CN109191095A - It is a kind of can quick localization of internal attacker electronic cash distribution method and system - Google Patents
It is a kind of can quick localization of internal attacker electronic cash distribution method and system Download PDFInfo
- Publication number
- CN109191095A CN109191095A CN201811236799.9A CN201811236799A CN109191095A CN 109191095 A CN109191095 A CN 109191095A CN 201811236799 A CN201811236799 A CN 201811236799A CN 109191095 A CN109191095 A CN 109191095A
- Authority
- CN
- China
- Prior art keywords
- electronic cash
- sub
- cash
- holder
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses it is a kind of can quick localization of internal attacker electronic cash distribution method and system, original electronic cash splits into several sub- electronic cash and is distributed to the sub- electronic cash holder of all authorizations by electronic cash holder;Then the sub- electronic cash that sub- electronic cash holder holds oneself is sent to other sub- electronic cash holders for participating in reconstruct;Then sub- electronic cash holder generates label vector according to the sub- check received from other sub- electronic cash holders;Every sub- electronic cash holder is reconstructed according to label vector, and identifies internal attacker;Finally output internal attacker set and original electronic cash;The present invention realizes the accurate positionin of the internal attacker that may be present in electronic trading system or block chain money-system, it can efficiently identify non-honest reconstruct participant, guarantee that honest reconstruct participant can obtain correct electronic cash simultaneously, there is very high operational efficiency and practical value.
Description
Technical field
The invention belongs to field of information security technology, and in particular to it is a kind of can quick localization of internal attacker electronic cash
Distribution method and system.
Background technique
With the high speed development of internet, various services Internet-based also extend to each of people's daily life gradually
A corner, the appearance of emerging internet company largely change people's lives mode.Cash must once be passed through
Every financial transaction of progress also has the tendency that gradually replaced e-payment, the either payment of daily life, shopping presses down
Or handle various finance products and invested, people have got used to the electronic products such as mobile phone gradually and have carried out online electronics
Cash transaction.The appearance of block chain concept, and digital cash is brought into the visual field of people.In recent years, with block chain technology
Development, digital cash also obtains the approval of more and more people, also has more and more people to put into the tide for digging mine.Bit
The one kind of coin as digital cash is worth also with when the river rises the boat goes up with the raising of block chain temperature, is also becoming net
One of the means of upper payment.But the product that electronic cash flourishes as internet, there is also disadvantages for itself.By institute
Some operations are all carried out on the net, though the data transmitted during transaction are possible to the attack by criminal or steal
It listens, it is careless slightly, it is possible to cause economic loss.When being related to wholesale electronic cash transaction, for example, carry out online payment or
When electronic money trading, it usually needs multi-party personnel or mechanism participate, such as: multiple partners are in application to investment
After the investment of people, partner needs to extract the daily operating that this cash carries out company, at this moment just needs to carry out electronics
The allocation plan of cash.During system operation, it is intended to the partner to seek profit alone if it exists, he is by showing falseness
Message is authenticated, to cheat other partners, achievees the purpose that oneself individually extracts electronic cash.If there is participant to pass through this side
Method attacking system then may cause huge economic loss.In existing allocation plan, wherein most of can only accomplish to detect
It whether there is dishonest participant in system out.If desired it identifies the participant for specifically making fraud, then needs
The verifying message submitted to everyone is once checked, and this scheme computation complexity is higher, and practicability is low.Therefore,
It is a kind of can efficient identification go out the electronic cash allocation plan of fraud and be very important.
Summary of the invention
To solve the above-mentioned problems, the present invention provides it is a kind of can with efficient identification and the method for localization of internal attacker and
System.
Technical solution used by method of the invention is: it is a kind of can quick localization of internal attacker electronic cash distribution
Method, which comprises the following steps:
Step 1: electronic cash holder, which is split into several sub- electronic cash and is distributed to all sub- electronic cash, to hold
The person of having;
Step 2: the sub- electronic cash that sub- electronic cash holder holds oneself is sent to other son electricity for participating in reconstruct
Sub- Cash-holding person;
Step 3: all sub- electronic cash holders generate label vector according to the sub- electronic cash received;
Step 4: every sub- electronic cash holder restores according to label vector, and identifies internal attacker;
Step 5: output internal attacker set and original electronic cash.
Preferably, the specific implementation of step 1 includes following sub-step:
Step 1.1: original electronic cash is split into n one's share of expenses for a joint undertaking electronic cash, wherein scheme by the holder of electronic cash
Threshold value be t, complete original electricity can just be restored by being only greater than or equal to t sub- electronic cash holders and being reconstructed
Sub- cash, t and n are positive integer, and t≤n;The sub- electronics that every sub- electronic cash holder can not be held according to oneself is existing
Gold obtains any relevant information about original electron cash;
Step 1.2: the n of generation sub- electronic cash are sent to n by safe lane by the holder of original electron cash
It is a transacting targeted, i.e., the sub- electronic cash holder of n authorization.
Preferably, the m sub- electronic cash holder for participating in reconstruct participates in the sub- electronics of reconstruct to other in step 2
Cash-holding person provides the sub- electronic cash oneself held, wherein m >=t.
Preferably, each sub- Cash-holding person for participating in reconstruct is receiving from other m-1 participation weight in step 3
After the sub- electronic cash of the sub- Cash-holding person of structure, u label vector C is generatedl, each vector contains m component, right respectively
The sub- electronic cash for answering m sub- electronic cash holders to be held;It is a for 1 component and m-t comprising t value in each vector
The component that value is 0, and guarantee that the u vector generated is not mutually equal.
Preferably, the specific implementation of step 4 includes following sub-step:
Step 4.1: extracting sub- electronic cash corresponding to the component that t value is 1 in each vector of generation, carry out extensive
It is multiple, obtain the u original electron cashes restored;
Step 4.2: choosing the most original electron cash restored of repetition and be considered as correct original electron cash;
Step 4.3: all vectors that can recover correct original electron cash are extracted, by these vector corresponding positions
Component all carry out logic or operation, obtain vector C;
Step 4.4: sub- electronic cash holder corresponding to 0 component in vector C being extracted, attacker's set is put into
A。
Preferably, the specific implementation of step 5 includes following sub-step:
Step 5.1: output attacker's set A, and cancel its legitimate authorized user identity;
Step 5.2: exporting correct original electron cash.
Technical solution used by system of the invention is: it is a kind of can quick localization of internal attacker electronic cash distribution
System, it is characterised in that: including electronic cash distribution module, sub- electronic cash distribution module, label vector generation module, son electricity
Sub- cash restores and internal attacker's identification module, output module;
Original electron cash is distributed to all by the electronic cash distribution module for original electron Cash-holding person
Authorize participant;
The sub- electronic cash distribution module, the sub- electronics that the sub- electronic cash holder for authorization holds oneself show
Golden hair gives other sub- electronic cash holders for participating in reconstruct;
The label vector generation module, the sub- electronic cash holder for participating in reconstruct are existing according to the sub- electronics received
Gold generates label vector;
The sub- electronic cash restores and internal attacker's identification module, holds for each sub- electronic cash for participating in reconstruct
The person of having is restored according to label vector, and identifies internal attacker;
The output module, for exporting internal attacker's set and original electronic cash.
The method of the present invention have the advantages that compared with prior art it is following and the utility model has the advantages that
(1) present invention proposes the electronic cash distribution system of efficient identification internal attacker a kind of, realizes electronic cash
Efficient distribution, while the holder of sub- electronic cash can not obtain any relevant information about original electron cash;
(2) present invention realizes the efficient positioning of internal attacker in the Restoration stage of electronic cash, not only can be quick
Internal attacker is identified, in localization of internal attacker, it is thus also avoided that the message shown each participant is verified, only
It need to carry out simple logical operation, so that it may realize quickly positioning, there is very high operation efficiency;
(3) present invention electronic cash Restoration stage not only can efficient localization of internal attacker, but also can also be defeated
Correct original electron cash out has ensured the legitimate rights and interests of honest participant, has very high practical value.
Detailed description of the invention
Fig. 1: the flow chart of the embodiment of the present invention;
Fig. 2: the recovery algorithms flow chart of the embodiment of the present invention.
Specific embodiment
Understand for the ease of those of ordinary skill in the art and implement the present invention, with reference to the accompanying drawings and embodiments to this hair
It is bright to be described in further detail, it should be understood that implementation example described herein is merely to illustrate the explanation present invention, and does not have to
It is of the invention in limiting.
See Fig. 1 and Fig. 2, one kind provided by the invention can quick localization of internal attacker electronic cash distribution method,
The following steps are included:
Step 1: original electron cash is distributed to all sub- electronic cash holders by original electron Cash-holding person;
Step 1.1: the holder D of original electron cash, according to sub- electronic cash holder (user authorized) Pi(i
Original electron cash S is resolved into n sub- electronics by (t, n) threshold schemes of Shamir and showed by=1,2,3 ... quantity n n)
Golden Si(i=1,2,3 ... n);Only being greater than or equal to the t legal sub- electronic cash holders of authorization can just restore completely
Original electron cash, each holder can not obtain any correlation about original electron cash according to the sub- electronic cash of oneself
Information, that is, t is the threshold value of this programme, wherein t and n is positive integer, and t≤n;
Original electron Cash-holding person carries out the fractionation of electronic cash, every height by generating a t-1 order polynomial
The sub- electronic cash that electronic cash holder is held can regard a bit on the multinomial as, if it is existing to reconstruct original electronics
Gold then needs to restore the t-1 order polynomial, if the t-1 order polynomial need to be restored, needs using at least t on the multinomial
The functional value of point reconstructs original electron cash and needs at least t son electricity of reconstruction stage for constructing system of linear equations
Sub- Cash-holding person participates, therefore the threshold value of scheme is t;
Step 1.1.1: the holder D of original electron cash randomly selects t-1 number: a on GF (q)1,a2,a3,…
at-1, and generator polynomial:
F (x)=S+a1x+a2x2+…+at-1xt-1
Step 1.1.2: the holder D of original electron cash randomly chooses n number: x1,x2,x3,…xn, calculate separately f
(x1),f(x2),f(x3),…,f(xn);By f (xi) the sub- electronic cash S of (i=1,2,3 ... n) conducti(i=1,2,3 ... n);
Step 1.2: the holder D of original electron cash is by the n of generation sub- electronic cash Si(i=1,2,3 ... n) leads to
It crosses safe lane and is sent respectively to n sub- electronic cash holders, and open x1,x2,x3,…xn;
Step 2: the sub- electronic cash that each sub- electronic cash holder for participating in reconstruct holds oneself is sent to other
Participate in the sub- electronic cash holder of reconstruct;
Assuming that m sub- electronic cash holder Pj(j=1,2,3 ... m) want to use the funds, then this m son electricity
Sub- Cash-holding person Pj(j=1,2,3 ... m) start to execute the recovery routine of electronic cash, wherein m≤t;M sub- electronic cash
Holder sends the sub- electronic cash S oneself held to other m-1 sub- electronic cash holdersj(j=1,2,3 ... m);
Step 3: sub- electronic cash holder generates label vector according to the sub- electronic cash received;
The m-1 son that every sub- electronic cash holder sends in the sub- electronic cash holder for receiving other participation reconstruct
After electronic cash, according to the number m for the sub- electronic cash holder for participating in reconstruct, u label vector C is generatedl(l=1,2,
3 ... u), and each label vector contains m component, respectively corresponds the sub- electronic cash that m sub- electronic cash holders are held,
Such as: the one-component of vector represents first sub- electronic cash holder P1The sub- electronic cash S held1, the of vector
Two components represent second sub- electronic cash holder P2The sub- electronic cash S held2, and so on;
Include the component that t value is 1 and the component that m-t value is 0 in each label vector, and guarantees the u generated
Vector is not mutually equal, i.e.,Indicate the sub- electronic cash that the sub- electronic cash holder for participating in reconstruct from this m is held
A possibility that u kind of middle selection t one's share of expenses for a joint undertaking electronic cash is different;
Step 4: every sub- electronic cash holder restores according to label vector, and identifies internal attacker;
Step 4.1: to each label vector Cl, sub- electronic cash holder corresponding to wherein t 1 components is extracted respectively
Sub- electronic cash, calculate Lagrange interpolation polynomial:
Such as: assuming that first label vector C1=(1,1,1 ..., 0,0,0), wherein preceding t component value is 1, rear m-t
It is a, then to the label vector, the sub- electronic cash that t sub- electronic cash holders are held before extracting, i.e. S1,S2,S3,…,
St, calculate Lagrange's interpolation formula;
The u polynomial fs recovered can be obtained after calculatingl(x) (l=1,2,3 ... u), calculates separately fl(0), it can be obtained
The u original electron cash S restoredj(j=1,2,3 ... u);
Step 4.2: in the u original electron cash S restoredj(j=1,2,3 ... u) in, it is most to choose number of repetition
The original electron cash restored is considered as correct original electron cash S;
Step 4.3: for all label vector Cl, extracting wherein all can recover correct original electron check
Label vector, all respective components of these label vectors are subjected to logic or operation, obtain vector C.In vector C, institute
There is the sub- electronic of the sub- electronic cash holder transmission of participation reconstruct corresponding to 1 component for true sub- electronic cash, 0
The sub- electronic cash that the sub- electronic cash holder of participation reconstruct sends corresponding to component is false sub- electronic cash;
Step 4.4: the corresponding sub- electronic cash holder of all 0 components in extracted vector C is added to attacker's set A
In;
Step 5: output internal attacker set and original electronic cash.
Step 5.1: after above-mentioned steps are finished, exporting attacker's set A, and cancel its legitimate authorized user body
Part;
Step 5.2: exporting correct original electron cash on bank S;
The present invention also provides it is a kind of can quick localization of internal attacker electronic cash distribution system, including electronic cash
Distribution module, sub- electronic cash distribution module, label vector generation module, sub- electronic cash restore and internal attacker identifies mould
Block, output module;
Original electron cash is distributed to all son electricity for original electron Cash-holding person by electronic cash distribution module
Sub- Cash-holding person;
Sub- electronic cash distribution module, for reconstruction stage, all sub- electronic cash holders for participating in reconstruct hold oneself
The sub- electronic cash having is sent to other sub- electronic cash holders for participating in reconstruct;
Label vector generation module is marked, the sub- electronic cash holder for participating in reconstruct is existing according to the sub- electronics received
Gold generates label vector;
Sub- electronic cash restores and internal attacker's identification module, for each sub- electronic cash holder for participating in reconstruct
It is restored according to label vector, and identifies internal attacker;
Output module, for exporting internal attacker's set and original electronic cash.
The present invention is in specific works, it is assumed that an investment of investor D is obtained by the company that n partner creates,
Investor D is registered capital to by way of electronic cash;Original electron cash S is torn open using traditional secret sharing scheme
Point, it is divided into n one's share of expenses for a joint undertaking electronic cash, sub- electronic cash is sent to the user of finance of this n authorization;It is original needing to recover
Electronic cash when, need to submit the sub- electronic cash oneself held by the authorized user of certain amount, carry out together reduction
Original electronic cash can be reconstructed;It, can if there is the user of finance of authorization to show false sub- electronic cash to other people
Cause other people that can not restore correct original electron cash, only the non-honest authorization user of finance can obtain original
Electronic cash;In case of such case, then it may cause huge economic loss.It, need to be existing in electronics to solve this problem
The identification function of attacker is added in the Restoration stage of gold, it is assumed that m sub- electronic cash holders have participated in the weight of electronic cash
Structure, each holder hold the sub- electronic cash holder received by generating multiple mutually different label vectors
Sub- electronic cash is grouped extraction, is held in each vector comprising the different sub- electronic cash holders of corresponding threshold value
Sub- electronic cash;Recovery calculating is carried out to these label vectors respectively, extracts the mark that can correctly restore original electron cash
Remember vector, then logic or operation are carried out to these label vectors, it can quick localization of internal attacker.
It should be understood that the part that this specification does not elaborate belongs to the prior art.
It should be understood that the above-mentioned description for preferred embodiment is more detailed, can not therefore be considered to this
The limitation of invention patent protection range, those skilled in the art under the inspiration of the present invention, are not departing from power of the present invention
Benefit requires to make replacement or deformation under protected ambit, fall within the scope of protection of the present invention, this hair
It is bright range is claimed to be determined by the appended claims.
Claims (7)
1. one kind can quick localization of internal attacker electronic cash distribution method, which comprises the following steps:
Step 1: electronic cash holder is split into several sub- electronic cash and is distributed to all sub- electronic cash holders;
Step 2: the sub- electronic cash that sub- electronic cash holder holds oneself is sent to the sub- electronics that other participate in reconstruct and shows
Golden holder;
Step 3: all sub- electronic cash holders generate label vector according to the sub- electronic cash received;
Step 4: every sub- electronic cash holder restores according to label vector, and identifies internal attacker;
Step 5: output internal attacker set and original electronic cash.
2. it is according to claim 1 can quick localization of internal attacker electronic cash distribution method, which is characterized in that step
Rapid 1 specific implementation includes following sub-step:
Step 1.1: original electronic cash is split into n one's share of expenses for a joint undertaking electronic cash by the holder of electronic cash, threshold value t, only
Complete original electronic cash can just be restored by having more than or equal to t sub- electronic cash holders to be reconstructed, and t and n are
For positive integer, and t≤n;The sub- electronic cash that every sub- electronic cash holder can not be held according to oneself obtains any pass
In the relevant information of original electron cash;
Step 1.2: the n of generation sub- electronic cash are sent to n friendship by safe lane by the holder of original electron cash
Easy target, i.e., the sub- electronic cash holder of n authorization.
3. it is according to claim 2 can quick localization of internal attacker electronic cash distribution method, it is characterised in that: step
In rapid 2, it is existing that the m sub- electronic cash holder for participating in recovery provides the sub- electronics oneself held to other reconstruct participants
Gold, wherein m >=t.
4. it is according to claim 3 can quick localization of internal attacker electronic cash distribution method, it is characterised in that: step
In rapid 3, each sub- Cash-holding person for participating in reconstruct participates in the son of the sub- Cash-holding person of reconstruct receiving from other m-1
After electronic cash, u label vector C is generatedl, each vector contains m component, respectively corresponds m sub- electronic cash and holds
The sub- electronic cash that person is held;Include the component that t value is 1 and the component that m-t value is 0 in each vector, and guarantees
U vector of generation is not mutually equal.
5. it is according to claim 4 can quick localization of internal attacker electronic cash distribution method, which is characterized in that step
Rapid 4 specific implementation includes following sub-step:
Step 4.1: sub- electronic cash corresponding to the component that t value is 1 in each vector of generation is extracted, is restored,
Obtain the u original electron cashes restored;
Step 4.2: choosing the most original electron cash restored of repetition and be considered as correct original electron cash;
Step 4.3: all vectors that can recover correct original electron cash are extracted, by point of these vector corresponding positions
Amount all carries out logic or operation, obtains vector C;
Step 4.4: sub- electronic cash holder corresponding to 0 component in vector C being extracted, attacker's set A is put into.
6. it is according to claim 5 can quick localization of internal attacker electronic cash distribution method, which is characterized in that step
Rapid 5 specific implementation includes following sub-step:
Step 5.1: output attacker's set A, and cancel its legitimate authorized user identity;
Step 5.2: exporting correct original electron cash.
7. one kind can quick localization of internal attacker electronic cash distribution system, it is characterised in that: distributed including electronic cash
Module, sub- electronic cash distribution module, label vector generation module, the recovery of sub- electronic cash and internal attacker's identification module,
Output module;
Original electron cash is distributed to all son electricity for original electron Cash-holding person by the electronic cash distribution module
Sub- Cash-holding person;
The sub- electronic cash distribution module, for reconstruction stage, all sub- electronic cash holders for participating in reconstruct hold oneself
The sub- electronic cash having is sent to other sub- electronic cash holders for participating in reconstruct;
The label vector generation module, for participating in the sub- electronic cash holder of reconstruct according to the sub- electronic cash received,
Generate label vector;
The sub- electronic cash restores and internal attacker's identification module, for each sub- electronic cash holder for participating in reconstruct
It is restored according to label vector, and identifies internal attacker;
The output module, for exporting internal attacker's set and original electronic cash.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811236799.9A CN109191095A (en) | 2018-10-23 | 2018-10-23 | It is a kind of can quick localization of internal attacker electronic cash distribution method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811236799.9A CN109191095A (en) | 2018-10-23 | 2018-10-23 | It is a kind of can quick localization of internal attacker electronic cash distribution method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109191095A true CN109191095A (en) | 2019-01-11 |
Family
ID=64942891
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811236799.9A Pending CN109191095A (en) | 2018-10-23 | 2018-10-23 | It is a kind of can quick localization of internal attacker electronic cash distribution method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109191095A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113222601A (en) * | 2021-05-19 | 2021-08-06 | 湖北工业大学 | System and method for permitting block chain anonymous transaction endorsement |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102857339A (en) * | 2012-09-12 | 2013-01-02 | 无锡科技职业学院 | Secret distribution sharing and recovery recombining method based on sequences |
CN107851281A (en) * | 2015-05-21 | 2018-03-27 | 万事达卡国际股份有限公司 | System and method for the fraud control of the transaction based on block chain |
CN108171076A (en) * | 2017-12-22 | 2018-06-15 | 湖北工业大学 | Protect the big data correlation analysis and system of consumer privacy in electronic transaction |
CN108510252A (en) * | 2018-03-24 | 2018-09-07 | 北京理工大学 | A kind of intelligent electric automobile power grid security payment system and method based on block chain |
CN108596579A (en) * | 2018-03-27 | 2018-09-28 | 腾讯科技(深圳)有限公司 | a kind of virtual resource transfer method, device, terminal and storage medium |
-
2018
- 2018-10-23 CN CN201811236799.9A patent/CN109191095A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102857339A (en) * | 2012-09-12 | 2013-01-02 | 无锡科技职业学院 | Secret distribution sharing and recovery recombining method based on sequences |
CN107851281A (en) * | 2015-05-21 | 2018-03-27 | 万事达卡国际股份有限公司 | System and method for the fraud control of the transaction based on block chain |
CN108171076A (en) * | 2017-12-22 | 2018-06-15 | 湖北工业大学 | Protect the big data correlation analysis and system of consumer privacy in electronic transaction |
CN108510252A (en) * | 2018-03-24 | 2018-09-07 | 北京理工大学 | A kind of intelligent electric automobile power grid security payment system and method based on block chain |
CN108596579A (en) * | 2018-03-27 | 2018-09-28 | 腾讯科技(深圳)有限公司 | a kind of virtual resource transfer method, device, terminal and storage medium |
Non-Patent Citations (2)
Title |
---|
HARN L 等: "Detection and identification of cheaters in (t, n) secret sharing scheme", 《DESIGNS CODES & CRYPTOGRAPHY》 * |
张明武 等: "强抗泄漏的无条件安全动态秘密共享方案", 《密码学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113222601A (en) * | 2021-05-19 | 2021-08-06 | 湖北工业大学 | System and method for permitting block chain anonymous transaction endorsement |
CN113222601B (en) * | 2021-05-19 | 2022-06-07 | 湖北工业大学 | System and method for permitting block chain anonymous transaction endorsement |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9406063B2 (en) | Systems and methods for messaging, calling, digital multimedia capture, payment transactions, global digital ledger, and national currency world digital token | |
US10147076B2 (en) | Digital currency (virtual payment cards) issued by central bank for mobile and wearable devices | |
US10521777B2 (en) | Crypto digital currency (virtual payment cards) issued by central bank or other issuer for mobile and wearable devices | |
CN106779707B (en) | Block chain-based digital currency transaction information supervision method, device and system | |
US20150026072A1 (en) | Global world universal digital mobile and wearable currency image token and ledger | |
CN109417549A (en) | The method and apparatus of information proof is provided using centralization or distributed ledger | |
CN110431541A (en) | The electronic trading system and electronic trade method recorded using block chain stored transaction | |
CN107395349A (en) | A kind of block chain network cryptographic key distribution method based on self-certified public key system | |
CN107819587A (en) | Authentication method and user equipment and certificate server based on full homomorphic cryptography | |
CN109493053A (en) | A kind of anonymous deal method for alliance's block catenary system | |
CN109274501A (en) | License block chain method for secret protection based on Proxy Signature | |
CN110458560A (en) | For carrying out the method and device of transaction verification | |
CN109003081A (en) | A kind of method of commerce and system based on block chain | |
CN107240010B (en) | Method and system for transferring digital currency to digital currency chip card | |
CN109981690A (en) | A kind of anti-tamper timing data security transmission method based on block chain intelligence contract | |
CN114612084A (en) | Digital currency payment method, device and system based on hardware cloud wallet | |
CN109191095A (en) | It is a kind of can quick localization of internal attacker electronic cash distribution method and system | |
CN104282096B (en) | Realize the method for digital signature and for realizing the POS terminal of digital signature | |
CN109447606A (en) | A kind of storage of great master's wallet block chain private key and encryption method | |
CN112990928B (en) | Safety protection method for digital currency transaction data | |
CN107230074A (en) | The method and system of digital cash is stored in digital cash chip card | |
Tomov | Challenges of blockchain technologies in the future | |
Feng et al. | A Secure Multi-party Computation Protocol Combines Pederson Commitment with Schnorr Signature for Blockchain | |
Panduro-Ramirez et al. | Blockchain Implementation in Financial Sector and Cyber Security System | |
CN108616514A (en) | A kind of region chain realizes the management method of financial transaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190111 |
|
RJ01 | Rejection of invention patent application after publication |