CN112346708A - Method for improving block chain throughput by using zturk low-delay modular square algorithm - Google Patents

Method for improving block chain throughput by using zturk low-delay modular square algorithm Download PDF

Info

Publication number
CN112346708A
CN112346708A CN202011251780.9A CN202011251780A CN112346708A CN 112346708 A CN112346708 A CN 112346708A CN 202011251780 A CN202011251780 A CN 202011251780A CN 112346708 A CN112346708 A CN 112346708A
Authority
CN
China
Prior art keywords
weight
polynomial
coefficient
block chain
bits
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011251780.9A
Other languages
Chinese (zh)
Other versions
CN112346708B (en
Inventor
刘静
张良峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ShanghaiTech University
Original Assignee
ShanghaiTech University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ShanghaiTech University filed Critical ShanghaiTech University
Priority to CN202011251780.9A priority Critical patent/CN112346708B/en
Publication of CN112346708A publication Critical patent/CN112346708A/en
Application granted granted Critical
Publication of CN112346708B publication Critical patent/CN112346708B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • G06F7/48Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
    • G06F7/544Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices for evaluating functions by calculation
    • G06F7/556Logarithmic or exponential functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • G06F7/48Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
    • G06F7/52Multiplying; Dividing
    • G06F7/523Multiplying only
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The technical problem to be solved by the invention is as follows:
Figure DDA0002771819250000011
the algorithm can realize the modular square operation of 1016-bit integers at most on an 8-bit computer, and cannot realize larger-scale modular square operation required by a block chain. In order to solve the technical problem, the technical scheme of the invention is to provide a novel multifunctional electric heating cooker
Figure DDA0002771819250000012
A method for improving block chain throughput by a low-delay modular quadratic algorithm. The invention expands
Figure DDA0002771819250000013
The processing capacity of the algorithm on the 8-bit computer enables the algorithm to meet the requirement of a leader of the block chain on selecting the modular squaring operation. By using the algorithm after the 8-bit superconducting integrated circuit runs and expands, the operation of the VDF can be accelerated, the time for reaching consensus is reduced, and the throughput of a block chain is improved.

Description

Method for improving block chain throughput by low-delay modular square algorithm
Technical Field
The invention relates to a method for
Figure BDA0002771819230000012
A method for improving block chain throughput by a low-delay modular quadratic algorithm.
Background
In the blockchain consensus protocol, Leader Election (Leader Election) is often used to determine block right and out-of-block reward attribution, and once a workload attestation mechanism (PoW) is employed. Since PoW needs to consume a lot of computing resources and causes environmental pollution, leader election in the blockchain consensus protocol is transitioning from the PoW scheme to a new scheme combining space attestation (PoSpace) and Verifiable Delay Function (VDF). The block links using the new scheme are environmentally friendly, but still face the performance bottleneck of throughput. In order to improve throughput, accelerating the calculation speed of VDF is an urgent problem to be solved.
The Verifiable Delay Function (VDF) is a function in which the computation process cannot be performed in parallel and the computation result can be verified quickly. VDF based on modular exponentiation is currently the most widely used configuration. The core of the VDF structure is a modular exponential operation
Figure BDA0002771819230000013
mod M, when M is agnostic of prime factorization, can only be implemented by T serial modulo-square operations, but not in parallel. Therefore, constructing an efficient low-latency modular squaring algorithm is key to speeding up such VDF operations.
The Montgomery algorithm is one of the most commonly used modular squaring algorithms at present, but it requires a large amount of additional pre-and post-processing overhead. The Barrett algorithm is more efficient in computing a single modular squaring operation and less efficient in processing multiple modular squaring operations. In addition, neither the Montgomery algorithm nor the Barrett algorithm involve multiplication operations with efficient low-latency hardware implementations.
Figure BDA0002771819230000014
A practical low-delay modular squaring algorithm is provided, the algorithm expresses a large integer as a polynomial, the length of a Carry Chain (Carry Chain) is greatly reduced by operating the polynomial coefficient, and efficient low-delay multiplication is realized; the modular operation is realized by table look-up, and the serial modular smoothing method is suitable for executing serial modular smoothing required by VDFAnd (6) square operation.
The actual speed of VDF calculation depends not only on the algorithm employed, but also on the machine performance. Compared with a semiconductor integrated circuit, the superconducting integrated circuit with the single-core processing frequency up to 50GHz has the advantages of higher running speed, shorter time delay and lower power consumption, and has great significance for improving the calculation speed of the VDF. In the initial stage of the development of the superconducting integrated circuit, the realization of arithmetic operation as low as 8 bits is an important stage achievement due to the limitation of the superconducting integrated process. The realization of VDF operation on an 8-bit superconducting integrated circuit has important application value.
Disclosure of Invention
The technical problem to be solved by the invention is as follows:
Figure BDA0002771819230000021
the algorithm can realize the modular square operation of 1016-bit integers at most on an 8-bit computer, and cannot realize larger-scale modular square operation required by a block chain.
In order to solve the technical problem, the technical scheme of the invention is to provide a novel multifunctional electric heating cooker
Figure BDA0002771819230000022
The method for improving the throughput of the block chain by the low-delay modular squaring algorithm is characterized by comprising the following steps of:
step 1, each miner on a block chain generates a space certificate from a plurality of spaces owned by each miner; one space corresponds to one space certificate, and the space certificate quantity of miners is equal to the space quantity owned by the miners;
step 2, inputting the respective space certificate into a uniform hash function H (-) by each miner, and calculating to respectively obtain a hash value corresponding to each space certificate;
step 3, taking the minimum value T from the hash values of the owned space certificates by each minerzPerforming modular exponentiation
Figure BDA0002771819230000023
mod M where a represents the input, mod represents the modulo operation, and M represents the modulus;
fastest completion of modular exponentiation
Figure BDA0002771819230000024
The miners at mod M become leaders, win the block right and reward;
each miner performs modular exponentiation
Figure BDA0002771819230000025
mod M, continuous T on 8-bit superconducting ICzSub-serial operation modulo square a2mod M, then any miners run the modulo quadratic operation a once per time2mod M includes the following steps:
step 301, the large integer a participating in the multiplication operation is expressed into a corresponding polynomial form, which includes:
a=a0r0+a1r1+a2r2+…+aIrI (1)
in the formula (1), the unknown number of the r polynomial is the base number of the computer; the index of r is defined as the weight;
in step 302, if the factor a is a and the factor B is a, the following formulas (2) and (3) are provided:
A=A0r0+A1r1+A2r2+…+AIrI (2)
B=B0r0+B1r1+B2r2+…+BIrI (3)
coefficient A in formula (2)iAnd the coefficient B in the formula (3)jThe number of bits of (c) is d +2, d is 8, I belongs to [0, I ∈ [ ]], j∈[0,I];
Step 303, calculate the coefficient AiAnd coefficient BjMultiplying to obtain Tij=Ai·Bj,TijThe number of bits of (d) is 2d + 4;
step 304, adding TijIs divided into three blocks, which are expressed as (T)ij2,Tij1,Tij0) Wherein, Tij0And Tij1The number of bits of (1) is d, Tij2The number of bits of (a) is 4;
will (T)ij2,Tij1,Tij0) Is described as (T)k2,Tk1,Tk0),k∈[0,(I+1)2]Will have T of the same weightk2、Tk1、Tk0Add to obtain Dt,t∈[0,2(I+1)],DtHas a bit number of 3D, DtIs divided into three blocks, which are expressed as (D)t2,Dt1,Dt0),Dt2、Dt1、Dt0The number of bits is d;
step 305, D with the same weightt2、Dt1、Dt0Add to obtain CtMixing C withtObtaining a polynomial representing a multiplication result C obtained by multiplying the factor A by the factor B as a coefficient;
step 306, expressing the modulus M as a polynomial, and obtaining the highest weight M of the polynomial;
step 307, obtaining all weights greater than the highest weight M in the polynomial of the multiplication result C obtained in step 305, calculating a modulo operation result of a modulus M corresponding to each weight, then expressing the calculation result as the polynomial, and storing coefficients of the polynomial;
step 308, for each weight of which the multiplication result C obtained in step 305 is greater than the highest weight of the modulus M, inquiring the coefficients of the weight stored in step 307 in the modulus operation result of the corresponding weight, and for all the inquired coefficients, adding the coefficients of the same weight to obtain Dv,DvHas a bit number of 3d, v ∈ [0, m ]];
Step 309, compare DvIs divided into three blocks, denoted as Dv=(Dv2,Dv1,Dv0),Dv2、Dv1、Dv0The number of bits of (1) is D, and D with the same weightv2,Dv1,Dv0Add to give Resu,u∈[0,m+2];
Step 310, Res is addeduObtaining a polynomial as a coefficient, the polynomial representing a large integer as a next modular squaring operation a2Input a in mod M.
Preferably, in step 307, if any one of the polynomials in the multiplication result C that is greater than the highest weight m is defined as w, then:
the result of calculating the weight w corresponding to the modulus M is L, L ═ s · rwmod M, where s is the traversal coefficient interval [0,2d+2-1]And expressing the calculation result L as a polynomial in the form of:
Figure BDA0002771819230000031
storing coefficients L of polynomialsl
The invention expands
Figure BDA0002771819230000032
The processing capacity of the algorithm on the 8-bit computer enables the algorithm to meet the requirement of a leader of the block chain on selecting the modular squaring operation. By using the algorithm after the 8-bit superconducting integrated circuit runs and expands, the operation of the VDF can be accelerated, the time for reaching consensus is reduced, and the throughput of a block chain is improved.
Drawings
FIG. 1 illustrates the coefficient Ai,BjProduct of (A) TijHow to add according to the weight to obtain Dt
FIG. 2 illustrates how D is adjustedtAdding according to the weight to obtain Ct
FIG. 3 illustrates how coefficients C may be queriedtPerforming modulo operation on the result corresponding to the weight and adding the results according to the weight to obtain DvCorresponding to the situation shown in fig. 2;
FIG. 4 illustrates how the coefficient C is queried in another case than that shown in FIG. 3tPerforming modulo operation on the result corresponding to the weight and adding the results according to the weight to obtain Dv
FIG. 5 illustrates how D is adjustedvAdd according to the weight to get ResuCorresponding to the situation shown in fig. 4.
Detailed Description
The invention will be further illustrated with reference to the following specific examples. It should be understood that these examples are for illustrative purposes only and are not intended to limit the scope of the present invention. Further, it should be understood that various changes or modifications of the present invention may be made by those skilled in the art after reading the teaching of the present invention, and such equivalents may fall within the scope of the present invention as defined in the appended claims.
The invention provides a method for
Figure BDA0002771819230000041
The method for improving the throughput of the block chain by the low-delay modular squaring algorithm comprises the following steps:
step 1, each miner M on the block chain1,…,MpFrom respectively owned s1,…,snGenerating spatial proofs ps in space1,…,psn
Step 2, each miner proves the respective space ps1,…,psnInputting a uniform hash function H (-) and calculating to obtain corresponding n hash values H (ps)1),…,H(psn);
Step 3, each miner uses n hash values H (ps)1),…,H(psn) Take the minimum value Tz=220Performing modular exponentiation
Figure BDA0002771819230000042
mod M where a represents the input, mod represents the modulo operation, and M represents the modulus;
in this embodiment:
a=24962743716270738850186870770798503430604591768649693001283 92674297814219386094552430442942032815516773302870103484710974 43578584158231323388210160706364556180659930044663144504819686 12260164627324337446836017723156221439790409391707069546229498 24100955660109265468820780799848410214509680693031924170697071 85588147369575617939094205594972332667704640975564883743117028 59483198091589116755867278611649931899448024409614927449975145 81812081423160261417967490758044526602811690958060478772330835 80543569151302891852074034982277456709187636506346226340228234 61803235879111193218846795663771228812038161174756075561046023
M=27753518966756833043310696658680489011063642864067473991324150898386466958471768596164596493433277993392527742250625431044493065910052020199538067630453415235559298916231325819462445717277295524847868588751980799634715333666195052388189052062280926439638833711206164705291841660581623493606991585908254321280667487377443515229326260998427734322647085082804753009205406425944676994048399934815311525895043560986701162730869838266387447976468713239075912661738304981310188255059572154024529437810282388575978080680135343845379552565264224050689423622788304232123385662662599376345478981783857431670519061413837777695409 modular exponentiation is performed by each miner
Figure BDA0002771819230000051
mod M, continuous T on 8-bit superconducting ICzSub-serial operation modulo square a2modM, then any miners run the modulo quadratic operation a once per time2mod M includes the following steps:
step 301, the large integer a participating in the multiplication operation is expressed into a corresponding polynomial form, which includes:
a=a0r0+a1r1+a2r2+…+aIrI (1)
in the formula (1), the unknown number of the r polynomial is the base number of the computer; the exponent of r is defined as the weight, and when the number of bits d of a computer word is 8 (i.e., in 8-bit computers), the base is r 2d=28=256;
In step 302, if the factor a is a and the factor B is a, the following formulas (2) and (3) are provided:
A=A0r0+A1r1+A2r2+…+AIrI (2)
B=B0r0+B1r1+B2r2+…+BIrI (3)
coefficient A in formula (2)iAnd the coefficient B in the formula (3)jThe number of bits of (a) is d +2, d ═ d8,i∈[0,I], j∈[0,I];
Step 303, calculate the coefficient AiAnd coefficient BjMultiplying to obtain Tij=Ai·Bj,TijThe number of bits of (d) is 2d + 4;
step 304, adding TijIs divided into three blocks, which are expressed as (T)ij2,Tij1,Tij0) Wherein, Tij0And Tij1The number of bits of (1) is d, Tij2The number of bits of (a) is 4;
will (T)ij2,Tij1,Tij0) Is described as (T)k2,Tk1,Tk0),k∈[0,(I+1)2]Will have T of the same weightk2、 Tk1、Tk0Add to obtain Dt,t∈[0,2(I+1)],DtHas a bit number of 3D, DtIs divided into three blocks, which are expressed as (D)t2,Dt1,Dt0),Dt2、Dt1、Dt0The number of bits is d;
step 305, D with the same weightt2、Dt1、Dt0Add to obtain CtMixing C withtObtaining a polynomial representing a multiplication result C obtained by multiplying the factor A by the factor B as a coefficient;
from FIG. 1, D can be seen2(I+1)Only the low D bits have data, D2I+1Only the lower 2d bits have data. In fig. 2, only the positions with data need to be added; ctA sum of at most 3d bits, d +2 bits, and Ai,BjKeeping consistent;
step 306, expressing the modulus M as a polynomial, and obtaining the highest weight M of the polynomial;
step 307, obtaining all weights greater than the highest weight M in the polynomial of the multiplication result C obtained in step 305, calculating a modulo operation result of a modulus M corresponding to each weight, then expressing the calculation result as the polynomial, and storing coefficients of the polynomial;
defining any weight in the polynomial of the multiplication result C larger than the highest weight m as w, then:
calculating the weight w corresponding to the node of the modulus MThe fruit is L, L is s rwmod M, where s is the traversal coefficient interval [0,2d+2-1]And expressing the calculation result L as a polynomial in the form of:
Figure BDA0002771819230000061
storing coefficients L of polynomialsl
Step 308, for each weight of which the multiplication result C obtained in step 305 is greater than the highest weight of the modulus M, inquiring the coefficients of the weight stored in step 307 in the modulus operation result of the corresponding weight, and for all the inquired coefficients, adding the coefficients of the same weight to obtain Dv,DvHas a bit number of 3d, v ∈ [0, m ]];
As shown in fig. 3, the coefficient C is queriedtThe result of the modulo operation at the corresponding weight w is denoted as LUT (w, C)t), t∈(m,2(I+1)];
Step 309, compare DvIs divided into three blocks, denoted as Dv=(Dv2,Dv1,Dv0),Dv2、Dv1、Dv0The number of bits of (1) is D, and D with the same weightv2,Dv1,Dv0Add to give Resu,u∈[0,m+2];
ResuA sum of at most 3d bits, d +2 bits, and Ai、BjKeeping consistent;
step 310, Res is addeduObtaining a polynomial as a coefficient, the polynomial representing a large integer as a next modular squaring operation a2Input a in mod M.
Fastest completion of modular exponentiation
Figure BDA0002771819230000062
Becomes a leader, wins the block right and awards the block.
When parameter Tz=220I.e. carry out 2 serially20The result of the submodular squaring operation is a large integer
93131168495806433794105952058146804125683044998940633368482405 94238761348112981208109457665428144239123743847857353972270749 71310831553935642149432317642476278889018182023847960487843904 02164051540535519582198541484494041664789150917896927364210510 32032088130019592046315604223922634160792816890607827492823029 35213638990615389059671204133624462412439674733457626719331091 50503119918706220094874496129033060643689091621244558639683312 36076418409624917633094632604225698534288877297409743792410626 3981159186607520956600654091879692273741517121439260660067328 30524940136272640331045853468337872108295009808751649707659 。

Claims (2)

1. One kind is used
Figure FDA0002771819220000011
The method for improving the throughput of the block chain by the low-delay modular squaring algorithm is characterized by comprising the following steps of:
step 1, each miner on a block chain generates a space certificate from a plurality of spaces owned by each miner; one space corresponds to one space certificate, and the space certificate quantity of miners is equal to the space quantity owned by the miners;
step 2, inputting the respective space certificate into a uniform hash function H (-) by each miner, and calculating to respectively obtain a hash value corresponding to each space certificate;
step 3, taking the minimum value T from the hash values of the owned space certificates by each minerzPerforming modular exponentiation
Figure FDA0002771819220000012
Wherein a represents the input, mod represents the modulo operation, and M represents the modulus;
fastest completion of modular exponentiation
Figure FDA0002771819220000014
The miners become the leaders and win the block right and the block reward;
each miner performs modular exponentiation
Figure FDA0002771819220000013
Continuous T on 8-bit superconducting integrated circuitzSub-serial operation modulo square a2mod M, then any miners run the modulo quadratic operation a once per time2mod M includes the following steps:
step 301, the large integer a participating in the multiplication operation is expressed into a corresponding polynomial form, which includes:
a=a0r0+a1r1+a2r2+…+aIrI (1)
in the formula (1), the unknown number of the r polynomial is the base number of the computer; the index of r is defined as the weight;
in step 302, if the factor a is a and the factor B is a, the following formulas (2) and (3) are provided:
A=A0r0+A1r1+A2r2+…+AIrI (2)
B=B0r0+B1r1+B2r2+…+BIrI (3)
coefficient A in formula (2)iAnd the coefficient B in the formula (3)jThe number of bits of (c) is d +2, d is 8, I belongs to [0, I ∈ [ ]],j∈[0,I];
Step 303, calculate the coefficient AiAnd coefficient BjMultiplying to obtain Tij=Ai·Bj,TijThe number of bits of (d) is 2d + 4;
step 304, adding TijIs divided into three blocks, which are expressed as (T)ij2,Tij1,Tij0) Wherein, Tij0And Tij1The number of bits of (1) is d, Tij2The number of bits of (a) is 4;
will (T)ij2,Tij1,Tij0) Is described as (T)k2,Tk1,Tk0),k∈[0,(I+1)2]Will have T of the same weightk2、Tk1、Tk0Add to obtain Dt,t∈[0,2(I+1)],DtHas a bit number of 3D, DtIs divided into three blocks which are represented as (Dt2,Dt1,Dt0),Dt2、Dt1、Dt0The number of bits is d;
step 305, D with the same weightt2、Dt1、Dt0Add to obtain CtMixing C withtObtaining a polynomial representing a multiplication result C obtained by multiplying the factor A by the factor B as a coefficient;
step 306, expressing the modulus M as a polynomial, and obtaining the highest weight M of the polynomial;
step 307, obtaining all weights greater than the highest weight M in the polynomial of the multiplication result C obtained in step 305, calculating a modulo operation result of a modulus M corresponding to each weight, then expressing the calculation result as the polynomial, and storing coefficients of the polynomial;
step 308, for each weight of which the multiplication result C obtained in step 305 is greater than the highest weight of the modulus M, inquiring the coefficients of the weight stored in step 307 in the modulus operation result of the corresponding weight, and for all the inquired coefficients, adding the coefficients of the same weight to obtain Dv,DvHas a bit number of 3d, v ∈ [0, m ]];
Step 309, compare DvIs divided into three blocks, denoted as Dv=(Dv2,Dv1,Dv0),Dv2、Dv1、Dv0The number of bits of (1) is D, and D with the same weightv2,Dv1,Dv0Add to give Resu,u∈[0,m+2];
Step 310, Res is addeduObtaining a polynomial as a coefficient, the polynomial representing a large integer as a next modular squaring operation a2Input a in mod M.
2. An application as in claim 1
Figure FDA0002771819220000021
The method for improving the throughput of the block chain by the low-latency modular squaring algorithm is characterized in that in step 307, the weight of any polynomial of the multiplication result C which is larger than the highest weight m is defined asw, then:
the result of calculating the weight w corresponding to the modulus M is L, L ═ s · rwmod M, where s is the traversal coefficient interval [0,2d+2-1]And expressing the calculation result L as a polynomial in the form of:
Figure FDA0002771819220000022
storing coefficients L of polynomialsl
CN202011251780.9A 2020-11-11 2020-11-11 Method for improving throughput of blockchain by using Sizt low-delay modulus squaring algorithm Active CN112346708B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011251780.9A CN112346708B (en) 2020-11-11 2020-11-11 Method for improving throughput of blockchain by using Sizt low-delay modulus squaring algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011251780.9A CN112346708B (en) 2020-11-11 2020-11-11 Method for improving throughput of blockchain by using Sizt low-delay modulus squaring algorithm

Publications (2)

Publication Number Publication Date
CN112346708A true CN112346708A (en) 2021-02-09
CN112346708B CN112346708B (en) 2023-07-21

Family

ID=74363319

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011251780.9A Active CN112346708B (en) 2020-11-11 2020-11-11 Method for improving throughput of blockchain by using Sizt low-delay modulus squaring algorithm

Country Status (1)

Country Link
CN (1) CN112346708B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7191333B1 (en) * 2001-10-25 2007-03-13 Cisco Technology, Inc. Method and apparatus for calculating a multiplicative inverse of an element of a prime field
CN110445778A (en) * 2019-08-01 2019-11-12 中盾云链(广州)信息科技有限公司 A kind of common recognition algorithm applied to alliance's chain
WO2020022958A1 (en) * 2018-07-27 2020-01-30 Aioz Pte Ltd Method and apparatus for transaction verification in a blockchain-based network
CN111030993A (en) * 2019-11-11 2020-04-17 重庆邮电大学 Rayleigh consensus method based on extended credible authentication in alliance block chain
WO2020082213A1 (en) * 2018-10-22 2020-04-30 深圳市哈希树科技有限公司 Network expandability blockchain implementation method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7191333B1 (en) * 2001-10-25 2007-03-13 Cisco Technology, Inc. Method and apparatus for calculating a multiplicative inverse of an element of a prime field
WO2020022958A1 (en) * 2018-07-27 2020-01-30 Aioz Pte Ltd Method and apparatus for transaction verification in a blockchain-based network
WO2020082213A1 (en) * 2018-10-22 2020-04-30 深圳市哈希树科技有限公司 Network expandability blockchain implementation method
CN110445778A (en) * 2019-08-01 2019-11-12 中盾云链(广州)信息科技有限公司 A kind of common recognition algorithm applied to alliance's chain
CN111030993A (en) * 2019-11-11 2020-04-17 重庆邮电大学 Rayleigh consensus method based on extended credible authentication in alliance block chain

Also Published As

Publication number Publication date
CN112346708B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
CN106156159B (en) A kind of table connection processing method, device and cloud computing system
KR101269737B1 (en) Encryption processing apparatus, encryption processing method, and computer program medium
Patronik et al. Design of Reverse Converters for General RNS Moduli Sets $\{2^{k}, 2^{n}-1, 2^{n}+ 1, 2^{n+ 1}-1\} $ and $\{2^{k}, 2^{n}-1, 2^{n}+ 1, 2^{n-1}-1\} $($ n $ even)
Nair et al. Analysis of ECC for application specific WSN security
WO2020075797A1 (en) Secret right shift calculation system, secret division system, method of same, secret calculation device, and program
Aasaraai et al. Fpga acceleration of multi-scalar multiplication: Cyclonemsm
CN112346708A (en) Method for improving block chain throughput by using zturk low-delay modular square algorithm
Lisa et al. Design of a compact reversible carry look-ahead adder using dynamic programming
WO2023246063A1 (en) Modular multiplier, security chip, electronic device and encryption method
CN110109913B (en) Hardware implementation method and device of zerocase mining algorithm
Guo et al. Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT
CN114594925A (en) Efficient modular multiplication circuit suitable for SM2 encryption operation and operation method thereof
Wang et al. A Variable-Length Chromosome Evolutionary Algorithm for Reversible Circuit Synthesis.
JP5816383B2 (en) Interleaver index generation apparatus and method
Ma et al. Fast implementation for modular inversion and scalar multiplication in the elliptic curve cryptography
Jagadeeshkumar et al. A novel design of low power and high speed hybrid multiplier
JP2004271792A (en) Device and program for scalar multiplying operation on elliptic curve
CN111563598A (en) Method and system for predicting quantum computation simulation time
Harb et al. High-performance Pipelined FPGA Implementation of the Elliptic Curve Cryptography over GF (2n).
CN114650135B (en) Software and hardware cooperated SM2 elliptic curve cryptography algorithm implementation method
CN116405200B (en) Distillable key estimation method, apparatus, device and storage medium
Planinic et al. On the genotype compression and expansion for evolutionary algorithms in the continuous domain
Gashkov et al. An application of the method of additive chains to inversion in finite fields.
CN115834086A (en) Efficient implementation method and system for multiple exponential powers and multiple scalar multiplication in digital signature
Heng et al. Fast Continuous Scalar Multiplication Algorithms on Twisted Edwards Elliptic Curve

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant