CN106385400A - Bitcoin transaction network based anonymous message transmission method - Google Patents

Bitcoin transaction network based anonymous message transmission method Download PDF

Info

Publication number
CN106385400A
CN106385400A CN201610726388.2A CN201610726388A CN106385400A CN 106385400 A CN106385400 A CN 106385400A CN 201610726388 A CN201610726388 A CN 201610726388A CN 106385400 A CN106385400 A CN 106385400A
Authority
CN
China
Prior art keywords
user
message
bit coin
trading card
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610726388.2A
Other languages
Chinese (zh)
Inventor
练晓谦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Future Information Technology Co Ltd
Original Assignee
Beijing Future Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Future Information Technology Co Ltd filed Critical Beijing Future Information Technology Co Ltd
Priority to CN201610726388.2A priority Critical patent/CN106385400A/en
Publication of CN106385400A publication Critical patent/CN106385400A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to a Bitcoin transaction network based anonymous message transmission method, which comprises the steps that 1) a user A generates a bitcoin transaction order, and writes a message required to be transmitted into the bitcoin transaction order; 2) the user A broadcasts the bitcoin transaction order to a bitcoin transaction network, and the bitcoin transaction order spreads in the bitcoin transaction network; and 3) a user B receives the bitcoin transaction order through the bitcoin transaction network and extracts message data from the bitcoin transaction order. The anonymous message transmission method introduces P2P characteristics of the bitcoin transaction network, and the message data is written into the bitcoin transaction order and broadcasted through the bitcoin transaction network, thereby achieving an effect that the message transmission mode is anonymous and source free.

Description

Anonymous method for message transmission based on bit coin trade network
Technical field
The invention belongs to areas of information technology are and in particular to a kind of anonymous message transmission side based on bit coin trade network Method.
Background technology
P2P, full name Peer to Peer, mean peer-to-peer network, are a kind of thought of network structure.During it is with current network Occupy leading position client/server (Client/Server) structure (frame mode that namely WWW is adopted) one Individual essential distinction is that there is not Centroid (or central server) in whole network structure.In P2P structure, each section Point (peer) mostly has the function of information consumer, informant and information communication etc. three aspect simultaneously.From computation schema For upper, P2P has broken traditional C/S (Client/Server) pattern, and the status of each node in a network is equity 's.Each node had both served as server, provided service for other nodes, also enjoyed the service of other nodes offer simultaneously.
Bit coin, English is BitCoin, and its concept is initially proposed in 2009 by middle acute hearing, according to middle clever thinking The open source software of design issue and construction P2P network thereon.Bit coin is a kind of digital cash of P2P form, point-to-point Transmission mean the payment system of a decentralization.Different from most of currency, bit coin is not against specific currency mechanism Distribution, it, according to special algorithm, is produced by substantial amounts of calculating, bit coin economy uses numerous node structures in whole P2P network The distributed data base becoming is confirming and to record all of trading activity, and is designed to ensure that money flow is each using cryptographic Individual link security.Bit coin trade system is by account book (block), trading card, money (bitcoin), and transaction (transactions) several concepts compositions such as.
The complete decentralization of bit coin trade network, does not have issuer, is impossible to manipulate issuing amount yet.Its distribution With circulation, it is the P2P protocol realization by increasing income.The decentralization characteristic of P2P and algorithm may insure in itself cannot be by big Amount manufactures bit coin artificially to manipulate value of money, bit coin can be made can only to be shifted by real owner based on cryptographic design Or pay, this also ensures that the anonymity of currency ownership and negotiation.It is traded that there is anonymous nothing using bit coin The characteristic in source, authorities cannot trace both parties in real-life true identity, so that " Wiki deciphering " is organized in All avow on twitter and accept anonymous bit coin donation, and announce the bit coin account of its tissue.
The reason bit coin anonymity sourceless characteristic, is as follows:
1) transaction of all of bit coin all disclose and be permanently stored in network it is meant that anyone can check any The remaining sum of one bit coin address and transaction record.However, unless revealing identity in purchasing process or under other situations Information, the true identity of bit coin address behind is secrecy, is not in contact with real-life true identity.And appoint Who can generate substantial amounts of account ID easily, can further improve anonymity by the transaction of multiple addresses.
2), when being traded, user A uses bit coin software to announce to the whole world, " I will turn money to user B ".Then than The Te Bi world can generate a trading card, to the broadcast of P2P the whole network.As shown in figure 1, trading card is broadcast out on network by user A Go, propagated by whole P2P network.The mechanisms such as government, operator are analyzed for network packet, can only trace The sender of P2P network portion data and recipient;Nonetheless, also cannot confirm that the sender of data is strictly trading card Sender, also or the forwarding broadcaster of trading card.Open up benefit structure unless there are what mechanism can obtain whole bit coin network, with And all data transmitted between nodes, be possible to confirm the sender of trading card.In fact, any third party's machine Structure all cannot be accomplished completely to control whole bit coin network, therefore can ensure that the anonymity of counterparty is passive.
Method for message transmission common at present, is all based on existing the network of Centroid to transmit.User A and user B Between carry out message transmission, after message is sent by user A, message can be transferred to Centroid first, and then Centroid will disappear Breath is transferred to user B, thus reaching the message transmission between user A and user B.(Centroid herein does not refer to certain section Point, and refer to the node being controlled by communication network owner mechanism.) common chat software, such as QQ, wechat, use is all It is this method for message transmission.User A can be used a proxy server as springboard, using generation using the technology of agency Reason server is communicated with Centroid, and itself real IP address is not directly communicated with Centroid, thus reach hiding certainly The purpose of body.
In method for message transmission common at present, due to the transmission of each message, message all has to pass through centromere and clicks through Row transfer, therefore, Centroid can obtain message content, sender of the message, message recipient, such that it is able to know that message sends out The person of sending and the identity of message recipient.If user employs the technology of agency, can be hidden itself to a certain extent;But it is real Searched for by following the clues by proxy server on border, still can trace back to real IP address or even the real IP identity of user;Especially It is in recent years, various tracking tracing technologies more and more occur and are actually applied, lead to hide certainly by agent skill group The successful of body is less and less.
Content of the invention
The present invention is directed to the problems referred to above, provides a kind of anonymous method for message transmission based on bit coin trade network, can Realize anonymous passive message transmission.
The technical solution used in the present invention is as follows:
A kind of anonymous method for message transmission based on bit coin trade network, comprises the following steps:
1) user A generates bit coin trading card, the message data needing transmission is written in bit coin trading card simultaneously;
2) user A broadcasts bit coin trading card to bit coin trade network, and bit coin trading card is in bit coin trade network Middle propagation;
3) user B receives bit coin trading card by bit coin trade network, and therefrom extracts message data.
Further, step 1) in, user A voluntarily generates bit coin trading card according to bit coin trading card form, described Comprise in bit coin trading card:In payer account number ID, payee account ID, dealing money, message data of needs transmission etc. Hold.
Further, step 1) add the message count needing to transmit in the OP_RETURN field in bit coin trading card According to.
Further, step 2) in, user A according to bit coin network trading specification by bit coin trading card in whole bit Broadcast in coin trade network, the whole network is traveled to by the node in bit coin trade network;Bit coin network automatically confirms that this pen Transaction effectively, and this bit coin trading card is write into bit coin account book, is equivalent to transaction bill kept on file, and now bit coin the whole network is with per family This transaction list can be viewed.
Further, step 3) in, user B filters out the transaction that payee account ID is user B in All Activity list Single, then by the transmission message extraction in trading card out, thus obtaining the message content that user A transmits to user B.
Further, when adding the message data needing transmission in trading card, first message data is encoded, it After be then written in trading card, and extract message when be correspondingly decoded.
Beneficial effects of the present invention are as follows:
Invention introduces the P2P characteristic of bit coin trade network, message data is written in bit coin trading card, leads to Cross bit coin network to be broadcasted, thus having reached the anonymous passive effect of message transmission means.
Brief description
Fig. 1 is the schematic diagram that trading card is propagated by user A by whole P2P network.
Fig. 2 is the flow chart of the anonymous method for message transmission of the present invention.
Fig. 3 is the schematic diagram of trading card in embodiment.
Fig. 4 is the schematic diagram that OP_RETURN field adds information data in trading card.
Specific embodiment
Understandable for enabling the above objects, features and advantages of the present invention to become apparent from, below by specific embodiment and Accompanying drawing, the present invention will be further described.
In bit coin trade network, each user is simply represented with string number, that is, in account number ID, with actual life Identity do not associate, therefore real-life true identity cannot be associated with by account ID, thus bit coin often by with Carry out anonymous deal in everybody.Every time in bit coin process of exchange, all can produce a transaction list, trading card have recorded transaction Requestee ID, Payment Recipient ID, the information such as dealing money, trading card can propagate in bit coin network, bit coin trade network All user can receive this bill.
The anonymous method for message transmission of the present invention refers to:User A create trading card while it would be desirable to transmission message Content is attached in trading card, then to bit coin Web broadcast trading card;User B receives this transaction by bit coin network Single, therefrom extract message data, to obtain message content;Whole method for message transmission, is based entirely on bit coin trade network Method of commerce, thus inheriting the passive characteristic of anonymity of bit coin transaction.
The anonymous method for message transmission of the present invention, its flow process is as shown in figure 1, comprise the following steps:
1. user A generates bit coin trading card
User A, according to bit coin trading card form, voluntarily generates bit coin trading card.Contain in trading card:Requestee The contents such as (user A) account ID, payee (user B) account ID, dealing money, the information of needs transmission.
2. trading card is broadcasted in bit coin trade network, until bit this transaction of coin network validation
User A is by this bit coin trading card, it then follows bit coin network trading specification, broadcasts in whole bit coin network, The whole network is traveled to by the node in network.
Bit coin network can automatically confirm that this transaction effectively, and this bit coin trading card is write into bit coin account book, phase When in transaction bill kept on file.Now, bit coin the whole network is with viewing this transaction list per family.
3. user B extracts information from trading card
User B, in All Activity list, filters out the trading card that payee account ID is user B.Then by trading card Transmission information extract, just obtain the information content that user A transmits to user B.
Account ID due to each user is not associated with real-life identity, therefore cannot be associated by account ID To real-life true identity.Along with trading card is that continuous broadcast type is propagated in bit coin network, not only with Family A can externally send this trading card, and the user that other receive this trading card also can externally send this trading card, and causing cannot pin Trading card is traced to the source it is impossible to be confirmed IP address and the geographical position of user A.Thus reach anonymous nothing during information transfer The effect in source.
Introduce step 1 in detail further below:
In the end of the year 2013, bit coin official allows in the bit coin of standard is concluded the business, using OP_RETURN field, in transaction The data of 40 bytes is increased on list, data can be write for user.An OP_RETURN field can only be comprised in every transaction, Not reproducible.This trading card of bit coin official recognition is concluded the business for standard.
Bit coin official client is not provided with creating the function of OP_RETURN type transactions it is therefore desirable to voluntarily create Build raw transaction (original transaction), the founder of transaction needs to consider and generate each field information of trading card, and It is sent to bit coin network.
The pattern of OP_RETURN field is:OP_RETURN<data>.Wherein " data " is partly restricted to 40 bytes.
Example:We add message at the OP_RETURN field in trading card:
!dlroW nioctiB olleH:1tset
(test1:Hello Bitcoin World!Inverted sequence write)
Fig. 3 is a trading card, and Fig. 4 is the schematic diagram of the OP_RETURN field above-mentioned message of addition in trading card.Can To find out:This transaction is to be propagated by the IP address of 5.9.24.81, and this IP ownership place is Germany, but actually this transaction is Just stem from us, this has confirmed the anonymous passive characteristic of this method for message transmission.
In said method, in the step adding message to OP_RETURN field in trading card, message can be passed through certain Plant coding (such as base64 coding), be then written to afterwards in trading card;When extracting message, correspondingly it is decoded.Pass through This method can realize safer message transmission.
With regard to adding message, extracting the process of message, another embodiment is provided below:
User A and user B each safeguards a set of one's own public key and private key, and the public key of oneself is informed other side.
1) user A is when sending message:
Public key first by user B is encrypted to the message needing transmission, obtains " message ciphertext ";
Then calculate the MD5 value needing to transmit message, and signed using this MD5 value of private key pair of user A, obtain " information signature ";
End user A, by " message ciphertext " and " information signature ", puts into the OP_RETURN field in trading card together.
2) user B is when extracting message:
Private key message cipher text first by user B is decrypted, and obtains " message is in plain text ";
Then using the public key of user A, information signature is decrypted, obtains MD5 value, and with previous step in decipher To the MD5 value of " message in plain text " be compared;
If 2 MD5 values are the same, can determine that " message is in plain text " is exactly the message that user A is sent to user B, this message Transmitting procedure had not changed as;
If 2 MD5 values different then it represents that message was modified in transmitting procedure.
Above example only in order to technical scheme to be described rather than be limited, the ordinary skill of this area Personnel can modify to technical scheme or equivalent, without departing from the spirit and scope of the present invention, this The protection domain of invention should be to be defined described in claims.

Claims (7)

1. a kind of anonymous method for message transmission based on bit coin trade network is it is characterised in that comprise the following steps:
1) user A generates bit coin trading card, the message data needing transmission is written in bit coin trading card simultaneously;
2) user A broadcasts bit coin trading card to bit coin trade network, and bit coin trading card passes in bit coin trade network Broadcast;
3) user B receives bit coin trading card by bit coin trade network, and therefrom extracts message data.
2. the method for claim 1 it is characterised in that:Step 1) in, user A is according to bit coin trading card form voluntarily Generate bit coin trading card, comprise in described bit coin trading card:Payer account number ID, payee account ID, dealing money, need Message data to be transmitted.
3. the method for claim 1 it is characterised in that:Step 1) OP_RETURN field in bit coin trading card The middle message data adding needs transmission.
4. the method for claim 1 it is characterised in that:Step 2) in, user A will according to bit coin network trading specification Bit coin trading card is broadcasted in whole bit coin trade network, travels to the whole network by the node in bit coin trade network; Bit coin network automatically confirms that this transaction effectively, and this bit coin trading card is write into bit coin account book, is equivalent to transaction bottom Single, now bit coin the whole network is with viewing this transaction list per family.
5. the method for claim 1 it is characterised in that:Step 3) in, user B filters out gathering in All Activity list People's account ID is the trading card of user B, then by the transmission message extraction in trading card out, thus obtaining user A to user B The message content of transmission.
6. the method for claim 1 it is characterised in that:When adding the message data needing transmission in trading card, First message data is encoded, be then written in trading card afterwards, and be correspondingly decoded when extracting message.
7. the method for claim 1 is it is characterised in that user A and user B each safeguards a set of one's own public key And private key, and the public key of oneself is informed other side;
When sending message, the public key first by user B is encrypted user A to the message needing transmission, is disappeared Breath ciphertext;Then calculate the MD5 value of the message needing transmission, and signed using this MD5 value of private key pair of user A, obtain To information signature;Message ciphertext is put into the OP_RETURN field in trading card together with information signature by end user A;
When extracting message, the private key message cipher text first by user B is decrypted user B, obtains message in plain text; Then using the public key of user A, information signature is decrypted, obtains MD5 value, and the MD5 value of the message plaintext obtaining with deciphering It is compared;If, equally it is determined that message plaintext is exactly the message that user A is sent to user B, this message is in transmission for 2 MD5 values During had not changed as;If 2 MD5 values different then it represents that message was modified in transmitting procedure.
CN201610726388.2A 2016-08-25 2016-08-25 Bitcoin transaction network based anonymous message transmission method Pending CN106385400A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610726388.2A CN106385400A (en) 2016-08-25 2016-08-25 Bitcoin transaction network based anonymous message transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610726388.2A CN106385400A (en) 2016-08-25 2016-08-25 Bitcoin transaction network based anonymous message transmission method

Publications (1)

Publication Number Publication Date
CN106385400A true CN106385400A (en) 2017-02-08

Family

ID=57917114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610726388.2A Pending CN106385400A (en) 2016-08-25 2016-08-25 Bitcoin transaction network based anonymous message transmission method

Country Status (1)

Country Link
CN (1) CN106385400A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172074A (en) * 2017-06-26 2017-09-15 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107248994A (en) * 2017-06-26 2017-10-13 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107370606A (en) * 2017-07-26 2017-11-21 中山大学 A kind of microblogging multi-signature method based on block chain
CN107832907A (en) * 2017-09-25 2018-03-23 中央财经大学 Students ' behavior information authentication system based on block chain technology
CN108009807A (en) * 2017-10-17 2018-05-08 国家计算机网络与信息安全管理中心 A kind of bit coin transaction identity method
CN113127894A (en) * 2021-03-03 2021-07-16 合肥工业大学 Public opinion propagation model-based cryptocurrency network data propagation method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927665A (en) * 2014-03-26 2014-07-16 范炳新 Container and monitoring recycling method thereof
CN104320262A (en) * 2014-11-05 2015-01-28 中国科学院合肥物质科学研究院 User public key address binding, searching and verifying method and system based on crypto currency open account book technology
CN104463001A (en) * 2014-12-19 2015-03-25 比特卡国际有限公司 Method for independently generating and storing encrypted digital currency private key and device for bearing encrypted digital currency private key
CN105488665A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Decentralized transaction method
CN105844505A (en) * 2016-03-17 2016-08-10 深圳市新世纪启航科技开发有限公司 Method of carrying out digital currency trading through block chain technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927665A (en) * 2014-03-26 2014-07-16 范炳新 Container and monitoring recycling method thereof
CN104320262A (en) * 2014-11-05 2015-01-28 中国科学院合肥物质科学研究院 User public key address binding, searching and verifying method and system based on crypto currency open account book technology
CN104463001A (en) * 2014-12-19 2015-03-25 比特卡国际有限公司 Method for independently generating and storing encrypted digital currency private key and device for bearing encrypted digital currency private key
CN105488665A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Decentralized transaction method
CN105844505A (en) * 2016-03-17 2016-08-10 深圳市新世纪启航科技开发有限公司 Method of carrying out digital currency trading through block chain technology

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
P2PBUCKS: "教你如何在比特币区块链上永久留言", 《玩币族(HTTP://WWW.WANBIZU.COM/BAIKE/201411043259.HTML)》 *
朱建明: "基于区块链的供应链动态多中心协同认证模型", 《网络与信息安全学报》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172074A (en) * 2017-06-26 2017-09-15 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107248994A (en) * 2017-06-26 2017-10-13 联动优势科技有限公司 A kind of method for sending information, processing method and processing device
CN107172074B (en) * 2017-06-26 2020-06-19 联动优势科技有限公司 Information sending method, processing method and device
CN107248994B (en) * 2017-06-26 2020-08-14 联动优势科技有限公司 Information sending method, processing method and device
CN107370606A (en) * 2017-07-26 2017-11-21 中山大学 A kind of microblogging multi-signature method based on block chain
CN107832907A (en) * 2017-09-25 2018-03-23 中央财经大学 Students ' behavior information authentication system based on block chain technology
CN108009807A (en) * 2017-10-17 2018-05-08 国家计算机网络与信息安全管理中心 A kind of bit coin transaction identity method
CN113127894A (en) * 2021-03-03 2021-07-16 合肥工业大学 Public opinion propagation model-based cryptocurrency network data propagation method and system
CN113127894B (en) * 2021-03-03 2022-09-30 合肥工业大学 Public opinion propagation model-based cryptocurrency network data propagation method and system

Similar Documents

Publication Publication Date Title
CN106385400A (en) Bitcoin transaction network based anonymous message transmission method
Karame et al. Bitcoin and blockchain security
CN107180350B (en) Method, device and system for multi-party sharing transaction metadata based on block chain
CN110225016A (en) A kind of data hiding transmission method based on block chain network
TWI709319B (en) Block chain-based event processing method and device, and electronic equipment
CN110147994A (en) A kind of instant execution method of the block chain based on homomorphic cryptography
CN109829767A (en) A kind of point reward exchanging system and method based on block chain technology
US20190385162A1 (en) System and method for information protection
TW202042134A (en) Event processing method, apparatus and electronic device based on blockchain technology
CN108256859A (en) Financial product transaction common recognition method, node and system based on block chain
CN108885748A (en) Universal tokenization system for cryptocurrency of blockchains
CN109544331A (en) Supply chain financial application method, apparatus and terminal device based on block chain
CN107895111A (en) Internet of things equipment supply chain trust systems management method, computer program, computer
CN107533700A (en) Verify electronic transaction
CN106529932A (en) Bitcoin-based outsourcing calculating fair payment method
CN107067243A (en) Shareable value token is designed at circulation method in a kind of block chain
CN109815728A (en) The fair contract with secret protection based on block chain signs method
CN107172074A (en) A kind of method for sending information, processing method and processing device
CN101163011A (en) Safety authentication method of internet bank system
CN108650252A (en) The data-sharing systems and method of a kind of safety, fair protection privacy
CN113393225B (en) Digital currency encryption payment method and system
Chen et al. Toward achieving anonymous nft trading
Hu et al. Fast lottery-based micropayments for decentralized currencies
CN107403310A (en) Payment system and its method of payment under quantum Metropolitan Area Network (MAN)
CN110363513A (en) Payment unions method and apparatus based on block chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170208