Threshold signature method, system, device and storage medium based on aggregated multi-signature

A threshold, signature public key technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as long transaction confirmation time and high transaction costs, reduce transaction costs, improve signature efficiency, and improve The effect of privacy

Active Publication Date: 2021-12-17
杭州链网科技有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Multi-signature signatures are usually implemented using on-chain contracts, so there are disadvantages: higher transaction fees need to be paid and longer transaction confirmation time caused by multi-person asynchronous signatures
Despite the above successes, and despite being a widely used standard, DSA / ECDSA has resisted attempts to build efficient protocols for threshold signatures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threshold signature method, system, device and storage medium based on aggregated multi-signature
  • Threshold signature method, system, device and storage medium based on aggregated multi-signature
  • Threshold signature method, system, device and storage medium based on aggregated multi-signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] The present invention proposes a threshold signature method based on aggregated multi-signature, and provides a threshold signature method in the architecture block chain based on sr25519 protocol (for example, Substrate supports sr25519 and Schnower's multi-signature, but does not support threshold signature), and its overall structure flow Such as figure 1 As shown, the threshold signature is completed on the basis of aggregated multi-signatures combined with the Merkle tree structure of the MAST structure, where n signature nodes are deployed in the blockchain network for multi-signature transactions on the chain, and m is The threshold of the supported threshold signature, where n≥m; each signature node among the n signature nodes generates a pair of public-private key pairs for transaction signature, and the private key is used as its second random private key; the public key is used as the second signature public key.

[0070] The specific steps are as follows: ...

Embodiment 2

[0087]In this embodiment, the threshold signature method of the present invention is described from the specific implementation method, specifically as follows:

[0088] (1) Create a Merkle tree structure of the MAST structure and create a threshold signature address:

[0089] To create a multi-signature with a threshold of m in n signature nodes (n≥m), first calculate the second aggregated public key C formed by n signature nodes:

[0090] C = hash(L,PK 1 ’) PK 1 ’+…+ hash(L,PK i ’) PK i ’+…+ hash(L,PK n ’) PK n ');

[0091] Where L is the list of public keys: L={PK 1 ’,…,PK i ’, …,PK n ’} represents an ordered set of all public keys involved in the signature process;

[0092] Second signature public key PK i '=sk i ’·G (G is the base point of the unified elliptic curve); sk i ’ is the second random private key of the signing node; i is any one of the n signing nodes.

[0093] In order to realize a multi-signature with a threshold of m among n nodes, the public ...

Embodiment 3

[0121] In this embodiment, the signing public key and temporary public key are sent between the signing nodes involved in generating the aggregated public key and the signature generated by the signing public key is sent between the signing nodes involved in the aggregated signature process. The transmission is encrypted using an encrypted communication protocol, and a communication server is set up between each signing node to store the updated shared key and transmit the encrypted message ciphertext:

[0122] Such as image 3 As shown, the signature public key of the signature node is used as the initial key. For example, the signature public key or the signature transaction is sent between the signature nodes a and b. The private key of node a is Ska, and the corresponding signature public key is Pa. Node The private key of b is Skb, and the corresponding signature public key is Pb. Node a uses the X3DH algorithm to generate the shared key PK of both signing nodes, and uses...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a threshold signature method, system, device and storage medium based on aggregated multi-signature. The method includes the following steps: selecting m signature nodes based on n signature nodes of the block chain network, and generating an aggregated public key based on the m signature nodes And the aggregated temporary public key, gather all the aggregated public keys to form an aggregated public key combination; create a Merkle tree structure based on the aggregated public key combination, and obtain the Merkle root; generate the second aggregated public key through n signature nodes, and combine the default Kergen derives a threshold signature address; generates a transaction in the threshold signature address, signs the transaction at m signature nodes, aggregates all signatures and combines the aggregated temporary public key to generate an aggregate signature, and executes the transaction based on the aggregate signature. Through this method, verifiable aggregated multi-signatures are provided for threshold signatures, privacy is protected through unified script coding of the MAST structure, and encrypted communication is used to increase the security of the aggregated signature process, and finally a safe and efficient threshold signature extension is realized.

Description

technical field [0001] The invention belongs to the technical field of blockchain and cross-chain, and in particular relates to a threshold signature method, system, device and storage medium based on aggregated multi-signature. Background technique [0002] In the field of blockchain technology, the mnemonic is a way to derive the private key. In order to ensure the security of funds, the storage of the mnemonic or the private key needs to be cautious enough, so it is necessary to make a backup to prevent private key keys are lost, but even backing them up increases the risk of theft. [0003] In order to improve the security of assets, there are usually two solutions: multi-signature signature and key sharing mode. [0004] If it is a large amount of assets, multi-signatures are usually used to share risks and responsibilities. Multi-signatures usually require multiple private keys. Only when several of the private keys participate in the signature can the assets be used,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3255H04L9/3239H04L9/50
Inventor 郭光华戴伟刘斌啸罗建满杜云辉卢瑞瑞
Owner 杭州链网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products