CN113988863A - Supervision-capable online payment privacy protection method and device and electronic equipment - Google Patents

Supervision-capable online payment privacy protection method and device and electronic equipment Download PDF

Info

Publication number
CN113988863A
CN113988863A CN202111618947.5A CN202111618947A CN113988863A CN 113988863 A CN113988863 A CN 113988863A CN 202111618947 A CN202111618947 A CN 202111618947A CN 113988863 A CN113988863 A CN 113988863A
Authority
CN
China
Prior art keywords
balance
payer
supervisor
payee
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111618947.5A
Other languages
Chinese (zh)
Other versions
CN113988863B (en
Inventor
张秉晟
陈辉
任奎
杨国正
臧铖
陈嘉俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
China Zheshang Bank Co Ltd
Original Assignee
Zhejiang University ZJU
China Zheshang Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU, China Zheshang Bank Co Ltd filed Critical Zhejiang University ZJU
Priority to CN202111618947.5A priority Critical patent/CN113988863B/en
Publication of CN113988863A publication Critical patent/CN113988863A/en
Application granted granted Critical
Publication of CN113988863B publication Critical patent/CN113988863B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a method and a device for supervising online payment privacy protection and electronic equipment, wherein the method generates a first balance updating ciphertext and a second balance updating ciphertext which are respectively used for updating balance ciphertexts of a payer and a payee through a linear homomorphic encryption algorithm, so that the balance information of a user account is encrypted in a full period, and the privacy information is enabled to be invisible; based on a non-interactive zero-knowledge proof technology, a first non-interactive zero-knowledge proof for verifying the transaction validity is generated, and the transaction validity can be verified publicly; the validity of the transaction is further ensured by generating a first certification ciphertext for the payee to verify that the transaction amount is the agreed amount; the method has the advantages that the supervisor public key is utilized to encrypt and generate the certification operation in the whole process, so that the supervisor can decrypt and supervise the transaction data on the block chain according to the supervisor private key which is generated simultaneously with the supervisor public key and corresponds to the supervisor private key, and the online payment transaction can be traced and supervised.

Description

Supervision-capable online payment privacy protection method and device and electronic equipment
Technical Field
The application relates to the field of online payment privacy protection, in particular to a supervision-capable online payment privacy protection method and device and electronic equipment.
Background
With the rapid popularization of mobile internet, the progress of currency virtualization is deepening, and electronic payment gradually becomes the mainstream payment mode in the digital era. In an increasingly open network space, in the future against the background of the development of digital economy, in the face of challenges that are constantly emerging in the aspects of privacy protection, government supervision, information fairness, and the like, there is a great need for an online payment method that protects privacy, meets the supervision requirement, and is also helpful for promoting the direct circulation of digital assets.
In the process of implementing the invention, the inventor finds that the prior art has at least the following problems:
currently, the basis of trust of the mainstream third-party payment platform is the commitment of the third-party company to protect the privacy of the user under the supervision pressure, and the capability of the third-party company to construct the safe operation of the payment platform. The payment mode is efficient, the trust foundation is direct and simple, but the payment mode is not beneficial to the direct circulation of digital assets which is an extremely important ring in the future digital economic development, and the direct circulation is a contradiction which is difficult to reconcile between the economic organization structure which tends to be flattened and a centralized third-party platform in the future. The data of the user transaction information mastered by the third-party payment platform can provide service monopoly help for the large company on which the third-party payment platform depends, and meanwhile, the direct transaction of the terminal user in the digital asset circulation process is also blocked. The block chain-based digital encryption currency adopts a decentralized architecture, and the transfer and the revolution of a trust system are realized. Meanwhile, the block chain technology is reasonably utilized, and the information fairness can be guaranteed. However, the existing public link system (such as bitcoin and ether house) has the problems of poor privacy protection, difficult supervision and the like, so that the payment security cannot be improved, but the property and privacy security of the user may be negatively affected, and even the public link system becomes a hotbed for illegal crimes.
Disclosure of Invention
The embodiment of the application aims to provide a supervision online payment privacy protection method and device and electronic equipment, so as to solve the technical problems of poor privacy protection, difficulty in supervision and unfair information in the related technology.
According to a first aspect of embodiments of the present application, there is provided a policeable online payment privacy protection method, including:
if the payer and the payee choose not to be anonymous, the payer generates a first balance updating ciphertext of the payer and a second balance updating ciphertext of the payee according to the payment amount plaintext and the supervisor public key;
the payer generates a first non-interactive zero knowledge proof according to the supervisor public key and the transaction information;
the payer packs the payer public key, the payee public key, the first balance updating ciphertext, the second balance updating ciphertext and the first non-interactive zero knowledge certificate into a private transaction and broadcasts the private transaction on the block chain;
the agent node on the blockchain verifies the first non-interactive zero knowledge certificate according to the supervisor public key, the payer public key, the payee public key, the first balance update ciphertext and the second balance update ciphertext, so that the validity of the private transaction corresponding to the first non-interactive zero knowledge certificate is verified;
if the verification is passed, all nodes on the block chain update the balance ciphertexts of the payer and the payee according to the first balance update ciphertexts and the second balance update ciphertexts in the privacy transaction;
the supervisor divides the supervisor private key corresponding to the supervisor public key into a plurality of private key segments;
the supervisor stores the private key fragments in a plurality of supervision units respectively, and the supervision units form the supervisor;
and the supervisor decrypts and supervises the transaction data on the block chain according to the preset number and above private key fragments.
Further, after the payer packs the payer public key, the payee public key, the first balance update ciphertext, the second balance update ciphertext, and the first non-interactive zero knowledge proof into a private transaction and broadcasts on the blockchain, the method further includes:
the payer generates a first certification ciphertext according to the payee public key and the payment amount plaintext;
and the payee verifies the payment amount plaintext as the amount agreed by the payer and the payee according to the first certification ciphertext and maintains the encrypted random number corresponding to the balance ciphertext of the payee.
According to a second aspect of the embodiments of the present application, there is provided a policeable online payment privacy protection method, including:
if the payer and the payee choose anonymity, adding the payer and the payee to any anonymous account set on the blockchain;
the payer generates third balance updating ciphertexts of all accounts in the anonymous account set according to the supervisor public key and the balance increment value of each account in the anonymous account set;
the payer generates a second non-interactive zero knowledge proof according to the supervisor public key and the transaction information;
the payer packs the public keys of all accounts in the anonymous set, the third balance increment ciphertext and a second non-interactive zero knowledge proof into anonymous transactions and broadcasts the anonymous transactions on a block chain;
the proxy node on the block chain verifies the second non-interactive zero knowledge proof according to the public keys of all accounts in the anonymous set and the third balance increment ciphertext, so that the validity of the anonymous transaction corresponding to the second non-interactive zero knowledge proof is verified;
and if the verification is passed, all the nodes on the block chain update the ciphertext according to the third balance in the anonymous transaction, and update the balance ciphertexts of all the accounts in the anonymous account set.
The supervisor divides the supervisor private key corresponding to the supervisor public key into a plurality of private key segments;
the supervisor stores the private key fragments in a plurality of supervision units respectively, and the supervision units form the supervisor;
and the supervisor decrypts and supervises the transaction data on the block chain according to the preset number and above private key fragments.
Further, the method for the payer to package the public keys of all accounts in the anonymous set, the third balance increment ciphertext and the second non-interactive zero knowledge proof into the anonymous privacy protection verifiable transaction and further comprises the following steps after the payer broadcasts the public keys, the third balance increment ciphertext and the second non-interactive zero knowledge proof on the blockchain:
the payer generates a second certification ciphertext according to the payee public key, the payment amount plaintext and a fourth encrypted random number used for encrypting the balance increment value of the payee;
and the payee verifies the payment amount plaintext as the amount agreed by the payer and the payee according to the second certification ciphertext and maintains the encrypted random number corresponding to the payee balance ciphertext.
According to a third aspect of the embodiments of the present application, there is provided a policeable online payment privacy protection apparatus, including:
the first generation module is used for generating a first balance updating ciphertext of the payer and a second balance updating ciphertext of the payee according to the payment amount plaintext and the supervisor public key if the payer and the payee choose not to be anonymous;
the second generation module is used for generating a first non-interactive zero knowledge proof by the payer according to the supervisor public key and the transaction information;
the first broadcast module is used for the payer to package a payer public key, a payee public key, the first balance updating ciphertext, the second balance updating ciphertext and the first non-interactive zero knowledge certificate into a private transaction and broadcast the private transaction on the block chain;
the first verification module is used for verifying the first non-interactive zero knowledge certificate by the agent node on the block chain according to the supervisor public key, the payer public key, the payee public key, the first balance update ciphertext and the second balance update ciphertext, so that the validity of the privacy transaction corresponding to the first non-interactive zero knowledge certificate is verified;
the first updating module is used for updating the balance ciphertexts of the payer and the payee according to the first balance updating cipher text and the second balance updating cipher text in the privacy transaction by all nodes on the block chain if the verification is passed;
the first division module is used for dividing a supervisor private key corresponding to the supervisor public key into a plurality of private key segments by the supervisor;
the first storage module is used for storing the plurality of private key fragments in a plurality of supervision units by a supervisor respectively, and the supervision units form the supervisor;
and the first supervision module is used for the supervisor to decrypt and supervise the transaction data on the block chain according to the preset number and the above number of the private key segments.
Further, the first broadcasting module further comprises:
the third generation module is used for generating a first certification ciphertext by the payer according to the payee public key and the payment amount plaintext;
and the second verification module is used for verifying the payment amount plaintext as the amount agreed by the payer and the payee and maintaining the encrypted random number corresponding to the balance ciphertext of the payee by the payee according to the first certification ciphertext.
According to a fourth aspect of the embodiments of the present application, there is provided a policeable online payment privacy protection apparatus, including:
an adding module, configured to add the payer and the payee to any anonymous account set on the blockchain if the payer and the payee select anonymity;
a fourth generation module, configured to generate, by the payer, a third balance update ciphertext for all accounts in the anonymous account set according to the supervisor public key and the balance increment value of each account in the anonymous account set;
the fifth generation module is used for generating a second non-interactive zero knowledge proof by the payer according to the supervisor public key and the transaction information;
the second broadcast module is used for packing the public keys of all accounts in the anonymous set, the third balance increment ciphertext and a second non-interactive zero knowledge certificate into anonymous transactions by a payer and broadcasting the anonymous transactions on a block chain;
a third verification module, configured to verify, by the proxy node in the block chain, the second non-interactive zero knowledge certificate according to the public keys of all accounts in the anonymous set and the third balance increment ciphertext, so as to verify validity of the anonymous transaction corresponding to the second non-interactive zero knowledge certificate;
and the second updating module is used for updating the balance ciphertexts of all accounts in the anonymous account set by all nodes on the block chain according to the third balance updating ciphertexts in the anonymous transaction if the verification is passed.
The second division module is used for dividing the supervisor private key corresponding to the supervisor public key into a plurality of private key segments by the supervisor;
the second storage module is used for storing the plurality of private key fragments in a plurality of supervision units by a supervisor respectively, and the supervision units form the supervisor;
and the second supervision module is used for decrypting and supervising the transaction data on the block chain by the supervisor according to the private key segments with the preset number and above.
Further, the second broadcasting module further comprises:
the sixth generation module is used for generating a second certification ciphertext by the payer according to the payee public key and the payment amount plaintext;
and the fourth verification module is used for verifying the payment amount plaintext as the amount agreed by the payer and the payee and maintaining the encrypted random number corresponding to the balance ciphertext of the payee according to the second certification ciphertext by the payee.
According to a fifth aspect of embodiments of the present application, there is provided an electronic apparatus, comprising:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a method as in any one of the first or second aspects.
According to a sixth aspect of embodiments herein, there is provided a computer-readable storage medium having stored thereon computer instructions, wherein the instructions, when executed by a processor, implement the steps of the method according to any one of the first or second aspects.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
according to the embodiment, the first balance updating ciphertext and the second balance updating ciphertext which are respectively used for updating the balance ciphertexts of the payer and the payee are generated through the linear homomorphic encryption algorithm, so that the balance information of the user account is encrypted in a full period, and the enabled private information is invisible; based on a non-interactive zero-knowledge proof technology, a first non-interactive zero-knowledge proof for verifying the transaction validity is generated, and the transaction validity can be verified publicly; the validity of the transaction is further ensured by generating a first certification ciphertext for the payee to verify that the transaction amount is the agreed amount; the method has the advantages that the supervisor public key is utilized to carry out encryption and generation certification operation in the whole process, so that the supervisor can decrypt and supervise the transaction data on the block chain according to the supervisor private key which is generated simultaneously with and corresponds to the supervisor public key, and online payment transaction can be traced and supervised; the supervisor reduces the serious influence on the system availability caused by the loss of partial secret fragments of the supervision private key by dividing the supervisor private key into a plurality of fragments and storing the fragments respectively, and improves the stability of the system.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
FIG. 1 is a flow diagram illustrating a policeable online payment privacy preserving method (payer and payee are not anonymous), according to an example embodiment.
FIG. 2 is a flow diagram illustrating a policeable online payment privacy preserving method (payer and payee are not anonymous), according to an example embodiment.
FIG. 3 is a block diagram illustrating a policeable online payment privacy preserving apparatus (payer and payee are not anonymous), according to an example embodiment.
FIG. 4 is a block diagram illustrating a curatable online payment privacy protection apparatus (payor and payee are not anonymous), according to an example embodiment.
FIG. 5 is a flow diagram illustrating a policeable online payment privacy preserving method (payer and payee anonymity), according to an example embodiment.
FIG. 6 is a flow diagram illustrating a policeable online payment privacy preserving method (payer and payee anonymity), according to an example embodiment.
FIG. 7 is a block diagram illustrating a curatable online payment privacy protection apparatus (payer and payee anonymous) in accordance with an example embodiment.
FIG. 8 is a block diagram illustrating a curatable online payment privacy protection apparatus (payer and payee anonymous) in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The account on the block chain is divided into a common account and an agent account, the common account can be used as a payer or a payee of the payment transaction, the agent account is used for verifying the validity of the transaction, and the validity of the transaction comprises that the payer has ownership to the payment account, the account balance of the payer is enough to deduct the payment amount, the plaintext information encrypted by the balance updating ciphertext corresponding to the payer is a negative value, and the sum of plaintext values of the balance updating ciphertexts is zero.
Prior to initiation of the online payment transaction, a step of creating a generic user account may be included, which may include:
step S1: generating a user public key, a user private key and an account initial balance plaintext with the amount value of 0 of the user;
specifically, a key pair (pk, sk) for user account identification and proof of ownership is generated according to asymmetric cryptography, and account initial balance plaintext with a value of 0 is generated.
Step S2: generating an account initial balance ciphertext corresponding to the account initial balance plaintext through a linear homomorphic encryption algorithm according to the supervisor public key and the fifth password random number;
specifically, the account initial balance ciphertext is generated in the account creating and initializing stage, and the aim of generating the ciphertext is to ensure that the account balance information on the block chain is always stored in a ciphertext state, so that the balance is available and invisible.
Step S3: and generating a third non-interactive zero knowledge proof for proving the account ownership and the validity of the account initial balance ciphertext according to the user account initial balance ciphertext, the user public key, the user private key and the supervisor public key, wherein the user which fails to pass the verification cannot be used as a payer or a payee of the transaction.
Specifically, a user account initial balance ciphertext, a user public key, a user private key and the supervisor public key are used as input, a third non-interactive zero knowledge proof is constructed, the proof is broadcasted in a system and is used for publicly proving ownership of an account identified by the user public key and legality of the account initial balance ciphertext, wherein the legality refers to that an encryption key is the supervisor public key and the encrypted amount is 0, and after a proxy node in a platform verifies a transaction through consensus, the account can be used as an effective account to participate in the transaction. The design of the steps has the advantages that: the random number used for generating the ciphertext is invisible to the outside in the whole period, the account balance information is encrypted in the whole period, the homomorphism of the ciphertext ensures the safety and the usability of the privacy information in the whole period, and the account balance privacy information is enabled to be invisible comprehensively.
Assuming that a user A wishes to perform an online payment transaction to a user B through an online payment platform, the amount information of the transaction and account balances of A, B both sides need to be kept secret from the outside, and the user identity anonymous protection is used as an optional function for the user to independently select whether to start or not. At the same time, the agent account on the platform may wish to verify the collected transaction non-interactive zero knowledge proof to obtain the transaction commission. In addition, the supervision department hopes to decrypt the chain transaction and audit the supervision by jointly supervising the private key at irregular time.
Example 1:
FIG. 1 is a flow diagram illustrating a method of administrable online payment privacy protection, as shown in FIG. 1, in which the payer and payee are not anonymous, and which may include the steps of:
step S11: if the payer and the payee choose not to be anonymous, the payer generates a first balance updating ciphertext of the payer and a second balance updating ciphertext of the payee according to the payment amount plaintext and the supervisor public key;
step S12: the payer generates a first non-interactive zero knowledge proof according to the supervisor public key and the transaction information;
step S13: the payer packs the payer public key, the payee public key, the first balance updating ciphertext, the second balance updating ciphertext and the first non-interactive zero knowledge certificate into a private transaction and broadcasts the private transaction on the block chain;
step S14: the agent node on the blockchain verifies the first non-interactive zero knowledge certificate according to the supervisor public key, the payer public key, the payee public key, the first balance update ciphertext and the second balance update ciphertext, so that the validity of the private transaction corresponding to the first non-interactive zero knowledge certificate is verified;
step S15: if the verification is passed, all nodes on the block chain update the balance ciphertexts of the payer and the payee according to the first balance update ciphertexts and the second balance update ciphertexts in the privacy transaction;
step S16: the supervisor divides the supervisor private key corresponding to the supervisor public key into a plurality of private key segments;
step S17: the supervisor stores the private key fragments in a plurality of supervision units respectively, and the supervision units form the supervisor;
step S18: and the supervisor decrypts and supervises the transaction data on the block chain according to the preset number and above private key fragments.
According to the embodiment, the first balance updating ciphertext and the second balance updating ciphertext which are respectively used for updating the balance ciphertexts of the payer and the payee are generated through the linear homomorphic encryption algorithm, so that the balance information of the user account is encrypted in a full period, and the enabled private information is invisible; based on a non-interactive zero-knowledge proof technology, a first non-interactive zero-knowledge proof for verifying the transaction validity is generated, and the transaction validity can be verified publicly; the validity of the transaction is further ensured by generating a first certification ciphertext for the payee to verify that the transaction amount is the agreed amount; the method has the advantages that the supervisor public key is utilized to carry out encryption and generation certification operation in the whole process, so that the supervisor can decrypt and supervise the transaction data on the block chain according to the supervisor private key which is generated simultaneously with and corresponds to the supervisor public key, and online payment transaction can be traced and supervised; the supervisor reduces the serious influence on the system availability caused by the loss of partial secret fragments of the supervision private key by dividing the supervisor private key into a plurality of fragments and storing the fragments respectively, and improves the stability of the system.
Specifically, balance information in the method starts from an initial balance ciphertext generation stage, is always presented to the outside in a ciphertext state in the account full life cycle of each homomorphic addition process of the balance ciphertext and an update ciphertext, and a basic accounting function required to be maintained for online payment is completed under the condition that balance plaintext is invisible to the outside, so that the problem of leakage of user balance privacy data in the processes of external storage, circulation and use is avoided; because the block chain is adopted as a data storage medium and a bottom medium, a public verification mechanism under a block chain technology decentralized architecture is required to be followed, and for this purpose, the application is used for generating various certificates of transaction legality through a non-interactive zero-knowledge certification technology, wherein:
in a specific implementation of step S11, the payer generates a first balance update ciphertext of the payer and a second balance update ciphertext of the payee according to the payment amount plaintext and the supervisor public key;
specifically, the payer A needs to generate a balance updating ciphertext for the payer and the payee respectively, wherein the first balance updating ciphertext and the second balance updating ciphertext are used for updating the balance ciphertexts of the payer and the payee respectively, the first encrypted random number and the second encrypted random number are selected by a user who creates a transaction independently or randomly, the random numbers are selected in two forms, and are used for enhancing the indistinguishability of the balance updating ciphertext and avoiding ciphertext dictionary attack; and after the validity of the first balance updating ciphertext and the second balance updating ciphertext is verified in the transaction, the first balance updating ciphertext and the second balance updating ciphertext are respectively added with the balance ciphertexts of the payer A and the payee B in the transaction to obtain updated balance ciphertexts.
Specifically, the supervisor public key is generated according to public safety parameters determined by a supervisor, and is used for the supervisor to decrypt and supervise the transaction data on the blockchain according to a supervisor private key which is generated simultaneously with the supervisor public key and corresponds to the supervisor private key.
In a specific implementation of step S12, the payer generates a first non-interactive zero knowledge proof according to the public key of the administrator and the transaction information;
specifically, all input information (maintained by software codes and used for encrypting a third encrypted random number used for encrypting the payer balance plaintext, a payee public key, the payment amount plaintext, a first encrypted random number and a second encrypted random number) is provided by a payer A, and the software codes generated by zero knowledge certification complete the certification structure, wherein the non-interactive zero knowledge certification algorithm can adopt ZKBoo, ZKSnark and the like and is determined by software and hardware environments of a payment platform and actual requirements, the generated first non-interactive zero knowledge proof is used for proving that the payer has ownership for the payment account, the account balance of the payer is enough to deduct the payment amount, the plaintext information encrypted by the first balance updating ciphertext is a negative value, and the sum of the plaintext values of the balance updating ciphertexts is zero.
In a specific implementation of step S13, the payer packs the payer public key, the payee public key, the first balance update ciphertext, the second balance update ciphertext, and the first non-interactive zero-knowledge proof into a private transaction and broadcasts on the blockchain;
specifically, after the payer A locally generates the information through payment software, the information is packaged into a complete privacy protection verifiable transaction, and then the transaction broadcasting is carried out through a broadcasting interface of the payment software.
In a specific implementation of step S14, the agent node on the blockchain verifies the first non-interactive zero knowledge proof according to the supervisor public key, the payer public key, the payee public key, the first balance update ciphertext, and the second balance update ciphertext, so as to verify the validity of the private transaction corresponding to the first non-interactive zero knowledge proof;
specifically, the agent node on the blockchain automatically collects the broadcasted privacy-preserving verifiable transactions in real time, selects a transaction verification mode according to a consensus algorithm of the payment platform, and completes the operation required for verification according to a zero-knowledge proof verification interface provided by the payment platform.
In the specific implementation of step S15, if the verification passes, all nodes on the blockchain update the balance ciphertexts of the payer and the payee according to the first balance update cipher text and the second balance update cipher text in the privacy transaction.
Specifically, after the transaction is verified and the agent node achieves consensus, balance ciphertext of a transaction-related account is updated in a distributed and consistent manner in the payment system, and the updating method specifically comprises the steps of homomorphic adding of an original balance ciphertext and a balance updating ciphertext of an account of a transaction participant, and multiplying or adding the ciphertexts according to a specific homomorphic encryption algorithm, wherein the plaintext is in an addition relationship after operation is completed.
Step S16: the supervisor divides the supervisor private key corresponding to the supervisor public key into a plurality of private key segments;
specifically, in order to reduce the serious influence on the system availability caused by the loss of a part of supervision private key secret segments, the invention adopts a t-n threshold secret sharing scheme, and in the system initialization stage, the supervision private key is divided into n secret segments through the t-n threshold secret sharing scheme (t < n).
Step S17: the supervisor stores the private key fragments in a plurality of supervision units respectively, and the supervision units form the supervisor;
specifically, the n secret segments are distributed to a plurality of supervision departments according to actual needs and managed by the corresponding supervision departments, wherein the secret segments of a single supervision department can be managed jointly by a plurality of internal management personnel after being shared by secrets in a recursive manner.
Step S18: the supervisor decrypts and supervises the transaction data on the block chain according to the private key segments with the preset number and above;
specifically, when the data on the chain needs to be decrypted and audited, according to the actual situation, a plurality of supervision departments, not necessarily all the departments, provide not less than t secret segments, and the data decryption and supervision are completed in a combined manner. When the number of secret segments provided is less than t, no information about the supervising private key can be obtained, nor can any ciphertext information be decrypted.
Specifically, as shown in fig. 2, after step S13, the method may further include:
step S21: the payer generates a first certification ciphertext according to the public key of the payee and the payment amount plaintext;
specifically, the payer A generates a first certification ciphertext according to the payee public key, the clear text of the payment amount and the second encrypted random number, wherein the first certification ciphertext is used for verifying that the transaction amount conforms to the transaction amount negotiated by the two parties in advance.
Step S22: the payee verifies the payment amount plaintext as the amount agreed by the payer and the payee according to the first certification ciphertext and maintains an encrypted random number corresponding to a balance ciphertext of the payee;
specifically, the payee B verifies that the transaction amount accords with the transaction amount negotiated by the two parties in advance through the first certification ciphertext, after the verification is passed, the payee B can deliver commodities to the payer A, meanwhile, the payee B needs to update the random number in the account balance ciphertext to locally store the random number in the account balance ciphertext through the random number in the balance update ciphertext, and the random number is used as key privacy data of the account participating in the transaction and needs to be accurately maintained in real time.
FIG. 3 is a block diagram illustrating a policeable online payment privacy preserving apparatus, according to an example embodiment. Referring to fig. 3, the apparatus in which the payer-payee is not anonymous may include:
the first generation module 21 is configured to, if the payer and the payee choose not to be anonymous, generate a first balance update ciphertext of the payer and a second balance update ciphertext of the payee according to the payment amount plaintext and the supervisor public key by the payer;
the second generation module 22 is used for generating a first non-interactive zero knowledge proof by the payer according to the supervisor public key and the transaction information;
the first broadcasting module 23 is configured to pack, by the payer, a payer public key, a payee public key, the first balance update ciphertext, the second balance update ciphertext, and the first non-interactive zero knowledge certificate into a private transaction, and broadcast the private transaction on the block chain;
a first verification module 24, configured to verify, by the agent node in the blockchain, the first non-interactive zero knowledge certificate according to the supervisor public key, the payer public key, the payee public key, the first balance update ciphertext, and the second balance update ciphertext, so as to verify validity of the private transaction corresponding to the first non-interactive zero knowledge certificate;
a first updating module 25, configured to update the balance ciphertexts of the payer and the payee according to the first balance update cipher text and the second balance update cipher text in the privacy transaction by all nodes on the blockchain if the verification passes;
the first dividing module 26 is configured to divide a supervisor private key corresponding to the supervisor public key into a plurality of private key segments by the supervisor;
the first storage module 27 is configured to store the plurality of private key fragments in a plurality of supervision units by a supervisor, where the supervision units form the supervisor;
and the first supervision module 28 is used for the supervisor to decrypt and supervise the transaction data on the blockchain according to the preset number and above of private key segments.
Further, as shown in fig. 4, the first broadcasting module 23 may further include:
a third generating module 31, configured to generate, by the payer, a first certification ciphertext according to the payee public key and the payment amount plaintext;
and the second verification module 32 is configured to verify, by the payee, the payment amount plaintext as the amount agreed by the payer and the payee according to the first certification ciphertext, and maintain an encrypted random number corresponding to a balance ciphertext of the payee.
Example 2:
FIG. 5 is a flow diagram illustrating a method of administrable online payment privacy protection, as shown in FIG. 5, in which the payer and payee are anonymous, and which may include the steps of:
step S31: if the payer and the payee choose anonymity, adding the payer and the payee to any anonymous account set on the blockchain;
specifically, if the payer and payee choose to conduct anonymous transactions, the payment system selects a set of anonymous accounts including payer a and payee B as participants in the transaction according to a random algorithm.
Step S32: the payer generates third balance updating ciphertexts of all accounts in the anonymous account set according to the supervisor public key and the balance increment value of each account in the anonymous account set;
specifically, a payer generates third balance update ciphertexts of all accounts in the anonymous account set through a linear homomorphic encryption algorithm according to the supervisor public key, the balance increment value of each account in the anonymous account set and a fourth encrypted random number used for encrypting the balance increment value, wherein the balance increment value of the payer is a negative value of the payment plaintext, the balance increment value of the payee is a positive value of the payment plaintext, the balance increment values of all accounts except the payer and the payee in the anonymous account set are 0, the number of the fourth encrypted random numbers is the same as the number of the accounts in the anonymous account set, and the fourth encrypted random number is used for generating the third balance update ciphertexts of each account in the anonymous account set; the plurality of fourth encrypted random numbers are selected by a user who creates a transaction independently or randomly, the random numbers are selected randomly in two forms, and the random numbers are used for enhancing the indistinguishability of a balance updating ciphertext and can prevent attack of a ciphertext dictionary; and after the validity of the transaction is verified, the fourth balance updating ciphertexts are respectively added with the balance ciphertexts of all transaction participants including the payer A and the payee B in the transaction to obtain updated balance ciphertexts.
Step S33: the payer generates a second non-interactive zero knowledge proof according to the supervisor public key and the transaction information;
specifically, providing all input information including a supervisor public key, a payer private key, a payer balance plaintext, a third encrypted random number, a payee public key, a payment amount plaintext, a fourth encrypted random number and public keys of other accounts in an anonymous set by a payer A, and completing the construction of a certificate by a software code generated by zero-knowledge certificate, wherein all the input information is maintained by the software code, and the user authorizes the use of software in a transaction; the non-interactive zero-knowledge proof algorithm can adopt ZKBoo, ZKSnark and the like, and is determined by the software and hardware environment of the payment platform and the actual requirement.
Step S34: the payer packs the public keys of all accounts in the anonymous set, the third balance increment ciphertext and a second non-interactive zero knowledge proof into anonymous transactions and broadcasts the anonymous transactions on a block chain;
specifically, after the payer A locally generates the information through payment software, the information is packaged into a complete anonymous transaction, and then the transaction broadcasting is carried out through a broadcasting interface of the payment software.
Step S35: the proxy node on the block chain verifies the second non-interactive zero knowledge proof according to the public keys of all accounts in the anonymous set and the third balance increment ciphertext, so that the validity of the anonymous transaction corresponding to the second non-interactive zero knowledge proof is verified;
specifically, the agent node on the blockchain automatically collects the broadcasted anonymous transactions in real time, selects a transaction verification mode according to a consensus algorithm of the payment platform, and completes the operation required for verification according to a zero-knowledge proof verification interface provided by the payment platform.
Specifically, the verification algorithm is determined when the payment system is implemented and implemented in a software form, and the proxy node only needs to extract the information from the broadcasted privacy protection verifiable transaction and call a verification function by using the related information as a parameter, so that verification operation can be completed and a verification result can be obtained.
Step S36: and if the verification is passed, all the nodes on the block chain update the ciphertext according to the third balance in the anonymous transaction, and update the balance ciphertexts of all the accounts in the anonymous account set.
Specifically, after the transaction is verified and the agent node achieves consensus, balance ciphertext of a transaction-related account is updated in a distributed and consistent manner in the payment system, and the updating method specifically comprises the steps of homomorphic adding of an original balance ciphertext and a balance updating ciphertext of an account of a transaction participant, and multiplying or adding the ciphertexts according to a specific homomorphic encryption algorithm, wherein the plaintext is in an addition relationship after operation is completed.
Step S37: the supervisor divides the supervisor private key corresponding to the supervisor public key into a plurality of private key segments;
step S38: the supervisor stores the private key fragments in a plurality of supervision units respectively, and the supervision units form the supervisor;
step S39: and the supervisor decrypts and supervises the transaction data on the block chain according to the preset number and above private key fragments.
Specifically, the specific implementation of steps S37-S39 is the same as the specific implementation of steps S16-S18, and is not repeated here.
Specifically, as shown in fig. 6, after step S34, the method may further include:
step S41: the payer generates a second certification ciphertext according to the payee public key, the payment amount plaintext and a fourth encrypted random number used for encrypting the balance increment value of the payee;
step S42: the payee verifies the payment amount plaintext as the amount agreed by the payer and the payee according to the second certification ciphertext and maintains an encrypted random number corresponding to the payee balance ciphertext;
in the specific implementation of steps S41-S42, the payer a constructs the first certification cryptogram and sends it to the payee B, which aims to verify that the transaction amount matches the transaction amount negotiated by both parties in advance, after the verification is passed, the payee B can deliver the commodity to the payer a, and at the same time, the payee B needs to update the random number in the account balance cryptogram stored locally by the payee B through the fourth encrypted random number for encrypting the balance increment value of the payee, which is used as key privacy data of the account participating in the transaction, and needs to maintain accurately in real time.
Corresponding to the embodiment of the supervision-capable online payment privacy protection method, the application also provides an embodiment of a supervision-capable online payment privacy protection device.
FIG. 7 is a block diagram illustrating a policeable online payment privacy preserving apparatus, according to an example embodiment. Referring to fig. 7, the apparatus in which the payer and the payee are not anonymous may include:
an adding module 41, configured to add the payer and the payee to any anonymous account set on the blockchain if the payer and the payee select anonymity;
a third generating module 42, configured to generate, by the payer, a third balance update ciphertext of all accounts in the anonymous account set according to the supervisor public key and the balance increment value of each account in the anonymous account set;
a fourth generating module 43, configured to generate, by the payer, a second non-interactive zero knowledge proof according to the supervisor public key and the transaction information;
a second broadcast module 44, configured to pack, by the payer, the public keys of all accounts in the anonymous set, the third balance increment ciphertext, and a second non-interactive zero knowledge certificate into an anonymous transaction, and broadcast the anonymous transaction on the blockchain;
a second verification module 45, configured to verify, by the proxy node in the blockchain, the second non-interactive zero knowledge certificate according to the public keys of all accounts in the anonymous set and the third balance increment ciphertext, so as to verify validity of the anonymous transaction corresponding to the second non-interactive zero knowledge certificate;
and a second updating module 46, configured to update the balance ciphertexts of all accounts in the anonymous account set according to the third balance update ciphertexts in the anonymous transaction by all nodes in the block chain if the verification passes.
A second dividing module 47, configured to divide, by the administrator, the administrator private key corresponding to the administrator public key into a plurality of private key segments;
a second storage module 48, configured to store the plurality of private key fragments in a plurality of supervision units respectively by a supervisor, where the supervision units form the supervisor;
and the second supervision module 49 is used for the supervisor to decrypt and supervise the transaction data on the blockchain according to the preset number and above of private key segments.
Specifically, as shown in fig. 8, the second broadcasting module 44 may further include:
a sixth generating module 51, configured to generate, by the payer, a second certification ciphertext according to the payee public key and the payment amount plaintext;
and a fourth verification module 52, configured to verify, by the payee, the payment amount plaintext as the amount agreed by the payer and the payee according to the second certification ciphertext, and maintain the encrypted random number corresponding to the payee balance ciphertext.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
Correspondingly, the present application also provides an electronic device, comprising: one or more processors; a memory for storing one or more programs; when executed by the one or more processors, cause the one or more processors to implement a curatable online payment privacy protection method as described above.
Accordingly, the present application also provides a computer readable storage medium having stored thereon computer instructions, wherein the instructions, when executed by a processor, implement a policeable online payment privacy protection method as described above.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. A supervised online payment privacy preserving method, comprising:
if the payer and the payee choose not to be anonymous, the payer generates a first balance updating ciphertext of the payer and a second balance updating ciphertext of the payee according to the payment amount plaintext and the supervisor public key;
the payer generates a first non-interactive zero knowledge proof according to the supervisor public key and the transaction information;
the payer packs the payer public key, the payee public key, the first balance updating ciphertext, the second balance updating ciphertext and the first non-interactive zero knowledge certificate into a private transaction and broadcasts the private transaction on the block chain;
the agent node on the blockchain verifies the first non-interactive zero knowledge certificate according to the supervisor public key, the payer public key, the payee public key, the first balance update ciphertext and the second balance update ciphertext, so that the validity of the private transaction corresponding to the first non-interactive zero knowledge certificate is verified;
if the verification is passed, all nodes on the block chain update the balance ciphertexts of the payer and the payee according to the first balance update ciphertexts and the second balance update ciphertexts in the privacy transaction;
the supervisor divides the supervisor private key corresponding to the supervisor public key into a plurality of private key segments;
the supervisor stores the private key fragments in a plurality of supervision units respectively, and the supervision units form the supervisor;
and the supervisor decrypts and supervises the transaction data on the block chain according to the preset number and above private key fragments.
2. The method of claim 1, wherein the payer after packaging the payer public key, the payee public key, and the first balance update secret, the second balance update secret, the first non-interactive zero knowledge proof into a private transaction and broadcasting on the blockchain, further comprises:
the payer generates a first certification ciphertext according to the payee public key and the payment amount plaintext;
and the payee verifies the payment amount plaintext as the amount agreed by the payer and the payee according to the first certification ciphertext and maintains the encrypted random number corresponding to the balance ciphertext of the payee.
3. A supervised online payment privacy preserving method, comprising:
if the payer and the payee choose anonymity, adding the payer and the payee to any anonymous account set on the blockchain;
the payer generates third balance updating ciphertexts of all accounts in the anonymous account set according to the supervisor public key and the balance increment value of each account in the anonymous account set;
the payer generates a second non-interactive zero knowledge proof according to the supervisor public key and the transaction information;
the payer packs the public keys of all accounts in the anonymous set, the third balance increment ciphertext and a second non-interactive zero knowledge proof into anonymous transactions and broadcasts the anonymous transactions on a block chain;
the proxy node on the block chain verifies the second non-interactive zero knowledge proof according to the public keys of all accounts in the anonymous set and the third balance increment ciphertext, so that the validity of the anonymous transaction corresponding to the second non-interactive zero knowledge proof is verified;
if the verification is passed, all nodes on the block chain update ciphertexts according to a third balance in the anonymous transaction, and update the balance ciphertexts of all accounts in the anonymous account set;
the supervisor divides the supervisor private key corresponding to the supervisor public key into a plurality of private key segments;
the supervisor stores the private key fragments in a plurality of supervision units respectively, and the supervision units form the supervisor;
and the supervisor decrypts and supervises the transaction data on the block chain according to the preset number and above private key fragments.
4. The method of claim 3, wherein the payer packaging the public keys of all accounts in the anonymous set, the third balance increment ciphertext, and the second non-interactive zero knowledge proof into an anonymous privacy preserving verifiable transaction and after broadcasting over the blockchain further comprises:
the payer generates a second certification ciphertext according to the payee public key and the payment amount plaintext;
and the payee verifies the payment amount plaintext as the amount agreed by the payer and the payee according to the second certification ciphertext and maintains the encrypted random number corresponding to the payee balance ciphertext.
5. A policeable online payment privacy protection apparatus, comprising:
the first generation module is used for generating a first balance updating ciphertext of the payer and a second balance updating ciphertext of the payee according to the payment amount plaintext and the supervisor public key if the payer and the payee choose not to be anonymous;
the second generation module is used for generating a first non-interactive zero knowledge proof by the payer according to the supervisor public key and the transaction information;
the first broadcast module is used for the payer to package a payer public key, a payee public key, the first balance updating ciphertext, the second balance updating ciphertext and the first non-interactive zero knowledge certificate into a private transaction and broadcast the private transaction on the block chain;
the first verification module is used for verifying the first non-interactive zero knowledge certificate by the agent node on the block chain according to the supervisor public key, the payer public key, the payee public key, the first balance update ciphertext and the second balance update ciphertext, so that the validity of the privacy transaction corresponding to the first non-interactive zero knowledge certificate is verified;
the first updating module is used for updating the balance ciphertexts of the payer and the payee according to the first balance updating cipher text and the second balance updating cipher text in the privacy transaction by all nodes on the block chain if the verification is passed;
the first division module is used for dividing a supervisor private key corresponding to the supervisor public key into a plurality of private key segments by the supervisor;
the first storage module is used for storing the plurality of private key fragments in a plurality of supervision units by a supervisor respectively, and the supervision units form the supervisor;
and the first supervision module is used for the supervisor to decrypt and supervise the transaction data on the block chain according to the preset number and the above number of the private key segments.
6. The apparatus of claim 5, wherein the first broadcasting module is followed by further comprising:
the third generation module is used for generating a first certification ciphertext by the payer according to the payee public key and the payment amount plaintext;
and the second verification module is used for verifying the payment amount plaintext as the amount agreed by the payer and the payee and maintaining the encrypted random number corresponding to the balance ciphertext of the payee by the payee according to the first certification ciphertext.
7. A policeable online payment privacy protection apparatus, comprising:
an adding module, configured to add the payer and the payee to any anonymous account set on the blockchain if the payer and the payee select anonymity;
a fourth generation module, configured to generate, by the payer, a third balance update ciphertext for all accounts in the anonymous account set according to the supervisor public key and the balance increment value of each account in the anonymous account set;
the fifth generation module is used for generating a second non-interactive zero knowledge proof by the payer according to the supervisor public key and the transaction information;
the second broadcast module is used for packing the public keys of all accounts in the anonymous set, the third balance increment ciphertext and a second non-interactive zero knowledge certificate into anonymous transactions by a payer and broadcasting the anonymous transactions on a block chain;
a third verification module, configured to verify, by the proxy node in the block chain, the second non-interactive zero knowledge certificate according to the public keys of all accounts in the anonymous set and the third balance increment ciphertext, so as to verify validity of the anonymous transaction corresponding to the second non-interactive zero knowledge certificate;
the second updating module is used for updating the balance ciphertexts of all accounts in the anonymous account set by all nodes on the block chain according to the third balance updating ciphertexts in the anonymous transaction if the verification is passed;
the second division module is used for dividing the supervisor private key corresponding to the supervisor public key into a plurality of private key segments by the supervisor;
the second storage module is used for storing the plurality of private key fragments in a plurality of supervision units by a supervisor respectively, and the supervision units form the supervisor;
and the second supervision module is used for decrypting and supervising the transaction data on the block chain by the supervisor according to the private key segments with the preset number and above.
8. The apparatus of claim 7, wherein the second broadcasting module is followed by:
the sixth generation module is used for generating a second certification ciphertext by the payer according to the payee public key and the payment amount plaintext;
and the fourth verification module is used for verifying the payment amount plaintext as the amount agreed by the payer and the payee and maintaining the encrypted random number corresponding to the balance ciphertext of the payee according to the second certification ciphertext by the payee.
9. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-2 or claims 3-4.
10. A computer-readable storage medium having stored thereon computer instructions, which when executed by a processor, perform the steps of the method according to any one of claims 1-2 or claims 3-4.
CN202111618947.5A 2021-12-28 2021-12-28 Supervision-capable online payment privacy protection method and device and electronic equipment Active CN113988863B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111618947.5A CN113988863B (en) 2021-12-28 2021-12-28 Supervision-capable online payment privacy protection method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111618947.5A CN113988863B (en) 2021-12-28 2021-12-28 Supervision-capable online payment privacy protection method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113988863A true CN113988863A (en) 2022-01-28
CN113988863B CN113988863B (en) 2022-03-29

Family

ID=79734713

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111618947.5A Active CN113988863B (en) 2021-12-28 2021-12-28 Supervision-capable online payment privacy protection method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113988863B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114580029A (en) * 2022-04-28 2022-06-03 浙江甲骨文超级码科技股份有限公司 Block chain digital asset privacy protection method, device, equipment and storage medium
CN115473647A (en) * 2022-08-04 2022-12-13 西安电子科技大学 Transaction privacy protection method and device
CN115688182A (en) * 2022-11-30 2023-02-03 北京天德科技有限公司 Privacy protection digital asset architecture
CN116703403A (en) * 2023-07-31 2023-09-05 成都创一博通科技有限公司 Offline transaction method and financial service platform based on blockchain network

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472601A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 The block chain framework of privacy transaction can be supervised
CN110648229A (en) * 2019-08-07 2020-01-03 中国科学院信息工程研究所 Semi-public block chain system and transaction method
CN111160909A (en) * 2019-12-31 2020-05-15 深圳市网心科技有限公司 Block chain supply chain transaction hiding static supervision system and method
CN111639361A (en) * 2020-05-15 2020-09-08 中国科学院信息工程研究所 Block chain key management method, multi-person common signature method and electronic device
US20200334379A1 (en) * 2019-04-22 2020-10-22 H. Anthony DeRosa-Grund Blockchain architecture, system, method and device for automated cybersecurity and data privacy law compliance with delayed block posting protocol
CN112288434A (en) * 2020-11-20 2021-01-29 网易(杭州)网络有限公司 Privacy transaction method and device, zero-knowledge proof system and privacy transaction architecture model
CN112734423A (en) * 2020-12-31 2021-04-30 杭州趣链科技有限公司 Transaction method based on block chain and terminal equipment
CN112771562A (en) * 2019-10-31 2021-05-07 深圳市网心科技有限公司 Account model-based transaction method, device, system and storage medium
CN113206744A (en) * 2021-04-29 2021-08-03 杭州趣链科技有限公司 Cross-chain transaction supervision method, device, equipment and storage medium
CN113222758A (en) * 2021-05-08 2021-08-06 华中科技大学 Alliance chain transaction information monitoring method, system and terminal on the premise of privacy
CN113569294A (en) * 2021-09-22 2021-10-29 浙江大学 Zero knowledge proving method and device, electronic equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472601A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 The block chain framework of privacy transaction can be supervised
US20200334379A1 (en) * 2019-04-22 2020-10-22 H. Anthony DeRosa-Grund Blockchain architecture, system, method and device for automated cybersecurity and data privacy law compliance with delayed block posting protocol
CN110648229A (en) * 2019-08-07 2020-01-03 中国科学院信息工程研究所 Semi-public block chain system and transaction method
CN112771562A (en) * 2019-10-31 2021-05-07 深圳市网心科技有限公司 Account model-based transaction method, device, system and storage medium
CN111160909A (en) * 2019-12-31 2020-05-15 深圳市网心科技有限公司 Block chain supply chain transaction hiding static supervision system and method
CN111639361A (en) * 2020-05-15 2020-09-08 中国科学院信息工程研究所 Block chain key management method, multi-person common signature method and electronic device
CN112288434A (en) * 2020-11-20 2021-01-29 网易(杭州)网络有限公司 Privacy transaction method and device, zero-knowledge proof system and privacy transaction architecture model
CN112734423A (en) * 2020-12-31 2021-04-30 杭州趣链科技有限公司 Transaction method based on block chain and terminal equipment
CN113206744A (en) * 2021-04-29 2021-08-03 杭州趣链科技有限公司 Cross-chain transaction supervision method, device, equipment and storage medium
CN113222758A (en) * 2021-05-08 2021-08-06 华中科技大学 Alliance chain transaction information monitoring method, system and terminal on the premise of privacy
CN113569294A (en) * 2021-09-22 2021-10-29 浙江大学 Zero knowledge proving method and device, electronic equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NASSER ALSALAMI: "Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity", 《IEEE》 *
周星光等: "面向航空差旅消费的可监管交易隐私保护方案", 《计算机应用研究》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114580029A (en) * 2022-04-28 2022-06-03 浙江甲骨文超级码科技股份有限公司 Block chain digital asset privacy protection method, device, equipment and storage medium
CN115473647A (en) * 2022-08-04 2022-12-13 西安电子科技大学 Transaction privacy protection method and device
CN115688182A (en) * 2022-11-30 2023-02-03 北京天德科技有限公司 Privacy protection digital asset architecture
CN115688182B (en) * 2022-11-30 2023-11-28 北京天德科技有限公司 Privacy protection digital asset architecture
CN116703403A (en) * 2023-07-31 2023-09-05 成都创一博通科技有限公司 Offline transaction method and financial service platform based on blockchain network
CN116703403B (en) * 2023-07-31 2023-10-20 成都创一博通科技有限公司 Offline transaction method and financial service platform based on blockchain network

Also Published As

Publication number Publication date
CN113988863B (en) 2022-03-29

Similar Documents

Publication Publication Date Title
CN107911216B (en) Block chain transaction privacy protection method and system
CN113988863B (en) Supervision-capable online payment privacy protection method and device and electronic equipment
US11842317B2 (en) Blockchain-based authentication and authorization
WO2021114819A1 (en) Methods for generating and executing smart contract transaction and device
CN112906030B (en) Data sharing method and system based on multi-party homomorphic encryption
CN110061829A (en) Multi-party computations method, apparatus and storage medium based on block chain network
CN109561110A (en) A kind of cloud platform audit log guard method based on SGX
CN110011781A (en) A kind of homomorphic cryptography method encrypting and support zero-knowledge proof for transaction amount
CA2808369A1 (en) System for protecting an encrypted information unit
CN111859446A (en) Agricultural product traceability information sharing-privacy protection method and system
CN109729041A (en) A kind of publication of encrypted content and acquisition methods and device
CN111429138A (en) Block link point data safety interaction method and first interaction node
CN114866323B (en) User-controllable privacy data authorization sharing system and method
CN109861956B (en) Data verification system, method, device and equipment based on state channel
CN113626852A (en) Safe and efficient method, system and application for anonymizing chain elements of unlicensed blocks
Chen et al. ARMOR: A secure combinatorial auction for heterogeneous spectrum
CN114565386A (en) Block chain escrow transaction method and system with multi-party cooperative privacy protection
Wang et al. Privacy-preserving energy storage sharing with blockchain
CN115242553B (en) Data exchange method and system supporting safe multi-party calculation
Gao et al. Secure, fair and instant data trading scheme based on bitcoin
CN108550035B (en) Cross-border online banking transaction method and cross-border online banking system
CN110263547A (en) Modification order based on contract state realizes the method and device of dynamic encryption
CN116032661B (en) Parallel supervision identity privacy protection method
CN115883102B (en) Cross-domain identity authentication method and system based on identity credibility and electronic equipment
Chenli et al. Fairtrade: Efficient atomic exchange-based fair exchange protocol for digital data trading

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant