Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing private key backup, loss reporting and recovery method and system based on alliance chain and identity cryptography

An identity password and recovery method technology, applied in the field of loss reporting and recovery methods and systems, and anti-quantum computing private key backup field, can solve problems such as disappearance, inability to resist Trojan or hacker attacks, and core nodes being too large to avoid leakage.

Active Publication Date: 2020-03-27
RUBAN QUANTUM TECH CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The mainstream methods for storing and using the private key of the existing blockchain cannot resist the attacks of Trojan horses or hackers, and none of them consider key retrieval
In case the private key is lost, the corresponding bitcoin or other rights will disappear forever
[0006] 2. The existing method of backing up the private key by means of platform hosting, when the user key is lost, the core node needs to be entrusted to retrieve the private key, which gives the core node too much power and cannot meet customer needs
[0007] 3. The user's blockchain private key can be stored in electronic devices, but once lost or information is stolen, the blockchain private key will be lost, which will have a significant impact on the user's property security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing private key backup, loss reporting and recovery method and system based on alliance chain and identity cryptography
  • Anti-quantum computing private key backup, loss reporting and recovery method and system based on alliance chain and identity cryptography
  • Anti-quantum computing private key backup, loss reporting and recovery method and system based on alliance chain and identity cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] Example 1: Private key backup process:

[0099] Step 1: User proposes a transaction.

[0100] Suppose the ID value of the n backup key cards of the Client is IDUk, and the stored asymmetric key pair is PKUk / SKUk, 1≤k≤n. For each IDUk, take the public key pointer random number RUTk, get the public key random number from the public key pool through the pointer function and calculate the public key RUUTk. The client takes out the corresponding public key random number RUk in the key card of the IDUk, and this process is performed under safe conditions, such as copying through a secure storage medium or a secure data interface connection. Client obtains the public key PKUk corresponding to IDUk according to PKUk=H(RUk), and uses PKUk to encrypt the SKU based on ID cryptography (see references

[0101] "Identity-Based Encryption from the Weil Pairing"), that is, ENC (SKU, PKUk), to obtain the ciphertext (EUk, EVk).

[0102] Client sends transaction tx to n Endorsers, and ...

Embodiment 2

[0128] Example 2: Private key loss report and recovery process:

[0129] After the key card whose identity is IDU is lost, the user uses the key card whose identity is IDUi to execute this process.

[0130] When the private key SKU of the user Client is lost, use the kth key card (ID is IDUk, public and private key is PKUk / SKUk) to report the loss of the private key and recover the private key.

[0131] Find the corresponding public key random number RE in the key card according to the ID of the Endorser, obtain the public key PKE of the Endorser according to PKE=H(RE), and then use PKE to encrypt RUk based on ID cryptography to obtain the ciphertext txdata= ENC(RUk, PKE) = (txdataU, txdataV). Take the public key pointer random number RPKtxdataU, get the public key random number from the public key pool through the pointer function and calculate the public key PKtxdataU. Offset txdata to get txdata'=RPKtxdataU||(txdataU-PKtxdataU, txdataV).

[0132] Client sends transaction...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-quantum computing private key backup, loss reporting and recovery method and system based on an alliance chain and identity cryptography. The method is implemented among alliance chain members communicating with each other. The alliance chain members comprise client members and server members, each party is configured with a key fob; all the key cards store respective private keys and public key pools related to all alliance chain members; public key units in one-to-one correspondence with the alliance chain members are stored in the public key pool; the publickey unit comprises a user name corresponding to an alliance chain member, a current identity identifier, a public key random number, a backup identity identifier list and an invalid identity identifier column; and obtaining a corresponding public key unit in the public key pool according to the user name of the alliance chain member, and obtaining a public key of the alliance chain member according to a public key random number in the public key unit. By adopting the method, the protection of a private key can be improved.

Description

technical field [0001] The present application relates to the technical field of secure communication, in particular to a quantum computing-resistant private key backup, loss report and recovery method and system based on alliance chain and identity cryptography. Background technique [0002] Blockchain is a brand-new distributed infrastructure and computing paradigm. It uses an ordered chained data structure to store data, uses consensus algorithms to update data, and uses cryptography to ensure data security. In blockchain-based transactions, ensuring the data security of transactions and the privacy of customers is a necessary condition for the further development of blockchain. For this reason, cryptography technology, especially public key cryptography, has been widely used in blockchain. The alliance chain is a branch of the blockchain, so it is also a distributed and decentralized public database. The difference from other chains is that it is aimed at members of spe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06N10/00G06F21/46G06F21/60
CPCG06N10/00G06F21/46G06F21/602G06F21/606
Inventor 富尧钟一民汪仲祥
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products