[go: up one dir, main page]

CN108769054B - A kind of block chain transaction verification method and device based on equivalent test promise - Google Patents

A kind of block chain transaction verification method and device based on equivalent test promise Download PDF

Info

Publication number
CN108769054B
CN108769054B CN201810611953.XA CN201810611953A CN108769054B CN 108769054 B CN108769054 B CN 108769054B CN 201810611953 A CN201810611953 A CN 201810611953A CN 108769054 B CN108769054 B CN 108769054B
Authority
CN
China
Prior art keywords
transaction
value
commitment
commitment value
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810611953.XA
Other languages
Chinese (zh)
Other versions
CN108769054A (en
Inventor
周李京
吕品
王励成
朱慧君
李丽香
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201810611953.XA priority Critical patent/CN108769054B/en
Publication of CN108769054A publication Critical patent/CN108769054A/en
Application granted granted Critical
Publication of CN108769054B publication Critical patent/CN108769054B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Pure & Applied Mathematics (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明实施例提供了一种基于等值测试承诺的区块链交易验证方法及装置。所述方法包括:获取第二交易的金额、作为第二交易的合法接收者的第二目标节点对于第二交易的第一承诺值,以及作为第一交易的待验证接收合法性的第二用户节点对于第一交易的第二承诺值;获取作为第一交易的合法接收者的第一目标节点对于第一交易的第一承诺值;基于第一交易的第一承诺值、第一交易的第二承诺值、第二交易的金额及第二交易的第一承诺值,判断第二秘密值与第一秘密值是否相同,如果是,则确定第二用户节点与第一目标节点是同一用户节点,如果否,则确定第二用户节点与第一目标节点不是同一用户节点。应用本发明实施例能够实现保护用户隐私的目的。

Embodiments of the present invention provide a blockchain transaction verification method and device based on an equivalence test commitment. The method includes: acquiring the amount of the second transaction, the first commitment value of the second target node as the legitimate recipient of the second transaction for the second transaction, and the second user who is the legal recipient of the first transaction to be verified. The second commitment value of the node for the first transaction; obtain the first commitment value of the first target node as the legal recipient of the first transaction for the first transaction; based on the first commitment value of the first transaction, the first commitment value of the first transaction Two commitment values, the amount of the second transaction and the first commitment value of the second transaction, determine whether the second secret value is the same as the first secret value, if so, determine that the second user node and the first target node are the same user node , if not, it is determined that the second user node and the first target node are not the same user node. By applying the embodiments of the present invention, the purpose of protecting user privacy can be achieved.

Description

A kind of block chain transaction verification method and device based on equivalent test promise
Technical field
The present invention relates to block chain transaction fields, test more particularly to a kind of block chain transaction promised to undertake based on equivalent test Demonstrate,prove method and device.
Background technique
So-called block chain technology is also referred to as distributed account book technology, is a kind of internet database technology.Block chain In and the concept of central node is not present, all nodes are equality, all nodes can synchronous recording information, guarantee each node The information of record is consistent, and therefore, the record information in block chain has spy that is open and clear, can not distorting and facilitate retrospect Point.
In view of the above-mentioned advantage of block chain technology, in recent years, block chain technology is widely used in financial field, for example compares Special coin transaction, to protect the safety of transaction, confidentiality and can not tamper etc..Wherein, if existing in block chain transaction system Dry user node, which is equality.Specifically, the form of block chain transaction is a user node to another One user node payment amount, the user node for then receiving the amount of money continue to next user node payment amount etc., therefore, Multiple transaction can sequentially constitute a transaction chain of block chain.In the transaction of block chain, need to reception user node body The legitimacy of part is verified.
General signature algorithm is exactly a kind of block chain skill of common legitimacy for verifying reception user node identity Art is mainly comprised the processes of using what the algorithm was verified
The second user node of the reception legitimacy to be verified of the first transaction is obtained, first with disburser's body of the second transaction The second Transaction Information disclosed in part, the signature containing second user node own private key in second Transaction Information;Then, it obtains The first user node in the first transaction as disburser is taken, it is disclosed in the first Transaction Information, as legitimate receiver The public key of destination node, finally, it is verified that whether the label of the private key of the public key decryptions second user node of destination node can be utilized Name, if it is, determining that the second user node and the destination node are same user nodes, the identity of second user node is closed Method is verified, on the contrary, it is determined that the second user node and destination node are not same user node, second user node Identity legitimacy verifying do not pass through.
In above-mentioned process of exchange, when the identity legitimacy of second user node is verified, show second user section Legitimate receiver of the point as the first transaction, possesses the right to use of the amount of money of the first transaction, i.e. second user node can be used The amount of money of first transaction, the payment for the second transaction, that is to say, that at this point, the second transaction comes into force.
Due in password field, the private key and public key of user node be it is unique corresponding, public key has publicity, private Key has confidentiality, and the signature of private key is the data with private key encryption, and the signature of private key is only capable of being decrypted with own public key.Therefore should Method, which can be realized only legitimate receiver, could use the amount of money of the transaction, and the purpose that other users are not available, therefore It can guarantee the safety of transaction.
But when carrying out transaction verification using general signature algorithm, the generation of the signature of the private key of a user node Process needs the address of the public key using the corresponding destination node of the user node (legitimate receiver of transaction to be paid). In block chain, the address of the public key of same user node is fixed as transaction acceptance address, and the address is believed in transaction It is disclosed in breath, then, any user node can trace the transactions history of the address in block chain, and statistics knows the ground The corresponding remaining sum in location, the privacy that will lead to user in this way are destroyed.
Summary of the invention
The embodiment of the present invention be designed to provide a kind of block chain transaction verification method promised to undertake based on equivalent test and Device, to realize the purpose of protection privacy of user.Specific technical solution is as follows:
In a first aspect, the embodiment of the invention provides a kind of block chain transaction verification method promised to undertake based on equivalent test, The described method includes:
Second destination node of the amount of money, the legitimate receiver traded as second that obtain the second transaction is for the second transaction The first commitment value, and, as first transaction reception legitimacy to be verified second user node for it is described first hand over The second easy commitment value;Wherein, the second commitment value of first transaction is: the second user node is based upon described first Second secret value of transaction setting, precalculates;
The first object node as the legitimate receiver of first transaction is obtained for the first of first transaction Commitment value;Wherein, the first commitment value of first transaction is: the first object node is based upon first transaction setting The first secret value, precalculate;
What the second commitment value of the first commitment value, first transaction based on first transaction, described second were traded The amount of money and the first commitment value of second transaction, judge whether second secret value and first secret value are identical, such as Fruit is, it is determined that the second user node and the first object node are same user nodes, if it is not, then described in determining Second user node and the first object node are not same user nodes.
Optionally, first commitment value based on first transaction, the second commitment value, described of first transaction The amount of money of second transaction and the first commitment value of second transaction, judge that second secret value is with first secret value It is no identical, comprising:
What the second commitment value of the first commitment value, first transaction based on first transaction, described second were traded The amount of money and the first commitment value of second transaction, judge whether preset pairing operation equation is true, if it is, determining institute It is identical as first secret value to state the second secret value, if it is not, then determining second secret value and first secret value It is not identical.
Optionally, first commitment value based on first transaction, the second commitment value, described of first transaction The amount of money of second transaction and the first commitment value of second transaction, judge whether preset pairing operation equation is true, comprising:
First commitment value of the amount of money that described second is traded and second transaction, carries out character string merging, obtains the The merging character string of two transaction;
Merging character string based on second transaction obtains the 6th cryptographic Hash using preset third hash function;
Second commitment value of the first commitment value and first transaction based on first transaction, utilizes pairing operation Calculation formula e (a, c) obtains the first paired value;And based on the 6th cryptographic Hash, the basic point of preset elliptic curve and described First commitment value of the first transaction obtains the second paired value using the calculation formula e (M'G, b) of pairing operation;
Judge whether first paired value and second paired value are equal, if it is, determining the pairing operation Equation is set up, if it is not, then determining that the pairing operation equation is invalid;
Wherein, the pairing operation equation are as follows: e (a, c)=e (M'G, b),
Wherein, a and b is the first commitment value of first transaction, and the c is the second of first transaction Commitment value, the M' are the 6th cryptographic Hash, M'=H3(T), the H3For the third hash function, the T is described the The merging character string of two transaction, the G are the basic point of preset elliptic curve.
Optionally, the first object node is based upon the first secret value of first transaction setting, is calculated The process of first commitment value of one transaction, comprising:
The first object node is retrieved as the first secret value of the first transaction setting;
The first object node is based on first secret value, utilizes multiple preset hash functions and preset first The calculation formula of commitment value calculates the first commitment value of the first transaction.
Optionally, the first object node is based on first secret value, using multiple preset hash functions and in advance If the first commitment value calculation formula, calculate first transaction the first commitment value, comprising:
The first object node is based on first secret value and obtains the first Kazakhstan using preset first hash function Uncommon value, and the second cryptographic Hash is obtained using preset second hash function based on first secret value;
Base of the first object node based on first cryptographic Hash, second cryptographic Hash and preset elliptic curve Point calculates the first commitment value of the first transaction using the calculation formula of preset first commitment value;
Wherein, the calculation formula of first commitment value are as follows: a=x1G and b=x2G,
Wherein, a and b is the first commitment value of first transaction, x1=H1(r1), x2=H2(r1), it is described x1For first cryptographic Hash, the x2For second cryptographic Hash, the H1For first hash function, the H2For institute State the second hash function, the r1For first secret value, and the r1For integer, the G is the base of preset elliptic curve Point.
Optionally, the second user node is based upon the second secret value of first transaction setting, is calculated The process of second commitment value of one transaction, comprising:
The second user node is retrieved as the second secret value of the first transaction setting;
The second user node obtains the amount of money of the second transaction and the second mesh of the legitimate receiver as the second transaction Node is marked for the first commitment value of the second transaction;
The second user node is based on second secret value, the amount of money of second transaction and second transaction First commitment value calculates the first transaction using multiple preset hash functions and the calculation formula of preset second commitment value Second commitment value.
Optionally, the amount of money and described the of the second user node based on second secret value, second transaction First commitment values of two transaction calculate the using multiple preset hash functions and the calculation formula of preset second commitment value Second commitment value of one transaction, comprising:
The second user node is based on second secret value, using preset first hash function, obtains the 4th Kazakhstan Uncommon value, and the 5th cryptographic Hash is obtained using preset second hash function based on second secret value;
First commitment value of the amount of money and second transaction that the second user node is traded described second, carries out word Symbol string merges, and obtains the merging character string of the second transaction;
Merging character string of the second user node based on second transaction, using preset third hash function, Obtain third cryptographic Hash;
The second user node is based on the 4th cryptographic Hash, the 5th cryptographic Hash, the third cryptographic Hash and pre- If elliptic curve basic point, using the calculation formula of preset second commitment value, the second commitment value for calculating the first transaction is;
Wherein, the calculation formula of second commitment value are as follows:
Wherein, the c is the second commitment value of first transaction, the x'1For the 4th cryptographic Hash, the x'2For 5th cryptographic Hash, x'1=H1(r2), x'2=H2(r2), the H1For first hash function, the H2It is described second Hash function, the r2For second secret value, and the r2For integer, the M is the third cryptographic Hash, M=H3(T), The H3For the third hash function, the T is the merging character string of second transaction, and the G is preset oval bent The basic point of line.
Second aspect, the embodiment of the invention provides a kind of block chain transaction verification device promised to undertake based on equivalent test, Described device includes:
First obtains module, for obtaining the amount of money of the second transaction, the second mesh of the legitimate receiver traded as second Node is marked for the first commitment value of the second transaction, and, the second user of the reception legitimacy to be verified as the first transaction Second commitment value of the node for first transaction;Wherein, the second commitment value of first transaction is: the second user Node is based upon the second secret value of first transaction setting, precalculates;
Second obtains module, for obtaining the first object node as the legitimate receiver of first transaction for institute State the first commitment value of the first transaction;Wherein, the first commitment value of first transaction is: the first object node is based upon First secret value of first transaction setting, precalculates;
Authentication module, for the first commitment value, the second commitment value of first transaction, institute based on first transaction The amount of money of the second transaction and the first commitment value of second transaction are stated, judges second secret value and first secret value It is whether identical, if it is, determine that the second user node and the first object node are same user nodes, if It is no, it is determined that the second user node and the first object node are not same user nodes.
Optionally, the authentication module, comprising:
Judging submodule, the second commitment value of the first commitment value, first transaction for trading based on described first, The amount of money of second transaction and the first commitment value of second transaction, judge whether preset pairing operation equation is true, If it is, determine that second secret value is identical with first secret value, if it is not, then determine second secret value and First secret value is not identical.
Optionally, the judging submodule, is specifically used for:
First commitment value of the amount of money that described second is traded and second transaction, carries out character string merging, obtains the The merging character string of two transaction;
Merging character string based on second transaction obtains the 6th cryptographic Hash using preset third hash function;
Second commitment value of the first commitment value and first transaction based on first transaction, utilizes pairing operation Calculation formula e (a, c) obtains the first paired value;And based on the 6th cryptographic Hash, the basic point of preset elliptic curve and described First commitment value of the first transaction obtains the second paired value using the calculation formula e (M'G, b) of pairing operation;
Judge whether first paired value and second paired value are equal, if it is, determining the pairing operation Equation is set up, if it is not, then determining that the pairing operation equation is invalid;
Wherein, the pairing operation equation are as follows: e (a, c)=e (M'G, b),
Wherein, a and b is the first commitment value of first transaction, and the c is the second of first transaction Commitment value, the M' are the 6th cryptographic Hash, M'=H3(T), the H3For the third hash function, the T is described the The merging character string of two transaction, the G are the basic point of preset elliptic curve.
Optionally, described device further include: the first commitment value determining module is based upon institute for the first object node The first secret value for stating the first transaction setting, is calculated the first commitment value of the first transaction, and first commitment value determines mould Block, comprising:
First acquisition submodule is retrieved as the first secret value of the first transaction setting for the first object node;
First computational submodule is based on first secret value for the first object node, using multiple preset The calculation formula of hash function and preset first commitment value calculates the first commitment value of the first transaction.
Optionally, first computational submodule, is specifically used for:
The first object node is based on first secret value and obtains the first Kazakhstan using preset first hash function Uncommon value, and the second cryptographic Hash is obtained using preset second hash function based on first secret value;
Base of the first object node based on first cryptographic Hash, second cryptographic Hash and preset elliptic curve Point calculates the first commitment value of the first transaction using the calculation formula of preset first commitment value;
Wherein, the calculation formula of first commitment value are as follows: a=x1G and b=x2G,
Wherein, a and b is the first commitment value of first transaction, x1=H1(r1), x2=H2(r1), it is described x1For first cryptographic Hash, the x2For second cryptographic Hash, the H1For first hash function, the H2For institute State the second hash function, the r1For first secret value, and the r1For integer, the G is the base of preset elliptic curve Point.
Optionally, described device further include: the second commitment value determining module is based upon institute for the second user node The second secret value for stating the first transaction setting, is calculated the second commitment value of the first transaction, and second commitment value determines mould Block, comprising:
Second acquisition submodule is retrieved as the second secret value of the first transaction setting for the second user node;
Third acquisition submodule obtains the amount of money of the second transaction for the second user node and as the second transaction First commitment value of second destination node of legitimate receiver for the second transaction;
Second computational submodule is traded for the second user node based on second secret value, described second The amount of money and the first commitment value of second transaction, utilize the calculating of multiple preset hash functions and preset second commitment value Formula calculates the second commitment value of the first transaction.
Optionally, second computational submodule, is specifically used for:
The second user node is based on second secret value, using preset first hash function, obtains the 4th Kazakhstan Uncommon value, and the 5th cryptographic Hash is obtained using preset second hash function based on second secret value;
First commitment value of the amount of money and second transaction that the second user node is traded described second, carries out word Symbol string merges, and obtains the merging character string of the second transaction;
Merging character string of the second user node based on second transaction, using preset third hash function, Obtain third cryptographic Hash;
The second user node is based on the 4th cryptographic Hash, the 5th cryptographic Hash, the third cryptographic Hash and pre- If elliptic curve basic point, using the calculation formula of preset second commitment value, the second commitment value for calculating the first transaction is;
Wherein, the calculation formula of second commitment value are as follows:
Wherein, the c is the second commitment value of first transaction, the x'1For the 4th cryptographic Hash, the x'2For 5th cryptographic Hash, x'1=H1(r2), x'2=H2(r2), the H1For first hash function, the H2It is described second Hash function, the r2For second secret value, and the r2For integer, the M is the third cryptographic Hash, M=H3(T), The H3For the third hash function, the T is the merging character string of second transaction, and the G is preset oval bent The basic point of line.
The third aspect, the embodiment of the invention provides a kind of electronic equipment, including processor and memory, wherein
The memory, for storing computer program;
The processor when for executing the program stored on the memory, realizes that the embodiment of the present invention is provided The block chain transaction verification method promised to undertake based on equivalent test the step of.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage Dielectric memory contains computer program, and base provided by the embodiment of the present invention is realized when the computer program is executed by processor In the step of equivalence tests the block chain transaction verification method promised to undertake.
In scheme provided by the embodiment of the present invention, first secret value is only the legitimate receiver of first transaction First object node known to, second secret value be only it is described first transaction reception legitimacy to be verified second user Known to node, therefore, if second secret value is identical as first secret value, the second user node and described the One destination node must be same user node, if second secret value and first secret value be not identical, described second User node and the first object node must not be same user nodes.Therefore, scheme provided by the embodiment of the present invention, energy Enough verifyings receive the legitimacy of user node identity, guarantee the safety of transaction.And scheme provided by the embodiment of the present invention In, the first commitment value of first transaction is to be based upon the first secret value of first transaction setting to be calculated, institute The second commitment value for stating the first transaction is to be based upon the second secret value of first transaction setting to be calculated, secret value with Transaction is corresponding, that is to say, that for a user node in different transaction, used secret value is different, therefore, block chain In any user node can not based on it is described first transaction the first commitment value or it is described first transaction the second commitment value, chase after It traces back the transactions history of the user, counts the remaining sum of the user, therefore, can be realized protection privacy of user using the embodiment of the present invention Purpose.
Certainly, it implements any of the products of the present invention or method must be not necessarily required to reach all the above excellent simultaneously Point.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the block chain process of exchange schematic diagram of the embodiment of the present invention promised to undertake based on equivalent test;
Fig. 2 is a kind of stream for the block chain transaction verification method promised to undertake based on equivalent test provided by the embodiment of the present invention Journey schematic diagram;
Fig. 3 is a kind of knot for the block chain transaction verification device promised to undertake based on equivalent test provided by the embodiment of the present invention Structure schematic diagram;
Fig. 4 is the structural schematic diagram of a kind of electronic equipment provided by the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
For the ease of the understanding of scheme, here, first handing over the block chain of the embodiment of the present invention promised to undertake based on equivalent test Easy process is explained, and is the block chain process of exchange schematic diagram promised to undertake based on equivalent test referring to Fig. 1, Fig. 1.
Assuming that at least there are four user nodes A, B, C and D, A is the disburser of the first transaction, B in block platform chain For the recipient of the first transaction, while B is also the disburser of the second transaction, and C is the recipient of the second transaction, while C is also the The disburser of three transaction, D are the recipient of third transaction.Process of exchange are as follows:
Firstly, A discloses the first Transaction Information, first Transaction Information includes: a upper transaction of the A as the first transaction Legitimate receiver, for first transaction it is upper one transaction the second commitment value, first transaction the amount of money and B as first hand over Easy legitimate receiver, for the first commitment value of the first transaction.Wherein, the amount of money of first transaction is the gold that A is paid to B Volume, the identity that the first commitment value of first transaction is used for the legitimate receiver in subsequent authentication B as the first transaction are legal Property.First commitment value of first transaction is that B is sent to A in advance.
Secondly, B discloses the second Transaction Information, second Transaction Information includes: legitimate receipt of the B as the first transaction Person, for the legitimate receiver as the second transaction of the amount of money and C of the second commitment value of the first transaction, the second transaction, for the First commitment value of two transaction.Wherein, the amount of money of second transaction is the amount of money that B pay to C, described first trade second Commitment value is used for the identity legitimacy in subsequent authentication B as the legitimate receiver of the second transaction.The first of second transaction Commitment value is used for the identity legitimacy in subsequent authentication C as the legitimate receiver of the second transaction.The first of second transaction Commitment value is that C is sent to B in advance.
Then, using the partial information in the first Transaction Information and the second Transaction Information disclosed above, B is verified as the The identity legitimacy of the legitimate receiver of one transaction, after being verified, B can use the amount of money of the first transaction, complete the The payment of two transaction, that is to say, that after the legitimate verification of the identity of B passes through, the first transaction is completed, and the second transaction comes into force.It can be with Understand, subsequent, C can also initiate to trade with the third of D, then need to verify legitimate receiver of the C as the second transaction Identity legitimacy after, the second transaction could be completed, and third, which is traded, can just come into force, etc., it can thus be seen that in block chain Multiple transaction successively constitute a transaction chain.
For each process of exchange in block chain, the verification method to the legitimacy for receiving user node identity is identical , specific verification process is detailed in hereinafter.
In order to protect privacy of user, the embodiment of the invention provides a kind of block chain transaction promised to undertake based on equivalent test to test Demonstrate,prove method, apparatus, electronic equipment and storage medium.
It should be noted that a kind of block chain transaction verification promised to undertake based on equivalent test provided by the embodiment of the present invention The executing subject of method can run on for a kind of block chain transaction verification device promised to undertake based on equivalent test, the device In electronic equipment.Wherein, which can be any one user node in block chain etc..
In the following, being provided for the embodiments of the invention a kind of block chain transaction verification side promised to undertake based on equivalent test first Method is introduced.
As shown in Fig. 2, a kind of block chain transaction verification side promised to undertake based on equivalent test provided by the embodiment of the present invention Method may include steps of:
S201, obtain the second transaction the amount of money, as the second transaction legitimate receiver the second destination node for the First commitment value of two transaction, and, the second user node of the reception legitimacy to be verified as the first transaction is for described Second commitment value of the first transaction.
In embodiments of the present invention, the second user node of the reception legitimacy to be verified of available first transaction discloses The second Transaction Information, then obtain from second Transaction Information: the amount of money of the second transaction connects as the second the legal of transaction The first commitment value that the second destination node of receipts person is traded for second, and, the reception to be verified as the first transaction is legal Property second user node for it is described first transaction the second commitment value.It should be noted that in second Transaction Information The format of each element be character string.
Wherein, the amount of money of second transaction are as follows: the second user node, as the disburser of the second transaction, payment To the amount of money of second destination node.First commitment value of second transaction, in subsequent, verifying second target Identity legitimacy of the node as the legitimate receiver of the second transaction.
It is understood that institute has been received before disclosing second Transaction Information in the second user node The first commitment value for stating second transaction of the second destination node transmission, specifically, the second user node can receive The second transaction request sent to second destination node, wherein contain second transaction in second transaction request The first commitment value, certainly, in second transaction request can also containing it is described second transaction the amount of money.
In embodiments of the present invention, the second commitment value of first transaction is: the second user node is based upon institute The second secret value for stating the first transaction setting, precalculates.Second secret value can be with second user node The identity of user is related, can also be unrelated, this is all reasonable.Second commitment value of first transaction is used to test subsequent Demonstrate,prove identity legitimacy of the second user node as the legitimate receiver of first transaction.It should be noted that except the second use Except the node of family, any node in block chain all can not pass through meter using the second commitment value of disclosed first transaction Second secret value is known in calculation.
The second user node is based upon the second secret value of first transaction setting, and the first transaction is calculated The process of second commitment value will be described in detail below.
S202 obtains the first object node as the legitimate receiver of first transaction for first transaction First commitment value.
In embodiments of the present invention, the first Transaction Information disclosed in the node of the disburser of available first transaction, Again from first Transaction Information, the first object node as the legitimate receiver of first transaction is obtained for described First commitment value of the first transaction.Certainly, the amount of money etc. in first Transaction Information also containing the first transaction, described first hands over The easy amount of money are as follows: the node of the disburser of first transaction pays the amount of money of the first object node.It needs to illustrate It is that the format of each element in first Transaction Information is character string.
It is understood that the node of the disburser of first transaction, before disclosing first Transaction Information, Received the first transaction request sent to the first object node contains first transaction in first transaction request The first commitment value, certainly, in first transaction request can also contain first transaction the amount of money.
In embodiments of the present invention, the first commitment value of first transaction is: the first object node is based upon institute The first secret value for stating the first transaction setting, precalculates.First secret value can be with first object node The identity of user is related, can also be unrelated, this is all reasonable.First commitment value of first transaction is used to test subsequent Demonstrate,prove identity legitimacy of the second user node as the legitimate receiver of first transaction.It should be noted that except described the Except one destination node, any user node in block chain can not all be promised to undertake using the first of disclosed first transaction Value knows first secret value by calculating.
The first object node is based upon the first secret value of first transaction setting, and the first transaction is calculated The process of first commitment value will be described in detail below.
S203, the second commitment value of the first commitment value, first transaction based on first transaction, described second are handed over The easy amount of money and the first commitment value of second transaction, judge second secret value and first secret value whether phase Together, if it is, determining that the second user node and the first object node are same user nodes, if it is not, then really The fixed second user node and the first object node are not same user nodes.
In embodiments of the present invention, a kind of theory that equivalent test is promised to undertake is proposed, specifically: due to first secret value Known to the only described first object node, second secret value is only known to the second user node, therefore, described in judgement Whether the second commitment value of the first transaction and the secret value in the first commitment value of first transaction are identical, if it is, root According to the probability theory in password field, determine that the second user node and the first object node are same user nodes, such as Fruit is no, it is determined that the second user node and the first object node are not same user nodes.To complete described the Authentication of two user nodes as the legitimate receiver of the first transaction.
In embodiments of the present invention, it can judge that second secret value is with first secret value using a variety of methods It is no identical, it is subsequent to combine the first commitment value of the first transaction and the first transaction in order to which solution layout is clear and scheme understands The specific implementation of this step is described in detail in the calculating process of second commitment value.
It should be noted that verify the second user node and the first object node be same user node it Afterwards, first transaction is completed, and the amount of money that the second user node is able to use first transaction realizes the second transaction, That is the second transaction that the second user node is initiated comes into force.It is, of course, understood that described second hands over subsequent Easy completion is also required to the legitimacy, etc. of the reception user node identity of the second transaction of verifying.
In scheme provided by the embodiment of the present invention, first secret value is only the legitimate receiver of first transaction First object node known to, second secret value be only it is described first transaction reception legitimacy to be verified second user Known to node, therefore, if second secret value is identical as first secret value, the second user node and described the One destination node must be same user node, if second secret value and first secret value be not identical, described second User node and the first object node must not be same user nodes.Therefore, scheme provided by the embodiment of the present invention, energy Enough verifyings receive the legitimacy of user node identity, guarantee the safety of transaction.And scheme provided by the embodiment of the present invention In, the first commitment value of first transaction is to be based upon the first secret value of first transaction setting to be calculated, institute The second commitment value for stating the first transaction is to be based upon the second secret value of first transaction setting to be calculated, secret value with Transaction is corresponding, that is to say, that for a user node in different transaction, used secret value is different, therefore, block chain In any user node can not based on it is described first transaction the first commitment value or it is described first transaction the second commitment value, chase after It traces back the transactions history of the user, counts the remaining sum of the user, therefore, can be realized protection privacy of user using the embodiment of the present invention Purpose.
Below with reference to the calculating process of the first commitment value and the second commitment value of the first transaction of the first transaction, retouch in detail State the deterministic process of first secret value Yu second secret value.
1, the first object node is based upon the first secret value of first transaction setting, and the first transaction is calculated The first commitment value process, comprising the following steps:
A1, the first object node are retrieved as the first secret value of the first transaction setting;
In embodiments of the present invention, first secret value can be set by the user of the first object node, can also By the first object node sets, wherein first secret value can be a random number, and the random number is whole Number.
It should be noted that first secret value is only known to the first object node.
B1, the first object node are based on first secret value, utilize multiple preset hash functions and preset The calculation formula of first commitment value calculates the first commitment value of the first transaction.
In embodiments of the present invention, the irreversible characteristic of hash function preimage is utilized, therefore, utilizes multiple preset Kazakhstan The calculation formula of uncommon function and preset first commitment value calculates the process of the first commitment value of the first transaction, is complicated and not Reversible, that is to say, that any user node can not be obtained from the first commitment value of first transaction by calculating in block chain Know first secret value.
Specifically, B1 the following steps are included:
B11, the first object node is based on first secret value, using preset first hash function, obtains the One cryptographic Hash, and the second cryptographic Hash is obtained using preset second hash function based on first secret value;
B12, the first object node are based on first cryptographic Hash, second cryptographic Hash and preset elliptic curve Basic point, utilize the calculation formula of preset first commitment value, calculate first transaction the first commitment value;
Wherein, the calculation formula of first commitment value are as follows: a=x1G and b=x2G,
Wherein, a and b is the first commitment value of first transaction, x1=H1(r1), x2=H2(r1), it is described x1For first cryptographic Hash, the x2For second cryptographic Hash, the H1For first hash function, the H2For institute State the second hash function, the r1For first secret value, and the r1For integer, the G is the base of preset elliptic curve Point.
2, the second user node is based upon the second secret value of first transaction setting, and the first transaction is calculated The second commitment value process, comprising the following steps:
A2, the second user node are retrieved as the second secret value of the first transaction setting;
In embodiments of the present invention, second secret value can be set by the user of the second user node, can also By the second user node sets, wherein second secret value can be a random number, and the random number is whole Number.
It should be noted that second secret value is only known to the second user node.
B2, the second user node obtain the second of the amount of money that second trades and the legitimate receiver as the second transaction First commitment value of the destination node for the second transaction;
Specifically, the second target section of the available legitimate receiver as the second transaction of the second user node Point is sent to the second transaction request of the second user node, contains in second transaction request: the amount of money of the second transaction And second destination node for second transaction the first commitment value.
C2, the second user node are handed over based on second secret value, the amount of money of second transaction and described second The first easy commitment value calculates first and hands over using multiple preset hash functions and the calculation formula of preset second commitment value The second easy commitment value.
In embodiments of the present invention, the irreversible characteristic of hash function preimage is utilized, therefore, utilizes multiple preset Kazakhstan The calculation formula of uncommon function and preset second commitment value calculates the process of the second commitment value of the first transaction, is complicated and not Reversible, that is to say, that any user node can not be obtained from the second commitment value of first transaction by calculating in block chain Know second secret value.
Specifically, C2 the following steps are included:
C21, the second user node is based on second secret value, using preset first hash function, obtains the Four cryptographic Hash, and the 5th cryptographic Hash is obtained using preset second hash function based on second secret value;
C22, the first commitment value of the amount of money and second transaction that the second user node is traded described second, into Line character string merges, and obtains the merging character string of the second transaction;
It should be noted that character string merges into two connected splicings of character string ending.
C23, merging character string of the second user node based on second transaction, utilizes preset third Hash letter Number, obtains third cryptographic Hash;
C24, the second user node are based on the 4th cryptographic Hash, the 5th cryptographic Hash, the third cryptographic Hash And the basic point of preset elliptic curve, using the calculation formula of preset second commitment value, calculate the first transaction second is promised to undertake Value is;
Wherein, the calculation formula of second commitment value are as follows:
Wherein, the c is the second commitment value of first transaction, the x'1For the 4th cryptographic Hash, the x'2For 5th cryptographic Hash, x'1=H1(r2), x'2=H2(r2), the H1For first hash function, the H2It is described second Hash function, the r2For second secret value, and the r2For integer, the M is the third cryptographic Hash, M=H3(T), The H3For the third hash function, the T is the merging character string of second transaction, and the G is preset oval bent The basic point of line.
The first secret value that the first object node is based upon first transaction setting is described above, is calculated First commitment value of the first transaction and the second user node are based upon the second secret value of first transaction setting, The process of the second commitment value of the first transaction is calculated, is described in detail below and judges second secret value and described first secret It is close value whether identical detailed process.
In embodiments of the present invention, propose a kind of judge whether second secret value and first secret value are identical Specific implementation mainly comprises the processes of the first commitment value, the second promise of first transaction based on first transaction Value, it is described second transaction the amount of money and it is described second transaction the first commitment value, judge preset pairing operation equation whether at It is vertical, if it is, determining that second secret value is identical as first secret value, if it is not, then determining that described second is secret It is worth not identical as first secret value
Specifically, above-mentioned specific implementation the following steps are included:
The first step, the first commitment value of the amount of money that described second is traded and second transaction, carries out character string merging, Obtain the merging character string of the second transaction;
Second step obtains the 6th Kazakhstan using preset third hash function based on the merging character string of second transaction Uncommon value;
It should be noted that the 6th cryptographic Hash in the embodiment of the present invention is identical as the third cryptographic Hash, it is different Title be deterministic process in order to distinguish secret value and the first transaction the second commitment value calculating process.
Third step, the second commitment value of the first commitment value and first transaction based on first transaction, using matching To the calculation formula e (a, c) of operation, the first paired value is obtained;And the base based on the 6th cryptographic Hash, preset elliptic curve Point and the first commitment value of first transaction obtain the second paired value using the calculation formula e (M'G, b) of pairing operation;
4th step judges whether first paired value and second paired value are equal, if it is, matching described in determining Operation equation is set up, if it is not, then determining that the pairing operation equation is invalid;
5th step, if the pairing operation equation is set up, it is determined that second secret value and first secret value It is identical, if the pairing operation equation is invalid, it is determined that second secret value and first secret value be not identical.
Wherein, the pairing operation equation are as follows: e (a, c)=e (M'G, b),
Wherein, a and b is the first commitment value of first transaction, and the c is the second of first transaction Commitment value, the M' are the 6th cryptographic Hash, M'=H3(T), the H3For the third hash function, the T is described the The merging character string of two transaction, the G are the basic point of preset elliptic curve.
Whether in this kind of specific implementation, it is true to verify the pairing operation equation, if it is, determination described the Two secret values are identical as first secret value, if it is not, then determining second secret value and first secret value not phase Together.This kind of implementation can quickly, easily obtain judging result, improve verification efficiency.
It should be noted that any user node in block chain can be carried out above-mentioned verification process.
The theory that the equivalent test of the embodiment of the present invention described in detail below is promised to undertake, utilizes preset pairing in order to understand Operation equation e (a, c)=e (M'G, b) can judge second secret value and the whether identical original of first secret value Reason.
Firstly, simply introducing some existing formula and noun that are related to:
1) operation is matched
Matching operation e () is a kind of existing calculation method, here, the calculating process of the pairing operation is no longer described in detail, A kind of particular kind of relationship that the pairing operation is met, the relationship are only shown are as follows: e (AG, BG)=e (ABG, G)=e (G, ABG).Wherein, A and B can be understood as the coefficient of the basic point G of elliptic curve.
2) basic point of elliptic curve
The shape of elliptic curve is not elliptical, for no other reason than that the descriptive equation of elliptic curve, is similar to and calculates one The equation of oval perimeters, therefore the elliptic curve that hence obtains one's name.
One elliptic curve is the set for meeting all the points of Weir this special Lars equation on projective plane.
This special Lars equation of the Weir are as follows:
Y2Z+a1XYZ+a3YZ2=X3+a2X2Z+a4XZ2+a6Z3
The basic point of elliptic curve is the generation member of the Big prime factor subgroup of elliptic curve module.For oval bent The concept of the basic point of line does not elaborate, and the basic point for obtaining an elliptic curve can use existing a variety of methods, This is not detailed.
Can simply it understand are as follows: the basic point of elliptic curve is a two-dimensional coordinate, is indicated with symbol G, the fortune that G is supported It calculates and there was only multiple operation and plus and minus calculation, such as 3G=G+G+G, 2G+4G=6G, 12G-4G=8G etc.;For multiplying and remove Method operation is not supported, such as 2G*3G, 2G/3G etc..
In the following, the judgement principle of concrete analysis pairing operation equation e (a, c)=e (M'G, b).
According to a=x1G, b=x2G,x1=H1(r1), x2=H2(r1), x '1=H1(r2), x'2=H2 (r2), M=H3(T), M'=H3(T)。
It obtains on the left of pairing operation equation are as follows:Obtain pairing operation etc. On the right side of formula are as follows: e (M'G, b)=e (H3(T)G,H2(r1)G)。
According to the relationship that pairing operation meets, obtain:
And
E (M'G, b)=e (H3(T)G,H2(r1) G)=e (H3(T)H2(r1)G,G)。
So, the problem of whether true now for verifying e (a, c)=e (M'G, b), verifying has been reformed intoWhether it is true the problem of.
VerifyIt is whether true.
Further, it verifiesIt is whether true.
For the first commitment value a=x of the first transaction1G=H1(r1) G, b=x2G=H2(r1), although a and b are open , but since G does not support division arithmetic, so other users node can not be obtained based on b/a
Based on probability theory, if r2≠r1Difference, then can be with almost absolutely probability makes:
So, it is believed that: when a user node is not knowing r1In the case where, r can not be forged2≠r1, so thatIn other words, only know r1User node, just can know thatOther users node can not Know
Therefore, it has reason to be concluded that completely
IfThen r2=r1;IfThen r2≠r1
That is: if pairing operation equation is set up, second secret value is identical as first secret value, if pairing operation Equation is invalid, then second secret value and first secret value be not identical.
Therefore, in embodiments of the present invention, the theory that equivalent test is promised to undertake is introduced, preset pairing operation equation e is utilized (a, c)=e (M'G, b), judge first secret value it is whether identical as second secret value be effective.
Therefore, theory that the equivalent test that the embodiment of the present invention is proposed is promised to undertake, for verifying the recipient of a transaction Identity legitimacy is effective.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of block chains promised to undertake based on equivalent test Transaction verification device, as shown in figure 3, the device includes:
First obtains module 301, and second of the amount of money, the legitimate receiver traded as second for obtaining the second transaction The first commitment value that destination node is traded for second, and, second of the reception legitimacy to be verified as the first transaction is used Second commitment value of the family node for first transaction;Wherein, the second commitment value of first transaction is: described second uses Family node is based upon the second secret value of first transaction setting, precalculates;
Second obtains module 302, for obtaining the first object node pair of the legitimate receiver as first transaction In the first commitment value of first transaction;Wherein, the first commitment value of first transaction is: the first object node base In the first secret value for first transaction setting, precalculate;
Authentication module 303, second for the first commitment value, first transaction based on first transaction promises to undertake First commitment value of value, the amount of money of second transaction and second transaction, judges second secret value and described first Whether secret value is identical, if it is, determine that the second user node and the first object node are same user nodes, If it is not, then determining that the second user node and the first object node are not same user nodes.
Optionally, in embodiments of the present invention, the authentication module 303, comprising:
Judging submodule, the second commitment value of the first commitment value, first transaction for trading based on described first, The amount of money of second transaction and the first commitment value of second transaction, judge whether preset pairing operation equation is true, If it is, determine that second secret value is identical with first secret value, if it is not, then determine second secret value and First secret value is not identical.
Optionally, in embodiments of the present invention, the judging submodule, is specifically used for:
First commitment value of the amount of money that described second is traded and second transaction, carries out character string merging, obtains the The merging character string of two transaction;
Merging character string based on second transaction obtains the 6th cryptographic Hash using preset third hash function;
Second commitment value of the first commitment value and first transaction based on first transaction, utilizes pairing operation Calculation formula e (a, c) obtains the first paired value;And based on the 6th cryptographic Hash, the basic point of preset elliptic curve and described First commitment value of the first transaction obtains the second paired value using the calculation formula e (M'G, b) of pairing operation;
Judge whether first paired value and second paired value are equal, if it is, determining the pairing operation Equation is set up, if it is not, then determining that the pairing operation equation is invalid;
Wherein, the pairing operation equation are as follows: e (a, c)=e (M'G, b),
Wherein, a and b is the first commitment value of first transaction, and the c is the second of first transaction Commitment value, the M' are the 6th cryptographic Hash, M'=H3(T), the H3For the third hash function, the T is described the The merging character string of two transaction, the G are the basic point of preset elliptic curve.
Optionally, in embodiments of the present invention, described device further include: the first commitment value determining module, for described the One destination node is based upon the first secret value of first transaction setting, and the first commitment value of the first transaction, institute is calculated State the first commitment value determining module, comprising:
First acquisition submodule is retrieved as the first secret value of the first transaction setting for the first object node;
First computational submodule is based on first secret value for the first object node, using multiple preset The calculation formula of hash function and preset first commitment value calculates the first commitment value of the first transaction.
Optionally, in embodiments of the present invention, first computational submodule, is specifically used for:
The first object node is based on first secret value and obtains the first Kazakhstan using preset first hash function Uncommon value, and the second cryptographic Hash is obtained using preset second hash function based on first secret value;
Base of the first object node based on first cryptographic Hash, second cryptographic Hash and preset elliptic curve Point calculates the first commitment value of the first transaction using the calculation formula of preset first commitment value;
Wherein, the calculation formula of first commitment value are as follows: a=x1G and b=x2G,
Wherein, a and b is the first commitment value of first transaction, x1=H1(r1), x2=H2(r1), it is described x1For first cryptographic Hash, the x2For second cryptographic Hash, the H1For first hash function, the H2For institute State the second hash function, the r1For first secret value, and the r1For integer, the G is the base of preset elliptic curve Point.
Optionally, in embodiments of the present invention, described device further include: the second commitment value determining module, for described the Two user nodes are based upon the second secret value of first transaction setting, and the second commitment value of the first transaction, institute is calculated State the second commitment value determining module, comprising:
Second acquisition submodule is retrieved as the second secret value of the first transaction setting for the second user node;
Third acquisition submodule obtains the amount of money of the second transaction for the second user node and as the second transaction First commitment value of second destination node of legitimate receiver for the second transaction;
Second computational submodule is traded for the second user node based on second secret value, described second The amount of money and the first commitment value of second transaction, utilize the calculating of multiple preset hash functions and preset second commitment value Formula calculates the second commitment value of the first transaction.
Optionally, in embodiments of the present invention, second computational submodule, is specifically used for:
The second user node is based on second secret value, using preset first hash function, obtains the 4th Kazakhstan Uncommon value, and the 5th cryptographic Hash is obtained using preset second hash function based on second secret value;
First commitment value of the amount of money and second transaction that the second user node is traded described second, carries out word Symbol string merges, and obtains the merging character string of the second transaction;
Merging character string of the second user node based on second transaction, using preset third hash function, Obtain third cryptographic Hash;
The second user node is based on the 4th cryptographic Hash, the 5th cryptographic Hash, the third cryptographic Hash and pre- If elliptic curve basic point, using the calculation formula of preset second commitment value, the second commitment value for calculating the first transaction is;
Wherein, the calculation formula of second commitment value are as follows:
Wherein, the c is the second commitment value of first transaction, the x'1For the 4th cryptographic Hash, the x'2For 5th cryptographic Hash, x'1=H1(r2), x'2=H2(r2), the H1For first hash function, the H2It is described second Hash function, the r2For second secret value, and the r2For integer, the M is the third cryptographic Hash, M=H3(T), The H3For the third hash function, the T is the merging character string of second transaction, and the G is preset oval bent The basic point of line.
In scheme provided by the embodiment of the present invention, first secret value is only the legitimate receiver of first transaction First object node known to, second secret value be only it is described first transaction reception legitimacy to be verified second user Known to node, therefore, if second secret value is identical as first secret value, the second user node and described the One destination node must be same user node, if second secret value and first secret value be not identical, described second User node and the first object node must not be same user nodes.Therefore, scheme provided by the embodiment of the present invention, energy Enough verifyings receive the legitimacy of user node identity, guarantee the safety of transaction.And scheme provided by the embodiment of the present invention In, the first commitment value of first transaction is to be based upon the first secret value of first transaction setting to be calculated, institute The second commitment value for stating the first transaction is to be based upon the second secret value of first transaction setting to be calculated, secret value with Transaction is corresponding, that is to say, that for a user node in different transaction, used secret value is different, therefore, block chain In any user node can not based on it is described first transaction the first commitment value or it is described first transaction the second commitment value, chase after It traces back the transactions history of the user, counts the remaining sum of the user, therefore, can be realized protection privacy of user using the embodiment of the present invention Purpose.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of electronic equipment, as shown in figure 4, can be with Including processor 401 and memory 402, wherein
The memory 402, for storing computer program;
The processor 401 when for executing the program stored on the memory 402, realizes the embodiment of the present invention The step of provided block chain transaction verification method promised to undertake based on equivalent test.
Above-mentioned memory may include RAM (Random Access Memory, random access memory), also may include NVM (Non-Volatile Memory, nonvolatile memory), for example, at least a magnetic disk storage.Optionally, memory It can also be that at least one is located away from the storage device of above-mentioned processor.
Above-mentioned processor can be general processor, including CPU (Central Processing Unit, central processing Device), NP (Network Processor, network processing unit) etc.;Can also be DSP (Digital Signal Processor, Digital signal processor), ASIC (Application Specific Integrated Circuit, specific integrated circuit), FPGA (Field-Programmable Gate Array, field programmable gate array) or other programmable logic device are divided Vertical door or transistor logic, discrete hardware components.
By above-mentioned electronic equipment, can be realized: first secret value is only the legitimate receiver of first transaction First object node known to, second secret value be only it is described first transaction reception legitimacy to be verified second user Known to node, therefore, if second secret value is identical as first secret value, the second user node and described the One destination node must be same user node, if second secret value and first secret value be not identical, described second User node and the first object node must not be same user nodes.Therefore, scheme provided by the embodiment of the present invention, energy Enough verifyings receive the legitimacy of user node identity, guarantee the safety of transaction.And scheme provided by the embodiment of the present invention In, the first commitment value of first transaction is to be based upon the first secret value of first transaction setting to be calculated, institute The second commitment value for stating the first transaction is to be based upon the second secret value of first transaction setting to be calculated, secret value with Transaction is corresponding, that is to say, that for a user node in different transaction, used secret value is different, therefore, block chain In any user node can not based on it is described first transaction the first commitment value or it is described first transaction the second commitment value, chase after It traces back the transactions history of the user, counts the remaining sum of the user, therefore, can be realized protection privacy of user using the embodiment of the present invention Purpose.
In addition, corresponding to the block chain transaction verification method promised to undertake provided by above-described embodiment based on equivalent test, this Inventive embodiments provide a kind of computer readable storage medium, and computer journey is stored in the computer readable storage medium Sequence when computer program is executed by processor, realizes the block chain promised to undertake provided by the embodiment of the present invention based on equivalent test The step of transaction verification method.
Above-mentioned computer-readable recording medium storage has at runtime, executes provided by the embodiment of the present invention based on equivalence The application program for testing the block chain transaction verification method promised to undertake, therefore can be realized: first secret value is only described the Known to the first object node of the legitimate receiver of one transaction, second secret value is only that first the to be verified of transaction connects Known to the second user node for receiving legitimacy, therefore, if second secret value is identical as first secret value, described the Two user nodes and the first object node must be same user nodes, if second secret value and first secret value Not identical, then the second user node and the first object node must not be same user nodes.Therefore, the present invention is implemented Scheme provided by example is able to verify that the legitimacy for receiving user node identity, guarantees the safety of transaction.And the present invention is real It applies in scheme provided by example, the first commitment value of first transaction is to be based upon the first secret of first transaction setting What value was calculated, the second commitment value of first transaction is to be based upon the second secret value calculating of first transaction setting It obtains, secret value is corresponding with transaction, that is to say, that a user node is in different transaction, used secret value Difference, therefore, any user node in block chain can not the first commitment value or first friendship based on first transaction The second easy commitment value, traces the transactions history of the user, counts the remaining sum of the user, therefore, using energy of the embodiment of the present invention Enough purposes for realizing protection privacy of user.
For electronic equipment and computer readable storage medium embodiment, method content base as involved in it Originally it is similar to embodiment of the method above-mentioned, so being described relatively simple, referring to the part explanation of embodiment of the method in place of correlation ?.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (10)

1.一种基于等值测试承诺的区块链交易验证方法,其特征在于,包括:1. A blockchain transaction verification method based on an equivalence test commitment, characterized in that, comprising: 获取第二交易的金额、作为第二交易的合法接收者的第二目标节点对于第二交易的第一承诺值,以及,作为第一交易的待验证接收合法性的第二用户节点对于所述第一交易的第二承诺值;其中,所述第一交易的第二承诺值是:所述第二用户节点基于为所述第一交易设定的第二秘密值,预先计算得到的,所述第二交易的第一承诺值是:所述第二目标节点基于为所述第二交易设定的第一秘密值,预先计算得到的;Obtain the amount of the second transaction, the first commitment value of the second target node as the legitimate recipient of the second transaction for the second transaction, and the second user node as the legal recipient of the first transaction to be verified for the The second commitment value of the first transaction; wherein, the second commitment value of the first transaction is: the second user node is pre-calculated based on the second secret value set for the first transaction. The first commitment value of the second transaction is: the second target node is pre-calculated based on the first secret value set for the second transaction; 获取作为所述第一交易的合法接收者的第一目标节点对于所述第一交易的第一承诺值;其中,所述第一交易的第一承诺值是:所述第一目标节点基于为所述第一交易设定的第一秘密值,预先计算得到的;Obtain the first commitment value of the first target node, which is the legal recipient of the first transaction, for the first transaction; wherein, the first commitment value of the first transaction is: the first target node is based on the the first secret value set by the first transaction, obtained by pre-calculation; 基于所述第一交易的第一承诺值、所述第一交易的第二承诺值、所述第二交易的金额及所述第二交易的第一承诺值,判断所述第二秘密值与所述为所述第一交易设定的第一秘密值是否相同,如果是,则确定所述第二用户节点与所述第一目标节点是同一用户节点,如果否,则确定所述第二用户节点与所述第一目标节点不是同一用户节点。Based on the first commitment value of the first transaction, the second commitment value of the first transaction, the amount of the second transaction, and the first commitment value of the second transaction, it is determined that the second secret value and the Whether the first secret value set for the first transaction is the same, if so, determine that the second user node and the first target node are the same user node, if not, determine the second user node The user node and the first target node are not the same user node. 2.根据权利要求1所述的方法,其特征在于,所述基于所述第一交易的第一承诺值、所述第一交易的第二承诺值、所述第二交易的金额及所述第二交易的第一承诺值,判断所述第二秘密值与所述为所述第一交易设定的第一秘密值是否相同,包括:2. The method according to claim 1, wherein the first commitment value based on the first transaction, the second commitment value of the first transaction, the amount of the second transaction and the For the first commitment value of the second transaction, judging whether the second secret value is the same as the first secret value set for the first transaction includes: 基于所述第一交易的第一承诺值、所述第一交易的第二承诺值、所述第二交易的金额及所述第二交易的第一承诺值,判断预设的配对运算等式是否成立,如果是,则确定所述第二秘密值与所述为所述第一交易设定的第一秘密值相同,如果否,则确定所述第二秘密值与所述为所述第一交易设定的第一秘密值不相同。Based on the first commitment value of the first transaction, the second commitment value of the first transaction, the amount of the second transaction, and the first commitment value of the second transaction, determine the preset pairing operation equation Whether it is established, if so, determine that the second secret value is the same as the first secret value set for the first transaction, if not, determine that the second secret value is the same as the first secret value set for the first transaction The first secret values set by a transaction are not the same. 3.根据权利要求2所述的方法,其特征在于,所述基于所述第一交易的第一承诺值、所述第一交易的第二承诺值、所述第二交易的金额及所述第二交易的第一承诺值,判断预设的配对运算等式是否成立,包括:3. The method according to claim 2, wherein the first commitment value based on the first transaction, the second commitment value of the first transaction, the amount of the second transaction and the For the first commitment value of the second transaction, determine whether the preset pairing operation equation holds, including: 将所述第二交易的金额与所述第二交易的第一承诺值,进行字符串合并,得到第二交易的合并字符串;Combining the amount of the second transaction and the first commitment value of the second transaction into strings to obtain a combined string of the second transaction; 基于所述第二交易的合并字符串,利用预设的第三哈希函数,得到第六哈希值;Based on the combined character string of the second transaction, using a preset third hash function to obtain a sixth hash value; 基于所述第一交易的第一承诺值及所述第一交易的第二承诺值,利用配对运算的计算公式e(a,c),得到第一配对值;并基于所述第六哈希值、预设的椭圆曲线的基点及所述第一交易的第一承诺值,利用配对运算的计算公式e(M'G,b),得到第二配对值;Based on the first commitment value of the first transaction and the second commitment value of the first transaction, the first pairing value is obtained by using the calculation formula e(a,c) of the pairing operation; and based on the sixth hash value, the base point of the preset elliptic curve and the first commitment value of the first transaction, using the calculation formula e(M'G,b) of the pairing operation to obtain the second pairing value; 判断所述第一配对值与所述第二配对值是否相等,如果是,则确定所述配对运算等式成立,如果否,则确定所述配对运算等式不成立;Judging whether the first pairing value and the second pairing value are equal, if so, determine that the pairing operation equation is established, and if not, determine that the pairing operation equation is not established; 其中,所述配对运算等式为:e(a,c)=e(M'G,b),Wherein, the pairing operation equation is: e(a,c)=e(M'G,b), 其中,所述a和所述b为所述第一交易的第一承诺值,所述c为所述第一交易的第二承诺值,所述M'为所述第六哈希值,M'=H3(T),所述H3为所述第三哈希函数,所述T为所述第二交易的合并字符串,所述G为预设的椭圆曲线的基点。Wherein, the a and the b are the first commitment value of the first transaction, the c is the second commitment value of the first transaction, the M' is the sixth hash value, and M '=H 3 (T), the H 3 is the third hash function, the T is the combined character string of the second transaction, and the G is the base point of the preset elliptic curve. 4.根据权利要求1所述的方法,其特征在于,所述第一目标节点基于为所述第一交易设定的第一秘密值,计算得到第一交易的第一承诺值的过程,包括:4. The method according to claim 1, wherein the first target node calculates and obtains the first commitment value of the first transaction based on the first secret value set for the first transaction, comprising: : 所述第一目标节点获取为第一交易设定的第一秘密值;the first target node obtains the first secret value set for the first transaction; 所述第一目标节点基于所述第一秘密值,利用多个预设的哈希函数及预设的第一承诺值的计算公式,计算第一交易的第一承诺值。The first target node calculates the first commitment value of the first transaction by using a plurality of preset hash functions and a preset calculation formula of the first commitment value based on the first secret value. 5.根据权利要求4所述的方法,其特征在于,所述第一目标节点基于所述第一秘密值,利用多个预设的哈希函数及预设的第一承诺值的计算公式,计算第一交易的第一承诺值,包括:5. The method according to claim 4, wherein the first target node utilizes a plurality of preset hash functions and a preset calculation formula of the first commitment value based on the first secret value, Calculate the first commitment value of the first transaction, including: 所述第一目标节点基于所述第一秘密值,利用预设的第一哈希函数,得到第一哈希值,并基于所述第一秘密值,利用预设的第二哈希函数,得到第二哈希值;The first target node obtains a first hash value by using a preset first hash function based on the first secret value, and using a preset second hash function based on the first secret value, get the second hash value; 所述第一目标节点基于所述第一哈希值、所述第二哈希值及预设的椭圆曲线的基点,利用预设的第一承诺值的计算公式,计算第一交易的第一承诺值;The first target node, based on the first hash value, the second hash value, and the base point of the preset elliptic curve, uses the preset calculation formula of the first commitment value to calculate the first value of the first transaction. Commitment value; 其中,所述第一承诺值的计算公式为:a=x1G和b=x2G,Wherein, the calculation formula of the first commitment value is: a=x 1 G and b=x 2 G, 其中,所述a和所述b为所述第一交易的第一承诺值,x1=H1(r1),x2=H2(r1),所述x1为所述第一哈希值,所述x2为所述第二哈希值,所述H1为所述第一哈希函数,所述H2为所述第二哈希函数,所述r1为所述第一秘密值,且所述r1为整数,所述G为预设的椭圆曲线的基点。Wherein, the a and the b are the first commitment values of the first transaction, x 1 =H 1 (r 1 ), x 2 =H 2 (r 1 ), and the x 1 is the first Hash value, the x 2 is the second hash value, the H 1 is the first hash function, the H 2 is the second hash function, and the r 1 is the The first secret value, and the r 1 is an integer, and the G is the base point of the preset elliptic curve. 6.根据权利要求1所述的方法,其特征在于,所述第二用户节点基于为所述第一交易设定的第二秘密值,计算得到第一交易的第二承诺值的过程,包括:6. The method according to claim 1, wherein the second user node calculates and obtains the second commitment value of the first transaction based on the second secret value set for the first transaction, comprising: : 所述第二用户节点获取为第一交易设定的第二秘密值;the second user node obtains the second secret value set for the first transaction; 所述第二用户节点获取第二交易的金额及作为第二交易的合法接收者的第二目标节点对于第二交易的第一承诺值;The second user node obtains the amount of the second transaction and the first commitment value of the second target node as the legitimate recipient of the second transaction for the second transaction; 所述第二用户节点基于所述第二秘密值、所述第二交易的金额及所述第二交易的第一承诺值,利用多个预设的哈希函数及预设的第二承诺值的计算公式,计算第一交易的第二承诺值。The second user node utilizes a plurality of preset hash functions and a preset second commitment value based on the second secret value, the amount of the second transaction and the first commitment value of the second transaction The formula to calculate the second commitment value of the first transaction. 7.根据权利要求6所述的方法,其特征在于,所述第二用户节点基于所述第二秘密值、所述第二交易的金额及所述第二交易的第一承诺值,利用多个预设的哈希函数及预设的第二承诺值的计算公式,计算第一交易的第二承诺值,包括:7. The method of claim 6, wherein the second user node utilizes multiple A preset hash function and a preset calculation formula for the second commitment value to calculate the second commitment value of the first transaction, including: 所述第二用户节点基于所述第二秘密值,利用预设的第一哈希函数,得到第四哈希值,并基于所述第二秘密值,利用预设的第二哈希函数,得到第五哈希值;The second user node obtains a fourth hash value based on the second secret value using a preset first hash function, and uses a preset second hash function based on the second secret value, get the fifth hash value; 所述第二用户节点将所述第二交易的金额与所述第二交易的第一承诺值,进行字符串合并,得到第二交易的合并字符串;The second user node combines the amount of the second transaction with the first commitment value of the second transaction to obtain a combined string of the second transaction; 所述第二用户节点基于所述第二交易的合并字符串,利用预设的第三哈希函数,得到第三哈希值;The second user node obtains a third hash value by using a preset third hash function based on the merged string of the second transaction; 所述第二用户节点基于所述第四哈希值、所述第五哈希值、所述第三哈希值及预设的椭圆曲线的基点,利用预设的第二承诺值的计算公式,计算第一交易的第二承诺值为;The second user node uses the preset calculation formula of the second commitment value based on the fourth hash value, the fifth hash value, the third hash value and the base point of the preset elliptic curve , calculate the second commitment value of the first transaction; 其中,所述第二承诺值的计算公式为: Wherein, the calculation formula of the second commitment value is: 其中,所述c为所述第一交易的第二承诺值,所述x'1为所述第四哈希值,所述x'2为所述第五哈希值,x'1=H1(r2),x'2=H2(r2),所述H1为所述第一哈希函数,所述H2为所述第二哈希函数,所述r2为所述第二秘密值,且所述r2为整数,所述M为所述第三哈希值,M=H3(T),所述H3为所述第三哈希函数,所述T为所述第二交易的合并字符串,所述G为预设的椭圆曲线的基点。Wherein, the c is the second commitment value of the first transaction, the x' 1 is the fourth hash value, the x' 2 is the fifth hash value, and x' 1 =H 1 (r 2 ), x' 2 =H 2 (r 2 ), the H 1 is the first hash function, the H 2 is the second hash function, and the r 2 is the The second secret value, and the r 2 is an integer, the M is the third hash value, M=H 3 (T), the H 3 is the third hash function, and the T is The merged string of the second transaction, and the G is the base point of the preset elliptic curve. 8.一种基于等值测试承诺的区块链交易验证装置,其特征在于,包括:8. A blockchain transaction verification device based on an equivalence test commitment, characterized in that it comprises: 第一获取模块,用于获取第二交易的金额、作为第二交易的合法接收者的第二目标节点对于第二交易的第一承诺值,以及,作为第一交易的待验证接收合法性的第二用户节点对于所述第一交易的第二承诺值;其中,所述第一交易的第二承诺值是:所述第二用户节点基于为所述第一交易设定的第二秘密值,预先计算得到的,所述第二交易的第一承诺值是:所述第二目标节点基于为所述第二交易设定的第一秘密值,预先计算得到的;The first acquisition module is used to acquire the amount of the second transaction, the first commitment value of the second target node as the legitimate recipient of the second transaction for the second transaction, and, as the legality of the receipt of the first transaction to be verified. The second commitment value of the second user node for the first transaction; wherein the second commitment value of the first transaction is: the second user node is based on the second secret value set for the first transaction. , pre-calculated, the first commitment value of the second transaction is: the second target node is pre-calculated based on the first secret value set for the second transaction; 第二获取模块,用于获取作为所述第一交易的合法接收者的第一目标节点对于所述第一交易的第一承诺值;其中,所述第一交易的第一承诺值是:所述第一目标节点基于为所述第一交易设定的第一秘密值,预先计算得到的;The second obtaining module is configured to obtain the first commitment value of the first target node, which is the legitimate recipient of the first transaction, for the first transaction; wherein, the first commitment value of the first transaction is: The first target node is pre-calculated based on the first secret value set for the first transaction; 验证模块,用于基于所述第一交易的第一承诺值、所述第一交易的第二承诺值、所述第二交易的金额及所述第二交易的第一承诺值,判断所述第二秘密值与所述为所述第一交易设定的第一秘密值是否相同,如果是,则确定所述第二用户节点与所述第一目标节点是同一用户节点,如果否,则确定所述第二用户节点与所述第一目标节点不是同一用户节点。A verification module, configured to determine the said Whether the second secret value is the same as the first secret value set for the first transaction, if so, it is determined that the second user node and the first target node are the same user node, if not, then It is determined that the second user node and the first target node are not the same user node. 9.一种电子设备,其特征在于,包括处理器和存储器,其中,9. An electronic device, comprising a processor and a memory, wherein, 所述存储器,用于存放计算机程序;the memory for storing computer programs; 所述处理器,用于执行所述存储器上所存放的程序时,实现权利要求1-7任一所述的方法步骤。The processor is configured to implement the method steps of any one of claims 1-7 when executing the program stored in the memory. 10.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-7任一所述的方法步骤。10. A computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the method steps of any one of claims 1-7 are implemented.
CN201810611953.XA 2018-06-14 2018-06-14 A kind of block chain transaction verification method and device based on equivalent test promise Active CN108769054B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810611953.XA CN108769054B (en) 2018-06-14 2018-06-14 A kind of block chain transaction verification method and device based on equivalent test promise

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810611953.XA CN108769054B (en) 2018-06-14 2018-06-14 A kind of block chain transaction verification method and device based on equivalent test promise

Publications (2)

Publication Number Publication Date
CN108769054A CN108769054A (en) 2018-11-06
CN108769054B true CN108769054B (en) 2019-05-21

Family

ID=64022087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810611953.XA Active CN108769054B (en) 2018-06-14 2018-06-14 A kind of block chain transaction verification method and device based on equivalent test promise

Country Status (1)

Country Link
CN (1) CN108769054B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109447791B (en) * 2018-11-09 2021-07-16 北京邮电大学 A method and device for fund transaction based on blockchain
CN110337665B (en) * 2018-11-27 2023-06-06 创新先进技术有限公司 System and method for information protection
CN110781503B (en) * 2019-09-18 2022-05-17 深圳壹账通智能科技有限公司 Data calling method, device and computer readable storage medium
CN113221137B (en) * 2021-04-29 2023-01-17 中国联合网络通信集团有限公司 Block chain-based shaking method and device
CN114254345B (en) * 2021-12-17 2025-03-28 深圳前海微众银行股份有限公司 A method and device for generating and verifying secret commitment based on blockchain
CN115603900B (en) * 2022-08-24 2024-08-06 深圳市领存技术有限公司 Fair bidding method and device based on cryptographic commitment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548349A (en) * 2016-11-02 2017-03-29 江苏通付盾科技有限公司 Transaction Information verification method and system
CN107612973A (en) * 2017-08-18 2018-01-19 暨南大学 Block chain structure, generation method and transaction verification method for intelligent sliding moved end

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160283920A1 (en) * 2015-03-28 2016-09-29 Justin Fisher Authentication and verification of digital data utilizing blockchain technology

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548349A (en) * 2016-11-02 2017-03-29 江苏通付盾科技有限公司 Transaction Information verification method and system
CN107612973A (en) * 2017-08-18 2018-01-19 暨南大学 Block chain structure, generation method and transaction verification method for intelligent sliding moved end

Also Published As

Publication number Publication date
CN108769054A (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN108769054B (en) A kind of block chain transaction verification method and device based on equivalent test promise
US12367490B2 (en) Computer-implemented system and method for enabling zero-knowledge proof
JP7552970B2 (en) SYSTEM AND METHOD FOR DISTRIBUTION OF DATA RECORDS USING BLOCKCHAIN
CN110473105B (en) Block chain transaction settlement method, system and related equipment
CN110419053B (en) Systems and methods for information protection
CN110226177B (en) Method for providing payment gateway services using UTXO-based protocol and server utilizing same
CN109544129B (en) Blockchain transaction method and device, electronic device
JP2022031817A (en) Dispersion type transaction propagation and verification system
CN109359974A (en) Blockchain transaction method and device, electronic device
Forte et al. Beyond Bitcoin-Part I: A critical look at blockchain-based systems
US7590846B2 (en) Public key cryptographic method of protecting an electronic chip against fraud
WO2019109003A1 (en) Blockchain system for confidential and anonymous smart contracts
JP2021529397A (en) Systems and methods for blockchain address and owner verification
CN111191280B (en) Blockchain transaction method based on encrypted data, electronic equipment and storage medium
CN107994991A (en) A kind of data processing method, data processing server and storage medium
CN109359971A (en) Blockchain transaction method and device, electronic device
CN110728576A (en) A Decentralized Anonymous Data Transaction Method Based on Zero-knowledge Proof
CN110278266B (en) Resource processing method and device based on block chain
CN119444422A (en) Financial information management method and system based on blockchain technology
Singh et al. Performance comparison of executing fast transactions in bitcoin network using verifiable code execution
CN112541759A (en) Hidden transaction method and device based on UTXO model in block chain system and related products
Wei et al. zk‐STARKs based scheme for sealed auctions in chains
CN109660344A (en) Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pond route device
CN108900310A (en) Block chain signature processing method and block chain signature processing unit
CN116150788A (en) Data exchange validity verification method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant