Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key generation method and device, storage medium and electronic equipment

A technology of key generation and key generation center, which is applied in the blockchain field and can solve problems such as leakage and theft of user keys and reduction of user key security

Active Publication Date: 2021-01-29
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventor found that the KGC is used in the IBC system to generate user keys to realize centralized management of user keys. Although this method simplifies the process of generating user keys, when KGC is attacked, the user keys it manages will face The risk of leakage and theft reduces the security of user keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key generation method and device, storage medium and electronic equipment
  • Secret key generation method and device, storage medium and electronic equipment
  • Secret key generation method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

application example 1

[0143] When the user requests to generate an encryption key, for the encryption and decryption process, the main KGC and the secondary KGC respectively generate their own encryption master key pair, and generate an intermediate key for the user to encrypt, and finally the user assembles the user's encrypted private key. key. Subsequent user U A ID A and the master public key P of the master KGC pub-e , the primary public key P of each secondary KGC pub-ei Encrypted, using the identity identifier ID A and user private key de A Decryption; wherein, the user is the user node in the above example; the main KGC is the main KGC node in the above example; the secondary KGC is the secondary KGC node in the above example.

[0144] When receiving the private key distribution request sent by the user, the private key distribution request is specifically a request to distribute an encryption key, and the master KGC invokes the Create KGC-key service to generate a master-public-privat...

application example 2

[0177] It should be noted that some descriptions in the application example 2 may refer to the content in the application example 1, and details will not be repeated in the application example 2.

[0178] When the user requests to generate a signature key, for the signature verification process, the main KGC and the secondary KGC respectively generate their own signature master key pair, and generate an intermediate key for the user to sign, and finally the user assembles the user signature private key. Subsequent user U A ID A and user private key ds A To sign, use the identity identifier ID A and the master public key P of the master KGC pub-s , each vice P pub-si Check the signature.

[0179] When receiving the private key distribution request sent by the user, the private key distribution request is specifically a request to distribute the signature key, and the master KGC invokes the Create KGC-key service to generate the master-public-private key pair (ks 0 ,P pu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret key generation method and device, a storage medium and electronic equipment, which are applied to a blockchain secret key generation system, the blockchain secret key generation system comprises a master secret key generation center node and at least one auxiliary secret key generation center node, and the method comprises the following steps: when a private key distribution request sent by a user node is received, the master secret key generation center node is triggered to send a generated main intermediate private key to a user node; the user node sends the generated obfuscated data to each auxiliary secret key generation center node for verification, and when the verification result of each auxiliary key generation center node on the obfuscated data is that the verification result is passed, the sub-intermediate private key generated by each auxiliary key generation center node is sent to the user node for verification; and a user private key is generated when the verification result of the user node on each sub-intermediate private key is passed. According to the invention, the master secret key generation center node and the plurality of auxiliary key generation center nodes are arranged, so that decentralization processing is realized, and the leakage risk of the user key is reduced.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a method and device for generating a key, a storage medium and electronic equipment. Background technique [0002] With the development and wide application of blockchain technology, people are paying more and more attention to the security of their private data in the blockchain to ensure the privacy and security of user data, and the key is an important part of improving its security. In order to improve the security of data privacy, it is usually necessary to provide users with keys to encrypt data. There are many ways to provide users with keys. In recent years, Identity-Based Cryptograph (IBC) has become a key technology in cryptography. Popular research in . [0003] The IBC system can generate the user's key and manage the user's key based on the reliable Key Generation Center (KGC) based on the user's identification information. The user's identification inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/085H04L9/0825
Inventor 朱江王森杨天雅
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products