Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain distributed dynamic network key generation and encryption method

A technology of key generation and dynamic network, which is applied to the public key and key distribution of secure communication, which can solve problems such as inability to effectively decrypt ciphertext, difficulties in key distribution and management, and easy leakage of shared keys. Reduce the risk of information leakage and cracking, strengthen the ability to resist attacks, and reduce the effect of steps

Active Publication Date: 2020-01-21
HANGZHOU YUNXIANG NETWORK TECH
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption efficiency of the private key cryptosystem is high, but key distribution and management are difficult, especially in the case of establishing and maintaining a shared key between each pair of nodes. Replace the shared key, otherwise the shared key will be easily leaked; the security of the public key cryptosystem is built on the basis of computational complexity theory, legitimate users can use secret information to recover plaintext from ciphertext, and attackers The ciphertext cannot be effectively decrypted, but the possibility that an encryption algorithm is easily broken in most cases cannot be ruled out, that is, the key encrypted by hash collision may still be broken

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain distributed dynamic network key generation and encryption method
  • Block chain distributed dynamic network key generation and encryption method
  • Block chain distributed dynamic network key generation and encryption method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0051] 2. figure 2 It shows the flow chart of key generation and encryption of the present invention, and the principle of key generation and encryption is shown in the figure, which includes the steps of using public parameters and random coefficients for key generation, selecting a probability algorithm for public-private key matrix and The process of generating the public-private key pair, adopting this scheme has the advantage of protecting the security of the key. Moreover, this manner is only an illustration of a preferred example, but is not limited thereto. When implementing the present invention, it is possible to design an algorithm and determine whether random coefficients are needed or not according to user requirements. For example, the steps for key generation and encryption are as follows:

[0052] 2.1 Choose a random number r i,j As a public parameter of the key system, verify that the random number satisfies Otherwise, continue to step 2.1, where n is th...

specific Embodiment 2

[0063] 3. image 3 It shows the principle diagram of the key update of the present invention, for example, in the block chain network 1:

[0064] 3.1 After receiving key encryption information each time, SMN accumulates key generation and encryption times in the list;

[0065] 3.2 After reaching the specified number of times, select an encryption algorithm from the alternative N encryption algorithms to regenerate and encrypt the key, and at the same time update the data information carried by the key accordingly;

[0066] 3.3 After each transaction is completed, the key is regenerated and encrypted. After passing the verification, the list is updated by SMN, and the cumulative key is generated and encrypted at the same time. Then, SMN requests the consensus node BP to write into the ledger, and BP completes the packaging and blocks to ensure the key Can not be tampered with. Among them, in the process of checking the key information, if the result is true, the data is tempo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain distributed dynamic network key generation, encryption and decryption method, which comprises the following steps of: (1) generating and encrypting a key, initializing a network, and starting a key management protocol of a distributed dynamic self-organizing network; (2) after the key management protocol is started, counting the key encryption times, startingto accumulate the key generation and encryption times, updating a key encryption algorithm after the specified times are reached, and waiting for a new round of key generation and encryption operation; and (3) after the secret key is generated and encrypted, broadcasting a message generated by the secret key to the whole network for verification. In order to solve the problem that potential safetyhazards exist due to dynamic changes of a blockchain distributed network, a secret key management protocol is designed, generation and encryption of a secret key are managed, the efficiency of secretkey generation and encryption and decryption processes is guaranteed, an encryption method of an iterative encryption algorithm is designed for attackers to forcibly crack the secret key or launch replay attacks, secret key loss is reduced, and transaction information transmission safety is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of block chain encryption, and in particular relates to a method for generating and encrypting a block chain distributed dynamic network key. Background technique [0002] Blockchain technology includes cryptography technology, smart contract technology, etc. In essence, it is a decentralized database that uses cryptography to form interrelated data blocks of each block into a block chain data structure. Each data block contains a batch of bitcoin network transaction information, which is used to verify its Validity of information and generation of the next block. Compared with traditional centralized technologies, blockchain has no advantages in data transmission, processing, and storage. For example, the system transaction volume per unit time exceeds the carrying capacity of the software and hardware network environment, or exceeds the performance of the weakest node in processing capacity. The transact...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L29/06H04L29/08G06Q40/04
CPCH04L9/0869H04L9/0891H04L9/3033H04L63/12H04L63/123H04L67/1097G06Q40/04
Inventor 黄步添罗春凤周伟华刘振广陈建海
Owner HANGZHOU YUNXIANG NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products