Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method of carrying out proof of work on block in block chain system and device thereof

A workload and blockchain technology, applied in the field of data processing, can solve problems such as reducing the security and stability of the blockchain system, and achieve the effect of improving security and stability and improving time requirements

Active Publication Date: 2017-04-19
北京云图科瑞科技有限公司
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key Kt is involved in the iterative calculation step in the SHA-2 algorithm. Kt is a 32-bit constant value sequence, which is a fixed value. It is easy for the attacker to construct an appropriate hash collision attack and crack the SHA- 2 algorithm, which will reduce the security and stability of the blockchain system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of carrying out proof of work on block in block chain system and device thereof
  • Method of carrying out proof of work on block in block chain system and device thereof
  • Method of carrying out proof of work on block in block chain system and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] The existing security hash algorithm SHA-2 is used to prove the workload of the block in the blockchain system. Since the key Kt in SHA-2 is a fixed value, the attacker can construct an appropriate hash within a limited time. Hash conflict attacks and cracks the SHA-2 algorithm, which will reduce the security and stability of the blockchain system. Based on this, in the embodiment of the present invention, a method for proving the workload...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method of carrying out proof of work on a block in a block chain system and device thereof. The method comprises the following steps of modifying a secret key Kt in a security hash algorithm SHA-2 to be a dynamic value, wherein the t is an integer and the t equals to 1-64; and using the corrected security hash algorithm SHA-2 to carry out proof of work on a newly-increased block in the block chain system. In the prior art, a value of the secret key Kt is a fixed value. Compared to the prior art, in the invention, the value of the secret key Kt is modified to be a dynamic value and an attacker uses long time to construct a proper hash conflict so that an attack time requirement is increased, and safety and stability of the block chain system are improved.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a method and device for proof-of-work of blocks in a blockchain system. Background technique [0002] Blockchain technology first appeared in the underlying implementation mechanism of Bitcoin, the originator of digital currency. It uses a decentralized distributed network composed of many nodes to record transactions. Blockchain technology is its most basic core part. Blockchain technology does not require a central control node and is built on a replicable and shared ledger. When the blockchain system is creating new blocks (including block headers and transaction content), the secure hash algorithm SHA-2 algorithm (Secure Hash Algorithm, which belongs to the hash function, including SHA224, SHA256, SHA384, and SHA512) is used for new blocks. Proof of work for incremental blocks. For example, the process of using the SHA256 algorithm to prove the workload of a new blo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/16
CPCH04L9/16H04L9/3239
Inventor 陈剑雄谢文杰白凌舟
Owner 北京云图科瑞科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products