Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-quantum computing blockchain transaction method based on asymmetric key pool

A technology of quantum computing and transaction methods, which is applied in the blockchain field and can solve problems such as cracking and blockchain system cracking

Active Publication Date: 2020-11-17
RUBAN QUANTUM TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Since the quantum computer can quickly obtain the corresponding private key through the public key, the existing blockchain transaction method is easily cracked by the quantum computer
[0006] (2) In the existing technology, the input and output of digital signatures based on public and private keys can be known by the enemy. In the presence of quantum computers, the private key may be deduced, causing the blockchain system to be cracked by quantum computers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing blockchain transaction method based on asymmetric key pool
  • Anti-quantum computing blockchain transaction method based on asymmetric key pool
  • Anti-quantum computing blockchain transaction method based on asymmetric key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Take a transaction from client A to client B as an example. The initiating client is client A and the receiving client is client B. The specific steps of the transaction are as follows: figure 1 As shown, the specific steps are as follows:

[0033] Step 1: Initiate a transaction request from the client, namely, the client A: When initiating the transaction, the transaction initiator, the client A, needs to use his private key ka to sign the transaction.

[0034] Step 1.1: Obtain the public key of the initiating client:

[0035] Such as figure 2 As shown in figure 2 The transfer private key in is the private key ka of client A; figure 2 The transfer public key in is the public key kpa of client A;

[0036] The public key kpa is obtained from the public key pointer random number rka of user A, the process is as follows Figure 4 As shown, the specific steps are as follows:

[0037] Use your own public key pointer random number rk combined with a specific public key pointer func...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-quantum computing block chain transaction method based on an asymmetric key pool, including multiple clients. The same key pool is stored in the quantum key card configured at each user side; and the initiating user end uploads the signed transaction to the network platform, the receiving user end for transaction verification combines the public key pointer random number of the initiating user end with the own secret key pool to extract the public key of the initiating user end so as to extract and transfer out the signature, and the transaction verification isrealized through the transfer-out signature. A quantum key card is used for storing and disclosing a public key, the quantum key card is independent hardware isolation equipment, the possibility thatthe key is stolen by malicious software or malicious operation is reduced, then a corresponding private key is protected, a digital signature based on the public key and the private key is further encrypted by a random number key, and the random number key is encrypted by the private key to form an encrypted digital signature. Even in the presence of a quantum computer, it is difficult to derive the private key, so that the scheme is not easily cracked by the quantum computer.

Description

Technical field [0001] The present invention relates to the field of block chains, in particular to a transaction method of block chains. Background technique [0002] Blockchain is a brand new distributed infrastructure and computing paradigm. It uses an orderly chained data structure to store data, uses consensus algorithms to update data, and uses cryptography to ensure data security. In blockchain-based transactions, ensuring transaction data security and customer privacy is a necessary condition for the further development of blockchain. For this reason, cryptography technology, especially public key cryptography, has been widely used in blockchain. [0003] As most people know, quantum computers have great potential for password cracking. Today's mainstream asymmetric (public key) encryption algorithms, such as RSA encryption algorithms, are mostly based on the two mathematical problems of factorization of large integers or the calculation of discrete logarithms over finite...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/38G06Q20/36G06Q20/40H04L9/00H04L9/08H04L9/30
CPCG06Q20/367G06Q20/3825G06Q20/3827G06Q20/3829G06Q20/401H04L9/002H04L9/0852H04L9/3006
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD