Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum-computing blockchain secret transaction system and anti-quantum-computing blockchain secret transaction methods based on P2P (Peer-to-Peer) symmetric key pools

A technology of quantum computing and transaction methods, applied in the field of blockchain, which can solve the problems of unencrypted, cracked, and occupied blockchain transmission and storage.

Inactive Publication Date: 2019-03-29
RUBAN QUANTUM TECH CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) Each client stores the symmetric key pool in the key card, which takes up a lot of space
[0007] (2) In the existing technology, the transmission and storage of the blockchain are not encrypted
[0008] (3) Since the quantum computer can quickly obtain the corresponding private key through the public key, the existing blockchain transaction method is easily cracked by the quantum computer
[0009] (4) In the existing technology, the input and output of digital signatures based on public and private keys can be known by the enemy. In the presence of quantum computers, the private key may be deduced, causing the blockchain system to be cracked by quantum computers
[0010] (5) In the existing technology, the disclosure of the transfer-in wallet address and transfer-in amount in blockchain transactions may expose user privacy information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum-computing blockchain secret transaction system and anti-quantum-computing blockchain secret transaction methods based on P2P (Peer-to-Peer) symmetric key pools
  • Anti-quantum-computing blockchain secret transaction system and anti-quantum-computing blockchain secret transaction methods based on P2P (Peer-to-Peer) symmetric key pools
  • Anti-quantum-computing blockchain secret transaction system and anti-quantum-computing blockchain secret transaction methods based on P2P (Peer-to-Peer) symmetric key pools

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0038] The system structure is as figure 1 As shown, each user, as a node of the blockchain, has a corresponding blockchain application and is equipped with a key card. There are u key cards, and each key card stores the user's public key PK and private key SK; the key card is called by the blockchain application, and the key does not come out of the key card.

[0039] P2P storage network structure such as figure 2 As shown, there are z symmetric key pools whose ID is KID=Ki (i=1~z). The symmetric key pools are respectively encrypted with z symmetric keys KKi (i=1~z), all of which are true random numbers, preferably quantum random numbers. Each KKi (i=1~z) is encrypted by u PKi (i=1~u). All data in the P2P storage network is uploaded by the user or the key card issuer, and the P2P storage network cannot be decrypted.

[0040] The specific steps of the transaction are as follows:

[0041] Step 1.1 generate unsigned transaction RTx:;

[0042] Before initiating a transacti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-quantum-computing blockchain secret transaction system and anti-quantum-computing blockchain secret transaction methods based on P2P symmetric key pools. The system includes multiple user ends and a P2P storage network. Each user end configures a quantum key card, the P2P storage network configures the symmetric key pools, an initiating user end generates a specific function value, the same is combined with a private key of the local side to generate a transaction signature, and the initiating user end encrypts the transaction signature, and sends the same ontoa blockchain. A verifying user end generates a specific function value, the specific function value is combined with a key card of the local side and ID of a symmetric key pool to generate a key, anda transaction signature is obtained by decrypting of the key, then comparison with the specific function value is carried out, transaction verifying is realized, the P2P storage network stores the symmetric key pools, the P2P storage network has no central node, thus system security is improved, burdens of the user ends are also alleviated, setting of the key cards greatly reduces possibility ofstealing keys by malicious software, and a quantum computer cannot obtain a user public key, and thus cannot obtain a corresponding private key.

Description

technical field [0001] The invention relates to the field of block chains, in particular to a quantum computing-resistant block chain confidential transaction system and method based on a P2P symmetric key pool. Background technique [0002] Blockchain is a brand-new distributed infrastructure and computing paradigm. It uses an ordered chained data structure to store data, uses consensus algorithms to update data, and uses cryptography to ensure data security. In blockchain-based transactions, ensuring the data security of transactions and the privacy of customers is a necessary condition for the further development of blockchain. For this reason, cryptography technology, especially public key cryptography, has been widely used in blockchain. [0003] P2P storage is a kind of network storage based on P2P (Peer-to-Peer) technology, which organizes many machines in a peer-to-peer manner to provide users with large-capacity data storage services. This technology is the produc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/32H04L29/08
CPCH04L9/0869H04L9/3236H04L9/3247H04L63/0435H04L63/06H04L67/104
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More