CN109191095A - It is a kind of can quick localization of internal attacker electronic cash distribution method and system - Google Patents

It is a kind of can quick localization of internal attacker electronic cash distribution method and system Download PDF

Info

Publication number
CN109191095A
CN109191095A CN201811236799.9A CN201811236799A CN109191095A CN 109191095 A CN109191095 A CN 109191095A CN 201811236799 A CN201811236799 A CN 201811236799A CN 109191095 A CN109191095 A CN 109191095A
Authority
CN
China
Prior art keywords
electronic cash
sub
cash
holder
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811236799.9A
Other languages
Chinese (zh)
Inventor
张明武
孙代杰
沈华
张亦茹
刘白
陈誉
张劭辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University of Technology
Original Assignee
Hubei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University of Technology filed Critical Hubei University of Technology
Priority to CN201811236799.9A priority Critical patent/CN109191095A/en
Publication of CN109191095A publication Critical patent/CN109191095A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses it is a kind of can quick localization of internal attacker electronic cash distribution method and system, original electronic cash splits into several sub- electronic cash and is distributed to the sub- electronic cash holder of all authorizations by electronic cash holder;Then the sub- electronic cash that sub- electronic cash holder holds oneself is sent to other sub- electronic cash holders for participating in reconstruct;Then sub- electronic cash holder generates label vector according to the sub- check received from other sub- electronic cash holders;Every sub- electronic cash holder is reconstructed according to label vector, and identifies internal attacker;Finally output internal attacker set and original electronic cash;The present invention realizes the accurate positionin of the internal attacker that may be present in electronic trading system or block chain money-system, it can efficiently identify non-honest reconstruct participant, guarantee that honest reconstruct participant can obtain correct electronic cash simultaneously, there is very high operational efficiency and practical value.

Description

It is a kind of can quick localization of internal attacker electronic cash distribution method and system
Technical field
The invention belongs to field of information security technology, and in particular to it is a kind of can quick localization of internal attacker electronic cash Distribution method and system.
Background technique
With the high speed development of internet, various services Internet-based also extend to each of people's daily life gradually A corner, the appearance of emerging internet company largely change people's lives mode.Cash must once be passed through Every financial transaction of progress also has the tendency that gradually replaced e-payment, the either payment of daily life, shopping presses down Or handle various finance products and invested, people have got used to the electronic products such as mobile phone gradually and have carried out online electronics Cash transaction.The appearance of block chain concept, and digital cash is brought into the visual field of people.In recent years, with block chain technology Development, digital cash also obtains the approval of more and more people, also has more and more people to put into the tide for digging mine.Bit The one kind of coin as digital cash is worth also with when the river rises the boat goes up with the raising of block chain temperature, is also becoming net One of the means of upper payment.But the product that electronic cash flourishes as internet, there is also disadvantages for itself.By institute Some operations are all carried out on the net, though the data transmitted during transaction are possible to the attack by criminal or steal It listens, it is careless slightly, it is possible to cause economic loss.When being related to wholesale electronic cash transaction, for example, carry out online payment or When electronic money trading, it usually needs multi-party personnel or mechanism participate, such as: multiple partners are in application to investment After the investment of people, partner needs to extract the daily operating that this cash carries out company, at this moment just needs to carry out electronics The allocation plan of cash.During system operation, it is intended to the partner to seek profit alone if it exists, he is by showing falseness Message is authenticated, to cheat other partners, achievees the purpose that oneself individually extracts electronic cash.If there is participant to pass through this side Method attacking system then may cause huge economic loss.In existing allocation plan, wherein most of can only accomplish to detect It whether there is dishonest participant in system out.If desired it identifies the participant for specifically making fraud, then needs The verifying message submitted to everyone is once checked, and this scheme computation complexity is higher, and practicability is low.Therefore, It is a kind of can efficient identification go out the electronic cash allocation plan of fraud and be very important.
Summary of the invention
To solve the above-mentioned problems, the present invention provides it is a kind of can with efficient identification and the method for localization of internal attacker and System.
Technical solution used by method of the invention is: it is a kind of can quick localization of internal attacker electronic cash distribution Method, which comprises the following steps:
Step 1: electronic cash holder, which is split into several sub- electronic cash and is distributed to all sub- electronic cash, to hold The person of having;
Step 2: the sub- electronic cash that sub- electronic cash holder holds oneself is sent to other son electricity for participating in reconstruct Sub- Cash-holding person;
Step 3: all sub- electronic cash holders generate label vector according to the sub- electronic cash received;
Step 4: every sub- electronic cash holder restores according to label vector, and identifies internal attacker;
Step 5: output internal attacker set and original electronic cash.
Preferably, the specific implementation of step 1 includes following sub-step:
Step 1.1: original electronic cash is split into n one's share of expenses for a joint undertaking electronic cash, wherein scheme by the holder of electronic cash Threshold value be t, complete original electricity can just be restored by being only greater than or equal to t sub- electronic cash holders and being reconstructed Sub- cash, t and n are positive integer, and t≤n;The sub- electronics that every sub- electronic cash holder can not be held according to oneself is existing Gold obtains any relevant information about original electron cash;
Step 1.2: the n of generation sub- electronic cash are sent to n by safe lane by the holder of original electron cash It is a transacting targeted, i.e., the sub- electronic cash holder of n authorization.
Preferably, the m sub- electronic cash holder for participating in reconstruct participates in the sub- electronics of reconstruct to other in step 2 Cash-holding person provides the sub- electronic cash oneself held, wherein m >=t.
Preferably, each sub- Cash-holding person for participating in reconstruct is receiving from other m-1 participation weight in step 3 After the sub- electronic cash of the sub- Cash-holding person of structure, u label vector C is generatedl, each vector contains m component, right respectively The sub- electronic cash for answering m sub- electronic cash holders to be held;It is a for 1 component and m-t comprising t value in each vector The component that value is 0, and guarantee that the u vector generated is not mutually equal.
Preferably, the specific implementation of step 4 includes following sub-step:
Step 4.1: extracting sub- electronic cash corresponding to the component that t value is 1 in each vector of generation, carry out extensive It is multiple, obtain the u original electron cashes restored;
Step 4.2: choosing the most original electron cash restored of repetition and be considered as correct original electron cash;
Step 4.3: all vectors that can recover correct original electron cash are extracted, by these vector corresponding positions Component all carry out logic or operation, obtain vector C;
Step 4.4: sub- electronic cash holder corresponding to 0 component in vector C being extracted, attacker's set is put into A。
Preferably, the specific implementation of step 5 includes following sub-step:
Step 5.1: output attacker's set A, and cancel its legitimate authorized user identity;
Step 5.2: exporting correct original electron cash.
Technical solution used by system of the invention is: it is a kind of can quick localization of internal attacker electronic cash distribution System, it is characterised in that: including electronic cash distribution module, sub- electronic cash distribution module, label vector generation module, son electricity Sub- cash restores and internal attacker's identification module, output module;
Original electron cash is distributed to all by the electronic cash distribution module for original electron Cash-holding person Authorize participant;
The sub- electronic cash distribution module, the sub- electronics that the sub- electronic cash holder for authorization holds oneself show Golden hair gives other sub- electronic cash holders for participating in reconstruct;
The label vector generation module, the sub- electronic cash holder for participating in reconstruct are existing according to the sub- electronics received Gold generates label vector;
The sub- electronic cash restores and internal attacker's identification module, holds for each sub- electronic cash for participating in reconstruct The person of having is restored according to label vector, and identifies internal attacker;
The output module, for exporting internal attacker's set and original electronic cash.
The method of the present invention have the advantages that compared with prior art it is following and the utility model has the advantages that
(1) present invention proposes the electronic cash distribution system of efficient identification internal attacker a kind of, realizes electronic cash Efficient distribution, while the holder of sub- electronic cash can not obtain any relevant information about original electron cash;
(2) present invention realizes the efficient positioning of internal attacker in the Restoration stage of electronic cash, not only can be quick Internal attacker is identified, in localization of internal attacker, it is thus also avoided that the message shown each participant is verified, only It need to carry out simple logical operation, so that it may realize quickly positioning, there is very high operation efficiency;
(3) present invention electronic cash Restoration stage not only can efficient localization of internal attacker, but also can also be defeated Correct original electron cash out has ensured the legitimate rights and interests of honest participant, has very high practical value.
Detailed description of the invention
Fig. 1: the flow chart of the embodiment of the present invention;
Fig. 2: the recovery algorithms flow chart of the embodiment of the present invention.
Specific embodiment
Understand for the ease of those of ordinary skill in the art and implement the present invention, with reference to the accompanying drawings and embodiments to this hair It is bright to be described in further detail, it should be understood that implementation example described herein is merely to illustrate the explanation present invention, and does not have to It is of the invention in limiting.
See Fig. 1 and Fig. 2, one kind provided by the invention can quick localization of internal attacker electronic cash distribution method, The following steps are included:
Step 1: original electron cash is distributed to all sub- electronic cash holders by original electron Cash-holding person;
Step 1.1: the holder D of original electron cash, according to sub- electronic cash holder (user authorized) Pi(i Original electron cash S is resolved into n sub- electronics by (t, n) threshold schemes of Shamir and showed by=1,2,3 ... quantity n n) Golden Si(i=1,2,3 ... n);Only being greater than or equal to the t legal sub- electronic cash holders of authorization can just restore completely Original electron cash, each holder can not obtain any correlation about original electron cash according to the sub- electronic cash of oneself Information, that is, t is the threshold value of this programme, wherein t and n is positive integer, and t≤n;
Original electron Cash-holding person carries out the fractionation of electronic cash, every height by generating a t-1 order polynomial The sub- electronic cash that electronic cash holder is held can regard a bit on the multinomial as, if it is existing to reconstruct original electronics Gold then needs to restore the t-1 order polynomial, if the t-1 order polynomial need to be restored, needs using at least t on the multinomial The functional value of point reconstructs original electron cash and needs at least t son electricity of reconstruction stage for constructing system of linear equations Sub- Cash-holding person participates, therefore the threshold value of scheme is t;
Step 1.1.1: the holder D of original electron cash randomly selects t-1 number: a on GF (q)1,a2,a3,… at-1, and generator polynomial:
F (x)=S+a1x+a2x2+…+at-1xt-1
Step 1.1.2: the holder D of original electron cash randomly chooses n number: x1,x2,x3,…xn, calculate separately f (x1),f(x2),f(x3),…,f(xn);By f (xi) the sub- electronic cash S of (i=1,2,3 ... n) conducti(i=1,2,3 ... n);
Step 1.2: the holder D of original electron cash is by the n of generation sub- electronic cash Si(i=1,2,3 ... n) leads to It crosses safe lane and is sent respectively to n sub- electronic cash holders, and open x1,x2,x3,…xn
Step 2: the sub- electronic cash that each sub- electronic cash holder for participating in reconstruct holds oneself is sent to other Participate in the sub- electronic cash holder of reconstruct;
Assuming that m sub- electronic cash holder Pj(j=1,2,3 ... m) want to use the funds, then this m son electricity Sub- Cash-holding person Pj(j=1,2,3 ... m) start to execute the recovery routine of electronic cash, wherein m≤t;M sub- electronic cash Holder sends the sub- electronic cash S oneself held to other m-1 sub- electronic cash holdersj(j=1,2,3 ... m);
Step 3: sub- electronic cash holder generates label vector according to the sub- electronic cash received;
The m-1 son that every sub- electronic cash holder sends in the sub- electronic cash holder for receiving other participation reconstruct After electronic cash, according to the number m for the sub- electronic cash holder for participating in reconstruct, u label vector C is generatedl(l=1,2, 3 ... u), and each label vector contains m component, respectively corresponds the sub- electronic cash that m sub- electronic cash holders are held, Such as: the one-component of vector represents first sub- electronic cash holder P1The sub- electronic cash S held1, the of vector Two components represent second sub- electronic cash holder P2The sub- electronic cash S held2, and so on;
Include the component that t value is 1 and the component that m-t value is 0 in each label vector, and guarantees the u generated Vector is not mutually equal, i.e.,Indicate the sub- electronic cash that the sub- electronic cash holder for participating in reconstruct from this m is held A possibility that u kind of middle selection t one's share of expenses for a joint undertaking electronic cash is different;
Step 4: every sub- electronic cash holder restores according to label vector, and identifies internal attacker;
Step 4.1: to each label vector Cl, sub- electronic cash holder corresponding to wherein t 1 components is extracted respectively Sub- electronic cash, calculate Lagrange interpolation polynomial:
Such as: assuming that first label vector C1=(1,1,1 ..., 0,0,0), wherein preceding t component value is 1, rear m-t It is a, then to the label vector, the sub- electronic cash that t sub- electronic cash holders are held before extracting, i.e. S1,S2,S3,…, St, calculate Lagrange's interpolation formula;
The u polynomial fs recovered can be obtained after calculatingl(x) (l=1,2,3 ... u), calculates separately fl(0), it can be obtained The u original electron cash S restoredj(j=1,2,3 ... u);
Step 4.2: in the u original electron cash S restoredj(j=1,2,3 ... u) in, it is most to choose number of repetition The original electron cash restored is considered as correct original electron cash S;
Step 4.3: for all label vector Cl, extracting wherein all can recover correct original electron check Label vector, all respective components of these label vectors are subjected to logic or operation, obtain vector C.In vector C, institute There is the sub- electronic of the sub- electronic cash holder transmission of participation reconstruct corresponding to 1 component for true sub- electronic cash, 0 The sub- electronic cash that the sub- electronic cash holder of participation reconstruct sends corresponding to component is false sub- electronic cash;
Step 4.4: the corresponding sub- electronic cash holder of all 0 components in extracted vector C is added to attacker's set A In;
Step 5: output internal attacker set and original electronic cash.
Step 5.1: after above-mentioned steps are finished, exporting attacker's set A, and cancel its legitimate authorized user body Part;
Step 5.2: exporting correct original electron cash on bank S;
The present invention also provides it is a kind of can quick localization of internal attacker electronic cash distribution system, including electronic cash Distribution module, sub- electronic cash distribution module, label vector generation module, sub- electronic cash restore and internal attacker identifies mould Block, output module;
Original electron cash is distributed to all son electricity for original electron Cash-holding person by electronic cash distribution module Sub- Cash-holding person;
Sub- electronic cash distribution module, for reconstruction stage, all sub- electronic cash holders for participating in reconstruct hold oneself The sub- electronic cash having is sent to other sub- electronic cash holders for participating in reconstruct;
Label vector generation module is marked, the sub- electronic cash holder for participating in reconstruct is existing according to the sub- electronics received Gold generates label vector;
Sub- electronic cash restores and internal attacker's identification module, for each sub- electronic cash holder for participating in reconstruct It is restored according to label vector, and identifies internal attacker;
Output module, for exporting internal attacker's set and original electronic cash.
The present invention is in specific works, it is assumed that an investment of investor D is obtained by the company that n partner creates, Investor D is registered capital to by way of electronic cash;Original electron cash S is torn open using traditional secret sharing scheme Point, it is divided into n one's share of expenses for a joint undertaking electronic cash, sub- electronic cash is sent to the user of finance of this n authorization;It is original needing to recover Electronic cash when, need to submit the sub- electronic cash oneself held by the authorized user of certain amount, carry out together reduction Original electronic cash can be reconstructed;It, can if there is the user of finance of authorization to show false sub- electronic cash to other people Cause other people that can not restore correct original electron cash, only the non-honest authorization user of finance can obtain original Electronic cash;In case of such case, then it may cause huge economic loss.It, need to be existing in electronics to solve this problem The identification function of attacker is added in the Restoration stage of gold, it is assumed that m sub- electronic cash holders have participated in the weight of electronic cash Structure, each holder hold the sub- electronic cash holder received by generating multiple mutually different label vectors Sub- electronic cash is grouped extraction, is held in each vector comprising the different sub- electronic cash holders of corresponding threshold value Sub- electronic cash;Recovery calculating is carried out to these label vectors respectively, extracts the mark that can correctly restore original electron cash Remember vector, then logic or operation are carried out to these label vectors, it can quick localization of internal attacker.
It should be understood that the part that this specification does not elaborate belongs to the prior art.
It should be understood that the above-mentioned description for preferred embodiment is more detailed, can not therefore be considered to this The limitation of invention patent protection range, those skilled in the art under the inspiration of the present invention, are not departing from power of the present invention Benefit requires to make replacement or deformation under protected ambit, fall within the scope of protection of the present invention, this hair It is bright range is claimed to be determined by the appended claims.

Claims (7)

1. one kind can quick localization of internal attacker electronic cash distribution method, which comprises the following steps:
Step 1: electronic cash holder is split into several sub- electronic cash and is distributed to all sub- electronic cash holders;
Step 2: the sub- electronic cash that sub- electronic cash holder holds oneself is sent to the sub- electronics that other participate in reconstruct and shows Golden holder;
Step 3: all sub- electronic cash holders generate label vector according to the sub- electronic cash received;
Step 4: every sub- electronic cash holder restores according to label vector, and identifies internal attacker;
Step 5: output internal attacker set and original electronic cash.
2. it is according to claim 1 can quick localization of internal attacker electronic cash distribution method, which is characterized in that step Rapid 1 specific implementation includes following sub-step:
Step 1.1: original electronic cash is split into n one's share of expenses for a joint undertaking electronic cash by the holder of electronic cash, threshold value t, only Complete original electronic cash can just be restored by having more than or equal to t sub- electronic cash holders to be reconstructed, and t and n are For positive integer, and t≤n;The sub- electronic cash that every sub- electronic cash holder can not be held according to oneself obtains any pass In the relevant information of original electron cash;
Step 1.2: the n of generation sub- electronic cash are sent to n friendship by safe lane by the holder of original electron cash Easy target, i.e., the sub- electronic cash holder of n authorization.
3. it is according to claim 2 can quick localization of internal attacker electronic cash distribution method, it is characterised in that: step In rapid 2, it is existing that the m sub- electronic cash holder for participating in recovery provides the sub- electronics oneself held to other reconstruct participants Gold, wherein m >=t.
4. it is according to claim 3 can quick localization of internal attacker electronic cash distribution method, it is characterised in that: step In rapid 3, each sub- Cash-holding person for participating in reconstruct participates in the son of the sub- Cash-holding person of reconstruct receiving from other m-1 After electronic cash, u label vector C is generatedl, each vector contains m component, respectively corresponds m sub- electronic cash and holds The sub- electronic cash that person is held;Include the component that t value is 1 and the component that m-t value is 0 in each vector, and guarantees U vector of generation is not mutually equal.
5. it is according to claim 4 can quick localization of internal attacker electronic cash distribution method, which is characterized in that step Rapid 4 specific implementation includes following sub-step:
Step 4.1: sub- electronic cash corresponding to the component that t value is 1 in each vector of generation is extracted, is restored, Obtain the u original electron cashes restored;
Step 4.2: choosing the most original electron cash restored of repetition and be considered as correct original electron cash;
Step 4.3: all vectors that can recover correct original electron cash are extracted, by point of these vector corresponding positions Amount all carries out logic or operation, obtains vector C;
Step 4.4: sub- electronic cash holder corresponding to 0 component in vector C being extracted, attacker's set A is put into.
6. it is according to claim 5 can quick localization of internal attacker electronic cash distribution method, which is characterized in that step Rapid 5 specific implementation includes following sub-step:
Step 5.1: output attacker's set A, and cancel its legitimate authorized user identity;
Step 5.2: exporting correct original electron cash.
7. one kind can quick localization of internal attacker electronic cash distribution system, it is characterised in that: distributed including electronic cash Module, sub- electronic cash distribution module, label vector generation module, the recovery of sub- electronic cash and internal attacker's identification module, Output module;
Original electron cash is distributed to all son electricity for original electron Cash-holding person by the electronic cash distribution module Sub- Cash-holding person;
The sub- electronic cash distribution module, for reconstruction stage, all sub- electronic cash holders for participating in reconstruct hold oneself The sub- electronic cash having is sent to other sub- electronic cash holders for participating in reconstruct;
The label vector generation module, for participating in the sub- electronic cash holder of reconstruct according to the sub- electronic cash received, Generate label vector;
The sub- electronic cash restores and internal attacker's identification module, for each sub- electronic cash holder for participating in reconstruct It is restored according to label vector, and identifies internal attacker;
The output module, for exporting internal attacker's set and original electronic cash.
CN201811236799.9A 2018-10-23 2018-10-23 It is a kind of can quick localization of internal attacker electronic cash distribution method and system Pending CN109191095A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811236799.9A CN109191095A (en) 2018-10-23 2018-10-23 It is a kind of can quick localization of internal attacker electronic cash distribution method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811236799.9A CN109191095A (en) 2018-10-23 2018-10-23 It is a kind of can quick localization of internal attacker electronic cash distribution method and system

Publications (1)

Publication Number Publication Date
CN109191095A true CN109191095A (en) 2019-01-11

Family

ID=64942891

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811236799.9A Pending CN109191095A (en) 2018-10-23 2018-10-23 It is a kind of can quick localization of internal attacker electronic cash distribution method and system

Country Status (1)

Country Link
CN (1) CN109191095A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113222601A (en) * 2021-05-19 2021-08-06 湖北工业大学 System and method for permitting block chain anonymous transaction endorsement

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857339A (en) * 2012-09-12 2013-01-02 无锡科技职业学院 Secret distribution sharing and recovery recombining method based on sequences
CN107851281A (en) * 2015-05-21 2018-03-27 万事达卡国际股份有限公司 System and method for the fraud control of the transaction based on block chain
CN108171076A (en) * 2017-12-22 2018-06-15 湖北工业大学 Protect the big data correlation analysis and system of consumer privacy in electronic transaction
CN108510252A (en) * 2018-03-24 2018-09-07 北京理工大学 A kind of intelligent electric automobile power grid security payment system and method based on block chain
CN108596579A (en) * 2018-03-27 2018-09-28 腾讯科技(深圳)有限公司 a kind of virtual resource transfer method, device, terminal and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857339A (en) * 2012-09-12 2013-01-02 无锡科技职业学院 Secret distribution sharing and recovery recombining method based on sequences
CN107851281A (en) * 2015-05-21 2018-03-27 万事达卡国际股份有限公司 System and method for the fraud control of the transaction based on block chain
CN108171076A (en) * 2017-12-22 2018-06-15 湖北工业大学 Protect the big data correlation analysis and system of consumer privacy in electronic transaction
CN108510252A (en) * 2018-03-24 2018-09-07 北京理工大学 A kind of intelligent electric automobile power grid security payment system and method based on block chain
CN108596579A (en) * 2018-03-27 2018-09-28 腾讯科技(深圳)有限公司 a kind of virtual resource transfer method, device, terminal and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HARN L 等: "Detection and identification of cheaters in (t, n) secret sharing scheme", 《DESIGNS CODES & CRYPTOGRAPHY》 *
张明武 等: "强抗泄漏的无条件安全动态秘密共享方案", 《密码学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113222601A (en) * 2021-05-19 2021-08-06 湖北工业大学 System and method for permitting block chain anonymous transaction endorsement
CN113222601B (en) * 2021-05-19 2022-06-07 湖北工业大学 System and method for permitting block chain anonymous transaction endorsement

Similar Documents

Publication Publication Date Title
US9406063B2 (en) Systems and methods for messaging, calling, digital multimedia capture, payment transactions, global digital ledger, and national currency world digital token
US10147076B2 (en) Digital currency (virtual payment cards) issued by central bank for mobile and wearable devices
US10521777B2 (en) Crypto digital currency (virtual payment cards) issued by central bank or other issuer for mobile and wearable devices
CN106779707B (en) Block chain-based digital currency transaction information supervision method, device and system
US20150026072A1 (en) Global world universal digital mobile and wearable currency image token and ledger
CN109417549A (en) The method and apparatus of information proof is provided using centralization or distributed ledger
CN110431541A (en) The electronic trading system and electronic trade method recorded using block chain stored transaction
CN107395349A (en) A kind of block chain network cryptographic key distribution method based on self-certified public key system
CN107819587A (en) Authentication method and user equipment and certificate server based on full homomorphic cryptography
CN109493053A (en) A kind of anonymous deal method for alliance's block catenary system
CN109274501A (en) License block chain method for secret protection based on Proxy Signature
CN110458560A (en) For carrying out the method and device of transaction verification
CN109003081A (en) A kind of method of commerce and system based on block chain
CN107240010B (en) Method and system for transferring digital currency to digital currency chip card
CN109981690A (en) A kind of anti-tamper timing data security transmission method based on block chain intelligence contract
CN114612084A (en) Digital currency payment method, device and system based on hardware cloud wallet
CN109191095A (en) It is a kind of can quick localization of internal attacker electronic cash distribution method and system
CN104282096B (en) Realize the method for digital signature and for realizing the POS terminal of digital signature
CN109447606A (en) A kind of storage of great master's wallet block chain private key and encryption method
CN112990928B (en) Safety protection method for digital currency transaction data
CN107230074A (en) The method and system of digital cash is stored in digital cash chip card
Tomov Challenges of blockchain technologies in the future
Feng et al. A Secure Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature for Blockchain
Panduro-Ramirez et al. Blockchain Implementation in Financial Sector and Cyber Security System
CN108616514A (en) A kind of region chain realizes the management method of financial transaction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190111

RJ01 Rejection of invention patent application after publication