Research on systems and methods for protecting information
Main contents of the document.
List some types of information that can be protected by the technology described in this patent.
Briefly describe what blockchain technology is and explain its relationship with .
Explain what the role of "commitment schemes" is in data security and give examples.
Describe how the Pedersen commitment scheme works.
In , how can encryption technology be used to protect the confidentiality of transaction amounts?
Explain the role of "sender nodes" and "receiver nodes" in the described system.
Describe how the proposed method solves the problem of storing random numbers in the prior art.
Explain what "off-chain" and "pre-transaction" behavior means in blockchain transactions.
Describe the advantages of the proposed method over the prior art.
Answer:
The document describes a system and method for protecting information, in particular, protecting the confidentiality of transaction amounts, asset values, and mask coefficients in blockchain transactions. The method uses commitment schemes and encryption techniques to achieve information protection.
The technology described in this patent can protect a variety of information, such as: transaction amounts, asset values, mask coefficients, personal identity information, medical records, contracts, deeds, etc. Any information that can be digitized can be protected by the proposed method.
Blockchain is a decentralized database technology that ensures data security and immutability by storing data on multiple nodes. The characteristics of blockchain technology are used to securely store transaction-related information, such as encrypted asset values and random numbers.
A "commitment scheme" allows one party (the prover) to commit to a value without revealing the actual contents of the value until the prover chooses to make it public later. For example, the Pedersen commitment scheme can use encryption technology to commit to a value while hiding the actual contents of the value.
The Pedersen commitment scheme uses elliptic curve cryptography to create a commitment to a value. It uses a random mask coefficient and two public generator points to generate a commitment value that can be used to verify the original value without revealing the original value itself.
The transaction amount and random number are encrypted using encryption technology to protect their confidentiality. The sender node encrypts the transaction amount using the public key of the receiver node, and only the receiver node with the corresponding private key can decrypt and access the transaction amount.
The sender node is the node that initiates the transaction, and the receiver node is the node that receives the transaction. The sender node is responsible for encrypting and sending transaction information, while the receiver node is responsible for verifying and decrypting transaction information.
The problem of storing random numbers in existing technologies is solved by storing encrypted random numbers and asset values on the blockchain. The decentralization and immutability of the blockchain ensure the security and recoverability of data while reducing the reliance on user local storage.
"Off-chain" and "pre-transaction" behavior refers to the encryption and verification process between the two parties before the transaction is broadcast to the blockchain. These processes are completed on the client side to protect the confidentiality of transaction information and minimize the final transaction data to improve efficiency.
The advantages of the proposed method over existing technologies include: better protection of the confidentiality of transaction amounts; simplified management of random numbers and reduced risks of loss or tampering; use of the security and immutability of the blockchain to store key information; and improved transaction efficiency and scalability.
Glossary:
Blockchain: A decentralized database technology used to record and verify transactions.
Commitment scheme: A cryptographic technology that allows one party to commit to a value without revealing the actual content of the value.
Pedersen Commitment Scheme: A commitment scheme based on elliptic curve cryptography that is homomorphic.
Masking coefficient: A random number used to hide the original value, used in the commitment scheme.
Sender node: A node that initiates a transaction.
Receiver node: A node that receives a transaction.
Off-chain: Refers to the computation and communication process that takes place outside the blockchain.
Pre-transaction: Refers to the computation and communication process that takes place before a transaction is broadcast to the blockchain.
Homomorphic encryption: A cryptographic technique that allows computation to be performed on encrypted data without first decrypting the data.
Digital signature: A cryptographic technique used to verify the origin and integrity of a message.