CN107908932A - A kind of digital cash based on L algorithms is false proof and verification method, system and equipment - Google Patents
A kind of digital cash based on L algorithms is false proof and verification method, system and equipment Download PDFInfo
- Publication number
- CN107908932A CN107908932A CN201711301230.1A CN201711301230A CN107908932A CN 107908932 A CN107908932 A CN 107908932A CN 201711301230 A CN201711301230 A CN 201711301230A CN 107908932 A CN107908932 A CN 107908932A
- Authority
- CN
- China
- Prior art keywords
- digital cash
- key
- receiving terminal
- trusted party
- counterfoil
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 98
- 238000012795 verification Methods 0.000 title claims abstract description 76
- 238000004422 calculation algorithm Methods 0.000 title claims abstract description 62
- 238000004364 calculation method Methods 0.000 claims description 25
- 230000003068 static effect Effects 0.000 claims description 12
- 230000005540 biological transmission Effects 0.000 claims description 8
- 239000012530 fluid Substances 0.000 claims description 7
- 241000208340 Araliaceae Species 0.000 claims description 6
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims description 6
- 235000003140 Panax quinquefolius Nutrition 0.000 claims description 6
- 235000008434 ginseng Nutrition 0.000 claims description 6
- 238000010200 validation analysis Methods 0.000 claims description 6
- 238000001629 sign test Methods 0.000 claims description 3
- 238000000151 deposition Methods 0.000 claims description 2
- 241000205585 Aquilegia canadensis Species 0.000 abstract description 11
- 230000006870 function Effects 0.000 description 21
- 230000008569 process Effects 0.000 description 18
- 230000008859 change Effects 0.000 description 17
- 238000013461 design Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 9
- 230000003993 interaction Effects 0.000 description 8
- 230000009466 transformation Effects 0.000 description 8
- 230000009286 beneficial effect Effects 0.000 description 7
- 238000013507 mapping Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 5
- 238000012360 testing method Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 238000009825 accumulation Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012067 mathematical method Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of digital cash based on L algorithms is false proof and verification method, system and equipment, including:The user key for digital cash key and the nonterminal storage for the corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil key of trusted party, being stored in digital cash;Transmitting terminal once updates digital cash key, circulates offline to receiving terminal after generating digital cash ciphertext;Receiving terminal performs local money-checking verification digital cash authenticity, is proved to be successful, and secondary renewal is carried out to digital cash key, sends the first signature and coin information to trusted party and verifies;Trusted party proofing state validity, is proved to be successful, and the second signature is verified, is proved to be successful, digital cash key is updated.Present invention reduces the security risk of honeysuckle;Avoid the false proof caused mass data download problem of book keeping operation formula;Reduce with the risk of private key for user managing digital assets, it is safe.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of digital cash based on L algorithms is false proof and verifies
Method, system and equipment.
Background technology
With the development of computer information technology, the research of digital cash is gradually into current techniques hot spot.It is different from bank note, number
For word currency without medium made of paper, substantially can be said to is one section of digital information for removing medium, how to ensure that this piece of digital is believed
Breath can only be used by its current holder, it is impossible to which it is matter of utmost importance that digital cash is faced to be usurped by other people.With photo and
The digitlization of music is compared, and the digitlization of currency is not only simply records pattern or word in digital form.Number
Word currency must take into consideration currency security and transaction security, and therefore, the digitlization of currency is not only to use mathematical method by currency
Pattern and text conversion are digital information, it is also necessary to carry out safeguard protection to digitized information with cryptography method.
It can really make digital cash that there is anti-counterfeiting, anti-tamper, anti-copying ability.Therefore, it is necessary to ensure to count using anti-counterfeiting technology
Word currency is in the real effectiveness of intermediate links, characteristic of the guarantee digital cash with tamper-proof and anti-multiplexing.
It is well known that it is currently false proof using the progress of block chain technology by the digital cash of representative of bit coin, in simple terms,
Achieve the purpose that " whole people's witness " by being broadcasted to the whole network, so as to ensure that the source of digital cash and whereabouts are all truly to have
Effect.Source authenticity refer to the digital cash received by debit be as transmitted by its legitimate holder, be not forge or
Usurp;The true sex index word currency of whereabouts cannot be sent simultaneously to multiple recipients, and the fraudulent mean for being multiplexed transmission is known as
Honeysuckle (dual cost).
Although block chain technology can solve anti-pseudo problem to a certain extent, in effective, availability and security
Etc. existing defects.
First, block chain technology is realized " whole people's witness " by knowing together algorithm, and common recognition algorithm mainly includes workload and demonstrate,proves
Explicit law (Proof Of Work, PoW) and rights and interests method of verification (Proof of Stake, PoS).Wherein, based on PoW common recognition processes
Block chain mainly faces is 51% attack problem, i.e., node is just had the ability successfully by grasping calculation power of the whole network more than 51%
Distort and forge block chain data.51% attack is solved the problems, such as based on PoS common recognition processes to a certain extent, but is also drawn at the same time
N@S (Nothing at stake) attack problems during block bifurcated are entered.In addition, as computer calculates the enhancing of power, it is based on
It is also increasingly simpler to find the problem that random number competition book keeping operation is weighed, up to the present, bit coin official website is issued specially for this for cut-off
The notice of 6 confirmations is needed so that user attacks from honeysuckle.Thus, the actual effect of " whole people's witness " is more and more lower, largely not true
Recognize transaction accumulation cause a transaction may ten it is more than hour even a talentes can confirm that.
Secondly, each node preserves a data backup in block chain requirement system, this is for growing magnanimity number
According to being extremely difficult for storage.General ledger is first downloaded before one bit coin wallet use, being downloaded using common computer is needed
Take several days time (about 60G).If bit coin pattern is applied to financial field or the field of other black volumes, system pressure
Power and bandwidth occupancy will expend great resource, and the demand of resource is even difficult to estimate.
Finally, a part for bit coin network is become, it is necessary to have the address of a reception fund.Block chain uses
Public key cryptography, and address is the public key hash derived from from private key for user.The private key of user is once lost, corresponding money
Ownership is produced also by whole loss, therefore there are safety risks.
The defects of making a general survey of block chain anti-counterfeiting technology, its question classification are to have ignored digital cash in itself in the anti-of intermediate links
Puppet value, is difficult to solve anti-pseudo problem only by book keeping operation.
The content of the invention
In order to solve the above-mentioned technical problem, it is a primary object of the present invention to provide a kind of digital cash based on L algorithms
False proof and verification method, system and equipment, L algorithms be based on Lagrange's interpolation (Lagrange Interpolation),
By constructing polynomial method, the computing of function is decoupled into the distributed arithmetic entirety being made of multinode, it is final logical
The algorithm that interpolation method obtains the operation result identical with object function is crossed, the present invention is potential by fully excavating digital cash itself
Anti-fake effect, design the L algorithm secret key systems in units of coin.Its own key code system is only designed in units of coin,
The anti-fake effect of digital cash in itself could directly be played;In addition, in units of coin also by scattered risks to minimize, even if one
The key code system of piece digital cash is cracked, other digital cash will not be impacted.
The present invention is merged digital information (currency) with bank settlement instrument, back-end platform, is not changing computing knot
Change calculating process on the premise of fruit, calculating process is decoupled and is fused to digital cash, the means of payment (paying side), the means of payment
How false proof cryptographic technique scheme in the distributed arithmetic entirety that (debit), back-end platform are formed, solve digital cash
Technical barrier, reduces the security risk of honeysuckle, while alleviates the surge pressure of system again, and on-line interaction is few, effective high;
Digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused mass data of the book keeping operation formula such as block chain from downloading
Problem, availability are strong;False proof key code system design in units of coin, reduces with the wind of private key for user managing digital assets
Danger, it is safe.
In order to achieve the above object, one aspect of the present invention provide a kind of digital cash based on L algorithms it is false proof and verification
Method, this method include:
Step 1: the corresponding false proof key of digital cash public key that trusted party is stored is split as being stored in trusted party
Counterfoil key, the digital cash key that is stored in digital cash and the user key of nonterminal storage;
Step 2: the reception that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage
End undated parameter once updates digital cash key, using the receiving terminal encrypted public key of receiving terminal transmission by digital cash
It is offline after encryption generation digital cash ciphertext in plain text to circulate to receiving terminal;
Step 3: receiving terminal recovers digital cash in plain text using receiving terminal encryption key, local money-checking verification numeral is performed
Currency authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal passes through the numeral that receives
Digital cash key, receiving terminal undated parameter and the receiving terminal user key after once renewal in currency is to digital cash key
Secondary renewal is carried out, the first signature calculated the digital cash after renewal is sent and coin information to trusted party is verified;
Step 4: trusted party by coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed, then
Return to mistake and stop flow, be such as proved to be successful, trusted party docks received first signature by the counterfoil key of storage to be counted
Calculate the second signature;The second signature is verified by the digital cash public key of storage, such as authentication failed, then in returning to mistake simultaneously
Fluid stopping journey, is such as proved to be successful, the number that generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash key in word currency is updated.
Further, in the step 1, the corresponding false proof key of digital cash public key of trusted party storage is full
Sufficient relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is ellipse
The basic point of circular curve.
Further, the step 2 specifically includes:
Digital cash key is once updated to L3=(aL1·aL2·u)mod n;
Wherein, aL1Digital cash key for transmitting terminal by storage, aL2For transmitting terminal user key, u sends out for receiving terminal
The receiving terminal undated parameter sent, is the random number in prime field, and n is the rank of elliptic curve;
Digital cash ciphertext C=SM2 (Q, M);
Wherein, Q is the receiving terminal encrypted public key that receiving terminal is sent, and M is digital cash plaintext, and C is offline circulation to reception
The digital cash ciphertext at end.
Further, before step 2, further include:
Receiving terminal randomly generates digital cash key updating parameter u ∈ [1, n-1] based on deal engagement, wherein, u is prime field
Interior random number, n are the rank of elliptic curve;
Receiving terminal encryption key k ∈ [1, n-1] are randomly generated, and receiving terminal encryption public affairs are calculated based on receiving terminal encryption key
Key Q=[k] G;
Receiving terminal undated parameter u, receiving terminal encrypted public key Q are sent to transmitting terminal.
Further, the step 3 specifically includes:
Receiving terminal recovers digital cash plaintext M=SM2 using receiving terminal encryption key k-1(k, C), performs local money-checking and tests
Digital cash authenticity is demonstrate,proved, such as authentication failed, then prompting is wrong and stops flow;Wherein, M is digital cash plaintext, and k is reception
Encryption key is held, C is digital cash ciphertext of the offline circulation to receiving terminal;
Such as it is proved to be successful, by the secondary renewal L of digital cash key4=(L3·bL2 -1·u-1) mod n, wherein, L3For same number
Digital cash key after the once renewal that word currency circulates offline together, bL2It is the user key of receiving terminal;
Summary e=SM3 (M) is calculated digital cash static content, and the digital cash static content is not include key
The digital cash plaintext M in domain;
Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1For the abscissa of receiving terminal encrypted public key Q
Value;
Second son signature bS=((L are calculated based on the first son signature r4·bL2)(k+r))mod n;
First is signed (r, bS), and the information such as coin number is sent to trusted party online validation.
Further, the step 4 specifically includes:
Trusted party retrieves digital cash counterfoil by coin number, and proofing state validity, such as authentication failed, then return to mistake
And stop flow, such as it is proved to be successful,
Calculate the second signature s=(bSaL0- r) mod n, wherein aL0For counterfoil key;
Using the digital cash public key of storage to signature (r, s) verification, such as authentication failed, then return to wrong and middle fluid stopping
Journey;Such as it is proved to be successful,
Randomly generate counterfoil key updating parameter v ∈ [1, n-1];
It is bL by counterfoil key updating0=(aL0·v-1)mod n;
Counterfoil key updating parameter v is returned into receiving terminal.
Further, further included after undated parameter v being returned to receiving terminal:
The key updating of receiving terminal digital cash is bL by counterfoil key updating parameter v by receiving terminal1=(L4·v)mod
n。
Another aspect of the present invention additionally provides that a kind of digital cash based on L algorithms is false proof and verification method, this method bag
Include:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party
The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
Transmitting terminal updates ginseng by the receiving terminal that the digital cash key, transmitting terminal user key and receiving terminal of storage are sent
It is several that digital cash key is once updated, digital cash is encrypted in plain text using the receiving terminal encrypted public key that receiving terminal is sent
Circulate offline to receiving terminal after generating digital cash ciphertext;So that receiving terminal is bright using receiving terminal encryption key recovery digital cash
Text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful,
Receiving terminal passes through digital cash key, receiving terminal undated parameter and the receiving terminal after once updating in the digital cash that receives
User key carries out secondary renewal to digital cash key, sends the first signature and coin calculated the digital cash after renewal
Number information to trusted party is verified;So that trusted party retrieves digital cash counterfoil by coin number, proofing state validity, is such as tested
Card failure, then return to mistake and stop flow, be such as proved to be successful, and trusted party docks received the by the counterfoil key of storage
One signature calculation second is signed;Such as authentication failed, then, which return, to be verified to the second signature by the digital cash public key of storage
Mistake simultaneously stops flow, is such as proved to be successful, and generates trusted party undated parameter by the counterfoil key and receiving terminal of the digital cash
Digital cash key in the digital cash of storage is updated.
Another aspect of the present invention additionally provides that a kind of digital cash based on L algorithms is false proof and verification method, this method bag
Include:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party
The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
The digital cash ciphertext that receiving terminal is sent transmitting terminal using receiving terminal encryption key recovers digital cash in plain text, holds
Row local money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receives
End passes through the digital cash key after the once renewal in the digital cash received, receiving terminal undated parameter and receives end subscriber
Key carries out secondary renewal to digital cash key, sends the first signature and coin number letter calculated the digital cash after renewal
Breath to trusted party is verified;Digital cash counterfoil is retrieved centrally through coin number so as to credible, proofing state validity, such as verification are lost
Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage
Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage
And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash in digital cash key be updated;
The step of digital cash ciphertext that the transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage,
The receiving terminal undated parameter that transmitting terminal user key and receiving terminal are sent once updates digital cash key, uses reception
The receiving terminal encrypted public key of transmission is held to circulate offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
Another aspect of the present invention additionally provides that a kind of digital cash based on L algorithms is false proof and verification method, this method bag
Include:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party
The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
The coin number that trusted party is sent by receiving terminal retrieves digital cash counterfoil, and proofing state validity, such as verification are lost
Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage
Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage
And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash in digital cash key be updated;
The step of coin that the receiving terminal is sent, includes:What receiving terminal was sent transmitting terminal using receiving terminal encryption key
Digital cash ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt
Mistake simultaneously stops flow;Such as it is proved to be successful, receiving terminal passes through the digital cash after once updating in the digital cash that receives
Key, receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to after renewal
The first signature and coin information to trusted party that digital cash calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, send
The receiving terminal undated parameter that end subscriber key and receiving terminal are sent once updates digital cash key, is sent out using receiving terminal
The receiving terminal encrypted public key sent circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
Another aspect of the present invention additionally provide a kind of digital cash based on L algorithms it is false proof and verification system, the system bag
Include key code system, transmitting terminal, receiving terminal and trusted party:
The key code system, the corresponding false proof key of digital cash public key for trusted party to be stored are split as storing
The user key of counterfoil key in trusted party, the digital cash key being stored in digital cash and nonterminal storage;
The transmitting terminal, connects for what is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage
Receiving end undated parameter once updates digital cash key, and the receiving terminal encrypted public key sent using receiving terminal is by digital goods
Coin circulates to receiving terminal offline after encryption generates digital cash ciphertext in plain text;
The receiving terminal, for recovering digital cash in plain text using receiving terminal encryption key, performs local money-checking verification number
Word currency authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal passes through the number that receives
The digital cash key after once renewal, receiving terminal undated parameter and receiving terminal user key in word currency is close to digital cash
Key carries out secondary renewal, sends the first signature calculated the digital cash after renewal and coin information to trusted party is tested
Card;
The trusted party, for by coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed,
Then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first signature by the counterfoil key of storage
Calculate the second signature;Such as authentication failed, then, which return to mistake simultaneously, to be verified to the second signature by the digital cash public key of storage
Stop flow, be such as proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash key in digital cash is updated.
Further, in the key code system, the corresponding false proof key of digital cash public key of trusted party storage,
Meet that relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is ellipse
The basic point of circular curve.
Further, the transmitting terminal, specifically includes:
Updating block, for digital cash key to be once updated to L3=(aL1·aL2·u)mod n;Wherein,
aL1Digital cash key for transmitting terminal by storage, aL2For transmitting terminal user key, u be receiving terminal that receiving terminal is sent more
New parameter, is the random number in prime field, and n is the rank of elliptic curve;
Encryption unit, for digital cash to be encrypted as digital cash ciphertext C=SM2 (Q, M) in plain text;Wherein, Q is reception
The receiving terminal encrypted public key sent is held, for digital cash in plain text, C is digital cash ciphertext of the offline circulation to receiving terminal to M.
Further, receiving terminal, including:
Receiving terminal generation unit, for randomly generating digital cash key updating parameter u based on deal engagement in receiving terminal
∈ [1, n-1], wherein, u is the random number in prime field, and n is the rank of elliptic curve;Randomly generate receiving terminal encryption key k ∈ [1,
N-1], and receiving terminal encrypted public key Q=[k] G is calculated based on receiving terminal encryption key;
First transmitting element, for receiving terminal undated parameter u, receiving terminal encrypted public key Q to be sent to transmitting terminal.
Further, the receiving terminal, further includes:
First authentication unit, for recovering digital cash plaintext M=SM2 using receiving terminal encryption key-1(k, C), performs
Local money-checking verifies digital cash authenticity, and such as authentication failed, then prompting is wrong and stops flow;Wherein, M is bright for digital cash
Text, k are receiving terminal encryption key, and C is digital cash ciphertext of the offline circulation to receiving terminal;
Secondary updating block, for when the first authentication unit is such as proved to be successful, by the secondary renewal L of digital cash key4
=(L3·bL2 -1·u-1) mod n, wherein, L3Digital cash after the once renewal to circulate offline together for same digital cash is close
Key, bL2It is the user key of receiving terminal;
First computing unit, for calculating digital cash static content summary e=SM3 (M), the digital cash is static
Content is not include the digital cash plaintext M in key domain;Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1
For the abscissa value of receiving terminal encrypted public key Q;Second son signature bS=((L are calculated based on the first son signature r4·bL2)(k+r))
mod n;
Second transmitting element, for first to be signed (r, bS), and the information such as coin number is sent to trusted party online validation.
Further, the trusted party, specifically includes:
Second authentication unit, for by coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed,
Then return to mistake and stop flow;
Second computing unit, for when the second authentication unit is proved to be successful, calculating the second signature s=(bSaL0–r)
Mod n, wherein aL0For counterfoil key;
3rd authentication unit, for using storage digital cash public key to sign (r, s) sign test, such as authentication failed, then
Return to mistake and stop flow;
Trusted party updating block, for when the 3rd authentication unit is proved to be successful, randomly generating counterfoil key updating ginseng
Number v ∈ [1, n-1];It is bL by counterfoil key updating0=(aL0·v-1)mod n;
3rd transmitting element, for counterfoil key updating parameter v to be returned receiving terminal.
Further, receiving terminal further includes:
Receiving terminal updating block, for by the key updating of receiving terminal digital cash being bL based on counterfoil key updating parameter1
=(L4·v)mod n。
Another aspect of the present invention additionally provide a kind of digital cash based on L algorithms it is false proof and verification system, the system bag
Include:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored is split as being stored in can
The user key of the counterfoil key at letter center, the digital cash key being stored in digital cash and nonterminal storage;
Transmitting terminal, for the receiving terminal sent by the digital cash key, transmitting terminal user key and receiving terminal of storage
Undated parameter once updates digital cash key, and the receiving terminal encrypted public key sent using receiving terminal is bright by digital cash
It is offline after text encryption generation digital cash ciphertext to circulate to receiving terminal;So that receiving terminal recovers numeral using receiving terminal encryption key
Currency in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt mistake and stop flow;Such as test
Demonstrate,prove successfully, receiving terminal passes through the digital cash key after once updating in the digital cash that receives, receiving terminal undated parameter
Secondary renewal is carried out to digital cash key with receiving terminal user key, sends the first label calculated the digital cash after renewal
Name and coin information to trusted party are verified;So that trusted party retrieves digital cash counterfoil by coin number, proofing state has
Effect property, such as authentication failed, then return to mistake and stop flow, be such as proved to be successful, the counterfoil key pair that trusted party passes through storage
The first signature calculation second received is signed;The second signature is verified by the digital cash public key of storage, is such as verified
Failure, then return to mistake and stop flow, be such as proved to be successful, generation trusted party undated parameter is close by the counterfoil of the digital cash
Digital cash key in key and the digital cash of receiving terminal storage is updated.
Another aspect of the present invention additionally provide a kind of digital cash based on L algorithms it is false proof and verification system, the system bag
Include:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored is split as being stored in can
The user key of the counterfoil key at letter center, the digital cash key being stored in digital cash and nonterminal storage;
Receiving terminal, it is bright that the digital cash ciphertext for being sent transmitting terminal using receiving terminal encryption key recovers digital cash
Text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful,
Receiving terminal passes through digital cash key, receiving terminal undated parameter and the receiving terminal after once updating in the digital cash that receives
User key carries out secondary renewal to digital cash key, sends the first signature and coin calculated the digital cash after renewal
Number information to trusted party is verified;Digital cash counterfoil is retrieved centrally through coin number so as to credible, proofing state validity, is such as tested
Card failure, then return to mistake and stop flow, be such as proved to be successful, and trusted party docks received the by the counterfoil key of storage
One signature calculation second is signed;Such as authentication failed, then, which return, to be verified to the second signature by the digital cash public key of storage
Mistake simultaneously stops flow, is such as proved to be successful, and generates trusted party undated parameter by the counterfoil key and receiving terminal of the digital cash
Digital cash key in the digital cash of storage is updated;The step of digital cash ciphertext that the transmitting terminal is sent, wraps
Include:The receiving terminal undated parameter pair that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage
Digital cash key is once updated, and using the receiving terminal encrypted public key that receiving terminal is sent, by digital cash, encryption generates in plain text
It is offline after digital cash ciphertext to circulate to receiving terminal.
Another aspect of the present invention additionally provide a kind of digital cash based on L algorithms it is false proof and verification system, the system bag
Include:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored is split as being stored in can
The user key of the counterfoil key at letter center, the digital cash key being stored in digital cash and nonterminal storage;
Trusted party, the coin number for being sent by receiving terminal retrieve digital cash counterfoil, and proofing state validity, is such as tested
Card failure, then return to mistake and stop flow, be such as proved to be successful, and trusted party docks received the by the counterfoil key of storage
One signature calculation second is signed;Such as authentication failed, then, which return, to be verified to the second signature by the digital cash public key of storage
Mistake simultaneously stops flow, is such as proved to be successful, and generates trusted party undated parameter by the counterfoil key and receiving terminal of the digital cash
Digital cash key in the digital cash of storage is updated;
The step of coin that the receiving terminal is sent, includes:What receiving terminal was sent transmitting terminal using receiving terminal encryption key
Digital cash ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt
Mistake simultaneously stops flow;Such as it is proved to be successful, receiving terminal passes through the digital cash after once updating in the digital cash that receives
Key, receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to after renewal
The first signature and coin information to trusted party that digital cash calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, send
The receiving terminal undated parameter that end subscriber key and receiving terminal are sent once updates digital cash key, is sent out using receiving terminal
The receiving terminal encrypted public key sent circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
Another aspect of the present invention additionally provides that a kind of digital cash based on L algorithms is false proof and verification equipment, including foregoing
One of described in system.
The present invention provides a kind of digital cash based on L algorithms is false proof and verification method, system and equipment, with independent digit
Word currency for unit build the false proof key code system of digital cash, by false proof key be distributed to digital cash, holder and it is credible in
In heart back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from current
Change of the holder to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed
Process, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed
Among formula computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also
The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain
Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself
With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other
Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Brief description of the drawings
Fig. 1 be according to the present invention a kind of digital cash based on L algorithms is false proof and the stream of the embodiment of verification method one
Cheng Tu;
Fig. 2 is false proof and the embodiment five of verification system is shown according to a kind of digital cash based on L algorithms of the present invention
It is intended to;
Fig. 3 is false proof and the embodiment five of verification system is shown according to a kind of digital cash based on L algorithms of the present invention
It is intended to;
Fig. 4 is false proof and the embodiment five of verification system is shown according to a kind of digital cash based on L algorithms of the present invention
It is intended to;
Fig. 5 is false proof and the embodiment five of verification system is shown according to a kind of digital cash based on L algorithms of the present invention
It is intended to.
Embodiment
Two classes can be substantially divided into the method for important information protection, one kind is " Tibetan ", and one kind is " close ".Illustrate:" Tibetan "
Refer to certain important information being hidden in box, then box is hidden in cabinet, cabinet is being embedded to certain place deep in the mountains.And " close " is then
Be by certain important information calculation be other information, without physical medium." close " is a kind of higher level " Tibetan " in other words, is
It is a kind of it is soft conceal (mathematics, cryptographic algorithm), and non-rigid conceal (by physical unit).
" digitlization " its essence is exactly " removing medium ", and digital cash is as the same.Currency moves towards digitlization from papery, inevitable first
Soft " close " is selected to do false proof protection and business safety control, rather than " Tibetan " of hardness.The scheme of hardware protection that be not
Digital cash, conventional currency is only transformed to another medium from a kind of medium, changes paper into chip by that.Letter
Single says:Digital cash it should be just string number ciphertext.It can be sent, is received, is stored, it have anti-counterfeiting,
Anti-tamper, anti-copying ability.Therefore, digital cash be unable to do without cryptographic algorithm as support and ensures.Specifically, in method
Determine in the design of digital cash in itself, it is necessary to the specific expression-form of the legal digital cash of cryptography theories integration, to ensure
The negotiability of digital cash, storability, unforgeable, the not reproducible transactional characteristic such as with non repudiation.
Money-checking is the important step in paper bank note payment scene, since digital information has the spy for being easier to replicate
Property, thus the encryption of digital cash and verification and the most important thing of digital cash technology.The embodiment of the present invention is based on L algorithms,
Change calculating process on the premise of operation result is not changed.Calculating process is decoupled and is fused to digital cash, the means of payment
The distributed arithmetic that (paying side or transmitting terminal), the means of payment (debit or receiving terminal), back-end platform (trusted party) are formed is overall
In.Digital cash user security is ensured by cryptographic algorithm, controllable anonymity scheme is established by technological means again, calculates knot
Fruit is equivalent to digital cash from when antecessor is to the transformation of new holder, while realizes tracing under certain condition, into one
Step strengthens legal digital cash security., below will knot in order to make those skilled in the art more fully understand the present invention program
The attached drawing in the embodiment of the present invention is closed, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that institute
The embodiment of description is only the embodiment of a present invention part, instead of all the embodiments.Based on the implementation in the present invention
Example, those of ordinary skill in the art's all other embodiments obtained without making creative work, all should
Belong to the scope of protection of the invention.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, "
Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that so use
Data can exchange in the appropriate case, so as to the embodiment of the present invention described herein can with except illustrating herein or
Order beyond those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment
Those steps or unit clearly listed, but may include not list clearly or for these processes, method, product
Or the intrinsic other steps of equipment or unit.
Embodiment one
With reference to Fig. 1, Fig. 1 shows that a kind of digital cash based on L algorithms provided by the invention is false proof and verification method
The flow chart of one embodiment.This method includes:Step 1 is to step 4.
Step 1: the corresponding false proof key of digital cash public key that trusted party is stored is split as being stored in trusted party
Counterfoil key, the digital cash key that is stored in digital cash and the user key of nonterminal storage.
Wherein, the corresponding false proof key of the digital cash public key of trusted party storage, meets that relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is ellipse
The basic point of circular curve.Necessary three key all computings are correct, could be achieveed the purpose that false proof by public key verifications.
Wherein, the counterfoil key of trusted party is stored in, for fake certification;
The digital cash key being stored in digital cash, is the part in digital cash information, with digital cash one
Play circulation;
The user key of nonterminal storage, is the secret information of digital cash current holder, such as password code etc., deposits
Storage does not store in the terminal in the brain of user.
Step 2: the reception that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage
End undated parameter once updates digital cash key, using the receiving terminal encrypted public key of receiving terminal transmission by digital cash
It is offline after encryption generation digital cash ciphertext in plain text to circulate to receiving terminal.
Wherein, digital cash key is once updated to L3=(aL1·aL2·u)mod n;
Wherein, aL1Digital cash key for transmitting terminal by storage, aL2For transmitting terminal user key, u sends out for receiving terminal
The receiving terminal undated parameter sent, is the random number in prime field, and n is the rank of elliptic curve;
Digital cash ciphertext C=SM2 (Q, M);
Wherein, Q is the receiving terminal encrypted public key that receiving terminal is sent, and M is digital cash plaintext, and C is offline circulation to reception
The digital cash ciphertext at end
Wherein, before step 2, further include:
Receiving terminal randomly generates digital cash key updating parameter u ∈ [1, n-1] based on deal engagement, wherein, u is prime field
Interior random number, n are the rank of elliptic curve;
Receiving terminal encryption key k ∈ [1, n-1] are randomly generated, and receiving terminal encryption public affairs are calculated based on receiving terminal encryption key
Key Q=[k] G;
Receiving terminal undated parameter u, receiving terminal encrypted public key Q are sent to transmitting terminal.
Step 3: receiving terminal recovers digital cash in plain text using receiving terminal encryption key, local money-checking verification numeral is performed
Currency authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal passes through the numeral that receives
Digital cash key, receiving terminal undated parameter and the receiving terminal user key after once renewal in currency is to digital cash key
Secondary renewal is carried out, the first signature calculated the digital cash after renewal is sent and coin information to trusted party is verified.
Wherein, receiving terminal recovers digital cash plaintext M=SM2 using receiving terminal encryption key k-1(k, C), performs local test
Paper money verifies digital cash authenticity, and such as authentication failed, then prompting is wrong and stops flow;Wherein, M is digital cash plaintext, and k is
Receiving terminal encryption key, C are digital cash ciphertext of the offline circulation to receiving terminal;
Such as it is proved to be successful, by the secondary renewal L of digital cash key4=(L3·bL2 -1·u-1) mod n, wherein, L3For same number
Digital cash key after the once renewal that word currency circulates offline together, bL2It is the user key of receiving terminal;
Summary e=SM3 (M) is calculated digital cash static content, and the digital cash static content is not include key
The digital cash plaintext M in domain;
Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1For the abscissa of receiving terminal encrypted public key Q
Value;
Based on the first sub- of signature calculation second signature bS=((L4·bL2)(k+r))mod n;
First is signed (r, bS), and the information such as coin number is sent to trusted party online validation.
Step 4: trusted party by coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed, then
Return to mistake and stop flow, be such as proved to be successful, trusted party docks received first signature by the counterfoil key of storage to be counted
Calculate the second signature;The second signature is verified by the digital cash public key of storage, such as authentication failed, then in returning to mistake simultaneously
Fluid stopping journey, is such as proved to be successful, the number that generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash key in word currency is updated.
Wherein, trusted party retrieves digital cash counterfoil by coin number, and proofing state validity, such as authentication failed, then return
Return mistake and stop flow, be such as proved to be successful,
Calculate the second signature s=(bSaL0- r) mod n, wherein aL0For counterfoil key;
Using the digital cash public key of storage to signature (r, s) verification, such as authentication failed, then return to wrong and middle fluid stopping
Journey;Such as it is proved to be successful,
Randomly generate counterfoil key updating parameter v ∈ [1, n-1];
It is bL by counterfoil key updating0=(aL0·v-1)mod n;
Counterfoil key updating parameter v is returned into receiving terminal.
Further, further included after undated parameter v being returned to receiving terminal:
The key updating of receiving terminal digital cash is bL by counterfoil key updating parameter v by receiving terminal1=(L4·v)mod
n。
It is real by the form statement present invention of form in order to become apparent from the concrete technical scheme of the explanation embodiment of the present invention one
Apply independent digit currency in example one circulate offline, the false proof condition passed through of online money-checking process:
Table 1
The embodiment of the present invention one provides that a kind of digital cash based on L algorithms is false proof and verification method, with independent digit
Currency builds the false proof key code system of digital cash for unit, and false proof key is distributed to digital cash, holder and trusted party
In back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from currently and hold
Change of the someone to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed
Journey, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed
Among computing entirety, realization is more difficult to distort, is more convenient online and offline operation, visual stronger, the more extensive mode of channel
Operation;A set of brand-new ecosystem can be built again at the same time.And the complementarity by both forms to a certain extent, not
Can preferentially it be used with application scenarios to meet different demands.Its core is that digital cash is only participate in distributed arithmetic one
A cell mesh, integral operation can not be participated in again once this arithmetic element is tampered, or perhaps destroys distributed fortune
Calculate overall.It is achieved thereby that possess as a piece of digital information (ciphertext) can be by any medium transmission for digital cash
Security reliability.
It is subject to the distributed arithmetic formula of a coin number, its operation result pertains only to the fake certification of the digital cash.
The digital cash of different coin number or other receipt and payment instruments are not current distributed arithmetic members, can not participate in, cannot intercept and capture, can not
Disturb this distributed arithmetic.It is achieved thereby that on the premise of any additional firmware equipment is not depended on, pass through cryptographic algorithm
A piece of digital information (digital cash) tool anti-counterfeiting, anti-tamper, anti-multiplexing, tamper-proof, antifraud, anti-technical robber is set to rob etc. oneself
Body protective capability.
By between (transmitting terminal) and new holder's (receiving terminal) of digital cash (digital information) and current holder
Closely merged with cryptographic algorithm, the digital cash of a payment transaction circulates its behind actually distributed arithmetic form
Cryptography is calculated.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also
The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain
Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself
With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other
Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Embodiment two
The embodiment of the present invention two provides that a kind of digital cash based on L algorithms is false proof and verification method, and this method is to send out
Sending end side is illustrated, and this method includes:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party
The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
Transmitting terminal updates ginseng by the receiving terminal that the digital cash key, transmitting terminal user key and receiving terminal of storage are sent
It is several that digital cash key is once updated, digital cash is encrypted in plain text using the receiving terminal encrypted public key that receiving terminal is sent
Circulate offline to receiving terminal after generating digital cash ciphertext;So that receiving terminal is bright using receiving terminal encryption key recovery digital cash
Text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful,
Receiving terminal passes through digital cash key, receiving terminal undated parameter and the receiving terminal after once updating in the digital cash that receives
User key carries out secondary renewal to digital cash key, sends the first signature and coin calculated the digital cash after renewal
Number information to trusted party is verified;So that trusted party retrieves digital cash counterfoil by coin number, proofing state validity, is such as tested
Card failure, then return to mistake and stop flow, be such as proved to be successful, and trusted party docks received the by the counterfoil key of storage
One signature calculation second is signed;Such as authentication failed, then, which return, to be verified to the second signature by the digital cash public key of storage
Mistake simultaneously stops flow, is such as proved to be successful, and generates trusted party undated parameter by the counterfoil key and receiving terminal of the digital cash
Digital cash key in the digital cash of storage is updated.
Since the step disclosed in the method for the present embodiment two and function essentially correspond to the method shown in embodiment one
Embodiment, principle and example, are only unilateral protected mode, therefore not detailed part in the description of the present embodiment, be may refer to foregoing
Related description in embodiment, this will not be repeated here.
The embodiment of the present invention two provides that a kind of digital cash based on L algorithms is false proof and verification method, with independent digit
Currency builds the false proof key code system of digital cash for unit, and false proof key is distributed to digital cash, holder and trusted party
In back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from currently and hold
Change of the someone to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed
Journey, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed
Among computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also
The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain
Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself
With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other
Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Embodiment three
The embodiment of the present invention three provides that a kind of digital cash based on L algorithms is false proof and verification method, and this method is to connect
Receiving end side is illustrated, and this method includes:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party
The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
The digital cash ciphertext that receiving terminal is sent transmitting terminal using receiving terminal encryption key recovers digital cash in plain text, holds
Row local money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receives
End passes through the digital cash key after the once renewal in the digital cash received, receiving terminal undated parameter and receives end subscriber
Key carries out secondary renewal to digital cash key, sends the first signature and coin number letter calculated the digital cash after renewal
Breath to trusted party is verified;Digital cash counterfoil is retrieved centrally through coin number so as to credible, proofing state validity, such as verification are lost
Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage
Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage
And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash in digital cash key be updated;
The step of digital cash ciphertext that the transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage,
The receiving terminal undated parameter that transmitting terminal user key and receiving terminal are sent once updates digital cash key, uses reception
The receiving terminal encrypted public key of transmission is held to circulate offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
Since the step disclosed in the method for the present embodiment three and function essentially correspond to the method shown in embodiment one
Embodiment, principle and example, are only unilateral protected mode, therefore not detailed part in the description of the present embodiment, be may refer to foregoing
Related description in embodiment, this will not be repeated here.
The embodiment of the present invention three provides that a kind of digital cash based on L algorithms is false proof and verification method, with independent digit
Currency builds the false proof key code system of digital cash for unit, and false proof key is distributed to digital cash, holder and trusted party
In back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from currently and hold
Change of the someone to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed
Journey, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed
Among computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also
The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain
Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself
With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other
Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Example IV
The embodiment of the present invention four provides that a kind of digital cash based on L algorithms is false proof and verification method, and this method is with can
Letter central side is illustrated, and this method includes:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party
The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
The coin number that trusted party is sent by receiving terminal retrieves digital cash counterfoil, and proofing state validity, such as verification are lost
Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage
Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage
And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash in digital cash key be updated;
The step of coin that the receiving terminal is sent, includes:What receiving terminal was sent transmitting terminal using receiving terminal encryption key
Digital cash ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt
Mistake simultaneously stops flow;Such as it is proved to be successful, receiving terminal passes through the digital cash after once updating in the digital cash that receives
Key, receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to after renewal
The first signature and coin information to trusted party that digital cash calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, send
The receiving terminal undated parameter that end subscriber key and receiving terminal are sent once updates digital cash key, is sent out using receiving terminal
The receiving terminal encrypted public key sent circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
Since the step disclosed in the method for the present embodiment four and function essentially correspond to the method shown in embodiment one
Embodiment, principle and example, are only unilateral protected mode, therefore not detailed part in the description of the present embodiment, be may refer to foregoing
Related description in embodiment, this will not be repeated here.
The embodiment of the present invention four provides that a kind of digital cash based on L algorithms is false proof and verification method, with independent digit
Currency builds the false proof key code system of digital cash for unit, and false proof key is distributed to digital cash, holder and trusted party
In back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from currently and hold
Change of the someone to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed
Journey, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed
Among computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also
The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain
Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself
With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other
Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Embodiment five
As shown in Fig. 2, the embodiment of the present invention five provide a kind of digital cash based on L algorithms it is false proof and verification system
200, which includes key code system 21, transmitting terminal 22, receiving terminal 23 and trusted party 24:
The key code system 21, the corresponding false proof key of digital cash public key for trusted party to be stored are split as depositing
Store up the user key in counterfoil key, the digital cash key that is stored in digital cash and the nonterminal storage of trusted party;
The transmitting terminal 22, for what is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage
Receiving terminal undated parameter once updates digital cash key, and the receiving terminal encrypted public key sent using receiving terminal is by numeral
Currency circulates to receiving terminal offline after encryption generates digital cash ciphertext in plain text;
The receiving terminal 23, for recovering digital cash in plain text using receiving terminal encryption key, performs local money-checking verification
Digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal is by receiving
Digital cash key, receiving terminal undated parameter and the receiving terminal user key after once renewal in digital cash is to digital cash
Key carries out secondary renewal, sends the first signature calculated the digital cash after renewal and coin information to trusted party is tested
Card;
The trusted party 24, for retrieving digital cash counterfoil by coin number, proofing state validity, such as verification are lost
Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage
Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage
And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash in digital cash key be updated.
Further, in the key code system, the corresponding false proof key of digital cash public key of trusted party storage,
Meet that relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is ellipse
The basic point of circular curve.
Further, the transmitting terminal, specifically includes:
Updating block, for digital cash key to be once updated to L3=(aL1·aL2·u)mod n;Wherein,
aL1Digital cash key for transmitting terminal by storage, aL2For transmitting terminal user key, u be receiving terminal that receiving terminal is sent more
New parameter, is the random number in prime field, and n is the rank of elliptic curve;
Encryption unit, for digital cash to be encrypted as digital cash ciphertext C=SM2 (Q, M) in plain text;Wherein, Q is reception
The receiving terminal encrypted public key sent is held, for digital cash in plain text, C is digital cash ciphertext of the offline circulation to receiving terminal to M.
Further, receiving terminal, including:
Receiving terminal generation unit, for randomly generating digital cash key updating parameter u based on deal engagement in receiving terminal
∈ [1, n-1], wherein, u is the random number in prime field, and n is the rank of elliptic curve;Randomly generate receiving terminal encryption key k ∈ [1,
N-1], and receiving terminal encrypted public key Q=[k] G is calculated based on receiving terminal encryption key;
First transmitting element, for receiving terminal undated parameter u, receiving terminal encrypted public key Q to be sent to transmitting terminal.
Further, the receiving terminal, further includes:
First authentication unit, for recovering digital cash plaintext M=SM2 using receiving terminal encryption key-1(k, C), performs
Local money-checking verifies digital cash authenticity, and such as authentication failed, then prompting is wrong and stops flow;Wherein, M is bright for digital cash
Text, k are receiving terminal encryption key, and C is digital cash ciphertext of the offline circulation to receiving terminal;
Secondary updating block, for when the first authentication unit is such as proved to be successful, by the secondary renewal L of digital cash key4
=(L3·bL2 -1·u-1) mod n, wherein, L3Digital cash after the once renewal to circulate offline together for same digital cash is close
Key, bL2It is the user key of receiving terminal;
First computing unit, for calculating digital cash static content summary e=SM3 (M), the digital cash is static
Content is not include the digital cash plaintext M in key domain;Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1
For the abscissa value of receiving terminal encrypted public key Q;Based on the first sub- of signature calculation second signature bS=((L4·bL2)(k+r))
mod n;
Second transmitting element, for first to be signed (r, bS), and the information such as coin number is sent to trusted party online validation.
Further, the trusted party, specifically includes:
Second authentication unit, for by coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed,
Then return to mistake and stop flow;
Second computing unit, for when the second authentication unit is proved to be successful, calculating the second signature s=(bSaL0–r)
Mod n, wherein aL0For counterfoil key;
3rd authentication unit, for using storage digital cash public key to sign (r, s) sign test, such as authentication failed, then
Return to mistake and stop flow;
Trusted party updating block, for when the 3rd authentication unit is proved to be successful, randomly generating counterfoil key updating ginseng
Number v ∈ [1, n-1];It is bL by counterfoil key updating0=(aL0·v-1)mod n;
3rd transmitting element, for counterfoil key updating parameter v to be returned receiving terminal.
Further, receiving terminal further includes:
Receiving terminal updating block, for by the key updating of receiving terminal digital cash being bL based on counterfoil key updating parameter1
=(L4·v)mod n。
The specific steps that the function and processing mode of specific implementation are described referring to embodiment of the method one.
The processing and function realized by the system of the present embodiment five essentially correspond to the side shown in previous embodiment one
Embodiment, principle and the example of method, therefore not detailed part in the description of the present embodiment, may refer to the correlation in previous embodiment
Illustrate, this will not be repeated here.
The embodiment of the present invention five provide a kind of digital cash based on L algorithms it is false proof and verification system, with independent digit
Currency builds the false proof key code system of digital cash for unit, and false proof key is distributed to digital cash, holder and trusted party
In back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from currently and hold
Change of the someone to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed
Journey, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed
Among computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also
The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain
Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself
With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other
Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Embodiment six
As shown in figure 3, the embodiment of the present invention six provide a kind of digital cash based on L algorithms it is false proof and verification system
300, which includes key code system 21, transmitting terminal 22.
Key code system 21, the corresponding false proof key of digital cash public key for trusted party to be stored are split as being stored in
The user key of the counterfoil key of trusted party, the digital cash key being stored in digital cash and nonterminal storage;
Transmitting terminal 22, for the reception sent by the digital cash key, transmitting terminal user key and receiving terminal of storage
End undated parameter once updates digital cash key, using the receiving terminal encrypted public key of receiving terminal transmission by digital cash
It is offline after encryption generation digital cash ciphertext in plain text to circulate to receiving terminal;So that receiving terminal recovers number using receiving terminal encryption key
Word currency in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt mistake and stop flow;Such as
It is proved to be successful, receiving terminal passes through the digital cash key after once updating in the digital cash that receives, receiving terminal renewal ginseng
Number and receiving terminal user key carry out secondary renewal to digital cash key, send first calculated the digital cash after renewal
Signature and coin information to trusted party are verified;So that trusted party retrieves digital cash counterfoil, proofing state by coin number
Validity, such as authentication failed, then return to mistake and stop flow, be such as proved to be successful, the counterfoil key that trusted party passes through storage
Received first signature calculation second is docked to sign;The second signature is verified by the digital cash public key of storage, is such as tested
Card failure, then return to mistake and stop flow, be such as proved to be successful, generate trusted party undated parameter by the counterfoil of the digital cash
Digital cash key in key and the digital cash of receiving terminal storage is updated.
The specific steps that the function and processing mode of specific implementation are described referring to embodiment of the method two.
The processing and function realized by the system of the present embodiment six essentially correspond to the side shown in previous embodiment two
Embodiment, principle and the example of method, therefore not detailed part in the description of the present embodiment, may refer to the correlation in previous embodiment
Illustrate, this will not be repeated here.
Embodiment seven
As shown in figure 4, the embodiment of the present invention seven provide a kind of digital cash based on L algorithms it is false proof and verification system
400, which includes key code system 21, receiving terminal 23.
Key code system 21, the corresponding false proof key of digital cash public key for trusted party to be stored are split as being stored in
The user key of the counterfoil key of trusted party, the digital cash key being stored in digital cash and nonterminal storage;
Receiving terminal 23, the digital cash ciphertext for being sent transmitting terminal using receiving terminal encryption key recover digital cash
In plain text, local money-checking verification digital cash authenticity is performed, such as authentication failed, then prompting is wrong and stops flow;Such as verify into
Work(, receiving terminal is by the digital cash key after once updating in the digital cash that receives, receiving terminal undated parameter and connects
Terminating subscriber key carries out secondary renewal to digital cash key, send the first signature for calculating the digital cash after renewal with
And coin information to trusted party is verified;So as to it is credible centrally through coin number retrieve digital cash counterfoil, proofing state validity,
Such as authentication failed, then return to mistake and stop flow, be such as proved to be successful, trusted party is by the counterfoil key of storage to receiving
The first signature calculation second sign;The second signature is verified by the digital cash public key of storage, such as authentication failed, then
Return to mistake and stop flow, be such as proved to be successful, generation trusted party undated parameter is by the counterfoil key of the digital cash and connects
Digital cash key in the digital cash of receiving end storage is updated;The step of digital cash ciphertext that the transmitting terminal is sent
Including:The receiving terminal undated parameter that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage
Digital cash key is once updated, using the receiving terminal encrypted public key that receiving terminal is sent, by digital cash, encryption is given birth in plain text
It is offline after into digital cash ciphertext to circulate to receiving terminal.
The specific steps that the function and processing mode of specific implementation are described referring to embodiment of the method three.
The processing and function realized by the system of the present embodiment seven essentially correspond to the side shown in previous embodiment three
Embodiment, principle and the example of method, therefore not detailed part in the description of the present embodiment, may refer to the correlation in previous embodiment
Illustrate, this will not be repeated here.
Embodiment eight
As shown in figure 5, the embodiment of the present invention seven provide a kind of digital cash based on L algorithms it is false proof and verification system
500, which includes key code system 21, trusted party 24.
Key code system 21, the corresponding false proof key of digital cash public key for trusted party to be stored are split as being stored in
The user key of the counterfoil key of trusted party, the digital cash key being stored in digital cash and nonterminal storage;
Trusted party 24, digital cash counterfoil is retrieved for the coin number that is sent by receiving terminal, proofing state validity, such as
Authentication failed, then return to mistake and stop flow, be such as proved to be successful, and trusted party is docked received by the counterfoil key of storage
First signature calculation second is signed;Such as authentication failed, then, which return, to be verified to the second signature by the digital cash public key of storage
Return mistake and stop flow, be such as proved to be successful, generate trusted party undated parameter by the counterfoil key of the digital cash and reception
The digital cash key in the digital cash of storage is held to be updated;
The step of coin that the receiving terminal is sent, includes:What receiving terminal was sent transmitting terminal using receiving terminal encryption key
Digital cash ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt
Mistake simultaneously stops flow;Such as it is proved to be successful, receiving terminal passes through the digital cash after once updating in the digital cash that receives
Key, receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to after renewal
The first signature and coin information to trusted party that digital cash calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, send
The receiving terminal undated parameter that end subscriber key and receiving terminal are sent once updates digital cash key, is sent out using receiving terminal
The receiving terminal encrypted public key sent circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
The specific steps that the function and processing mode of specific implementation are described referring to embodiment of the method four.
The processing and function realized by the system of the present embodiment seven essentially correspond to the side shown in previous embodiment four
Embodiment, principle and the example of method, therefore not detailed part in the description of the present embodiment, may refer to the correlation in previous embodiment
Illustrate, this will not be repeated here.
Embodiment eight
The embodiment of the present invention eight provide a kind of digital cash based on L algorithms it is false proof and verification equipment (not shown),
The equipment includes the system described in one of embodiment five to seven.
The equipment includes but not limited to be provided with the intelligent terminal of the system described in one of embodiment five to seven.
The embodiment of the present invention eight provide a kind of digital cash based on L algorithms it is false proof and verification method, apparatus, with independent digit
Word currency for unit build the false proof key code system of digital cash, by false proof key be distributed to digital cash, holder and it is credible in
In heart back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from current
Change of the holder to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed
Process, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed
Among formula computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also
The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain
Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself
With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other
Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement because
According to the present invention, some steps can use other orders or be carried out at the same time.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention
It is necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiment.
It may be noted that according to the needs of implementation, each step/component described in this application can be split as more multistep
The part operation of two or more step/components or step/component, can be also combined into new step/component by suddenly/component,
To achieve the object of the present invention.
Above-mentioned the method according to the invention can be realized in hardware, firmware, or be implemented as being storable in recording medium
Software or computer code in (such as CD ROM, RAM, floppy disk, hard disk or magneto-optic disk), or it is implemented through network download
Original storage in long-range recording medium or nonvolatile machine readable media and the meter that will be stored in local recording medium
Calculation machine code, so that method described here can be stored in using all-purpose computer, application specific processor or programmable or special
With such software processing in the recording medium of hardware (such as ASIC or FPGA).It is appreciated that computer, processor, micro-
Processor controller or programmable hardware include can storing or receive software or computer code storage assembly (for example, RAM,
ROM, flash memory etc.), when the software or computer code are by computer, processor or hardware access and when performing, realize herein
The processing method of description.In addition, when all-purpose computer accesses and is used for realization the code for the processing being shown in which, the execution of code
All-purpose computer is converted into the special purpose computer for performing the processing being shown in which.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (21)
1. a kind of digital cash based on L algorithms is false proof and verification method, it is characterised in that this method includes:
Step 1: the corresponding false proof key of digital cash public key that trusted party is stored is split as being stored in depositing for trusted party
The user key of root key, the digital cash key being stored in digital cash and nonterminal storage;
Step 2: the receiving terminal for digital cash key, transmitting terminal user key and the receiving terminal transmission that transmitting terminal passes through storage is more
New parameter once updates digital cash key, using receiving terminal send receiving terminal encrypted public key by digital cash in plain text
It is offline after encryption generation digital cash ciphertext to circulate to receiving terminal;
Step 3: receiving terminal recovers digital cash in plain text using receiving terminal encryption key, local money-checking verification digital cash is performed
Authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal passes through the digital cash that receives
In once update after digital cash key, receiving terminal undated parameter and receiving terminal user key to digital cash key carry out
Secondary renewal, sends the first signature calculated the digital cash after renewal and coin information to trusted party is verified;
Step 4: trusted party retrieves digital cash counterfoil by coin number, proofing state validity, such as authentication failed, then return
Mistake simultaneously stops flow, is such as proved to be successful, and trusted party docks received first signature calculation the by the counterfoil key of storage
Two signatures;Such as authentication failed, then, which return to wrong and middle fluid stopping, to be verified to the second signature by the digital cash public key of storage
Journey, is such as proved to be successful, the digital goods that generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash key in coin is updated.
2. the method as described in claim 1, it is characterised in that in the step 1, the digital cash of trusted party storage is public
The corresponding false proof key of key, meets that relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is oval bent
The basic point of line.
3. method as claimed in claim 1 or 2, it is characterised in that the step 2 specifically includes:
Digital cash key is once updated to L3=(aL1·aL2·u)mod n;
Wherein, aL1Digital cash key for transmitting terminal by storage, aL2For transmitting terminal user key, u is what receiving terminal was sent
Receiving terminal undated parameter, is the random number in prime field, and n is the rank of elliptic curve;
Digital cash ciphertext C=SM2 (Q, M);
Wherein, Q is the receiving terminal encrypted public key that receiving terminal is sent, and for digital cash in plain text, C is offline circulation to receiving terminal to M
Digital cash ciphertext.
4. the method as described in one of claim 1-3, it is characterised in that before step 2, further include:
Receiving terminal randomly generates digital cash key updating parameter u ∈ [1, n-1] based on deal engagement, wherein, u is in prime field
Random number, n are the rank of elliptic curve;
Receiving terminal encryption key k ∈ [1, n-1] are randomly generated, and receiving terminal encrypted public key Q is calculated based on receiving terminal encryption key
=[k] G;
Receiving terminal undated parameter u, receiving terminal encrypted public key Q are sent to transmitting terminal.
5. the method as described in one of claim 14, it is characterised in that the step 3 specifically includes:
Receiving terminal recovers digital cash plaintext M=SM2 using receiving terminal encryption key k-1(k, C), performs local money-checking verification number
Word currency authenticity, such as authentication failed, then prompting is wrong and stops flow;Wherein, M is digital cash plaintext, and k adds for receiving terminal
Close private key, C are digital cash ciphertext of the offline circulation to receiving terminal;
Such as it is proved to be successful, by the secondary renewal L of digital cash key4=(L3·bL2 -1·u-1) mod n, wherein, L3For same digital goods
Digital cash key after the once renewal that coin circulates offline together, bL2It is the user key of receiving terminal;
Summary e=SM3 (M) is calculated digital cash static content, and the digital cash static content is not include key domain
Digital cash plaintext M;
Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1For the abscissa value of receiving terminal encrypted public key Q;
Second son signature bS=((L are calculated based on the first son signature r4·bL2)(k+r))mod n;
First is signed (r, bS), and the information such as coin number is sent to trusted party online validation.
6. the method as described in one of claim 1-5, it is characterised in that the step 4 specifically includes:
Trusted party retrieves digital cash counterfoil, proofing state validity, such as authentication failed, then in returning to mistake simultaneously by coin number
Fluid stopping journey, is such as proved to be successful,
Calculate the second signature s=(bSaL0- r) mod n, wherein aL0For counterfoil key;
Using the digital cash public key of storage to signature (r, s) verification, such as authentication failed, then return to mistake and stop flow;Such as
It is proved to be successful,
Randomly generate counterfoil key updating parameter v ∈ [1, n-1];
It is bL by counterfoil key updating0=(aL0·v-1)mod n;
Counterfoil key updating parameter v is returned into receiving terminal.
7. method as claimed in claim 6, it is characterised in that further included after undated parameter v is returned receiving terminal:
The key updating of receiving terminal digital cash is bL by counterfoil key updating parameter v by receiving terminal1=(L4·v)mod n。
8. a kind of digital cash based on L algorithms is false proof and verification method, it is characterised in that this method includes:
By the corresponding false proof key of digital cash public key that trusted party stores be split as being stored in the counterfoil key of trusted party,
The user key for digital cash key and the nonterminal storage being stored in digital cash;
The receiving terminal undated parameter pair that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage
Digital cash key is once updated, and using the receiving terminal encrypted public key that receiving terminal is sent, by digital cash, encryption generates in plain text
It is offline after digital cash ciphertext to circulate to receiving terminal;So that receiving terminal recovers digital cash in plain text using receiving terminal encryption key,
Local money-checking verification digital cash authenticity is performed, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, connects
Receiving end is used by digital cash key, receiving terminal undated parameter and the receiving terminal after once updating in the digital cash that receives
Family key carries out secondary renewal to digital cash key, sends the first signature and coin number calculated the digital cash after renewal
Information to trusted party is verified;So that trusted party retrieves digital cash counterfoil by coin number, proofing state validity, is such as verified
Failure, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first by the counterfoil key of storage
Signature calculation second is signed;The second signature is verified by the digital cash public key of storage, such as authentication failed, then return wrong
Miss and stop flow, be such as proved to be successful, generation trusted party undated parameter deposits the counterfoil key and receiving terminal of the digital cash
Digital cash key in the digital cash of storage is updated.
9. a kind of digital cash based on L algorithms is false proof and verification method, it is characterised in that this method includes:
By the corresponding false proof key of digital cash public key that trusted party stores be split as being stored in the counterfoil key of trusted party,
The user key for digital cash key and the nonterminal storage being stored in digital cash;
The digital cash ciphertext that receiving terminal is sent transmitting terminal using receiving terminal encryption key recovers digital cash in plain text, performs sheet
Ground money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal leads to
Cross digital cash key, receiving terminal undated parameter and the receiving terminal user key after the once renewal in the digital cash received
Secondary renewal is carried out to digital cash key, sends the first signature calculated the digital cash after renewal and coin information extremely
Trusted party is verified;So as to it is credible centrally through coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed,
Then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first signature by the counterfoil key of storage
Calculate the second signature;Such as authentication failed, then, which return to mistake simultaneously, to be verified to the second signature by the digital cash public key of storage
Stop flow, be such as proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash key in digital cash is updated;
The step of digital cash ciphertext that the transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, send
The receiving terminal undated parameter that end subscriber key and receiving terminal are sent once updates digital cash key, is sent out using receiving terminal
The receiving terminal encrypted public key sent circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
10. a kind of digital cash based on L algorithms is false proof and verification method, it is characterised in that this method includes:
By the corresponding false proof key of digital cash public key that trusted party stores be split as being stored in the counterfoil key of trusted party,
The user key for digital cash key and the nonterminal storage being stored in digital cash;
The coin number retrieval digital cash counterfoil that trusted party is sent by receiving terminal, proofing state validity, such as authentication failed, then
Return to mistake and stop flow, be such as proved to be successful, trusted party docks received first signature by the counterfoil key of storage to be counted
Calculate the second signature;The second signature is verified by the digital cash public key of storage, such as authentication failed, then in returning to mistake simultaneously
Fluid stopping journey, is such as proved to be successful, the number that generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash key in word currency is updated;
The step of coin that the receiving terminal is sent, includes:Receiving terminal uses the numeral that receiving terminal encryption key sends transmitting terminal
Currency ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt mistake
And stop flow;Such as be proved to be successful, receiving terminal by the digital cash key after once updating in the digital cash that receives,
Receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to the digital goods after renewal
The first signature and coin information to trusted party that coin calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal is used by digital cash key, the transmitting terminal of storage
The receiving terminal undated parameter that family key and receiving terminal are sent once updates digital cash key, is sent using receiving terminal
Receiving terminal encrypted public key circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
11. a kind of digital cash based on L algorithms is false proof and verifies system, it is characterised in that the system includes key code system, hair
Sending end, receiving terminal and trusted party:
The key code system, the corresponding false proof key of digital cash public key for trusted party to be stored is split as being stored in can
The user key of the counterfoil key at letter center, the digital cash key being stored in digital cash and nonterminal storage;
The transmitting terminal, for the receiving terminal sent by the digital cash key, transmitting terminal user key and receiving terminal of storage
Undated parameter once updates digital cash key, and the receiving terminal encrypted public key sent using receiving terminal is bright by digital cash
It is offline after text encryption generation digital cash ciphertext to circulate to receiving terminal;
The receiving terminal, for recovering digital cash in plain text using receiving terminal encryption key, performs the local digital goods of money-checking verification
Coin authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal passes through the digital goods that receives
In coin once update after digital cash key, receiving terminal undated parameter and receiving terminal user key to digital cash key into
The secondary renewal of row, sends the first signature calculated the digital cash after renewal and coin information to trusted party is verified;
The trusted party, for retrieving digital cash counterfoil by coin number, proofing state validity, such as authentication failed, then return
Return mistake and stop flow, be such as proved to be successful, trusted party docks received first signature calculation by the counterfoil key of storage
Second signature;The second signature is verified by the digital cash public key of storage, such as authentication failed, then return to mistake and stop
Flow, is such as proved to be successful, the numeral that generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash key in currency is updated.
12. system as claimed in claim 11, it is characterised in that in the key code system, the digital goods of trusted party storage
The corresponding false proof key of coin public key, meets that relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is oval bent
The basic point of line.
13. system as claimed in claim 11, it is characterised in that the transmitting terminal, specifically includes:
Updating block, for digital cash key to be once updated to L3=(aL1·aL2·u)mod n;Wherein, aL1For
Transmitting terminal passes through the digital cash key of storage, aL2For transmitting terminal user key, u is the receiving terminal renewal ginseng that receiving terminal is sent
Number, is the random number in prime field, and n is the rank of elliptic curve;
Encryption unit, for digital cash to be encrypted as digital cash ciphertext C=SM2 (Q, M) in plain text;Wherein, Q sends out for receiving terminal
The receiving terminal encrypted public key sent, for digital cash in plain text, C is digital cash ciphertext of the offline circulation to receiving terminal to M.
14. system as claimed in claim 11, it is characterised in that receiving terminal, including:
Receiving terminal generation unit, for receiving terminal based on deal engagement randomly generate digital cash key updating parameter u ∈ [1,
N-1], wherein, u is the random number in prime field, and n is the rank of elliptic curve;Receiving terminal encryption key k ∈ [1, n-1] are randomly generated,
And receiving terminal encrypted public key Q=[k] G is calculated based on receiving terminal encryption key;
First transmitting element, for receiving terminal undated parameter u, receiving terminal encrypted public key Q to be sent to transmitting terminal.
15. system as claimed in claim 11, it is characterised in that the receiving terminal, further includes:
First authentication unit, for recovering digital cash plaintext M=SM2 using receiving terminal encryption key-1(k, C), performs local
Money-checking verifies digital cash authenticity, and such as authentication failed, then prompting is wrong and stops flow;Wherein, M for digital cash in plain text, k
For receiving terminal encryption key, C is digital cash ciphertext of the offline circulation to receiving terminal;
Secondary updating block, for when the first authentication unit is such as proved to be successful, by the secondary renewal L of digital cash key4=
(L3·bL2 -1·u-1) mod n, wherein, L3Digital cash after the once renewal to circulate offline together for same digital cash is close
Key, bL2It is the user key of receiving terminal;
First computing unit, for calculating summary e=SM3 (M), the digital cash static content to digital cash static content
Not include the digital cash plaintext M in key domain;Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1To connect
The abscissa value of receiving end encrypted public key Q;Based on the first sub- of signature calculation second signature bS=((L4·bL2)(k+r))mod n;
Second transmitting element, for first to be signed (r, bS), and the information such as coin number is sent to trusted party online validation.
16. system as claimed in claim 11, it is characterised in that the trusted party, specifically includes:
Second authentication unit, for retrieving digital cash counterfoil by coin number, proofing state validity, such as authentication failed, then return
Return mistake and stop flow;
Second computing unit, for when the second authentication unit is proved to be successful, calculating the second signature s=(bSaL0- r) mod n,
Wherein aL0For counterfoil key;
3rd authentication unit, for the digital cash public key using storage to (r, s) sign test of signing, such as authentication failed, then return
Mistake simultaneously stops flow;
Trusted party updating block, for when the 3rd authentication unit is proved to be successful, randomly generating counterfoil key updating parameter v ∈
[1,n-1];It is bL by counterfoil key updating0=(aL0·v-1)mod n;
3rd transmitting element, for counterfoil key updating parameter v to be returned receiving terminal.
17. system as claimed in claim 16, it is characterised in that receiving terminal further includes:
Receiving terminal updating block, for by the key updating of receiving terminal digital cash being bL based on counterfoil key updating parameter1=
(L4·v)mod n。
18. a kind of digital cash based on L algorithms is false proof and verifies system, it is characterised in that the system includes:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored be split as being stored in it is credible in
The user key of the counterfoil key of the heart, the digital cash key being stored in digital cash and nonterminal storage;
Transmitting terminal, the receiving terminal for being sent by the digital cash key, transmitting terminal user key and receiving terminal of storage update
Parameter logistic word currency key is once updated, and is added digital cash in plain text using the receiving terminal encrypted public key that receiving terminal is sent
It is offline after the dense ciphertext into digital cash to circulate to receiving terminal;So that receiving terminal recovers digital cash using receiving terminal encryption key
In plain text, local money-checking verification digital cash authenticity is performed, such as authentication failed, then prompting is wrong and stops flow;Such as verify into
Work(, receiving terminal is by the digital cash key after once updating in the digital cash that receives, receiving terminal undated parameter and connects
Terminating subscriber key carries out secondary renewal to digital cash key, send the first signature for calculating the digital cash after renewal with
And coin information to trusted party is verified;So that trusted party by coin number retrieve digital cash counterfoil, proofing state validity,
Such as authentication failed, then return to mistake and stop flow, be such as proved to be successful, trusted party is by the counterfoil key of storage to receiving
The first signature calculation second sign;The second signature is verified by the digital cash public key of storage, such as authentication failed, then
Return to mistake and stop flow, be such as proved to be successful, generation trusted party undated parameter is by the counterfoil key of the digital cash and connects
Digital cash key in the digital cash of receiving end storage is updated.
19. a kind of digital cash based on L algorithms is false proof and verifies system, it is characterised in that the system includes:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored be split as being stored in it is credible in
The user key of the counterfoil key of the heart, the digital cash key being stored in digital cash and nonterminal storage;
Receiving terminal, the digital cash ciphertext for being sent transmitting terminal using receiving terminal encryption key recover digital cash in plain text,
Local money-checking verification digital cash authenticity is performed, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, connects
Receiving end is used by digital cash key, receiving terminal undated parameter and the receiving terminal after once updating in the digital cash that receives
Family key carries out secondary renewal to digital cash key, sends the first signature and coin number calculated the digital cash after renewal
Information to trusted party is verified;Digital cash counterfoil is retrieved centrally through coin number so as to credible, proofing state validity, is such as verified
Failure, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first by the counterfoil key of storage
Signature calculation second is signed;The second signature is verified by the digital cash public key of storage, such as authentication failed, then return wrong
Miss and stop flow, be such as proved to be successful, generation trusted party undated parameter deposits the counterfoil key and receiving terminal of the digital cash
Digital cash key in the digital cash of storage is updated;The step of digital cash ciphertext that the transmitting terminal is sent, includes:
The receiving terminal undated parameter that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage is to numeral
Currency key is once updated, and using the receiving terminal encrypted public key that receiving terminal is sent, by digital cash, encryption generation is digital in plain text
It is offline after currency ciphertext to circulate to receiving terminal.
20. a kind of digital cash based on L algorithms is false proof and verifies system, it is characterised in that the system includes:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored be split as being stored in it is credible in
The user key of the counterfoil key of the heart, the digital cash key being stored in digital cash and nonterminal storage;
Trusted party, the coin number for being sent by receiving terminal retrieve digital cash counterfoil, and proofing state validity, such as verification are lost
Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage
Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage
And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash
Digital cash in digital cash key be updated;
The step of coin that the receiving terminal is sent, includes:Receiving terminal uses the numeral that receiving terminal encryption key sends transmitting terminal
Currency ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt mistake
And stop flow;Such as be proved to be successful, receiving terminal by the digital cash key after once updating in the digital cash that receives,
Receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to the digital goods after renewal
The first signature and coin information to trusted party that coin calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal is used by digital cash key, the transmitting terminal of storage
The receiving terminal undated parameter that family key and receiving terminal are sent once updates digital cash key, is sent using receiving terminal
Receiving terminal encrypted public key circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
21. a kind of digital cash based on L algorithms is false proof and verifies equipment, it is characterised in that including one of claim 11-18
Or the system described in 19 or 20.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711301230.1A CN107908932B (en) | 2017-12-10 | 2017-12-10 | Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711301230.1A CN107908932B (en) | 2017-12-10 | 2017-12-10 | Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107908932A true CN107908932A (en) | 2018-04-13 |
CN107908932B CN107908932B (en) | 2020-10-13 |
Family
ID=61865230
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711301230.1A Active CN107908932B (en) | 2017-12-10 | 2017-12-10 | Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107908932B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109033832A (en) * | 2018-06-22 | 2018-12-18 | 深圳前海益链网络科技有限公司 | A method of prevention carries out of short duration bifurcated honeysuckle to block chain network and attacks |
CN110599140A (en) * | 2019-08-29 | 2019-12-20 | 中国人民银行数字货币研究所 | Digital currency verification method and system |
CN112036847A (en) * | 2020-08-05 | 2020-12-04 | 杭州云象网络技术有限公司 | Anti-counterfeiting verification method and system for offline payment of digital currency |
CN112711742A (en) * | 2020-11-23 | 2021-04-27 | 中国联合网络通信集团有限公司 | Digital currency anti-counterfeiting method and device |
CN112732288A (en) * | 2020-12-11 | 2021-04-30 | 北京握奇智能科技有限公司 | Method and device for upgrading application of digital currency hardware wallet |
WO2023066197A1 (en) * | 2021-10-19 | 2023-04-27 | 中国人民银行数字货币研究所 | Method and device for verifying abnormal digital currency transaction |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101202630A (en) * | 2007-12-07 | 2008-06-18 | 中国电信股份有限公司 | Method and system for adding decipher in TR069 integrative terminal management platform |
US20080263363A1 (en) * | 2007-01-22 | 2008-10-23 | Spyrus, Inc. | Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption |
CN101888295A (en) * | 2009-05-15 | 2010-11-17 | 南京理工大学 | Distributed multi-term safety certification method |
CN102857339A (en) * | 2012-09-12 | 2013-01-02 | 无锡科技职业学院 | Secret distribution sharing and recovery recombining method based on sequences |
CN105812126A (en) * | 2016-05-19 | 2016-07-27 | 齐鲁工业大学 | Lightweight back-up and efficient restoration method of health block chain data encryption keys |
JP2016173532A (en) * | 2015-03-18 | 2016-09-29 | 日本電信電話株式会社 | Sharing value conversion system, sharing value conversion device, sharing value conversion method, and program |
CN106651331A (en) * | 2016-12-22 | 2017-05-10 | 飞天诚信科技股份有限公司 | Digital currency-based electronic transaction method and system |
CN106845950A (en) * | 2017-02-06 | 2017-06-13 | 吕文华 | A kind of digital currency for meeting binary system |
CN107067241A (en) * | 2017-02-06 | 2017-08-18 | 吕文华 | A kind of runtime of binary system digital currency |
CN107276752A (en) * | 2016-06-27 | 2017-10-20 | 收付宝科技有限公司 | The methods, devices and systems that limitation key is decrypted are paid to cloud |
CN107302438A (en) * | 2017-08-07 | 2017-10-27 | 收付宝科技有限公司 | A kind of private key protection method based on key updating, system and device |
CN107409123A (en) * | 2015-02-09 | 2017-11-28 | 缇零网股份有限公司 | Encrypt integrated platform |
-
2017
- 2017-12-10 CN CN201711301230.1A patent/CN107908932B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080263363A1 (en) * | 2007-01-22 | 2008-10-23 | Spyrus, Inc. | Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption |
CN101202630A (en) * | 2007-12-07 | 2008-06-18 | 中国电信股份有限公司 | Method and system for adding decipher in TR069 integrative terminal management platform |
CN101888295A (en) * | 2009-05-15 | 2010-11-17 | 南京理工大学 | Distributed multi-term safety certification method |
CN102857339A (en) * | 2012-09-12 | 2013-01-02 | 无锡科技职业学院 | Secret distribution sharing and recovery recombining method based on sequences |
CN107409123A (en) * | 2015-02-09 | 2017-11-28 | 缇零网股份有限公司 | Encrypt integrated platform |
JP2016173532A (en) * | 2015-03-18 | 2016-09-29 | 日本電信電話株式会社 | Sharing value conversion system, sharing value conversion device, sharing value conversion method, and program |
CN105812126A (en) * | 2016-05-19 | 2016-07-27 | 齐鲁工业大学 | Lightweight back-up and efficient restoration method of health block chain data encryption keys |
CN107276752A (en) * | 2016-06-27 | 2017-10-20 | 收付宝科技有限公司 | The methods, devices and systems that limitation key is decrypted are paid to cloud |
CN106651331A (en) * | 2016-12-22 | 2017-05-10 | 飞天诚信科技股份有限公司 | Digital currency-based electronic transaction method and system |
CN106845950A (en) * | 2017-02-06 | 2017-06-13 | 吕文华 | A kind of digital currency for meeting binary system |
CN107067241A (en) * | 2017-02-06 | 2017-08-18 | 吕文华 | A kind of runtime of binary system digital currency |
CN107302438A (en) * | 2017-08-07 | 2017-10-27 | 收付宝科技有限公司 | A kind of private key protection method based on key updating, system and device |
Non-Patent Citations (4)
Title |
---|
YINING LIU AND JIHONG YAN: ""A lightweight micropayment scheme based on lagrange imterpolation formula"", 《SECURITY AND COMMUNICATION NETWORKS》 * |
宋琦 等: ""基于RSA的一般访问结构的秘密共享方案"", 《合肥工业大学学报(自然科学版)》 * |
李栓保: ""单云服务提供者环境下的随机化属性保护研究"", 《郑州大学学报(工学版)》 * |
李梦慧 等: ""基于分组的理性秘密共享方案"", 《密码学报》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109033832A (en) * | 2018-06-22 | 2018-12-18 | 深圳前海益链网络科技有限公司 | A method of prevention carries out of short duration bifurcated honeysuckle to block chain network and attacks |
CN109033832B (en) * | 2018-06-22 | 2021-02-09 | 深圳前海益链网络科技有限公司 | Method for preventing transient bifurcation double-flower attack on block chain network |
CN110599140A (en) * | 2019-08-29 | 2019-12-20 | 中国人民银行数字货币研究所 | Digital currency verification method and system |
CN110599140B (en) * | 2019-08-29 | 2022-05-24 | 中国人民银行数字货币研究所 | Digital currency verification method and system |
CN112036847A (en) * | 2020-08-05 | 2020-12-04 | 杭州云象网络技术有限公司 | Anti-counterfeiting verification method and system for offline payment of digital currency |
CN112711742A (en) * | 2020-11-23 | 2021-04-27 | 中国联合网络通信集团有限公司 | Digital currency anti-counterfeiting method and device |
CN112711742B (en) * | 2020-11-23 | 2023-06-06 | 中国联合网络通信集团有限公司 | Digital currency anti-counterfeiting method and device |
CN112732288A (en) * | 2020-12-11 | 2021-04-30 | 北京握奇智能科技有限公司 | Method and device for upgrading application of digital currency hardware wallet |
CN112732288B (en) * | 2020-12-11 | 2024-05-28 | 北京握奇智能科技有限公司 | Method and device for upgrading digital currency hardware wallet application |
WO2023066197A1 (en) * | 2021-10-19 | 2023-04-27 | 中国人民银行数字货币研究所 | Method and device for verifying abnormal digital currency transaction |
Also Published As
Publication number | Publication date |
---|---|
CN107908932B (en) | 2020-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111008836B (en) | Privacy security transfer payment method, device, system and storage medium | |
Franco | Understanding Bitcoin: Cryptography, engineering and economics | |
CN107908932A (en) | A kind of digital cash based on L algorithms is false proof and verification method, system and equipment | |
Dilley et al. | Strong federations: An interoperable blockchain solution to centralized third-party risks | |
US5712913A (en) | Limited-traceability systems | |
Law et al. | How to make a mint: the cryptography of anonymous electronic cash | |
Barber et al. | Bitter to better—how to make bitcoin a better currency | |
CN109325747B (en) | Remittance method and device based on block chain | |
EP3676988A1 (en) | Systems and methods for communication, storage and processing of data provided by an entity over a blockchain network | |
CN109905360A (en) | Data verification method and terminal device | |
CN107257284A (en) | A kind of method and apparatus for carrying out virtual card transaction | |
Konheim | Automated teller machines: their history and authentication protocols | |
CN111523892A (en) | Block chain cross-chain transaction method and device | |
Malhotra | Bitcoin Protocol: Model of ‘Cryptographic Proof’Based Global Crypto-Currency & Electronic Payments System | |
Brands | Electronic Cash. | |
Ogiela et al. | Protocol for detection of counterfeit transactions in electronic currency exchange | |
CN113793149B (en) | Off-line transaction authentication system, method, central server and client | |
WO2023091781A1 (en) | Digital currency | |
Mokhtari | Digital Money Methods Based On Public Insurance Tools | |
Razzaque et al. | Enhancing E-Voting Security with Blockchain-Backed Decentralized Authorization | |
Espedal et al. | Design Choices for Offline Transactions in a Norwegian Central Bank Digital Currency | |
Huang | The CIA Properties of Web3 System | |
Alam | Information and Communication Technology Cryptography | |
CN115619548A (en) | Privacy protection method, system and storage medium for transactions in alliance chain | |
Kashyap et al. | Cryptocurrencies as Financial Assets A Cross-Section |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200417 Address after: 100016 No. 8, xiaoyunli, Chaoyang District, Beijing 2011 Applicant after: Lv Wenhua Address before: No. 806, 33 floor, Xiao Nanzhuang, Haidian District, Beijing Applicant before: Wan Hai Jia |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |