CN111369251B - Block chain transaction supervision method based on user secondary identity structure - Google Patents

Block chain transaction supervision method based on user secondary identity structure Download PDF

Info

Publication number
CN111369251B
CN111369251B CN202010154432.3A CN202010154432A CN111369251B CN 111369251 B CN111369251 B CN 111369251B CN 202010154432 A CN202010154432 A CN 202010154432A CN 111369251 B CN111369251 B CN 111369251B
Authority
CN
China
Prior art keywords
transaction
john
bob
anonymous
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010154432.3A
Other languages
Chinese (zh)
Other versions
CN111369251A (en
Inventor
谢涛
李洪波
熊挺
李浩海
谢琛
周荣豪
李慎纲
李竞
刘一炜
王宝来
谢瑾
肖菁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN202010154432.3A priority Critical patent/CN111369251B/en
Publication of CN111369251A publication Critical patent/CN111369251A/en
Application granted granted Critical
Publication of CN111369251B publication Critical patent/CN111369251B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a block chain transaction supervision method based on a user secondary identity structure, which comprises the following steps: the two parties of the transaction firstly sign own anonymous transaction by using a private key of a public key cryptosystem (PKI) CA certificate of the two parties of the transaction to form mutual commitment to the transaction; the two transaction parties encrypt the digital signature and the CA certificate by using the generated public key of the anonymous account of the other party and send the encrypted digital signature and the CA certificate to the other party; the two transaction parties decrypt the received encrypted commitment signature of the other party and verify the decrypted commitment signature by using the public key of the CA certificate of the other party; and judging whether the verification is established, if so, finishing the down-link transaction, and otherwise, terminating the down-link transaction process. The invention combines the primary real-name identity with the secondary anonymous identity, realizes the under-chain bidirectional authenticable signature and verification of the point-to-point transaction content through the primary real-name identity, and simultaneously realizes the on-chain public tracking and verification of the transaction content authenticity through the secondary anonymous identity.

Description

Block chain transaction supervision method based on user secondary identity structure
Technical Field
The invention relates to the technical field of blockchain, in particular to a blockchain transaction supervision method based on a user secondary identity structure.
Background
The block chain has the characteristics of decentralization, middleman removal, trust removal, anonymity, openness, traceability, distribution, non-tampering and the like, and has wide revolutionary application in the fields of digital currency, cross-border payment, financial science and technology, intelligent contracts, stock exchange, electronic commerce, internet of things, social communication, file storage, evidence storage and right confirmation, share rights and crowd funding and the like. The user of the centralized system must register public identity, the user has no independent control right on own identity and privacy information, and the centralized system has no privacy protection problem. A fully decentralized blockchain is a non-third party based untrusted network (trustless) and may be referred to as a consensus network. Thus, a fully decentralized blockchain may employ anonymous identities, with users having autonomous control over their true identity and private information. If the blockchain is not completely decentralized, trust relationships between users must be established based on public (registered) identities. Thus, anonymity of the user account is an optional attribute of a completely decentralized blockchain network, and you can choose to have their public identity or not. The anonymous digital economy, like the cash trading market, can facilitate commercial transactions by protecting individual privacy. Public digital economies like Taobao network blooms, the network owner providing the business service must legally register the public business identity. Thus, a digital economic entity includes a transaction account number for which an individual must have a publicly registered identity and anonymity. How to ensure that own transaction keeps anonymity on a transaction-unrelated party, but the authenticity of the transaction can be publicly traced and verified on a chain, and meanwhile, real-name identity is adopted for a transaction-related party to carry out chain authentication, so that the problem of chain real-name traceability (KYC) of the transaction-related party is solved, and a default \ illegal evidence for cryptographically preventing repudiation and testability can be provided for the transaction-related party, so that the method is a key problem which needs to be solved when a blockchain technology is applied to a ground practice in a real e-commerce scene.
The block chain network adopts the public account book to record all transactions, anyone can trace back and verify the authenticity of any transaction on the account book at any time, but an irrelevant party of any transaction must never trace and evidence the public real-name identity of a relevant party of the transaction in law. When a party to a transaction violates a law, such as default, money laundering, drug selling, or smuggling, the regulatory authorities can legally disclose criminal evidence by cryptographically repudiation-proof techniques. However, anonymous privacy protection of users of existing blockchain networks conflicts with the real-name regulatory requirements of transaction breach/crime pursuit.
Disclosure of Invention
In order to solve the technical problems, the invention provides a block chain transaction supervision method based on a user secondary identity structure, which is simple in algorithm, safe and reliable.
The technical scheme for solving the technical problems is as follows:
a block chain transaction supervision method based on a user secondary identity structure combines a primary real-name identity with a secondary anonymous identity, realizes under-chain bidirectional authenticable signature and verification of point-to-point transaction contents through the primary real-name identity, and simultaneously realizes on-chain tracking and verification of authenticity of public transaction contents through the secondary anonymous identity, and comprises the following steps:
the method comprises the following steps: the two parties of the transaction firstly sign own anonymous transaction by using the private key of the CA certificate of the two parties of the transaction to form mutual commitment to the transaction;
step two: the two transaction parties encrypt the digital signature and the CA certificate by using the generated public key of the anonymous account of the other party and send the encrypted digital signature and the CA certificate to the other party;
step three: the two transaction parties decrypt the received encrypted commitment signature of the other party and verify the decrypted commitment signature by using the public key of the CA certificate of the other party;
step four: judging whether the verification is established or not, and if the verification is established, finishing the down-link transaction; otherwise, the off-link transaction process is terminated.
According to the block chain transaction supervision method based on the user secondary identity structure, the primary real-name identity is represented by a CA certificate of a user account management App designed based on a public key cryptosystem, and the secondary anonymous identity is represented by a user anonymous account designed based on an asymmetric cryptosystem.
In the block chain transaction supervision method based on the user secondary identity structure, the CA certificate of the App is managed by the user account designed based on the public key cryptosystem, and the CA certificate is stored on a block chain public account and issued by a CA mechanism or an intelligent contract or a CA certificate issued by the CA mechanism and stored on a central server; the user anonymous account designed based on the asymmetric cryptosystem is generated by a cryptographic hash value of one public key or a mixture of a plurality of public keys belonging to the anonymous account.
In the above block chain transaction supervision method based on the user secondary identity structure, in the first step, when the anonymous account number of the transaction initiator is generated by a password hash value mixed by a plurality of public keys, signatures of all private keys of the anonymous account number of the transaction initiator on the anonymous transaction content are provided.
In the block chain transaction supervision method based on the user secondary identity structure, the public identity certificate of the customer John is assumed to be CAJohnThe public key is pubKJohnThe private key is priKJohn(ii) a The public identity certificate of the network commodity sales shop owner Bob is CABobThe public key is pubKBobThe private key is priKBob(ii) a Suppose that
Figure GDA0003228504720000031
Is an anonymous account number, shorthand, of the customer John
Figure GDA0003228504720000032
By a randomly generated public key
Figure GDA0003228504720000033
Generated by cryptographic hashing, the corresponding private key being
Figure GDA0003228504720000034
Figure GDA0003228504720000035
Is another anonymous account number for customer John,simple notes
Figure GDA0003228504720000036
Two randomly generated public keys
Figure GDA0003228504720000037
And
Figure GDA0003228504720000038
is generated by cryptographic hashing, with a corresponding private key of
Figure GDA0003228504720000039
And
Figure GDA00032285047200000310
assuming anonymous account numbers
Figure GDA00032285047200000311
N digital encryption currencies exist, and n is more than or equal to p; suppose that
Figure GDA00032285047200000312
Is an anonymous account number, brief note, of a network shop owner Bob
Figure GDA00032285047200000313
By a randomly generated public key
Figure GDA00032285047200000314
Generated by cryptographic hashing, the private key being
Figure GDA00032285047200000315
The block chain network transaction steps for customer John to purchase item G in p digital cryptocurrency from network owner Bob are as follows:
1) customer John's anonymous account with himself
Figure GDA0003228504720000041
To another anonymous account of oneself
Figure GDA0003228504720000042
Sending p digital cryptocurrency John via anonymous account
Figure GDA0003228504720000043
Signs the contents of the transaction, i.e. calculates
Figure GDA0003228504720000044
sign is a signature operation symbol; the signature on the transaction is actually a signature on the cryptographic hash value of the transaction content itself,
Figure GDA0003228504720000045
refers to a simplified representation containing a transaction hash signature value and a transaction file, i.e. representing an anonymous account number
Figure GDA0003228504720000046
To anonymous account numbers
Figure GDA0003228504720000047
P digital cryptocurrency are sent out,
Figure GDA0003228504720000048
representation by private key
Figure GDA0003228504720000049
For transaction
Figure GDA00032285047200000410
The signature of (3), the following are similar;
2) customer John's anonymous account with himself
Figure GDA00032285047200000411
Anonymous account number to store owner Bob
Figure GDA00032285047200000412
Sending p digital encryption currencies; john through anonymous account
Figure GDA00032285047200000413
A private key of
Figure GDA00032285047200000414
Partially signing, i.e. computing, transaction content
Figure GDA00032285047200000415
Then will be
Figure GDA00032285047200000416
Are sent together to
Figure GDA00032285047200000417
3) The shop owner Bob receives
Figure GDA00032285047200000418
And
Figure GDA00032285047200000419
after the information, record
Figure GDA00032285047200000420
Then the identity certificate CA is published by the userBobPrivate key priKBobTo pair
Figure GDA00032285047200000421
Signing, i.e. calculating commitment signatures
Figure GDA00032285047200000422
Then the signature value SignBobPublic identity certificate CA of shop owner BobBobMerchant Bob anonymous account number
Figure GDA00032285047200000423
Of (2) a public key
Figure GDA00032285047200000424
And a nonce generated instantaneously by BobBobConcatenating to obtain a sequence of messages
Figure GDA00032285047200000425
With the anonymous account number of the customer John
Figure GDA00032285047200000426
Of (2) a public key
Figure GDA00032285047200000427
Encryption
Figure GDA00032285047200000428
Obtaining an encrypted ciphertext
Figure GDA00032285047200000429
Enc is an encryption operation symbol; then the encrypted ciphertext is encrypted
Figure GDA00032285047200000430
Anonymous account number sent to customer John
Figure GDA00032285047200000431
4) Customer John receives the encrypted ciphertext
Figure GDA0003228504720000051
After the information, the account number is anonymous through the user
Figure GDA0003228504720000052
Private key of
Figure GDA0003228504720000053
To pair
Figure GDA0003228504720000054
Performing decryption, i.e. calculation
Figure GDA0003228504720000055
To obtain
Figure GDA0003228504720000056
As a store owner Bob to the transaction
Figure GDA0003228504720000057
The verifiable chain promissory signature of (1), Dec is a decryption operation symbol, and is the inverse operation of encryption operation Enc; using public real-name certificates CABobPublic key publicKBobSigning commitments
Figure GDA0003228504720000058
Performing authentication, i.e. verifying
Figure GDA0003228504720000059
Figure GDA00032285047200000510
If the verification is true, continuing the next step; otherwise, terminating the down-link transaction process;
5) customer John with anonymous account number
Figure GDA00032285047200000511
Another private key of
Figure GDA00032285047200000512
For transaction
Figure GDA00032285047200000513
The content being partially signed, i.e. calculated
Figure GDA00032285047200000514
Note the book
Figure GDA00032285047200000515
Figure GDA00032285047200000516
Is that the customer John is through an anonymous account number
Figure GDA00032285047200000517
Reconciled transactions
Figure GDA00032285047200000518
The complete commitment of; note the book
Figure GDA00032285047200000519
Figure GDA00032285047200000520
Is that the customer John is through an anonymous account number
Figure GDA00032285047200000521
And
Figure GDA00032285047200000522
reconciled transactions
Figure GDA00032285047200000523
The complete commitment of;
6) customer John publishes certificate CA by himselfJohnPrivate key priKJohnTo pair
Figure GDA00032285047200000524
Signing, i.e. calculating commitment signatures
Figure GDA00032285047200000525
Sign value SignJohnPublic certificate CA with customer JohnJohnAnd a random number nonce generated immediately by customer JohnJohnConcatenating to obtain a sequence of messages
Figure GDA00032285047200000526
And using the anonymous account number of the network shop owner Bob
Figure GDA00032285047200000527
Of (2) a public key
Figure GDA00032285047200000528
To pair
Figure GDA00032285047200000529
Encrypted to obtain
Figure GDA00032285047200000530
Figure GDA00032285047200000531
Will encrypt the result
Figure GDA00032285047200000532
Anonymous account number sent to network store owner Bob
Figure GDA00032285047200000533
7) The network shop owner Bob receives
Figure GDA0003228504720000061
After the information, the account number is anonymous through the user
Figure GDA0003228504720000062
Private key of
Figure GDA0003228504720000063
To pair
Figure GDA0003228504720000064
Performing decryption, i.e. calculation
Figure GDA0003228504720000065
Get SignJohn||CAJohn||nonceJohnAs a customer John's pair transaction
Figure GDA0003228504720000066
Verifiable commitment signature of (a); using public certificates CAJohnPublic key pubKJohnSign the acceptance SignJohn||CAJohn||nonceJohnPerforming authentication, i.e. verifying
Figure GDA0003228504720000067
If the verification is true, continuing the next step; otherwise, terminating the down-link transaction process;
8) the network owner Bob initiates a shipping program for the item G purchased by the customer John.
The block chain transaction supervision method based on the user secondary identity structure comprises the following stepsIn step 3), the
Figure GDA0003228504720000068
The encryption of (c) may use the public key of any anonymous account number of the customer John that the network store owner Bob knows.
The block chain transaction supervision method based on the user secondary identity structure further comprises the step that one of the two transaction parties carries out duty following on the real-name identity of the default/illegal party under the condition that the other party violates/violates a law, and supposing that the customer John and the network store owner Bob successfully complete the under-chain transaction program for the commodity G through the block chain, but the network store owner Bob does not start the delivery program of the commodity G; in the case that the customer John cannot receive the commodity G, the real-name identity tracing program for the network store owner Bob is started, and the steps are as follows:
step 1: the public real-name certificate CA of the network store owner Bob that the customer John will save in step 4) of the transaction programBobAnd its signed commitment to the transaction
Figure GDA0003228504720000069
Sending the information to an issuing organization of an intelligent contract or a public key CA certificate which undertakes block chain transaction supervision;
step 2: the supervisor checks the real name certificate CA of the network shop owner Bob through the certificate revocation listBobPerforming temporary suspension and informing the shop owner to complete the transaction process, starting a delivery program of the purchased commodity G or returning the order of the customer John on the commodity G by p cryptocurrency, or directly deducting p cryptocurrency from the block chain network transaction security deposit of the network shop owner Bob to the customer John; and the penalty is used for maintaining the normal operation cost of the supervisory program according to the scene intensity.
In the block chain transaction supervision method based on the user secondary identity structure, in the step that one of two transaction parties violates/violates the law, and the other party undertakes responsibility for the real-name identity of the violated/violated party, there is a violation behavior of the customer John on the network store owner Bob:
a double-flower transaction is generated immediately after customer John completes the off-chain transaction step
Figure GDA0003228504720000071
And sends it to the blockchain network, which invalidates the customer John's commitment to the network store owner Bob's payment, and a brief
Figure GDA0003228504720000072
Wherein
Figure GDA0003228504720000073
Is an anonymous account number of customer John; when the network store owner Bob encounters a double-flower attack of the customer John, the public identity certificate CA of the customer is utilizedJohnAnd its pair transaction
Figure GDA0003228504720000074
Under-chain commitment signature SignJohnThe real-name identity accountability program for the customer John is started, and the real-name identity accountability program for the customer John is the same as the real-name identity accountability program for the network store owner Bob.
According to the block chain transaction supervision method based on the user secondary identity structure, two parties conducting transactions through the block chain network do not need to wait for the record and confirmation of the block chain to the transactions, and post-processing is conducted on the record and confirmation process of the transactions, namely when the two parties of the transactions successfully complete the down-chain transaction step and do not find an event of default/violation, both parties of the transactions conduct anonymous transactions
Figure GDA0003228504720000075
And sending to the blockchain network.
The invention has the beneficial effects that:
1. the invention combines the primary real-name identity with the secondary anonymous identity, realizes the under-chain bidirectional authenticable signature and verification of the point-to-point transaction content through the primary real-name identity, and simultaneously realizes the on-chain tracking and verification of the authenticity of the public transaction content through the secondary anonymous identity.
2. Blockchain network anonymous accounts may facilitate commercial transactions by protecting individual privacy, and legitimate registration public identities may provide traceability of network violations/violations. The block chain secondary identity structure in the invention has dual identity information of the user public registration identity and the anonymous transaction account number, thereby promoting commercial transaction and protecting the legal rights and interests of participants.
3. The user with the primary public CA certificate can realize point-to-point anonymous value/message transmission through the secondary anonymous account, only two interactive parties can carry out cryptology anti-repudiation under-chain authentication on the real-name identity through a CA certificate system, and the public block chain account book can realize on-chain tracing verification on the authenticity of any transaction/interactive content.
4. The user secondary identity structure can ensure the necessary privacy protection rights among digital economic behavior individuals, and meanwhile, when one party is in default or illegal, the other party can carry out effective anti-repudiation evidence-raising on the digital economic behavior individuals in the cryptographic sense, thereby providing digital criminal evidence with legal efficacy for anonymous account behavior supervision and criminal tracing services of a block chain network.
5. The public key CA certificates of both transaction parties and the signature of the public identity commitment of the transaction do not need to be recorded on the public account book of the block chain, and only the public key CA certificate of the other party and the signature of the public key CA certificate on the commitment of the transaction need to be stored by the transaction related party under the chain.
6. The block chain network can record all transactions by adopting a traditional public account book, anyone can trace and verify the authenticity of any transaction on the account book at any time, and an irrelevant party of any transaction does not permit to track and obtain the public real-name identity of a relevant party of the transaction.
7. In the invention, both sides of the block chain network downlink transaction process are carried out through the secondary identity structure of the user, the record and confirmation of the transaction by the block chain network are not required to be waited, the record and confirmation process of the transaction is submitted by both sides for post-processing, and the efficient downlink transaction process, namely the transaction is firstly carried out and then the record is carried out.
8. In the invention, the secondary identity structure can solve the basic problem of deep human society. In the construction of a decentralized social network platform, on the basis of how to protect the freedom of the personal online talk and creation behaviors (including audio, video, pictures, characters and other digital creative products), the method simultaneously ensures that the personal digital creative works obtain copyright protection evidences with cryptographic significance and evidence or source-tracing evidences for propagating illegal contents in the propagation process, and a secondary identity structure can provide deep technical support.
Drawings
FIG. 1 is a block chain network secondary identity structure of the present invention.
Fig. 2 is a schematic diagram of a secondary identity structure of a blockchain network node John according to the present invention.
FIG. 3 is a diagram illustrating a secondary identity structure of a blockchain network node Bob according to the present invention.
FIG. 4 is a diagram of a customer John's single public key account with the present invention
Figure GDA0003228504720000091
Transferring P digital currencies to a Dual public Key Account
Figure GDA0003228504720000092
A schematic diagram of a payment requiring double signature verification is generated.
FIG. 5 illustrates a customer John using dual public key account according to the present invention
Figure GDA0003228504720000093
Primary account number to store
Figure GDA0003228504720000094
Sending P digital currencies for use
Figure GDA0003228504720000095
Schematic diagram of partial commitment signature.
FIG. 6 is a diagram illustrating a store owner Bob sending a verifiable encrypted blockchain transaction chain commitment signature to customer John in accordance with the present invention.
FIG. 7 is a diagram illustrating customer John decrypting and verifying a commitment signature under the blockchain transaction chain in accordance with the present invention.
FIG. 8 illustrates a customer John using dual public key account according to the present invention
Figure GDA0003228504720000096
Primary account number to store
Figure GDA0003228504720000097
Sending P digital currencies for use
Figure GDA0003228504720000098
Schematic diagram of partial commitment signature.
FIG. 9 is a diagram illustrating a customer John sending a verifiable encrypted blockchain transaction chain commitment signature to a merchant Bob in accordance with the present invention.
FIG. 10 is a diagram of a store owner Bob decrypting and verifying a commitment signature under a blockchain transaction chain in accordance with the present invention.
Detailed Description
The invention is further described below with reference to the figures and examples.
A block chain transaction supervision method based on a user secondary identity structure combines a primary real-name identity with a secondary anonymous identity, realizes under-chain bidirectional authenticatable signature and verification of point-to-point transaction contents through the primary real-name identity, and simultaneously realizes on-chain tracking and verification of authenticity of public transaction contents through the secondary anonymous identity, wherein the primary real-name identity is represented by a CA (certificate authority) certificate of a user account management (App) designed based on a public key cryptosystem, and the secondary anonymous identity is represented by a user anonymous account designed based on an asymmetric cryptosystem. The CA certificate of the user account management App designed based on the public key cryptosystem refers to a CA certificate which is stored on a block chain public account and issued by a CA mechanism or an intelligent contract or a CA certificate which is issued by the CA mechanism and stored on a central server; the user anonymous account designed based on the asymmetric cryptosystem is generated by a cryptographic hash value of one public key or a mixture of a plurality of public keys belonging to the anonymous account.
The method comprises the following steps:
the method comprises the following steps: the two parties of the transaction firstly sign own anonymous transaction by using the private key of the CA certificate of the two parties of the transaction to form mutual commitment to the transaction; when the transaction initiator anonymous account number is generated by a cryptographic hash value of a mixture of a plurality of public keys, a signature of all private keys of the transaction initiator anonymous account number on the anonymous transaction content is provided.
Step two: and the two transaction parties encrypt the digital signature and the CA certificate of the two transaction parties by using the generated public key of the anonymous account of the other party and send the encrypted digital signature and the CA certificate to the other party.
Step three: the two transaction parties decrypt the received acceptance signature encrypted by the other party and verify the decrypted acceptance signature by using the public key of the CA certificate of the other party.
Step four: judging whether the verification is established or not, and if the verification is established, finishing the down-link transaction; otherwise, the off-link transaction process is terminated.
Take the blockchain transaction process in which customer John purchases a commodity G in p digital cryptocurrency from a network owner Bob.
FIG. 1 is a schematic diagram of the structure of the secondary identity of the present invention. FIG. 2 is a secondary identity structure of block chain node John with anonymous account numbers
Figure GDA0003228504720000101
Two randomly generated public keys
Figure GDA0003228504720000102
And
Figure GDA0003228504720000103
is generated by a cryptographic hash value, referred to as a multiple public key anonymous account number. Multiple public key anonymous account numbers can be used to construct complex payment commitments for multiple signature verification. Fig. 3 is a secondary identity structure of block link points Bob. As shown in FIGS. 2 and 3, assume that customer John's public identity certificate is CAJohnThe public key is pubKJohnThe private key is priKJohn(ii) a The public identity certificate of the network commodity sales shop owner Bob is CABobThe public key is pubKBobThe private key is priKBob(ii) a An illustrative example is a blockchain network transaction process in which customer John purchases a good G with price p digital cryptocurrency from a network owner Bob. Suppose that
Figure GDA0003228504720000104
Is an anonymous account number, shorthand, of the customer John
Figure GDA0003228504720000111
By a randomly generated public key
Figure GDA0003228504720000112
Generated by cryptographic hashing, the corresponding private key being
Figure GDA0003228504720000113
Figure GDA0003228504720000114
Is another anonymous account number, shorthand, of customer John
Figure GDA0003228504720000115
Two randomly generated public keys
Figure GDA0003228504720000116
And
Figure GDA0003228504720000117
is generated by cryptographic hashing, which may be a direct concatenation, logical operation, or other mathematical operation, with the corresponding private key being
Figure GDA0003228504720000118
And
Figure GDA0003228504720000119
assuming anonymous account numbers
Figure GDA00032285047200001110
N digital encryption currencies exist, and n is more than or equal to p; suppose that
Figure GDA00032285047200001111
Is an anonymous account number, brief note, of a network shop owner Bob
Figure GDA00032285047200001112
By a randomly generated public key
Figure GDA00032285047200001113
Generated by cryptographic hashing, the private key being
Figure GDA00032285047200001114
The block chain network transaction steps for customer John to purchase item G in p digital cryptocurrency from network owner Bob are as follows:
1) customer John's anonymous account with himself
Figure GDA00032285047200001115
To another anonymous account of oneself
Figure GDA00032285047200001116
Sending p digital cryptocurrency John via anonymous account
Figure GDA00032285047200001117
Signs the contents of the transaction, i.e. calculates
Figure GDA00032285047200001118
sign is a signature operation symbol, as shown in fig. 4; the signature on the transaction is actually a signature on the cryptographic hash value of the transaction content itself,
Figure GDA00032285047200001119
refers to a simplified representation containing a transaction hash signature value and a transaction file, i.e. representing an anonymous account number
Figure GDA00032285047200001120
To anonymous account numbers
Figure GDA00032285047200001121
P digital cryptocurrency are sent out,
Figure GDA00032285047200001122
is shown to pass throughPrivate key
Figure GDA00032285047200001123
For transaction
Figure GDA00032285047200001124
The signature of (2) is the same as the following.
2) As shown in FIG. 5, customer John is anonymous to his own account number
Figure GDA00032285047200001125
Anonymous account number to store owner Bob
Figure GDA00032285047200001126
Sending p digital encryption currencies; john through anonymous account
Figure GDA00032285047200001127
A private key of
Figure GDA00032285047200001128
Partially signing, i.e. computing, transaction content
Figure GDA00032285047200001129
Then will be
Figure GDA00032285047200001130
Are sent together to
Figure GDA00032285047200001131
3) The shop owner Bob receives
Figure GDA00032285047200001132
And
Figure GDA00032285047200001133
after the information, record
Figure GDA0003228504720000121
As shown in fig. 6, the identity certificate CA is then published by itselfBobPrivate key pr ofiKBobTo pair
Figure GDA0003228504720000122
Signing, i.e. calculating commitment signatures
Figure GDA0003228504720000123
Then the signature value SignBPublic identity certificate CA of shop owner BobBobMerchant Bob anonymous account number
Figure GDA0003228504720000124
Of (2) a public key
Figure GDA0003228504720000125
And a nonce generated instantaneously by BobBobConcatenating to obtain a sequence of messages
Figure GDA0003228504720000126
With the anonymous account number of the customer John
Figure GDA0003228504720000127
Of (2) a public key
Figure GDA0003228504720000128
Encryption
Figure GDA0003228504720000129
Obtaining an encrypted ciphertext
Figure GDA00032285047200001210
Enc is an encryption operation symbol; then the encrypted ciphertext is encrypted
Figure GDA00032285047200001211
Anonymous account number sent to customer John
Figure GDA00032285047200001212
To pair
Figure GDA00032285047200001213
The encryption of (A) may use any of the customers John's who the network store owner Bob knowsPublic key of anonymous account number, but it is recommended to use the current anonymous account number
Figure GDA00032285047200001214
Of (2) a public key
Figure GDA00032285047200001215
4) As shown in FIG. 7, customer John receives the encrypted ciphertext
Figure GDA00032285047200001216
After the information, the account number is anonymous through the user
Figure GDA00032285047200001217
Private key of
Figure GDA00032285047200001218
To pair
Figure GDA00032285047200001219
Performing decryption, i.e. calculation
Figure GDA00032285047200001220
To obtain
Figure GDA00032285047200001221
As a store owner Bob to the transaction
Figure GDA00032285047200001222
The verifiable chain promissory signature of (1), Dec is a decryption operation symbol, and is the inverse operation of encryption operation Enc; using public real-name certificates CABobPublic key publicKBobSigning commitments
Figure GDA00032285047200001223
Performing authentication, i.e. verifying
Figure GDA00032285047200001224
Figure GDA00032285047200001225
If the verification is true, continuing the next step; otherwise, the off-link transaction process is terminated.
5) As shown in FIG. 8, customer John is presented with an anonymous account number
Figure GDA00032285047200001226
Another private key of
Figure GDA00032285047200001227
For transaction
Figure GDA00032285047200001228
The content being partially signed, i.e. calculated
Figure GDA00032285047200001229
Figure GDA00032285047200001230
Note the book
Figure GDA00032285047200001231
Is that the customer John is through an anonymous account number
Figure GDA0003228504720000131
Reconciled transactions
Figure GDA0003228504720000132
The complete commitment of; note the book
Figure GDA0003228504720000133
Is that the customer John is through an anonymous account number
Figure GDA0003228504720000134
And
Figure GDA0003228504720000135
reconciled transactions
Figure GDA0003228504720000136
The complete commitment of.
6) As shown in FIG. 9, customer John passes himselfPublic certificate CAJohnPrivate key priKjohnTo pair
Figure GDA0003228504720000137
Signing, i.e. calculating commitment signatures
Figure GDA0003228504720000138
Sign value SignJohnPublic certificate CA with customer JohnJohnAnd a random number nonce generated immediately by customer JohnJohnConcatenating to obtain a sequence of messages
Figure GDA00032285047200001325
And using the anonymous account number of the network shop owner Bob
Figure GDA0003228504720000139
Of (2) a public key
Figure GDA00032285047200001310
To pair
Figure GDA00032285047200001311
Encrypted to obtain
Figure GDA00032285047200001312
Figure GDA00032285047200001313
Will encrypt the result
Figure GDA00032285047200001314
Anonymous account number sent to network store owner Bob
Figure GDA00032285047200001315
7) As shown in FIG. 10, the network store owner Bob receives
Figure GDA00032285047200001316
After the information, the account number is anonymous through the user
Figure GDA00032285047200001317
Private key of
Figure GDA00032285047200001318
To pair
Figure GDA00032285047200001319
Performing decryption, i.e. calculation
Figure GDA00032285047200001320
Figure GDA00032285047200001321
Get SignJohn||CAJohn||nonceJohnAs a customer John's pair transaction
Figure GDA00032285047200001322
Verifiable commitment signature of (a); using public certificates CAJohnPublic key pubKJohnSign the acceptance SignJohn||CAJohn||nonceJohnPerforming authentication, i.e. verifying
Figure GDA00032285047200001323
Figure GDA00032285047200001324
If the verification is true, continuing the next step; otherwise, the off-link transaction process is terminated.
8) The network owner Bob initiates a shipping program for the item G purchased by the customer John.
The block chain transaction supervision method based on the user secondary identity structure further comprises the step that one of the two transaction parties carries out duty following on the real-name identity of the default/illegal party under the condition that the other party violates/violates a law, and supposing that the customer John and the network store owner Bob successfully complete the under-chain transaction program for the commodity G through the block chain, but the network store owner Bob does not start the delivery program of the commodity G; in the case that the customer John cannot receive the commodity G, the real-name identity tracing program for the network store owner Bob is started, and the steps are as follows:
step 1: customer John will be on transactionThe public real-name certificate CA of the network store owner Bob stored in the step 4) in the sequenceBobAnd its signed commitment to the transaction
Figure GDA0003228504720000141
Sending the information to an issuing organization of an intelligent contract or a public key CA certificate which undertakes block chain transaction supervision;
step 2: the supervisor checks the real name certificate CA of the network shop owner Bob through the certificate revocation listBobPerforming temporary suspension and informing the shop owner to complete the transaction process, starting a delivery program of the purchased commodity G or returning the order of the customer John on the commodity G by p cryptocurrency, or directly deducting p cryptocurrency from the block chain network transaction security deposit of the network shop owner Bob to the customer John; and the penalty is used for maintaining the normal operation cost of the supervisory program according to the scene intensity.
In the block chain transaction supervision method based on the user secondary identity structure, in the step that one of two transaction parties violates/violates the law, and the other party undertakes responsibility for the real-name identity of the violated/violated party, there is a violation behavior of the customer John on the network store owner Bob:
a double-flower transaction is generated immediately after customer John completes the off-chain transaction step
Figure GDA0003228504720000142
And sends it to the blockchain network, which invalidates the customer John's commitment to the network store owner Bob's payment, and a brief
Figure GDA0003228504720000143
Wherein
Figure GDA0003228504720000144
Is an anonymous account number of customer John; when the network store owner Bob encounters a double-flower attack of the customer John, the public identity certificate CA of the customer is utilizedJohnAnd its pair transaction
Figure GDA0003228504720000145
Under-chain commitment signature SignJohnInitiating actions for customer JohnThe real-name identity tracing program for the customer John is the same as the real-name identity tracing program for the network store owner Bob.
According to the block chain transaction supervision method based on the user secondary identity structure, two parties conducting transactions through the block chain network do not need to wait for the record and confirmation of the block chain to the transactions, and post-processing is conducted on the record and confirmation process of the transactions, namely when the two parties of the transactions successfully complete the down-chain transaction step and do not find an event of default/violation, both parties of the transactions conduct anonymous transactions
Figure GDA0003228504720000151
And sending to the blockchain network.

Claims (9)

1. A block chain transaction supervision method based on a user secondary identity structure is characterized in that a primary real-name identity is combined with a secondary anonymous identity, the down-chain bidirectional authenticable signature and verification of point-to-point transaction contents are realized through the primary real-name identity, and the on-chain tracking and verification of the authenticity of public transaction contents are realized through the secondary anonymous identity, and the method comprises the following steps:
the method comprises the following steps: the two parties of the transaction firstly sign own anonymous transaction by using the private key of the CA certificate of the two parties of the transaction to form mutual commitment to the transaction;
step two: the two transaction parties encrypt the digital signature and the CA certificate by using the generated public key of the anonymous account of the other party and send the encrypted digital signature and the CA certificate to the other party;
step three: the two transaction parties decrypt the received encrypted commitment signature of the other party and verify the decrypted commitment signature by using the public key of the CA certificate of the other party;
step four: judging whether the verification is established or not, and if the verification is established, finishing the down-link transaction; otherwise, the off-link transaction process is terminated.
2. The method for supervising the block chain transaction based on the secondary identity structure of the user according to claim 1, wherein the primary real-name identity is represented by a CA certificate of an account management App of the user designed based on a public key cryptosystem, and the secondary anonymous identity is represented by an anonymous account of the user designed based on an asymmetric cryptosystem.
3. The method as claimed in claim 2, wherein the CA certificate of the App is a CA certificate stored in a blockchain public account issued by a CA organization or an intelligent contract or a CA certificate stored in a central server and issued by the CA organization; the user anonymous account designed based on the asymmetric cryptosystem is generated by a cryptographic hash value of one public key or a mixture of a plurality of public keys belonging to the anonymous account.
4. The method as claimed in claim 3, wherein in the first step, when the anonymous account number of the transaction initiator is generated from a cryptographic hash value mixed by a plurality of public keys, a signature of all private keys of the anonymous account number of the transaction initiator on the content of the anonymous transaction is provided.
5. The blockchain transaction monitoring method based on user secondary identity structure as in claim 4, wherein the public identity certificate of the customer John is assumed to be CAJohnThe public key is pubKJohnThe private key is priKJohn(ii) a The public identity certificate of the network commodity sales shop owner Bob is CABobThe public key is pubKBobThe private key is priKBob(ii) a Suppose that
Figure FDA0002403583040000021
Is an anonymous account number, shorthand, of the customer John
Figure FDA0002403583040000022
Figure FDA0002403583040000023
By a randomly generated public key
Figure FDA0002403583040000024
Generated by cryptographic hashing, the corresponding private key being
Figure FDA0002403583040000025
Figure FDA0002403583040000026
Is another anonymous account number, shorthand, of customer John
Figure FDA0002403583040000027
Two randomly generated public keys
Figure FDA0002403583040000028
And
Figure FDA0002403583040000029
is generated by cryptographic hashing, with a corresponding private key of
Figure FDA00024035830400000210
And
Figure FDA00024035830400000211
assuming anonymous account numbers
Figure FDA00024035830400000212
N digital encryption currencies exist, and n is more than or equal to p; suppose that
Figure FDA00024035830400000213
Is an anonymous account number, brief note, of a network shop owner Bob
Figure FDA00024035830400000214
By a randomly generated public key
Figure FDA00024035830400000215
Generated by cryptographic hashing, the private key being
Figure FDA00024035830400000216
The block chain network transaction steps for customer John to purchase item G in p digital cryptocurrency from network owner Bob are as follows:
1) customer John's anonymous account with himself
Figure FDA00024035830400000217
To another anonymous account of oneself
Figure FDA00024035830400000218
Sending p digital cryptocurrency John via anonymous account
Figure FDA00024035830400000219
Signs the contents of the transaction, i.e. calculates
Figure FDA00024035830400000220
sign is a signature operation symbol; the signature on the transaction is actually a signature on the cryptographic hash value of the transaction content itself,
Figure FDA00024035830400000221
refers to a simplified representation containing a transaction hash signature value and a transaction file, i.e. representing an anonymous account number
Figure FDA00024035830400000222
To anonymous account numbers
Figure FDA00024035830400000223
P digital cryptocurrency are sent out,
Figure FDA00024035830400000224
representation by private key
Figure FDA00024035830400000225
For transaction
Figure FDA00024035830400000226
The signature of (3), the following are similar;
2) customer John's anonymous account with himself
Figure FDA0002403583040000031
Anonymous account number to store owner Bob
Figure FDA0002403583040000032
Sending p digital encryption currencies; john through anonymous account
Figure FDA0002403583040000033
A private key of
Figure FDA0002403583040000034
Partially signing, i.e. computing, transaction content
Figure FDA0002403583040000035
Then will be
Figure FDA0002403583040000036
Are sent together to
Figure FDA0002403583040000037
3) The shop owner Bob receives
Figure FDA0002403583040000038
And
Figure FDA0002403583040000039
after the information, record
Figure FDA00024035830400000310
Then disclose identity by oneselfCertificate CABobPrivate key priKBobTo pair
Figure FDA00024035830400000311
Signing, i.e. calculating commitment signatures
Figure FDA00024035830400000312
Then the signature value SignBobPublic identity certificate CA of shop owner BobBobMerchant Bob anonymous account number
Figure FDA00024035830400000313
Of (2) a public key
Figure FDA00024035830400000314
And a nonce generated instantaneously by BobBobConcatenating to obtain a sequence of messages
Figure FDA00024035830400000315
With the anonymous account number of the customer John
Figure FDA00024035830400000316
Of (2) a public key
Figure FDA00024035830400000317
Encryption
Figure FDA00024035830400000318
Obtaining an encrypted ciphertext
Figure FDA00024035830400000319
Enc is an encryption operation symbol; then the encrypted ciphertext is encrypted
Figure FDA00024035830400000320
Anonymous account number sent to customer John
Figure FDA00024035830400000321
4) Customer John receives the encrypted ciphertext
Figure FDA00024035830400000322
After the information, the account number is anonymous through the user
Figure FDA00024035830400000323
Private key of
Figure FDA00024035830400000324
To pair
Figure FDA00024035830400000325
Performing decryption, i.e. calculation
Figure FDA00024035830400000326
To obtain
Figure FDA00024035830400000327
As a store owner Bob to the transaction
Figure FDA00024035830400000328
The verifiable chain promissory signature of (1), Dec is a decryption operation symbol, and is the inverse operation of encryption operation Enc; using public real-name certificates CABobPublic key publicKBobSigning commitments
Figure FDA00024035830400000329
Performing authentication, i.e. verifying
Figure FDA00024035830400000330
Figure FDA00024035830400000331
If the verification is true, continuing the next step; otherwise, terminating the down-link transaction process;
5) customer John with anonymous account number
Figure FDA00024035830400000332
Another private key of
Figure FDA00024035830400000333
For transaction
Figure FDA0002403583040000041
The content being partially signed, i.e. calculated
Figure FDA0002403583040000042
Note the book
Figure FDA0002403583040000043
Figure FDA0002403583040000044
Figure FDA0002403583040000045
Is that the customer John is through an anonymous account number
Figure FDA0002403583040000046
Reconciled transactions
Figure FDA0002403583040000047
The complete commitment of; note the book
Figure FDA0002403583040000048
Figure FDA0002403583040000049
Figure FDA00024035830400000410
Is that the customer John is through an anonymous account number
Figure FDA00024035830400000411
And
Figure FDA00024035830400000412
reconciled transactions
Figure FDA00024035830400000413
The complete commitment of;
6) customer John publishes certificate CA by himselfJohnPrivate key priKJohnTo pair
Figure FDA00024035830400000414
Signing, i.e. calculating commitment signatures
Figure FDA00024035830400000415
Sign value SignJohnPublic certificate CA with customer JohnJohnAnd a random number nonce generated immediately by customer JohnJohnConcatenating to obtain a sequence of messages
Figure FDA00024035830400000416
And using the anonymous account number of the network shop owner Bob
Figure FDA00024035830400000417
Of (2) a public key
Figure FDA00024035830400000418
To pair
Figure FDA00024035830400000419
Encrypted to obtain
Figure FDA00024035830400000420
Figure FDA00024035830400000421
Will encrypt the result
Figure FDA00024035830400000422
Anonymous account number sent to network store owner Bob
Figure FDA00024035830400000423
7) The network shop owner Bob receives
Figure FDA00024035830400000424
After the information, the account number is anonymous through the user
Figure FDA00024035830400000425
Private key of
Figure FDA00024035830400000426
To pair
Figure FDA00024035830400000427
Performing decryption, i.e. calculation
Figure FDA00024035830400000428
Get SignJohn||CAJohn||nonceJohnAs a customer John's pair transaction
Figure FDA00024035830400000429
Verifiable commitment signature of (a); using public certificates CAJohnPublic key pubKJohnSign the acceptance SignJohn||CAJohn||nonceJohnPerforming authentication, i.e. verifying
Figure FDA00024035830400000430
If the verification is true, continuing the next step; otherwise, terminating the down-link transaction process;
8) the network owner Bob initiates a shipping program for the item G purchased by the customer John.
6. The method of claim 5, wherein the method further comprises: in the step 3), the
Figure FDA00024035830400000431
The encryption of (c) may use the public key of any anonymous account number of the customer John that the network store owner Bob knows.
7. The method of claim 5, wherein the method further comprises: the method also comprises the step that one of the two transaction parties carries out tracing to the real-name identity of the default/illegal party under the condition that the other party is illegal, and the customer John and the network store owner Bob are supposed to successfully complete the offline transaction program of the commodity G through the block chain, but the network store owner Bob does not start the delivery program of the commodity G; in the case that the customer John cannot receive the commodity G, the real-name identity tracing program for the network store owner Bob is started, and the steps are as follows:
step 1: the public real-name certificate CA of the network store owner Bob that the customer John will save in step 4) of the transaction programBobAnd its signed commitment to the transaction
Figure FDA0002403583040000051
Sending the information to an issuing organization of an intelligent contract or a public key CA certificate which undertakes block chain transaction supervision;
step 2: the supervisor checks the real name certificate CA of the network shop owner Bob through the certificate revocation listBobPerforming temporary suspension and informing the shop owner to complete the transaction process, starting a delivery program of the purchased commodity G or returning the order of the customer John on the commodity G by p cryptocurrency, or directly deducting p cryptocurrency from the block chain network transaction security deposit of the network shop owner Bob to the customer John; and the penalty is used for maintaining the normal operation cost of the supervisory program according to the scene intensity.
8. The method of claim 7, wherein the method further comprises: in the step of tracing the real-name identity of the default/illegal party by one of the two parties of the transaction under the condition of default/illegal, there is a default behavior of the customer John to the network store owner Bob:
a double-flower transaction is generated immediately after customer John completes the off-chain transaction step
Figure FDA0002403583040000052
And sends it to the blockchain network, which invalidates the customer John's commitment to the network store owner Bob's payment, and a brief
Figure FDA0002403583040000053
Wherein
Figure FDA0002403583040000054
Is an anonymous account number of customer John; when the network store owner Bob encounters a double-flower attack of the customer John, the public identity certificate CA of the customer is utilizedJohnAnd its pair transaction
Figure FDA0002403583040000055
Under-chain commitment signature SignJohnThe real-name identity accountability program for the customer John is started, and the real-name identity accountability program for the customer John is the same as the real-name identity accountability program for the network store owner Bob.
9. The blockchain transaction supervision method according to claim 7, wherein both parties performing transactions through the blockchain network do not need to wait for the blockchain to record and confirm the transaction, and perform post-processing on the record and confirmation process of the transaction, that is, when both parties successfully complete the off-chain transaction step and do not find any default/illegal event, both parties will anonymously perform the transaction
Figure FDA0002403583040000061
And sending to the blockchain network.
CN202010154432.3A 2020-03-07 2020-03-07 Block chain transaction supervision method based on user secondary identity structure Active CN111369251B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010154432.3A CN111369251B (en) 2020-03-07 2020-03-07 Block chain transaction supervision method based on user secondary identity structure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010154432.3A CN111369251B (en) 2020-03-07 2020-03-07 Block chain transaction supervision method based on user secondary identity structure

Publications (2)

Publication Number Publication Date
CN111369251A CN111369251A (en) 2020-07-03
CN111369251B true CN111369251B (en) 2021-09-28

Family

ID=71206745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010154432.3A Active CN111369251B (en) 2020-03-07 2020-03-07 Block chain transaction supervision method based on user secondary identity structure

Country Status (1)

Country Link
CN (1) CN111369251B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116471081B (en) * 2023-04-18 2023-12-12 中国石油天然气股份有限公司辽宁销售分公司 Indoor security anonymous authentication method based on Internet of things technology

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101637854B1 (en) * 2015-10-16 2016-07-08 주식회사 코인플러그 Certificate issuance system and method based on block chain, certificate authentication system and method based on block chain
US10102526B1 (en) * 2017-03-31 2018-10-16 Vijay K. Madisetti Method and system for blockchain-based combined identity, ownership, integrity and custody management
CN108418689B (en) * 2017-11-30 2020-07-10 矩阵元技术(深圳)有限公司 Zero-knowledge proof method and medium suitable for block chain privacy protection
CN108764874B (en) * 2018-05-17 2021-09-07 深圳前海微众银行股份有限公司 Anonymous transfer method, system and storage medium based on block chain
CN110728576A (en) * 2019-08-19 2020-01-24 湖南科技学院 Decentralized anonymous data transaction method based on zero knowledge proof

Also Published As

Publication number Publication date
CN111369251A (en) 2020-07-03

Similar Documents

Publication Publication Date Title
CN108389046B (en) Privacy protection transaction method based on block chain technology in electronic commerce
CN111008836B (en) Privacy security transfer payment method, device, system and storage medium
Gabay et al. Privacy-preserving authentication scheme for connected electric vehicles using blockchain and zero knowledge proofs
Alketbi et al. Blockchain for government services—Use cases, security benefits and challenges
Li et al. RZKPB: A privacy-preserving blockchain-based fair transaction method for sharing economy
CN110612547A (en) System and method for information protection
CN110719176A (en) Logistics privacy protection method and system based on block chain and readable storage medium
CN108650077A (en) Information transferring method, terminal, equipment based on block chain and readable storage medium storing program for executing
Zhang et al. An anonymous off-blockchain micropayments scheme for cryptocurrencies in the real world
WO2018088475A1 (en) Electronic authentication method and program
Hwang et al. Securing on-line credit card payments without disclosing privacy information
Ackerman et al. Privacy and security issues in e-commerce
Biddle Misplaced priorities: The Utah Digital Signature Act and liability allocation in a public key infrastructure
Cao et al. Strong anonymous mobile payment against curious third-party provider
Gao et al. Secure, fair and instant data trading scheme based on bitcoin
Xiong et al. Anonymous auction protocol based on time-released encryption atop consortium blockchain
Iwasokun et al. Encryption and tokenization-based system for credit card information security
Thapa et al. SPA: A secure and private auction framework for decentralized online social networks
Islam et al. A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency
CN111369251B (en) Block chain transaction supervision method based on user secondary identity structure
CN107403310A (en) Payment system and its method of payment under quantum Metropolitan Area Network (MAN)
CN116664298A (en) Implementation method and device of block chain-based decentralization data transaction system
CN113673893A (en) Retired power battery management method and system
Liu et al. pRate: anonymous star rating with rating secrecy
CN114168996A (en) Zero-knowledge-proof-based alliance-link order privacy data verification method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant