Key generation methods, block chain network service platform and memory medium

A network service and key generation technology, applied in the field of communication, can solve problems such as poor privacy data security, and achieve the effect of avoiding certificate query

Pending Publication Date: 2019-04-12
BEIJING WODONG TIANJUN INFORMATION TECH CO LTD
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a key generation method, a blockchain network service platform, and a storage medium to solve t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation methods, block chain network service platform and memory medium
  • Key generation methods, block chain network service platform and memory medium
  • Key generation methods, block chain network service platform and memory medium

Examples

Experimental program
Comparison scheme
Effect test

Example

[0147] Example 1: Taking the implementation of the key generation method provided in the embodiment of the present invention based on the ECDSA and BD protocols as an example, the key generation method provided in the embodiment of the present invention will be described in detail:

[0148] Briefly introduce the ECDSA signature algorithm: (1) Signer A generates a public-private key pair (d A ,P A =d A G), where G is the base point of the elliptic curve.

[0149] (2) Signer A generates message M A The signature value of (r A ,s A ): calculate e A =H(M A ), H means for message M A Perform hash operation; generate random number k A , Calculate (x A ,y A )=[k A ]G; Let r A = X A ; Calculate

[0150] (3) Verifier B verifies message M A The signature value of (r A ,s A ): calculate e A =H(M A ); calculation Verify whether r A = X A , To judge whether the signature is valid, where r represents the commitment value in the signature result, and s represents the proof value in the signature r...

Example

[0154] Example 2: Taking the implementation of the key generation method provided in the embodiment of the present invention based on the SM2 and BD protocols as an example, the key generation method provided in the embodiment of the present invention will be described in detail:

[0155] Briefly introduce the SM2 signature algorithm: (The specific parameter values ​​in the SM2 algorithm can refer to the algorithm flow, recommended curves and parameters in Part 2 and Part 5 of the national secret standard "SM2 Elliptic Curve Public Key Cryptographic Algorithm"):

[0156] (1) Signer A generates a public-private key pair (d A ,P A =d A G), where G is the base point of the elliptic curve.

[0157] (2) Signer A generates message M A The signature value of (r A ,s A ):make Where Z A It is the SM3 hash value of information such as identification, curve parameter, base point parameter and signer’s public key, || represents the connection of the left and right data; calculation Generate ran...

Example

[0162] Example 3: Taking the Schnorr and BD protocols to implement the key generation method provided in the embodiment of the present invention as an example, the key generation method provided in the embodiment of the present invention will be described in detail:

[0163] Briefly introduce the Schnorr signature algorithm: (1) Signer A generates a public-private key pair Where g is the group generator.

[0164] (2) Signer A uses private key x A And message m A As input, the signature value (s A ,e A ), where e A =H(r A ||m A ), s A =k A -e A x A , k A Is the random value chosen by the signer, and H is the hash function.

[0165] (3) Verifier B uses the signature value (s A ,e A ) And signer A's public key y A For input, verify that To determine whether the signature is valid.

[0166] The group key generation method based on BD protocol and Schnorr includes: (1) Participant U i The corresponding signature result is (s i ,e i ), first calculate your own temporary private key, k i =...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention provide key generation methods, a blockchain network service platform and a memory medium. A method is applied to the blockchain network service platform. The blockchain network service platform comprises a group. The group comprises at least three nodes which participating in transaction within the blockchain network service platform. The method comprises the steps of obtaining a cochain signing result corresponding to the group if the transaction participated in by the at least three nodes is finished, wherein the cochain signing result comprises a signing result of each node in the at least three nodes; and computing a group key of the group based on the cochain signing result through utilization of a first node, wherein the group key of the group is used for encrypting data when the data is transmitted, and the first node is any node in the at least three nodes.

Description

technical field [0001] The present invention relates to communication technology, in particular to a key generation method, a block chain network service platform and a storage medium. Background technique [0002] Blockchain technology and its applications are disrupting existing business models. All walks of life are actively exploring the realization of their business in the blockchain network, including financial institutions, government departments, traditional enterprises, Internet companies and so on. The blockchain system is publicly visible, non-tamperable, and non-forgeable. It is widely used in digital currency, supply chain and other fields. It can prevent malicious behavior of central nodes, increase the transparency and credibility of transactions, and promote the circulation of digital assets. , Data information security. [0003] Cryptographic algorithms and security protocols, as important functional modules of the blockchain, effectively guarantee the nor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0833H04L9/0861H04L9/3247H04L9/3252H04L63/0435H04L63/065
Inventor 张林黄海泉魏倩文孙海波
Owner BEIJING WODONG TIANJUN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products