白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

System and method for key recovery and verification in blockchain based networks

專利號(hào)
US11930110B2
公開(kāi)日期
2024-03-12
申請(qǐng)人
KZEN NETWORKS LTD(IL Tel Aviv)
發(fā)明人
Tal Arieh Be'ery; Ouriel Ohayon; Omer Shlomovits; Gary Benattar
IPC分類
H04L29/06; H04L9/00; H04L9/08
技術(shù)領(lǐng)域
recovery,key,escrow,computing,private,least,device,at,public,keys
地域: Tel Aviv

摘要

Methods and systems of recovering a cryptographic key associated with a blockchain based computer network, including encryption of at least a portion of a cryptographic key of the computer network with a recovery public key, sending of the encrypted at least a portion of the cryptographic key to at least one second computing device, sending of a recovery private key to a recovery escrow service, detection that the at least one first computing device is unavailable, publishing the recovery private key in a public repository, retrieving the recovery private key from the public repository, and decryption of the encrypted at least a portion of the cryptographic key by the at least one second computing device.

說(shuō)明書(shū)

In some embodiments, the at least one first computing device is further configured to send the recovery private key to a recovery escrow service and to periodically send an arbitrary message to a recovery escrow service, wherein the arbitrary message is signed by the recovery private key, the recovery escrow service is further configured to publish the signed arbitrary message in a public repository, and the at least one first computing device is further configured to: retrieve the signed arbitrary message from the public repository, verify that the encryption of the signed arbitrary message is compatible with the recovery public key, and verify that the recovery escrow service has the recovery private key.

In some embodiments, the recovery escrow service in on an external computing device. In some embodiments, the at least one second computing device includes a mobile computing device. In some embodiments, the at least one second computing device is connected to the computer network, and a transaction is added to a ledger of the computer network, in accordance with the received signed at least a portion of the cryptographic key. In some embodiments, the encryption is carried out using a verifiable homomorphic ElGamal encryption.

BRIEF DESCRIPTION OF THE DRAWINGS

The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features, and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanying drawings in which:

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋