白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

System and method for key recovery and verification in blockchain based networks

專利號(hào)
US11930110B2
公開日期
2024-03-12
申請(qǐng)人
KZEN NETWORKS LTD(IL Tel Aviv)
發(fā)明人
Tal Arieh Be'ery; Ouriel Ohayon; Omer Shlomovits; Gary Benattar
IPC分類
H04L29/06; H04L9/00; H04L9/08
技術(shù)領(lǐng)域
recovery,key,escrow,computing,private,least,device,at,public,keys
地域: Tel Aviv

摘要

Methods and systems of recovering a cryptographic key associated with a blockchain based computer network, including encryption of at least a portion of a cryptographic key of the computer network with a recovery public key, sending of the encrypted at least a portion of the cryptographic key to at least one second computing device, sending of a recovery private key to a recovery escrow service, detection that the at least one first computing device is unavailable, publishing the recovery private key in a public repository, retrieving the recovery private key from the public repository, and decryption of the encrypted at least a portion of the cryptographic key by the at least one second computing device.

說明書

In order to achieve a distributed signing for blockchain algorithms, it may be required to change the key generation (e.g., generating a private-public keypair) and/or signing protocols without, for example, affecting the public verification protocol with validating a signature on a message using the public key.

Distributed key generation protocols may involve two main parts: a local secret data being generated (similar to the original centralized key generation protocol) by each of the parties, and communication between the participating parties to provide the necessary view to all other parties to compute the composed public key (and resulting address), and also later generate the signatures.

Distributed signing may occur only after the key generation and usually involves interactive protocol for each party: receiving a message to sign, and applying local computation on the message using local data previously generated on the key generation protocol to distribute the results and compute signature locally.

In case of a central service that holds the customer's private keys, it is susceptible to attacks on the private keys' confidentiality and availability. Using multiple keys to sign a blockchain transaction (often named ‘MultiSig’) is typically considered to be a safe way to manage private keys. The splitting of the signature responsibility between multiple parties, and specifically between server and client, can eliminate the single point of failure confidentiality problems associated with the atomic private key, by, for example, effectively splitting the private key to client share and server share. However, this splitting can introduce multiple points of failure to the key availability, since if one of the shares is lost the customer cannot longer sign.

權(quán)利要求

1
微信群二維碼
意見反饋