Block chain key trusteeship and recovery method and device based on secrecy sharing technology

A secret sharing and key recovery technology, applied in the blockchain field, can solve problems such as low security, user key loss, and difficult recovery, and achieve the effects of improving reliability, backup and recovery security, and intrusion tolerance

Inactive Publication Date: 2018-01-23
JUZIX TECH SHENZHEN CO LTD
View PDF8 Cites 129 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a blockchain key escrow and recovery method based on secret sharing technology to solve the problem of low security in the prior art, difficult recovery of user key loss, or due to the need to retrieve the private key. In the storage process, it brings new security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain key trusteeship and recovery method and device based on secrecy sharing technology
  • Block chain key trusteeship and recovery method and device based on secrecy sharing technology
  • Block chain key trusteeship and recovery method and device based on secrecy sharing technology

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0041] The key recovery scheme is divided into the release phase and the key recovery phase. Considering the identity of any common user node in the system, the detailed process is as follows:

[0042] Publishing stage: the user disperses and stores the encrypted private key ciphertext group and the public key information formed by the user's biological information and / or password in the blockchain to host the encrypted private key. The specific process is as follows: image 3 :

[0043] 1. The user generates a public-private key pair on the elliptic curve (sk 1 , pk 1 )=(x, x·G), where G is the generator. Of course, other existing algorithms can also be used to generate the public-private key pair.

[0044] 2. will sk 1 For (t, n) secret sharing, decomposed into sk 1 →(sk 1 1 ,sk 1 2 ,...,sk 1 n ), where 1≤t≤n, that is, sk 1 Split the shared secret into n fragments, and use any t or more shared fragments to restore sk 1 ;

[0045] 3. The user uses his biometric...

example 2

[0057] Publishing stage: the user stores the encrypted private key ciphertext group and the public key information formed by the user's biological information and / or password in the trusted node to host the encrypted private key. Any node can be pre-defined in the blockchain system.

[0058] 1. The user generates a public-private key pair on the elliptic curve (sk 1 , pk 1 )=(x, x·G), where G is the generator. Of course, other existing algorithms can also be used to generate the public-private key pair.

[0059] 2. will sk 1 For (t, n) secret sharing, decomposed into sk 1 →(sk 1 1 ,sk 1 2 ,...,sk 1 n ), where 1≤t≤n, that is, sk 1 Split the shared secret into n fragments, and use any t or more shared fragments to restore sk 1 ;

[0060] 3. The user uses his biometric feature B (which may include fingerprints, iris, palm veins, face shape, etc.), and uses an existing fuzzy extractor or other existing algorithms to generate parameter public parameters P and secret pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain key trusteeship and recovery method and device based on a secrecy sharing technology. The method comprises the steps that A1, a user groups a private key sk1 in a(t, n) secrecy sharing mode, wherein the n is the number of fragments of shared secrecies obtained by splitting the private key, the t is the minimum number of the fragments for recovery of the private key, and the t is greater than or equal to 2 and is smaller than or equal to the n; A2, information containing user identification information is taken as a private key protection key, and then grouping encryption is carried out on the private key through utilization of the key; and A3, secrecy string information containing encrypted ciphertexts is dispersely stored to a block chain or is sentto trusted nodes for trusteeship and storage, when the user discovers that own private key is lost, a key recovery request is generated, at least t secrecy strings are obtained from the trusted nodesor the block chain in a secrecy string storage mode of the key, and the content in the secrecy strings is extracted, decrypted and recombined, so the private key is recovered. According to the methodand the device, the secrecy sharing technology is applied to a block chain scene for the first time, thereby solving the private key trusteeship and recovery security problem.

Description

technical field [0001] The present invention relates to block chain technology, in particular to a block chain key trusteeship and recovery method and device that use secret sharing technology to improve key management in existing block chain technology. Background technique [0002] Blockchain technology is a decentralized distributed ledger technology originated from Bitcoin. It facilitates transactions through technical endorsement rather than centralized credit institutions. It has the characteristics of decentralization, no need for central trust, tamper-proof and encrypted security. Nodes, as participants in the blockchain system, each maintain a copy of the data. The nodes maintain the consistency of the backup database data through the consensus algorithm. Each account in the blockchain system consists of an address (public key) and a private key. The user controls the assets in the account by using the private key. The private key is the only data that proves the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 谢翔李升林何德彪孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products