CN111090842A - Supply chain financial customer loan information protection method based on zero knowledge certification - Google Patents

Supply chain financial customer loan information protection method based on zero knowledge certification Download PDF

Info

Publication number
CN111090842A
CN111090842A CN201911335682.0A CN201911335682A CN111090842A CN 111090842 A CN111090842 A CN 111090842A CN 201911335682 A CN201911335682 A CN 201911335682A CN 111090842 A CN111090842 A CN 111090842A
Authority
CN
China
Prior art keywords
user
supply chain
information
block chain
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911335682.0A
Other languages
Chinese (zh)
Other versions
CN111090842B (en
Inventor
杨炜祖
李从恺
顾军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yuanlu Jiajia Information Technology Co ltd
Original Assignee
Shanghai Yuanlu Jiajia Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yuanlu Jiajia Information Technology Co ltd filed Critical Shanghai Yuanlu Jiajia Information Technology Co ltd
Priority to CN201911335682.0A priority Critical patent/CN111090842B/en
Publication of CN111090842A publication Critical patent/CN111090842A/en
Application granted granted Critical
Publication of CN111090842B publication Critical patent/CN111090842B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of information protection, and discloses a supply chain financial customer loan information protection method based on zero knowledge proof, which comprises an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when a user writes and/or reads data information into the database of the supply chain financial block chain, the user is provided with the data information
Figure DEST_PATH_IMAGE001
Performing identity verification based on zero-knowledge proof; if the user is
Figure 770436DEST_PATH_IMAGE001
When the identity authentication is legal, the user is allowed

Description

Supply chain financial customer loan information protection method based on zero knowledge certification
Technical Field
The invention relates to the technical field of information protection, in particular to a supply chain financial customer loan information protection method based on zero knowledge proof.
Background
Supply chain financing mainly depends on the credit of the core enterprise by banks, provides financing financial solution for the whole supply chain, and actually converts the financing capacity of the core enterprise into the financing capacity of upstream and downstream small and medium enterprises, thereby improving the credit level of the upstream and downstream small and medium enterprises.
At present, small and medium enterprises on the upstream and downstream of a supply chain cooperate through a block chain, all data are reliable, and thus a bank can ensure the authenticity of a loan condition by acquiring the real historical production condition and the current production condition of the loan enterprise in a block chain database.
However, for loan enterprises in supply chain financing, a series of loan-related business data, such as the confidential transaction stream, frequency, business objects and the like of the enterprise core, are synchronously disclosed among different nodes of the block chain, and once the core business data is known by competitors, the loan enterprises are greatly threatened.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a supply chain financial customer loan information protection method based on zero knowledge proof, which solves the technical problem that the loan information of the financial customers stored in the database of the supply chain financial block chain is illegally written and/or read at present.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
a supply chain financial client loan information protection method based on zero knowledge proof comprises an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when there is a user
Figure 467792DEST_PATH_IMAGE001
When data information is written and/or read into the database of the supply chain financial block chain, the user is provided with the data information
Figure 287981DEST_PATH_IMAGE001
Performing identity verification based on zero-knowledge proof;
if the user's identity is legal, the user is allowed
Figure 827415DEST_PATH_IMAGE001
Writing and/or reading data information into a database of a supply chain financial block chain; if the user identity is not verified to be legal, the user is not allowed to write and/or read data information into the database of the supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: user identity authentication module automatically generates character string and automatically establishes association function of character string
Figure 707646DEST_PATH_IMAGE002
And associating the character string with the function
Figure 831067DEST_PATH_IMAGE002
Transmitting to users in a supply chain financial block chain;
step two: the user identity authentication module randomly selects an integer N and combines the N with the character string
Figure 454946DEST_PATH_IMAGE003
Performing correlation, and calculating to obtain correlation number;
step three: user' s
Figure 848887DEST_PATH_IMAGE001
Randomly selecting a natural number with a digit of at least 3
Figure 634441DEST_PATH_IMAGE004
User identity authentication module calculation
Figure 248087DEST_PATH_IMAGE005
And will be calculated
Figure 331450DEST_PATH_IMAGE006
Back to the user
Figure 596209DEST_PATH_IMAGE001
Step four: user' s
Figure 294607DEST_PATH_IMAGE001
According to
Figure 910396DEST_PATH_IMAGE004
、、
Figure 797449DEST_PATH_IMAGE003
Calculating an integer N; if the N calculated by the user is identical to the integer N randomly selected by the user identity authentication module, the user is proved
Figure 667448DEST_PATH_IMAGE001
Legal users belonging to the supply chain financial block chain; if the N calculated by the user is different from the integer N randomly selected by the user identity verification module, the user is proved to belong to an illegal user in the supply chain financial block chain.
Further, when the user writes loan information into the database of the supply chain financial block chain, the information protection system specifically protects the loan information by the method comprising the following steps:
the method comprises the following steps: user' s
Figure 60383DEST_PATH_IMAGE001
Before the loan information is written into the block database of the supply chain financial block chain network, the information protection system locks the loan information write page of the database of the supply chain financial block chain;
step two: popping up a dialog box for interactive communication with a user on the loan information writing page, wherein the interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step three: user' s
Figure 615998DEST_PATH_IMAGE001
Inputting a numerical value in the dialog box;
step four: user authentication module random generation
Figure 119792DEST_PATH_IMAGE007
According to the correlation function
Figure 106946DEST_PATH_IMAGE002
Calculate out
Figure 670782DEST_PATH_IMAGE008
Then according to
Figure 244852DEST_PATH_IMAGE005
Calculate out
Figure 83495DEST_PATH_IMAGE006
And apply the same
Figure 928085DEST_PATH_IMAGE006
Returning in the dialog box;
step five: user calculation based on known conditions
Figure 662823DEST_PATH_IMAGE009
And inputting the calculated value into a dialog box;
step six: user identity authentication module logarithm value
Figure 458610DEST_PATH_IMAGE009
And a numerical value
Figure 38627DEST_PATH_IMAGE007
Verifying the consistency of the data; if value of
Figure 740653DEST_PATH_IMAGE009
And a numerical value
Figure 911872DEST_PATH_IMAGE007
If the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
Further, the information protection system is used for users
Figure 929375DEST_PATH_IMAGE001
When the loan information is read from the database of the supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: when the user reads loan information from the block database of the supply chain financial block chain network, the loan information retrieval page is locked and pops up on the retrieval page and the user
Figure 578662DEST_PATH_IMAGE001
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step two: the user enters a numerical value in the dialog box
Figure 397845DEST_PATH_IMAGE004
Step three: user authentication module random generation
Figure 474385DEST_PATH_IMAGE007
According to the correlation function
Figure 244764DEST_PATH_IMAGE002
Calculating;
then according to
Figure 697742DEST_PATH_IMAGE005
Calculate and use this
Figure 102922DEST_PATH_IMAGE006
Return in dialog box;
Step four: user' s
Figure 350364DEST_PATH_IMAGE001
According to known conditions
Figure 608039DEST_PATH_IMAGE009
And inputting the calculated value into a dialog box;
step five: the user identity verification module verifies the numerical value and the consistency of the numerical value; if the numerical value is completely the same as the numerical value, unlocking a loan information retrieval page of a database of a supply chain financial block chain by the information protection system; otherwise, locking is continued.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
1. the invention writes and/or reads data information into and/or from a database of a supply chain financial block chain when a user is available
Figure 599128DEST_PATH_IMAGE001
Performing identity verification based on zero-knowledge proof; if the user is
Figure 127324DEST_PATH_IMAGE001
If the identity authentication is legal, allowing the user to write and/or read data information into the database of the supply chain financial block chain; if the user is
Figure 545667DEST_PATH_IMAGE001
If the user is not allowed to write and/or read data information into the database of the supply chain financial block chain, the technical problem that the financial customer loan information stored in the database of the supply chain financial block chain is illegally written and/or read is solved.
Detailed Description
A supply chain finance client loan information protection method based on zero knowledge certification comprises informationThe information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when there is a user
Figure 493900DEST_PATH_IMAGE001
When data information is written in and/or read from a database of a supply chain financial block chain, identity verification based on zero knowledge proof is carried out on the user;
if the user identity is legal, allowing the user to write and/or read data information into the database of the supply chain financial block chain; if the user is
Figure 819839DEST_PATH_IMAGE001
If the identity of the user is not verified to be legal, the user is not allowed to write and/or read data information into the database of the supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: automatic character string generation of user identity authentication module
Figure 217190DEST_PATH_IMAGE010
Automatically creating a character string
Figure 72013DEST_PATH_IMAGE003
And associating the character string with the other character string
Figure 38701DEST_PATH_IMAGE003
Correlation function
Figure 371594DEST_PATH_IMAGE002
Transmitting to users in a supply chain financial block chain;
step two: the user identity authentication module randomly selects an integer N and combines the N with the character string
Figure 874381DEST_PATH_IMAGE003
Performing correlation, and calculating to obtain correlation number;
step three: user' s
Figure 634527DEST_PATH_IMAGE001
Randomly selecting a natural number with a digit of at least 3
Figure 822932DEST_PATH_IMAGE004
User identity authentication module calculation
Figure 225094DEST_PATH_IMAGE005
And returns the calculated result to the user
Figure 313880DEST_PATH_IMAGE001
Step four: user' s
Figure 244927DEST_PATH_IMAGE001
According to
Figure 186207DEST_PATH_IMAGE004
、、
Figure 860902DEST_PATH_IMAGE003
Calculating an integer N; if the N calculated by the user is identical to the integer N randomly selected by the user identity authentication module, the user is proved
Figure 72702DEST_PATH_IMAGE001
Legal users belonging to the supply chain financial block chain; if the N calculated by the user is different from the integer N randomly selected by the user identity verification module, the user is proved to belong to an illegal user in the supply chain financial block chain.
Further, the information protection system is used for users
Figure 440230DEST_PATH_IMAGE001
When loan information is written into a database of a supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: user' s
Figure 868806DEST_PATH_IMAGE001
Before the loan information is written into the block database of the supply chain financial block chain network, the information protection system locks the loan information write page of the database of the supply chain financial block chain;
step two: popping up loan information on a page written with loan information and user
Figure 81613DEST_PATH_IMAGE001
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step three: user' s
Figure 416429DEST_PATH_IMAGE001
Inputting a numerical value in the dialog box;
step four: the user identity authentication module randomly generates a numerical value and calculates the numerical value according to the correlation function;
then, based on the calculation
Figure 954857DEST_PATH_IMAGE006
And apply the same
Figure 870730DEST_PATH_IMAGE006
Returning in the dialog box;
step five: user' s
Figure 621648DEST_PATH_IMAGE001
According to known conditions
Figure 808041DEST_PATH_IMAGE009
And inputting the calculated value into a dialog box;
step six: user identity authentication module logarithm value
Figure 438743DEST_PATH_IMAGE009
And a numerical value
Figure 327064DEST_PATH_IMAGE007
Verifying the consistency of the data; if and when
Figure 629476DEST_PATH_IMAGE007
If the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
Further, the information protection system is used for users
Figure 185222DEST_PATH_IMAGE001
When the loan information is read from the database of the supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: when the user reads loan information from the block database of the supply chain financial block chain network, the loan information retrieval page is locked and pops up on the retrieval page and the user
Figure 314721DEST_PATH_IMAGE001
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step two: user' s
Figure 690339DEST_PATH_IMAGE001
Inputting a numerical value in the dialog box;
step three: user authentication module random generation
Figure 376535DEST_PATH_IMAGE007
According to the correlation function
Figure 537520DEST_PATH_IMAGE002
Calculate out
Figure 588653DEST_PATH_IMAGE008
Then according to
Figure 700834DEST_PATH_IMAGE005
Calculate out
Figure 276873DEST_PATH_IMAGE006
And returns the result in the dialog box;
step four: user' s
Figure 276053DEST_PATH_IMAGE001
According to known conditions
Figure 825983DEST_PATH_IMAGE009
And inputting the calculated value into a dialog box;
step five: user identity authentication module logarithm value
Figure 425460DEST_PATH_IMAGE009
And a numerical value
Figure 391142DEST_PATH_IMAGE007
Verifying the consistency of the data; if and when
Figure 526720DEST_PATH_IMAGE007
If the data are completely the same, unlocking the loan information retrieval page of the database of the supply chain financial block chain by the information protection system; otherwise, locking is continued.

Claims (3)

1. A supply chain finance client loan information protection method based on zero knowledge proof is characterized by comprising an information protection system, wherein the information protection system comprises a user identity authentication module, and the user identity authentication module has the functions of: when a user writes and/or reads data information into the database of the supply chain financial block chain, the user is provided with the data information
Figure 506798DEST_PATH_IMAGE001
Performing identity verification based on zero-knowledge proof;
if the user's identity is legal, the user is allowed
Figure 78724DEST_PATH_IMAGE001
Writing and/or reading data information into a database of a supply chain financial block chain; if the user's identity is not authenticated, the user is not allowed
Figure 333251DEST_PATH_IMAGE001
Writing and/or reading data information into a database of a supply chain financial block chain;
the method for realizing the verification of the user identity verification module comprises the following steps:
the method comprises the following steps: automatic character string generation of user identity authentication module
Figure 572602DEST_PATH_IMAGE002
Automatically creating a character string
Figure 323389DEST_PATH_IMAGE003
Is related to
Figure 808378DEST_PATH_IMAGE004
And combining the character strings
Figure 99551DEST_PATH_IMAGE003
The correlation function is transmitted to the user in the supply chain financial block chain
Figure 724567DEST_PATH_IMAGE001
Step two: the user identity authentication module randomly selects an integer N and combines the N with the character string
Figure 944458DEST_PATH_IMAGE003
Performing correlation to obtain correlation number
Figure 490977DEST_PATH_IMAGE005
Step three: the user randomly selects a natural number with a digit of at least 3
Figure 257945DEST_PATH_IMAGE006
User identity authentication module calculation
Figure 954112DEST_PATH_IMAGE007
And will be calculated
Figure 656489DEST_PATH_IMAGE008
Returning to the user;
step four: user' s
Figure 939572DEST_PATH_IMAGE001
According to,
Figure 323280DEST_PATH_IMAGE008
Calculating an integer N; if the user is
Figure 548987DEST_PATH_IMAGE001
If the calculated N is completely the same as the integer N randomly selected by the user identity verification module, the user is proved to belong to a legal user in the supply chain financial block chain; if the user is
Figure 609216DEST_PATH_IMAGE001
If the calculated N is not the same as the integer N randomly selected by the user identity authentication module, the user is proved
Figure 130327DEST_PATH_IMAGE001
Belonging to illegal users in the supply chain financial block chain.
2. The method as claimed in claim 1, wherein the information protection system is provided at the user's end for protecting the loan information of the financial clients in the supply chain
Figure 879844DEST_PATH_IMAGE001
When loan information is written into a database of a supply chain financial block chain, the loan information is specifiedThe protection method comprises the following steps:
the method comprises the following steps: before a user writes loan information into a block database of a supply chain financial block chain network, the information protection system locks a loan information write page of the database of the supply chain financial block chain;
step two: popping up loan information on a page written with loan information and user
Figure 802801DEST_PATH_IMAGE001
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step three: the user inputs a numerical value in the dialog box;
step four: user authentication module random generation
Figure 299510DEST_PATH_IMAGE009
And calculating according to the correlation function
Figure 307917DEST_PATH_IMAGE010
Then according to
Figure 49740DEST_PATH_IMAGE007
Calculate out
Figure 827203DEST_PATH_IMAGE008
And apply the same
Figure 229234DEST_PATH_IMAGE008
Returning in the dialog box;
step five: user' s
Figure 459358DEST_PATH_IMAGE001
According to known conditions
Figure 1942DEST_PATH_IMAGE011
And inputting the calculated value into a dialog box;
step six: user identity authentication module logarithm value
Figure 899491DEST_PATH_IMAGE011
Verifying the consistency with the numerical value; if value of
Figure 738002DEST_PATH_IMAGE011
And a numerical value
Figure 721002DEST_PATH_IMAGE009
If the loan information is completely the same as the loan information of the supply chain financial block chain, the information protection system writes the loan information of the database of the supply chain financial block chain into a page to unlock; otherwise, locking is continued.
3. The method as claimed in claim 2, wherein the information protection system is provided at the user's end for protecting the loan information of the financial clients in the supply chain
Figure 539047DEST_PATH_IMAGE001
When the loan information is read from the database of the supply chain financial block chain, the specific protection method comprises the following steps:
the method comprises the following steps: when the user reads loan information from the block database of the supply chain financial block chain network, the loan information retrieval page is locked and pops up on the retrieval page and the user
Figure 25524DEST_PATH_IMAGE001
The interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record;
step two: user' s
Figure 566095DEST_PATH_IMAGE001
Inputting a numerical value in the dialog box
Figure 770812DEST_PATH_IMAGE006
Step three: user authentication module random generation
Figure 661057DEST_PATH_IMAGE009
According to the correlation function
Figure 205302DEST_PATH_IMAGE004
Calculating;
then according to
Figure 651196DEST_PATH_IMAGE007
Calculate out
Figure 139946DEST_PATH_IMAGE008
And returns the result in the dialog box;
step four: user calculation based on known conditions
Figure 768636DEST_PATH_IMAGE011
And will be calculated
Figure 229704DEST_PATH_IMAGE011
Inputting the data into a dialog box;
step five: user identity authentication module log value and numerical value
Figure 846499DEST_PATH_IMAGE009
Verifying the consistency of the data; if value of
Figure 556966DEST_PATH_IMAGE011
And a numerical value
Figure 783154DEST_PATH_IMAGE009
If the data are completely the same, unlocking the loan information retrieval page of the database of the supply chain financial block chain by the information protection system; on the contrary, the method can be used for carrying out the following steps,the locking continues.
CN201911335682.0A 2019-12-23 2019-12-23 Supply chain financial customer loan information protection method based on zero knowledge certification Active CN111090842B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911335682.0A CN111090842B (en) 2019-12-23 2019-12-23 Supply chain financial customer loan information protection method based on zero knowledge certification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911335682.0A CN111090842B (en) 2019-12-23 2019-12-23 Supply chain financial customer loan information protection method based on zero knowledge certification

Publications (2)

Publication Number Publication Date
CN111090842A true CN111090842A (en) 2020-05-01
CN111090842B CN111090842B (en) 2022-04-26

Family

ID=70395154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911335682.0A Active CN111090842B (en) 2019-12-23 2019-12-23 Supply chain financial customer loan information protection method based on zero knowledge certification

Country Status (1)

Country Link
CN (1) CN111090842B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732832A (en) * 2021-01-06 2021-04-30 上海泰砥科技有限公司 DID and zero knowledge proof based block chain supply chain financial supply method and system
CN113822672A (en) * 2021-11-22 2021-12-21 浙江数秦科技有限公司 Block chain consensus method based on zero knowledge proof

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003050544A (en) * 2001-08-07 2003-02-21 Nec Corp Zero-knowledge proof system and method showing coincidence or discrepancy of discrete logarithm
CN101080897A (en) * 2005-07-13 2007-11-28 日本电信电话株式会社 Authentication system, authentication method, attesting device, verification device, their programs, and recording medium
CN101175076A (en) * 2007-10-23 2008-05-07 赵运磊 High-efficiency, deniable, safety-unforgeable cryptographic key exchanging protocol of on-line computation
TW201308969A (en) * 2011-08-12 2013-02-16 Sony Corp Information processing device, information processing method, program, and recording medium
US20160065558A1 (en) * 2013-01-08 2016-03-03 Coursera, Inc. Identity verification for online education
CN106330454A (en) * 2016-08-16 2017-01-11 优云合(北京)科技有限公司 Digital certificate generating method and digital certificate verifying method
CN107392063A (en) * 2017-07-11 2017-11-24 深圳大普微电子科技有限公司 Binding, verification method and the system of storage device and main frame
CN109274504A (en) * 2018-11-20 2019-01-25 桂林电子科技大学 A kind of multi-user's big data storage sharing method and system based on cloud platform
CN109272631A (en) * 2017-07-17 2019-01-25 卡巴斯基实验室股份制公司 The system and method for determining the ballot paper of the voter collected by electronic voting
CN109858852A (en) * 2018-12-26 2019-06-07 上海源庐加佳信息科技有限公司 A kind of warehouse receipt verification method based on block chain and zero-knowledge proof
CN110555933A (en) * 2019-07-31 2019-12-10 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003050544A (en) * 2001-08-07 2003-02-21 Nec Corp Zero-knowledge proof system and method showing coincidence or discrepancy of discrete logarithm
CN101080897A (en) * 2005-07-13 2007-11-28 日本电信电话株式会社 Authentication system, authentication method, attesting device, verification device, their programs, and recording medium
CN101175076A (en) * 2007-10-23 2008-05-07 赵运磊 High-efficiency, deniable, safety-unforgeable cryptographic key exchanging protocol of on-line computation
TW201308969A (en) * 2011-08-12 2013-02-16 Sony Corp Information processing device, information processing method, program, and recording medium
US20160065558A1 (en) * 2013-01-08 2016-03-03 Coursera, Inc. Identity verification for online education
CN106330454A (en) * 2016-08-16 2017-01-11 优云合(北京)科技有限公司 Digital certificate generating method and digital certificate verifying method
CN107392063A (en) * 2017-07-11 2017-11-24 深圳大普微电子科技有限公司 Binding, verification method and the system of storage device and main frame
CN109272631A (en) * 2017-07-17 2019-01-25 卡巴斯基实验室股份制公司 The system and method for determining the ballot paper of the voter collected by electronic voting
CN109274504A (en) * 2018-11-20 2019-01-25 桂林电子科技大学 A kind of multi-user's big data storage sharing method and system based on cloud platform
CN109858852A (en) * 2018-12-26 2019-06-07 上海源庐加佳信息科技有限公司 A kind of warehouse receipt verification method based on block chain and zero-knowledge proof
CN110555933A (en) * 2019-07-31 2019-12-10 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵建: "新的可重置的单轮零知识证明", 《计算机应用》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732832A (en) * 2021-01-06 2021-04-30 上海泰砥科技有限公司 DID and zero knowledge proof based block chain supply chain financial supply method and system
CN112732832B (en) * 2021-01-06 2024-02-13 上海泰砥科技有限公司 Block chain supply chain financial supply method and system based on DID and zero knowledge proof
CN113822672A (en) * 2021-11-22 2021-12-21 浙江数秦科技有限公司 Block chain consensus method based on zero knowledge proof

Also Published As

Publication number Publication date
CN111090842B (en) 2022-04-26

Similar Documents

Publication Publication Date Title
CN108229962B (en) Permission management method and system based on block chain
US11562451B1 (en) Apparatus for proportional calculation regarding non-fungible tokens
US7240363B1 (en) System and method for thwarting identity theft and other identity misrepresentations
CN109919756B (en) Transfer system, checking method and transaction method based on Merkle tree backtracking positioning technology
CN108764877B (en) Digital asset right-confirming trading method based on block chain technology
CN109146547A (en) A kind of method of investigation and study and system based on block chain
CN108288157A (en) A kind of supply chain management method based on financial block chain technology
CN109274501A (en) License block chain method for secret protection based on Proxy Signature
US11663595B1 (en) Blockchain transactional identity verification
Castonguay et al. Digital assets and blockchain: Hackable, fraudulent, or just misunderstood?
CN111768296A (en) Block chain-based small and micro enterprise loan approval method and device
CN111090842B (en) Supply chain financial customer loan information protection method based on zero knowledge certification
CN107908932A (en) A kind of digital cash based on L algorithms is false proof and verification method, system and equipment
CN112801778A (en) Federated bad asset blockchain
CN113052594A (en) Multi-card cooperative payment method and device based on block chain
Mamunts et al. The use of authentication technology blockchain platform for the marine industry
Lu et al. A study on adoption of bitcoin in Taiwan: Using big data analysis of social media
US20040133782A1 (en) Anonymous electronic transactions using auditable membership proofs
WO2019177788A1 (en) Detecting alterations of journal data structures
KR102376783B1 (en) The blockchain-based transaction history confirmation system
CN114169888B (en) Universal type cryptocurrency custody method supporting multiple signatures
Kazi et al. NFT marketplace using blockchain
CN114782021A (en) System and method for managing pre-loan due diligence data based on block chain
Shaikh et al. Applications of Blockchain Technology and Crypto Currencies: Current Practice and Future Trends
Sharma et al. Blockchain Technology: Reinventing the Security and Efficiency posture of the Indian Banking System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant