白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

System and method for key recovery and verification in blockchain based networks

專(zhuān)利號(hào)
US11930110B2
公開(kāi)日期
2024-03-12
申請(qǐng)人
KZEN NETWORKS LTD(IL Tel Aviv)
發(fā)明人
Tal Arieh Be'ery; Ouriel Ohayon; Omer Shlomovits; Gary Benattar
IPC分類(lèi)
H04L29/06; H04L9/00; H04L9/08
技術(shù)領(lǐng)域
recovery,key,escrow,computing,private,least,device,at,public,keys
地域: Tel Aviv

摘要

Methods and systems of recovering a cryptographic key associated with a blockchain based computer network, including encryption of at least a portion of a cryptographic key of the computer network with a recovery public key, sending of the encrypted at least a portion of the cryptographic key to at least one second computing device, sending of a recovery private key to a recovery escrow service, detection that the at least one first computing device is unavailable, publishing the recovery private key in a public repository, retrieving the recovery private key from the public repository, and decryption of the encrypted at least a portion of the cryptographic key by the at least one second computing device.

說(shuō)明書(shū)

A system according to embodiments of the invention may include components such as, but not limited to, a plurality of central processing units (CPU) or any other suitable multi-purpose or specific processors or controllers (e.g., controllers similar to controller 105), a plurality of input units, a plurality of output units, a plurality of memory units, and a plurality of storage units. A system may additionally include other suitable hardware components and/or software components. In some embodiments, a system may include or may be, for example, a personal computer, a desktop computer, a laptop computer, a workstation, a server computer, a network device, or any other suitable computing device.

According to some embodiments, systems and methods are provided for recovery of cryptographic keys for a service that holds a cryptographic key for many clients and performs actions on their behalf. All private keys may be recovered at once using a third-party solution, where each client may be supplied with an encrypted version of the server key and all keys are encrypted with the same recovery public key. Thus, the client may cryptographically verify that indeed the encrypted key may be decrypted to provide the relevant service key in the presence of the corresponding decryption private key. Such solution may be relevant for many server-client configurations, including custodial services in which servers hold the clients' private keys, or non-custodial services in which servers hold only part of the secret information that is required to sign a transaction such as ‘MultiSig’ or secure multi-party computation (sMPC) based solutions.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋