CN111311210A - Asymmetric encryption digital currency transaction data processing method and device - Google Patents
Asymmetric encryption digital currency transaction data processing method and device Download PDFInfo
- Publication number
- CN111311210A CN111311210A CN202010079664.7A CN202010079664A CN111311210A CN 111311210 A CN111311210 A CN 111311210A CN 202010079664 A CN202010079664 A CN 202010079664A CN 111311210 A CN111311210 A CN 111311210A
- Authority
- CN
- China
- Prior art keywords
- digital currency
- client
- currency
- public key
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000003672 processing method Methods 0.000 title claims description 21
- 238000012545 processing Methods 0.000 claims abstract description 31
- 238000012795 verification Methods 0.000 claims description 27
- 238000004590 computer program Methods 0.000 claims description 18
- 238000003860 storage Methods 0.000 claims description 10
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 238000000034 method Methods 0.000 abstract description 39
- 238000010586 diagram Methods 0.000 description 20
- 230000006870 function Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 208000029152 Small face Diseases 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000000047 product Substances 0.000 description 2
- 108010001267 Protein Subunits Proteins 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000007795 chemical reaction product Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides a method and a device for processing digital currency transaction data by asymmetric encryption, comprising the following steps: performing identity authentication on a second client according to an authentication instruction sent by a first client; signing the first digital currency sent by the second client side which passes the identity authentication; sending the signed first digital currency to a second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number. The method and the system at least solve the problems that in the prior art, various digital currency systems must be operated independently, currency cannot cross the systems, and account concepts need to be established.
Description
Technical Field
The application belongs to the field of financial science and technology, and particularly relates to a method and a device for processing digital currency transaction data with asymmetric encryption.
Background
With the continuous development of information technology, mobile payment has penetrated into various fields of life and becomes a great revolution for converting social consumption behaviors. Meanwhile, digital currency has been widely used in people's economic life in recent years as a medium for mobile payment, a new form of currency, a new economic term, and the digital currency has been taken out of laboratories to go to the market for nearly 20 years, and with the implementation of new development policies, the promotion activity of "no paper money" in cities has been fully developed. Currently, digital currencies can be divided into five major categories: debit card type digital currency, credit card type digital currency, prepaid card type digital currency (bus cards), prepaid card-like type digital currency (Q-currency), and virtual currency. Of these five categories, the unit of charge of the top 4 categories of electronic money is consistent with the money whose intrinsic value is issued by the country, and can be considered as an electronic representation of the conventional money. However, the following problems are present in both electronic money and virtual money, although the virtual money is different and is significantly different in terms of the unit of charge and the manner of issuance:
1. various digital currency systems operate independently, sharing is difficult, and currency cannot exist across the systems.
2. Conventional electronic money must have a concept of an account, which is closely related to the funds therein.
3. The currency and the system cannot be divided, and all account information must be stored in a central service system; for virtual currency, bitcoin distributed ledgers require clients to expend significant resources for storage and computation.
Disclosure of Invention
The application provides a method and a device for processing digital currency transaction data with asymmetric encryption, which at least solve the problems that in the prior art, various digital currency systems must operate independently, currency cannot cross the systems and account concepts need to be established.
According to one aspect of the present application, there is provided an asymmetrically encrypted digital currency transaction data processing method, comprising:
performing identity authentication on a second client according to an authentication instruction sent by a first client;
signing the first digital currency sent by the second client side which passes the identity authentication;
sending the signed first digital currency to a second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
In an embodiment, performing identity authentication on a second client according to an authentication instruction sent by a first client includes:
sending a random number to the second client to enable the second client to generate a random number signature;
verifying whether the received random number signature is correct.
In one embodiment, signing the first digital currency sent by the authenticated second client comprises:
searching a corresponding server public key through a currency serial number in the first digital currency, and verifying the validity of the first digital currency through the server public key;
after the verification is passed, a new server public key and a new server private key are generated by using an asymmetric encryption algorithm;
and signing the verified first digital currency by using the server private key.
In one embodiment, the present application further provides an asymmetrically encrypted digital currency transaction data processing method, including:
generating a second digital currency according to the first digital currency provided by the client;
generating a local public key and a local private key by using an asymmetric encryption algorithm;
sending the local public key and the second digital currency to the client, and initiating a verification instruction to the server so that the server verifies the client and completes the signature of the second digital currency;
receiving the second digital currency signed by the server.
In one embodiment, the present application further provides an asymmetrically encrypted digital currency transaction data processing method, including:
sending the first digital currency to a client so that the client generates second digital currency and generates a client public key and a client private key according to an asymmetric encryption algorithm;
the received second digital currency is changed by using the received client public key and then is sent to the server, so that the server signs the second digital currency;
and receiving the second digital currency signed by the server and forwarding the second digital currency to the client.
In one embodiment, altering the received second digital currency with the received client public key comprises:
filling the client public key into a second digital currency;
the second digital currency populated with the client public key is signed with the local private key.
According to another aspect of the present application, there is also provided an asymmetrically encrypted digital currency transaction data processing apparatus comprising:
the identity authentication unit is used for authenticating the identity of the second client according to the authentication instruction sent by the first client;
the first signature unit is used for signing the first digital currency sent by the second client side which passes the identity authentication;
the basic information updating unit is used for sending the signed first digital currency to the second client for confirmation, and updating basic information of the first digital currency after the second client confirms; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
In one embodiment, the authentication unit includes:
the random number sending module is used for sending a random number to the second client so that the second client generates a random number signature;
and the random number signature verification module is used for verifying whether the received random number signature is correct or not.
In one embodiment, the first signature unit comprises:
the public key verification module is used for searching a corresponding server public key through a currency serial number in the first digital currency and verifying the validity of the first digital currency through the server public key;
the public key and private key generation module is used for generating a new server public key and a new server private key by using an asymmetric encryption algorithm after verification is passed;
and the new signature module is used for signing the verified first digital currency by using the server private key.
In one embodiment, the present application also provides another asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a second digital currency generation unit for generating a second digital currency from the first digital currency provided by the client;
the asymmetric encryption generating unit is used for generating a local public key and a local private key by using an asymmetric encryption algorithm;
the second signature unit is used for sending the local public key and the second digital currency to the client side and sending a verification instruction to the server side so that the server side verifies the client side and completes signature of the second digital currency;
a receiving unit for receiving the second digital currency signed by the server.
In one embodiment, the present application also provides another asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a sending unit, configured to send the first digital currency to the client, so that the client generates a second digital currency and generates a client public key and a client private key according to an asymmetric encryption algorithm;
the change unit is used for changing the received second digital currency by using the received client public key and then sending the changed second digital currency to the server so as to enable the server to sign the second digital currency;
and the receiving and forwarding unit is used for receiving the second digital currency signed by the server and forwarding the second digital currency to the client.
In one embodiment, the alteration unit includes:
the public key filling module is used for filling the client public key into the second digital currency;
and the third signature module is used for signing the second digital currency filled in the client public key by using the local private key.
The application provides a brand-new digital currency composition and transaction data processing method, and particularly comprises a digital currency issuing, transaction and safety guarantee method. The brand-new digital currency structure and the transaction data processing method have the advantages that the issuer of the digital currency does not need to store any characteristics of the currency and record owner information of the currency, and the function that the owner of the currency can check the account information of the owner of the currency without logging in a server is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flow chart of a method for processing data of an asymmetrically encrypted digital currency transaction provided by the present application.
Fig. 2 is a flowchart of a method for authenticating a second client according to a verification instruction sent by a first client in the embodiment of the present application.
Fig. 3 is a flowchart of a method for signing a first digital currency sent by a second client that passes authentication according to an embodiment of the present application.
Fig. 4 is a flowchart of a method for processing data of an asymmetrically encrypted digital currency transaction according to an embodiment of the present application.
Fig. 5 is a flow chart of another asymmetric encrypted digital currency transaction data processing method according to an embodiment of the present application.
Fig. 6 is a flowchart of a method for changing the received second digital currency by using the received client public key in the embodiment of the present application.
Fig. 7 is a block diagram of an asymmetric encrypted digital currency transaction data processing apparatus according to the present application.
Fig. 8 is a block diagram of an authentication unit in the embodiment of the present application.
Fig. 9 is a block diagram of a first signature unit in the embodiment of the present application.
Fig. 10 is a block diagram of an asymmetric encrypted digital currency transaction data processing apparatus according to an embodiment of the present application.
Fig. 11 is a block diagram of another asymmetric encryption digital currency transaction data processing apparatus according to an embodiment of the present application.
Fig. 12 is a block diagram showing a configuration of a modification unit in the embodiment of the present application.
Fig. 13 is a specific implementation of an electronic device in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Digital currencies currently on the market can be divided into five major categories: debit card type digital currency, credit card type digital currency, prepaid card type digital currency (bus cards), prepaid card-like type digital currency (Q-currency), and virtual currency. Of these five categories, the unit of charge of the top 4 categories of electronic money is consistent with the money whose intrinsic value is issued by the country, and can be considered as an electronic representation of the conventional money. However, the following problems are present in both electronic money and virtual money, although the virtual money is different and is significantly different in terms of the unit of charge and the manner of issuance:
1. various digital currency systems operate independently, sharing is difficult, and currency cannot exist across the systems.
2. Conventional electronic money must have a concept of an account, which is closely related to the funds therein.
3. The currency and the system cannot be divided, and all account information must be stored in a central service system; for virtual currency, bitcoin distributed ledgers require clients to expend significant resources for storage and computation.
In order to solve the above problems, the present application proposes a new type of digital money composed of information such as face value, unique serial number, issue time, owner's public key, and issuer's digital signature. And the money account corresponding to the digital money is composed of the digital money and the private key of the owner. By adding the owner's public key to the digital currency, the function of knowing who the digital currency is owned without a traditional account can be realized.
Before the specific scheme of the present application is introduced, a key encryption mode, namely an asymmetric encryption algorithm, which is different from the prior art and is required by the present application is introduced.
Concept of asymmetric encryption: two keys are required for encryption and decryption, a public key (public key for short) and a private key (private key for short), information encrypted by the public key can be decrypted only by the private key, and information encrypted by the private key can be decrypted only by the public key.
Principle of asymmetric encryption: the public key and the private key are required to be in pairs, if the data is encrypted by the public key, the data can be decrypted only by using the corresponding private key, so that the data is safe as long as the private key is not leaked.
Common asymmetric encryption: RSA, ECC (elliptic Curve cryptography), Diffie-Hellman, El Gamal, DSA (for digital signatures).
The RSA algorithm describes:
the first step is as follows: two prime numbers P and Q are randomly found, and the larger the P and Q are, the safer the two prime numbers are.
Such as P67 and Q71. And calculating the product n, P, Q and 4757 of the two, converting the product into 1001010010101, wherein the encryption algorithm is 13 bits, the actual algorithm is 1024 bits or 2048 bits, and the longer the bit number is, the more difficult the algorithm is to break.
The second step is that: an euler function phi (n) for n is calculated.
Phi (n) represents the number of numbers which form a relatively prime relationship with n among positive integers of n or less. For example: among 1 to 8, 1, 3, 5, and 7, which form a relatively prime relationship with 8, so that Φ (n) is 4.
If n is equal to P × Q and P and Q are both prime numbers, then Φ (n) ═ Φ (P × Q) ═ Φ (P-1) Φ (Q-1) ═ P-1) (Q-1).
In this example, phi (n) is 66 × 70 is 4620, here denoted m, and m is phi (n) is 4620
The third step: an integer e is randomly chosen, provided that 1< e < m, and e is coprime to m.
The common divisor is only two integers of 1, called coprime integers, where we randomly choose e 101. Note that 4619 is not to be chosen, and if this is chosen, the public and private keys will become the same.
The fourth step: there is an integer d, such that the remainder of e x d divided by m is 1.
I.e. find an integer d such that (e × d)% m ═ 1. Equivalent to e d-1 y m (y is an integer), finding d is essentially solving the following one-dimensional equation. e x-m y 1, wherein e 101, m 4620
The equation 101x-4620y ═ 1 can be solved by an "extended euclidean algorithm", and a specific procedure is omitted here. In summary, a set of integer solutions (x, y) ═ (1601, 35) is calculated, i.e., d ═ 1601. By this time the key pair is generated. Different e's generate different d's, and thus multiple key pairs can be generated.
The fifth step: a public key and a private key are generated.
In this example, the public key is (n, e) ═ 4757,101, the private key is (n, d) ═ 4757, 1601, and only (n, e) ═ 4757,101 is disclosed, and the remaining numbers are not disclosed.
It can be imagined that if only n and e are available, how to deduce d can only be cracked by violence, and the longer the number of bits, the longer the time for violent cracking.
Application of asymmetric encryption algorithm:
asymmetric encryption algorithms are commonly used for encryption and digital signatures.
For encrypted communication: public key encryption and private key decryption. After all, the public key can be published, but the private key is only known and therefore can only be decrypted.
For digital signatures: private key encryption and public key decryption. The good biyan signature is true only if you sign themselves, and others sign false.
In the present application, an asymmetric encryption algorithm is chosen. The longest RSA key that is cracked today is 768 bits. In practical application, the key length of RSA is 1024 bits, and in important occasions, the key length is 2048 bits, so that the RSA cannot be cracked in the next half century. The method provided by the application has higher safety requirement and can be realized by adopting an RSA-2056 algorithm. The specific implementation method is described in the RSA algorithm.
Based on the novel digital currency, the application provides an asymmetric encrypted digital currency transaction data processing method, which comprises the following steps:
s101: and performing identity authentication on the second client according to the authentication instruction sent by the first client.
In one embodiment, when a digital currency transaction is performed, a client a wishes to send digital currency to a client B, and a server of a digital currency issuer (server) authenticates the client a after receiving an authentication instruction.
S102: the first digital currency sent by the second authenticated client is signed.
In a specific embodiment, a client A transfers original digital currency held by the client A to a client B, the client B generates a public key PK _ B and a private key SK _ B through an asymmetric encryption algorithm, sends the public key PK _ B and the original digital currency to the client A, and stores the private key SK _ B. The client A generates new digital currency (first digital currency) according to the sent public key PK _ B and the original digital currency, then sends the new digital currency to the server, and the server generates a server private key and a server public key according to the new digital currency by using an asymmetric encryption algorithm and signs the new digital currency by using the server private key.
S103: sending the signed first digital currency to a second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
In a specific embodiment, after a server signs a new digital currency by a server private key, the new digital currency is sent to a client A, the client A returns an acknowledgement message to the server after receiving the acknowledgement message, then the client A sends the digital currency to a client B, and the client B stores the digital currency and SK _ B corresponding to the digital currency until a digital currency transaction from the client A to the client B is completed.
In an embodiment, as shown in fig. 2, performing authentication on the second client according to the authentication instruction sent by the first client includes:
s201: and sending the random number to the second client so that the second client generates a random number signature.
In an embodiment, during the authentication, the server sends a random number to the client a, so that the client a generates a random number signature according to the random number.
S202: verifying whether the received random number signature is correct.
In a specific embodiment, after the client a generates the random number signature according to the random number, the random number signature is sent to the server, the server verifies whether the random number signature is correct, if so, the identity verification is successful, and if not, the transaction is stopped.
In one embodiment, as shown in fig. 3, signing the first digital currency sent by the authenticated second client comprises:
s301: and searching a corresponding server public key through the currency serial number in the first digital currency, and verifying the validity of the first digital currency through the server public key.
In a specific embodiment, when the server receives a new digital currency (first digital currency) sent by the client a, the server looks up a server public key pre-stored in the server according to a currency serial number of the new digital currency, and verifies whether the first digital currency is valid, such as whether the first digital currency has expired, by using the server public key.
S302: and after the verification is passed, generating a new server public key and a new server private key by using an asymmetric encryption algorithm.
In a specific embodiment, after the first digital currency is verified by the server public key, if the first digital currency is valid, the server generates a new pair of server public key and server private key according to the first digital currency by using an asymmetric encryption algorithm.
S303: and signing the verified first digital currency by using the server private key.
In a particular embodiment, the first digital currency is signed with the new server-side private key generated in S302.
In one embodiment, as shown in fig. 4, the present application further provides an asymmetrically encrypted digital currency transaction data processing method, including:
s401: the second digital currency is generated from the first digital currency provided by the client.
In a specific embodiment, the client B receives the digital currency entity (first digital currency) sent by the client a, then generates a client public key PK _ B and a private key SK _ B of the client B according to the first digital currency, and sends the digital currency (second digital currency) and the client public key PK _ B to the client a.
S402: and generating a local public key and a local private key by using an asymmetric encryption algorithm.
In a specific embodiment, the client B generates the public key PK _ B and the private key SK _ B by using an asymmetric encryption algorithm after receiving the first digital currency sent by the client a.
S403: and sending the local public key and the second digital currency to the client, and sending a verification instruction to the server so that the server verifies the client and completes the signature of the second digital currency.
In one embodiment, client B sends the second digital currency and client public key PK _ B to client a to enable client a to complete the signature.
S404: receiving the second digital currency signed by the server.
In a specific embodiment, the client a receives the second digital currency, signs the second digital currency, and forwards the second digital currency to the server, and the server signs the second digital currency and sends the signed second digital currency to the client a, and then the client a sends the signed second digital currency to the client B.
In one embodiment, as shown in fig. 5, the present application further provides an asymmetric encrypted digital currency transaction data processing method, including:
s501: and sending the first digital currency to the client so that the client generates a second digital currency and generates a client public key and a client private key according to an asymmetric encryption algorithm.
In a specific embodiment, if the client a wants to trade the digital currency to the client B, the client a sends the entity of the digital currency to the client B, the client B generates the public key PK _ B and the private key SK _ B according to the digital currency by using an asymmetric encryption algorithm, then sends the public key PK _ B and the digital currency to the client a, the client a replaces the original public key in the digital currency with the public key PK _ B, and fills the public key PK _ B into the digital currency to obtain new digital currency.
S502: and changing the received second digital currency by using the received client public key and then sending the changed second digital currency to the server so that the server signs the second digital currency.
In a specific embodiment, the client a generates a local public key PK _ a and a local private key SK _ a through an asymmetric encryption algorithm, and then replaces an original public key in the digital currency with the received public key PK _ B sent by the client B.
S503: and receiving the second digital currency signed by the server and forwarding the second digital currency to the client.
In a specific embodiment, the client a sends the obtained new digital currency to the server, the server returns the new digital currency to the client a for acknowledgement after completing the signature, and then the client a forwards the digital currency to the client B.
In one embodiment, as shown in fig. 6, the changing the received second digital currency with the received client public key includes:
s601: the client public key is filled in the second digital currency.
In one embodiment, the client a replaces the original public key in the digital currency with the received public key PK _ B sent by the client B.
S602: the second digital currency populated with the client public key is signed with the local private key.
In a specific embodiment, the client a sends the obtained new digital currency to the server, and the server returns the new digital currency to the client a for acknowledgement after completing the signature.
In addition to the transaction process of the digital currency between two clients, the application also comprises an issuing process of the digital currency, and the specific steps are as follows:
the server performs basic information construction of digital currency, including filling in the currency issue unit number (this field may be the issuer's unique signature), the currency serial number, the currency issue date, the currency denomination, and initializing the version number vno to 0. The digital currency is sent to a client, the client generates a public key PK _ A and a private key SK _ A by adopting an asymmetric encryption algorithm, the public key is filled in the digital currency and sent to a server, and the private key is stored in the client. The server also generates a public key PK _ S and a private key SK _ S by using an asymmetric encryption algorithm, signs the digital currency except the server signature by using the private key SK _ S and fills the digital currency to generate complete digital currency. The digital currency is sent to the client for validation. And after receiving the confirmation message, the server side stores the information of the currency serial numbers sn, PK _ S and SK _ S.
In the actual use process, when the authenticity of the digital currency needs to be verified, the digital currency adopts the non-public property of the private key in the asymmetric encryption to ensure the safety of the digital currency. The currency authenticity verification comprises two aspects: monetary entity authentication and monetary owner (client) authentication. (1) And (3) currency entity verification: inquiring a corresponding public key from a server through the sn in the currency entity, and verifying whether the signature of the currency entity is correct or not by using the public key; (2) currency owner verification: by sending the random number to the owner, the owner signs it with the currency private key, and the verifier verifies the currency owner with the owner's public key in the currency entity.
When the face value of the digital currency needs to be exchanged, the issuer verifies the identity of the currency owner through the digital currency authenticity verification method, recycles the currency with large face value, and issues the equal-face value currency consisting of a plurality of small face values through the digital currency issuing method to realize the exchange of the large face value and the small face value of the currency.
Based on the same inventive concept, the embodiment of the present application further provides an asymmetric encrypted digital currency transaction data processing apparatus, which can be used to implement the method described in the above embodiments, as described in the following embodiments. Because the principle of solving the problems of the asymmetric encryption digital currency transaction data processing device is similar to the asymmetric encryption digital currency transaction data processing method, the implementation of the asymmetric encryption digital currency transaction data processing device can refer to the implementation of the asymmetric encryption digital currency transaction data processing method, and repeated parts are not described again. As used hereinafter, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. While the system described in the embodiments below is preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
As shown in fig. 7, the present application also provides an asymmetrically encrypted digital money transaction data processing apparatus, comprising:
an identity authentication unit 701, configured to perform identity authentication on a second client according to an authentication instruction sent by a first client;
a first signature unit 702, configured to sign the first digital currency sent by the authenticated second client;
a basic information updating unit 703, configured to send the signed first digital currency to the second client for acknowledgement, and update basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
In one embodiment, as shown in fig. 8, the authentication unit 701 includes:
a random number sending module 801, configured to send a random number to the second client, so that the second client generates a random number signature;
a random number signature verification module 802, configured to verify whether the received random number signature is correct.
In one embodiment, as shown in fig. 9, the first signature unit 702 includes:
the public key verification module 901 is configured to search a corresponding server public key through a currency serial number in the first digital currency, and verify validity of the first digital currency through the server public key;
a public key and private key generation module 902, configured to generate a new server public key and a new server private key by using an asymmetric encryption algorithm after verification passes;
and a new signature module 903, configured to sign the verified first digital currency with a server-side private key.
In one embodiment, as shown in fig. 10, the present application also provides another asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a second digital money generation unit 1001 for generating second digital money from the first digital money supplied from the client;
an asymmetric encryption generation unit 1002, configured to generate a local public key and a local private key by using an asymmetric encryption algorithm;
the second signature unit 1003 is configured to send the local public key and the second digital currency to the client, and initiate a verification instruction to the server, so that the server verifies the client and completes signature of the second digital currency;
a receiving unit 1004 for receiving the second digital currency signed by the server.
In one embodiment, as shown in fig. 11, the present application also provides another asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a sending unit 1101 for sending the first digital currency to the client, so that the client generates a second digital currency and generates a client public key and a client private key according to an asymmetric cryptographic algorithm;
a changing unit 1102, configured to change the received second digital currency with the received client public key and send the changed second digital currency to the server, so that the server signs the second digital currency;
and a receiving and forwarding unit 1103, configured to receive the second digital currency signed by the server and forward the second digital currency to the client.
In one embodiment, as shown in fig. 12, the changing unit 1102 includes:
a public key filling module 1201, configured to fill the client public key into the second digital currency;
a third signing module 1202 for signing the second digital currency populated with the client public key with the local private key.
Compared with the existing digital currency, the digital currency based on the asymmetric encryption algorithm has the following advantages:
the method is weakly centralized, the information of the digital currency is stored on the terminal of each owner, each owner ensures the safety of the currency, and the owner of the currency can check the account information of the owner without logging in a server; the security is high, the security of the digital currency is ensured by adopting an asymmetric encryption algorithm, and the owner can ensure the security of the digital currency only by ensuring the security of a private key corresponding to a currency entity. Meanwhile, the digital currency is stored on the terminal of the owner, and hackers cannot acquire the currency by attacking the server, so that the safety of the currency is improved; the circulation is strong, and the issued digital currency can be used across systems without conversion and processing in a plurality of systems; the complexity is low, the digital currency issuer weakens the concept of the electronic account, only a small amount of information of the digital currency needs to be recorded, the development, storage, operation and maintenance costs of the server are reduced, the safety of the digital currency is guaranteed based on an asymmetric encryption algorithm, and the safety is high; meanwhile, the digital currency has the characteristics of weak centralization, strong circulation, low complexity and the like; in addition, the management method of the digital currency is transparent to disclosure.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
An embodiment of the present application further provides a specific implementation manner of an electronic device capable of implementing all steps in the method in the foregoing embodiment, and referring to fig. 13, the electronic device specifically includes the following contents:
a processor (processor)1301, a memory 1302, a Communications Interface (Communications Interface)1303, a bus 1304, and a non-volatile memory 1305;
the processor 1301, the memory 1302 and the communication interface 1303 complete communication with each other through the bus 1304;
the processor 1301 is configured to call the computer programs in the memory 1302 and the non-volatile storage 1305, and the processor implements all the steps of the method in the above embodiments when executing the computer programs, for example, the processor implements the following steps when executing the computer programs:
s101: and performing identity authentication on the second client according to the authentication instruction sent by the first client.
S102: the first digital currency sent by the second authenticated client is signed.
S103: sending the signed first digital currency to a second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
Embodiments of the present application also provide a computer-readable storage medium capable of implementing all the steps of the method in the above embodiments, where the computer-readable storage medium stores thereon a computer program, and the computer program when executed by a processor implements all the steps of the method in the above embodiments, for example, the processor implements the following steps when executing the computer program:
s101: and performing identity authentication on the second client according to the authentication instruction sent by the first client.
S102: the first digital currency sent by the second authenticated client is signed.
S103: sending the signed first digital currency to a second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the hardware + program class embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment. Although embodiments of the present description provide method steps as described in embodiments or flowcharts, more or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or end product executes, it may execute sequentially or in parallel (e.g., parallel processors or multi-threaded environments, or even distributed data processing environments) according to the method shown in the embodiment or the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, in implementing the embodiments of the present description, the functions of each module may be implemented in one or more software and/or hardware, or a module implementing the same function may be implemented by a combination of multiple sub-modules or sub-units, and the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction. The above description is only an example of the embodiments of the present disclosure, and is not intended to limit the embodiments of the present disclosure. Various modifications and variations to the embodiments described herein will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the embodiments of the present specification should be included in the scope of the claims of the embodiments of the present specification.
Claims (14)
1. An asymmetrically encrypted digital currency transaction data processing method, comprising:
performing identity authentication on a second client according to an authentication instruction sent by a first client;
signing the first digital currency sent by the second client side which passes the identity authentication;
sending the signed first digital currency to the second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
2. The transaction data processing method of claim 1, wherein the authenticating the second client according to the authentication instruction sent by the first client comprises:
sending a random number to the second client to cause the second client to generate a random number signature;
verifying whether the received random number signature is correct.
3. The transaction data processing method of claim 1, wherein said signing the first digital currency sent by the authenticated second client comprises:
searching a corresponding server public key through a currency serial number in the first digital currency, and verifying the validity of the first digital currency through the server public key;
after the verification is passed, a new server public key and a new server private key are generated by using an asymmetric encryption algorithm;
and signing the first digital currency which passes the verification by using the server private key.
4. An asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
the identity authentication unit is used for authenticating the identity of the second client according to the authentication instruction sent by the first client;
the first signature unit is used for signing the first digital currency sent by the second client side which passes the identity authentication;
the basic information updating unit is used for sending the signed first digital currency to the second client for acknowledgement, and updating basic information of the first digital currency after the second client acknowledges; the basic information includes: issue unit number, currency serial number, currency issue date, currency denomination, and version number.
5. The transaction data processing device of claim 4, wherein the identity verification unit comprises:
a random number sending module, configured to send a random number to the second client, so that the second client generates a random number signature;
and the random number signature verification module is used for verifying whether the received random number signature is correct or not.
6. The transaction data processing device of claim 4, wherein the first signature unit comprises:
the public key verification module is used for searching a corresponding server public key through a currency serial number in the first digital currency and verifying the validity of the first digital currency through the server public key;
the public key and private key generation module is used for generating a new server public key and a new server private key by using an asymmetric encryption algorithm after verification is passed;
and the new signature module is used for signing the first digital currency which passes the verification by using the server private key.
7. An asymmetrically encrypted digital currency transaction data processing method, comprising:
generating a second digital currency according to the first digital currency provided by the client;
generating a local public key and a local private key by using an asymmetric encryption algorithm;
sending the local public key and the second digital currency to the client side, and initiating a verification instruction to a server side to enable the server side to verify the client side and complete the signature of the second digital currency;
receiving the second digital currency signed by the server.
8. An asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a second digital currency generation unit for generating a second digital currency from the first digital currency provided by the client;
the asymmetric encryption generating unit is used for generating a local public key and a local private key by using an asymmetric encryption algorithm;
the second signature unit is used for sending the local public key and the second digital currency to the client and sending a verification instruction to a server so that the server verifies the client and completes the signature of the second digital currency;
a receiving unit for receiving the second digital currency signed by the server.
9. An asymmetrically encrypted digital currency transaction data processing method, comprising:
sending the first digital currency to a client side so that the client side generates second digital currency and generates a client side public key and a client side private key according to an asymmetric encryption algorithm;
the received second digital currency is changed by using the received client public key and then is sent to a server, so that the server signs the second digital currency;
and receiving the second digital currency signed by the server and forwarding the second digital currency to the client.
10. The transaction data processing method of claim 9, wherein said altering the received second digital currency with the received client public key comprises:
filling the client public key into the second digital currency;
signing the second digital currency populated with the client public key with a local private key.
11. An asymmetrically encrypted digital currency transaction data processing apparatus, comprising:
a sending unit, configured to send the first digital currency to a client, so that the client generates a second digital currency and generates a client public key and a client private key according to an asymmetric encryption algorithm;
the changing unit is used for changing the received second digital currency by using the received client public key and then sending the changed second digital currency to a server so that the server signs the second digital currency;
and the receiving and forwarding unit is used for receiving the second digital currency signed by the server and forwarding the second digital currency to the client.
12. The transaction data processing device according to claim 11, wherein the changing unit includes:
a public key filling module used for filling the client public key into the second digital currency;
and the third signature module is used for signing the second digital currency filled in the client public key by using a local private key.
13. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program implements the asymmetrically encrypted digital currency transaction data processing method of any of claims 1 to 3, 7, 9 to 10.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the asymmetrically encrypted digital currency transaction data processing method according to any one of claims 1 to 3, 7, 9 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010079664.7A CN111311210B (en) | 2020-02-04 | 2020-02-04 | Asymmetric encryption digital currency transaction data processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010079664.7A CN111311210B (en) | 2020-02-04 | 2020-02-04 | Asymmetric encryption digital currency transaction data processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111311210A true CN111311210A (en) | 2020-06-19 |
CN111311210B CN111311210B (en) | 2023-12-26 |
Family
ID=71146965
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010079664.7A Active CN111311210B (en) | 2020-02-04 | 2020-02-04 | Asymmetric encryption digital currency transaction data processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111311210B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112711742A (en) * | 2020-11-23 | 2021-04-27 | 中国联合网络通信集团有限公司 | Digital currency anti-counterfeiting method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105096118A (en) * | 2015-08-21 | 2015-11-25 | 廖小谦 | Electronic currency transfer payment system and method |
CN106910072A (en) * | 2017-02-15 | 2017-06-30 | 捷德(中国)信息科技有限公司 | Digital cash management method and system |
CN108122098A (en) * | 2018-01-10 | 2018-06-05 | 晋商博创(北京)科技有限公司 | Digital coin systems, method of payment and terminal based on CPK |
CN108805538A (en) * | 2018-06-14 | 2018-11-13 | 清华大学 | A kind of digital cash method of commerce and device |
CN109934582A (en) * | 2019-02-25 | 2019-06-25 | 矩阵元技术(深圳)有限公司 | Digital cash transaction data processing method, server, client and system |
CN109961276A (en) * | 2019-02-27 | 2019-07-02 | 深圳市朗科科技股份有限公司 | Digital cash wallet, method of commerce, transaction system and computer storage medium |
-
2020
- 2020-02-04 CN CN202010079664.7A patent/CN111311210B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105096118A (en) * | 2015-08-21 | 2015-11-25 | 廖小谦 | Electronic currency transfer payment system and method |
CN106910072A (en) * | 2017-02-15 | 2017-06-30 | 捷德(中国)信息科技有限公司 | Digital cash management method and system |
CN108122098A (en) * | 2018-01-10 | 2018-06-05 | 晋商博创(北京)科技有限公司 | Digital coin systems, method of payment and terminal based on CPK |
CN108805538A (en) * | 2018-06-14 | 2018-11-13 | 清华大学 | A kind of digital cash method of commerce and device |
CN109934582A (en) * | 2019-02-25 | 2019-06-25 | 矩阵元技术(深圳)有限公司 | Digital cash transaction data processing method, server, client and system |
CN109961276A (en) * | 2019-02-27 | 2019-07-02 | 深圳市朗科科技股份有限公司 | Digital cash wallet, method of commerce, transaction system and computer storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112711742A (en) * | 2020-11-23 | 2021-04-27 | 中国联合网络通信集团有限公司 | Digital currency anti-counterfeiting method and device |
CN112711742B (en) * | 2020-11-23 | 2023-06-06 | 中国联合网络通信集团有限公司 | Digital currency anti-counterfeiting method and device |
Also Published As
Publication number | Publication date |
---|---|
CN111311210B (en) | 2023-12-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11842317B2 (en) | Blockchain-based authentication and authorization | |
US11930100B2 (en) | Fund conversion between blockchains | |
EP3725029B1 (en) | Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords | |
Zamani et al. | Rapidchain: Scaling blockchain via full sharding | |
US20240095728A1 (en) | Blockchain system for confidential and anonymous smart contracts | |
US20230120742A1 (en) | Quantumproof blockchain | |
JP7244537B2 (en) | Computer-implemented systems and methods suitable for enhancing the security of instant offline blockchain transactions | |
US11212081B2 (en) | Method for signing a new block in a decentralized blockchain consensus network | |
CN111316615B (en) | System and method for ensuring correct execution of a computer program using a mediator computer system | |
CN113874897A (en) | Computer-implemented system and method for effecting transfers over blockchain networks | |
US11728969B2 (en) | Blockchain-implemented security systems and methods for blinded outcome selection | |
JP2022534056A (en) | hash function attack | |
CN109919611B (en) | Quantum computation resistant blockchain transaction method and system based on symmetric key pool server | |
CN111064583A (en) | Threshold SM2 digital signature method and device, electronic equipment and storage medium | |
CN112470423A (en) | Computer-implemented system and method for asset blending | |
CN113939821A (en) | System and method for non-parallel mining on a workload justification blockchain network | |
CN111311210B (en) | Asymmetric encryption digital currency transaction data processing method and device | |
Maharramov et al. | The Dusk network whitepaper | |
Rezaeighaleh | Improving security of crypto wallets in blockchain technologies | |
CN114417389A (en) | Method for storing user asset limit through addition homomorphic encryption in block chain | |
Alnajjar et al. | Mitigating MEV Attacks with a Two-Tiered Architecture Utilizing Verifiable Decryption | |
Bafna | Mathematical Aspects and Challenges of the Algorand Blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220922 Address after: 12 / F, 15 / F, 99 Yincheng Road, Pudong New Area pilot Free Trade Zone, Shanghai, 200120 Applicant after: Jianxin Financial Science and Technology Co.,Ltd. Address before: 25 Financial Street, Xicheng District, Beijing 100033 Applicant before: CHINA CONSTRUCTION BANK Corp. Applicant before: Jianxin Financial Science and Technology Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |