A Secure Consensus Method Based on Delegated Proof-of-Stake Protocol in Heterogeneous Environment

A share certificate, environmental technology, applied in data processing applications, finance, instruments, etc., can solve the problems of unable to meet user communication requirements, inactive voting, bribery and other problems

Active Publication Date: 2022-07-05
SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Before 2010, users communicated based on the same cryptographic system, based on the public key infrastructure environment, or based on the identity encryption environment, or based on the certificateless encryption environment, but with the development of communication technology, communication parties around the world use different passwords The system, therefore, only communicates in one environment and can no longer meet the user's communication requirements
However, there are problems of bribery and inactive voting in the existing DPoS consensus agreement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Secure Consensus Method Based on Delegated Proof-of-Stake Protocol in Heterogeneous Environment
  • A Secure Consensus Method Based on Delegated Proof-of-Stake Protocol in Heterogeneous Environment
  • A Secure Consensus Method Based on Delegated Proof-of-Stake Protocol in Heterogeneous Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0044] The embodiment is: if the stake holder node is in a public key infrastructure cryptographic system, and the vote counting node is in an identity-based encryption cryptographic system;

[0045] The specific steps of the embodiment involved in the present invention are a security consensus method based on a delegated share certificate protocol in a heterogeneous environment, including the following steps:

[0046] Step 1: In the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security consensus method based on a delegated share certification protocol in a heterogeneous environment. In the present invention, the node registers to obtain the common node, checks its rights and interests, and obtains the rights holder node. The registered node scans to obtain the list of stakeholder nodes and the list of witness candidate nodes. Query the address of the stakeholder node and get confirmation of sending a blank vote. Add data items, get votes. Stakeholder nodes vote to select a node in the list of witness candidate nodes, and as a result, one of the nodes is selected. After the stake holder node generates a signature, it sends the signature and votes to the counting node. By processing invalid votes, the vote counting node obtains and publishes the results of the vote counting, and publishes the votes and signatures, and copies of the votes and signatures. Get blocks to form a blockchain. The invention realizes authentication, secrecy, anonymity, fairness, anti-threat, verifiability, and no receipt, and achieves certain security and privacy requirements.

Description

technical field [0001] The invention belongs to the technical field of user communication security, and in particular relates to a security consensus method based on an entrusted share certification protocol in a heterogeneous environment. Background technique [0002] Public key cryptography (Public Key Infrastructure, PKI) is the main means of deploying traditional public key cryptography (Public Key Cryptography, PKC). The binding relationship is obtained in the form of a digital certificate, and the certificate is issued by a trusted certificate authority (Certificate Authority, CA) for the user. The certificate authority first verifies the identity of the user, and then issues the certificate after confirming the authenticity. [0003] Based on identity based cryptography (IBC), in order to simplify the problem of certificate management, Shamir first proposed the concept of identity-based public key cryptography (ID-PKC) in 1984, pointing out that the authenticity of k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G06Q40/04
CPCG06F21/64G06Q40/04
Inventor 孟博王潇潇王德军王俊
Owner SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products