CN116823456A - Heterogeneous chain cross-chain asset transaction method and system for identity privacy protection - Google Patents

Heterogeneous chain cross-chain asset transaction method and system for identity privacy protection Download PDF

Info

Publication number
CN116823456A
CN116823456A CN202310420374.8A CN202310420374A CN116823456A CN 116823456 A CN116823456 A CN 116823456A CN 202310420374 A CN202310420374 A CN 202310420374A CN 116823456 A CN116823456 A CN 116823456A
Authority
CN
China
Prior art keywords
transaction
receiver
asset
chain
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310420374.8A
Other languages
Chinese (zh)
Inventor
张淑慧
周瑞瑶
王连海
徐淑奖
胡长栋
张路路
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qilu University of Technology
Shandong Computer Science Center National Super Computing Center in Jinan
Original Assignee
Qilu University of Technology
Shandong Computer Science Center National Super Computing Center in Jinan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qilu University of Technology, Shandong Computer Science Center National Super Computing Center in Jinan filed Critical Qilu University of Technology
Priority to CN202310420374.8A priority Critical patent/CN116823456A/en
Publication of CN116823456A publication Critical patent/CN116823456A/en
Pending legal-status Critical Current

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a heterogeneous chain cross-chain asset transaction method and system for identity privacy protection, which relate to the field of block chain cross-chain asset transaction and privacy protection, and specifically comprise the following steps: initializing the transaction parties before the transaction; the transaction sender locks the asset to be transacted; the transaction sender performs ring signature on the transaction information based on the public key ring by utilizing the intelligent contract and sends the transaction information to a blockchain where a transaction receiver is located; the transaction receiver verifies the ring signature and the disposable address of each transaction received by the blockchain, and transfers the transaction locked assets passing both verification to the transaction receiver; the invention uses ring signature and disposable address to realize the identity hiding of both sides of trade, hides the trade sender in the rings of multiple users, and simultaneously uses the public key of the trade receiver to calculate the disposable address, and replaces the real address of the receiver with the disposable address, thus realizing anonymity and unlinkability in the process of cross-chain asset trade.

Description

Heterogeneous chain cross-chain asset transaction method and system for identity privacy protection
Technical Field
The invention belongs to the field of blockchain cross-chain asset transaction and privacy protection, and particularly relates to a heterogeneous chain cross-chain asset transaction method and system for identity privacy protection.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
With the continuous development of the blockchain technology, a large number of blockchain systems appear and start to develop, and accordingly, the development of the blockchain technology faces a serious 'island' problem, so that the realization of value transfer and information interaction among different blockchains has become a research hot spot in the blockchain field; the cross-chain technology aims at solving the problem of interoperability among different blockchain platforms, however, the existing cross-chain technology mostly has the problem of privacy disclosure; when different block chains interact, the protection of cross-chain data and identity is mainly related; because of the large difference between different chains, when the cross-chain operation is performed and the blockchain privacy protection is the most fragile, an attacker can acquire sensitive privacy information by monitoring nodes and intercepting the cross-chain data, so that the privacy in the cross-chain process is revealed.
Existing cross-chain mechanisms include notary mechanisms, relays and hash locks, but the several cross-chain mechanisms all have the risk of privacy disclosure. In a notary mechanism, introducing a third party intermediary reduces the decentralization degree of the blockchain, and the identity privacy and the transaction privacy of the user are both exposed; in the relay model, the realization of cross-link based on relay also needs to avoid privacy disclosure risks caused by disfigurement of relay nodes; in the Hash locking model, people pay more attention to fairness of atomic exchange, and the fact that the assets of both sides are exchanged or not exchanged is guaranteed, and identity privacy and transaction privacy of users are not effectively protected. It follows that different cross-chain methods have a risk of privacy disclosure.
Privacy protection is mainly divided into transaction privacy and identity privacy, and identity privacy disclosure refers to the problem that the identity privacy of a user cannot be well ensured due to the transparent feature of blockchain disclosure, so that identity privacy disclosure has become an important problem; identity privacy is very important privacy data in blockchains, and in early blockchain transactions, the anonymity purpose can be achieved through transactions in an anonymity mode of 'pseudonyms'; however, as the blockchain has the characteristics of publicization and transparency, with the continuous development of tracking technology, the topology of all transaction data can be constructed through the statistical analysis of the disclosed transaction data, and the relationship between the two parties of the transaction can be analyzed to a certain extent through the topology structure, so that the real information of the sender and the receiver in the transaction can be analyzed, and the identity privacy of the two parties of the transaction is difficult to be ensured only by the traditional 'pseudonym' mode.
Identity privacy in a cross-chain scenario refers to protecting the connection between a sender user and a source chain address and protecting the connection between a receiver user and a destination chain address; more recently, many attacks have occurred against cross-chain transactions.
Therefore, the problems of privacy disclosure of a transaction sender and privacy disclosure of a transaction receiver exist in the existing cross-chain asset transaction, and the cross-chain security situation is very urgent.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a heterogeneous chain cross-chain asset transaction method and system with identity privacy protection, which uses ring signatures and disposable addresses to realize the identity hiding of transaction parties, hides transaction senders in rings of a plurality of users, calculates the disposable addresses by utilizing public keys of transaction receivers, and replaces real addresses of the receivers with the disposable addresses.
To achieve the above object, one or more embodiments of the present invention provide the following technical solutions:
the first aspect of the invention provides a heterogeneous chain cross-chain asset transaction method for identity privacy protection;
a heterogeneous chain cross-chain asset transaction method for identity privacy protection comprises the following steps:
initializing the transaction parties before the transaction, wherein the initialization comprises the steps that the transaction parties generate respective public and private keys, the transaction sender generates a public key ring, the transaction sender generates a disposable address of a transaction receiver, and intelligent contract generation contract account addresses are deployed on a receiver blockchain;
the transaction sender locks the asset to be transacted;
the transaction sender performs ring signature on transaction information based on a public key ring by utilizing an intelligent contract and sends the transaction information to a blockchain where a transaction receiver is located, wherein the transaction information comprises a disposable address of the transaction receiver;
and the transaction receiver verifies the ring signature and the disposable address of each transaction received by the blockchain, and transfers the transaction locked asset which passes both verification to the transaction receiver.
Further, the transaction sender generates a public key ring, specifically:
the transaction sender generates a group of member public keys by adopting an elliptic curve encryption algorithm, and forms a public key ring with the new transaction sender public key.
Further, the transaction sender generates a disposable address of the transaction receiver, specifically:
the transaction sender acquires the public key of the transaction receiver and generates a random number, and the hidden random number and the public key of the transaction receiver are utilized to generate a disposable address of the transaction receiver through a hash function as a target address of the transaction transfer.
Further, the locking of the asset to be transacted is specifically divided into two cases:
if the sender blockchain supports intelligent contracts, transferring the assets to be transacted to contract account addresses, and locking the assets;
if the sender blockchain does not support the intelligent contract, the asset to be transacted is locked to a third party vault, and the vault is used for realizing the operations of transaction processing and transaction returning.
Further, the intelligent contracts include privacy protection contracts and cross-link contracts;
the privacy protection contract is used for ring signature and verification;
the cross-link contract realizes communication of users on different links based on link relay, and simultaneously obtains the exchange rate and performs transaction transfer operation.
Further, the transaction receiver verifies the ring signature and the disposable address of each transaction received by the blockchain, specifically:
invoking privacy protection contract to carry out integrity verification on the ring signature;
and calculating the disposable public key by using the private key of the transaction receiver, performing address matching on the disposable public key and the received disposable address, and if the matching is successful, indicating that the transaction is sent to the receiver.
Further, the transferring the transaction locked asset passing both verifications to the transaction receiver further comprises:
based on the prophetic machine, obtaining the latest exchange rate of the blockchain where the transaction parties are in the centralized exchange, and transferring the equivalent asset from the contract account address to the disposable address of the transaction receiver through the obtained exchange rate and the cross-link contract.
The second aspect of the invention provides a heterogeneous chain cross-chain asset transaction system with identity privacy protection.
A heterogeneous chain cross-chain asset transaction system with identity privacy protection comprises an initialization module, an asset locking module, a ring signature module and a verification transfer module:
an initialization module configured to: initializing the transaction parties before the transaction, wherein the initialization comprises the steps that the transaction parties generate respective public and private keys, the transaction sender generates a public key ring, the transaction sender generates a disposable address of a transaction receiver, and intelligent contract generation contract account addresses are deployed on a receiver blockchain;
an asset locking module configured to: the transaction sender locks the asset to be transacted;
a ring signature module configured to: the transaction sender performs ring signature on transaction information based on a public key ring by utilizing an intelligent contract and sends the transaction information to a blockchain where a transaction receiver is located, wherein the transaction information comprises a disposable address of the transaction receiver;
a verification transfer module configured to: and the transaction receiver verifies the ring signature and the disposable address of each transaction received by the blockchain, and transfers the transaction locked asset which passes both verification to the transaction receiver.
A third aspect of the invention provides a computer readable storage medium having stored thereon a program which when executed by a processor performs steps in a heterogeneous chain cross-chain asset transaction method of identity privacy protection according to the first aspect of the invention.
A fourth aspect of the invention provides an electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, the processor implementing steps in a heterogeneous chain cross-chain asset transaction method of identity privacy protection according to the first aspect of the invention when the program is executed.
The one or more of the above technical solutions have the following beneficial effects:
compared with the mainstream cross-chain asset transaction scheme, the method has higher practical value; the main stream cross-chain schemes are isomorphic chain cross-chains, the invention realizes heterogeneous chain cross-chains based on relays, the implementation cases are bitcoin and Ethernet, and the bitcoin and the Ethernet are two most widely applied blockchain platforms on the market at present, so that the requirements on cross-blockchain transactions are higher, and the application scene has higher practicability; the invention further realizes the anonymity of transactions on the basis of heterogeneous chain crossing, and the mainstream cross-chain asset transaction method has the characteristics of disclosure and transparency, but also brings the defect that the identity of a user is easy to be revealed.
Compared with the scheme of realizing privacy protection based on group signature, the invention adopts the ring signature technology to realize privacy protection of a transaction sender, and the ring signature has complete anonymity because no manager exists in the ring; meanwhile, the invention adopts the hidden address technology to realize the identity privacy protection of the transaction receiver; based on the two technologies, the connection between the transaction sender and the transaction receiver is further cut off, so that the relevance between different transactions is eliminated.
Additional aspects of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention.
Fig. 1 is a flow chart of a method of a first embodiment.
Fig. 2 is a method timing diagram of the first embodiment.
Fig. 3 is a smart contract design diagram of a first embodiment.
Detailed Description
The invention will be further described with reference to the drawings and examples.
Interpretation of the terms
Cross-chain asset transaction (Cross-chain Asset Transaction): the cross-chain technique essentially transfers data or information on one chain securely and trustfully to the other chain. The cross-chain asset transaction mainly includes cross-chain asset transfer and cross-chain asset exchange. Cross-chain asset exchanges, also known as atomic exchanges, are cross-chain transactions with atomicity and consistency, essentially the flow of assets over respective blockchains. Cross-chain asset transfer supports asset transfer between different chains and supports atomicity and decentralization consistency, which is essentially freezing (destroying) of an asset on one blockchain and thawing (creating) on another blockchain.
Ring Signature (Ring Signature): the concept of ring signature is a digital signature with blurred signature proposed by three persons in 2001, rivest, shamir and Tauman. In the process of ring signature generation, a real signer arbitrarily selects a group of members (including itself) as possible signers, and signs a message with its own private key and the public keys of other members. The group of members selected by the signer is referred to as a ring, and the signature generated is referred to as a ring signature.
Hidden Address (Stealth Address): the hidden address is also referred to as a one-time address, by which all transactions protect the privacy of the transaction recipient. Every time a transaction is initiated, a completely new, disposable recipient address is randomly generated. Through the disposable address, each transaction displays different collection addresses, even if a plurality of transactions are sent to the same person, the outside cannot know, and therefore privacy of a receiver is protected.
Example 1
The embodiment discloses a heterogeneous chain cross-chain asset transaction method for identity privacy protection, which comprises the following steps:
initializing the transaction parties before the transaction, wherein the initialization comprises the steps that the transaction sender generates a public key ring, the transaction sender generates a disposable address of a transaction receiver, and intelligent contracts are deployed on respective blockchains to generate contract account addresses;
and the transaction sender locks the asset to be transacted, and if the sender blockchain supports the intelligent contract, the asset to be transacted is transferred to the contract account address by utilizing the intelligent contract, and the asset is locked. If the transaction sender blockchain does not support intelligent contracts, such as a bitcoin or other blockchain platform, the transaction sender needs to lock the asset to a third party vault;
the transaction sender performs ring signature on transaction information based on a public key ring by utilizing an intelligent contract and sends the transaction information to a blockchain where a transaction receiver is located, wherein the transaction information comprises a disposable address of the transaction receiver;
and the transaction receiver verifies the ring signature and the disposable address of each transaction received by the blockchain, and transfers the transaction locked asset which passes both verification to the transaction receiver.
The following describes in detail the implementation process of the heterogeneous chain cross-chain asset transaction method for identity privacy protection in this embodiment, as shown in fig. 1, the specific implementation steps are as follows:
(1) And generating a public and private key and a public key ring of both transaction sides.
Firstly, randomly generating respective public and private key pairs by two parties participating in cross-chain transaction, wherein the public keys of the two parties of the transaction are public; then, the transaction sender additionally generates n-1 user public keys by adopting an elliptic curve cryptography algorithm, thereby obtaining a user public key ring comprising the public key of the transaction initiator.
(2) A one-time address is calculated.
The transaction sender obtains the public key of the transaction receiver, calculates the disposable address of the transaction receiver by using the public key, takes the disposable address as the target address of the transaction transfer, and stores the disposable address into the transaction information.
(3) Deploying the smart contracts.
As shown in fig. 3, the intelligent contracts to be deployed mainly include privacy protection contracts and cross-link contracts, in which a chain conversion plug-in, namely a chain relay, is set, and data or transaction information is sent from a sender blockchain to a receiver blockchain through the chain relay, and the chain relay mainly provides two functions of transaction inclusion verification and consensus verification for the cross-link contracts, so that correct behavior on the sender chain can be proved to the intelligent contracts. Therefore, communication of users on different chains can be realized, and the cross-chain contract can acquire the exchange rate and carry out transaction transfer operation, and the privacy protection contract mainly plays a role in generating and verifying the ring signature.
The transaction parties deploy intelligent contracts into the blockchain network where the intelligent contracts are located, and generate contract account addresses. The contract account address is the owner of the contract, and only the contract account address can call the related function of the intelligent contract. If the chain where the transaction sender is located supports the intelligent contract, the transaction sender deploys the transfer contract to the chain where the transaction sender is located, and returns the contract account address to the transaction sender. If the chain in which the transaction sender is located does not support the smart contract, then the smart contract need not be deployed.
(4) The transaction sender locks the asset.
If the chain where the transaction sender is located supports intelligent contracts, i.e., a cross-chain contract has been deployed on the chain, the initiator transfers the asset to be transacted from the transaction sender account to the contract account address. If the chain of the transaction sender does not support intelligent contracts, such as a block chain platform like a bitcoin, the sender needs to transfer the asset to a third party like a safe deposit, and the safe deposit locks the asset.
(5) A ring signature is calculated.
The transaction sender invokes a ring signature generation function to generate a ring signature of the user ring to the transaction information. The ring signature adopts the ring signature algorithm proposed by Franklin & Zhang.
(6) The public key and the ring signature are verified.
Checking each transaction on a blockchain by a transaction receiver, firstly, calling a ring signature verification function of a privacy protection contract by the transaction receiver to verify the integrity of the ring signature, then calculating a disposable public key by using a private key of the transaction receiver, performing address matching on the disposable public key and a received disposable address, and if the matching is successful, indicating that the transaction is sent to the receiver; and (5) if both the two verification passes, turning to the step (7), otherwise, returning to the transaction sender.
(7) And obtaining the exchange rate and carrying out transfer transaction. The cross-link contract obtains the exchange rate of the transaction between the two blockchain platforms, and controls the transfer of the equivalent asset to the transaction recipient account.
For convenience of description, if user Alice on bitcoin initiates a transfer transaction with amt to user Bob on ethernet, as shown in fig. 2, the specific implementation steps are as follows:
step S1: and generating a public and private key and a public key ring of the transaction sender Alice.
Transaction initiator Alice first randomly generates private key SK A Calculation of PK A =SK A G, wherein G is the elliptic curve base point, thereby obtaining a public-private key pair (PK A ,SK A )。
Using elliptic curve cryptography algorithm to construct additional n-1 public keys of user including PK A Internal public key Ring, i.e. ring= { PK A ,PK 1 ,...,PK n-1 }。
Step S2: a public-private key of a transaction receiver Bob is generated and sent to a transaction sender.
Transaction receiver Bob randomly generates two private keys SK B And sk B Calculation of PK B =SK B G and pk B =sk B G, finally obtaining two public and private key pairs (PK B ,SK B ) And (pk) B ,sk B ) Wherein (PK B ,SK B ) To observe the key, for identifying each transaction output, (pk B ,sk B ) For consuming keys, for effecting a genuine transaction, and generating public key information PK B And pk B To Alice.
Step S3: a one-time address is calculated.
The transaction initiator Alice generates a random number R, and conceals the random number R by the elliptic curve base point, i.e. calculates r=rg.
Calculating the one-time address p=hs using the hash function Hs (rPK B )G+pk B Simultaneously placing R and P into transaction information m, wherein Hs is a hash function, R is a generated random number, and PK B 、pk B Is the public key of the transaction receiver, and G is the base point of the elliptic curve.
Step S4: deploying the smart contracts.
Bob deploys privacy protection contracts and cross-link contracts into the ethernet chain while returning contract account address of the cross-link contracts and privacy protection contracts contract
Step S5: alice locks the amt number of assets on the bitcoin chain.
Since smart contracts are not supported on bitcoin, it is necessary to lock the assets to be transferred by means of a trusted third party, i.e. the vault, first Alice generates a pair of keys on the ethernet and locks the amt number of assets into the vault in a publicly verifiable manner, alice associates her public key on the ethernet with the vault.
If the blockchain where the transaction sender is located supports smart contracts, such as the blockchain of Lai Tech, fabric, etc., then a cross-link contract needs to be deployed on the blockchain where the transaction sender is located, and the initiator transfers the assets of the transaction to the contract address of the transfer contract.
Step S6: the ring signature sigma is calculated.
Transaction sender Alice invokes a ring signature generation function RS (SK, R, m) of privacy protection contract, based on Alice's private key SK A The user Ring, transaction message m, generates signature sigma of user Ring R to message m.
Step S7: the ring signature and the disposable address are verified.
The transaction receiver Bob checks each transaction on the blockchain and calculates the corresponding one-time public key P' =hs (SK B R)+pk B If p=p', this indicates that the transaction was issued to Bob and that the verification was successful.
With the privacy protection contract, a Ring signature verification algorithm RV (R, m, σ) is invoked to verify the integrity of the Ring signature from the user Ring, the transaction message m and the Ring signature σ for m.
If either verification fails, the vault returns the locked asset to Alice, and if both verifications pass, step S8 is continued.
Step S8: calculating a rate and performing a transfer transaction.
Obtaining the latest exchange rate of the Ethernet and the bit coin, and utilizing address according to the obtained real exchange rate of the transaction between the bit coin and the Ethernet contract To transfer an ethernet coin equivalent to the amt bit coin to the account address of transaction recipient Bob.
The ring signature algorithm used in this embodiment is Franklin&The ring signature algorithm proposed by Zhang selects the FZ ring signature because it has higher compatibility with elliptic curve digital signature algorithm, and can realize efficient verification. Franklin&Zhang handleThe outgoing ring signature mainly includes initializing Setup (1 λ ) User key generation RG (1) λ Pp), calculate the ring signature RS (sk) i R, m), verify ring signature RV (sk) i Four parts, R, m), the ring signature generation algorithm RS (SK i R, m), step S7 uses a ring signature verification algorithm RV (R, m, σ), and the specific procedure is as follows:
(1)Setup(1 λ ) Algorithm: a multiplication group with lambda as input and outputting a prime number qIt also provides two hash functions +.>And->The public parameters output by the method are as follows:
(2)RG(1 λ PP) algorithm: key generation algorithm representing user i, taking parameter pp as input, selecting parameterAnd calculate +.>It outputs the public key as pk i =(pp,y i ) Outputting the private key as sk i =(pp,x i )。
(3)RS(sk i R, m) algorithm: for calculating a ring signature; to R= (PK 1 ,PK 2 ,...,PK n ) The message m in the message is signed, and the key is SK i =x i The signature i of (2) generates a signature as follows:
for j E [ n ]]And j is not equal to i, selectAnd calculate->And->
For j=i, selectAnd calculate +.>And->
Calculation ofAnd t is i ←r i -c i x i mod q;
Return to
(4)RV(sk i R, m) algorithm: for verifying the integrity of a ring signature, upon receipt of the signature (R, m, σ), a verification algorithm first resolves σ to (R, c) 1 ,t 1 ,...,c n ,t n ) And check r.epsilon.G and
example two
The embodiment discloses a heterogeneous chain cross-chain asset transaction system with identity privacy protection;
a heterogeneous chain cross-chain asset transaction system with identity privacy protection comprises an initialization module, an asset locking module, a ring signature module and a verification transfer module:
an initialization module configured to: initializing the transaction parties before the transaction, wherein the initialization comprises the steps that the transaction parties generate respective public and private keys, the transaction sender generates a public key ring, the transaction sender generates a disposable address of a transaction receiver, and intelligent contract generation contract account addresses are deployed on a receiver blockchain;
an asset locking module configured to: the transaction sender locks the asset to be transacted;
a ring signature module configured to: the transaction sender performs ring signature on transaction information based on a public key ring by utilizing an intelligent contract and sends the transaction information to a blockchain where a transaction receiver is located, wherein the transaction information comprises a disposable address of the transaction receiver;
a verification transfer module configured to: and the transaction receiver verifies the ring signature and the disposable address of each transaction received by the blockchain, and transfers the transaction locked asset which passes both verification to the transaction receiver.
Example III
An object of the present embodiment is to provide a computer-readable storage medium.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs steps in a heterogeneous chain cross-chain asset transaction method of identity privacy protection as described in one embodiment of the present disclosure.
Example IV
An object of the present embodiment is to provide an electronic apparatus.
An electronic device comprising a memory, a processor and a program stored on the memory and executable on the processor, wherein the processor performs steps in a heterogeneous chain cross-chain asset transaction method for identity privacy protection as described in embodiment one of the present disclosure when the program is executed.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The heterogeneous chain cross-chain asset transaction method for protecting identity privacy is characterized by comprising the following steps of:
initializing the transaction parties before the transaction, wherein the initialization comprises the steps that the transaction parties generate respective public and private keys, the transaction sender generates a public key ring, the transaction sender generates a disposable address of a transaction receiver, and intelligent contract generation contract account addresses are deployed on a receiver blockchain;
the transaction sender locks the asset to be transacted;
the transaction sender performs ring signature on transaction information based on a public key ring by utilizing an intelligent contract and sends the transaction information to a blockchain where a transaction receiver is located, wherein the transaction information comprises a disposable address of the transaction receiver;
and the transaction receiver verifies the ring signature and the disposable address of each transaction received by the blockchain, and transfers the transaction locked asset which passes both verification to the transaction receiver.
2. The heterogeneous chain cross-chain asset transaction method for identity privacy protection of claim 1, wherein the transaction sender generates a public key ring, specifically:
the transaction sender generates a group of member public keys by adopting an elliptic curve encryption algorithm, and forms a public key ring with the new transaction sender public key.
3. The heterogeneous chain cross-chain asset transaction method for identity privacy protection of claim 1, wherein the transaction sender generates a disposable address of a transaction receiver, specifically:
the transaction sender acquires the public key of the transaction receiver and generates a random number, and the hidden random number and the public key of the transaction receiver are utilized to generate a disposable address of the transaction receiver through a hash function as a target address of the transaction transfer.
4. The heterogeneous chain cross-chain asset transaction method for identity privacy protection of claim 1, wherein the asset to be transacted is locked in two cases:
if the sender blockchain supports intelligent contracts, transferring the assets to be transacted to contract account addresses, and locking the assets;
if the sender blockchain does not support the intelligent contract, the asset to be transacted is locked to a third party vault, and the vault is used for realizing the operations of transaction processing and transaction returning.
5. The identity privacy preserving heterogeneous chain across chain asset transaction method of claim 1, wherein the intelligent contracts include privacy preserving contracts and across chain contracts;
the privacy protection contract is used for ring signature and verification;
the cross-link contract realizes communication of users on different links based on link relay, and simultaneously obtains the exchange rate and performs transaction transfer operation.
6. The heterogeneous chain cross-chain asset transaction method of claim 5, wherein the transaction receiver verifies the ring signature and the disposable address of each transaction received by the blockchain, specifically:
invoking privacy protection contract to carry out integrity verification on the ring signature;
and calculating the disposable public key by using the private key of the transaction receiver, performing address matching on the disposable public key and the received disposable address, and if the matching is successful, indicating that the transaction is sent to the receiver.
7. The identity privacy preserving heterogeneous chain cross-chain asset transaction method of claim 5, wherein the transferring the transaction locked asset with both verifications to the transaction recipient further comprises:
based on the prophetic machine, obtaining the latest exchange rate of the blockchain where the transaction parties are in the centralized exchange, and transferring the equivalent asset from the contract account address to the disposable address of the transaction receiver through the obtained exchange rate and the cross-link contract.
8. The heterogeneous chain cross-chain asset transaction system for protecting identity privacy is characterized by comprising an initialization module, an asset locking module, a ring signature module and a verification transfer module:
the initialization module is configured to: initializing the transaction parties before the transaction, wherein the initialization comprises the steps that the transaction parties generate respective public and private keys, the transaction sender generates a public key ring, the transaction sender generates a disposable address of a transaction receiver, and intelligent contract generation contract account addresses are deployed on a receiver blockchain;
the asset locking module is configured to: the transaction sender locks the asset to be transacted;
the ring signature module is configured to: the transaction sender performs ring signature on transaction information based on a public key ring by utilizing an intelligent contract and sends the transaction information to a blockchain where a transaction receiver is located, wherein the transaction information comprises a disposable address of the transaction receiver;
the verification transfer module is configured to: and the transaction receiver verifies the ring signature and the disposable address of each transaction received by the blockchain, and transfers the transaction locked asset which passes both verification to the transaction receiver.
9. An electronic device, comprising:
a memory for non-transitory storage of computer readable instructions; and
a processor for executing the computer-readable instructions,
wherein the computer readable instructions, when executed by the processor, perform the method of any of the preceding claims 1-7.
10. A storage medium, characterized by non-transitory storing computer-readable instructions, wherein the instructions of the method of any one of claims 1-7 are performed when the non-transitory computer-readable instructions are executed by a computer.
CN202310420374.8A 2023-04-14 2023-04-14 Heterogeneous chain cross-chain asset transaction method and system for identity privacy protection Pending CN116823456A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310420374.8A CN116823456A (en) 2023-04-14 2023-04-14 Heterogeneous chain cross-chain asset transaction method and system for identity privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310420374.8A CN116823456A (en) 2023-04-14 2023-04-14 Heterogeneous chain cross-chain asset transaction method and system for identity privacy protection

Publications (1)

Publication Number Publication Date
CN116823456A true CN116823456A (en) 2023-09-29

Family

ID=88121149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310420374.8A Pending CN116823456A (en) 2023-04-14 2023-04-14 Heterogeneous chain cross-chain asset transaction method and system for identity privacy protection

Country Status (1)

Country Link
CN (1) CN116823456A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117314399A (en) * 2023-11-30 2023-12-29 南京邮电大学 Zero-trust extensible cross-chain asset interaction system and method
CN117726446A (en) * 2024-02-07 2024-03-19 北京邮电大学 Method, system and equipment for cross-chain transaction of supervision digital asset

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117314399A (en) * 2023-11-30 2023-12-29 南京邮电大学 Zero-trust extensible cross-chain asset interaction system and method
CN117314399B (en) * 2023-11-30 2024-01-26 南京邮电大学 Zero-trust extensible cross-chain asset interaction system and method
CN117726446A (en) * 2024-02-07 2024-03-19 北京邮电大学 Method, system and equipment for cross-chain transaction of supervision digital asset
CN117726446B (en) * 2024-02-07 2024-04-26 北京邮电大学 Method, system and equipment for cross-chain transaction of supervision digital asset

Similar Documents

Publication Publication Date Title
CN109257182B (en) Privacy protection method based on homomorphic cryptography commitment and zero knowledge range certification
JP7316295B2 (en) Computer-implemented method and system for transferring access to digital assets
Katz et al. Efficient and secure authenticated key exchange using weak passwords
CN116823456A (en) Heterogeneous chain cross-chain asset transaction method and system for identity privacy protection
EP3669491A1 (en) Computer-implemented method of generating a threshold vault
CN110958110A (en) Block chain private data management method and system based on zero knowledge proof
CN111064734B (en) Block chain system user identity anonymity and traceable method, corresponding storage medium and electronic device
JP7091322B2 (en) Composite digital signature
CN110930153B (en) Block chain privacy data management method and system based on hidden third party account
CA2830285C (en) Keyed pv signatures
CN104184588A (en) Undetachable digital signature method based on identity
WO2017030111A1 (en) Calculation system, calculation device, method therefor, and program
CN111010280A (en) Group signature-based construction method for monitorable block chain
CA2241705C (en) A method for preventing key-share attacks
EP2721766A1 (en) Secure financial transactions
Darwish et al. A model to authenticate requests for online banking transactions
Chernyi et al. Security of electronic digital signature in maritime industry
CN113645036A (en) Ether shop transaction privacy protection method based on ring signature and intelligent contract
CN110912702B (en) Block chain asset management method based on hidden social relationship
US11669833B1 (en) Blockchain endpoint protection
Futoransky et al. Fair and decentralized exchange of digital goods
CN113591128A (en) Block chain illegal address supervision system based on group signature and tracing method
CN116633560B (en) Privacy protection and supervision method for block chain multicast transaction mode
CN116188165A (en) Privacy protection cross-link asset transaction method, device and medium based on relay link technology
Błaśkiewicz et al. Darknet signatures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination