Block chain distributed dynamic network key generation and encryption method

A technology of key generation and dynamic network, which is applied to the public key and key distribution of secure communication, which can solve problems such as inability to effectively decrypt ciphertext, difficulties in key distribution and management, and easy leakage of shared keys. Reduce the risk of information leakage and cracking, strengthen the ability to resist attacks, and reduce the effect of steps

Active Publication Date: 2020-01-21
HANGZHOU YUNXIANG NETWORK TECH
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption efficiency of the private key cryptosystem is high, but key distribution and management are difficult, especially in the case of establishing and maintaining a shared key between each pair of nodes. Replace the shared key, otherwise the shared key will be easily leaked; the security of the public key cryptosystem is built on the ba

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain distributed dynamic network key generation and encryption method
  • Block chain distributed dynamic network key generation and encryption method
  • Block chain distributed dynamic network key generation and encryption method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050] Specific embodiment 1:

[0051] 2. figure 2 The flow chart of key generation and encryption of the present invention is shown, and the principle of key generation and encryption is shown in the figure, which includes the steps of using public parameters and random coefficients for key generation, selecting a probability algorithm to perform the public and private key matrix and In the process of generating a public-private key pair, adopting this scheme has the advantage of protecting the security of the key. Moreover, this method is only an illustration of a preferred example, but not limited thereto. When implementing the present invention, an algorithm can be designed according to the user's needs, and an implementation aspect such as whether a random coefficient is required or not can be determined. For example, the steps for key generation and encryption are as follows:

[0052] 2.1 Choose a random number r i,j As a public parameter of the key system, verify t...

Example Embodiment

[0062] Specific embodiment 2:

[0063] 3. image 3 The schematic diagram of the key update of the present invention is shown, for example, in the blockchain network 1:

[0064] 3.1 After each receipt of key encryption information, SMN accumulates the number of key generation and encryption times in the list;

[0065] 3.2 After reaching the specified number of times, select an encryption algorithm from the N alternative encryption algorithms to regenerate and encrypt the key, and at the same time update the data information carried by the key accordingly;

[0066] 3.3 After each transaction is completed, the key is regenerated and encrypted, and the list is updated by SMN after verification, and the accumulated key is generated and encrypted at the same time, and then SMN requests the consensus node BP to write into the ledger, and BP completes the package and produces the block to ensure the key Immutable. Among them, in the process of checking the key information, if the r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain distributed dynamic network key generation, encryption and decryption method, which comprises the following steps of: (1) generating and encrypting a key, initializing a network, and starting a key management protocol of a distributed dynamic self-organizing network; (2) after the key management protocol is started, counting the key encryption times, startingto accumulate the key generation and encryption times, updating a key encryption algorithm after the specified times are reached, and waiting for a new round of key generation and encryption operation; and (3) after the secret key is generated and encrypted, broadcasting a message generated by the secret key to the whole network for verification. In order to solve the problem that potential safetyhazards exist due to dynamic changes of a blockchain distributed network, a secret key management protocol is designed, generation and encryption of a secret key are managed, the efficiency of secretkey generation and encryption and decryption processes is guaranteed, an encryption method of an iterative encryption algorithm is designed for attackers to forcibly crack the secret key or launch replay attacks, secret key loss is reduced, and transaction information transmission safety is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of block chain encryption, and in particular relates to a method for generating and encrypting a block chain distributed dynamic network key. Background technique [0002] Blockchain technology includes cryptography technology, smart contract technology, etc. In essence, it is a decentralized database that uses cryptography to form interrelated data blocks of each block into a block chain data structure. Each data block contains a batch of bitcoin network transaction information, which is used to verify its Validity of information and generation of the next block. Compared with traditional centralized technologies, blockchain has no advantages in data transmission, processing, and storage. For example, the system transaction volume per unit time exceeds the carrying capacity of the software and hardware network environment, or exceeds the performance of the weakest node in processing capacity. The transact...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30H04L29/06H04L29/08G06Q40/04
CPCH04L9/0869H04L9/0891H04L9/3033H04L63/12H04L63/123H04L67/1097G06Q40/04
Inventor 黄步添罗春凤周伟华刘振广陈建海
Owner HANGZHOU YUNXIANG NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products