Computer implemented system and method for distributing shares of digitally signed data

A computer, share technology, applied in the field of secret sharing, that can solve problems that do not scale well, have no sorting or organization, etc.

Pending Publication Date: 2021-06-08
NCHAIN HLDG LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Existing secret sharing techniques, such as the threshold signature process, do not scale well because the resulting private keys are packed into data structures with little or no ordering or organization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer implemented system and method for distributing shares of digitally signed data
  • Computer implemented system and method for distributing shares of digitally signed data
  • Computer implemented system and method for distributing shares of digitally signed data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] refer to figure 1 , which describes the process of distributing shares of a digitally signed message among multiple participants. Initially, digital information m (where m is the hash of information M such as a blockchain transaction) is input to the Elliptic Curve Digital Signature Algorithm (ECDSA) in step 10 . Those skilled in the art will appreciate that ECDSA generates public and private key pairs and ephemeral keys as random integers and provides digital signatures (r, s) in a manner described in more detail below. In a mapping step 20, the digital signature (r, s) is mapped to elliptic curve points of the elliptic curve cryptosystem shared by the participants. Then, a first encryption step 30 in the form of the knapsack algorithm is applied to the elliptic curve points generated in step 20 to generate an encrypted version (R,S) of the digital signature (r,s); using elliptic curve cryptography ( A second encryption step 40 in the form of ECC) encryption is appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer-implemented method of distributing a shared secret, such as a transaction on the Bitcoin blockchain among a plurality of participants is disclosed. The method comprise a mapping step wherein a plurality of inputs to the mapping step are mapped to respective elliptic curve points of an elliptic curve of an elliptic curve cryptography system common to the participants. In a first encryption step, a plurality of said elliptic curve points are encrypted by means of a public key of a public-private key pair of the elliptic curve cryptography system to provide an output adapted to be decrypted by means of the corresponding private key of the public-private key pair, and in a second encryption step wherein a plurality of parts of at least one input to said second encryption step are multiplied by respective terms of a series known to said participants. In a secret sharing step a plurality of shares of an input to said secret sharing step are distributed to a plurality of said participants such that said input is accessible to a threshold number of said shares and is inaccessible to less than said threshold number of said shares.

Description

technical field [0001] This disclosure relates generally to secret sharing, and more specifically to distributing shares of digitally signed data. The present disclosure is particularly suitable for, but not limited to, distributing shares of signed blockchain transactions. Background technique [0002] In this article, the term "blockchain" encompasses all forms of computer-based electronic distributed ledgers. These ledgers include consensus-based blockchain and transaction chain technologies, permissioned and permissionless ledgers, shared ledgers, and variations thereof. While other blockchain implementations have been proposed and developed, the most widely known application of blockchain technology is the Bitcoin ledger. For convenience and illustrative purposes, reference may be made to Bitcoin in this article. It should be noted, however, that the present disclosure is not limited to use with the Bitcoin blockchain and alternative blockchain implementations and pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L9/14
CPCH04L9/085H04L9/3066H04L9/3255H04L2209/56H04L9/3239H04L9/0894H04L9/50H04L9/3073
Inventor C·S·赖特
Owner NCHAIN HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products