CN116894672A - Data transaction platform implementation method based on blockchain and payment channel network - Google Patents

Data transaction platform implementation method based on blockchain and payment channel network Download PDF

Info

Publication number
CN116894672A
CN116894672A CN202310858396.2A CN202310858396A CN116894672A CN 116894672 A CN116894672 A CN 116894672A CN 202310858396 A CN202310858396 A CN 202310858396A CN 116894672 A CN116894672 A CN 116894672A
Authority
CN
China
Prior art keywords
transaction
data
lock
initial
purchaser
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310858396.2A
Other languages
Chinese (zh)
Other versions
CN116894672B (en
Inventor
杨安家
刘子琳
翁健
童瑶
李涛
裴清福
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN202310858396.2A priority Critical patent/CN116894672B/en
Publication of CN116894672A publication Critical patent/CN116894672A/en
Application granted granted Critical
Publication of CN116894672B publication Critical patent/CN116894672B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/381Currency conversion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • H04L9/3221Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs interactive zero-knowledge proofs

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a data transaction platform implementation method based on a blockchain and a payment channel network, which comprises the following steps: carrying out transaction initialization on a data purchaser and a data owner to obtain an initial transaction lock; after the data purchaser obtains the initial transaction lock, the transaction lock to be used and the pre-signed transaction are sequentially obtained based on the data purchaser and the intermediary party until the data owner obtains target transaction information; after confirming the target transaction information, the data owner and the intermediary party sequentially generate legal signatures and conduct uplink transaction until the first intermediary party obtains currency provided by the data purchaser, and the data transaction is completed. According to the application, two users without directly linked payment channels on the chain can complete the transaction through a series of intermediaries, so that the transaction fee required to be submitted to the chain when the users conduct data transaction is reduced, the time required to wait for transaction confirmation by the users is reduced, and the user experience is improved.

Description

Data transaction platform implementation method based on blockchain and payment channel network
Technical Field
The application belongs to the field of network space security, and particularly relates to a data transaction platform implementation method based on a blockchain and payment channel network.
Background
In a conventional data transaction mode, a data transaction platform generally serves as a bridge between a data owner and a data purchaser to assist the data owner and the data purchaser in performing transactions. However, conventional data transaction platforms still have various problems, such as opaque transaction flow, inconvenient inspection, susceptibility to single point of failure, and the like.
In order to solve the problems of opaque inherent transaction flow, easy single point failure and the like faced by the traditional centralized data transaction platform, some researches are started to introduce a blockchain technology to construct the data transaction platform. The decentralized data transaction platform constructed based on the blockchain technology does not need a trusted third party to help the data owner and the data purchaser to conduct transactions, but enables all the participants of the data transaction platform to jointly maintain a public account book recording all the transactions. By the method, the data transaction process can be transparent, the transmission is convenient, and the data transaction process is not affected by the inflation of the communication.
However, such a data transaction method faces a problem of privacy protection, and since transaction data is known on the chain, some other people with great significance may obtain more information related to personal privacy, such as transaction information, by analyzing the transaction data on the blockchain. Therefore, the data transaction platform ensures that the user can smoothly conduct transactions, and meanwhile, the privacy protection problem of the transactions uploaded to the blockchain is also required to be considered, so that the information security of the user of the platform is protected.
In addition, blockchains suffer from inherent poor scalability: firstly, the delay of transaction confirmation is high, and a user needs to wait for a long time to confirm whether the transaction is completed or not; secondly, data is very difficult to exchange in different blockchains, and users with multiple different blockchain accounts face the problem that transactions are difficult to conduct in different blockchains. For this reason, the data transaction platform is designed to take into consideration the problems of efficiency and versatility.
Moreover, since the designed data transaction platform is applicable to the internet of things scenario, in the internet of things scenario, the operation space of many intelligent devices is very limited, and if the data transaction platform used therein has a large calculation overhead, the user needs to wait for a long time, and the user experience is reduced. Therefore, the data transaction platform also needs to consider the problem that the calculation operation cannot be too complicated.
Disclosure of Invention
In order to solve some problems of the current data transaction platform, a data transaction platform implementation method based on a blockchain and payment channel network is provided, consideration of aspects of universality, high efficiency, privacy protection and lightweight is taken into consideration, and the method is more suitable for the requirements of data transaction of the Internet of things in reality.
In order to achieve the above purpose, the application provides a data transaction platform implementation method based on a blockchain and payment channel network, which specifically comprises the following steps:
carrying out transaction initialization on a data purchaser and a data owner to obtain an initial transaction lock;
after the data purchaser obtains the initial transaction lock, sequentially obtaining a transaction lock to be used and a pre-signed transaction based on the data purchaser and an intermediary party until the data owner obtains target transaction information;
after the data owner confirms that the target transaction information is correct, the data owner and the intermediary party sequentially generate legal signatures and conduct uplink transactions until the first intermediary party obtains currency provided by the data purchaser, and data transactions are completed.
Optionally, the data purchaser and the data owner perform transaction initialization, and acquiring the initial transaction lock includes:
after the data purchaser decides to consume at the data owner, setting up a payment channel network linked to the data owner;
based on the payment channel network, the data owner utilizes a public and private key of the data owner to initialize a transaction protocol, and the initial transaction lock is obtained.
Optionally, based on the payment channel network, the data owner initiates a transaction protocol with a public-private key of the data owner, and acquiring the initial transaction lock further includes:
acquiring a non-interactive zero knowledge proof corresponding to an initial transaction lock, and transmitting the initial transaction lock and the non-interactive zero knowledge proof corresponding to the initial transaction lock to the data purchaser by the data owner;
after receiving the initial transaction lock and the non-interactive zero knowledge proof corresponding to the initial transaction lock, the data purchaser performs correctness verification on the non-interactive zero knowledge proof corresponding to the initial transaction lock to check the correctness of the initial transaction lock.
Optionally, after the data buyer receives the initial transaction lock and the non-interactive zero knowledge proof corresponding to the initial transaction lock, performing correctness verification on the non-interactive zero knowledge proof corresponding to the initial transaction lock to check correctness of the initial transaction lock further includes:
if the initial transaction lock is checked to be wrong, terminating the transaction protocol initialization;
if the initial transaction lock is checked to be correct and the data purchaser decides to consume at the data owner, the initial transaction lock is randomized and sent to the intermediary party.
Optionally, after the data buyer obtains the initial transaction lock, sequentially obtaining the transaction lock to be used and the pre-signed transaction based on the data buyer and the intermediary party until the data owner obtains the target transaction information includes:
s201, after the data purchaser receives the initial transaction lock, the data purchaser randomizes the initial transaction lock to obtain a new transaction lock;
s202, acquiring corresponding non-interactive zero knowledge proof based on the new transaction lock, generating a new transaction and transmitting the new transaction to a first adjacent intermediary party;
s203, the first adjacent intermediary party confirms the new transaction, and confirms that the new transaction is correct;
s204, after confirming that the new transaction is correct, the data purchaser generates transaction information and sends the transaction information to a first adjacent intermediary party, and the first adjacent intermediary party acquires the corresponding transaction information and verifies the correctness; if the transaction lock is correct, randomizing the transaction lock in the corresponding transaction information to obtain the corresponding transaction lock; if yes, ending the transaction;
s205, acquiring a corresponding non-interactive zero knowledge proof based on the corresponding transaction lock, generating a corresponding transaction and transmitting the corresponding transaction to a second adjacent intermediary party;
s206, the corresponding transaction is confirmed by the second adjacent intermediary party, and the corresponding transaction is confirmed to be correct;
s207, after confirming that the corresponding transaction is correct, generating transaction information by a second adjacent intermediary party and sending the transaction information to a next adjacent intermediary party, after the next adjacent intermediary party obtains the transaction information, verifying the correctness of the transaction information, and if the transaction information is correct, randomizing a transaction lock in the transaction information to obtain a new transaction lock, returning to S205 until the data owner obtains the target transaction information; if there is an error, the transaction is terminated.
Optionally, the first party adjacent to the intermediary confirms the new transaction, and confirming the new transaction includes:
if the new transaction is wrong, the transaction is terminated;
if the new transaction is correct, the data purchaser or the intermediary party generates the transaction information.
Optionally, after confirming that the new transaction is correct, the data buyer generating transaction information includes:
after the first adjacent intermediary party confirms that the new transaction is correct, the data purchaser pre-signs the new transaction lock and the new transaction by using an adapter signature scheme and a private key of the data purchaser to acquire a new pre-signature;
the transaction information includes the new transaction lock, the corresponding non-interactive zero-knowledge proof, the new transaction, and the new pre-signature.
Optionally, after the data owner confirms that the target transaction information is correct, the data owner and the intermediary party sequentially generate legal signatures and perform uplink transactions until the first intermediary party obtains currency provided by the data buyer, where the step of obtaining the currency provided by the data buyer includes:
after confirming that the target transaction information is correct, the data owner sends a data access key to the data purchaser, wherein the target transaction information comprises a target transaction lock, a target non-interactive zero-knowledge proof, a target transaction and a target pre-signature;
the data owner solves a target transaction lock based on a trapdoor function, and a secret value of the target transaction lock is obtained;
converting the target pre-signature based on the secret value of the target transaction lock to obtain a legal signature;
the data owner obtains currency previously locked in the transaction by the previous intermediary party based on the legal signature and the target transaction; and continuing to conduct reverse-order uplink transactions based on the previous intermediary party until the first intermediary party obtains the currency locked in the transaction by the data buyer transaction.
The application has the following beneficial effects:
(1) Compared with a plurality of centralized data transaction platforms at present, the application can avoid a plurality of problems and attacks caused by centralization, such as opaque transaction flow and easy single-point fault attack.
(2) The transaction mode adopted by the application is designed based on the technology of the payment channel network, namely, two users without directly linked payment channels on the chain can finish the transaction through a series of intermediaries, so that the transaction cost of the user for submitting the link in the process of carrying out data transaction is reduced, the time for waiting for transaction confirmation by the user is reduced, and the user experience is improved.
(3) The application improves and designs a new payment channel network scheme by utilizing a new cryptography tool on the basis of the existing payment channel network technology. Compared with the existing payment channel network scheme, the scheme is designed to simultaneously consider the aspects of universality, high efficiency, privacy protection and lightweight, so that the scheme is more suitable for intelligent equipment with limited operation space and is compatible with more blockchains.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
FIG. 1 is a block chain and payment channel network-based data transaction platform implementation method according to an embodiment of the present application;
fig. 2 is a flowchart of a method for implementing a data transaction platform based on a blockchain and payment channel network according to an embodiment of the present application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
As shown in fig. 1, the present embodiment provides a method for implementing a data transaction platform based on a blockchain and payment channel network, where the data transaction platform based on the blockchain and payment channel network includes an initialization phase of transaction, a setting phase of transaction lock, and a releasing phase of transaction lock. The initialization stage of the platform is to ensure the correctness of the scheme before the consumption occurs; the transaction lock setup phase is the primary phase of consumption, during which the data purchaser, data owner and a series of intermediaries assisting the transaction need to collectively execute the protocol in-chain; the release phase of the transaction lock is that after the end of the consumption, the parties involved in the transaction submit the transaction to the chain.
The implementation method of the data transaction platform of the Internet of things based on the blockchain and the payment channel network provides a universal, efficient, privacy-protecting and light-weight data transaction mode, and meanwhile, data transaction service is provided in a decentralization mode, so that the problems of single-point faults and centralized management in many traditional data transaction platforms are avoided. In order to avoid malicious behaviors in the data transaction process, a flow chart of the constructed data transaction platform is shown in fig. 2, and a plurality of related functions are designed to ensure that all parties participating in the transaction complete the transaction according to rules, so that malicious behaviors are prevented from happening.
First, definitions of some letters and formulas involved in the present embodiment will be described:
PK i ,SK i : a public key and a private key of a user numbered i;
tx i : transactions numbered i;
P i : a transaction lock numbered i, an example of a cryptographic puzzle;
: non-interactive zero knowledge proof corresponding to transaction lock with number i;
r i : generating a transaction lock P i Random numbers added in during the process;
: for transaction tx i And transaction lock P i Is a pre-signature of (a);
σ i : for transaction tx i Is a signature of (a);
k: an access key for data of the transaction performed by both parties;
(P 0 ,r 0 ) ζ PGen (pp, r): inputting the public parameter pp and the random value r to generate an added random value r 0 Initial transaction lock P of (1) 0
(P i ,r i )←PRand(pp,P i-1 ): inputting common parameters pp and transaction lock P i-1 Randomly selecting a random number r i Randomizing the transaction lock to generate a new transaction lock P i
w i ←PSolve(td,P i ): input trapdoor td and transaction lock P i Solving the transaction lock by using trapdoor to obtain the secret value w inside i
Input private key SK i Message m and a lock Y, generating a pre-signature +.>
Input message m, transaction lock Y and pre-signature +.>Verifying the correctness of the pre-signature, correctly returning to 1, and returning to 0 by mistake;
input pre-signature->The signature sigma and the transaction lock Y calculate and return a secret value Y locked by the transaction lock;
: input pre-signature->A secret value Y corresponding to the transaction lock Y is calculated and returned to the signature sigma;
π←P NIZK (x, w): inputting a difficult problem description x, proving that w is a solution of x, and returning proving pi;
{0,1}:=V NIZK (x, pi): inputting a puzzle description x and a proof pi, proving whether x is solvable, if so, returning to 1, otherwise, returning to 0.
The security mechanism of the data transaction of the present application builds security that relies on the adapter signature scheme in cryptography and the security of the randomizable puzzle. The non-counterfeitability and witness extractability of the adapter signature scheme ensures that malicious parties cannot steal money from honest users or prevent others from taking money. As shown in fig. 2, the method specifically comprises the following steps:
step one, in the preliminary stage of the transaction, after the data purchaser and the data owner negotiate to conduct the data transaction, selecting a payment channel network capable of linking the data purchaser and the data owner, and before the transaction begins, the data purchaser and the data owner need to initialize a transaction protocol together to obtain an initial transaction lock.
First, after the data buyer decides to consume at the data owner, a payment channel network linked to the data owner is selected, that is, the data buyer, intermediary party 1, intermediary parties 2, …, intermediary party n-1, and data owner in fig. 2 are respectively numbered 1,2, …, and n-1, and at this time, the two parties to the transaction have set a payment channel network for transaction, and can conduct the transaction.
Second, the data purchaser and data owner need to separately set public and private key pairs (PK 0 /SK 0 ) Sum (PK) n /SK n ) Wherein PK 0 /PK n Is a public key, SK, set by the data purchaser/data owner 0 /SK n Is a private key set by the data purchaser/data owner, and then both parties together initialize a protocol to obtain relevant transaction information.
Furthermore, the data owner will have a public private key (PK n /SK n ) Public parameters and trapdoors (pp, td), respectively set as randomized puzzles, data owners utilize public-private key pair initialization protocols and generate an initial transaction lock P by the following formula 0 And corresponding non-interactive zero knowledge proof
(P 0 ,r 0 )←PGen(pp,r)
The data owner locks and validates the transactionAnd sending the data to a data purchaser. After receiving the information sent by the data owner, the data buyer uses the formula +.>Proof of non-interactive zero knowledge->Verification of correctness is performed to check the original transaction lock P 0 If the verification is not passed, terminating the transaction.
Finally, when the verification is passed and the data purchaser decides to make a data purchase, the next step is started.
And step two, in the setting stage of the transaction lock, after the data purchaser obtains the initial transaction lock, the data purchaser and the intermediary party 1 jointly generate the transaction lock and the pre-signed transaction which need to be used for subsequent transactions. Similarly, the corresponding transaction and transaction lock will be set by the subsequent transaction party until the data owner receives the relevant transaction information.
First, the data purchaser locks P on an initial transaction received from the data owner 0 Using the formula (P 1 ,r 1 )←PRand(pp,P 0 ) Randomizing the original transaction lock to obtain a new transaction lock, i.e. adding a random number r 1 Calculating to obtain a new transaction lock P 1 Then generating corresponding non-interactive zero knowledge proof for the new transaction lockCalculate->Regenerating a transaction tx 1 After confirming the transaction by the intermediary 1, the data purchaser uses the adapter signature scheme and the private key SK 0 For transaction lock P 1 And transaction tx 1 Pre-signing, i.e. calculating-> Wherein m is 1 For transaction tx 1 And then the transaction information (transaction lock P 1 Demonstration of->Transaction tx 1 And pre-signature->) To intermediary party 1.
Next, the mediating party 1 receives the transaction information (transaction lock P) sent from the data purchaser 1 Proof ofTransaction tx 1 And pre-signature->) Then, use formula->Verifying non-interactive zero knowledge proof->And using the formulaVerify pre-signature->If there is a mistake, the transaction is terminated. Otherwise, the subsequent operations of the mediator 1 are also the same as those of the data purchaser, i.e. the public-private key pair (PK 1 /SK 1 ) Wherein PK 1 Is a public key, SK 1 Is a private key. Intermediate party 1 then randomizes transaction lock P 1 Generating a new transaction lock P 2 I.e. calculation (P 2 ,r 2 )←PRand(pp,P 1 ) Generating a non-interactive zero knowledge proof for the transaction lock>I.e. calculationAt the same time, a transaction tx is generated 2 After confirming the transaction by the intermediary 2, the intermediary 1 uses the adapter signature scheme and the private key SK 1 For transaction lock P2 and transaction tx 2 Pre-signing, i.e. calculating-> Wherein m is 2 For transaction tx 2 Hash value of (a) and transaction information (transaction lock P 2 Demonstration of->Transaction tx 2 And pre-signature->) To intermediary party 2. The operation of mediator 2 is the same as mediator 1.
Finally, the data owner receives the transaction information (transaction lock P 3 Proof ofTransaction tx 3 And pre-signature->) And confirming, if the transaction is incorrect, terminating the transaction, otherwise, continuing the next step. .
And thirdly, in the release stage of the transaction lock, after the data owner confirms that the transaction information is correct, sending a data access key to the data purchaser, then recovering the pre-signature into a legal signature by using a trapdoor function of the data owner and taking money from the uplink transaction, and extracting the solution of the transaction lock from the transaction by the intermediary party at the previous position, thereby taking money from the uplink transaction. The rest of the intermediary's operations are the same until intermediary 1 also uplinks the transaction and takes money.
First, after confirming the trade information, the data owner sends the data access key k to the data purchaser, and then solves the trade lock P by using trapdoor 3 Obtaining its secret value w 3 I.e. calculating w 3 ←PSolve(td,P 3 ) Reusing the secret value w 3 Will pre-signRecovering legal signature sigma 3 I.e. calculate +.>Uplink transaction tx 3 And signature sigma 3 And takes money from it.
Second, after the data owner has uplink transactions, intermediary 2 may slave the transaction tx on the chain 3 Extracting signature sigma from the digital signature 3 Joint pre-signingTogether calculate transaction lock P 3 Is a secret value w of 3 I.e. calculate +.> Removing transaction lock P 2 Randomization to transaction Lock P 3 Random number r added at time 3 Obtaining the transaction lock P 2 Locked secret value w 2 I.e. calculationUsing this secret value w 2 Pre-signing->Recovering legal signature sigma 2 I.e. calculationUplink transaction tx 2 And signature sigma 2 Take money.
Finally, the following intermediary operates the same, and money is held in reverse order until intermediary 1 picks up transaction tx 1 The locked money, the whole transaction process ends.
In the second and third steps, the transaction lock is constructed based on the randomizable puzzle, and the safety of the randomizable puzzle ensures that the user cannot solve the puzzle owned by the user when the user does not have a trapdoor function or the secret value of the related randomizable puzzle. Meanwhile, the non-counterfeitability and witness extractability of the pre-signature of the adapter signature scheme also ensure that when a previous or subsequent user does not operate, the user cannot forge legal transaction information and steal money from an honest user, and even suffers a certain loss. Thus, parties to the transaction can only receive the maximum benefit when the agreement is executed honest, which also ensures that the parties will honest the transaction agreement.
As can be seen from the above embodiments, the present application applies the blockchain technology to the service of the data transaction platform, and applies the payment channel network technology to the transaction mode of the data transaction platform, where the service of the data transaction platform includes: the method comprises the steps of initializing a transaction, starting data purchaser consumption, setting a transaction lock, releasing the transaction lock, and ending the data purchaser consumption. First, after the data purchaser and the data owner agree together to decide to conduct a data transaction, the data purchaser finds a payment channel network on the blockchain that can be linked to the data owner. Before consumption begins, the data owner generates an initial transaction lock and corresponding proof that the subsequent transaction needs to use, and transmits the transaction lock and proof to the data purchaser over a secure channel. After receiving the information, the data purchaser verifies the correctness of the certificate, and if the verification is passed, the data purchaser starts to consume. After the data purchaser decides to begin consuming, a random value is added to the received initial transaction lock to calculate a new transaction lock, and a corresponding certificate is calculated to regenerate a transaction, and the transaction and the new transaction lock are pre-signed, and then transaction information (i.e., the transaction lock, the certificate, the transaction, and the pre-signature) is sent to the first intermediary. The intermediary receives the message and then performs a similar operation until the data owner receives the transaction information transmitted from the previous intermediary. After checking the trade information, the data owner sends the data access key to the data purchaser, the trade lock is unlocked by using the trapdoor function to obtain the secret value locked inside, and the pre-signature is converted into a legal signature by using the secret value. After the previous intermediary party links the transaction in the chain, the legal signature can be extracted from the transaction on the chain, then the secret value of the transaction lock is calculated together with the pre-signature, the random value added before is removed, so that the secret value in the transaction lock transmitted by the previous intermediary party is obtained, the pre-signature is restored into the legal signature by utilizing the secret value, the uplink transaction is continued, and the money locked in the transaction by the previous intermediary party is extracted. This way the money locked in the transaction is extracted in reverse order until the first intermediary party links up the transaction and obtains the money locked in by the data purchaser.
The present application is not limited to the above-mentioned embodiments, and any changes or substitutions that can be easily understood by those skilled in the art within the technical scope of the present application are intended to be included in the scope of the present application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.

Claims (8)

1. The data transaction platform implementation method based on the blockchain and the payment channel network is characterized by comprising the following steps of:
carrying out transaction initialization on a data purchaser and a data owner to obtain an initial transaction lock;
after the data purchaser obtains the initial transaction lock, sequentially obtaining a transaction lock to be used and a pre-signed transaction based on the data purchaser and an intermediary party until the data owner obtains target transaction information;
after the data owner confirms that the target transaction information is correct, the data owner and the intermediary party sequentially generate legal signatures and conduct uplink transactions until the first intermediary party obtains currency provided by the data purchaser, and data transactions are completed.
2. The blockchain and payment channel network-based data transaction platform implementation method of claim 1, wherein the data purchaser and the data owner perform transaction initialization, the obtaining the initial transaction lock comprising:
after the data purchaser decides to consume at the data owner, setting up a payment channel network linked to the data owner;
based on the payment channel network, the data owner utilizes a public and private key of the data owner to initialize a transaction protocol, and the initial transaction lock is obtained.
3. The blockchain and payment channel network-based data transaction platform implementation method of claim 2, wherein, based on the payment channel network, the data owner initiates a transaction agreement with a public-private key pair of the data owner, the obtaining the initial transaction lock further comprising:
acquiring a non-interactive zero knowledge proof corresponding to an initial transaction lock, and transmitting the initial transaction lock and the non-interactive zero knowledge proof corresponding to the initial transaction lock to the data purchaser by the data owner;
after receiving the initial transaction lock and the non-interactive zero knowledge proof corresponding to the initial transaction lock, the data purchaser performs correctness verification on the non-interactive zero knowledge proof corresponding to the initial transaction lock to check the correctness of the initial transaction lock.
4. The method for implementing a blockchain and payment channel network-based data transaction platform of claim 3, wherein after the data buyer receives the initial transaction lock and the non-interactive zero knowledge proof corresponding to the initial transaction lock, performing correctness verification on the non-interactive zero knowledge proof corresponding to the initial transaction lock to check correctness of the initial transaction lock further comprises:
if the initial transaction lock is checked to be wrong, terminating the transaction protocol initialization;
if the initial transaction lock is checked to be correct and the data purchaser decides to consume at the data owner, the initial transaction lock is randomized and sent to the intermediary party.
5. The method of claim 1, wherein after the data buyer obtains the initial transaction lock, sequentially obtaining a transaction lock to be used and a pre-signed transaction based on the data buyer and the intermediary party until the data owner obtains the target transaction information comprises:
s201, after the data purchaser receives the initial transaction lock, the data purchaser randomizes the initial transaction lock to obtain a new transaction lock;
s202, acquiring corresponding non-interactive zero knowledge proof based on the new transaction lock, generating a new transaction and transmitting the new transaction to a first adjacent intermediary party;
s203, the first adjacent intermediary party confirms the new transaction, and confirms that the new transaction is correct;
s204, after confirming that the new transaction is correct, the data purchaser generates transaction information and sends the transaction information to a first adjacent intermediary party, and the first adjacent intermediary party acquires the corresponding transaction information and verifies the correctness; if the transaction lock is correct, randomizing the transaction lock in the corresponding transaction information to obtain the corresponding transaction lock; if yes, ending the transaction;
s205, acquiring a corresponding non-interactive zero knowledge proof based on the corresponding transaction lock, generating a corresponding transaction and transmitting the corresponding transaction to a second adjacent intermediary party;
s206, the corresponding transaction is confirmed by the second adjacent intermediary party, and the corresponding transaction is confirmed to be correct;
s207, after confirming that the corresponding transaction is correct, generating transaction information by a second adjacent intermediary party and sending the transaction information to a next adjacent intermediary party, after the next adjacent intermediary party obtains the transaction information, verifying the correctness of the transaction information, and if the transaction information is correct, randomizing a transaction lock in the transaction information to obtain a new transaction lock, returning to S205 until the data owner obtains the target transaction information; if there is an error, the transaction is terminated.
6. The blockchain and payment channel network-based data transaction platform implementation method of claim 5, wherein first abutting the intermediary party confirms the new transaction, the confirming the new transaction without errors comprising:
if the new transaction is wrong, the transaction is terminated;
if the new transaction is correct, the data purchaser or the intermediary party generates the transaction information.
7. The method of claim 5, wherein the data buyer generating transaction information after confirming that the new transaction is correct comprises:
after the first adjacent intermediary party confirms that the new transaction is correct, the data purchaser pre-signs the new transaction lock and the new transaction by using an adapter signature scheme and a private key of the data purchaser to acquire a new pre-signature;
the transaction information includes the new transaction lock, the corresponding non-interactive zero-knowledge proof, the new transaction, and the new pre-signature.
8. The method of claim 1, wherein after the data owner confirms that the target transaction information is correct, the data owner and the intermediary sequentially generate legal signatures and perform uplink transactions until the first intermediary obtains the currency provided by the data buyer comprises:
after confirming that the target transaction information is correct, the data owner sends a data access key to the data purchaser, wherein the target transaction information comprises a target transaction lock, a target non-interactive zero-knowledge proof, a target transaction and a target pre-signature;
the data owner solves a target transaction lock based on a trapdoor function, and a secret value of the target transaction lock is obtained;
converting the target pre-signature based on the secret value of the target transaction lock to obtain a legal signature;
the data owner obtains currency previously locked in the transaction by the previous intermediary party based on the legal signature and the target transaction; and continuing to conduct reverse-order uplink transactions based on the previous intermediary party until the first intermediary party obtains the currency locked in the transaction by the data buyer transaction.
CN202310858396.2A 2023-07-12 2023-07-12 Data transaction platform implementation method based on blockchain and payment channel network Active CN116894672B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310858396.2A CN116894672B (en) 2023-07-12 2023-07-12 Data transaction platform implementation method based on blockchain and payment channel network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310858396.2A CN116894672B (en) 2023-07-12 2023-07-12 Data transaction platform implementation method based on blockchain and payment channel network

Publications (2)

Publication Number Publication Date
CN116894672A true CN116894672A (en) 2023-10-17
CN116894672B CN116894672B (en) 2024-04-16

Family

ID=88310357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310858396.2A Active CN116894672B (en) 2023-07-12 2023-07-12 Data transaction platform implementation method based on blockchain and payment channel network

Country Status (1)

Country Link
CN (1) CN116894672B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117997653A (en) * 2024-04-03 2024-05-07 湖南天河国云科技有限公司 Block chain-based data privacy protection method and device for Internet of things

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170221029A1 (en) * 2015-11-06 2017-08-03 Cable Television Laboratories, Inc Blockchaining systems and methods for frictionless media
CN107330787A (en) * 2017-05-24 2017-11-07 智牛股权投资基金(平潭)合伙企业(有限合伙) High frequency transaction payment method, system under a kind of block chain chain of highly effective and safe
US20210142300A1 (en) * 2019-11-13 2021-05-13 Ceres Coin LLC Stablecoin as a medium of exchange on a blockchain-based transaction network
CN115017515A (en) * 2022-06-01 2022-09-06 电子科技大学 Cross-contract reentry attack detection method and system
EP4141768A1 (en) * 2021-08-27 2023-03-01 ETH Zurich Method and system for a central bank digital currency with unlinkable transactions and privacy preserving regulation
US11625783B1 (en) * 2018-02-14 2023-04-11 Equity Shift, Inc. Blockchain instrument for transferable equity

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170221029A1 (en) * 2015-11-06 2017-08-03 Cable Television Laboratories, Inc Blockchaining systems and methods for frictionless media
CN107330787A (en) * 2017-05-24 2017-11-07 智牛股权投资基金(平潭)合伙企业(有限合伙) High frequency transaction payment method, system under a kind of block chain chain of highly effective and safe
US11625783B1 (en) * 2018-02-14 2023-04-11 Equity Shift, Inc. Blockchain instrument for transferable equity
US20210142300A1 (en) * 2019-11-13 2021-05-13 Ceres Coin LLC Stablecoin as a medium of exchange on a blockchain-based transaction network
EP4141768A1 (en) * 2021-08-27 2023-03-01 ETH Zurich Method and system for a central bank digital currency with unlinkable transactions and privacy preserving regulation
CN115017515A (en) * 2022-06-01 2022-09-06 电子科技大学 Cross-contract reentry attack detection method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117997653A (en) * 2024-04-03 2024-05-07 湖南天河国云科技有限公司 Block chain-based data privacy protection method and device for Internet of things
CN117997653B (en) * 2024-04-03 2024-06-07 湖南天河国云科技有限公司 Block chain-based data privacy protection method and device for Internet of things

Also Published As

Publication number Publication date
CN116894672B (en) 2024-04-16

Similar Documents

Publication Publication Date Title
CN113194469B (en) 5G unmanned aerial vehicle cross-domain identity authentication method, system and terminal based on block chain
CN111886830A (en) Computer-implemented system and method for data exchange
CN105187431B (en) Login method, server, client and the communication system of third-party application
US8856524B2 (en) Cryptographic methods, host system, trusted platform module, computer arrangement, computer program product and computer program
CN113746858B (en) Cross-chain communication method based on verifiable random function
JP4781269B2 (en) Key agreement and transport protocol
CN112889047A (en) Using multiple devices to enhance biometric authentication security
CN110061850A (en) The collision calculation method and editable block chain building method of chameleon hash function
WO2019220270A1 (en) Computer-implemented systems and methods for using a blockchain to perform an atomic swap
CN116894672B (en) Data transaction platform implementation method based on blockchain and payment channel network
CN110636051B (en) Block chain transaction method based on multi-user CA digital certificate
Blanchet et al. Computationally sound mechanized proofs for basic and public-key Kerberos
CN111539718A (en) Block chain cross-chain identity authentication method based on side chain
CN101175076A (en) High-efficiency, deniable, safety-unforgeable cryptographic key exchanging protocol of on-line computation
Shunmuganathan A reliable lightweight two factor mutual authenticated session key agreement protocol for multi-server environment
CN114513317B (en) Method, system, equipment and storage medium for resisting distributed denial of service attack
CN101707621B (en) Network transmission method suitable for ternary peer authentication of trusted network connection architecture
CN111262825A (en) Apparatus and method for processing user public key in communication system including plurality of nodes
CN115913647A (en) Cross-domain device access control policy enforcement method and device based on block chain
CN114978622A (en) Anonymous credential verification method and system based on block chain and zero-knowledge proof
CN112669150A (en) Data processing method, device and system based on block chain
Huang et al. Ambiguous optimistic fair exchange: Definition and constructions
CN113839768A (en) Cross-link communication method based on satellite link relay
EP4366231A2 (en) Computer-implemented system and method for controlling processing steps of distributed system
CN101645870A (en) Method for exchanging secret key effectively and fairly

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant