Blockchain high concurrent signature verification method and system based on trusted secret key system
A block chain and secret key technology, which is applied in the blockchain high-concurrency signature verification method and system field based on the trusted secret key system, can solve the problem that nodes cannot respond to the outside world, the performance loss of the block chain is huge, and the impact Use experience and other issues to achieve the effect of improving signature verification efficiency, improving concurrency capabilities, and improving overall response speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0055] like figure 1 As shown, Embodiment 1 of the present disclosure provides a blockchain high-concurrency signature verification method based on a trusted secret key system, which includes four steps, namely: signature operation, signature verification operation, cache maintenance, and cache health check .
[0056] Step 1: Signature Operation
[0057] like figure 1 As shown, the chain node receives data that needs to be signed from external applications or other nodes, calls the signature method in the signature verification device, and then returns the signature result to the chain node.
[0058] Step 2: Signature verification operation
[0059] like figure 2 As shown, the chain node receives the data that needs to be verified from external applications or other nodes, and first determines whether the signature has been verified and exists in its own cache according to the identifier held by the data to be verified. If it exists, it will directly return the verificati...
Embodiment 2
[0070] like Figure 4 , Figure 5 and Image 6 As shown, Embodiment 2 of the present disclosure provides a blockchain high-concurrency signature verification system based on a trusted secret key system, including a signature verification device and at least two block nodes, each of which is connected to the signature verification device. communication connection;
[0071] Both the node and the signature verification device include a cache for storing the verified data. When the node and the signature verification device receive a signature verification request, if there is this piece of data that has been verified in the cache, the verification result will be directly stored. return to the caller;
[0072] Otherwise, the signature verification device performs signature verification on the data sent by the node, returns the result to the node, and saves the result in the cache, and the node saves the signature verification data in the cache for direct acquisition when the ne...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


