Key derivation method and device applicable to digital currency

A digital currency and key technology, applied in the field of information security, can solve problems such as difficult management, large key backup volume, and digital currency can no longer be consumed

Active Publication Date: 2017-02-15
FEITIAN TECHNOLOGIES
View PDF6 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. With the increase in the number of transactions, the backup volume of the key is getting larger and larger, which is difficult to manage;
[0005] 2. The key cannot be restored after it is damaged. If the key data is damaged, the digital currency in the transaction corresponding to the key data will no longer be able to be consumed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key derivation method and device applicable to digital currency
  • Key derivation method and device applicable to digital currency
  • Key derivation method and device applicable to digital currency

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0174] This embodiment provides a key derivation method suitable for digital currency. The key derived by the method provided by this embodiment has a tree structure. The root of the tree is the master key and the master chain code, and the master key is the The parent key and the main chain code are the child key and the child chain code generated by the parent chain code are the first-level key and the first-level chain code of the tree, and the first-level key is the parent key and the first-level chain code The child key and child chaincode generated for the parent chaincode are the second-level key and second-level chaincode of the tree, and so on.

[0175] A subkey index is introduced when generating a subkey according to a parent key, and different subkeys are generated according to different subkey indexes, and the subkey index and the subkey are in one-to-one correspondence.

[0176] Described method specifically comprises:

[0177] 1. The derivation process of maste...

Embodiment 2

[0326] This embodiment provides a key derivation device suitable for digital currency. The key derived by the device provided by this embodiment is in a tree structure. The root of the tree is the master key and the master chain code, and the master key is the The parent key and the main chain code are the child key and the child chain code generated by the parent chain code are the first-level key and the first-level chain code of the tree, and the first-level key is the parent key and the first-level chain code The child key and child chaincode generated for the parent chaincode are the second-level key and second-level chaincode of the tree, and so on.

[0327] A subkey index is introduced when generating a subkey according to a parent key, and different subkeys are generated according to different subkey indexes, and the subkey index and the subkey are in one-to-one correspondence.

[0328] The device provided by this embodiment is as Figure 6 shown, including:

[0329]...

Embodiment 3

[0374] This embodiment provides a key derivation device suitable for digital currency, such as Figure 7 shown, including:

[0375] The first acquisition module 91 is used to use the master private key, master public key and master chain code of the digital currency wallet as the parent private key, parent public key and parent chain code respectively, and use the first child key index as the child key index ;

[0376] The first derivation module 92 is used to derive the child private key, child public key and child chain code according to the parent private key, parent public key, parent chain code and child key index obtained by the first acquisition module 91;

[0377] The account key generation module 93 is used to use the sub-private key, sub-public key and sub-chain code derived by the first derivation module 92 as the master private key, master public key and master chain code of the digital currency account respectively.

[0378] In one aspect, the first derivation m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key derivation method and device applicable to digital currency and belongs to the field of information security. The key derivation method applicable to digital currency comprises the steps of splicing indexes of father public keys and sub-key indexes according to a sequence; using father chain codes as Hash keys, and calculating Hash values of spliced data based on a preset algorithm; obtaining sub-chain codes based on the Hash values; performing ECC (Elliptic Curve Cryptography) addition modular operation on captured residual data; if the operation results are not preset values, regarding the operation results as sub-private keys; and performing ECC point multiplication operation on the sub-private keys to obtain sub-public keys. The key derivation method and device applicable to digital currency have the beneficial effects that backup of key seeds rather than all the keys is required as all the keys can be derived based on the key seeds, the backup volume is small, and loss caused by key damage also can be avoided.

Description

technical field [0001] The invention relates to the field of information security, in particular to a key derivation method and device suitable for digital currency. Background technique [0002] Digital currency is an alternative currency in the form of electronic currency. It adopts the form of P2P and does not rely on the issuance of a specific currency institution, but is generated through a large number of calculations based on a specific algorithm. The digital currency economy uses a distributed database composed of many nodes in the entire P2P network to confirm and record all transaction behaviors, and uses cryptography to ensure the security of all aspects of currency circulation. The design based on key science can make digital currency It can only be transferred or paid by the real owner, ensuring the anonymity of currency ownership and circulation transactions. Due to the anonymity of digital currency transactions, users use different addresses to receive digita...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L9/06G06Q20/38
CPCG06Q20/3829H04L9/0643H04L9/0869H04L9/3066H04L9/3236
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products