Alliance chain node secret-key distribution and backup system by improved BIP protocol

A secret key and node technology, which is applied in the field of alliance chain node secret key distribution and backup system, can solve the problems of NVP node secret key distribution and backup complexity, inconvenient management, etc., and achieve the effect of protecting privacy and ensuring security

Active Publication Date: 2019-03-29
BEIJING UNIV OF TECH
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that in a single organization in the alliance chain network, one VP node has multiple NVP nodes, the NVP node secret key distribution and b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alliance chain node secret-key distribution and backup system by improved BIP protocol
  • Alliance chain node secret-key distribution and backup system by improved BIP protocol
  • Alliance chain node secret-key distribution and backup system by improved BIP protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in detail below in conjunction with the specific embodiments shown in the drawings.

[0044] figure 1 It is a schematic diagram of the structure of the alliance chain node secret key distribution and backup system that improves the BIP protocol of the present invention, such as figure 1 Shown, including:

[0045] The seed building module is connected to the seed backup sub-module in the secret key derivation and secret key backup module. The key seed is the core of key derivation and key recovery, and seed generation is also the initial step of this method. The current organization identification code is input through the VP node, and the seed is obtained after three hash operations in the seed building module. In the encryption process, the first 64 bits of the third hash result are extracted as the seed check bit, which is used to verify the correctness and integrity of the seed when the secret key is restored. The double-hash hash...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an alliance chain node secret-key distribution and backup system by an improved BIP protocol. The method comprises four parts including a seed construction module, a secret-key derivative module, a secret-key backup module and a secret-key recovery module, wherein the seed construction module is used for generating a secret-key seed organized in an alliance chain network;the secret-key derivative module is used for calculating an NVP node secret-key pair by using the secret-key seed, and comprises two parts including NVP node secret-key derivation and NVP public-key calculation; the secret-key backup module is used for backing up the secret-key seed and an index sequence input by an NVP node in the secret-key derivative module, and comprises a seed backup module and a derivative index backup module; and the secret-key recovery module is used for recovering the secret key of the NVP node after the secret key of the NVP node is lost, and comprises three parts including a seed recovery sub-module, an index recovery sub-module and a secret-key recovery sub-module. The invention creates a safe and reliable secret-key relationship system, which can safely generate seeds and store backup; and multi-secret-key extension is supported.

Description

Technical field [0001] The present invention relates to the technical field of block chains, in particular to an improved BIP protocol-improved alliance chain node secret key distribution and backup system. Background technique [0002] The self-trust of the blockchain is mainly reflected in the fact that users distributed in the blockchain do not need to trust the other party of the transaction, nor do they need to trust a centralized organization, only need to trust the software system under the blockchain protocol to realize the transaction. The premise of this self-trust is the consensus mechanism of the blockchain, that is, in a mutual distrust market, the necessary and sufficient condition for each node to reach agreement is that each node is motivated to maximize its own interests. In consideration, they will spontaneously and honestly abide by the pre-set rules in the agreement, judge the authenticity of each record, and finally record the judged true record in the blockc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L9/06
CPCH04L9/0631H04L9/0866H04L9/3066H04L9/3239H04L9/3242
Inventor 徐旭东宋世昕陈依然姬庆庆
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products