:
establishing a private communication connection between the first device and a second device used by the second object, the private communication connection being a communication connection not disclosed in the blockchain network;
the first encrypted message is sent to a second device used by the second object based on the private communication connection.
In another embodiment, the processing unit 602, when negotiating a hidden address with the second device used by the second object and a temporary private key for controlling the hidden address, may be specifically configured to:
acquiring a second encrypted message generated by a second device used by the second object, wherein the second encrypted message is obtained by encrypting a temporary public key by using a fixed public key of the first object disclosed in the blockchain network after the second device generates the temporary private key and a corresponding temporary public key;
determining a decryption result obtained by decrypting the second encrypted message by using the fixed private key of the first object, wherein the decryption result comprises the temporary public key;
And performing address calculation by using the temporary public key to obtain the invisible address controlled by the temporary private key.
In another embodiment, after the second device generates the second encrypted message, the second encrypted message is added to a smart contract in the blockchain network, where no sender of any encrypted message is recorded; accordingly, the processing unit 602, when configured to obtain the second encrypted message generated by the second device used by the second object, may be specifically configured to:
acquiring each newly added encrypted message in the intelligent contract from the intelligent contract in the blockchain network;
and decrypting each obtained encrypted message by adopting the fixed private key of the first object, and determining the successfully decrypted encrypted message as a second encrypted message generated by second equipment used by the second object.
In another embodiment, the processing unit 602 may be further configured to:
creating an account for the first object to obtain a fixed account of the first object; the fixed account of the first object includes: a fixed private key and a corresponding fixed public key of the first object;
registering the fixed public key of the first object in the blockchain network to disclose the fixed public key of the first object in the blockchain network.
In another embodiment, the target digital asset is located in a common account address of the first object, where the common account address refers to: an account address of an address holder is disclosed in the blockchain network; accordingly, processing unit 602, when configured to transfer the target digital asset to the stealth address, may be specifically configured to:
generating an asset transfer transaction event with respect to the target digital asset, the asset transfer transaction event for indicating transfer of the target digital asset from a common account address of the first object to the stealth address;
transmitting the asset transfer transaction event to a blockchain node in the blockchain network, enabling the blockchain node to perform consensus processing on the asset transfer transaction event, executing the asset transfer transaction event after the asset transfer transaction event passes the consensus so as to transfer the target digital asset from the common account address of the first object to the invisible address, and storing the asset transfer transaction event on a blockchain in the blockchain network;
wherein the second device determines that the first device has transferred the target digital asset to the stealth address after detecting that the asset transfer transaction event is newly added to the blockchain.
According to another embodiment of the present application, each unit in the digital asset processing device based on the blockchain network shown in fig. 6 may be separately or completely combined into one or several other units, or some (some) unit(s) may be further split into multiple units with smaller functions to form the unit(s), which may achieve the same operation without affecting the implementation of the technical effects of the embodiments of the present application. The above units are divided based on logic functions, and in practical applications, the functions of one unit may be implemented by a plurality of units, or the functions of a plurality of units may be implemented by one unit. In other embodiments of the present application, a blockchain network-based digital asset processing device may also include other units, and in actual practice, these functions may also be facilitated by other units and may be cooperatively implemented by multiple units.
According to another embodiment of the present application, a blockchain network-based digital asset processing device apparatus, as shown in fig. 6, and a blockchain network-based digital asset processing method of the embodiments of the present application may be implemented by running a computer program (comprising one or more instructions) capable of executing the steps involved in the above-described methods on a general purpose computing device, such as a computer, including a Central Processing Unit (CPU), a random access storage medium (RAM), a read only storage medium (ROM), etc., processing elements, and storage elements. The computer program may be recorded on, for example, a computer readable storage medium, and loaded into and executed by the computing device described above.
When the first object wants to transfer the target digital asset held in the blockchain network to the second object, the first device used by the first object and the second device used by the second object negotiate a stealth address and enable the second object to hold a temporary private key for controlling the stealth address, so that the first object can send the target digital asset to be transferred to the stealth address through the first device, and the second object can obtain ownership of the target digital asset in the stealth address by using the temporary private key. Because the invisible address is an account address for hiding the object information of the second object, even if other objects know the operation of the first object to transfer the target digital asset to the invisible address, the address holder of the invisible address cannot be known, so that it cannot be known to which object the target digital asset is transferred; it can be seen that, in the embodiment of the present application, when transferring digital assets, related information of the asset receiver (i.e. the second object) is hidden, so as to improve the privacy of digital asset transfer.
Based on the description of the method embodiment and the apparatus embodiment, the embodiment of the application further provides a computer device. Referring to fig. 7, the computer device includes at least a processor 701, an input interface 702, an output interface 703, and a computer storage medium 704. Wherein the processor 701, input interface 702, output interface 703, and computer storage medium 704 within a computer device may be connected by a bus or other means. The computer storage medium 704 may be stored in a memory of a computer device, the computer storage medium 704 being configured to store a computer program, the computer program comprising one or more instructions, the processor 701 being configured to execute one or more instructions of the computer program stored by the computer storage medium 704. The processor 701, or CPU (Central Processing Unit ), is a computing core as well as a control core of a computer device, which is adapted to implement one or more instructions, in particular to load and execute one or more instructions to implement a corresponding method flow or a corresponding function.
In one embodiment, the processor 701 described in embodiments of the present application may be configured to perform a series of digital asset processing, including in particular: the first device obtains an asset transfer request initiated by a first object, the asset transfer request being for indicating: transferring a target digital asset held by the first object in a blockchain network to a second object; negotiating a stealth address and a temporary private key for controlling the stealth address with a second device used by the second object in response to the asset transfer request; the invisible address refers to: an account address for hiding object information of the second object; transferring the target digital asset to the stealth address, causing the second object to obtain ownership of the target digital asset in the stealth address by the second device using the temporary private key, and so on.
The embodiment of the application also provides a computer storage medium (Memory), which is a Memory device in a computer device, and is used for storing computer programs and data. It is understood that the computer storage media herein may include both built-in storage media in a computer device and extended storage media supported by the computer device. The computer storage media provides storage space that stores an operating system of the computer device. Also stored in the memory space is a computer program comprising one or more instructions, which may be one or more program codes, adapted to be loaded and executed by the processor 701. The computer storage medium herein may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one magnetic disk memory; alternatively, it may be at least one computer storage medium located remotely from the aforementioned processor.
In one embodiment, one or more instructions stored in a computer storage medium may be loaded and executed by a processor to implement the corresponding steps in the method embodiments described above; in particular implementations, one or more instructions in a computer storage medium may be loaded by a processor and perform the steps of:
obtaining an asset transfer request initiated by a first object, the asset transfer request being for indicating: transferring a target digital asset held by the first object in a blockchain network to a second object;
negotiating a stealth address and a temporary private key for controlling the stealth address with a second device used by the second object in response to the asset transfer request; the invisible address refers to: an account address for hiding object information of the second object;
transferring the target digital asset to the stealth address, causing the second object to obtain ownership of the target digital asset in the stealth address by the second device using the temporary private key.
In one embodiment, the one or more instructions are loadable by the processor and specifically executable when the second device for use with the second object negotiates a stealth address and a temporary private key for controlling the stealth address:
Generating a temporary private key and a temporary public key corresponding to the temporary private key; performing address calculation by using the temporary public key to obtain an invisible address controlled by the temporary private key;
encrypting the temporary private key by using a fixed public key of the second object disclosed in the blockchain network to obtain a first encrypted message;
and transmitting the first encrypted message to second equipment used by the second object, so that the second equipment uses a fixed private key of the second object to decrypt the first encrypted message, and a temporary private key for controlling the invisible address is obtained.
In another embodiment, the one or more instructions may be loaded and executed by the processor to:
sending the first encrypted message to a smart contract in the blockchain network to add the first encrypted message to the smart contract so that a second device used by the second object obtains the first encrypted message from the smart contract;
and if any sender of the encrypted message is not recorded in the intelligent contract, the second device used by the second object acquires all the newly-added encrypted messages in the corresponding contract from the intelligent contract, and decrypts each acquired encrypted message by using the fixed private key of the second object so as to determine the successfully decrypted encrypted message as the first encrypted message.
In another embodiment, the one or more instructions may be loaded and executed by the processor to:
establishing a private communication connection between the first device and a second device used by the second object, the private communication connection being a communication connection not disclosed in the blockchain network;
the first encrypted message is sent to a second device used by the second object based on the private communication connection.
In another embodiment, the one or more instructions may be loaded and executed by the processor when negotiating a stealth address and a temporary private key for controlling the stealth address with a second device used by the second object:
acquiring a second encrypted message generated by a second device used by the second object, wherein the second encrypted message is obtained by encrypting a temporary public key by using a fixed public key of the first object disclosed in the blockchain network after the second device generates the temporary private key and a corresponding temporary public key;
determining a decryption result obtained by decrypting the second encrypted message by using the fixed private key of the first object, wherein the decryption result comprises the temporary public key;
And performing address calculation by using the temporary public key to obtain the invisible address controlled by the temporary private key.
In another embodiment, after the second device generates the second encrypted message, the second encrypted message is added to a smart contract in the blockchain network, where no sender of any encrypted message is recorded; accordingly, the one or more instructions may be loaded by the processor and executed in particular in obtaining a second encrypted message generated by a second device used by the second object:
acquiring each newly added encrypted message in the intelligent contract from the intelligent contract in the blockchain network;
and decrypting each obtained encrypted message by adopting the fixed private key of the first object, and determining the successfully decrypted encrypted message as a second encrypted message generated by second equipment used by the second object.
In another embodiment, the one or more instructions may be loaded by a processor and executed in particular:
creating an account for the first object to obtain a fixed account of the first object; the fixed account of the first object includes: a fixed private key and a corresponding fixed public key of the first object;
Registering the fixed public key of the first object in the blockchain network to disclose the fixed public key of the first object in the blockchain network.
In another embodiment, the target digital asset is located in a common account address of the first object, where the common account address refers to: an account address of an address holder is disclosed in the blockchain network; accordingly, the one or more instructions may be loaded by the processor and executed in particular in transferring the target digital asset to the stealth address:
generating an asset transfer transaction event with respect to the target digital asset, the asset transfer transaction event for indicating transfer of the target digital asset from a common account address of the first object to the stealth address;
transmitting the asset transfer transaction event to a blockchain node in the blockchain network, enabling the blockchain node to perform consensus processing on the asset transfer transaction event, executing the asset transfer transaction event after the asset transfer transaction event passes the consensus so as to transfer the target digital asset from the common account address of the first object to the invisible address, and storing the asset transfer transaction event on a blockchain in the blockchain network;
Wherein the second device determines that the first device has transferred the target digital asset to the stealth address after detecting that the asset transfer transaction event is newly added to the blockchain.
When the first object wants to transfer the target digital asset held in the blockchain network to the second object, the first device used by the first object and the second device used by the second object negotiate a stealth address and enable the second object to hold a temporary private key for controlling the stealth address, so that the first object can send the target digital asset to be transferred to the stealth address through the first device, and the second object can obtain ownership of the target digital asset in the stealth address by using the temporary private key. Because the invisible address is an account address for hiding the object information of the second object, even if other objects know the operation of the first object to transfer the target digital asset to the invisible address, the address holder of the invisible address cannot be known, so that it cannot be known to which object the target digital asset is transferred; it can be seen that, in the embodiment of the present application, when transferring digital assets, related information of the asset receiver (i.e. the second object) is hidden, so as to improve the privacy of digital asset transfer.
It should be noted that, according to an aspect of the present application, there is also provided a computer program product or a computer program, which comprises one or more instructions stored in a computer storage medium. The processor of the computer device reads one or more instructions from the computer storage medium and executes the one or more instructions to cause the computer device to perform the methods provided in the various alternatives of the method embodiment aspects described above. It is to be understood that the foregoing disclosure is only of the preferred embodiments of the present application and is not, of course, intended to limit the scope of the claims hereof, as defined by the appended claims.

Claims (15)

1. A digital asset processing method based on a blockchain network, comprising:
the first device obtains an asset transfer request initiated by a first object, the asset transfer request being for indicating: transferring a target digital asset held by the first object in a blockchain network to a second object;
negotiating a stealth address and a temporary private key for controlling the stealth address with a second device used by the second object in response to the asset transfer request; the invisible address refers to: an account address for hiding object information of the second object;
Transferring the target digital asset to the stealth address, causing the second object to obtain ownership of the target digital asset in the stealth address by the second device using the temporary private key.
2. The method of claim 1, wherein negotiating a stealth address with the second device for use with the second object and a temporary private key for controlling the stealth address comprises:
generating a temporary private key and a temporary public key corresponding to the temporary private key; performing address calculation by using the temporary public key to obtain an invisible address controlled by the temporary private key;
encrypting the temporary private key by using a fixed public key of the second object disclosed in the blockchain network to obtain a first encrypted message;
and transmitting the first encrypted message to second equipment used by the second object, so that the second equipment uses a fixed private key of the second object to decrypt the first encrypted message, and a temporary private key for controlling the invisible address is obtained.
3. The method of claim 2, wherein the delivering the first encrypted message to the second device used by the second object comprises:
Sending the first encrypted message to a smart contract in the blockchain network to add the first encrypted message to the smart contract so that a second device used by the second object obtains the first encrypted message from the smart contract;
and if any sender of the encrypted message is not recorded in the intelligent contract, the second device used by the second object acquires all the newly-added encrypted messages in the corresponding contract from the intelligent contract, and decrypts each acquired encrypted message by using the fixed private key of the second object so as to determine the successfully decrypted encrypted message as the first encrypted message.
4. The method of claim 2, wherein the delivering the first encrypted message to the second device used by the second object comprises:
establishing a private communication connection between the first device and a second device used by the second object, the private communication connection being a communication connection not disclosed in the blockchain network;
the first encrypted message is sent to a second device used by the second object based on the private communication connection.
5. The method of claim 1, wherein negotiating a stealth address with the second device for use with the second object and a temporary private key for controlling the stealth address comprises:
acquiring a second encrypted message generated by a second device used by the second object, wherein the second encrypted message is obtained by encrypting a temporary public key by using a fixed public key of the first object disclosed in the blockchain network after the second device generates the temporary private key and a corresponding temporary public key;
determining a decryption result obtained by decrypting the second encrypted message by using the fixed private key of the first object, wherein the decryption result comprises the temporary public key;
and performing address calculation by using the temporary public key to obtain the invisible address controlled by the temporary private key.
6. The method of claim 5, wherein the second device, after generating a second encrypted message, is added to a smart contract in the blockchain network in which no sender of any encrypted message is recorded; the obtaining the second encrypted message generated by the second device used by the second object includes:
Acquiring each newly added encrypted message in the intelligent contract from the intelligent contract in the blockchain network;
and decrypting each obtained encrypted message by adopting the fixed private key of the first object, and determining the successfully decrypted encrypted message as a second encrypted message generated by second equipment used by the second object.
7. The method of claim 5, wherein the method further comprises:
creating an account for the first object to obtain a fixed account of the first object; the fixed account of the first object includes: a fixed private key and a corresponding fixed public key of the first object;
registering the fixed public key of the first object in the blockchain network to disclose the fixed public key of the first object in the blockchain network.
8. The method of any of claims 1-7, wherein the target digital asset is located in a common account address of the first object, the common account address being: an account address of an address holder is disclosed in the blockchain network;
the transferring the target digital asset to the stealth address comprises:
generating an asset transfer transaction event with respect to the target digital asset, the asset transfer transaction event for indicating transfer of the target digital asset from a common account address of the first object to the stealth address;
Transmitting the asset transfer transaction event to a blockchain node in the blockchain network, enabling the blockchain node to perform consensus processing on the asset transfer transaction event, executing the asset transfer transaction event after the asset transfer transaction event passes the consensus so as to transfer the target digital asset from the common account address of the first object to the invisible address, and storing the asset transfer transaction event on a blockchain in the blockchain network;
wherein the second device determines that the first device has transferred the target digital asset to the stealth address after detecting that the asset transfer transaction event is newly added to the blockchain.
9. The method of any of claims 1-7, wherein after the target digital asset is transferred to the stealth address, the second device is to determine a private key pair held by the second object and request the blockchain network to lock the target digital asset in the stealth address with a public key of the private key pair using the temporary private key;
wherein the private key pair refers to an unpublished key pair; and the locked target digital asset supports the second equipment to unlock by using the private key in the private key pair.
10. The method of claim 9, wherein the second device requesting the blockchain network to lock the target digital asset in the invisible address with a public key of the private key pair using the temporary private key comprises:
generating a locking transaction event with respect to the target digital asset using a public key of a private key pair; signing the locking transaction event by using the temporary private key to obtain a signed locking transaction event;
and sending the signed locking transaction event to the blockchain network, so that the blockchain network locks the target digital asset in the invisible address by adopting a public key in the corresponding locking transaction event after verifying that the signed locking transaction event has credibility based on the invisible address.
11. The method of any of claims 1-7, wherein after the target digital asset is transferred to the stealth address, the second device is to transfer the target digital asset from the stealth address into a private account address of the second object using the temporary private key;
Wherein the private account address of the second object refers to: the account address of the address holder is not disclosed in the blockchain network.
12. A blockchain network-based digital asset processing device, comprising:
an obtaining unit, configured to obtain an asset transfer request initiated by a first object, where the asset transfer request is used to indicate: transferring a target digital asset held by the first object in a blockchain network to a second object;
the processing unit is used for responding to the asset transfer request, negotiating a stealth address with a second device used by the second object and a temporary private key used for controlling the stealth address; the invisible address refers to: an account address for hiding object information of the second object;
the processing unit is further configured to transfer the target digital asset to the stealth address, and cause the second object to obtain ownership of the target digital asset in the stealth address by the second device using the temporary private key.
13. A computer device comprising an input interface and an output interface, further comprising: a processor and a computer storage medium;
Wherein the processor is adapted to implement one or more instructions, the computer storage medium storing one or more instructions adapted to be loaded by the processor and to perform the blockchain network-based digital asset processing method of any of claims 1-11.
14. A computer storage medium storing one or more instructions adapted to be loaded by a processor and to perform the blockchain network-based digital asset processing method of any of claims 1-11.
15. A computer program product, the computer program product comprising one or more instructions; one or more instructions of the computer program, when executed by a processor, implement the blockchain network-based digital asset processing method as recited in any of claims 1-11.
CN202311437771.2A 2023-10-31 2023-10-31 Digital asset processing method based on block chain network and related equipment Pending CN117474543A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311437771.2A CN117474543A (en) 2023-10-31 2023-10-31 Digital asset processing method based on block chain network and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311437771.2A CN117474543A (en) 2023-10-31 2023-10-31 Digital asset processing method based on block chain network and related equipment

Publications (1)

Publication Number Publication Date
CN117474543A true CN117474543A (en) 2024-01-30

Family

ID=89630640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311437771.2A Pending CN117474543A (en) 2023-10-31 2023-10-31 Digital asset processing method based on block chain network and related equipment

Country Status (1)

Country Link
CN (1) CN117474543A (en)

Similar Documents

Publication Publication Date Title
CN110708170B (en) Data processing method and device and computer readable storage medium
US11868509B2 (en) Method and arrangement for detecting digital content tampering
CN111416807B (en) Data acquisition method, device and storage medium
US11676133B2 (en) Method and system for mobile cryptocurrency wallet connectivity
US11722316B2 (en) Cryptographic communication system and cryptographic communication method based on blockchain
KR20210134655A (en) Security systems and related methods
JP6326173B1 (en) Data transmission / reception system and data transmission / reception method
KR20200034728A (en) Computer-implemented system and method to enable secure storage of large-scale blockchain through multiple storage nodes
JP2008250931A (en) System for restoring distributed information, information utilizing device, and verification device
CN113691502B (en) Communication method, device, gateway server, client and storage medium
CN109754226B (en) Data management method, device and storage medium
US11917081B2 (en) Issuing device and method for issuing and requesting device and method for requesting a digital certificate
US20210306135A1 (en) Electronic device within blockchain based pki domain, electronic device within certification authority based pki domain, and cryptographic communication system including these electronic devices
Chang et al. A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment
CN114142995B (en) Key security distribution method and device for block chain relay communication network
CN109302425B (en) Identity authentication method and terminal equipment
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN110445809B (en) Network attack detection method, device, system, electronic equipment and storage medium
CN109120621B (en) Data processor
JP6939313B2 (en) Distributed authentication system
CN117474543A (en) Digital asset processing method based on block chain network and related equipment
CN111431846B (en) Data transmission method, device and system
CN114143038A (en) Key secure distribution method and device for block chain relay communication network
CN112887983A (en) Equipment identity authentication method, device, equipment and medium
CN112350920A (en) Instant communication system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication