CN107908932A - A kind of digital cash based on L algorithms is false proof and verification method, system and equipment - Google Patents

A kind of digital cash based on L algorithms is false proof and verification method, system and equipment Download PDF

Info

Publication number
CN107908932A
CN107908932A CN201711301230.1A CN201711301230A CN107908932A CN 107908932 A CN107908932 A CN 107908932A CN 201711301230 A CN201711301230 A CN 201711301230A CN 107908932 A CN107908932 A CN 107908932A
Authority
CN
China
Prior art keywords
digital cash
key
receiving terminal
trusted party
counterfoil
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711301230.1A
Other languages
Chinese (zh)
Other versions
CN107908932B (en
Inventor
吕文华
宛海加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lv Wenhua
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201711301230.1A priority Critical patent/CN107908932B/en
Publication of CN107908932A publication Critical patent/CN107908932A/en
Application granted granted Critical
Publication of CN107908932B publication Critical patent/CN107908932B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of digital cash based on L algorithms is false proof and verification method, system and equipment, including:The user key for digital cash key and the nonterminal storage for the corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil key of trusted party, being stored in digital cash;Transmitting terminal once updates digital cash key, circulates offline to receiving terminal after generating digital cash ciphertext;Receiving terminal performs local money-checking verification digital cash authenticity, is proved to be successful, and secondary renewal is carried out to digital cash key, sends the first signature and coin information to trusted party and verifies;Trusted party proofing state validity, is proved to be successful, and the second signature is verified, is proved to be successful, digital cash key is updated.Present invention reduces the security risk of honeysuckle;Avoid the false proof caused mass data download problem of book keeping operation formula;Reduce with the risk of private key for user managing digital assets, it is safe.

Description

A kind of digital cash based on L algorithms is false proof and verification method, system and equipment
Technical field
The present invention relates to field of information security technology, more particularly to a kind of digital cash based on L algorithms is false proof and verifies Method, system and equipment.
Background technology
With the development of computer information technology, the research of digital cash is gradually into current techniques hot spot.It is different from bank note, number For word currency without medium made of paper, substantially can be said to is one section of digital information for removing medium, how to ensure that this piece of digital is believed Breath can only be used by its current holder, it is impossible to which it is matter of utmost importance that digital cash is faced to be usurped by other people.With photo and The digitlization of music is compared, and the digitlization of currency is not only simply records pattern or word in digital form.Number Word currency must take into consideration currency security and transaction security, and therefore, the digitlization of currency is not only to use mathematical method by currency Pattern and text conversion are digital information, it is also necessary to carry out safeguard protection to digitized information with cryptography method. It can really make digital cash that there is anti-counterfeiting, anti-tamper, anti-copying ability.Therefore, it is necessary to ensure to count using anti-counterfeiting technology Word currency is in the real effectiveness of intermediate links, characteristic of the guarantee digital cash with tamper-proof and anti-multiplexing.
It is well known that it is currently false proof using the progress of block chain technology by the digital cash of representative of bit coin, in simple terms, Achieve the purpose that " whole people's witness " by being broadcasted to the whole network, so as to ensure that the source of digital cash and whereabouts are all truly to have Effect.Source authenticity refer to the digital cash received by debit be as transmitted by its legitimate holder, be not forge or Usurp;The true sex index word currency of whereabouts cannot be sent simultaneously to multiple recipients, and the fraudulent mean for being multiplexed transmission is known as Honeysuckle (dual cost).
Although block chain technology can solve anti-pseudo problem to a certain extent, in effective, availability and security Etc. existing defects.
First, block chain technology is realized " whole people's witness " by knowing together algorithm, and common recognition algorithm mainly includes workload and demonstrate,proves Explicit law (Proof Of Work, PoW) and rights and interests method of verification (Proof of Stake, PoS).Wherein, based on PoW common recognition processes Block chain mainly faces is 51% attack problem, i.e., node is just had the ability successfully by grasping calculation power of the whole network more than 51% Distort and forge block chain data.51% attack is solved the problems, such as based on PoS common recognition processes to a certain extent, but is also drawn at the same time N@S (Nothing at stake) attack problems during block bifurcated are entered.In addition, as computer calculates the enhancing of power, it is based on It is also increasingly simpler to find the problem that random number competition book keeping operation is weighed, up to the present, bit coin official website is issued specially for this for cut-off The notice of 6 confirmations is needed so that user attacks from honeysuckle.Thus, the actual effect of " whole people's witness " is more and more lower, largely not true Recognize transaction accumulation cause a transaction may ten it is more than hour even a talentes can confirm that.
Secondly, each node preserves a data backup in block chain requirement system, this is for growing magnanimity number According to being extremely difficult for storage.General ledger is first downloaded before one bit coin wallet use, being downloaded using common computer is needed Take several days time (about 60G).If bit coin pattern is applied to financial field or the field of other black volumes, system pressure Power and bandwidth occupancy will expend great resource, and the demand of resource is even difficult to estimate.
Finally, a part for bit coin network is become, it is necessary to have the address of a reception fund.Block chain uses Public key cryptography, and address is the public key hash derived from from private key for user.The private key of user is once lost, corresponding money Ownership is produced also by whole loss, therefore there are safety risks.
The defects of making a general survey of block chain anti-counterfeiting technology, its question classification are to have ignored digital cash in itself in the anti-of intermediate links Puppet value, is difficult to solve anti-pseudo problem only by book keeping operation.
The content of the invention
In order to solve the above-mentioned technical problem, it is a primary object of the present invention to provide a kind of digital cash based on L algorithms False proof and verification method, system and equipment, L algorithms be based on Lagrange's interpolation (Lagrange Interpolation), By constructing polynomial method, the computing of function is decoupled into the distributed arithmetic entirety being made of multinode, it is final logical The algorithm that interpolation method obtains the operation result identical with object function is crossed, the present invention is potential by fully excavating digital cash itself Anti-fake effect, design the L algorithm secret key systems in units of coin.Its own key code system is only designed in units of coin, The anti-fake effect of digital cash in itself could directly be played;In addition, in units of coin also by scattered risks to minimize, even if one The key code system of piece digital cash is cracked, other digital cash will not be impacted.
The present invention is merged digital information (currency) with bank settlement instrument, back-end platform, is not changing computing knot Change calculating process on the premise of fruit, calculating process is decoupled and is fused to digital cash, the means of payment (paying side), the means of payment How false proof cryptographic technique scheme in the distributed arithmetic entirety that (debit), back-end platform are formed, solve digital cash Technical barrier, reduces the security risk of honeysuckle, while alleviates the surge pressure of system again, and on-line interaction is few, effective high; Digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused mass data of the book keeping operation formula such as block chain from downloading Problem, availability are strong;False proof key code system design in units of coin, reduces with the wind of private key for user managing digital assets Danger, it is safe.
In order to achieve the above object, one aspect of the present invention provide a kind of digital cash based on L algorithms it is false proof and verification Method, this method include:
Step 1: the corresponding false proof key of digital cash public key that trusted party is stored is split as being stored in trusted party Counterfoil key, the digital cash key that is stored in digital cash and the user key of nonterminal storage;
Step 2: the reception that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage End undated parameter once updates digital cash key, using the receiving terminal encrypted public key of receiving terminal transmission by digital cash It is offline after encryption generation digital cash ciphertext in plain text to circulate to receiving terminal;
Step 3: receiving terminal recovers digital cash in plain text using receiving terminal encryption key, local money-checking verification numeral is performed Currency authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal passes through the numeral that receives Digital cash key, receiving terminal undated parameter and the receiving terminal user key after once renewal in currency is to digital cash key Secondary renewal is carried out, the first signature calculated the digital cash after renewal is sent and coin information to trusted party is verified;
Step 4: trusted party by coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed, then Return to mistake and stop flow, be such as proved to be successful, trusted party docks received first signature by the counterfoil key of storage to be counted Calculate the second signature;The second signature is verified by the digital cash public key of storage, such as authentication failed, then in returning to mistake simultaneously Fluid stopping journey, is such as proved to be successful, the number that generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash key in word currency is updated.
Further, in the step 1, the corresponding false proof key of digital cash public key of trusted party storage is full Sufficient relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is ellipse The basic point of circular curve.
Further, the step 2 specifically includes:
Digital cash key is once updated to L3=(aL1·aL2·u)mod n;
Wherein, aL1Digital cash key for transmitting terminal by storage, aL2For transmitting terminal user key, u sends out for receiving terminal The receiving terminal undated parameter sent, is the random number in prime field, and n is the rank of elliptic curve;
Digital cash ciphertext C=SM2 (Q, M);
Wherein, Q is the receiving terminal encrypted public key that receiving terminal is sent, and M is digital cash plaintext, and C is offline circulation to reception The digital cash ciphertext at end.
Further, before step 2, further include:
Receiving terminal randomly generates digital cash key updating parameter u ∈ [1, n-1] based on deal engagement, wherein, u is prime field Interior random number, n are the rank of elliptic curve;
Receiving terminal encryption key k ∈ [1, n-1] are randomly generated, and receiving terminal encryption public affairs are calculated based on receiving terminal encryption key Key Q=[k] G;
Receiving terminal undated parameter u, receiving terminal encrypted public key Q are sent to transmitting terminal.
Further, the step 3 specifically includes:
Receiving terminal recovers digital cash plaintext M=SM2 using receiving terminal encryption key k-1(k, C), performs local money-checking and tests Digital cash authenticity is demonstrate,proved, such as authentication failed, then prompting is wrong and stops flow;Wherein, M is digital cash plaintext, and k is reception Encryption key is held, C is digital cash ciphertext of the offline circulation to receiving terminal;
Such as it is proved to be successful, by the secondary renewal L of digital cash key4=(L3·bL2 -1·u-1) mod n, wherein, L3For same number Digital cash key after the once renewal that word currency circulates offline together, bL2It is the user key of receiving terminal;
Summary e=SM3 (M) is calculated digital cash static content, and the digital cash static content is not include key The digital cash plaintext M in domain;
Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1For the abscissa of receiving terminal encrypted public key Q Value;
Second son signature bS=((L are calculated based on the first son signature r4·bL2)(k+r))mod n;
First is signed (r, bS), and the information such as coin number is sent to trusted party online validation.
Further, the step 4 specifically includes:
Trusted party retrieves digital cash counterfoil by coin number, and proofing state validity, such as authentication failed, then return to mistake And stop flow, such as it is proved to be successful,
Calculate the second signature s=(bSaL0- r) mod n, wherein aL0For counterfoil key;
Using the digital cash public key of storage to signature (r, s) verification, such as authentication failed, then return to wrong and middle fluid stopping Journey;Such as it is proved to be successful,
Randomly generate counterfoil key updating parameter v ∈ [1, n-1];
It is bL by counterfoil key updating0=(aL0·v-1)mod n;
Counterfoil key updating parameter v is returned into receiving terminal.
Further, further included after undated parameter v being returned to receiving terminal:
The key updating of receiving terminal digital cash is bL by counterfoil key updating parameter v by receiving terminal1=(L4·v)mod n。
Another aspect of the present invention additionally provides that a kind of digital cash based on L algorithms is false proof and verification method, this method bag Include:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
Transmitting terminal updates ginseng by the receiving terminal that the digital cash key, transmitting terminal user key and receiving terminal of storage are sent It is several that digital cash key is once updated, digital cash is encrypted in plain text using the receiving terminal encrypted public key that receiving terminal is sent Circulate offline to receiving terminal after generating digital cash ciphertext;So that receiving terminal is bright using receiving terminal encryption key recovery digital cash Text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, Receiving terminal passes through digital cash key, receiving terminal undated parameter and the receiving terminal after once updating in the digital cash that receives User key carries out secondary renewal to digital cash key, sends the first signature and coin calculated the digital cash after renewal Number information to trusted party is verified;So that trusted party retrieves digital cash counterfoil by coin number, proofing state validity, is such as tested Card failure, then return to mistake and stop flow, be such as proved to be successful, and trusted party docks received the by the counterfoil key of storage One signature calculation second is signed;Such as authentication failed, then, which return, to be verified to the second signature by the digital cash public key of storage Mistake simultaneously stops flow, is such as proved to be successful, and generates trusted party undated parameter by the counterfoil key and receiving terminal of the digital cash Digital cash key in the digital cash of storage is updated.
Another aspect of the present invention additionally provides that a kind of digital cash based on L algorithms is false proof and verification method, this method bag Include:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
The digital cash ciphertext that receiving terminal is sent transmitting terminal using receiving terminal encryption key recovers digital cash in plain text, holds Row local money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receives End passes through the digital cash key after the once renewal in the digital cash received, receiving terminal undated parameter and receives end subscriber Key carries out secondary renewal to digital cash key, sends the first signature and coin number letter calculated the digital cash after renewal Breath to trusted party is verified;Digital cash counterfoil is retrieved centrally through coin number so as to credible, proofing state validity, such as verification are lost Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash in digital cash key be updated;
The step of digital cash ciphertext that the transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, The receiving terminal undated parameter that transmitting terminal user key and receiving terminal are sent once updates digital cash key, uses reception The receiving terminal encrypted public key of transmission is held to circulate offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
Another aspect of the present invention additionally provides that a kind of digital cash based on L algorithms is false proof and verification method, this method bag Include:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
The coin number that trusted party is sent by receiving terminal retrieves digital cash counterfoil, and proofing state validity, such as verification are lost Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash in digital cash key be updated;
The step of coin that the receiving terminal is sent, includes:What receiving terminal was sent transmitting terminal using receiving terminal encryption key Digital cash ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt Mistake simultaneously stops flow;Such as it is proved to be successful, receiving terminal passes through the digital cash after once updating in the digital cash that receives Key, receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to after renewal The first signature and coin information to trusted party that digital cash calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, send The receiving terminal undated parameter that end subscriber key and receiving terminal are sent once updates digital cash key, is sent out using receiving terminal The receiving terminal encrypted public key sent circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
Another aspect of the present invention additionally provide a kind of digital cash based on L algorithms it is false proof and verification system, the system bag Include key code system, transmitting terminal, receiving terminal and trusted party:
The key code system, the corresponding false proof key of digital cash public key for trusted party to be stored are split as storing The user key of counterfoil key in trusted party, the digital cash key being stored in digital cash and nonterminal storage;
The transmitting terminal, connects for what is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage Receiving end undated parameter once updates digital cash key, and the receiving terminal encrypted public key sent using receiving terminal is by digital goods Coin circulates to receiving terminal offline after encryption generates digital cash ciphertext in plain text;
The receiving terminal, for recovering digital cash in plain text using receiving terminal encryption key, performs local money-checking verification number Word currency authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal passes through the number that receives The digital cash key after once renewal, receiving terminal undated parameter and receiving terminal user key in word currency is close to digital cash Key carries out secondary renewal, sends the first signature calculated the digital cash after renewal and coin information to trusted party is tested Card;
The trusted party, for by coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed, Then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first signature by the counterfoil key of storage Calculate the second signature;Such as authentication failed, then, which return to mistake simultaneously, to be verified to the second signature by the digital cash public key of storage Stop flow, be such as proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash key in digital cash is updated.
Further, in the key code system, the corresponding false proof key of digital cash public key of trusted party storage, Meet that relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is ellipse The basic point of circular curve.
Further, the transmitting terminal, specifically includes:
Updating block, for digital cash key to be once updated to L3=(aL1·aL2·u)mod n;Wherein, aL1Digital cash key for transmitting terminal by storage, aL2For transmitting terminal user key, u be receiving terminal that receiving terminal is sent more New parameter, is the random number in prime field, and n is the rank of elliptic curve;
Encryption unit, for digital cash to be encrypted as digital cash ciphertext C=SM2 (Q, M) in plain text;Wherein, Q is reception The receiving terminal encrypted public key sent is held, for digital cash in plain text, C is digital cash ciphertext of the offline circulation to receiving terminal to M.
Further, receiving terminal, including:
Receiving terminal generation unit, for randomly generating digital cash key updating parameter u based on deal engagement in receiving terminal ∈ [1, n-1], wherein, u is the random number in prime field, and n is the rank of elliptic curve;Randomly generate receiving terminal encryption key k ∈ [1, N-1], and receiving terminal encrypted public key Q=[k] G is calculated based on receiving terminal encryption key;
First transmitting element, for receiving terminal undated parameter u, receiving terminal encrypted public key Q to be sent to transmitting terminal.
Further, the receiving terminal, further includes:
First authentication unit, for recovering digital cash plaintext M=SM2 using receiving terminal encryption key-1(k, C), performs Local money-checking verifies digital cash authenticity, and such as authentication failed, then prompting is wrong and stops flow;Wherein, M is bright for digital cash Text, k are receiving terminal encryption key, and C is digital cash ciphertext of the offline circulation to receiving terminal;
Secondary updating block, for when the first authentication unit is such as proved to be successful, by the secondary renewal L of digital cash key4 =(L3·bL2 -1·u-1) mod n, wherein, L3Digital cash after the once renewal to circulate offline together for same digital cash is close Key, bL2It is the user key of receiving terminal;
First computing unit, for calculating digital cash static content summary e=SM3 (M), the digital cash is static Content is not include the digital cash plaintext M in key domain;Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1 For the abscissa value of receiving terminal encrypted public key Q;Second son signature bS=((L are calculated based on the first son signature r4·bL2)(k+r)) mod n;
Second transmitting element, for first to be signed (r, bS), and the information such as coin number is sent to trusted party online validation.
Further, the trusted party, specifically includes:
Second authentication unit, for by coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed, Then return to mistake and stop flow;
Second computing unit, for when the second authentication unit is proved to be successful, calculating the second signature s=(bSaL0–r) Mod n, wherein aL0For counterfoil key;
3rd authentication unit, for using storage digital cash public key to sign (r, s) sign test, such as authentication failed, then Return to mistake and stop flow;
Trusted party updating block, for when the 3rd authentication unit is proved to be successful, randomly generating counterfoil key updating ginseng Number v ∈ [1, n-1];It is bL by counterfoil key updating0=(aL0·v-1)mod n;
3rd transmitting element, for counterfoil key updating parameter v to be returned receiving terminal.
Further, receiving terminal further includes:
Receiving terminal updating block, for by the key updating of receiving terminal digital cash being bL based on counterfoil key updating parameter1 =(L4·v)mod n。
Another aspect of the present invention additionally provide a kind of digital cash based on L algorithms it is false proof and verification system, the system bag Include:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored is split as being stored in can The user key of the counterfoil key at letter center, the digital cash key being stored in digital cash and nonterminal storage;
Transmitting terminal, for the receiving terminal sent by the digital cash key, transmitting terminal user key and receiving terminal of storage Undated parameter once updates digital cash key, and the receiving terminal encrypted public key sent using receiving terminal is bright by digital cash It is offline after text encryption generation digital cash ciphertext to circulate to receiving terminal;So that receiving terminal recovers numeral using receiving terminal encryption key Currency in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt mistake and stop flow;Such as test Demonstrate,prove successfully, receiving terminal passes through the digital cash key after once updating in the digital cash that receives, receiving terminal undated parameter Secondary renewal is carried out to digital cash key with receiving terminal user key, sends the first label calculated the digital cash after renewal Name and coin information to trusted party are verified;So that trusted party retrieves digital cash counterfoil by coin number, proofing state has Effect property, such as authentication failed, then return to mistake and stop flow, be such as proved to be successful, the counterfoil key pair that trusted party passes through storage The first signature calculation second received is signed;The second signature is verified by the digital cash public key of storage, is such as verified Failure, then return to mistake and stop flow, be such as proved to be successful, generation trusted party undated parameter is close by the counterfoil of the digital cash Digital cash key in key and the digital cash of receiving terminal storage is updated.
Another aspect of the present invention additionally provide a kind of digital cash based on L algorithms it is false proof and verification system, the system bag Include:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored is split as being stored in can The user key of the counterfoil key at letter center, the digital cash key being stored in digital cash and nonterminal storage;
Receiving terminal, it is bright that the digital cash ciphertext for being sent transmitting terminal using receiving terminal encryption key recovers digital cash Text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, Receiving terminal passes through digital cash key, receiving terminal undated parameter and the receiving terminal after once updating in the digital cash that receives User key carries out secondary renewal to digital cash key, sends the first signature and coin calculated the digital cash after renewal Number information to trusted party is verified;Digital cash counterfoil is retrieved centrally through coin number so as to credible, proofing state validity, is such as tested Card failure, then return to mistake and stop flow, be such as proved to be successful, and trusted party docks received the by the counterfoil key of storage One signature calculation second is signed;Such as authentication failed, then, which return, to be verified to the second signature by the digital cash public key of storage Mistake simultaneously stops flow, is such as proved to be successful, and generates trusted party undated parameter by the counterfoil key and receiving terminal of the digital cash Digital cash key in the digital cash of storage is updated;The step of digital cash ciphertext that the transmitting terminal is sent, wraps Include:The receiving terminal undated parameter pair that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage Digital cash key is once updated, and using the receiving terminal encrypted public key that receiving terminal is sent, by digital cash, encryption generates in plain text It is offline after digital cash ciphertext to circulate to receiving terminal.
Another aspect of the present invention additionally provide a kind of digital cash based on L algorithms it is false proof and verification system, the system bag Include:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored is split as being stored in can The user key of the counterfoil key at letter center, the digital cash key being stored in digital cash and nonterminal storage;
Trusted party, the coin number for being sent by receiving terminal retrieve digital cash counterfoil, and proofing state validity, is such as tested Card failure, then return to mistake and stop flow, be such as proved to be successful, and trusted party docks received the by the counterfoil key of storage One signature calculation second is signed;Such as authentication failed, then, which return, to be verified to the second signature by the digital cash public key of storage Mistake simultaneously stops flow, is such as proved to be successful, and generates trusted party undated parameter by the counterfoil key and receiving terminal of the digital cash Digital cash key in the digital cash of storage is updated;
The step of coin that the receiving terminal is sent, includes:What receiving terminal was sent transmitting terminal using receiving terminal encryption key Digital cash ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt Mistake simultaneously stops flow;Such as it is proved to be successful, receiving terminal passes through the digital cash after once updating in the digital cash that receives Key, receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to after renewal The first signature and coin information to trusted party that digital cash calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, send The receiving terminal undated parameter that end subscriber key and receiving terminal are sent once updates digital cash key, is sent out using receiving terminal The receiving terminal encrypted public key sent circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
Another aspect of the present invention additionally provides that a kind of digital cash based on L algorithms is false proof and verification equipment, including foregoing One of described in system.
The present invention provides a kind of digital cash based on L algorithms is false proof and verification method, system and equipment, with independent digit Word currency for unit build the false proof key code system of digital cash, by false proof key be distributed to digital cash, holder and it is credible in In heart back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from current Change of the holder to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed Process, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed Among formula computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Brief description of the drawings
Fig. 1 be according to the present invention a kind of digital cash based on L algorithms is false proof and the stream of the embodiment of verification method one Cheng Tu;
Fig. 2 is false proof and the embodiment five of verification system is shown according to a kind of digital cash based on L algorithms of the present invention It is intended to;
Fig. 3 is false proof and the embodiment five of verification system is shown according to a kind of digital cash based on L algorithms of the present invention It is intended to;
Fig. 4 is false proof and the embodiment five of verification system is shown according to a kind of digital cash based on L algorithms of the present invention It is intended to;
Fig. 5 is false proof and the embodiment five of verification system is shown according to a kind of digital cash based on L algorithms of the present invention It is intended to.
Embodiment
Two classes can be substantially divided into the method for important information protection, one kind is " Tibetan ", and one kind is " close ".Illustrate:" Tibetan " Refer to certain important information being hidden in box, then box is hidden in cabinet, cabinet is being embedded to certain place deep in the mountains.And " close " is then Be by certain important information calculation be other information, without physical medium." close " is a kind of higher level " Tibetan " in other words, is It is a kind of it is soft conceal (mathematics, cryptographic algorithm), and non-rigid conceal (by physical unit).
" digitlization " its essence is exactly " removing medium ", and digital cash is as the same.Currency moves towards digitlization from papery, inevitable first Soft " close " is selected to do false proof protection and business safety control, rather than " Tibetan " of hardness.The scheme of hardware protection that be not Digital cash, conventional currency is only transformed to another medium from a kind of medium, changes paper into chip by that.Letter Single says:Digital cash it should be just string number ciphertext.It can be sent, is received, is stored, it have anti-counterfeiting, Anti-tamper, anti-copying ability.Therefore, digital cash be unable to do without cryptographic algorithm as support and ensures.Specifically, in method Determine in the design of digital cash in itself, it is necessary to the specific expression-form of the legal digital cash of cryptography theories integration, to ensure The negotiability of digital cash, storability, unforgeable, the not reproducible transactional characteristic such as with non repudiation.
Money-checking is the important step in paper bank note payment scene, since digital information has the spy for being easier to replicate Property, thus the encryption of digital cash and verification and the most important thing of digital cash technology.The embodiment of the present invention is based on L algorithms, Change calculating process on the premise of operation result is not changed.Calculating process is decoupled and is fused to digital cash, the means of payment The distributed arithmetic that (paying side or transmitting terminal), the means of payment (debit or receiving terminal), back-end platform (trusted party) are formed is overall In.Digital cash user security is ensured by cryptographic algorithm, controllable anonymity scheme is established by technological means again, calculates knot Fruit is equivalent to digital cash from when antecessor is to the transformation of new holder, while realizes tracing under certain condition, into one Step strengthens legal digital cash security., below will knot in order to make those skilled in the art more fully understand the present invention program The attached drawing in the embodiment of the present invention is closed, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that institute The embodiment of description is only the embodiment of a present invention part, instead of all the embodiments.Based on the implementation in the present invention Example, those of ordinary skill in the art's all other embodiments obtained without making creative work, all should Belong to the scope of protection of the invention.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, " Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that so use Data can exchange in the appropriate case, so as to the embodiment of the present invention described herein can with except illustrating herein or Order beyond those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment Those steps or unit clearly listed, but may include not list clearly or for these processes, method, product Or the intrinsic other steps of equipment or unit.
Embodiment one
With reference to Fig. 1, Fig. 1 shows that a kind of digital cash based on L algorithms provided by the invention is false proof and verification method The flow chart of one embodiment.This method includes:Step 1 is to step 4.
Step 1: the corresponding false proof key of digital cash public key that trusted party is stored is split as being stored in trusted party Counterfoil key, the digital cash key that is stored in digital cash and the user key of nonterminal storage.
Wherein, the corresponding false proof key of the digital cash public key of trusted party storage, meets that relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is ellipse The basic point of circular curve.Necessary three key all computings are correct, could be achieveed the purpose that false proof by public key verifications.
Wherein, the counterfoil key of trusted party is stored in, for fake certification;
The digital cash key being stored in digital cash, is the part in digital cash information, with digital cash one Play circulation;
The user key of nonterminal storage, is the secret information of digital cash current holder, such as password code etc., deposits Storage does not store in the terminal in the brain of user.
Step 2: the reception that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage End undated parameter once updates digital cash key, using the receiving terminal encrypted public key of receiving terminal transmission by digital cash It is offline after encryption generation digital cash ciphertext in plain text to circulate to receiving terminal.
Wherein, digital cash key is once updated to L3=(aL1·aL2·u)mod n;
Wherein, aL1Digital cash key for transmitting terminal by storage, aL2For transmitting terminal user key, u sends out for receiving terminal The receiving terminal undated parameter sent, is the random number in prime field, and n is the rank of elliptic curve;
Digital cash ciphertext C=SM2 (Q, M);
Wherein, Q is the receiving terminal encrypted public key that receiving terminal is sent, and M is digital cash plaintext, and C is offline circulation to reception The digital cash ciphertext at end
Wherein, before step 2, further include:
Receiving terminal randomly generates digital cash key updating parameter u ∈ [1, n-1] based on deal engagement, wherein, u is prime field Interior random number, n are the rank of elliptic curve;
Receiving terminal encryption key k ∈ [1, n-1] are randomly generated, and receiving terminal encryption public affairs are calculated based on receiving terminal encryption key Key Q=[k] G;
Receiving terminal undated parameter u, receiving terminal encrypted public key Q are sent to transmitting terminal.
Step 3: receiving terminal recovers digital cash in plain text using receiving terminal encryption key, local money-checking verification numeral is performed Currency authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal passes through the numeral that receives Digital cash key, receiving terminal undated parameter and the receiving terminal user key after once renewal in currency is to digital cash key Secondary renewal is carried out, the first signature calculated the digital cash after renewal is sent and coin information to trusted party is verified.
Wherein, receiving terminal recovers digital cash plaintext M=SM2 using receiving terminal encryption key k-1(k, C), performs local test Paper money verifies digital cash authenticity, and such as authentication failed, then prompting is wrong and stops flow;Wherein, M is digital cash plaintext, and k is Receiving terminal encryption key, C are digital cash ciphertext of the offline circulation to receiving terminal;
Such as it is proved to be successful, by the secondary renewal L of digital cash key4=(L3·bL2 -1·u-1) mod n, wherein, L3For same number Digital cash key after the once renewal that word currency circulates offline together, bL2It is the user key of receiving terminal;
Summary e=SM3 (M) is calculated digital cash static content, and the digital cash static content is not include key The digital cash plaintext M in domain;
Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1For the abscissa of receiving terminal encrypted public key Q Value;
Based on the first sub- of signature calculation second signature bS=((L4·bL2)(k+r))mod n;
First is signed (r, bS), and the information such as coin number is sent to trusted party online validation.
Step 4: trusted party by coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed, then Return to mistake and stop flow, be such as proved to be successful, trusted party docks received first signature by the counterfoil key of storage to be counted Calculate the second signature;The second signature is verified by the digital cash public key of storage, such as authentication failed, then in returning to mistake simultaneously Fluid stopping journey, is such as proved to be successful, the number that generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash key in word currency is updated.
Wherein, trusted party retrieves digital cash counterfoil by coin number, and proofing state validity, such as authentication failed, then return Return mistake and stop flow, be such as proved to be successful,
Calculate the second signature s=(bSaL0- r) mod n, wherein aL0For counterfoil key;
Using the digital cash public key of storage to signature (r, s) verification, such as authentication failed, then return to wrong and middle fluid stopping Journey;Such as it is proved to be successful,
Randomly generate counterfoil key updating parameter v ∈ [1, n-1];
It is bL by counterfoil key updating0=(aL0·v-1)mod n;
Counterfoil key updating parameter v is returned into receiving terminal.
Further, further included after undated parameter v being returned to receiving terminal:
The key updating of receiving terminal digital cash is bL by counterfoil key updating parameter v by receiving terminal1=(L4·v)mod n。
It is real by the form statement present invention of form in order to become apparent from the concrete technical scheme of the explanation embodiment of the present invention one Apply independent digit currency in example one circulate offline, the false proof condition passed through of online money-checking process:
Table 1
The embodiment of the present invention one provides that a kind of digital cash based on L algorithms is false proof and verification method, with independent digit Currency builds the false proof key code system of digital cash for unit, and false proof key is distributed to digital cash, holder and trusted party In back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from currently and hold Change of the someone to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed Journey, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed Among computing entirety, realization is more difficult to distort, is more convenient online and offline operation, visual stronger, the more extensive mode of channel Operation;A set of brand-new ecosystem can be built again at the same time.And the complementarity by both forms to a certain extent, not Can preferentially it be used with application scenarios to meet different demands.Its core is that digital cash is only participate in distributed arithmetic one A cell mesh, integral operation can not be participated in again once this arithmetic element is tampered, or perhaps destroys distributed fortune Calculate overall.It is achieved thereby that possess as a piece of digital information (ciphertext) can be by any medium transmission for digital cash Security reliability.
It is subject to the distributed arithmetic formula of a coin number, its operation result pertains only to the fake certification of the digital cash. The digital cash of different coin number or other receipt and payment instruments are not current distributed arithmetic members, can not participate in, cannot intercept and capture, can not Disturb this distributed arithmetic.It is achieved thereby that on the premise of any additional firmware equipment is not depended on, pass through cryptographic algorithm A piece of digital information (digital cash) tool anti-counterfeiting, anti-tamper, anti-multiplexing, tamper-proof, antifraud, anti-technical robber is set to rob etc. oneself Body protective capability.
By between (transmitting terminal) and new holder's (receiving terminal) of digital cash (digital information) and current holder Closely merged with cryptographic algorithm, the digital cash of a payment transaction circulates its behind actually distributed arithmetic form Cryptography is calculated.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Embodiment two
The embodiment of the present invention two provides that a kind of digital cash based on L algorithms is false proof and verification method, and this method is to send out Sending end side is illustrated, and this method includes:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
Transmitting terminal updates ginseng by the receiving terminal that the digital cash key, transmitting terminal user key and receiving terminal of storage are sent It is several that digital cash key is once updated, digital cash is encrypted in plain text using the receiving terminal encrypted public key that receiving terminal is sent Circulate offline to receiving terminal after generating digital cash ciphertext;So that receiving terminal is bright using receiving terminal encryption key recovery digital cash Text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, Receiving terminal passes through digital cash key, receiving terminal undated parameter and the receiving terminal after once updating in the digital cash that receives User key carries out secondary renewal to digital cash key, sends the first signature and coin calculated the digital cash after renewal Number information to trusted party is verified;So that trusted party retrieves digital cash counterfoil by coin number, proofing state validity, is such as tested Card failure, then return to mistake and stop flow, be such as proved to be successful, and trusted party docks received the by the counterfoil key of storage One signature calculation second is signed;Such as authentication failed, then, which return, to be verified to the second signature by the digital cash public key of storage Mistake simultaneously stops flow, is such as proved to be successful, and generates trusted party undated parameter by the counterfoil key and receiving terminal of the digital cash Digital cash key in the digital cash of storage is updated.
Since the step disclosed in the method for the present embodiment two and function essentially correspond to the method shown in embodiment one Embodiment, principle and example, are only unilateral protected mode, therefore not detailed part in the description of the present embodiment, be may refer to foregoing Related description in embodiment, this will not be repeated here.
The embodiment of the present invention two provides that a kind of digital cash based on L algorithms is false proof and verification method, with independent digit Currency builds the false proof key code system of digital cash for unit, and false proof key is distributed to digital cash, holder and trusted party In back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from currently and hold Change of the someone to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed Journey, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed Among computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Embodiment three
The embodiment of the present invention three provides that a kind of digital cash based on L algorithms is false proof and verification method, and this method is to connect Receiving end side is illustrated, and this method includes:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
The digital cash ciphertext that receiving terminal is sent transmitting terminal using receiving terminal encryption key recovers digital cash in plain text, holds Row local money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receives End passes through the digital cash key after the once renewal in the digital cash received, receiving terminal undated parameter and receives end subscriber Key carries out secondary renewal to digital cash key, sends the first signature and coin number letter calculated the digital cash after renewal Breath to trusted party is verified;Digital cash counterfoil is retrieved centrally through coin number so as to credible, proofing state validity, such as verification are lost Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash in digital cash key be updated;
The step of digital cash ciphertext that the transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, The receiving terminal undated parameter that transmitting terminal user key and receiving terminal are sent once updates digital cash key, uses reception The receiving terminal encrypted public key of transmission is held to circulate offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
Since the step disclosed in the method for the present embodiment three and function essentially correspond to the method shown in embodiment one Embodiment, principle and example, are only unilateral protected mode, therefore not detailed part in the description of the present embodiment, be may refer to foregoing Related description in embodiment, this will not be repeated here.
The embodiment of the present invention three provides that a kind of digital cash based on L algorithms is false proof and verification method, with independent digit Currency builds the false proof key code system of digital cash for unit, and false proof key is distributed to digital cash, holder and trusted party In back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from currently and hold Change of the someone to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed Journey, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed Among computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Example IV
The embodiment of the present invention four provides that a kind of digital cash based on L algorithms is false proof and verification method, and this method is with can Letter central side is illustrated, and this method includes:
The corresponding false proof key of digital cash public key that trusted party stores is split as being stored in the counterfoil of trusted party The user key of key, the digital cash key being stored in digital cash and nonterminal storage;
The coin number that trusted party is sent by receiving terminal retrieves digital cash counterfoil, and proofing state validity, such as verification are lost Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash in digital cash key be updated;
The step of coin that the receiving terminal is sent, includes:What receiving terminal was sent transmitting terminal using receiving terminal encryption key Digital cash ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt Mistake simultaneously stops flow;Such as it is proved to be successful, receiving terminal passes through the digital cash after once updating in the digital cash that receives Key, receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to after renewal The first signature and coin information to trusted party that digital cash calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, send The receiving terminal undated parameter that end subscriber key and receiving terminal are sent once updates digital cash key, is sent out using receiving terminal The receiving terminal encrypted public key sent circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
Since the step disclosed in the method for the present embodiment four and function essentially correspond to the method shown in embodiment one Embodiment, principle and example, are only unilateral protected mode, therefore not detailed part in the description of the present embodiment, be may refer to foregoing Related description in embodiment, this will not be repeated here.
The embodiment of the present invention four provides that a kind of digital cash based on L algorithms is false proof and verification method, with independent digit Currency builds the false proof key code system of digital cash for unit, and false proof key is distributed to digital cash, holder and trusted party In back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from currently and hold Change of the someone to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed Journey, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed Among computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Embodiment five
As shown in Fig. 2, the embodiment of the present invention five provide a kind of digital cash based on L algorithms it is false proof and verification system 200, which includes key code system 21, transmitting terminal 22, receiving terminal 23 and trusted party 24:
The key code system 21, the corresponding false proof key of digital cash public key for trusted party to be stored are split as depositing Store up the user key in counterfoil key, the digital cash key that is stored in digital cash and the nonterminal storage of trusted party;
The transmitting terminal 22, for what is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage Receiving terminal undated parameter once updates digital cash key, and the receiving terminal encrypted public key sent using receiving terminal is by numeral Currency circulates to receiving terminal offline after encryption generates digital cash ciphertext in plain text;
The receiving terminal 23, for recovering digital cash in plain text using receiving terminal encryption key, performs local money-checking verification Digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal is by receiving Digital cash key, receiving terminal undated parameter and the receiving terminal user key after once renewal in digital cash is to digital cash Key carries out secondary renewal, sends the first signature calculated the digital cash after renewal and coin information to trusted party is tested Card;
The trusted party 24, for retrieving digital cash counterfoil by coin number, proofing state validity, such as verification are lost Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash in digital cash key be updated.
Further, in the key code system, the corresponding false proof key of digital cash public key of trusted party storage, Meet that relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is ellipse The basic point of circular curve.
Further, the transmitting terminal, specifically includes:
Updating block, for digital cash key to be once updated to L3=(aL1·aL2·u)mod n;Wherein, aL1Digital cash key for transmitting terminal by storage, aL2For transmitting terminal user key, u be receiving terminal that receiving terminal is sent more New parameter, is the random number in prime field, and n is the rank of elliptic curve;
Encryption unit, for digital cash to be encrypted as digital cash ciphertext C=SM2 (Q, M) in plain text;Wherein, Q is reception The receiving terminal encrypted public key sent is held, for digital cash in plain text, C is digital cash ciphertext of the offline circulation to receiving terminal to M.
Further, receiving terminal, including:
Receiving terminal generation unit, for randomly generating digital cash key updating parameter u based on deal engagement in receiving terminal ∈ [1, n-1], wherein, u is the random number in prime field, and n is the rank of elliptic curve;Randomly generate receiving terminal encryption key k ∈ [1, N-1], and receiving terminal encrypted public key Q=[k] G is calculated based on receiving terminal encryption key;
First transmitting element, for receiving terminal undated parameter u, receiving terminal encrypted public key Q to be sent to transmitting terminal.
Further, the receiving terminal, further includes:
First authentication unit, for recovering digital cash plaintext M=SM2 using receiving terminal encryption key-1(k, C), performs Local money-checking verifies digital cash authenticity, and such as authentication failed, then prompting is wrong and stops flow;Wherein, M is bright for digital cash Text, k are receiving terminal encryption key, and C is digital cash ciphertext of the offline circulation to receiving terminal;
Secondary updating block, for when the first authentication unit is such as proved to be successful, by the secondary renewal L of digital cash key4 =(L3·bL2 -1·u-1) mod n, wherein, L3Digital cash after the once renewal to circulate offline together for same digital cash is close Key, bL2It is the user key of receiving terminal;
First computing unit, for calculating digital cash static content summary e=SM3 (M), the digital cash is static Content is not include the digital cash plaintext M in key domain;Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1 For the abscissa value of receiving terminal encrypted public key Q;Based on the first sub- of signature calculation second signature bS=((L4·bL2)(k+r)) mod n;
Second transmitting element, for first to be signed (r, bS), and the information such as coin number is sent to trusted party online validation.
Further, the trusted party, specifically includes:
Second authentication unit, for by coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed, Then return to mistake and stop flow;
Second computing unit, for when the second authentication unit is proved to be successful, calculating the second signature s=(bSaL0–r) Mod n, wherein aL0For counterfoil key;
3rd authentication unit, for using storage digital cash public key to sign (r, s) sign test, such as authentication failed, then Return to mistake and stop flow;
Trusted party updating block, for when the 3rd authentication unit is proved to be successful, randomly generating counterfoil key updating ginseng Number v ∈ [1, n-1];It is bL by counterfoil key updating0=(aL0·v-1)mod n;
3rd transmitting element, for counterfoil key updating parameter v to be returned receiving terminal.
Further, receiving terminal further includes:
Receiving terminal updating block, for by the key updating of receiving terminal digital cash being bL based on counterfoil key updating parameter1 =(L4·v)mod n。
The specific steps that the function and processing mode of specific implementation are described referring to embodiment of the method one.
The processing and function realized by the system of the present embodiment five essentially correspond to the side shown in previous embodiment one Embodiment, principle and the example of method, therefore not detailed part in the description of the present embodiment, may refer to the correlation in previous embodiment Illustrate, this will not be repeated here.
The embodiment of the present invention five provide a kind of digital cash based on L algorithms it is false proof and verification system, with independent digit Currency builds the false proof key code system of digital cash for unit, and false proof key is distributed to digital cash, holder and trusted party In back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from currently and hold Change of the someone to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed Journey, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed Among computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
Embodiment six
As shown in figure 3, the embodiment of the present invention six provide a kind of digital cash based on L algorithms it is false proof and verification system 300, which includes key code system 21, transmitting terminal 22.
Key code system 21, the corresponding false proof key of digital cash public key for trusted party to be stored are split as being stored in The user key of the counterfoil key of trusted party, the digital cash key being stored in digital cash and nonterminal storage;
Transmitting terminal 22, for the reception sent by the digital cash key, transmitting terminal user key and receiving terminal of storage End undated parameter once updates digital cash key, using the receiving terminal encrypted public key of receiving terminal transmission by digital cash It is offline after encryption generation digital cash ciphertext in plain text to circulate to receiving terminal;So that receiving terminal recovers number using receiving terminal encryption key Word currency in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt mistake and stop flow;Such as It is proved to be successful, receiving terminal passes through the digital cash key after once updating in the digital cash that receives, receiving terminal renewal ginseng Number and receiving terminal user key carry out secondary renewal to digital cash key, send first calculated the digital cash after renewal Signature and coin information to trusted party are verified;So that trusted party retrieves digital cash counterfoil, proofing state by coin number Validity, such as authentication failed, then return to mistake and stop flow, be such as proved to be successful, the counterfoil key that trusted party passes through storage Received first signature calculation second is docked to sign;The second signature is verified by the digital cash public key of storage, is such as tested Card failure, then return to mistake and stop flow, be such as proved to be successful, generate trusted party undated parameter by the counterfoil of the digital cash Digital cash key in key and the digital cash of receiving terminal storage is updated.
The specific steps that the function and processing mode of specific implementation are described referring to embodiment of the method two.
The processing and function realized by the system of the present embodiment six essentially correspond to the side shown in previous embodiment two Embodiment, principle and the example of method, therefore not detailed part in the description of the present embodiment, may refer to the correlation in previous embodiment Illustrate, this will not be repeated here.
Embodiment seven
As shown in figure 4, the embodiment of the present invention seven provide a kind of digital cash based on L algorithms it is false proof and verification system 400, which includes key code system 21, receiving terminal 23.
Key code system 21, the corresponding false proof key of digital cash public key for trusted party to be stored are split as being stored in The user key of the counterfoil key of trusted party, the digital cash key being stored in digital cash and nonterminal storage;
Receiving terminal 23, the digital cash ciphertext for being sent transmitting terminal using receiving terminal encryption key recover digital cash In plain text, local money-checking verification digital cash authenticity is performed, such as authentication failed, then prompting is wrong and stops flow;Such as verify into Work(, receiving terminal is by the digital cash key after once updating in the digital cash that receives, receiving terminal undated parameter and connects Terminating subscriber key carries out secondary renewal to digital cash key, send the first signature for calculating the digital cash after renewal with And coin information to trusted party is verified;So as to it is credible centrally through coin number retrieve digital cash counterfoil, proofing state validity, Such as authentication failed, then return to mistake and stop flow, be such as proved to be successful, trusted party is by the counterfoil key of storage to receiving The first signature calculation second sign;The second signature is verified by the digital cash public key of storage, such as authentication failed, then Return to mistake and stop flow, be such as proved to be successful, generation trusted party undated parameter is by the counterfoil key of the digital cash and connects Digital cash key in the digital cash of receiving end storage is updated;The step of digital cash ciphertext that the transmitting terminal is sent Including:The receiving terminal undated parameter that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage Digital cash key is once updated, using the receiving terminal encrypted public key that receiving terminal is sent, by digital cash, encryption is given birth in plain text It is offline after into digital cash ciphertext to circulate to receiving terminal.
The specific steps that the function and processing mode of specific implementation are described referring to embodiment of the method three.
The processing and function realized by the system of the present embodiment seven essentially correspond to the side shown in previous embodiment three Embodiment, principle and the example of method, therefore not detailed part in the description of the present embodiment, may refer to the correlation in previous embodiment Illustrate, this will not be repeated here.
Embodiment eight
As shown in figure 5, the embodiment of the present invention seven provide a kind of digital cash based on L algorithms it is false proof and verification system 500, which includes key code system 21, trusted party 24.
Key code system 21, the corresponding false proof key of digital cash public key for trusted party to be stored are split as being stored in The user key of the counterfoil key of trusted party, the digital cash key being stored in digital cash and nonterminal storage;
Trusted party 24, digital cash counterfoil is retrieved for the coin number that is sent by receiving terminal, proofing state validity, such as Authentication failed, then return to mistake and stop flow, be such as proved to be successful, and trusted party is docked received by the counterfoil key of storage First signature calculation second is signed;Such as authentication failed, then, which return, to be verified to the second signature by the digital cash public key of storage Return mistake and stop flow, be such as proved to be successful, generate trusted party undated parameter by the counterfoil key of the digital cash and reception The digital cash key in the digital cash of storage is held to be updated;
The step of coin that the receiving terminal is sent, includes:What receiving terminal was sent transmitting terminal using receiving terminal encryption key Digital cash ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt Mistake simultaneously stops flow;Such as it is proved to be successful, receiving terminal passes through the digital cash after once updating in the digital cash that receives Key, receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to after renewal The first signature and coin information to trusted party that digital cash calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, send The receiving terminal undated parameter that end subscriber key and receiving terminal are sent once updates digital cash key, is sent out using receiving terminal The receiving terminal encrypted public key sent circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
The specific steps that the function and processing mode of specific implementation are described referring to embodiment of the method four.
The processing and function realized by the system of the present embodiment seven essentially correspond to the side shown in previous embodiment four Embodiment, principle and the example of method, therefore not detailed part in the description of the present embodiment, may refer to the correlation in previous embodiment Illustrate, this will not be repeated here.
Embodiment eight
The embodiment of the present invention eight provide a kind of digital cash based on L algorithms it is false proof and verification equipment (not shown), The equipment includes the system described in one of embodiment five to seven.
The equipment includes but not limited to be provided with the intelligent terminal of the system described in one of embodiment five to seven.
The embodiment of the present invention eight provide a kind of digital cash based on L algorithms it is false proof and verification method, apparatus, with independent digit Word currency for unit build the false proof key code system of digital cash, by false proof key be distributed to digital cash, holder and it is credible in In heart back-end platform.Using digital cash as tie, the dynamic mapping of false proof key code system is realized, transformation results are equivalent to from current Change of the holder to new holder;Using SM2 standards as anti-pseudo Algorithm, change computing on the premise of operation result is not changed Process, calculating process is decoupled and is fused to side and its instrument, the debit and its instrument paid, and its distribution that back-end platform is formed Among formula computing entirety.Compared with prior art, the present invention following beneficial effect can be reached:
1) present invention uses offline circulation, the mentality of designing of online money-checking, has not only reduced the security risk of honeysuckle, but also The surge pressure of system is alleviated, on-line interaction is few, effective high;
2) digital cash antiforge function is realized with cryptographic technique, so as to avoid the false proof caused sea of the book keeping operation formula such as block chain Data download problem is measured, availability is strong;
3) the false proof key code system design in units of independent digit currency, directly plays the anti-counterfeit of digital cash in itself With;In addition, also by scattered risks to minimizing in units of coin, even if the key code system of one piece of digital cash is cracked, other Digital cash will not be impacted, reduces with the risk of private key for user managing digital assets, safe.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement because According to the present invention, some steps can use other orders or be carried out at the same time.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention It is necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
It may be noted that according to the needs of implementation, each step/component described in this application can be split as more multistep The part operation of two or more step/components or step/component, can be also combined into new step/component by suddenly/component, To achieve the object of the present invention.
Above-mentioned the method according to the invention can be realized in hardware, firmware, or be implemented as being storable in recording medium Software or computer code in (such as CD ROM, RAM, floppy disk, hard disk or magneto-optic disk), or it is implemented through network download Original storage in long-range recording medium or nonvolatile machine readable media and the meter that will be stored in local recording medium Calculation machine code, so that method described here can be stored in using all-purpose computer, application specific processor or programmable or special With such software processing in the recording medium of hardware (such as ASIC or FPGA).It is appreciated that computer, processor, micro- Processor controller or programmable hardware include can storing or receive software or computer code storage assembly (for example, RAM, ROM, flash memory etc.), when the software or computer code are by computer, processor or hardware access and when performing, realize herein The processing method of description.In addition, when all-purpose computer accesses and is used for realization the code for the processing being shown in which, the execution of code All-purpose computer is converted into the special purpose computer for performing the processing being shown in which.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (21)

1. a kind of digital cash based on L algorithms is false proof and verification method, it is characterised in that this method includes:
Step 1: the corresponding false proof key of digital cash public key that trusted party is stored is split as being stored in depositing for trusted party The user key of root key, the digital cash key being stored in digital cash and nonterminal storage;
Step 2: the receiving terminal for digital cash key, transmitting terminal user key and the receiving terminal transmission that transmitting terminal passes through storage is more New parameter once updates digital cash key, using receiving terminal send receiving terminal encrypted public key by digital cash in plain text It is offline after encryption generation digital cash ciphertext to circulate to receiving terminal;
Step 3: receiving terminal recovers digital cash in plain text using receiving terminal encryption key, local money-checking verification digital cash is performed Authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal passes through the digital cash that receives In once update after digital cash key, receiving terminal undated parameter and receiving terminal user key to digital cash key carry out Secondary renewal, sends the first signature calculated the digital cash after renewal and coin information to trusted party is verified;
Step 4: trusted party retrieves digital cash counterfoil by coin number, proofing state validity, such as authentication failed, then return Mistake simultaneously stops flow, is such as proved to be successful, and trusted party docks received first signature calculation the by the counterfoil key of storage Two signatures;Such as authentication failed, then, which return to wrong and middle fluid stopping, to be verified to the second signature by the digital cash public key of storage Journey, is such as proved to be successful, the digital goods that generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash key in coin is updated.
2. the method as described in claim 1, it is characterised in that in the step 1, the digital cash of trusted party storage is public The corresponding false proof key of key, meets that relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is oval bent The basic point of line.
3. method as claimed in claim 1 or 2, it is characterised in that the step 2 specifically includes:
Digital cash key is once updated to L3=(aL1·aL2·u)mod n;
Wherein, aL1Digital cash key for transmitting terminal by storage, aL2For transmitting terminal user key, u is what receiving terminal was sent Receiving terminal undated parameter, is the random number in prime field, and n is the rank of elliptic curve;
Digital cash ciphertext C=SM2 (Q, M);
Wherein, Q is the receiving terminal encrypted public key that receiving terminal is sent, and for digital cash in plain text, C is offline circulation to receiving terminal to M Digital cash ciphertext.
4. the method as described in one of claim 1-3, it is characterised in that before step 2, further include:
Receiving terminal randomly generates digital cash key updating parameter u ∈ [1, n-1] based on deal engagement, wherein, u is in prime field Random number, n are the rank of elliptic curve;
Receiving terminal encryption key k ∈ [1, n-1] are randomly generated, and receiving terminal encrypted public key Q is calculated based on receiving terminal encryption key =[k] G;
Receiving terminal undated parameter u, receiving terminal encrypted public key Q are sent to transmitting terminal.
5. the method as described in one of claim 14, it is characterised in that the step 3 specifically includes:
Receiving terminal recovers digital cash plaintext M=SM2 using receiving terminal encryption key k-1(k, C), performs local money-checking verification number Word currency authenticity, such as authentication failed, then prompting is wrong and stops flow;Wherein, M is digital cash plaintext, and k adds for receiving terminal Close private key, C are digital cash ciphertext of the offline circulation to receiving terminal;
Such as it is proved to be successful, by the secondary renewal L of digital cash key4=(L3·bL2 -1·u-1) mod n, wherein, L3For same digital goods Digital cash key after the once renewal that coin circulates offline together, bL2It is the user key of receiving terminal;
Summary e=SM3 (M) is calculated digital cash static content, and the digital cash static content is not include key domain Digital cash plaintext M;
Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1For the abscissa value of receiving terminal encrypted public key Q;
Second son signature bS=((L are calculated based on the first son signature r4·bL2)(k+r))mod n;
First is signed (r, bS), and the information such as coin number is sent to trusted party online validation.
6. the method as described in one of claim 1-5, it is characterised in that the step 4 specifically includes:
Trusted party retrieves digital cash counterfoil, proofing state validity, such as authentication failed, then in returning to mistake simultaneously by coin number Fluid stopping journey, is such as proved to be successful,
Calculate the second signature s=(bSaL0- r) mod n, wherein aL0For counterfoil key;
Using the digital cash public key of storage to signature (r, s) verification, such as authentication failed, then return to mistake and stop flow;Such as It is proved to be successful,
Randomly generate counterfoil key updating parameter v ∈ [1, n-1];
It is bL by counterfoil key updating0=(aL0·v-1)mod n;
Counterfoil key updating parameter v is returned into receiving terminal.
7. method as claimed in claim 6, it is characterised in that further included after undated parameter v is returned receiving terminal:
The key updating of receiving terminal digital cash is bL by counterfoil key updating parameter v by receiving terminal1=(L4·v)mod n。
8. a kind of digital cash based on L algorithms is false proof and verification method, it is characterised in that this method includes:
By the corresponding false proof key of digital cash public key that trusted party stores be split as being stored in the counterfoil key of trusted party, The user key for digital cash key and the nonterminal storage being stored in digital cash;
The receiving terminal undated parameter pair that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage Digital cash key is once updated, and using the receiving terminal encrypted public key that receiving terminal is sent, by digital cash, encryption generates in plain text It is offline after digital cash ciphertext to circulate to receiving terminal;So that receiving terminal recovers digital cash in plain text using receiving terminal encryption key, Local money-checking verification digital cash authenticity is performed, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, connects Receiving end is used by digital cash key, receiving terminal undated parameter and the receiving terminal after once updating in the digital cash that receives Family key carries out secondary renewal to digital cash key, sends the first signature and coin number calculated the digital cash after renewal Information to trusted party is verified;So that trusted party retrieves digital cash counterfoil by coin number, proofing state validity, is such as verified Failure, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first by the counterfoil key of storage Signature calculation second is signed;The second signature is verified by the digital cash public key of storage, such as authentication failed, then return wrong Miss and stop flow, be such as proved to be successful, generation trusted party undated parameter deposits the counterfoil key and receiving terminal of the digital cash Digital cash key in the digital cash of storage is updated.
9. a kind of digital cash based on L algorithms is false proof and verification method, it is characterised in that this method includes:
By the corresponding false proof key of digital cash public key that trusted party stores be split as being stored in the counterfoil key of trusted party, The user key for digital cash key and the nonterminal storage being stored in digital cash;
The digital cash ciphertext that receiving terminal is sent transmitting terminal using receiving terminal encryption key recovers digital cash in plain text, performs sheet Ground money-checking verification digital cash authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal leads to Cross digital cash key, receiving terminal undated parameter and the receiving terminal user key after the once renewal in the digital cash received Secondary renewal is carried out to digital cash key, sends the first signature calculated the digital cash after renewal and coin information extremely Trusted party is verified;So as to it is credible centrally through coin number retrieve digital cash counterfoil, proofing state validity, such as authentication failed, Then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first signature by the counterfoil key of storage Calculate the second signature;Such as authentication failed, then, which return to mistake simultaneously, to be verified to the second signature by the digital cash public key of storage Stop flow, be such as proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash key in digital cash is updated;
The step of digital cash ciphertext that the transmitting terminal is sent, includes:Transmitting terminal by the digital cash key of storage, send The receiving terminal undated parameter that end subscriber key and receiving terminal are sent once updates digital cash key, is sent out using receiving terminal The receiving terminal encrypted public key sent circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
10. a kind of digital cash based on L algorithms is false proof and verification method, it is characterised in that this method includes:
By the corresponding false proof key of digital cash public key that trusted party stores be split as being stored in the counterfoil key of trusted party, The user key for digital cash key and the nonterminal storage being stored in digital cash;
The coin number retrieval digital cash counterfoil that trusted party is sent by receiving terminal, proofing state validity, such as authentication failed, then Return to mistake and stop flow, be such as proved to be successful, trusted party docks received first signature by the counterfoil key of storage to be counted Calculate the second signature;The second signature is verified by the digital cash public key of storage, such as authentication failed, then in returning to mistake simultaneously Fluid stopping journey, is such as proved to be successful, the number that generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash key in word currency is updated;
The step of coin that the receiving terminal is sent, includes:Receiving terminal uses the numeral that receiving terminal encryption key sends transmitting terminal Currency ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt mistake And stop flow;Such as be proved to be successful, receiving terminal by the digital cash key after once updating in the digital cash that receives, Receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to the digital goods after renewal The first signature and coin information to trusted party that coin calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal is used by digital cash key, the transmitting terminal of storage The receiving terminal undated parameter that family key and receiving terminal are sent once updates digital cash key, is sent using receiving terminal Receiving terminal encrypted public key circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
11. a kind of digital cash based on L algorithms is false proof and verifies system, it is characterised in that the system includes key code system, hair Sending end, receiving terminal and trusted party:
The key code system, the corresponding false proof key of digital cash public key for trusted party to be stored is split as being stored in can The user key of the counterfoil key at letter center, the digital cash key being stored in digital cash and nonterminal storage;
The transmitting terminal, for the receiving terminal sent by the digital cash key, transmitting terminal user key and receiving terminal of storage Undated parameter once updates digital cash key, and the receiving terminal encrypted public key sent using receiving terminal is bright by digital cash It is offline after text encryption generation digital cash ciphertext to circulate to receiving terminal;
The receiving terminal, for recovering digital cash in plain text using receiving terminal encryption key, performs the local digital goods of money-checking verification Coin authenticity, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, receiving terminal passes through the digital goods that receives In coin once update after digital cash key, receiving terminal undated parameter and receiving terminal user key to digital cash key into The secondary renewal of row, sends the first signature calculated the digital cash after renewal and coin information to trusted party is verified;
The trusted party, for retrieving digital cash counterfoil by coin number, proofing state validity, such as authentication failed, then return Return mistake and stop flow, be such as proved to be successful, trusted party docks received first signature calculation by the counterfoil key of storage Second signature;The second signature is verified by the digital cash public key of storage, such as authentication failed, then return to mistake and stop Flow, is such as proved to be successful, the numeral that generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash key in currency is updated.
12. system as claimed in claim 11, it is characterised in that in the key code system, the digital goods of trusted party storage The corresponding false proof key of coin public key, meets that relation is as follows:
[L0L1L2]-1G=P+G;
Wherein, L0For counterfoil key;L1For digital cash key;L2For user key;P is digital cash public key;G is oval bent The basic point of line.
13. system as claimed in claim 11, it is characterised in that the transmitting terminal, specifically includes:
Updating block, for digital cash key to be once updated to L3=(aL1·aL2·u)mod n;Wherein, aL1For Transmitting terminal passes through the digital cash key of storage, aL2For transmitting terminal user key, u is the receiving terminal renewal ginseng that receiving terminal is sent Number, is the random number in prime field, and n is the rank of elliptic curve;
Encryption unit, for digital cash to be encrypted as digital cash ciphertext C=SM2 (Q, M) in plain text;Wherein, Q sends out for receiving terminal The receiving terminal encrypted public key sent, for digital cash in plain text, C is digital cash ciphertext of the offline circulation to receiving terminal to M.
14. system as claimed in claim 11, it is characterised in that receiving terminal, including:
Receiving terminal generation unit, for receiving terminal based on deal engagement randomly generate digital cash key updating parameter u ∈ [1, N-1], wherein, u is the random number in prime field, and n is the rank of elliptic curve;Receiving terminal encryption key k ∈ [1, n-1] are randomly generated, And receiving terminal encrypted public key Q=[k] G is calculated based on receiving terminal encryption key;
First transmitting element, for receiving terminal undated parameter u, receiving terminal encrypted public key Q to be sent to transmitting terminal.
15. system as claimed in claim 11, it is characterised in that the receiving terminal, further includes:
First authentication unit, for recovering digital cash plaintext M=SM2 using receiving terminal encryption key-1(k, C), performs local Money-checking verifies digital cash authenticity, and such as authentication failed, then prompting is wrong and stops flow;Wherein, M for digital cash in plain text, k For receiving terminal encryption key, C is digital cash ciphertext of the offline circulation to receiving terminal;
Secondary updating block, for when the first authentication unit is such as proved to be successful, by the secondary renewal L of digital cash key4= (L3·bL2 -1·u-1) mod n, wherein, L3Digital cash after the once renewal to circulate offline together for same digital cash is close Key, bL2It is the user key of receiving terminal;
First computing unit, for calculating summary e=SM3 (M), the digital cash static content to digital cash static content Not include the digital cash plaintext M in key domain;Based on the son signature r=of digest calculations first (e+x1) mod n, wherein x1To connect The abscissa value of receiving end encrypted public key Q;Based on the first sub- of signature calculation second signature bS=((L4·bL2)(k+r))mod n;
Second transmitting element, for first to be signed (r, bS), and the information such as coin number is sent to trusted party online validation.
16. system as claimed in claim 11, it is characterised in that the trusted party, specifically includes:
Second authentication unit, for retrieving digital cash counterfoil by coin number, proofing state validity, such as authentication failed, then return Return mistake and stop flow;
Second computing unit, for when the second authentication unit is proved to be successful, calculating the second signature s=(bSaL0- r) mod n, Wherein aL0For counterfoil key;
3rd authentication unit, for the digital cash public key using storage to (r, s) sign test of signing, such as authentication failed, then return Mistake simultaneously stops flow;
Trusted party updating block, for when the 3rd authentication unit is proved to be successful, randomly generating counterfoil key updating parameter v ∈ [1,n-1];It is bL by counterfoil key updating0=(aL0·v-1)mod n;
3rd transmitting element, for counterfoil key updating parameter v to be returned receiving terminal.
17. system as claimed in claim 16, it is characterised in that receiving terminal further includes:
Receiving terminal updating block, for by the key updating of receiving terminal digital cash being bL based on counterfoil key updating parameter1= (L4·v)mod n。
18. a kind of digital cash based on L algorithms is false proof and verifies system, it is characterised in that the system includes:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored be split as being stored in it is credible in The user key of the counterfoil key of the heart, the digital cash key being stored in digital cash and nonterminal storage;
Transmitting terminal, the receiving terminal for being sent by the digital cash key, transmitting terminal user key and receiving terminal of storage update Parameter logistic word currency key is once updated, and is added digital cash in plain text using the receiving terminal encrypted public key that receiving terminal is sent It is offline after the dense ciphertext into digital cash to circulate to receiving terminal;So that receiving terminal recovers digital cash using receiving terminal encryption key In plain text, local money-checking verification digital cash authenticity is performed, such as authentication failed, then prompting is wrong and stops flow;Such as verify into Work(, receiving terminal is by the digital cash key after once updating in the digital cash that receives, receiving terminal undated parameter and connects Terminating subscriber key carries out secondary renewal to digital cash key, send the first signature for calculating the digital cash after renewal with And coin information to trusted party is verified;So that trusted party by coin number retrieve digital cash counterfoil, proofing state validity, Such as authentication failed, then return to mistake and stop flow, be such as proved to be successful, trusted party is by the counterfoil key of storage to receiving The first signature calculation second sign;The second signature is verified by the digital cash public key of storage, such as authentication failed, then Return to mistake and stop flow, be such as proved to be successful, generation trusted party undated parameter is by the counterfoil key of the digital cash and connects Digital cash key in the digital cash of receiving end storage is updated.
19. a kind of digital cash based on L algorithms is false proof and verifies system, it is characterised in that the system includes:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored be split as being stored in it is credible in The user key of the counterfoil key of the heart, the digital cash key being stored in digital cash and nonterminal storage;
Receiving terminal, the digital cash ciphertext for being sent transmitting terminal using receiving terminal encryption key recover digital cash in plain text, Local money-checking verification digital cash authenticity is performed, such as authentication failed, then prompting is wrong and stops flow;Such as it is proved to be successful, connects Receiving end is used by digital cash key, receiving terminal undated parameter and the receiving terminal after once updating in the digital cash that receives Family key carries out secondary renewal to digital cash key, sends the first signature and coin number calculated the digital cash after renewal Information to trusted party is verified;Digital cash counterfoil is retrieved centrally through coin number so as to credible, proofing state validity, is such as verified Failure, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first by the counterfoil key of storage Signature calculation second is signed;The second signature is verified by the digital cash public key of storage, such as authentication failed, then return wrong Miss and stop flow, be such as proved to be successful, generation trusted party undated parameter deposits the counterfoil key and receiving terminal of the digital cash Digital cash key in the digital cash of storage is updated;The step of digital cash ciphertext that the transmitting terminal is sent, includes: The receiving terminal undated parameter that transmitting terminal is sent by the digital cash key, transmitting terminal user key and receiving terminal of storage is to numeral Currency key is once updated, and using the receiving terminal encrypted public key that receiving terminal is sent, by digital cash, encryption generation is digital in plain text It is offline after currency ciphertext to circulate to receiving terminal.
20. a kind of digital cash based on L algorithms is false proof and verifies system, it is characterised in that the system includes:
Key code system, the corresponding false proof key of digital cash public key for trusted party to be stored be split as being stored in it is credible in The user key of the counterfoil key of the heart, the digital cash key being stored in digital cash and nonterminal storage;
Trusted party, the coin number for being sent by receiving terminal retrieve digital cash counterfoil, and proofing state validity, such as verification are lost Lose, then return to mistake and stop flow, be such as proved to be successful, trusted party docks received first label by the counterfoil key of storage Name calculates the second signature;Such as authentication failed, then, which return to mistake, to be verified to the second signature by the digital cash public key of storage And stop flow, such as it is proved to be successful, generation trusted party undated parameter stores the counterfoil key and receiving terminal of the digital cash Digital cash in digital cash key be updated;
The step of coin that the receiving terminal is sent, includes:Receiving terminal uses the numeral that receiving terminal encryption key sends transmitting terminal Currency ciphertext recovers digital cash in plain text, performs local money-checking verification digital cash authenticity, such as authentication failed, then prompt mistake And stop flow;Such as be proved to be successful, receiving terminal by the digital cash key after once updating in the digital cash that receives, Receiving terminal undated parameter and receiving terminal user key carry out secondary renewal to digital cash key, send to the digital goods after renewal The first signature and coin information to trusted party that coin calculates are verified;
The step of digital cash ciphertext that transmitting terminal is sent, includes:Transmitting terminal is used by digital cash key, the transmitting terminal of storage The receiving terminal undated parameter that family key and receiving terminal are sent once updates digital cash key, is sent using receiving terminal Receiving terminal encrypted public key circulates offline after digital cash in plain text encryption generation digital cash ciphertext to receiving terminal.
21. a kind of digital cash based on L algorithms is false proof and verifies equipment, it is characterised in that including one of claim 11-18 Or the system described in 19 or 20.
CN201711301230.1A 2017-12-10 2017-12-10 Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm Active CN107908932B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711301230.1A CN107908932B (en) 2017-12-10 2017-12-10 Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711301230.1A CN107908932B (en) 2017-12-10 2017-12-10 Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm

Publications (2)

Publication Number Publication Date
CN107908932A true CN107908932A (en) 2018-04-13
CN107908932B CN107908932B (en) 2020-10-13

Family

ID=61865230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711301230.1A Active CN107908932B (en) 2017-12-10 2017-12-10 Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm

Country Status (1)

Country Link
CN (1) CN107908932B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109033832A (en) * 2018-06-22 2018-12-18 深圳前海益链网络科技有限公司 A method of prevention carries out of short duration bifurcated honeysuckle to block chain network and attacks
CN110599140A (en) * 2019-08-29 2019-12-20 中国人民银行数字货币研究所 Digital currency verification method and system
CN112036847A (en) * 2020-08-05 2020-12-04 杭州云象网络技术有限公司 Anti-counterfeiting verification method and system for offline payment of digital currency
CN112711742A (en) * 2020-11-23 2021-04-27 中国联合网络通信集团有限公司 Digital currency anti-counterfeiting method and device
CN112732288A (en) * 2020-12-11 2021-04-30 北京握奇智能科技有限公司 Method and device for upgrading application of digital currency hardware wallet
WO2023066197A1 (en) * 2021-10-19 2023-04-27 中国人民银行数字货币研究所 Method and device for verifying abnormal digital currency transaction

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202630A (en) * 2007-12-07 2008-06-18 中国电信股份有限公司 Method and system for adding decipher in TR069 integrative terminal management platform
US20080263363A1 (en) * 2007-01-22 2008-10-23 Spyrus, Inc. Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption
CN101888295A (en) * 2009-05-15 2010-11-17 南京理工大学 Distributed multi-term safety certification method
CN102857339A (en) * 2012-09-12 2013-01-02 无锡科技职业学院 Secret distribution sharing and recovery recombining method based on sequences
CN105812126A (en) * 2016-05-19 2016-07-27 齐鲁工业大学 Lightweight back-up and efficient restoration method of health block chain data encryption keys
JP2016173532A (en) * 2015-03-18 2016-09-29 日本電信電話株式会社 Sharing value conversion system, sharing value conversion device, sharing value conversion method, and program
CN106651331A (en) * 2016-12-22 2017-05-10 飞天诚信科技股份有限公司 Digital currency-based electronic transaction method and system
CN106845950A (en) * 2017-02-06 2017-06-13 吕文华 A kind of digital currency for meeting binary system
CN107067241A (en) * 2017-02-06 2017-08-18 吕文华 A kind of runtime of binary system digital currency
CN107276752A (en) * 2016-06-27 2017-10-20 收付宝科技有限公司 The methods, devices and systems that limitation key is decrypted are paid to cloud
CN107302438A (en) * 2017-08-07 2017-10-27 收付宝科技有限公司 A kind of private key protection method based on key updating, system and device
CN107409123A (en) * 2015-02-09 2017-11-28 缇零网股份有限公司 Encrypt integrated platform

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080263363A1 (en) * 2007-01-22 2008-10-23 Spyrus, Inc. Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption
CN101202630A (en) * 2007-12-07 2008-06-18 中国电信股份有限公司 Method and system for adding decipher in TR069 integrative terminal management platform
CN101888295A (en) * 2009-05-15 2010-11-17 南京理工大学 Distributed multi-term safety certification method
CN102857339A (en) * 2012-09-12 2013-01-02 无锡科技职业学院 Secret distribution sharing and recovery recombining method based on sequences
CN107409123A (en) * 2015-02-09 2017-11-28 缇零网股份有限公司 Encrypt integrated platform
JP2016173532A (en) * 2015-03-18 2016-09-29 日本電信電話株式会社 Sharing value conversion system, sharing value conversion device, sharing value conversion method, and program
CN105812126A (en) * 2016-05-19 2016-07-27 齐鲁工业大学 Lightweight back-up and efficient restoration method of health block chain data encryption keys
CN107276752A (en) * 2016-06-27 2017-10-20 收付宝科技有限公司 The methods, devices and systems that limitation key is decrypted are paid to cloud
CN106651331A (en) * 2016-12-22 2017-05-10 飞天诚信科技股份有限公司 Digital currency-based electronic transaction method and system
CN106845950A (en) * 2017-02-06 2017-06-13 吕文华 A kind of digital currency for meeting binary system
CN107067241A (en) * 2017-02-06 2017-08-18 吕文华 A kind of runtime of binary system digital currency
CN107302438A (en) * 2017-08-07 2017-10-27 收付宝科技有限公司 A kind of private key protection method based on key updating, system and device

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
YINING LIU AND JIHONG YAN: ""A lightweight micropayment scheme based on lagrange imterpolation formula"", 《SECURITY AND COMMUNICATION NETWORKS》 *
宋琦 等: ""基于RSA的一般访问结构的秘密共享方案"", 《合肥工业大学学报(自然科学版)》 *
李栓保: ""单云服务提供者环境下的随机化属性保护研究"", 《郑州大学学报(工学版)》 *
李梦慧 等: ""基于分组的理性秘密共享方案"", 《密码学报》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109033832A (en) * 2018-06-22 2018-12-18 深圳前海益链网络科技有限公司 A method of prevention carries out of short duration bifurcated honeysuckle to block chain network and attacks
CN109033832B (en) * 2018-06-22 2021-02-09 深圳前海益链网络科技有限公司 Method for preventing transient bifurcation double-flower attack on block chain network
CN110599140A (en) * 2019-08-29 2019-12-20 中国人民银行数字货币研究所 Digital currency verification method and system
CN110599140B (en) * 2019-08-29 2022-05-24 中国人民银行数字货币研究所 Digital currency verification method and system
CN112036847A (en) * 2020-08-05 2020-12-04 杭州云象网络技术有限公司 Anti-counterfeiting verification method and system for offline payment of digital currency
CN112711742A (en) * 2020-11-23 2021-04-27 中国联合网络通信集团有限公司 Digital currency anti-counterfeiting method and device
CN112711742B (en) * 2020-11-23 2023-06-06 中国联合网络通信集团有限公司 Digital currency anti-counterfeiting method and device
CN112732288A (en) * 2020-12-11 2021-04-30 北京握奇智能科技有限公司 Method and device for upgrading application of digital currency hardware wallet
CN112732288B (en) * 2020-12-11 2024-05-28 北京握奇智能科技有限公司 Method and device for upgrading digital currency hardware wallet application
WO2023066197A1 (en) * 2021-10-19 2023-04-27 中国人民银行数字货币研究所 Method and device for verifying abnormal digital currency transaction

Also Published As

Publication number Publication date
CN107908932B (en) 2020-10-13

Similar Documents

Publication Publication Date Title
CN111008836B (en) Privacy security transfer payment method, device, system and storage medium
Franco Understanding Bitcoin: Cryptography, engineering and economics
CN107908932A (en) A kind of digital cash based on L algorithms is false proof and verification method, system and equipment
Dilley et al. Strong federations: An interoperable blockchain solution to centralized third-party risks
US5712913A (en) Limited-traceability systems
Law et al. How to make a mint: the cryptography of anonymous electronic cash
Barber et al. Bitter to better—how to make bitcoin a better currency
CN109325747B (en) Remittance method and device based on block chain
EP3676988A1 (en) Systems and methods for communication, storage and processing of data provided by an entity over a blockchain network
CN109905360A (en) Data verification method and terminal device
CN107257284A (en) A kind of method and apparatus for carrying out virtual card transaction
Konheim Automated teller machines: their history and authentication protocols
CN111523892A (en) Block chain cross-chain transaction method and device
Malhotra Bitcoin Protocol: Model of ‘Cryptographic Proof’Based Global Crypto-Currency & Electronic Payments System
Brands Electronic Cash.
Ogiela et al. Protocol for detection of counterfeit transactions in electronic currency exchange
CN113793149B (en) Off-line transaction authentication system, method, central server and client
WO2023091781A1 (en) Digital currency
Mokhtari Digital Money Methods Based On Public Insurance Tools
Razzaque et al. Enhancing E-Voting Security with Blockchain-Backed Decentralized Authorization
Espedal et al. Design Choices for Offline Transactions in a Norwegian Central Bank Digital Currency
Huang The CIA Properties of Web3 System
Alam Information and Communication Technology Cryptography
CN115619548A (en) Privacy protection method, system and storage medium for transactions in alliance chain
Kashyap et al. Cryptocurrencies as Financial Assets A Cross-Section

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200417

Address after: 100016 No. 8, xiaoyunli, Chaoyang District, Beijing 2011

Applicant after: Lv Wenhua

Address before: No. 806, 33 floor, Xiao Nanzhuang, Haidian District, Beijing

Applicant before: Wan Hai Jia

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant