CN114793228A - Data source screening method and system for preventing merchant from doing malicious activities based on zero knowledge proof - Google Patents
Data source screening method and system for preventing merchant from doing malicious activities based on zero knowledge proof Download PDFInfo
- Publication number
- CN114793228A CN114793228A CN202210318796.XA CN202210318796A CN114793228A CN 114793228 A CN114793228 A CN 114793228A CN 202210318796 A CN202210318796 A CN 202210318796A CN 114793228 A CN114793228 A CN 114793228A
- Authority
- CN
- China
- Prior art keywords
- value
- merchant
- knowledge proof
- zero
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000012216 screening Methods 0.000 title claims abstract description 18
- 230000000694 effects Effects 0.000 title claims description 7
- 238000004364 calculation method Methods 0.000 claims abstract description 64
- 238000012795 verification Methods 0.000 claims abstract description 18
- 230000008569 process Effects 0.000 claims abstract description 15
- 238000004422 calculation algorithm Methods 0.000 claims description 30
- 238000009795 derivation Methods 0.000 claims description 6
- 206010063659 Aversion Diseases 0.000 claims 3
- 230000002265 prevention Effects 0.000 claims 2
- 238000009825 accumulation Methods 0.000 description 2
- 238000013499 data model Methods 0.000 description 2
- 230000005284 excitation Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data source screening method and a system for preventing a merchant from doing malice based on zero knowledge proof, which comprises the following steps: step 1: generating a random value on a privacy computing platform, and sending the random value to a merchant server in an HTTPS mode; step 2: in a merchant server, generating a corresponding calculation result value and a zero knowledge proof according to the random value; and 3, step 3: sending the calculation result value, the zero knowledge proof and the process data to a privacy calculation platform; and 4, step 4: and verifying the calculation result value and the zero knowledge proof in the privacy calculation platform, and if the verification result does not meet the preset requirement, performing corresponding punishment on the merchant. Through the verification of the invention, the platform can verify the merchants performing the privacy calculation according to the public keys provided by the merchants, so as to improve the fraud cost of the merchants, improve the management capability of the platform and the quality of data provided by the merchants, and ensure that each merchant is truer and more credible in the aspect of privacy data calculation.
Description
Technical Field
The invention relates to the technical field of data source screening, in particular to a data source screening method and a data source screening system for preventing a merchant from doing disgust based on zero knowledge proof.
Background
sacre belongs to a privacy computing platform, and provides privacy data interactive computing under a safe and credible environment by two or more parties on the premise that data of each merchant cannot go out of the local area. The platform can carry out point accumulation excitation on the calculation among the merchants, and the point accumulation can improve the searching priority of the merchants on the platform and can occupy better resources of the platform.
Some merchants can conduct disguised calculation on the platform and obtain the credit reward of the platform on the premise of invalid calculation so as to improve self ranking.
Patent document CN114172655A (application number: CN202111310563.7) discloses a secure multiparty computation data system, method, device and data processing terminal, the secure multiparty computation data method includes: constructing a data model with standard acquisition and broadcast verification; a data pool is provided for verifying and storing the broadcasted data model; a hardware adapter is provided for converting data in the data pool into data suitable for secure multiparty computation; a novel evaluation and excitation mechanism built on a block chain is provided. However, the patent cannot effectively prevent the situation that the merchant performs MPC privacy calculation to acquire the platform points.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide a data source screening method and system for preventing merchants from doing malicious activities based on zero knowledge proof.
The data source screening method for preventing the merchant from doing the malicious activities based on the zero-knowledge proof provided by the invention comprises the following steps:
step 1: generating a random value on a privacy computing platform, and sending the random value to a merchant server in an HTTPS mode;
and 2, step: in a merchant server, generating a corresponding calculation result value and a zero knowledge proof according to the random value;
and step 3: sending the calculation result value, the zero knowledge proof and the process data to a privacy calculation platform;
and 4, step 4: and verifying the calculation result value and the zero knowledge proof in the privacy calculation platform, and performing corresponding punishment on the merchant if the verification result does not meet the preset requirement.
Preferably, the random value is compressed into a 64-bit 16-ary number by a keccak256 hash algorithm, and the probability of hash collision is 0.
Preferably, the generation of the calculation result value includes:
will randomly value n 1 And taking the self public key pk as data input, and obtaining a hash value by using a hash function keccak256k1 algorithm for the data input: hash ═ keccak256k1 (n) 1 Pk), the resulting data is computed recursively until the output is less than the p-value in the elliptic curve algorithm secp256pk1 and is a certain point g on the curve 1 =(x,y);
G is prepared from 1 Performing curve operation on the point and the private key sk to obtain a Y value, wherein the expression is as follows:
Y=g 1 sk
the hash value is obtained as the calculation result value using the keccak256k1 algorithm for the Y value.
Preferably, the calculation of the zero knowledge proof comprises:
generating a random number: n is a radical of an alkyl radical 2 =nounce,n 2 ∈z q ,z q Representing a set of rational numbers;
u is calculated from the determined and publicly known parameter g in the secp256pk1 algorithm, and the expression is:
u=g n2
according to g 1 Point and random value n 2 To calculate v, the expression is:
computing a zero knowledge proof, the expression of which is:
c=Hash(g 1 ,pk,Y,u,v)mod p
proof=n 2 -c*sk
wherein: mod represents the modulus; y, p, u, v, c are calculated intermediate values.
Preferably, the public keys pk and Y of the merchant are verified, whether pk and Y are points on the secp256k1 curve is checked, and then whether the calculated results of c, pk, proof and g points are consistent with the u value is mathematically verified, and the derivation process is as follows:
if the verification is passed, the merchant is indicated to be performing effective MPC privacy calculation.
The data source screening system for preventing the merchant from doing the malicious activities based on the zero-knowledge proof provided by the invention comprises:
module M1: generating a random value on a privacy computing platform, and sending the random value to a merchant server in an HTTPS mode;
module M2: in a merchant server, generating a corresponding calculation result value and a zero knowledge proof according to the random value;
module M3: sending the calculation result value, the zero knowledge proof and the process data to a privacy calculation platform;
module M4: and verifying the calculation result value and the zero knowledge proof in the privacy calculation platform, and if the verification result does not meet the preset requirement, performing corresponding punishment on the merchant.
Preferably, the random value is compressed into a 64-bit 16-ary number by a keccak256 hash algorithm, and the probability of hash collision is 0.
Preferably, the generation of the calculation result value includes:
will randomly value n 1 And taking the self public key pk as data input, and obtaining a hash value of the data input by using a hash function keccak256k1 algorithm: hash ═ keccak256k1 (n) 1 Pk), the resulting data is computed recursively until the output is less than the p value in the elliptic curve algorithm secp256pk1 and is at some point g on the curve 1 =(x,y);
G is prepared from 1 Performing curve operation on the point and the private key sk to obtain a Y value, wherein the expression is as follows:
Y=g 1 sk
the hash value is obtained as a calculation result value using the keccak256k1 algorithm for the Y value.
Preferably, the calculation of the zero knowledge proof comprises:
generating a random number: n is a radical of an alkyl radical 2 =nounce,n 2 ∈z q ,z q Representing a set of rational numbers;
u is calculated according to a determined and publicly known parameter g in the secp256pk1 algorithm, and the expression is as follows:
u=g n2
according to g 1 Point and random value n 2 To calculate v, the expression is:
computing a zero knowledge proof, the expression of which is:
c=Hash(g 1 ,pk,Y,u,v)mod p
proof=n 2 -c*sk
wherein: mod represents the modulus; y, p, u, v, c are calculated intermediate values.
Preferably, the public keys pk and Y of the merchant are verified, whether pk and Y are points on the secp256k1 curve is checked, and then whether the calculated results of c, pk, proof and g points are consistent with the u value is mathematically verified, and the derivation process is as follows:
if the verification is passed, the merchant is indicated to be performing effective MPC privacy calculation.
Compared with the prior art, the invention has the following beneficial effects:
through the verification of the invention, the platform can verify the merchants performing privacy calculation according to the public keys provided by the merchants so as to improve the cost of the merchants, improve the management capability of the platform and the quality of data provided by the merchants, effectively inhibit the merchants from performing MPC privacy calculation to acquire platform points, and ensure that each merchant is truer and more credible in the aspect of privacy data calculation.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is a flow chart of data source addition computation.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will aid those skilled in the art in further understanding the present invention, but are not intended to limit the invention in any manner. It should be noted that it would be obvious to those skilled in the art that various changes and modifications can be made without departing from the spirit of the invention. All falling within the scope of the invention.
The embodiment is as follows:
after a data provider registers on a platform, a recoco client needs to be downloaded, the recoco client runs on a server where a client is located, after a certain deposit is submitted for an account number, when two parties or multiple parties carry out MPC operation, the recoco platform can carry out state inspection on the server clients of the parties at variable time, whether the two parties meet the platform rule or not is checked, and if a cheating behavior is found, the account number is frozen and the deposit provided is punished.
The system mainly comprises three systems of merchant registration, deposit service and platform system verification.
Merchant registration: the merchant registers as MPC computing merchant on the platform, adds corresponding label and description to display the data service which can be provided, and the merchant must provide its public key data information during registration.
Deposit service: if the registered merchant needs to provide data calculation, a corresponding deposit is provided to prevent the merchant from providing unreliable or fake data. In the case of the calculation process, which can prove that the merchant provides the untrusted data, the account number of the merchant is frozen, and the deposit is deducted to make up for the loss of the merchant in the calculation process.
Platform system verification: the platform verifies the servers computed by the merchant to ensure that spurious computations are not provided.
The verification process mainly comprises the following steps:
(1) a random value null is randomly generated by the sacre platform and is sent to the merchant server in an HTTPS mode, n 1 =nounce;
n 1 Represents a random value generated by the sacre platform server, and the result is a 64-bit 16-ary number generated by the keccak256 hashing algorithm of arbitrary values.
The Keccak256 algorithm can compress an input of arbitrary length into a 64-bit 16-ary number, and the probability of a hash collision is almost 0.
(2) And the merchant receives the random value to generate a corresponding calculation result value output and a proof of zero knowledge generation.
(a) Generating output procedure
N is to be 1 And a self public key (pk) as data input, and taking Hash by using a keccak256k1 method for the input.
Hash=keccak256k1(n 1 Pk), recursively calculating the resulting data until the output is less than the p value in the secp256pk1 algorithm and is a certain point (x, y) on the curve;
g 1 =(x,y)
g is prepared from 1 Performing curve operation on the point and the private key (sk) to obtain a Y value;
Y=g 1 sk
the hash is taken for Y using keccak256k1 as the output result, output.
(b) Generation of proof
Random secure generation of a random number: n is 2 =nounce,n 2 ∈z q ,z q Representing a set of rational numbers;
from the parameter g (g is determined and publicly known) in the secp256pk1 algorithm, u is calculated by the expression:
u=g n2
calculating proof, the expression is:
c=Hash(g 1 ,pk,Y,u,v)mod p
proof=n 2 -c*sk
mod represents the modulus; p represents a value generated when output is generated; sk represents a merchant private key; pk represents the public key of the merchant; g is the parameter g (determined and disclosed) in the secp256pk1 algorithm; c. u is the calculated median value.
(3) The merchant sends output and Y, c, u and proof to the sacre platform;
(4) and the platform verifies the result and proof to see whether the result is correct or not, and correspondingly penalizes the result which is incorrect for multiple times.
Verifying a public key and a Y point of a merchant, and checking whether pk and Y are points on a secp256k1 curve;
then, whether the calculation results of the points c, pk, proof and g are consistent with the u value or not is verified mathematically;
and (3) derivation process:
if the verification is passed, the merchant is indicated to be performing effective MPC privacy calculation.
The invention provides a data source screening system for preventing a merchant from doing malice based on zero knowledge proof, which comprises: module M1: generating a random value on a privacy computing platform, and sending the random value to a merchant server in an HTTPS mode; module M2: in a merchant server, generating a corresponding calculation result value and a zero knowledge proof according to the random value; module M3: sending the calculation result value, the zero knowledge proof and the process data to a privacy calculation platform; module M4: and verifying the calculation result value and the zero knowledge proof in the privacy calculation platform, and if the verification result does not meet the preset requirement, performing corresponding punishment on the merchant.
The random value is compressed into a 64-bit 16-ary number by a keccak256 hash algorithm, and the probability of hash collision is 0. The generation of the calculation result value includes: will randomly value n 1 And its own public key pk as data input, using a hash function kec on the data inputcak256k1 algorithm obtains hash values: hash ═ keccak256k1 (n) 1 Pk), the resulting data is computed recursively until the output is less than the p-value in the elliptic curve algorithm secp256pk1 and is a certain point g on the curve 1 (x, y); g is prepared from 1 Performing curve operation on the point and the private key sk to obtain a Y value, wherein the expression is as follows: g represents Y 1 sk (ii) a The hash value is obtained as the calculation result value using the keccak256k1 algorithm for the Y value.
The calculation of the zero knowledge proof includes: generating a random number: n is a radical of an alkyl radical 2 =nounce,n 2 ∈z q ,z q Representing a set of rational numbers; u is calculated from the determined and publicly known parameter g in the secp256pk1 algorithm, and the expression is: u-g n2 (ii) a According to g 1 Point and random value n 2 To calculate v, the expression is:computing a zero knowledge proof, the expression of which is: hash (g) 1 ,pk,Y,u,v)mod p,proof=n 2 -c sk; wherein: mod represents modulo; y, p, u, v, c are calculated intermediate values.
Firstly, verifying public keys pk and Y points of a merchant, verifying whether pk and Y are points on a secp256k1 curve, and then mathematically verifying whether the calculation results of c, pk, proof and g points are consistent with u values, wherein the derivation process comprises the following steps:if the verification is passed, the merchant is indicated to be performing effective MPC privacy calculation.
Those skilled in the art will appreciate that, in addition to implementing the systems, apparatus, and various modules thereof provided by the present invention in purely computer readable program code, the same procedures can be implemented entirely by logically programming method steps such that the systems, apparatus, and various modules thereof are provided in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Therefore, the system, the apparatus, and the modules thereof provided by the present invention may be considered as a hardware component, and the modules included in the system, the apparatus, and the modules for implementing various programs may also be considered as structures in the hardware component; modules for performing various functions may also be considered to be both software programs for performing the methods and structures within hardware components.
The foregoing description of specific embodiments of the present invention has been presented. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.
Claims (10)
1. A data source screening method for preventing a merchant from doing malicious activities based on zero-knowledge proof is characterized by comprising the following steps:
step 1: generating a random value on a privacy computing platform, and sending the random value to a merchant server in an HTTPS mode;
step 2: in a merchant server, generating a corresponding calculation result value and a zero knowledge proof according to the random value;
and 3, step 3: sending the calculation result value, the zero knowledge proof and the process data to a privacy calculation platform;
and 4, step 4: and verifying the calculation result value and the zero knowledge proof in the privacy calculation platform, and performing corresponding punishment on the merchant if the verification result does not meet the preset requirement.
2. The zero-knowledge-based data source screening method for proving prevention of merchant repugnance as claimed in claim 1, wherein the random value is compressed into a 64-bit 16-ary number by a keccak256 hash algorithm, and the probability of hash collision is 0.
3. The zero-knowledge proof merchant aversion-based data source screening method as claimed in claim 1, wherein the generating of the calculation result value comprises:
will randomly value n 1 And the self public key pk is used as data input, and a hash function keccak is used for the data inputThe 256k1 algorithm obtains the hash value: hash 256k1 (n) 1 Pk), the resulting data is computed recursively until the output is less than the p-value in the elliptic curve algorithm secp256pk1 and is a certain point g on the curve 1 =(x,y);
G is prepared from 1 Performing curve operation on the point and the private key sk to obtain a Y value, wherein the expression is as follows:
Y=g 1 sk
the hash value is obtained as a calculation result value using the keccak256k1 algorithm for the Y value.
4. The method of claim 3, wherein the computing of the zero knowledge proof comprises:
generating a random number: n is 2 =nounce,n 2 ∈z q ,z q Representing a set of rational numbers;
u is calculated from the determined and publicly known parameter g in the secp256pk1 algorithm, and the expression is:
u=g n2
according to g 1 Point and random value n 2 To calculate v, the expression is:
computing a zero knowledge proof, the expression of which is:
c=Hash(g 1 ,pk,Y,u,v)mod p
proof=n 2 -c*sk
wherein: mod represents the modulus; y, p, u, v, c are calculated intermediate values.
5. The method for screening data sources based on zero-knowledge proof to prevent the merchant from doing malicious activities according to claim 4, wherein the public keys pk and Y of the merchant are verified, it is checked whether pk and Y are points on the secp256k1 curve, and then it is verified mathematically whether the calculated results of c, pk, proof, g points are consistent with the u value, the derivation process is:
if the verification is passed, the merchant is indicated to be performing effective MPC privacy calculation.
6. A data source screening system for preventing merchant fraud based on zero knowledge identification, comprising:
module M1: generating a random value on a privacy computing platform, and sending the random value to a merchant server in an HTTPS mode;
module M2: in a merchant server, generating a corresponding calculation result value and a zero knowledge proof according to the random value;
module M3: sending the calculation result value, the zero knowledge proof and the process data to a privacy calculation platform;
module M4: and verifying the calculation result value and the zero knowledge proof in the privacy calculation platform, and if the verification result does not meet the preset requirement, performing corresponding punishment on the merchant.
7. The zero-knowledge-based data source screening system for proving prevention of merchant repugnance as claimed in claim 6, wherein the random value is compressed into a 64-bit 16-ary number by a keccak256 hash algorithm, and the probability of hash collision is 0.
8. The zero-knowledge proof merchant aversion-based data source screening system as recited in claim 7, wherein the generating of the calculated result value comprises:
will randomly value n 1 And taking the self public key pk as data input, and obtaining a hash value by using a hash function keccak256k1 algorithm for the data input: hash ═ keccak256k1 (n) 1 Pk), the resulting data is computed recursively until the output is less than the p-value in the elliptic curve algorithm secp256pk1 and is a certain point g on the curve 1 =(x,y);
G is prepared from 1 Performing curve operation on the point and the private key sk to obtain a Y value, wherein the expression is as follows:
Y=g 1 sk
the hash value is obtained as the calculation result value using the keccak256k1 algorithm for the Y value.
9. The zero-knowledge proof merchant aversion-based data source screening system as recited in claim 8, wherein the zero-knowledge proof calculation comprises:
generating a random number: n is 2 =nounce,n 2 ∈z q ,z q Representing a set of rational numbers;
u is calculated according to a determined and publicly known parameter g in the secp256pk1 algorithm, and the expression is as follows:
u=g n2
according to g 1 Point and random value n 2 To calculate v, the expression is:
computing a zero knowledge proof, the expression of which is:
c=Hash(g 1 ,pk,Y,u,v)mod p
proof=n 2 -c*sk
wherein: mod represents the modulus; y, p, u, v, c are calculated intermediate values.
10. The system of claim 9, wherein the public keys pk and Y of the merchant are verified, and it is checked whether pk and Y are points on the secp256k1 curve, and then it is mathematically verified whether the calculated results of c, pk, proof and g are consistent with the u value, and the derivation process is:
if the verification is passed, the merchant is indicated to be performing effective MPC privacy calculation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210318796.XA CN114793228A (en) | 2022-03-29 | 2022-03-29 | Data source screening method and system for preventing merchant from doing malicious activities based on zero knowledge proof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210318796.XA CN114793228A (en) | 2022-03-29 | 2022-03-29 | Data source screening method and system for preventing merchant from doing malicious activities based on zero knowledge proof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114793228A true CN114793228A (en) | 2022-07-26 |
Family
ID=82462516
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210318796.XA Pending CN114793228A (en) | 2022-03-29 | 2022-03-29 | Data source screening method and system for preventing merchant from doing malicious activities based on zero knowledge proof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114793228A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019180588A1 (en) * | 2018-03-23 | 2019-09-26 | nChain Holdings Limited | Computer-implemented system and method for enabling zero-knowledge proof |
WO2020114240A1 (en) * | 2018-12-06 | 2020-06-11 | 山东大学 | Zero-knowledge proof-based smart contract authentication data privacy protection method and system |
AU2019202832A1 (en) * | 2019-01-31 | 2020-08-13 | Advanced New Technologies Co., Ltd. | Cross-asset trading within blockchain networks |
CN113037479A (en) * | 2021-03-25 | 2021-06-25 | 支付宝(杭州)信息技术有限公司 | Data verification method and device |
CN113645020A (en) * | 2021-07-06 | 2021-11-12 | 北京理工大学 | Alliance chain privacy protection method based on safe multi-party computing |
WO2022024182A1 (en) * | 2020-07-27 | 2022-02-03 | 富士通株式会社 | Knowledge proof method, knowledge proof program, and information processing apparatus |
CN114070561A (en) * | 2022-01-17 | 2022-02-18 | 工业信息安全(四川)创新中心有限公司 | Zero-knowledge proof method and system based on SM2 algorithm |
CN114172655A (en) * | 2021-11-07 | 2022-03-11 | 西安链融科技有限公司 | Secure multi-party computing data system, method, equipment and data processing terminal |
-
2022
- 2022-03-29 CN CN202210318796.XA patent/CN114793228A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019180588A1 (en) * | 2018-03-23 | 2019-09-26 | nChain Holdings Limited | Computer-implemented system and method for enabling zero-knowledge proof |
CN111886831A (en) * | 2018-03-23 | 2020-11-03 | 区块链控股有限公司 | Computer-implemented system and method for implementing zero-knowledge proof |
WO2020114240A1 (en) * | 2018-12-06 | 2020-06-11 | 山东大学 | Zero-knowledge proof-based smart contract authentication data privacy protection method and system |
AU2019202832A1 (en) * | 2019-01-31 | 2020-08-13 | Advanced New Technologies Co., Ltd. | Cross-asset trading within blockchain networks |
WO2022024182A1 (en) * | 2020-07-27 | 2022-02-03 | 富士通株式会社 | Knowledge proof method, knowledge proof program, and information processing apparatus |
CN113037479A (en) * | 2021-03-25 | 2021-06-25 | 支付宝(杭州)信息技术有限公司 | Data verification method and device |
CN113645020A (en) * | 2021-07-06 | 2021-11-12 | 北京理工大学 | Alliance chain privacy protection method based on safe multi-party computing |
CN114172655A (en) * | 2021-11-07 | 2022-03-11 | 西安链融科技有限公司 | Secure multi-party computing data system, method, equipment and data processing terminal |
CN114070561A (en) * | 2022-01-17 | 2022-02-18 | 工业信息安全(四川)创新中心有限公司 | Zero-knowledge proof method and system based on SM2 algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111914027B (en) | Block chain transaction keyword searchable encryption method and system | |
CN108900364B (en) | Block chain network management method, block chain network management device, block chain network management medium and electronic equipment | |
CN108370317B (en) | Adding privacy to standard credentials | |
CN111191284A (en) | Processing method, device and system for judicial evidence storage of sensitive information based on block chain technology | |
CN108848148B (en) | Transaction information confirmation method and device based on block chain | |
CN109936455B (en) | Digital signature method, device and system | |
CN113095827A (en) | Anonymous multiple signature method, computer device, and storage medium | |
CN115208628A (en) | Data integrity verification method based on block chain | |
CN114172659B (en) | Message transmission method, device, equipment and storage medium in block chain system | |
CN115529141A (en) | Traceable ring signature generation method and system for logarithmic signature size | |
CN113747426A (en) | Data auditing method and system, electronic equipment and storage medium | |
CN118282665A (en) | Quantum algorithm-based JWT signature generation method and related products | |
CN113438237A (en) | Data security collaborative computing method and system | |
CN108833104A (en) | A kind of signature method, verification method and the device of file | |
CN115733651B (en) | Transaction privacy protection method and device, electronic equipment and storage medium | |
CN114793228A (en) | Data source screening method and system for preventing merchant from doing malicious activities based on zero knowledge proof | |
CN111147249A (en) | Data processing method, device, equipment and medium | |
CN116684104A (en) | RSA2 signature rechecking method and device of API (application program interface), electronic equipment and medium | |
CN116261139A (en) | Online data security transmission method and system based on 5G message and electronic equipment | |
CN114640463B (en) | Digital signature method, computer equipment and medium | |
CN115473632A (en) | Improved multi-layer linkable ring signature generation method and device | |
CN112422294B (en) | Anonymous voting method and device based on ring signature, electronic equipment and storage medium | |
CN113627911A (en) | Method, device and storage medium for anonymously receiving and sending red packet based on block chain | |
CN115694820A (en) | Grid digital signature method and related equipment | |
CN113112269A (en) | Multiple signature method, computer device, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |