A Blockchain Weak Center Password Authorization Method Using Attribute Password
An attribute cryptography and blockchain technology, applied in the construction of blockchain weak center cryptographic open authorization services, can solve problems such as single-point bottlenecks, and achieve the effects of reducing losses, facilitating use, and reducing costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The present invention is further described below through specific examples, so that those skilled in the art can better understand the technical and functional characteristics of the present invention, but the protection scope of the present invention is not limited to the following examples.
[0028]In this embodiment, the programming language is JavaScript, GoLang, html, and the browser is chrome.
[0029] The example proposes a total of 3 types of nodes, AA node - CA node - user node. The specific process is:
[0030] 1. Block chain initialization, the process is shown in figure 1 shown.
[0031] 1. The AA node uses DPOS voting to generate some initial public parameters and upload them to the chain, such as the master public key, the total number of AA n, and the voting threshold t: generally the total number of AA* +1; generate the corresponding CA nodes and divide the regions to facilitate future information exchange, and configure the CA node certificate appli...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


