WO2022134612A1 - 隐私授权转账方法、设备和存储介质 - Google Patents

隐私授权转账方法、设备和存储介质 Download PDF

Info

Publication number
WO2022134612A1
WO2022134612A1 PCT/CN2021/111850 CN2021111850W WO2022134612A1 WO 2022134612 A1 WO2022134612 A1 WO 2022134612A1 CN 2021111850 W CN2021111850 W CN 2021111850W WO 2022134612 A1 WO2022134612 A1 WO 2022134612A1
Authority
WO
WIPO (PCT)
Prior art keywords
asset
spendable
authorization
authorized
expendable
Prior art date
Application number
PCT/CN2021/111850
Other languages
English (en)
French (fr)
Inventor
马登极
王志文
吴思进
Original Assignee
杭州复杂美科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州复杂美科技有限公司 filed Critical 杭州复杂美科技有限公司
Publication of WO2022134612A1 publication Critical patent/WO2022134612A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Definitions

  • the present application relates to the field of Internet technologies, and in particular to a method, device and storage medium for privately authorized transfer.
  • the current blockchain privacy transfer solutions based on zero-knowledge proof all directly transfer assets to the payee, that is, the payee can directly spend the asset after the transaction is successfully executed.
  • the disadvantage of the above solution is that it is difficult to meet the needs of some privacy transaction scenarios that require arbitration for the privacy transfer technical solution that requires the authorization of the arbitrator. For example, in an e-commerce scenario, after the payer pays, the payee should obtain the platform’s arbitration permission before spending the asset; or, in an auction scenario, after the winning bidder pays, the payee should deliver the subject item on the platform and arbitrate for permission. Assets can only be spent later, and so on.
  • the present invention provides a privacy authorization transfer method suitable for the client.
  • the blockchain database is configured with a spendable warehouse for depositing spendable assets and an authorization for depositing authorized spendable assets.
  • the authorized warehouse of Xi a spent warehouse for the storage of used spendable assets, the method includes:
  • first privacy authorization transfer transaction In response to the privacy authorization transfer command, generate a first privacy authorization transfer transaction that uses the first spendable asset, pays the payee for the second spendable asset requiring authorization, and changes the third spendable asset; wherein the first privacy authorization
  • the transfer transaction includes the existence proof information of the first spendable asset, the payee public key and the authorizer public key of the second spendable asset; when the first spendable asset is a spendable asset that requires authorization, the first privacy authorization transfer
  • the transaction also includes authorization proof information for the first spendable asset;
  • Double-spend verification of the first spendable asset according to the proof of existence information and the data stored in the spent warehouse
  • the first expendable asset is a expendable asset requiring authorization, performing authorization verification of the first expendable asset according to the authorization certificate information and the authorization hash of the first expendable asset in the authorization warehouse;
  • the first spendable asset is recorded in the spent warehouse
  • the second spendable asset and the third spendable asset are recorded in the spendable warehouse.
  • the blockchain node is also used to execute the first authorized transaction, verify the signature of the corresponding authorized party's private key according to the authorized party's public key, and store the authorized hash of the second spendable asset in the authorized warehouse after the verification is successful;
  • the first authorized transaction is generated by the corresponding first authorized party's terminal according to the authorized party's private key signature in response to the authorization instruction after monitoring the first privacy authorized transfer transaction.
  • the present invention provides a privacy authorization transfer method suitable for blockchain nodes.
  • the blockchain database is configured with a spendable warehouse for depositing certified spendable assets, and a spendable asset for depositing authorized spendable assets.
  • Double-spend verification of the first spendable asset according to the proof of existence information and the data stored in the spent warehouse
  • the first expendable asset is a expendable asset requiring authorization, performing authorization verification of the first expendable asset according to the authorization certificate information and the authorization hash of the first expendable asset in the authorization warehouse;
  • Execute the first authorized transaction verify the signature of the corresponding authorized party's private key according to the authorized party's public key, and store the authorized hash of the second spendable asset in the authorized warehouse after the verification is successful; wherein, the first authorized transaction is executed by the corresponding authorized party.
  • the terminal of the first authorizer After monitoring the first privacy authorization transfer transaction, the terminal of the first authorizer responds to the authorization instruction and generates the signature according to the private key of the authorizer.
  • the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform various functions according to the present invention.
  • the privacy authorization transfer method provided by the embodiment.
  • the present invention further provides a storage medium storing a computer program, and the computer program enables a computer to execute the privacy authorization transfer method provided according to each embodiment of the present invention.
  • the privacy authorization transfer method, device and storage medium configured an authorization warehouse in the blockchain database, and configure a zero-knowledge proof authorization verification mechanism in the privacy transfer transaction (guaranteeing that authorization is required and unauthorized can be verified). Spending assets cannot be used), configure the authorization mechanism for the arbitrator to authorize the spendable assets that need to be authorized in the privacy transfer transaction, and finally fully realize the privacy transfer technical solution that requires the authorization of the arbitrator;
  • the privacy authorization transfer method, device, and storage medium provided by some embodiments of the present invention are further configured with an existence verification mechanism that can verify whether an authorization-free expendable asset really does not require authorization, and realizes that no authorization-free expendable asset needs to be processed. authorization verification;
  • the privacy authorization transfer method, device and storage medium provided by some embodiments of the present invention further ensure the privacy of certificate data stored in the authorization warehouse by configuring the authorization hash of the authorization warehouse as the hash value of the corresponding certificate hash;
  • the privacy-authorized transfer method, device, and storage medium provided by some embodiments of the present invention further satisfy the need for the privacy authorization of the arbitrator by paying both the expendable assets that require authorization and the expendable assets that do not require authorization in the privacy-authorized transfer transaction.
  • FIG. 1 is a flowchart of a privacy authorization transfer method according to an embodiment of the present invention.
  • FIG. 2 is a flowchart of another privacy authorization transfer method provided by an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a device according to an embodiment of the present invention.
  • FIG. 1 is a flowchart of a privacy authorization transfer method according to an embodiment of the present invention.
  • the present invention provides a privacy authorization transfer method suitable for the user terminal.
  • the blockchain database is configured with a spendable warehouse for storing evidence of spendable assets, and for storing evidence that has been
  • S11 In response to the privacy-authorized transfer command, generate a first privacy-authorized transfer transaction that uses the first spendable asset, pays the payee the second spendable asset that requires authorization, and changes the third spendable asset; wherein the first The privacy-authorized transfer transaction includes the existence proof information of the first spendable asset, the payee public key and the authorizer public key of the second spendable asset; when the first spendable asset is a spendable asset that requires authorization, the first privacy The authorized transfer transaction also includes authorization certification information of the first spendable asset;
  • Double-spend verification of the first spendable asset according to the proof of existence information and the data stored in the spent warehouse
  • the first expendable asset is a expendable asset requiring authorization, performing authorization verification of the first expendable asset according to the authorization certificate information and the authorization hash of the first expendable asset in the authorization warehouse;
  • the first spendable asset is recorded in the spent warehouse
  • the second spendable asset and the third spendable asset are recorded in the spendable warehouse.
  • the blockchain node is also used to execute the first authorized transaction, verify the signature of the corresponding authorized party's private key according to the authorized party's public key, and store the authorized hash of the second spendable asset in the authorized warehouse after the verification is successful;
  • the first authorized transaction is generated by the corresponding first authorized party's terminal according to the authorized party's private key signature in response to the authorization instruction after monitoring the first privacy authorized transfer transaction.
  • Each spendable asset is derived from the spent spendable asset, that is, the spent asset;
  • the total amount of spendable assets used in each transaction is equal to the total amount of spendable assets (including handling fees) generated.
  • the spendable warehouse stores each spendable asset in the Merkle tree in the form of a leaf node of the Merkle tree.
  • the spendable warehouse can also be configured as Store each spendable asset in a different data structure such as an array or linked list.
  • user A sells an item priced at 100 yuan (the central bank's digital currency) anonymously, and user B purchases the item anonymously. Both parties agree to take a second-hand item trading platform C as the arbitrator as an example to illustrate the above scheme. .
  • step S11 the user terminal of user B responds to the private transfer command of 100 yuan that requires authorization to user A, and the privacy authorization transfer command with platform C as the arbiter input by user B, according to the expendable assets in user B's account to generate Privacy-authorized transfer transactions.
  • expendable assets a1 180 yuan
  • expendable assets a2 150 yuan
  • expendable assets a3 that require authorization but have not been authorized (200 yuan).
  • yuan the following is an exemplary illustration by taking User B's client using spendable assets a1/a2/a3 to generate a privacy authorization transfer transaction as an example:
  • tx1 includes:
  • the existence proof information of the spendable asset a1 including the Merkle tree root MR1 corresponding to the Merkle tree leaf node L1 corresponding to a1 in the spendable warehouse, the path information of the leaf node L1, and the path information used to verify the leaf node L1.
  • Stored multiple parameters of a1's certificate hash hash1 for example, a1's amount, a1's authorized party's public key, a1's owner's signature, a1's owner's public key, etc.);
  • the authorization proof information hash of the spendable asset a1 (hash1);
  • the recipient's public key P A and the authorizer's public key P C of the asset b1 can be spent;
  • step S13 the client of user B sends the privacy authorization transfer transaction tx1 to the blockchain network.
  • the blockchain node receives, broadcasts, packages and executes tx1 (the present invention mainly describes how to realize the authorization of private transfer transactions.
  • the present invention mainly describes how to realize the authorization of private transfer transactions.
  • For the principle of how to realize private transfer please refer to CN201810855508.8, CN201810855516.2, CN201810855507 previously submitted by the applicant. 3 and other applications, you can also refer to other privacy transfer schemes based on the UTXO model disclosed in the art. Those skilled in the art can understand that this application will not repeat this part of the content):
  • the existence verification of a1 includes:
  • the hash value hash2 is generated according to the generation method of the multiple parameters of the certificate hash and the certificate hash stored in the blockchain contract in the existence certificate information of tx1;
  • the double-spend verification of a1 includes:
  • the authorization verification of a1 includes:
  • the spendable asset b1 is a spendable asset that requires authorization and is not authorized.
  • User A's client can monitor that User B has paid the spendable asset b1 to User A, but cannot spend b1 temporarily (see below for details).
  • user A's client monitors that user B has paid b1 to user A, it can remind user A to deliver the goods;
  • Arbitrator C can conduct arbitration based on the information provided by the logistics party (for example, according to the information collected by the logistics party to determine whether the item is wrong, according to the logistics information to determine whether the item has been delivered, etc.):
  • the terminal of the arbitrator C After the item is delivered, the terminal of the arbitrator C generates an authorized transaction tx2 authorized for the spendable asset b1 according to the signature of the authorized party's private key p C corresponding to the authorized party's public key P C, and sends tx2 to the blockchain network.
  • the blockchain node receives, broadcasts, packages and executes tx2, and verifies the signature of tx2 according to the authorizer's public key P C :
  • the authorized hash hash6 of the spendable asset b1 is generated, and the hash6 is stored in the authorized warehouse.
  • the spendable asset b1 is a spendable asset that needs to be authorized and has been authorized, and user A can spend b1.
  • step S13 the client of user B also sends tx3 to the blockchain network.
  • the difference between the execution of tx3 by the blockchain node and the execution of tx1 is that the authorization verification of a2 is not required.
  • the process of generating the authorized transaction tx4 by the terminal of the arbitrator C is the same as the process of generating tx2 above, and the process of executing tx4 by the blockchain node is the same as that of executing tx2, and will not be repeated here.
  • tx5 marks a3 as a spendable asset without authorization
  • the blockchain node will think that a3 obviously does not have the authorizer's public key (a3 actually has the authorizer's public key) when executing tx5, resulting in the existence of a3. It must fail, and tx5 cannot be executed successfully.
  • user A and user B trade items as an example to illustrate the above method.
  • the above method can also be applied to user auctions/bid items (the auction organizer acts as an arbitrator), etc. different scenarios.
  • the above embodiment is exemplified by taking the existence proof information of the first spendable asset including the corresponding Merkle tree root, the path information of the leaf node, and a number of parameters used to verify the proof hash as an example.
  • the existence proof information should include the data path information of the corresponding data structure, and a number of parameters used to verify the proof hash can be determined according to the actual situation. Requirements are configured to include different parameters.
  • a number of parameters used to verify the certificate hash must include the public key of the authorizer of the first spendable asset.
  • the public key of the authorizer of the first spendable asset is empty, so that it is possible to verify whether the "expendable asset without authorization" is really free of authorization through existence verification, and to realize that there is no need to perform authorization verification on the spendable asset without authorization;
  • the spendable warehouse it is also possible to configure the spendable warehouse to record the authorization type (authorization required and without authorization) of the spendable asset, and add the first spendable asset during the execution of the first privacy-authorized transfer transaction.
  • authorization type verification in this type of embodiment, multiple parameters used to verify the certificate hash may not include the public key of the authorizer of the first spendable asset.
  • the authorization hash as the hash value of the corresponding certificate hash as an example.
  • the authorization hash can also be configured as the corresponding certificate hash according to actual needs. Or, data obtained by encrypting the corresponding certificate hash according to other encryption methods.
  • the first privacy authorization transfer transaction can also be configured as: Multiple spendable assets are used at the same time. Specifically, when multiple spendable assets are used at the same time, the verification method of each spendable asset is the same as that of the first spendable asset, which will not be repeated here.
  • the above embodiments have been exemplified by taking the first privacy authorization transfer transaction to pay only one payee as an example.
  • the first privacy authorization transfer transaction can also be configured to simultaneously send the Multiple recipients pay.
  • the above embodiment configures the authorization warehouse in the blockchain database, configures the authorization verification mechanism of zero-knowledge proof in the privacy transfer transaction (to ensure that the authorized and unauthorized spendable assets cannot be used), and configures the arbitrator to control the privacy transfer transaction.
  • the authorization mechanism that requires the authorization of the expendable assets in the authorization mechanism finally fully realizes the privacy transfer technical solution that requires the authorization of the arbitrator; and,
  • the authorization hash of the authorization warehouse is configuring the authorization hash of the authorization warehouse as the hash value of the corresponding certificate hash, the privacy of the certificate data stored in the authorization warehouse is further guaranteed.
  • the first privacy-authorized transfer transaction also pays the payee a fourth spendable asset that does not require authorization.
  • the expendable assets that require authorization and the expendable assets that do not require authorization are paid at the same time in the privacy authorization transfer transaction, further meet this business requirement.
  • FIG. 2 is a flowchart of another privacy authorization transfer method provided by an embodiment of the present invention. The method shown in FIG. 2 may be performed in conjunction with the method shown in FIG. 1 .
  • the present invention also provides a privacy authorization transfer method suitable for blockchain nodes.
  • the blockchain database is configured with a spendable warehouse for storing certificates of spendable assets, for An authorization store for storing authorization hashes of authorized spendable assets, and a spent store for storing used spendable assets, the method includes:
  • S21 Receive a first privacy-authorized transfer transaction that uses the first spendable asset, pays the payee for the second spendable asset that requires authorization, and changes the third spendable asset; wherein the first privacy-authorized transfer transaction is performed by the first Generated by the user terminal in response to the privacy authorization transfer command, including the existence proof information of the first spendable asset, the payee public key and the authorizer public key of the second spendable asset; when the first spendable asset is a spendable asset that requires authorization Assets, the first privacy authorization transfer transaction also includes authorization certification information of the first spendable asset;
  • S231 Verify the existence of the first spendable asset according to the existence proof information and the data stored in the spendable warehouse; and,
  • S233 Perform double-spending verification of the first spendable asset according to the existence proof information and the data stored in the spent warehouse;
  • S25 Execute the first authorized transaction, verify the signature of the corresponding authorized party's private key according to the authorized party's public key, and store the authorized hash of the second spendable asset into the authorized warehouse after the verification is successful.
  • the first authorized transaction is generated by the terminal of the corresponding first authorized party according to the private key signature of the authorized party in response to the authorization instruction after monitoring the first privacy authorized transfer transaction.
  • the existence proof information of the first expendable asset includes multiple parameters of the first expendable asset; the multiple parameters include the public key of the authorizer of the first expendable asset; when the first expendable asset is When there is no authorized spendable asset, the public key of the authorizer of the first spendable asset is empty;
  • the existence verification of the first expendable asset includes generating a certificate hash of the first expendable asset according to the public key of the authorizing party of the first expendable asset and several other parameters of the plurality of parameters, and verifying whether the expendable asset is stored in the expendable warehouse. There is an attestation hash.
  • the spendable warehouse stores each spendable asset in the Merkle tree in the form of a leaf node of the Merkle tree; the above-mentioned multiple parameters also include the first leaf corresponding to the first spendable asset.
  • the authorization hash of the first spendable asset is a hash value of the attestation hash of the first spendable asset.
  • the first privacy-authorized transfer transaction also pays the payee a fourth spendable asset that does not require authorization.
  • the first privacy-authorized transfer transaction uses multiple spendable assets simultaneously.
  • FIG. 3 is a schematic structural diagram of a device according to an embodiment of the present invention.
  • the present application also provides a device 300 including one or more central processing units (CPUs) 301 , which can operate according to a program stored in a read only memory (ROM) 302 or Various appropriate actions and processes are executed from the program loaded into the random access memory (RAM) 303 from the storage section 308 .
  • ROM read only memory
  • RAM random access memory
  • various programs and data necessary for the operation of the device 300 are also stored.
  • the CPU 301 , the ROM 302 , and the RAM 303 are connected to each other through a bus 304 .
  • An input/output (I/O) interface 305 is also connected to bus 304 .
  • the following components are connected to the I/O interface 305: an input section 306 including a keyboard, a mouse, etc.; an output section 307 including a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and a speaker, etc.; a storage section 308 including a hard disk, etc. ; and a communication section 309 including a network interface card such as a LAN card, a modem, and the like. The communication section 309 performs communication processing via a network such as the Internet.
  • a drive 310 is also connected to the I/O interface 305 as needed.
  • a removable medium 311, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is mounted on the drive 310 as needed so that a computer program read therefrom is installed into the storage section 308 as needed.
  • the method described in any of the above embodiments may be implemented as a computer software program.
  • embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program containing program code for performing any of the methods described above.
  • the computer program may be downloaded and installed from the network via the communication portion 309 and/or installed from the removable medium 311 .
  • the present application also provides a computer-readable storage medium.
  • the computer-readable storage medium may be a computer-readable storage medium included in the apparatus of the foregoing embodiment; A computer-readable storage medium in a device.
  • the computer-readable storage medium stores one or more programs that are used by one or more processors to perform the methods described in the present application.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code that contains one or more logical functions for implementing the specified functions executable instructions.
  • the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented by dedicated hardware-based systems that perform the specified functions or operations , or can be implemented by a combination of dedicated hardware and computer instructions.
  • the units or modules involved in the embodiments of the present application may be implemented in a software manner, and may also be implemented in a hardware manner.
  • the described units or modules may also be provided in the processor, for example, each unit may be a software program provided in a computer or a mobile smart device, or may be a separately configured hardware device. Wherein, the names of these units or modules do not constitute limitations on the units or modules themselves under certain circumstances.

Abstract

本发明提供一种隐私授权转账方法、设备和存储介质,该方法包括:响应于隐私授权转账命令,生成使用第一可花费资产、向收款方支付需要授权的第二可花费资产、找零第三可花费资产的第一隐私授权转账交易;其中,第一隐私授权转账交易包括第一可花费资产的存在证明信息、第二可花费资产的收款方公钥和授权方公钥;当第一可花费资产需要授权时,交易还包括其授权证明信息;将第一隐私授权转账交易发送至区块链网络,以供区块链节点执行:进行第一可花费资产的存在性验证、双花验证;在第一可花费资产需要授权时,进行授权验证;在各项验证都通过时,将第一可花费资产记录到已花费仓库中、将第二可花费资产和第三可花费资产记录到可花费仓库中。

Description

隐私授权转账方法、设备和存储介质 技术领域
本申请涉及互联网技术领域,具体涉及一种隐私授权转账方法、设备和存储介质。
背景技术
当前基于零知识证明的区块链隐私转账方案都是直接将资产转账给收款方的,即交易执行成功后收款方就可以直接花费该笔资产。
上述方案的缺陷在于,难以满足一些需要仲裁的隐私交易场景对于需要仲裁方授权的隐私转账技术方案的需求。例如,电子商务场景中,付款方付款后,收款方应在平台方仲裁许可后才能花费资产;或,拍卖场景中,中标方付款后,收款方应在平台方交付标的物品并仲裁许可后才能花费资产,等等。
发明内容
鉴于现有技术中的上述缺陷或不足,期望提供一种实现需要仲裁方授权的隐私转账技术方案的隐私授权转账方法、设备和存储介质。
第一方面,本发明提供一种适用于用户端的隐私授权转账方法,区块链数据库中配置有用于存证可花费资产的可花费仓库、用于存证已被授权的可花费资产的授权哈希的授权仓库、用于存证已使用的可花费资产的已花费仓库,该方法包括:
响应于隐私授权转账命令,生成使用第一可花费资产、向收款方支付需要授权的第二可花费资产、找零第三可花费资产的第一隐私授权转账交易;其中,第一隐私授权转账交易包括第一可花费资产的存在证明信息、第二可花费资产的收款方公钥和授权方公钥;当第一可花费资产是需要授权的可花费资产时,第一隐私授权转账交易还包括第一可花费资产的授权证明信息;
将第一隐私授权转账交易发送至区块链网络,以供区块链节点打包执行:
根据存在证明信息和可花费仓库所存证的数据进行第一可花费资产的存在性验证;以及,
根据存在证明信息和已花费仓库所存证的数据进行第一可花费资产的双花验证;
在第一可花费资产是需要授权的可花费资产时,根据授权证明信息和授权仓库中第一可花费资产的授权哈希进行第一可花费资产的授权验证;
在所进行的各项验证都通过时,将第一可花费资产记录到已花费仓库中、将第二可花费资产和第三可花费资产记录到可花费仓库中。
其中,区块链节点还用于执行第一授权交易,根据授权方公钥验证相应的授权方私钥的签名,并在验证成功后将第二可花费资产的授权哈希存入授权仓库;
第一授权交易由相应的第一授权方的终端在监测到第一隐私授权转账交易后,响应于授权指令,根据授权方私钥签名生成。
第二方面,本发明提供一种适用于区块链节点的隐私授权转账方法,区块链数据库中配置有用于存证可花费资产的可花费仓库、用于存证已被授权的可花费资产的授权哈希的授权仓库、用于存证已使用的可花费资产的已花费仓库,该方法包括:
接收使用第一可花费资产、向收款方支付需要授权的第二可花费资产、找零第三可花费资产的第一隐私授权转账交易;其中,第一隐私授权转账交易由第一用户端响应于隐私授权转账命令生成,包括第一可花费资产的存在证明信息、第二可花费资产的收款方公钥和授权方公钥;当第一可花费资产是需要授权的可花费资产时,第一隐私授权转账交易还包括第一可花费资产的授权证明信息;
执行第一隐私授权转账交易:
根据存在证明信息和可花费仓库所存证的数据进行第一可花费资产的存在性验证;以及,
根据存在证明信息和已花费仓库所存证的数据进行第一可花费资产的双花验证;
在第一可花费资产是需要授权的可花费资产时,根据授权证明信息和授权仓库中第一可花费资产的授权哈希进行第一可花费资产的授权验证;
在所进行的各项验证都通过时,将第一可花费资产记录到已花费仓库中、将第二可花费资产和第三可花费资产记录到可花费仓库中;
执行第一授权交易,根据授权方公钥验证相应的授权方私钥的签名,并在验证成功后将第二可花费资产的授权哈希存入授权仓库;其中,第一授权交易由相应的第一授权方的终端在监测到第一隐私授权转账交易后,响应于授权指令,根据授权方私钥签名生成。
第三方面,本发明还提供一种设备,包括一个或多个处理器和存储器,其中存储器包含可由该一个或多个处理器执行的指令以使得该一个或多个处理器执行根据本发明各实施例提供的隐私授权转账方法。
第四方面,本发明还提供一种存储有计算机程序的存储介质,该计算机程序使计算机执行根据本发明各实施例提供的隐私授权转账方法。
本发明诸多实施例提供的隐私授权转账方法、设备和存储介质通过在区块链数据库中配置授权仓库、在隐私转账交易中配置零知识证明的授权验证机制(保障需要授权且未经授权的可花费资产无法使用)、配置仲裁方对隐私转账交易中需要授权的可花费资产进行授权的授权机制,最终完整地实现了需要仲裁方授权的隐私转账技术方案;
本发明一些实施例提供的隐私授权转账方法、设备和存储介质进一步通过配置了可以验证无需授权的可花费资产是否真正无需授权的存在性验证机制,实现了不需要对无需授权的可花费资产进行授权验证;
本发明一些实施例提供的隐私授权转账方法、设备和存储介质进一步通过将授权仓库的授权哈希配置为相应存证哈希的哈希值,进一 步保障了授权仓库所存证数据的隐私性;
本发明一些实施例提供的隐私授权转账方法、设备和存储介质进一步通过在隐私授权转账交易中同时支付需要授权的可花费资产和无需授权的可花费资产,进一步满足了在需要仲裁方授权的隐私转账技术方案中支付无需授权的定金的业务需求。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1为本发明一实施例提供的一种隐私授权转账方法的流程图。
图2为本发明一实施例提供的另一种隐私授权转账方法的流程图。
图3为本发明一实施例提供的一种设备的结构示意图。
具体实施方式
下面结合附图和实施例对本申请作进一步的详细说明。可以理解的是,此处所描述的具体实施例仅仅用于解释相关发明,而非对该发明的限定。另外还需要说明的是,为了便于描述,附图中仅示出了与发明相关的部分。
需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本申请。
图1为本发明一实施例提供的一种隐私授权转账方法的流程图。
如图1所示,在本实施例中,本发明提供一种适用于用户端的隐私授权转账方法,区块链数据库中配置有用于存证可花费资产的可花费仓库、用于存证已被授权的可花费资产的授权哈希的授权仓库、用于存证已使用的可花费资产的已花费仓库,该方法包括:
S11:响应于隐私授权转账命令,生成使用第一可花费资产、向收款方支付需要授权的第二可花费资产、找零第三可花费资产的第一隐私授权转账交易;其中,第一隐私授权转账交易包括第一可花费资产 的存在证明信息、第二可花费资产的收款方公钥和授权方公钥;当第一可花费资产是需要授权的可花费资产时,第一隐私授权转账交易还包括第一可花费资产的授权证明信息;
S13:将第一隐私授权转账交易发送至区块链网络,以供区块链节点打包执行:
根据存在证明信息和可花费仓库所存证的数据进行第一可花费资产的存在性验证;以及,
根据存在证明信息和已花费仓库所存证的数据进行第一可花费资产的双花验证;
在第一可花费资产是需要授权的可花费资产时,根据授权证明信息和授权仓库中第一可花费资产的授权哈希进行第一可花费资产的授权验证;
在所进行的各项验证都通过时,将第一可花费资产记录到已花费仓库中、将第二可花费资产和第三可花费资产记录到可花费仓库中。
其中,区块链节点还用于执行第一授权交易,根据授权方公钥验证相应的授权方私钥的签名,并在验证成功后将第二可花费资产的授权哈希存入授权仓库;
第一授权交易由相应的第一授权方的终端在监测到第一隐私授权转账交易后,响应于授权指令,根据授权方私钥签名生成。
需要说明的是,本申请中的可花费资产类似于BTC的UTXO模型(Unspent Transaction Outputs,未花费的交易输出),具有以下特性:
1、每一笔可花费资产来源于使用掉的可花费资产,即,已花费资产;
2、每一笔交易所使用的可花费资产总额与所产生的可花费资产总额(包括手续费)相等。
在本实施例中,可花费仓库将各可花费资产以默克尔树的叶子节点的形式存储在默克尔树中,在更多实施例中,还可以根据实际需求将可花费仓库配置为以数组或链表等不同数据结构存储各可花费资产。
以下以用户甲匿名出售售价为100元(央行数字货币)的某物品,用户乙匿名购买该物品,双方同意以某二手物品交易平台丙为仲裁方为例,对上述方案进行示例性的阐述。
在步骤S11中,用户乙的用户端响应于用户乙输入的向用户甲进行需要授权的100元隐私转账、以平台丙为仲裁方的隐私授权转账命令,根据用户乙账户中的可花费资产生成隐私授权转账交易。
具体地,以用户乙账户中目前有需要授权且已被授权的可花费资产a1(180元)、无需授权的可花费资产a2(150元)、需要授权且尚未授权的可花费资产a3(200元)为例,以下分别以用户乙的用户端使用可花费资产a1/a2/a3生成隐私授权转账交易为例进行示例性的阐述:
当用户乙的用户端使用需要授权且已被授权的可花费资产a1(180元)生成向用户甲支付需要授权的第二可花费资产b1(100元)、向用户乙找零第三可花费资产b2(80元)的隐私授权转账交易tx1时,tx1包括:
可花费资产a1的存在证明信息,包括a1在可花费仓库中所对应的默克尔树叶子节点L1所对应的默克尔树根MR1、叶子节点L1的路径信息、用于验证叶子节点L1所存储的a1的存证哈希hash1的多项参数(例如,a1的数额、a1的授权方公钥、a1的拥有者的签名,a1的拥有者的公钥,等等);
可花费资产a1的授权证明信息hash(hash1);
可花费资产b1的收款方公钥P 和授权方公钥P
可花费资产b2的收款方公钥P
等等。
在步骤S13中,用户乙的用户端将隐私授权转账交易tx1发送到区块链网络中。
区块链节点接收、广播、打包并执行tx1(本发明主要阐述如何实现隐私转账交易的授权,关于如何实现隐私转账的原理,可以参考申请人此前提交的CN201810855508.8、CN201810855516.2、CN201810855507.3等申请,也可以参考本领域公开的其它基于UTXO 模型的隐私转账方案,本领域技术人员可以理解,本申请不再对该部分内容进行重复赘述):
在本实施例中,a1的存在性验证包括:
根据tx1的存在证明信息中的MR1和L1的路径信息查找到L1以及L1所存储的存证哈希hash1;
根据tx1的存在证明信息中用于验证存证哈希多项参数和区块链合约所存储的存证哈希的生成方式生成哈希值hash2;
验证hash2是否与hash1相同:否,则存在性验证失败;是,则存在性验证成功。
在本实施例中,a1的双花验证包括:
根据tx1中的上述多项参数和区块链合约所存储的已花费哈希的生成方式生成哈希值hash3;
查找已花费仓库中是否已存有hash3:是,则双花验证失败;否,则双花验证成功。
在本实施例中,a1的授权验证包括:
查找授权仓库中是否已存有tx1中可花费资产a1的授权证明信息hash(hash1):否,则授权验证失败;是,则授权验证成功。
当上述任一项验证失败时,tx1执行失败;
当上述三项验证全部通过时,tx1执行成功,将hash3记录到已花费仓库中,生成可花费资产b1的存证哈希hash4和可花费资产b2的存证哈希hash5、将hash4和hash5记录到可花费仓库中。
此时,可花费资产b1为需要授权且未被授权的可花费资产,用户甲的用户端可以监测到用户乙向用户甲支付了该笔可花费资产b1,但暂时无法花费b1(可参考下文关于a3的阐述);而b2为无需授权的可花费资产,用户乙可以花费b2(可参考下文关于a2的阐述)。
用户甲的用户端监测到用户乙向用户甲支付了b1之后,可以提醒用户甲发货;
用户甲发货后,将物流单号提供给仲裁方丙;
仲裁方丙可以根据物流方提供的信息进行仲裁(例如,根据物流方的所采集的信息判断物品是否有误、根据物流信息判断物品是否送 达,等等):
在物品送达后,仲裁方丙的终端根据授权方公钥P 对应的授权方私钥p 签名生成对可花费资产b1授权的授权交易tx2,将tx2发送至区块链网络。
区块链节点接收、广播、打包并执行tx2,根据授权方公钥P 验证tx2的签名:
验证成功,则生成可花费资产b1的授权哈希hash6,将hash6存入授权仓库。
此时,可花费资产b1为需要授权且已被授权的可花费资产,用户甲可以花费b1。
当用户乙的用户端使用无需授权的可花费资产a2(150元)生成向用户甲支付需要授权的第二可花费资产b3(100元)、向用户乙找零第三可花费资产b4(50元)的隐私授权转账交易tx3时,tx3与tx1的区别在于,无需包括a2的授权证明信息。
步骤S13中,用户乙的用户端同样将tx3发送到区块链网络中。
区块链节点执行tx3与执行tx1的区别在于,无需进行a2的授权验证。
仲裁方丙的终端生成授权交易tx4的过程与上述生成tx2的过程相同、区块链节点执行tx4的过程与执行tx2的过程相同,不再赘述。
当用户乙的用户端使用需要授权且尚未授权的可花费资产a3(200元)生成隐私授权转账交易tx5时:
如果tx5将a3标记为需要授权的可花费资产,则a3显然无法通过上述授权验证;
如果tx5将a3标记为无需授权的可花费资产,则区块链节点在执行tx5时会认为a3显然不存在授权方公钥(a3实际是有授权方公钥的),导致a3的存在性验证必然失败,tx5无法执行成功。
因此,任何一笔需要授权且尚未授权的可花费资产在上述方案中是无法被花费的。
上述实施例以用户甲与用户乙交易物品为例,对上述方法进行示例性的阐述,在更多实施例中,上述方法还可以应用于用户拍卖/竞拍 物品(拍卖组织方作为仲裁方)等不同场景。
上述实施例以第一可花费资产的存在证明信息包括相应的默克尔树根、叶子节点的路径信息、用于验证存证哈希的多项参数为例进行示例性的阐述,在更多实施例中,当可花费仓库配置不同的数据结构时,本领域技术人员可以理解存在证明信息应包括相应数据结构的数据路径信息,以及,用于验证存证哈希的多项参数可根据实际需求配置为包括不同的参数。
需要说明的是,在本实施例中,用于验证存证哈希的多项参数必须包括第一可花费资产的授权方公钥,当第一可花费资产为无需授权的可花费资产时,第一可花费资产的授权方公钥为空,从而可以实现通过存在性验证同时验证出“无需授权的可花费资产”是否真正无需授权,实现不需要对无需授权的可花费资产进行授权验证;
在另一些实施例中,还可以根据将可花费仓库配置为记录可花费资产的授权类型(需要授权和无需授权),并在第一隐私授权转账交易的执行过程中增设第一可花费资产的授权类型验证,则该类实施例中,用于验证存证哈希的多项参数可以不包括第一可花费资产的授权方公钥。
上述实施例以授权哈希为相应存证哈希的哈希值为例进行了示例性的阐述,在更多实施例中,还可根据实际需求将授权哈希配置为相应存证哈希,或,相应存证哈希的根据其它加密方式进行加密所得到的数据。
上述实施例以第一隐私授权转账交易只使用了一笔第一可花费资产为例进行了示例性的阐述,在更多实施例中,还可根据实际需求将第一隐私授权转账交易配置为同时使用了多笔可花费资产。具体地,同时使用多笔可花费资产时,每笔可花费资产的验证方式均与第一可花费资产相同,此处不再赘述。
上述实施例以第一隐私授权转账交易只向一位收款方付款为例进行了示例性的阐述,在更多实施例中,还可根据实际需求将第一隐私授权转账交易配置为同时向多位收款方付款。
上述实施例通过在区块链数据库中配置授权仓库、在隐私转账交 易中配置零知识证明的授权验证机制(保障需要授权且未经授权的可花费资产无法使用)、配置仲裁方对隐私转账交易中需要授权的可花费资产进行授权的授权机制,最终完整地实现了需要仲裁方授权的隐私转账技术方案;以及,
进一步通过配置了可以验证无需授权的可花费资产是否真正无需授权的存在性验证机制,实现了不需要对无需授权的可花费资产进行授权验证;以及,
进一步通过将授权仓库的授权哈希配置为相应存证哈希的哈希值,进一步保障了授权仓库所存证数据的隐私性。
在一优选实施例中,第一隐私授权转账交易同时还向收款方支付无需授权的第四可花费资产。
具体地,在某些业务场景中还存在需要先支付一部分无需授权的定金的业务需求,本实施例通过在隐私授权转账交易中同时支付需要授权的可花费资产和无需授权的可花费资产,进一步满足了该业务需求。
图2为本发明一实施例提供的另一种隐私授权转账方法的流程图。图2所示的方法可配合图1所示的方法执行。
如图2所示,在本实施例中,本发明还提供一种适用于区块链节点的隐私授权转账方法,区块链数据库中配置有用于存证可花费资产的可花费仓库、用于存证已被授权的可花费资产的授权哈希的授权仓库、用于存证已使用的可花费资产的已花费仓库,该方法包括:
S21:接收使用第一可花费资产、向收款方支付需要授权的第二可花费资产、找零第三可花费资产的第一隐私授权转账交易;其中,第一隐私授权转账交易由第一用户端响应于隐私授权转账命令生成,包括第一可花费资产的存在证明信息、第二可花费资产的收款方公钥和授权方公钥;当第一可花费资产是需要授权的可花费资产时,第一隐私授权转账交易还包括第一可花费资产的授权证明信息;
S23:执行第一隐私授权转账交易:
S231:根据存在证明信息和可花费仓库所存证的数据进行第一可花费资产的存在性验证;以及,
S233:根据存在证明信息和已花费仓库所存证的数据进行第一可花费资产的双花验证;
S235:在第一可花费资产是需要授权的可花费资产时,根据授权证明信息和授权仓库中第一可花费资产的授权哈希进行第一可花费资产的授权验证;
S237:在所进行的各项验证都通过时,将第一可花费资产记录到已花费仓库中、将第二可花费资产和第三可花费资产记录到可花费仓库中;
S25:执行第一授权交易,根据授权方公钥验证相应的授权方私钥的签名,并在验证成功后将第二可花费资产的授权哈希存入授权仓库。其中,第一授权交易由相应的第一授权方的终端在监测到第一隐私授权转账交易后,响应于授权指令,根据授权方私钥签名生成。
在一优选实施例中,第一可花费资产的存在证明信息包括第一可花费资产的多项参数;该多项参数包括第一可花费资产的授权方公钥;当第一可花费资产为无需授权的可花费资产时,第一可花费资产的授权方公钥为空;
第一可花费资产的存在性验证包括根据第一可花费资产的授权方公钥和多项参数中的若干项其它参数生成第一可花费资产的存证哈希,并验证可花费仓库中是否存有存证哈希。
在一优选实施例中,可花费仓库将各可花费资产以默克尔树的叶子节点的形式存储在默克尔树中;上述多项参数还包括第一可花费资产所对应的第一叶子节点所对应的默克尔树根以及路径信息。
在一优选实施例中,第一可花费资产的授权哈希为第一可花费资产的存证哈希的哈希值。
在一优选实施例中,第一隐私授权转账交易同时还向收款方支付无需授权的第四可花费资产。
在一优选实施例中,第一隐私授权转账交易同时使用了多笔可花费资产。
图2所示方法的隐私授权转账原理可参照图1所示的方法,此处不再赘述。
图3为本发明一实施例提供的一种设备的结构示意图。
如图3所示,作为另一方面,本申请还提供了一种设备300,包括一个或多个中央处理单元(CPU)301,其可以根据存储在只读存储器(ROM)302中的程序或者从存储部分308加载到随机访问存储器(RAM)303中的程序而执行各种适当的动作和处理。在RAM303中,还存储有设备300操作所需的各种程序和数据。CPU301、ROM302以及RAM303通过总线304彼此相连。输入/输出(I/O)接口305也连接至总线304。
以下部件连接至I/O接口305:包括键盘、鼠标等的输入部分306;包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分307;包括硬盘等的存储部分308;以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分309。通信部分309经由诸如因特网的网络执行通信处理。驱动器310也根据需要连接至I/O接口305。可拆卸介质311,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器310上,以便于从其上读出的计算机程序根据需要被安装入存储部分308。
特别地,根据本公开的实施例,上述任一实施例描述的方法可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括有形地包含在机器可读介质上的计算机程序,计算机程序包含用于执行上述任一方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分309从网络上被下载和安装,和/或从可拆卸介质311被安装。
作为又一方面,本申请还提供了一种计算机可读存储介质,该计算机可读存储介质可以是上述实施例的装置中所包含的计算机可读存储介质;也可以是单独存在,未装配入设备中的计算机可读存储介质。计算机可读存储介质存储有一个或者一个以上程序,该程序被一个或者一个以上的处理器用来执行描述于本申请提供的方法。
附图中的流程图和框图,图示了按照本发明各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码 的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这根据所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以通过执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以通过专用硬件与计算机指令的组合来实现。
描述于本申请实施例中所涉及到的单元或模块可以通过软件的方式实现,也可以通过硬件的方式来实现。所描述的单元或模块也可以设置在处理器中,例如,各单元可以是设置在计算机或移动智能设备中的软件程序,也可以是单独配置的硬件装置。其中,这些单元或模块的名称在某种情况下并不构成对该单元或模块本身的限定。
以上描述仅为本申请的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本申请中所涉及的发明范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离本申请构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本申请中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。

Claims (12)

  1. 一种隐私授权转账方法,其特征在于,区块链数据库中配置有用于存证可花费资产的可花费仓库、用于存证已被授权的可花费资产的授权哈希的授权仓库、用于存证已使用的可花费资产的已花费仓库,所述方法适用于用户端,所述方法包括:
    响应于隐私授权转账命令,生成使用第一可花费资产、向收款方支付需要授权的第二可花费资产、找零第三可花费资产的第一隐私授权转账交易;其中,所述第一隐私授权转账交易包括所述第一可花费资产的存在证明信息、所述第二可花费资产的收款方公钥和授权方公钥;当所述第一可花费资产是需要授权的可花费资产时,所述第一隐私授权转账交易还包括所述第一可花费资产的授权证明信息;
    将所述第一隐私授权转账交易发送至区块链网络,以供区块链节点打包执行:
    根据所述存在证明信息和所述可花费仓库所存证的数据进行所述第一可花费资产的存在性验证;以及,
    根据所述存在证明信息和所述已花费仓库所存证的数据进行所述第一可花费资产的双花验证;
    在所述第一可花费资产是需要授权的可花费资产时,根据所述授权证明信息和所述授权仓库中所述第一可花费资产的授权哈希进行所述第一可花费资产的授权验证;
    在所进行的各项验证都通过时,将所述第一可花费资产记录到所述已花费仓库中、将所述第二可花费资产和所述第三可花费资产记录到所述可花费仓库中;
    其中,所述区块链节点还用于执行第一授权交易,根据所述授权方公钥验证相应的授权方私钥的签名,并在验证成功后将所述第二可花费资产的授权哈希存入所述授权仓库;
    所述第一授权交易由相应的第一授权方的终端在监测到所述第一隐私授权转账交易后,响应于授权指令,根据所述授权方私钥签名生成。
  2. 根据权利要求1所述的方法,其特征在于,所述第一可花费资产的存在证明信息包括所述第一可花费资产的多项参数;
    所述多项参数包括所述第一可花费资产的授权方公钥;
    当所述第一可花费资产为无需授权的可花费资产时,所述第一可花费资产的授权方公钥为空;
    所述第一可花费资产的存在性验证包括根据所述第一可花费资产的授权方公钥和所述多项参数中的若干项其它参数生成所述第一可花费资产的存证哈希,并验证所述可花费仓库中是否存有所述存证哈希。
  3. 根据权利要求2所述的方法,其特征在于,所述可花费仓库将各可花费资产以默克尔树的叶子节点的形式存储在默克尔树中;
    所述多项参数还包括所述第一可花费资产所对应的第一叶子节点所对应的默克尔树根以及路径信息。
  4. 根据权利要求2所述的方法,其特征在于,所述第一可花费资产的授权哈希为所述第一可花费资产的存证哈希的哈希值。
  5. 根据权利要求1-4任一项所述的方法,其特征在于,所述第一隐私授权转账交易同时还向所述收款方支付无需授权的第四可花费资产。
  6. 一种隐私授权转账方法,其特征在于,区块链数据库中配置有用于存证可花费资产的可花费仓库、用于存证已被授权的可花费资产的授权哈希的授权仓库、用于存证已使用的可花费资产的已花费仓库,所述方法适用于区块链节点,所述方法包括:
    接收使用第一可花费资产、向收款方支付需要授权的第二可花费资产、找零第三可花费资产的第一隐私授权转账交易;其中,所述第一隐私授权转账交易由第一用户端响应于隐私授权转账命令生成,包括所述第一可花费资产的存在证明信息、所述第二可花费资产的收款 方公钥和授权方公钥;当所述第一可花费资产是需要授权的可花费资产时,所述第一隐私授权转账交易还包括所述第一可花费资产的授权证明信息;
    执行所述第一隐私授权转账交易:
    根据所述存在证明信息和所述可花费仓库所存证的数据进行所述第一可花费资产的存在性验证;以及,
    根据所述存在证明信息和所述已花费仓库所存证的数据进行所述第一可花费资产的双花验证;
    在所述第一可花费资产是需要授权的可花费资产时,根据所述授权证明信息和所述授权仓库中所述第一可花费资产的授权哈希进行所述第一可花费资产的授权验证;
    在所进行的各项验证都通过时,将所述第一可花费资产记录到所述已花费仓库中、将所述第二可花费资产和所述第三可花费资产记录到所述可花费仓库中;
    执行第一授权交易,根据所述授权方公钥验证相应的授权方私钥的签名,并在验证成功后将所述第二可花费资产的授权哈希存入所述授权仓库;其中,所述第一授权交易由相应的第一授权方的终端在监测到所述第一隐私授权转账交易后,响应于授权指令,根据所述授权方私钥签名生成。
  7. 根据权利要求6所述的方法,其特征在于,所述第一可花费资产的存在证明信息包括所述第一可花费资产的多项参数;
    所述多项参数包括所述第一可花费资产的授权方公钥;
    当所述第一可花费资产为无需授权的可花费资产时,所述第一可花费资产的授权方公钥为空;
    所述第一可花费资产的存在性验证包括根据所述第一可花费资产的授权方公钥和所述多项参数中的若干项其它参数生成所述第一可花费资产的存证哈希,并验证所述可花费仓库中是否存有所述存证哈希。
  8. 根据权利要求7所述的方法,其特征在于,所述可花费仓库将 各可花费资产以默克尔树的叶子节点的形式存储在默克尔树中;
    所述多项参数还包括所述第一可花费资产所对应的第一叶子节点所对应的默克尔树根以及路径信息。
  9. 根据权利要求7所述的方法,其特征在于,所述第一可花费资产的授权哈希为所述第一可花费资产的存证哈希的哈希值。
  10. 根据权利要求6-9任一项所述的方法,其特征在于,所述第一隐私授权转账交易同时还向所述收款方支付无需授权的第四可花费资产。
  11. 一种计算机设备,其特征在于,所述设备包括:
    一个或多个处理器;
    存储器,用于存储一个或多个程序,
    当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行如权利要求1-10中任一项所述的方法。
  12. 一种存储有计算机程序的存储介质,其特征在于,该程序被处理器执行时实现如权利要求1-10中任一项所述的方法。
PCT/CN2021/111850 2020-12-25 2021-08-10 隐私授权转账方法、设备和存储介质 WO2022134612A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011565387.7 2020-12-25
CN202011565387.7A CN112488725B (zh) 2020-12-25 2020-12-25 隐私授权转账方法、设备和存储介质

Publications (1)

Publication Number Publication Date
WO2022134612A1 true WO2022134612A1 (zh) 2022-06-30

Family

ID=74915611

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/111850 WO2022134612A1 (zh) 2020-12-25 2021-08-10 隐私授权转账方法、设备和存储介质

Country Status (2)

Country Link
CN (1) CN112488725B (zh)
WO (1) WO2022134612A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117196626A (zh) * 2023-11-06 2023-12-08 北京天润基业科技发展股份有限公司 转账数据的处理方法及装置、电子设备

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488725B (zh) * 2020-12-25 2022-04-05 杭州复杂美科技有限公司 隐私授权转账方法、设备和存储介质
CN113379552A (zh) * 2021-07-09 2021-09-10 杭州复杂美科技有限公司 授权交易方法、计算机设备和存储介质

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108876335A (zh) * 2018-09-07 2018-11-23 杭州复杂美科技有限公司 一种余额管理方法和系统、设备及存储介质
CN110163590A (zh) * 2019-04-29 2019-08-23 阿里巴巴集团控股有限公司 基于区块链的缴费代扣方法及装置、电子设备、存储介质
CN110189131A (zh) * 2019-06-26 2019-08-30 阿里巴巴集团控股有限公司 采用环签名的机密区块链交易的实现方法及装置
US20190318424A1 (en) * 2018-04-13 2019-10-17 Moneygram International, Inc. Systems and methods for implementing a blockchain-based money transfer
CN111008836A (zh) * 2019-11-15 2020-04-14 哈尔滨工业大学(深圳) 一种基于可监管区块链的隐私安全转账支付方法、装置、系统及存储介质
CN111563743A (zh) * 2020-07-15 2020-08-21 百度在线网络技术(北京)有限公司 一种区块链的转账处理方法、装置、设备和介质
CN111988290A (zh) * 2020-08-05 2020-11-24 上海交通大学 用户余额隐私保护和授权监管下的交易删除方法及系统
CN112488725A (zh) * 2020-12-25 2021-03-12 杭州复杂美科技有限公司 隐私授权转账方法、设备和存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10318938B2 (en) * 2016-02-22 2019-06-11 Bank Of America Corporation System for routing of process authorization and settlement to a user in process data network based on specified parameters
EP3376452A1 (en) * 2017-03-15 2018-09-19 Nokia Technologies Oy Blockchain-based electronic transfer method and network
US10540654B1 (en) * 2018-02-12 2020-01-21 Winklevoss Ip, Llc System, method and program product for generating and utilizing stable value digital assets
CN109034800A (zh) * 2018-07-31 2018-12-18 杭州复杂美科技有限公司 一种隐私交易方法、系统及设备
CN110009349B (zh) * 2019-03-26 2020-05-29 阿里巴巴集团控股有限公司 区块链中生成和验证可链接环签名的方法及装置
US11238447B2 (en) * 2019-06-26 2022-02-01 Advanced New Technologies Co., Ltd. Blockchain transactions with ring signatures
CN111027973A (zh) * 2019-12-04 2020-04-17 杭州复杂美科技有限公司 转账证明授权提交方法、设备和存储介质

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190318424A1 (en) * 2018-04-13 2019-10-17 Moneygram International, Inc. Systems and methods for implementing a blockchain-based money transfer
CN108876335A (zh) * 2018-09-07 2018-11-23 杭州复杂美科技有限公司 一种余额管理方法和系统、设备及存储介质
CN110163590A (zh) * 2019-04-29 2019-08-23 阿里巴巴集团控股有限公司 基于区块链的缴费代扣方法及装置、电子设备、存储介质
CN110189131A (zh) * 2019-06-26 2019-08-30 阿里巴巴集团控股有限公司 采用环签名的机密区块链交易的实现方法及装置
CN111008836A (zh) * 2019-11-15 2020-04-14 哈尔滨工业大学(深圳) 一种基于可监管区块链的隐私安全转账支付方法、装置、系统及存储介质
CN111563743A (zh) * 2020-07-15 2020-08-21 百度在线网络技术(北京)有限公司 一种区块链的转账处理方法、装置、设备和介质
CN111988290A (zh) * 2020-08-05 2020-11-24 上海交通大学 用户余额隐私保护和授权监管下的交易删除方法及系统
CN112488725A (zh) * 2020-12-25 2021-03-12 杭州复杂美科技有限公司 隐私授权转账方法、设备和存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117196626A (zh) * 2023-11-06 2023-12-08 北京天润基业科技发展股份有限公司 转账数据的处理方法及装置、电子设备
CN117196626B (zh) * 2023-11-06 2024-02-02 北京天润基业科技发展股份有限公司 转账数据的处理方法及装置、电子设备

Also Published As

Publication number Publication date
CN112488725B (zh) 2022-04-05
CN112488725A (zh) 2021-03-12

Similar Documents

Publication Publication Date Title
Hasan et al. Blockchain-based proof of delivery of physical assets with single and multiple transporters
CN110457875B (zh) 基于区块链的数据授权方法及装置
US10592985B2 (en) Systems and methods for a commodity contracts market using a secure distributed transaction ledger
US20240144263A1 (en) Systems and Methods to Validate Transactions For Inclusion in Electronic Blockchains
JP6364132B2 (ja) ブロックチェーン取引記録のシステムおよび方法
WO2022134612A1 (zh) 隐私授权转账方法、设备和存储介质
TWI694399B (zh) 基於區塊鏈的資產轉移方法及裝置、電子設備
US10225076B2 (en) Splitting digital promises recorded in a blockchain
EP3411824B1 (en) Systems and methods for storing and sharing transactional data using distributed computer systems
US20220309505A1 (en) Reissuing obligations to preserve privacy
Guerar et al. A fraud-resilient blockchain-based solution for invoice financing
EP4014187A1 (en) System and method of providing a blockchain-based recordation process
US11887081B2 (en) Assignment of conditional access rights to assignable tokens based on an interaction
US11488156B2 (en) Confidential asset transaction system
TW202016819A (zh) 區塊鏈交易方法及裝置、電子設備
TWI829061B (zh) 貨物運輸組織之零信任通信系統及其使用方法
US20200242573A1 (en) Cryptographic transactions supporting real world requirements
JP2023500260A (ja) 代理相互台帳認証
CN112598411B (zh) 可撤回的隐私授权转账方法、设备和存储介质
WO2020224092A1 (zh) 基于零知识证明的供应链数据管理方法及装置
US11922410B2 (en) Online decentralized identity verification for a multi-sided network
CN115983853A (zh) 基于区块链的客户侧绿电应用服务方法、系统及电子设备
WO2022183913A1 (zh) 基于区块链的物权交互
WO2019245577A1 (en) Systems and methods to validate transactions for inclusion in electronic blockchains
JP2023524492A (ja) プライバシーを保護する分散型支払い手段ネットワーク

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21908617

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21908617

Country of ref document: EP

Kind code of ref document: A1