Methods and Systems For Blockchain-Implemented Event-Lock Encryption

An encryption scheme and password technology, applied in the field of distributed systems, can solve problems such as attacks

Pending Publication Date: 2020-04-10
NCHAIN HLDG LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Extended feature sets that rely on the blockchain can be exploited by malicious parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and Systems For Blockchain-Implemented Event-Lock Encryption
  • Methods and Systems For Blockchain-Implemented Event-Lock Encryption
  • Methods and Systems For Blockchain-Implemented Event-Lock Encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] blockchain network

[0043] first reference figure 1 . figure 1 An exemplary blockchain network 100 associated with a blockchain is shown in block diagram form. A blockchain network can be a public blockchain network, which is a peer-to-peer open membership network in which anyone can join without invitation or consent from other members. Distributed electronic devices running instances of the blockchain protocol under which the blockchain network 100 operates may participate in the blockchain network 100 . Such distributed electronic devices may be referred to as nodes 102 . The blockchain protocol can be, for example, the Bitcoin protocol.

[0044] The electronic devices that run the blockchain protocol and form the nodes 102 of the blockchain network 100 can be various types of devices including, for example, desktop computers, laptop computers, tablet computers, servers, mobile devices such as smart phones, such as Wearable computers like smart watches, or othe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

There may be provided a computer-implemented method. It may be implemented at least in part using a blockchain network such as, for example, the Bitcoin network. The computer-implemented method includes: i) encrypting a plaintext message to a cryptographic public key in accordance with an identity-based encryption scheme using at least a congress public key to generate an encrypted message, wherein the congress public key is associated with members of a congress, respective members of the congress having access to private key shares usable in a threshold decryption scheme in which at least a threshold of private key shares are sufficient to derive a decryption key through the combination of partial contributions to the decryption key on behalf of the congress; ii) generating, using at least a cryptographic private key corresponding to the cryptographic public key, a digital signature over a first set of instructions to perform cryptographic operations upon an occurrence of an event; and iii) broadcasting one or more transactions to a proof-of-work blockchain network, the one or more transactions comprising the encrypted message, the cryptographic public key, at least the first setof instructions, and a second set of instructions to the members of the congress to cooperate to: in response to reaching a consensus on the event occurring and contingent upon the digital signature being authentic, deploy a ghost chain to perform the first set of instructions, wherein performing the first set of instructions includes at least deriving the decryption key from the cryptographic keyand a plurality of private key shares that satisfies the threshold, the decryption key being sufficient cryptographic material to obtain the plaintext message from the encrypted message.

Description

technical field [0001] The present invention relates generally to distributed systems, and more particularly to methods and systems for event-locked operations in transactions on distributed systems. Event-locking and event-locking encryption can mean manipulating data in response to the occurrence of an event—for example, under an event-locking encryption scheme, a ciphertext message can be decrypted in response to the occurrence of an event. A specific type of event-locked encryption is a time-locked encryption scheme, in which a message is encrypted and then, after a certain amount of time has elapsed, the encrypted message is decrypted or made decipherable. The present invention is particularly suited, but not limited to, efficiently and reliably generating messages, detecting the occurrence of events, and operating in response to using a distributed system to verify the occurrence of events. For example, a message may be encrypted under a time-lock encryption scheme, whe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32G06Q20/38H04W12/06
CPCG06Q20/3829G06Q20/389H04L9/0847H04L9/085H04L9/3073H04L9/3255H04L9/3236H04L9/3297H04W12/06H04L2209/56H04L9/0825H04L9/50
Inventor J·弗莱彻
Owner NCHAIN HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products