Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threshold recovery method and system for private key storage

A recovery method and private key technology, applied in the Internet field, can solve problems such as inconvenient use and limited performance of security chips, and achieve the effect of avoiding limited use

Inactive Publication Date: 2020-12-01
数字钱包(北京)科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the above solutions are inconvenient to use and need to be implemented in the security chip, and the performance of the security chip is often limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threshold recovery method and system for private key storage
  • Threshold recovery method and system for private key storage
  • Threshold recovery method and system for private key storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] figure 1 It is a flow chart of the threshold recovery method for private key storage provided by Embodiment 1 of the present invention.

[0057] The general idea of ​​the threshold recovery method for private key storage provided in this embodiment is based on the shamir(k, n) threshold secret sharing scheme, that is, any k of n individuals can provide keys to restore the entire encrypted content, and any k -1 person cannot restore the entire content, choose k and n to be odd numbers. In the embodiment, a total of k-1 partners and the cloud are selected as the secret holder to store the secret scheme. The secret scheme itself has nothing to do with the private key and can be encrypted by the public key of the secret holder to avoid the secret being collected publicly. The user himself stores a secret recipe in a flexible manner. According to the (k, n) threshold secret sharing scheme, the key can be recovered by collecting k secrets. However, as the partner of the se...

Embodiment 2

[0072] figure 2 It is a flow chart of the private key encoding method provided by Embodiment 2 of the present invention.

[0073] This embodiment describes each step of the threshold recovery method for private key storage provided in the above embodiments by using examples.

[0074] In step S110 of the threshold recovery method for private key storage, refer to figure 2 , the process of encoding the private key includes:

[0075] Step S210, obtaining a hexadecimal private key;

[0076] Step S220, converting the hexadecimal private key to a decimal system to generate a decimal private key;

[0077] Step S230, encoding the decimal private key to generate coordinate points in three-dimensional space.

[0078] Specifically, take the hexadecimal private key as an example:

[0079] A90C28B2861B5D47F339599753A2387A86A79DBC88E7AAF0808D02B29C23F0BB;先把十六进制私钥转化为十进制形式:1223397671331149484138190714211802661074685763175964491678362870066873941035952;再把十进制形式的私钥编码成三维空间的坐标点:(12233976713...

Embodiment 3

[0089] image 3 It is a schematic diagram of a threshold recovery system for private key storage provided by Embodiment 3 of the present invention.

[0090] The embodiment of the present invention also provides a threshold recovery system for private key storage, which is used to implement the above threshold recovery method for private key storage. refer to image 3 , the threshold recovery system for private key storage includes the following units:

[0091] Encoding unit 110, configured to obtain the private key, and encode the private key to generate coordinate points in three-dimensional space;

[0092] A plane generation unit 120, configured to generate n different planes through the coordinate points, each plane corresponding to a plane equation;

[0093] An equation calculation unit 130, configured to obtain n result values ​​correspondingly according to the coordinate points and n plane equations;

[0094] A secret distribution unit 140, configured to use each pla...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a threshold recovery method and system of private key storage, and relates to the technical field of the internet. The method comprises the following steps: acquiring a privatekey, and encoding the private key to generate a coordinate point of a three-dimensional space; generating n different planes through the coordinate point, wherein each is corresponding to a plane equation; correspondingly acquiring n result numerical values according to the coordinate point and n plane equations; serving each plane equation and the corresponding result numerical value as an arrayto obtain n arrays, and distributing n arrays to n different secret holders; randomly selecting k secret holders to combine through the n secret holders so as to generate a secret combination; and acquiring the recovery of the private key according to the secret combination. Through the threshold recovery method and systemprovided by the invention, the flexibility and the security of the private key recovery can be both taken into consideration, and limited useof a chip is avoided.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a threshold recovery method and system for private key storage. Background technique [0002] With the development of blockchain technology and digital currency applications, private keys have become an important part of identity and digital property. For security reasons, the private key should not leave the security chip during the entire life cycle, but if the mobile terminal is lost or damaged, the private key will not be proven and difficult to recover. Therefore, there is an increasingly strong demand for storing private keys in security chips (such as SE modules) of mobile terminals. [0003] Therefore, we need to use the threshold scheme to design a private key retrieval method. In general, the threshold scheme can be specifically expressed as a (K, N) threshold scheme, that is, any K of N individuals can provide a key to restore the entire encrypted content, and a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0894
Inventor 吴彦冰周海京张哲李杰
Owner 数字钱包(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products