CN117078255A - Digital asset anonymous payment method, device, equipment and medium - Google Patents

Digital asset anonymous payment method, device, equipment and medium Download PDF

Info

Publication number
CN117078255A
CN117078255A CN202311031617.5A CN202311031617A CN117078255A CN 117078255 A CN117078255 A CN 117078255A CN 202311031617 A CN202311031617 A CN 202311031617A CN 117078255 A CN117078255 A CN 117078255A
Authority
CN
China
Prior art keywords
transaction
digital asset
data
blockchain
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311031617.5A
Other languages
Chinese (zh)
Inventor
魏治杰
郭晋岱
张一锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongchao Credit Card Industry Development Co ltd
China Banknote Printing and Minting Group Co Ltd
Original Assignee
Zhongchao Credit Card Industry Development Co ltd
China Banknote Printing and Minting Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongchao Credit Card Industry Development Co ltd, China Banknote Printing and Minting Group Co Ltd filed Critical Zhongchao Credit Card Industry Development Co ltd
Priority to CN202311031617.5A priority Critical patent/CN117078255A/en
Publication of CN117078255A publication Critical patent/CN117078255A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

The application discloses a digital asset anonymous payment method, device, equipment and medium, and relates to the technical field of blockchain. The method is applied to a pre-deployed supervisor on a blockchain-based transaction platform, and comprises the following steps: acquiring digital asset transaction ciphertext data sent to a blockchain by a transaction sender and a transaction receiver through a preset digital asset application program when digital asset transaction is carried out; the digital asset transaction ciphertext data is actual transaction data after the blockchain verification is passed; decrypting the digital asset transaction ciphertext data by using a private key held by the supervision party so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption. By the technical scheme, supervision can be supported in the anonymous payment process of the digital asset, and controllable anonymity is achieved.

Description

Digital asset anonymous payment method, device, equipment and medium
Technical Field
The application relates to the technical field of blockchains, in particular to a method, a device, equipment and a medium for anonymous payment of digital assets.
Background
With the development of blockchains, the services of digital assets based on blockchains are increasing, and the payment of digital assets generated therewith is also increasing. Because the transaction data of the blockchain is public to all people, it is difficult to ensure that the transaction data of both transaction parties are not disclosed, thus generating various anonymous payment schemes. Which can support anonymous payments through the use of cryptographic techniques, these completely anonymous digital assets do not take into account regulatory concerns. Thus, anonymous payments of digital assets need to satisfy a feature of controlled anonymity, namely foreground anonymity, background real name. This requires digital assets to take into account regulatory issues on the premise of achieving anonymous payments.
Thus, how to support policing in the anonymous payment process of digital assets is a challenging problem that those skilled in the art are currently required to address.
Disclosure of Invention
In view of the above, the present application aims to provide a method, a device, equipment and a medium for anonymous payment of digital assets, which can support supervision in the anonymous payment process of digital assets. The specific scheme is as follows:
in a first aspect, the application discloses a digital asset anonymous payment method applied to a pre-deployed supervisor on a blockchain-based transaction platform, comprising the following steps:
Acquiring digital asset transaction ciphertext data sent to a blockchain by a transaction sender and a transaction receiver through a preset digital asset application program when digital asset transaction is carried out; the digital asset transaction ciphertext data is actual transaction data after the blockchain verification is passed; in the verification process, the blockchain uses zero knowledge to prove the transaction amount between the transaction sender and the transaction receiver and verify the data validity of the transaction amount obtained by the supervision party;
decrypting the digital asset transaction ciphertext data by using a private key held by the supervision party so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption.
Optionally, in the verification process, the blockchain uses zero knowledge to prove the transaction amount between the transaction sender and the transaction receiver, and verifies the data validity of the transaction amount obtained by the supervisor, including:
encrypting the transfer-out amount by using the public key of the transaction sender, encrypting the transfer-in amount by using the public key of the transaction receiver, encrypting the zero amount by using the public key of the confusing user to obtain a first group of ciphertext, and determining first zero knowledge proof data based on the first group of ciphertext; the transaction amount between the confusion users is zero, and the transaction amount is used for confusing the relation between the transaction sender and the transaction receiver, and comprises a plurality of confusion senders and confusion receivers;
Encrypting the transfer-out amount, the transfer-in amount and the zero amount by using the public key of the supervision party to obtain a second group of ciphertext, and determining second zero knowledge proof data based on the first group of ciphertext and the second group of ciphertext;
and verifying the first zero knowledge proof data and the second zero knowledge proof data, and when the first group of ciphertext and the second group of ciphertext have the same content and meet the preset condition at the same time, judging that the verification of the blockchain is passed.
Optionally, before the obtaining the digital asset transaction ciphertext data sent to the blockchain by the transaction sender and the transaction receiver through the preset digital asset application program when the digital asset transaction is performed, the method further includes:
signing the first zero-knowledge proof data and the second zero-knowledge proof data by a digital asset operator by utilizing a private key of the blockchain so as to verify the signed first zero-knowledge proof data and second zero-knowledge proof data through the blockchain.
Optionally, the decrypting the digital asset transaction ciphertext data by using a private key held by the supervisor so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after the decrypting, including:
Decrypting the digital asset transaction ciphertext data by using a private key held by the supervision party, and judging the account type of the corresponding account according to the actual transaction data obtained after decryption;
if the transaction amount of the actual transaction data obtained after decryption is greater than zero, judging that the account type is the transaction receiver;
if the transaction amount of the actual transaction data obtained after decryption is smaller than zero, judging the account type as the transaction sender;
and if the transaction amount of the decrypted actual transaction data is equal to zero, judging the account type as the confusing user.
Optionally, before the obtaining the digital asset transaction ciphertext data sent to the blockchain by the transaction sender and the transaction receiver through the preset digital asset application program when the digital asset transaction is performed, the method further includes:
obtaining public keys and real-name authentication information respectively corresponding to the transaction sender and the transaction receiver;
and carrying out KYC verification on the public key and the real-name authentication information, registering the public key in an intelligent contract of the blockchain after the KYC verification is passed, and binding the transaction sender and the transaction receiver with the corresponding public key respectively.
Optionally, the digital asset anonymous payment method further includes:
acquiring a digital asset of a first preset limit which is applied to be added by a target user through the preset digital asset application program;
signing the digital asset of the first preset quota by a digital asset operator by utilizing a private key of the blockchain to initiate blockchain transaction;
and based on the blockchain transaction, supervising the digital asset which is added with the first preset amount to the account of the target user.
Optionally, the digital asset anonymous payment method further includes:
acquiring a digital asset of a second preset limit which is applied for being added by a target user through the preset digital asset application program;
generating third zero knowledge proof data according to the digital assets of the second preset amount by the preset digital asset application program by using a private key held by the target user;
and verifying the third zero knowledge proof through the blockchain so as to supervise and pay out the digital asset with the second preset amount from the account of the target user after the verification is passed.
In a second aspect, the application discloses a digital asset anonymous payment device applied to a pre-deployed supervisor on a blockchain-based transaction platform, comprising:
The data acquisition module is used for acquiring digital asset transaction ciphertext data sent to the blockchain by a transaction sender and a transaction receiver through a preset digital asset application program when digital asset transaction is carried out; the digital asset transaction ciphertext data is actual transaction data after the blockchain verification is passed; in the verification process, the blockchain uses zero knowledge to prove the transaction amount between the transaction sender and the transaction receiver and verify the data validity of the transaction amount obtained by the supervision party;
and the data monitoring module is used for decrypting the digital asset transaction ciphertext data by utilizing the private key held by the supervision party so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption.
In a third aspect, the present application discloses an electronic device comprising a processor and a memory; wherein the memory is for storing a computer program that is loaded and executed by the processor to implement the digital asset anonymous payment method as described above.
In a fourth aspect, the present application discloses a computer-readable storage medium for storing a computer program; wherein the computer program when executed by a processor implements a digital asset anonymous payment method as described above.
The application provides a digital asset anonymous payment method, which is applied to a pre-deployed supervisor on a blockchain-based transaction platform and comprises the following steps: acquiring digital asset transaction ciphertext data sent to a blockchain by a transaction sender and a transaction receiver through a preset digital asset application program when digital asset transaction is carried out; the digital asset transaction ciphertext data is actual transaction data after the blockchain verification is passed; in the verification process, the blockchain uses zero knowledge to prove the transaction amount between the transaction sender and the transaction receiver and verify the data validity of the transaction amount obtained by the supervision party; decrypting the digital asset transaction ciphertext data by using a private key held by the supervision party so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption. Therefore, the application is applied to the pre-deployed supervisory party on the block chain-based transaction platform, so that the supervisory party can supervise the whole transaction process. In the process of carrying out digital asset transaction, a transaction sender and a transaction receiver communicate with a blockchain through transaction ciphertext data, so that identities of both sides of the transaction and the amount of the transaction can be hidden for the public, however, after the blockchain passes zero knowledge proof verification, the encrypted content proved to the transaction receiver is identical to the encrypted content provided to a supervision party, and meanwhile, the correctness of the zero knowledge proof can be automatically verified by an intelligent contract of the blockchain, so that double verification is realized. Further, the supervision party decrypts the digital asset transaction ciphertext data by using the private key, so that the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver are obtained, therefore, through the improvement, the function of supervision is added while the anonymity of the existing scheme is not destroyed, the identity and the transaction amount of the two parties of the transaction are disclosed for the supervision party, and the characteristic of controllable anonymity of the digital asset is realized.
In addition, the digital asset anonymous payment device, the digital asset anonymous payment equipment and the storage medium provided by the application correspond to the digital asset anonymous payment method and have the same effects.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a digital asset anonymous payment method disclosed by the application;
FIG. 2 is a schematic diagram of a registered anonymous digital asset account in accordance with the present disclosure;
FIG. 3 is a schematic diagram of an anonymous payment method for digital assets according to the present application;
FIG. 4 is a flow chart of a particular digital asset anonymous payment method of the present disclosure;
FIG. 5 is a schematic illustration of a zero knowledge proof of the present disclosure;
FIG. 6 is a schematic diagram of a digital asset transaction according to the present disclosure;
FIG. 7 is a flow chart of a particular digital asset anonymous payment method of the present disclosure;
FIG. 8 is a schematic diagram of anonymization of a digital asset being redeemed in accordance with the present disclosure;
FIG. 9 is a flow chart of a particular digital asset anonymous payment method of the present disclosure;
FIG. 10 is a schematic diagram of anonymity of a redemption digital asset of the present disclosure;
FIG. 11 is a schematic diagram of a digital asset anonymous payment device of the present disclosure;
fig. 12 is a block diagram of an electronic device according to the present disclosure.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Currently, existing anonymous payment schemes for digital assets do not take into account regulatory issues, and there is still a continuing need in the art to explore. Therefore, the application provides a digital asset anonymous payment scheme, which can hide the identity and the transaction amount of both transaction sides from the public, but can disclose the identity and the transaction amount of both transaction sides from the supervision side, so that the supervision side can supervise the whole transaction process and realize controllable anonymity.
The embodiment of the application discloses a digital asset anonymous payment method, which is shown in fig. 1 and applied to a pre-deployed supervisor on a blockchain-based transaction platform, and comprises the following steps:
step S11: acquiring digital asset transaction ciphertext data sent to a blockchain by a transaction sender and a transaction receiver through a preset digital asset application program when digital asset transaction is carried out; the digital asset transaction ciphertext data is actual transaction data after the blockchain verification is passed; and in the verification process, the blockchain utilizes zero knowledge to prove the transaction amount between the transaction sender and the transaction receiver and verify the data validity of the transaction amount obtained by the supervision party.
In the embodiment of the application, in the process of carrying out anonymous payment of the digital asset, the anonymous payment can be carried out based on Zether protocol. It can be understood that Zether is an anonymous payment protocol on ethernet, which encrypts the transaction amount of both parties to a transaction by using ElGamal, and verifies that the transaction amount sent by the transaction sender is equal to the transaction amount received by the transaction receiver by using a zero knowledge proof technique, and that the transaction amount is greater than zero, and that the account balance of the transaction sender is greater than zero, thereby hiding the transaction amount.
In the embodiment of the application, the Zether anonymous payment protocol is improved, and a digital asset anonymous payment scheme supporting supervision is provided. Therefore, a supervisor is set on the blockchain-based transaction platform in advance, and further, when a user registers an account on a digital asset Application (APP), a KYC (Know your customer, knowledge of your customer) verification process needs to be performed in the account service of the supervisor. Specifically, in the process of performing KYC verification, firstly, a public key corresponding to each of the transaction sender and the transaction receiver and real-name authentication information corresponding to each of the transaction sender and the transaction receiver are obtained; and performing KYC verification on the public key and the real-name authentication information, registering the public key in an intelligent contract of the blockchain after the KYC verification is passed, and binding the transaction sender and the transaction receiver with the corresponding public key respectively.
Since the Zether protocol achieves hiding of the identity of the transaction party by hiding the identity of the transaction party in other n-2 (n is a power of 2) individuals, e.g., alice sends b digital assets to Bob, alice uses public key y 1 ,......,y n Respectively encrypting to generate n corresponding ciphertexts (C 1 ,D 1 ),......,(C n ,D n ). Wherein Alice and Bob's public keys are hidden in y 1 ,......,y n In the ciphertext (C) 1 ,D 1 ),......,(C n ,D n ) In which there are two encrypted values non-zero, respectively-b and b (corresponding to Alice and Bob public key encrypted ciphertext), the remaining ciphertext encrypted values are all 0. Thus, the public cannot distinguish which two public keys transfer money with each other, and cannot know the amount of transfer money, so that anonymous payment is realized. When the user registers in the supervisor, the supervisor can associate the true identity of the user with the public key of the user, and the supervisor can provide the public key of the supervisor to encrypt transaction data for the user, so that the supervisor can not only know the plaintext corresponding to the ciphertext encrypted by the two parties of the transaction by using the private key of the supervisor, but also know the true identity of the user corresponding to the ciphertext, and the supervisor can obtain the identity of the two parties of the transaction.
A schematic diagram of registering an anonymous digital asset account is shown in fig. 2. It can be understood that the user comprises a transaction sender and a transaction receiver, after the user generates a public-private key pair through the digital asset APP, the public key corresponding to the private key and personal real-name authentication information are sent to account service of the supervisor for KYC authentication, after the authentication is passed, the supervisor registers the public key in the blockchain intelligent contract, and after the registration is successful, the user is bound with the public key KYC information. The supervisor can thus know the identity information of the user after obtaining data encrypted with the user's public key. Meanwhile, because the supervision party provides the public key of the supervision party for encrypting the transaction data for the user, the supervision party can decrypt the ciphertext obtained by the user through the encryption of the public key of the supervision party by utilizing the private key of the supervision party, and further, whether the encrypted content to the receiving party is identical with the encrypted content obtained by the supervision party or not is verified through zero knowledge proof.
It should be noted that the digital asset transaction ciphertext data of the supervising party between the supervising transaction sender and the transaction receiver is the actual transaction data after the blockchain verification is passed. That is, the blockchain uses zero knowledge proof to verify the transaction amount between the transaction sender and the transaction receiver, and the transaction amount obtained by the supervisor during verification. In this way, the encrypted content of the transaction sender to the transaction receiver is verified to be the same as the encrypted content of the transaction receiver to the supervision party, and the correctness of transaction data such as the transaction amount being greater than zero and the account balance of the transaction sender being greater than zero is verified.
Step S12: decrypting the digital asset transaction ciphertext data by using a private key held by the supervision party so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption.
In the embodiment of the application, because the KYC verification process is performed in the account service of the supervisor when the user registers the anonymous digital asset account, both sides of the transaction hold the public key of the supervisor. When a transaction sender initiates a digital asset transaction to a transaction receiver, the transaction data is encrypted by using the public key of the sender, and the transaction data is encrypted by using the public key of the supervisor. Since the digital asset transaction ciphertext data obtained by the supervisory party is the actual transaction data at the time of the transaction after the intelligent contract on the blockchain has been verified. Therefore, after analyzing the digital asset transaction ciphertext data by utilizing the private key held by the supervisor, the supervisor can determine the transaction amount in the ciphertext, and then confirm the true identities of the transaction sender and the transaction receiver according to the participating user corresponding to the transaction amount, so that the supervisor can acquire the true identities and the transaction amount of the transaction parties through the corresponding public key and the KYC information registered and recorded, thereby achieving complete controllability.
Fig. 3 shows that the supervision of anonymous payment is realized by the supervision party based on the improvement of the Zether protocol in the application. In transmitting a transaction, the transaction sender generates n ciphertexts (C 1 ,D 1 ),......,(C n ,D n ) Besides, the public key of the supervision party is used for encrypting the plaintext corresponding to the n ciphertexts respectively; then, the encryption content to the receiver is proved to be the same as the encryption content to the supervision party through the zero knowledge proof technology, and the intelligent contract can automatically verify the correctness of the zero knowledge proof. The supervision party can obtain the transmitted transaction amount by decrypting the ciphertext, so that the supervision party can be provided with the transaction amount. In addition, by adding a KYC procedure to the Zether protocol, i.e., each user needs to register with the supervisor before adding to the Zether protocol,the supervisor can associate the true identity of the user with the public key of the user so that the supervisor can learn not only the n ciphertexts (C 1 ,D 1 ),......,(C n ,D n ) Corresponding plaintext, and n ciphertext (C 1 ,D 1 ),......,(C n ,D n ) The corresponding user's true identity, and thus the supervisor can obtain the identity of both parties to the transaction.
The application provides a digital asset anonymous payment method, which is applied to a pre-deployed supervisor on a blockchain-based transaction platform and comprises the following steps: acquiring digital asset transaction ciphertext data sent to a blockchain by a transaction sender and a transaction receiver through a preset digital asset application program when digital asset transaction is carried out; the digital asset transaction ciphertext data is actual transaction data after the blockchain verification is passed; in the verification process, the blockchain uses zero knowledge to prove the transaction amount between the transaction sender and the transaction receiver and verify the data validity of the transaction amount obtained by the supervision party; decrypting the digital asset transaction ciphertext data by using a private key held by the supervision party so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption. Therefore, the application is applied to the pre-deployed supervisory party on the block chain-based transaction platform, so that the supervisory party can supervise the whole transaction process. In the process of carrying out digital asset transaction, a transaction sender and a transaction receiver communicate with a blockchain through transaction ciphertext data, so that identities of both sides of the transaction and the amount of the transaction can be hidden for the public, however, after the blockchain passes zero knowledge proof verification, the encrypted content proved to the transaction receiver is identical to the encrypted content provided to a supervision party, and meanwhile, the correctness of the zero knowledge proof can be automatically verified by an intelligent contract of the blockchain, so that double verification is realized. Further, the supervision party decrypts the digital asset transaction ciphertext data by using the private key, so that the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver are obtained, therefore, through the improvement, the function of supervision is added while the anonymity of the existing scheme is not destroyed, the identity and the transaction amount of the two parties of the transaction are disclosed for the supervision party, and the characteristic of controllable anonymity of the digital asset is realized.
In one embodiment of the digital asset anonymous payment method provided by the invention, a specific process of payment transaction for a digital asset is further described. When determining a transaction sender, a transaction receiver and transaction amount between the sender and the transaction receiver, the digital asset APP pulls a certain number of confusing users, and generates transaction data and zero knowledge proof corresponding to the transaction by using a private key based on Zether protocol; and according to the transaction plaintext, a supervision transaction ciphertext is generated by using a supervision party public key, then the transaction is triggered by the digital asset APP, and the digital asset APP is signed by using a fixed blockchain private key and then is sent to the blockchain.
Referring to fig. 4, in the process of verifying, the process of verifying the transaction amount between the transaction sender and the transaction receiver and the data validity of the transaction amount obtained by the supervisor by using zero knowledge proof specifically includes:
step S21: encrypting the transfer-out amount by using the public key of the transaction sender, encrypting the transfer-in amount by using the public key of the transaction receiver, encrypting the zero amount by using the public key of the confusing user to obtain a first group of ciphertext, and determining first zero knowledge proof data based on the first group of ciphertext.
In the embodiment of the application, the transaction sender selects n confusing users, including a confusing sender and a confusing receiver, which are used for confusing the identities of the transaction sender and the transaction receiver, and after the confusing users are selected, the user cannot know which users have the transaction, that is, the relationship between the transaction sender and the transaction receiver is confusing. The public keys of these users are y respectively 1 ,......,y n . The transaction sender uses its own public key y from Encryption of the amount-b, using the public key y of the transaction recipient to Encryption amount b, using public key y of confusing user 1 ,...,y n }\{y from ,y to Encryption of amount 0. Finally, the first group of ciphertexts obtained by the transaction sender through ElGamal encryption are respectivelyy i ∈{y 1 ,...,y n }\{y from ,y to }. Where g is a fixed origin and r represents a random large number in the computer.
In the embodiment of the application, after the first group of ciphertext is generated, the private key of the transaction sender is utilized to determine the first zero knowledge proof data of the first group of ciphertext, which is used for verifying compliance of transaction data sent by the transaction sender to the transaction receiver, such as verifying whether the account balance of the transaction sender is greater than zero and whether the transaction amount transferred by the transaction sender is greater than zero as a payer.
Step S22: and encrypting the transfer-out amount, the transfer-in amount and the zero amount by using the public key of the supervision party to obtain a second group of ciphertext, and determining second zero knowledge proof data based on the first group of ciphertext and the second group of ciphertext.
In the embodiment of the application, the transaction sender randomly selects r 1 ,r 2 ,...,r n Wherein r represents a random large number in a computer; using public key y of the supervisor s Encrypting-b, 0 respectively to obtain a second set of ciphertextr i ∈{r 1 ,r 2 ,...,r n }\{r f ,r t }。
Further, second zero knowledge proof data is determined based on the first set of ciphertext and the second set of ciphertext:
the second zero knowledge proof data is used for verifying whether the ciphertext content received by the supervisor is matched with the ciphertext contentThe ciphertext content of the transaction sender to the transaction receiver is the same.
Step S23: and verifying the first zero knowledge proof data and the second zero knowledge proof data, and when the first group of ciphertext and the second group of ciphertext have the same content and meet the preset condition at the same time, judging that the verification of the blockchain is passed.
In the embodiment of the application, a first group of ciphertext, a second group of ciphertext, and generated first zero knowledge proof data and second zero knowledge proof data are sent to an intelligent contract of a blockchain. It is noted that the first zero-knowledge proof data and the second zero-knowledge proof data are signed by a digital asset operator using a private key of the blockchain prior to sending the intelligent contract to the blockchain to verify the signed first zero-knowledge proof data and second zero-knowledge proof data by the blockchain. It can be seen that the blockchain transactions herein are not initiated by the transaction sender signature, but rather by the public fixed blockchain account signature. Therefore, because the zero-knowledge proof is generated by the Zether protocol account private key, whether the transaction is valid is irrelevant to the sponsor of the blockchain transaction, and the transaction is not sent by the sponsor of the transaction, thereby avoiding that malicious personnel trace the relationship between the digital asset account and the blockchain account of the Zether protocol, counting and tracing transaction records, and damaging anonymous transaction.
In the embodiment of the application, the blockchain verifies the first zero knowledge proof data and the second zero knowledge proof data, and firstly, the accuracy of ciphertext data sent by a transaction sender to a transaction receiver is verified, for example, when the transaction sender transfers accounts to the transaction receiver, the transfer amount of the transaction sender is required to be greater than zero, and the balance of the transaction sender is greater than zero; secondly, verifying that the ciphertext data received by the supervision party is the same as the data content of the ciphertext data sent by the transaction sending party to the transaction receiving party.
Fig. 5 shows a refinement of zero knowledge proof data verification of the supervision ciphertext generated by the transaction sender, wherein the transaction sender is a provider, and the intelligent sum is about Verifier. It can be seen that the provider sends the generated four parameters to the Verifier for verification. In this process, the accuracy of ciphertext data sent by the transaction sender to the transaction receiver is first verified. Secondly, verifying that the ciphertext data received by the supervisor is the same as the data content of the ciphertext data sent by the transaction sender to the transaction receiver. After the verification is passed, the account balance of the participating account is updated, and the transaction execution is completed.
Step S24: decrypting the digital asset transaction ciphertext data by using a private key held by the supervision party so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption.
In the embodiment of the application, the supervisor can acquire the digital asset transaction ciphertext data through the blockchain, and the data intelligent contract at the moment has verified that the data intelligent contract passes the zero knowledge proof, so that the acquired encrypted ciphertext is the actual transaction data during transaction: the supervisor uses the private key of the supervisor to decrypt the ciphertext on the blockchain, so that the actual transaction data of each participating user can be obtained, and the account type of the corresponding account is judged according to the actual transaction data obtained after decryption. Specifically, if the transaction amount of the actual transaction data obtained after decryption is greater than zero, determining that the account type is the transaction receiver, that is, the transaction receiver is the payee with the amount greater than 0; if the transaction amount of the decrypted actual transaction data is less than zero, determining that the account type is the transaction sender, namely, the transaction sender with the amount less than 0 is the payer; and if the transaction amount of the decrypted actual transaction data is equal to zero, judging that the account type is the confusing user, namely, the account type is the confusing user with the amount of 0. Further, the supervision party can obtain the true identity and the transaction amount of both transaction parties through the corresponding public key and the registered KYC information, thereby doing To be fully controllable. By->And traversing to obtain the final value of b. Where sk represents the private key.
Fig. 6 is a schematic diagram of a digital asset transaction, corresponding to the above steps, and will not be described herein.
Therefore, the application is applied to the pre-deployed supervisory party on the block chain-based transaction platform, so that the supervisory party can supervise the whole transaction process. In the process of carrying out digital asset transaction, a transaction sender and a transaction receiver communicate with a blockchain through transaction ciphertext data, so that identities of both sides of the transaction and the amount of the transaction can be hidden for the public, however, after the blockchain passes zero knowledge proof verification, the encrypted content proved to the transaction receiver is identical to the encrypted content provided to a supervision party, and meanwhile, the correctness of the zero knowledge proof can be automatically verified by an intelligent contract of the blockchain, so that double verification is realized. Further, the supervision party decrypts the digital asset transaction ciphertext data by using the private key, so that the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver are obtained, therefore, through the improvement, the function of supervision is added while the anonymity of the existing scheme is not destroyed, the identity and the transaction amount of the two parties of the transaction are disclosed for the supervision party, and the characteristic of controllable anonymity of the digital asset is realized.
In a specific embodiment of the digital asset anonymous payment method provided by the present application, after opening an anonymous digital asset account for a user, referring to fig. 7, the digital asset redemption process may further include:
step S31: and acquiring the digital asset of the first preset limit which is applied to be added by the target user through the preset digital asset application program.
Step S32: signing the digital asset of the first preset amount by a digital asset operator by utilizing a private key of the blockchain to initiate a blockchain transaction.
Step S33: and based on the blockchain transaction, supervising the digital asset which is added with the first preset amount to the account of the target user.
In the embodiment of the application, after opening an anonymous digital asset account, a user needs to add a digital asset with a certain amount, so that transfer can be performed on the basis. A specific schematic diagram of a redemption of a digital asset is shown in fig. 8. The supervisor can obtain the data information of the digital asset entered by the user through monitoring. In the process, a user applies for the digital asset with the required quota through the digital asset APP, and a digital asset operator signs to initiate blockchain transaction, so as to issue the digital asset based on the Zether protocol with the corresponding quota for the corresponding user.
In a specific embodiment of the method for anonymous payment of digital assets provided by the present application, as shown in fig. 9, the process of redemption of digital assets by a user may further include:
step S41: acquiring a digital asset of a second preset limit which is applied for being added by a target user through the preset digital asset application program;
step S42: generating third zero knowledge proof data according to the digital assets of the second preset amount by the preset digital asset application program by using a private key held by the target user;
step S43: and verifying the third zero knowledge proof through the blockchain so as to supervise and pay out the digital asset with the second preset amount from the account of the target user after the verification is passed.
In the embodiment of the application, the user can perform the redemption operation on the digital assets in the account. The user uses the private key of the digital asset APP to generate third zero knowledge proof data based on the asset verification of the Zether protocol, wherein the third zero knowledge proof data can be used for verifying the accuracy of the redemption amount, such as the account is used for the redemption, the account amount is greater than zero and the redemption amount is greater than zero, the account balance after the redemption cannot be less than zero, and the like. A specific schematic diagram of redemption of a digital asset is shown in fig. 10. Upon digital asset redemption, the user sends a verification transaction request to the blockchain through the digital asset APP. After the third zero knowledge proof data verification of verification and verification by the blockchain is passed, the supervisor can acquire the true identity of the verification and verification user through public key information, and can be periodically synchronized to the digital asset operator so as to maintain the rights and interests of the user.
Correspondingly, the embodiment of the application also discloses a digital asset anonymous payment device, which is applied to a pre-deployed supervisor on a block chain-based transaction platform, as shown in fig. 11, and comprises the following steps:
the data acquisition module 11 is used for acquiring digital asset transaction ciphertext data sent to the blockchain by a transaction sender and a transaction receiver through a preset digital asset application program when carrying out digital asset transaction; the digital asset transaction ciphertext data is actual transaction data after the blockchain verification is passed; in the verification process, the blockchain uses zero knowledge to prove the transaction amount between the transaction sender and the transaction receiver and verify the data validity of the transaction amount obtained by the supervision party;
the data monitoring module 12 is configured to decrypt the digital asset transaction ciphertext data by using a private key held by the supervisor, so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption.
The more specific working process of each module may refer to the corresponding content disclosed in the foregoing embodiment, and will not be described herein.
It can be seen that, through the above scheme of the present embodiment, the method is applied to a pre-deployed supervisor on a blockchain-based transaction platform, and includes: acquiring digital asset transaction ciphertext data sent to a blockchain by a transaction sender and a transaction receiver through a preset digital asset application program when digital asset transaction is carried out; the digital asset transaction ciphertext data is actual transaction data after the blockchain verification is passed; in the verification process, the blockchain uses zero knowledge to prove the transaction amount between the transaction sender and the transaction receiver and verify the data validity of the transaction amount obtained by the supervision party; decrypting the digital asset transaction ciphertext data by using a private key held by the supervision party so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption. Therefore, the application is applied to the pre-deployed supervisory party on the block chain-based transaction platform, so that the supervisory party can supervise the whole transaction process. In the process of carrying out digital asset transaction, a transaction sender and a transaction receiver communicate with a blockchain through transaction ciphertext data, so that identities of both sides of the transaction and the amount of the transaction can be hidden for the public, however, after the blockchain passes zero knowledge proof verification, the encrypted content proved to the transaction receiver is identical to the encrypted content provided to a supervision party, and meanwhile, the correctness of the zero knowledge proof can be automatically verified by an intelligent contract of the blockchain, so that double verification is realized. Further, the supervision party decrypts the digital asset transaction ciphertext data by using the private key, so that the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver are obtained, therefore, through the improvement, the function of supervision is added while the anonymity of the existing scheme is not destroyed, the identity and the transaction amount of the two parties of the transaction are disclosed for the supervision party, and the characteristic of controllable anonymity of the digital asset is realized.
Further, the embodiment of the present application further discloses an electronic device, and fig. 12 is a block diagram of an electronic device 20 according to an exemplary embodiment, where the content of the figure is not to be considered as any limitation on the scope of use of the present application.
Fig. 12 is a schematic structural diagram of an electronic device 20 according to an embodiment of the present application. The electronic device 20 may specifically include: at least one processor 21, at least one memory 22, a power supply 23, a communication interface 24, an input output interface 25, and a communication bus 26. Wherein the memory 22 is configured to store a computer program that is loaded and executed by the processor 21 to implement the relevant steps in the digital asset anonymous payment method disclosed in any of the foregoing embodiments. In addition, the electronic device 20 in the present embodiment may be a computer.
In this embodiment, the power supply 23 is configured to provide an operating voltage for each hardware device on the electronic device 20; the communication interface 24 can create a data transmission channel between the electronic device 20 and an external device, and the communication protocol to be followed is any communication protocol applicable to the technical solution of the present application, which is not specifically limited herein; the input/output interface 25 is used for acquiring external input data or outputting external output data, and the specific interface type thereof may be selected according to the specific application requirement, which is not limited herein.
The memory 22 may be a carrier for storing resources, such as a read-only memory, a random access memory, a magnetic disk, or an optical disk, and the resources stored thereon may include an operating system 221, a computer program 222, data 223, and the like, and the data 223 may include various data. The storage means may be a temporary storage or a permanent storage.
The operating system 221 is used for managing and controlling various hardware devices on the electronic device 20 and computer programs 222, which may be Windows Server, netware, unix, linux, etc. The computer program 222 may further comprise a computer program that can be used to perform other specific tasks in addition to the computer program that can be used to perform the digital asset anonymous payment method performed by the electronic device 20 as disclosed in any of the previous embodiments.
Further, embodiments of the present application also disclose a computer readable storage medium, where the computer readable storage medium includes random access Memory (Random Access Memory, RAM), memory, read-Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, magnetic disk, or optical disk, or any other form of storage medium known in the art. Wherein the computer program when executed by the processor implements the aforementioned digital asset anonymous payment method. For specific steps of the method, reference may be made to the corresponding contents disclosed in the foregoing embodiments, and no further description is given here.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
The steps of a digital asset anonymous payment or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The software modules may be disposed in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description of the method, the device, the equipment and the medium for anonymous payment of digital assets provided by the invention applies specific examples to illustrate the principles and the implementation of the invention, and the above examples are only used for helping to understand the method and the core ideas of the invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.

Claims (10)

1. A digital asset anonymous payment method, applied to a pre-deployed supervisor on a blockchain-based transaction platform, comprising:
acquiring digital asset transaction ciphertext data sent to a blockchain by a transaction sender and a transaction receiver through a preset digital asset application program when digital asset transaction is carried out; the digital asset transaction ciphertext data is actual transaction data after the blockchain verification is passed; in the verification process, the blockchain uses zero knowledge to prove the transaction amount between the transaction sender and the transaction receiver and verify the data validity of the transaction amount obtained by the supervision party;
Decrypting the digital asset transaction ciphertext data by using a private key held by the supervision party so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption.
2. The digital asset anonymous payment method of claim 1, wherein the blockchain verifies, with zero knowledge proof, a transaction amount between the transaction sender and the transaction receiver and a data validity verification of the transaction amount obtained by the supervisor during the verification process, comprising:
encrypting the transfer-out amount by using the public key of the transaction sender, encrypting the transfer-in amount by using the public key of the transaction receiver, encrypting the zero amount by using the public key of the confusing user to obtain a first group of ciphertext, and determining first zero knowledge proof data based on the first group of ciphertext; the transaction amount between the confusion users is zero, and the transaction amount is used for confusing the relation between the transaction sender and the transaction receiver, and comprises a plurality of confusion senders and confusion receivers;
encrypting the transfer-out amount, the transfer-in amount and the zero amount by using the public key of the supervision party to obtain a second group of ciphertext, and determining second zero knowledge proof data based on the first group of ciphertext and the second group of ciphertext;
And verifying the first zero knowledge proof data and the second zero knowledge proof data, and when the first group of ciphertext and the second group of ciphertext have the same content and meet the preset condition at the same time, judging that the verification of the blockchain is passed.
3. The method for anonymous payment of digital assets according to claim 2, wherein before obtaining the digital asset transaction ciphertext data sent to the blockchain by the transaction sender and the transaction receiver through the preset digital asset application when conducting the digital asset transaction, further comprising:
signing the first zero-knowledge proof data and the second zero-knowledge proof data by a digital asset operator by utilizing a private key of the blockchain so as to verify the signed first zero-knowledge proof data and second zero-knowledge proof data through the blockchain.
4. The method for anonymous payment of digital assets according to claim 2, wherein decrypting the digital asset transaction ciphertext data using the private key held by the administrator to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver based on the actual transaction data obtained after decryption, comprises:
Decrypting the digital asset transaction ciphertext data by using a private key held by the supervision party, and judging the account type of the corresponding account according to the actual transaction data obtained after decryption;
if the transaction amount of the actual transaction data obtained after decryption is greater than zero, judging that the account type is the transaction receiver;
if the transaction amount of the actual transaction data obtained after decryption is smaller than zero, judging the account type as the transaction sender;
and if the transaction amount of the decrypted actual transaction data is equal to zero, judging the account type as the confusing user.
5. The method for anonymous payment of digital assets according to claim 1, wherein before obtaining the digital asset transaction ciphertext data sent to the blockchain by the transaction sender and the transaction receiver through the preset digital asset application when conducting the digital asset transaction, further comprising:
obtaining public keys and real-name authentication information respectively corresponding to the transaction sender and the transaction receiver;
and carrying out KYC verification on the public key and the real-name authentication information, registering the public key in an intelligent contract of the blockchain after the KYC verification is passed, and binding the transaction sender and the transaction receiver with the corresponding public key respectively.
6. A digital asset anonymous payment method as defined in any one of claims 1 to 5, further comprising:
acquiring a digital asset of a first preset limit which is applied to be added by a target user through the preset digital asset application program;
signing the digital asset of the first preset quota by a digital asset operator by utilizing a private key of the blockchain to initiate blockchain transaction;
and based on the blockchain transaction, supervising the digital asset which is added with the first preset amount to the account of the target user.
7. A digital asset anonymous payment method as defined in any one of claims 1 to 5, further comprising:
acquiring a digital asset of a second preset limit which is applied for being added by a target user through the preset digital asset application program;
generating third zero knowledge proof data according to the digital assets of the second preset amount by the preset digital asset application program by using a private key held by the target user;
and verifying the third zero knowledge proof through the blockchain so as to supervise and pay out the digital asset with the second preset amount from the account of the target user after the verification is passed.
8. A digital asset anonymous payment device, for use with a pre-deployed supervisor on a blockchain-based transaction platform, comprising:
the data acquisition module is used for acquiring digital asset transaction ciphertext data sent to the blockchain by a transaction sender and a transaction receiver through a preset digital asset application program when digital asset transaction is carried out; the digital asset transaction ciphertext data is actual transaction data after the blockchain verification is passed; in the verification process, the blockchain uses zero knowledge to prove the transaction amount between the transaction sender and the transaction receiver and verify the data validity of the transaction amount obtained by the supervision party;
and the data monitoring module is used for decrypting the digital asset transaction ciphertext data by utilizing the private key held by the supervision party so as to determine the true identities of the transaction sender and the transaction receiver and the transaction amount between the transaction sender and the transaction receiver according to the actual transaction data obtained after decryption.
9. An electronic device comprising a processor and a memory; wherein the memory is for storing a computer program that is loaded and executed by the processor to implement the digital asset anonymous payment method of any of claims 1 to 7.
10. A computer-readable storage medium storing a computer program; wherein the computer program when executed by a processor implements a digital asset anonymous payment method as defined in any one of claims 1 to 7.
CN202311031617.5A 2023-08-16 2023-08-16 Digital asset anonymous payment method, device, equipment and medium Pending CN117078255A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311031617.5A CN117078255A (en) 2023-08-16 2023-08-16 Digital asset anonymous payment method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311031617.5A CN117078255A (en) 2023-08-16 2023-08-16 Digital asset anonymous payment method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN117078255A true CN117078255A (en) 2023-11-17

Family

ID=88710851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311031617.5A Pending CN117078255A (en) 2023-08-16 2023-08-16 Digital asset anonymous payment method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN117078255A (en)

Similar Documents

Publication Publication Date Title
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
US9871655B2 (en) Method for deriving a verification token from a credential
US10567370B2 (en) Certificate authority
JP4639084B2 (en) Encryption method and encryption apparatus for secure authentication
US9154306B2 (en) Privacy-preserving flexible anonymous-pseudonymous access
US7353383B2 (en) System and method for single session sign-on with cryptography
Damgård et al. Balancing privacy and accountability in blockchain identity management
GB2398713A (en) Anonymous access to online services for users registered with a group membership authority
CN113162752A (en) Data processing method and device based on hybrid homomorphic encryption
CN112766962A (en) Method for receiving and sending certificate, transaction system, storage medium and electronic device
McCorry et al. Authenticated key exchange over bitcoin
CN108764912A (en) A kind of method of payment and device based on short message verification code
CN110597836A (en) Information query request response method and device based on block chain network
CN113364597A (en) Privacy information proving method and system based on block chain
CN110189184A (en) A kind of electronic invoice storage method and device
CN109413116A (en) A kind of believable cloud identity identifying method and system
Green et al. Abuse resistant law enforcement access systems
Marcedone et al. Minimizing trust in hardware wallets with two factor signatures
CN111682937B (en) Method and device for applying and distributing key of enhanced CPK
CN117078255A (en) Digital asset anonymous payment method, device, equipment and medium
CN112927026A (en) Coupon processing method and device, electronic equipment and computer storage medium
CN114301612A (en) Information processing method, communication apparatus, and encryption apparatus
CN108550036A (en) A kind of method, terminal and device for establishing security infrastructure
CN114826616B (en) Data processing method, device, electronic equipment and medium
Jia et al. A Universally Composable Non-interactive Aggregate Cash System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination