Anti-quantum computing blockchain transaction method based on asymmetric key pool
A technology of quantum computing and transaction methods, which is applied in the blockchain field and can solve problems such as cracking and blockchain system cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Take a transaction from client A to client B as an example. The initiating client is client A and the receiving client is client B. The specific steps of the transaction are as follows: figure 1 As shown, the specific steps are as follows:
[0033] Step 1: Initiate a transaction request from the client, namely, the client A: When initiating the transaction, the transaction initiator, the client A, needs to use his private key ka to sign the transaction.
[0034] Step 1.1: Obtain the public key of the initiating client:
[0035] Such as figure 2 As shown in figure 2 The transfer private key in is the private key ka of client A; figure 2 The transfer public key in is the public key kpa of client A;
[0036] The public key kpa is obtained from the public key pointer random number rka of user A, the process is as follows Figure 4 As shown, the specific steps are as follows:
[0037] Use your own public key pointer random number rk combined with a specific public key pointer func...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


