Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Byzantine Fault Tolerant Consensus Method Based on Distributed Key

A Byzantine, distributed technology, applied in the field of Byzantine fault-tolerant consensus based on distributed keys, to achieve the effect of improving efficiency, improving consensus efficiency and improving efficiency

Active Publication Date: 2022-06-03
芽米科技(广州)有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its main purpose is to solve the problem of multi-center key authorization in the consortium chain environment, and on this basis to improve the efficiency of verifying signatures when consensus is reached between nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Byzantine Fault Tolerant Consensus Method Based on Distributed Key
  • A Byzantine Fault Tolerant Consensus Method Based on Distributed Key
  • A Byzantine Fault Tolerant Consensus Method Based on Distributed Key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In the accompanying drawings of the embodiments of the present invention, the same or similar reference numerals correspond to the same or similar components; in the description of the present invention

[0042] S4, after receiving the proposal request, the secondary node verifies the signature of the main node, and then broadcasts the proposal response information through the verification,

[0043] S5, the ordinary node receives the block, and after completing the event trigger, returns to step S3, and re-initializes.

[0044] It can be understood that the present invention needs to determine the role of each node in the system. Divide it into non-bookkeeping and bookkeeping

[0049] S4, after the secondary node receives the proposal request, verify the signature of the main node, and then broadcast the proposal response information through the verification,

[0050] S5, the ordinary node receives the block, and after completing the event trigger, returns to step S3, and r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of security authentication in the discipline of cyberspace security, and relates to a distributed key-based Byzantine fault-tolerant consensus method; the method includes selecting super nodes participating in the consensus, and generating system public parameters; according to the public Parameters, generate system public-private key pairs and public-private keys of candidate nodes through mutual interactive authentication; select the master node from the super nodes to initiate a proposal request, and start a new round of consensus; the sub-nodes perform individual verification and aggregation on the proposal request Verification, to finally determine whether to agree to send the block; after the ordinary node receives the block, the completion time triggers the next round of consensus. In this process, if the secondary node waits for the master node’s proposal request or proposal response to Broadcast the view change request and replace the master node; the invention can greatly improve the efficiency in the consensus process.

Description

A Byzantine Fault Tolerant Consensus Method Based on Distributed Keys technical field The present invention belongs to the security authentication field in cyberspace security discipline, more specifically, relate to a kind of based on Byzantine fault-tolerant consensus method for distributed keys. Background technique [0002] With the rapid development of blockchain technology, there are more and more applications of blockchain. While the technology ensures data security, how to improve the efficiency of reaching consensus between nodes in the consortium chain environment has become an urgent problem to be solved. resolved issue. [0003] Since the nodes of the alliance chain are composed of various related institutions or units, there is no relationship between the nodes that have an interest relationship. mutual trust. Therefore, in the process of reaching a consensus, each node needs to use the public key of the other party to send the message to it. authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08
CPCH04L63/08H04L9/3247H04L9/0861H04L63/1441Y04S40/20
Inventor 唐飞刘文婧马帅
Owner 芽米科技(广州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products