Block chain distributed dynamic network key generation and encryption method
A technology of key generation and dynamic network, which is applied to the public key and key distribution of secure communication, which can solve problems such as inability to effectively decrypt ciphertext, difficulties in key distribution and management, and easy leakage of shared keys. Reduce the risk of information leakage and cracking, strengthen the ability to resist attacks, and reduce the effect of steps
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0050] Specific embodiment 1:
[0051] 2. figure 2 The flow chart of key generation and encryption of the present invention is shown, and the principle of key generation and encryption is shown in the figure, which includes the steps of using public parameters and random coefficients for key generation, selecting a probability algorithm to perform the public and private key matrix and In the process of generating a public-private key pair, adopting this scheme has the advantage of protecting the security of the key. Moreover, this method is only an illustration of a preferred example, but not limited thereto. When implementing the present invention, an algorithm can be designed according to the user's needs, and an implementation aspect such as whether a random coefficient is required or not can be determined. For example, the steps for key generation and encryption are as follows:
[0052] 2.1 Choose a random number r i,j As a public parameter of the key system, verify t...
Example Embodiment
[0062] Specific embodiment 2:
[0063] 3. image 3 The schematic diagram of the key update of the present invention is shown, for example, in the blockchain network 1:
[0064] 3.1 After each receipt of key encryption information, SMN accumulates the number of key generation and encryption times in the list;
[0065] 3.2 After reaching the specified number of times, select an encryption algorithm from the N alternative encryption algorithms to regenerate and encrypt the key, and at the same time update the data information carried by the key accordingly;
[0066] 3.3 After each transaction is completed, the key is regenerated and encrypted, and the list is updated by SMN after verification, and the accumulated key is generated and encrypted at the same time, and then SMN requests the consensus node BP to write into the ledger, and BP completes the package and produces the block to ensure the key Immutable. Among them, in the process of checking the key information, if the r...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap