白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

System and method for key recovery and verification in blockchain based networks

專利號
US11930110B2
公開日期
2024-03-12
申請人
KZEN NETWORKS LTD(IL Tel Aviv)
發(fā)明人
Tal Arieh Be'ery; Ouriel Ohayon; Omer Shlomovits; Gary Benattar
IPC分類
H04L29/06; H04L9/00; H04L9/08
技術(shù)領(lǐng)域
recovery,key,escrow,computing,private,least,device,at,public,keys
地域: Tel Aviv

摘要

Methods and systems of recovering a cryptographic key associated with a blockchain based computer network, including encryption of at least a portion of a cryptographic key of the computer network with a recovery public key, sending of the encrypted at least a portion of the cryptographic key to at least one second computing device, sending of a recovery private key to a recovery escrow service, detection that the at least one first computing device is unavailable, publishing the recovery private key in a public repository, retrieving the recovery private key from the public repository, and decryption of the encrypted at least a portion of the cryptographic key by the at least one second computing device.

說明書

In some embodiments, a dedicated mobile app is implemented on the at least one second computing device 220 to allow, for example, recovery of the cryptographic keys when needed. Such dedicated mobile app, (e.g., dedicated “recovery” mobile app) may access data on the at least one second computing device 220 including at least portion of the cryptographic keys stored thereon, and chain code (e.g., to derive future child keys). The dedicated “recovery” mobile app may decrypt encrypted keys using the recovery private keys, compute master keys from decrypted at least portion of the cryptographic keys and/or derive all child keys from the master key. The dedicated “recovery” mobile app may output all private keys, for instance to a text file, for easy of use by the user of at least one second computing device 220.

In some embodiments, the at least a portion of the cryptographic key 206 is divided into ‘m’ segments, such that each segment may be encrypted using the recovery public key 204 (e.g., using any chosen plaintext attack (CPA) secure additive homomorphic scheme, such as homomorphic ElGamal encryption).

In some embodiments, the signing algorithm for the recovery private key 205 has the same generic elliptic curve function as for signing of the encrypted at least a portion of the cryptographic key 206. Using a “universal HD” property for the signing algorithm (e.g., all individual wallets keys may be derived from a single master key), it may be sufficient to have a single recovery private key 205 of the type of that master key. For example, use the widely used ‘Secp256k1’ key supported by OpenSSL. The signing algorithm may be chosen in accordance to the type of the respective key.

權(quán)利要求

1
微信群二維碼
意見反饋