Is blockchain related to privacy computing? What role does private computing play on the blockchain?
Is blockchain related to privacy computing? What role does private computing play on the blockchain? In recent years, with the explosion of blockchain, blockchain is considered to be a changing technology and the infrastructure of the future Internet. Although the subsequent development has proved that foam is a major component of blockchain explosion, blockchain has made great progress since 2017. At the same time, privacy computing is also developing rapidly. As the only technical solution that can realize the "availability and invisibility" of data, privacy computing can balance the contradiction between data utilization and data protection, and is considered to be the infrastructure of the future digital society. Is blockchain related to privacy technology? Now let's get to know.
Is blockchain related to privacy computing?
When privacy computing ensures the confidentiality of the original data, it can complete all kinds of calculations to generate value. Blockchain technology can complete trusted identity authentication, data confirmation, data calculation process tracking, and automatic distribution of data value based on ownership and calculation process. The two naturally have the same origin: multi-party cooperation, mutual distrust, and no trusted third party. Privacy computing requires multiple parties to participate in building a distributed collaboration scenario. Blockchain can solve the trust problem in multi-party collaboration. Blockchain and privacy computing support each other for integration and development, which can produce more value.
What role does private computing play on the blockchain?
Privacy computing is mainly used to solve the problem of invisible privacy protection for raw data outgoing in the face of complex business scenarios. Currently, privacy computing mainly includes trusted execution environment (TEE), homomorphic encryption (HE), secure multi-party computing (MPC) and zero knowledge proof (ZKP).
The combination of privacy computing and blockchain can not only provide data privacy protection, but also solve blockchain performance bottlenecks. It has become a key research direction for blockchain commercialization. In the future, privacy computing will also become a universal information infrastructure like blockchain.
Privacy account design in Trias
Trias' privacy account is designed in two modes: account oriented and UTXO. It uses the account system as the core to meet the needs of complex businesses, and uses UTXO to support higher privacy needs and potential scalability needs.
At present, many mainstream blockchain project accounts emphasize that their transactions are very secure when they are used, but in fact, the specific operation and use of each account can be seen by all chain participants, which brings certain hidden dangers to the chain transactions.
Trias can not only experience the benefits of centralized anonymous applications on the blockchain, but also protect the privacy of users to the maximum extent, so that people unrelated to this transaction will not be aware of the trend of their assets.
1. Compatible with two kinds of accounts
Here is a brief introduction to the differences between the Account and UTXO models.
The account model is easy to understand. Our daily payment methods such as bank card, Alipay and WeChat wallet are designed based on the account model. Each account has a balance as its status, that is, the current balance is recorded somewhere. This design is called an account model. For example, our bank card balance is recorded in the bank database.
UTXO model is a basic unit of value transfer created by Bitcoin. Its core design idea is statelessness, that is, only the transaction change event is recorded, and the final state of the transaction is not recorded. The blockchain system only processes transactions, while the process of clearing the balance is left to the nodes themselves.
To sum up, both mechanisms have advantages and disadvantages. At present, Bitcoin uses UTXO, and Ethereum uses Account.
UTXO: simple principle, easy expansion, high parallelism and strong concealment.
Account: easy to understand, space saving, easy to implement, and mature model.
Various operations related to the account are involved, such as account registration, management secret key, permission change, etc. Each account has three sets of secret keys, one for account oriented operation, one for UTXO mechanism use, and one for indicating the account ownership. In extreme cases, it can be used for account retrieval (cold backup).
2. Transaction privacy support
Trias supports the use of UTXO for transfer transactions, and supports anonymous transfer using hidden address and zero knowledge proof. Let's start with the hidden address. Under the working mode of UTXO, suppose account A transfers money to account B. Account A will generate a temporary address through the public key of account B, and transfer the assets to the corresponding temporary address. In the process of collection, Account B needs to go through all the valid transactions, and judge whether the payee is himself or herself through the private key and transaction random number.
The process is as follows: Account A transfers to Account B. Account B has two pairs of public and private key pairs of elliptic curve algorithm, (m, M), (n, N), and the public parameter of the specified elliptic curve is G:
The temporary address P is calculated through the above process, and A transfers to P and discloses R. Account B calculates the private key in the corresponding hidden collection through R. In this way, it not only realizes the whole process of transfer and collection, but also protects the privacy information of account A.
As a hot technology in recent years, zero knowledge proof has been widely discussed and studied by domestic and foreign academic circles. What is zero knowledge proof? For example, there is a circular corridor where the exit and entrance are at the same position, and the middle is separated by a locked door. B claims that he has a key. How can A know that B really has a key without getting it. At this time, A only needs to see B enter from the entrance and exit from the exit, so that A can believe the fact that B holds the key to the door.
Zero knowledge proof refers to that one party states to the other that a thing is correct without disclosing any information other than the statement. The prover does not tell you the answer directly, but uses another expression to prove to you until you think the other person really knows the answer. In Trias, zero knowledge proof is mainly implemented by zkSNARK algorithm.
In general, the above content explains in detail whether the blockchain is related to privacy computing, and what role food computing plays in the blockchain. I believe you will understand it after reading it. However, as an emerging distributed ledger technology, blockchain stores transaction records and private data between users, and is open and transparent, transaction records cannot be changed, and sources can be traced. The most fundamental thing for user privacy protection is to enable users to really have the right to handle personal privacy data, and the distributed ledger, tamper proof and other features of blockchain provide them with unlimited imagination. Therefore, privacy computing is mainly used to solve the problem of invisible privacy protection for raw data outgoing in the face of complex business scenarios.