CN112346708A - Method for improving block chain throughput by using zturk low-delay modular square algorithm - Google Patents
Method for improving block chain throughput by using zturk low-delay modular square algorithm Download PDFInfo
- Publication number
- CN112346708A CN112346708A CN202011251780.9A CN202011251780A CN112346708A CN 112346708 A CN112346708 A CN 112346708A CN 202011251780 A CN202011251780 A CN 202011251780A CN 112346708 A CN112346708 A CN 112346708A
- Authority
- CN
- China
- Prior art keywords
- weight
- polynomial
- coefficient
- block chain
- bits
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/48—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
- G06F7/544—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices for evaluating functions by calculation
- G06F7/556—Logarithmic or exponential functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/48—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
- G06F7/52—Multiplying; Dividing
- G06F7/523—Multiplying only
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The technical problem to be solved by the invention is as follows:the algorithm can realize the modular square operation of 1016-bit integers at most on an 8-bit computer, and cannot realize larger-scale modular square operation required by a block chain. In order to solve the technical problem, the technical scheme of the invention is to provide a novel multifunctional electric heating cookerA method for improving block chain throughput by a low-delay modular quadratic algorithm. The invention expandsThe processing capacity of the algorithm on the 8-bit computer enables the algorithm to meet the requirement of a leader of the block chain on selecting the modular squaring operation. By using the algorithm after the 8-bit superconducting integrated circuit runs and expands, the operation of the VDF can be accelerated, the time for reaching consensus is reduced, and the throughput of a block chain is improved.
Description
Technical Field
Background
In the blockchain consensus protocol, Leader Election (Leader Election) is often used to determine block right and out-of-block reward attribution, and once a workload attestation mechanism (PoW) is employed. Since PoW needs to consume a lot of computing resources and causes environmental pollution, leader election in the blockchain consensus protocol is transitioning from the PoW scheme to a new scheme combining space attestation (PoSpace) and Verifiable Delay Function (VDF). The block links using the new scheme are environmentally friendly, but still face the performance bottleneck of throughput. In order to improve throughput, accelerating the calculation speed of VDF is an urgent problem to be solved.
The Verifiable Delay Function (VDF) is a function in which the computation process cannot be performed in parallel and the computation result can be verified quickly. VDF based on modular exponentiation is currently the most widely used configuration. The core of the VDF structure is a modular exponential operationmod M, when M is agnostic of prime factorization, can only be implemented by T serial modulo-square operations, but not in parallel. Therefore, constructing an efficient low-latency modular squaring algorithm is key to speeding up such VDF operations.
The Montgomery algorithm is one of the most commonly used modular squaring algorithms at present, but it requires a large amount of additional pre-and post-processing overhead. The Barrett algorithm is more efficient in computing a single modular squaring operation and less efficient in processing multiple modular squaring operations. In addition, neither the Montgomery algorithm nor the Barrett algorithm involve multiplication operations with efficient low-latency hardware implementations.A practical low-delay modular squaring algorithm is provided, the algorithm expresses a large integer as a polynomial, the length of a Carry Chain (Carry Chain) is greatly reduced by operating the polynomial coefficient, and efficient low-delay multiplication is realized; the modular operation is realized by table look-up, and the serial modular smoothing method is suitable for executing serial modular smoothing required by VDFAnd (6) square operation.
The actual speed of VDF calculation depends not only on the algorithm employed, but also on the machine performance. Compared with a semiconductor integrated circuit, the superconducting integrated circuit with the single-core processing frequency up to 50GHz has the advantages of higher running speed, shorter time delay and lower power consumption, and has great significance for improving the calculation speed of the VDF. In the initial stage of the development of the superconducting integrated circuit, the realization of arithmetic operation as low as 8 bits is an important stage achievement due to the limitation of the superconducting integrated process. The realization of VDF operation on an 8-bit superconducting integrated circuit has important application value.
Disclosure of Invention
The technical problem to be solved by the invention is as follows:the algorithm can realize the modular square operation of 1016-bit integers at most on an 8-bit computer, and cannot realize larger-scale modular square operation required by a block chain.
In order to solve the technical problem, the technical scheme of the invention is to provide a novel multifunctional electric heating cookerThe method for improving the throughput of the block chain by the low-delay modular squaring algorithm is characterized by comprising the following steps of:
fastest completion of modular exponentiationThe miners at mod M become leaders, win the block right and reward;
each miner performs modular exponentiationmod M, continuous T on 8-bit superconducting ICzSub-serial operation modulo square a2mod M, then any miners run the modulo quadratic operation a once per time2mod M includes the following steps:
step 301, the large integer a participating in the multiplication operation is expressed into a corresponding polynomial form, which includes:
a=a0r0+a1r1+a2r2+…+aIrI (1)
in the formula (1), the unknown number of the r polynomial is the base number of the computer; the index of r is defined as the weight;
in step 302, if the factor a is a and the factor B is a, the following formulas (2) and (3) are provided:
A=A0r0+A1r1+A2r2+…+AIrI (2)
B=B0r0+B1r1+B2r2+…+BIrI (3)
coefficient A in formula (2)iAnd the coefficient B in the formula (3)jThe number of bits of (c) is d +2, d is 8, I belongs to [0, I ∈ [ ]], j∈[0,I];
Step 303, calculate the coefficient AiAnd coefficient BjMultiplying to obtain Tij=Ai·Bj,TijThe number of bits of (d) is 2d + 4;
step 304, adding TijIs divided into three blocks, which are expressed as (T)ij2,Tij1,Tij0) Wherein, Tij0And Tij1The number of bits of (1) is d, Tij2The number of bits of (a) is 4;
will (T)ij2,Tij1,Tij0) Is described as (T)k2,Tk1,Tk0),k∈[0,(I+1)2]Will have T of the same weightk2、Tk1、Tk0Add to obtain Dt,t∈[0,2(I+1)],DtHas a bit number of 3D, DtIs divided into three blocks, which are expressed as (D)t2,Dt1,Dt0),Dt2、Dt1、Dt0The number of bits is d;
step 305, D with the same weightt2、Dt1、Dt0Add to obtain CtMixing C withtObtaining a polynomial representing a multiplication result C obtained by multiplying the factor A by the factor B as a coefficient;
step 306, expressing the modulus M as a polynomial, and obtaining the highest weight M of the polynomial;
step 307, obtaining all weights greater than the highest weight M in the polynomial of the multiplication result C obtained in step 305, calculating a modulo operation result of a modulus M corresponding to each weight, then expressing the calculation result as the polynomial, and storing coefficients of the polynomial;
step 308, for each weight of which the multiplication result C obtained in step 305 is greater than the highest weight of the modulus M, inquiring the coefficients of the weight stored in step 307 in the modulus operation result of the corresponding weight, and for all the inquired coefficients, adding the coefficients of the same weight to obtain Dv,DvHas a bit number of 3d, v ∈ [0, m ]];
Step 309, compare DvIs divided into three blocks, denoted as Dv=(Dv2,Dv1,Dv0),Dv2、Dv1、Dv0The number of bits of (1) is D, and D with the same weightv2,Dv1,Dv0Add to give Resu,u∈[0,m+2];
Step 310, Res is addeduObtaining a polynomial as a coefficient, the polynomial representing a large integer as a next modular squaring operation a2Input a in mod M.
Preferably, in step 307, if any one of the polynomials in the multiplication result C that is greater than the highest weight m is defined as w, then:
the result of calculating the weight w corresponding to the modulus M is L, L ═ s · rwmod M, where s is the traversal coefficient interval [0,2d+2-1]And expressing the calculation result L as a polynomial in the form of:storing coefficients L of polynomialsl。
The invention expandsThe processing capacity of the algorithm on the 8-bit computer enables the algorithm to meet the requirement of a leader of the block chain on selecting the modular squaring operation. By using the algorithm after the 8-bit superconducting integrated circuit runs and expands, the operation of the VDF can be accelerated, the time for reaching consensus is reduced, and the throughput of a block chain is improved.
Drawings
FIG. 1 illustrates the coefficient Ai,BjProduct of (A) TijHow to add according to the weight to obtain Dt;
FIG. 2 illustrates how D is adjustedtAdding according to the weight to obtain Ct;
FIG. 3 illustrates how coefficients C may be queriedtPerforming modulo operation on the result corresponding to the weight and adding the results according to the weight to obtain DvCorresponding to the situation shown in fig. 2;
FIG. 4 illustrates how the coefficient C is queried in another case than that shown in FIG. 3tPerforming modulo operation on the result corresponding to the weight and adding the results according to the weight to obtain Dv;
FIG. 5 illustrates how D is adjustedvAdd according to the weight to get ResuCorresponding to the situation shown in fig. 4.
Detailed Description
The invention will be further illustrated with reference to the following specific examples. It should be understood that these examples are for illustrative purposes only and are not intended to limit the scope of the present invention. Further, it should be understood that various changes or modifications of the present invention may be made by those skilled in the art after reading the teaching of the present invention, and such equivalents may fall within the scope of the present invention as defined in the appended claims.
The invention provides a method forThe method for improving the throughput of the block chain by the low-delay modular squaring algorithm comprises the following steps:
in this embodiment:
a=24962743716270738850186870770798503430604591768649693001283 92674297814219386094552430442942032815516773302870103484710974 43578584158231323388210160706364556180659930044663144504819686 12260164627324337446836017723156221439790409391707069546229498 24100955660109265468820780799848410214509680693031924170697071 85588147369575617939094205594972332667704640975564883743117028 59483198091589116755867278611649931899448024409614927449975145 81812081423160261417967490758044526602811690958060478772330835 80543569151302891852074034982277456709187636506346226340228234 61803235879111193218846795663771228812038161174756075561046023
M=27753518966756833043310696658680489011063642864067473991324150898386466958471768596164596493433277993392527742250625431044493065910052020199538067630453415235559298916231325819462445717277295524847868588751980799634715333666195052388189052062280926439638833711206164705291841660581623493606991585908254321280667487377443515229326260998427734322647085082804753009205406425944676994048399934815311525895043560986701162730869838266387447976468713239075912661738304981310188255059572154024529437810282388575978080680135343845379552565264224050689423622788304232123385662662599376345478981783857431670519061413837777695409 modular exponentiation is performed by each minermod M, continuous T on 8-bit superconducting ICzSub-serial operation modulo square a2modM, then any miners run the modulo quadratic operation a once per time2mod M includes the following steps:
step 301, the large integer a participating in the multiplication operation is expressed into a corresponding polynomial form, which includes:
a=a0r0+a1r1+a2r2+…+aIrI (1)
in the formula (1), the unknown number of the r polynomial is the base number of the computer; the exponent of r is defined as the weight, and when the number of bits d of a computer word is 8 (i.e., in 8-bit computers), the base is r 2d=28=256;
In step 302, if the factor a is a and the factor B is a, the following formulas (2) and (3) are provided:
A=A0r0+A1r1+A2r2+…+AIrI (2)
B=B0r0+B1r1+B2r2+…+BIrI (3)
coefficient A in formula (2)iAnd the coefficient B in the formula (3)jThe number of bits of (a) is d +2, d ═ d8,i∈[0,I], j∈[0,I];
Step 303, calculate the coefficient AiAnd coefficient BjMultiplying to obtain Tij=Ai·Bj,TijThe number of bits of (d) is 2d + 4;
step 304, adding TijIs divided into three blocks, which are expressed as (T)ij2,Tij1,Tij0) Wherein, Tij0And Tij1The number of bits of (1) is d, Tij2The number of bits of (a) is 4;
will (T)ij2,Tij1,Tij0) Is described as (T)k2,Tk1,Tk0),k∈[0,(I+1)2]Will have T of the same weightk2、 Tk1、Tk0Add to obtain Dt,t∈[0,2(I+1)],DtHas a bit number of 3D, DtIs divided into three blocks, which are expressed as (D)t2,Dt1,Dt0),Dt2、Dt1、Dt0The number of bits is d;
step 305, D with the same weightt2、Dt1、Dt0Add to obtain CtMixing C withtObtaining a polynomial representing a multiplication result C obtained by multiplying the factor A by the factor B as a coefficient;
from FIG. 1, D can be seen2(I+1)Only the low D bits have data, D2I+1Only the lower 2d bits have data. In fig. 2, only the positions with data need to be added; ctA sum of at most 3d bits, d +2 bits, and Ai,BjKeeping consistent;
step 306, expressing the modulus M as a polynomial, and obtaining the highest weight M of the polynomial;
step 307, obtaining all weights greater than the highest weight M in the polynomial of the multiplication result C obtained in step 305, calculating a modulo operation result of a modulus M corresponding to each weight, then expressing the calculation result as the polynomial, and storing coefficients of the polynomial;
defining any weight in the polynomial of the multiplication result C larger than the highest weight m as w, then:
calculating the weight w corresponding to the node of the modulus MThe fruit is L, L is s rwmod M, where s is the traversal coefficient interval [0,2d+2-1]And expressing the calculation result L as a polynomial in the form of:storing coefficients L of polynomialsl;
Step 308, for each weight of which the multiplication result C obtained in step 305 is greater than the highest weight of the modulus M, inquiring the coefficients of the weight stored in step 307 in the modulus operation result of the corresponding weight, and for all the inquired coefficients, adding the coefficients of the same weight to obtain Dv,DvHas a bit number of 3d, v ∈ [0, m ]];
As shown in fig. 3, the coefficient C is queriedtThe result of the modulo operation at the corresponding weight w is denoted as LUT (w, C)t), t∈(m,2(I+1)];
Step 309, compare DvIs divided into three blocks, denoted as Dv=(Dv2,Dv1,Dv0),Dv2、Dv1、Dv0The number of bits of (1) is D, and D with the same weightv2,Dv1,Dv0Add to give Resu,u∈[0,m+2];
ResuA sum of at most 3d bits, d +2 bits, and Ai、BjKeeping consistent;
step 310, Res is addeduObtaining a polynomial as a coefficient, the polynomial representing a large integer as a next modular squaring operation a2Input a in mod M.
Fastest completion of modular exponentiationBecomes a leader, wins the block right and awards the block.
When parameter Tz=220I.e. carry out 2 serially20The result of the submodular squaring operation is a large integer
93131168495806433794105952058146804125683044998940633368482405 94238761348112981208109457665428144239123743847857353972270749 71310831553935642149432317642476278889018182023847960487843904 02164051540535519582198541484494041664789150917896927364210510 32032088130019592046315604223922634160792816890607827492823029 35213638990615389059671204133624462412439674733457626719331091 50503119918706220094874496129033060643689091621244558639683312 36076418409624917633094632604225698534288877297409743792410626 3981159186607520956600654091879692273741517121439260660067328 30524940136272640331045853468337872108295009808751649707659 。
Claims (2)
1. One kind is usedThe method for improving the throughput of the block chain by the low-delay modular squaring algorithm is characterized by comprising the following steps of:
step 1, each miner on a block chain generates a space certificate from a plurality of spaces owned by each miner; one space corresponds to one space certificate, and the space certificate quantity of miners is equal to the space quantity owned by the miners;
step 2, inputting the respective space certificate into a uniform hash function H (-) by each miner, and calculating to respectively obtain a hash value corresponding to each space certificate;
step 3, taking the minimum value T from the hash values of the owned space certificates by each minerzPerforming modular exponentiationWherein a represents the input, mod represents the modulo operation, and M represents the modulus;
fastest completion of modular exponentiationThe miners become the leaders and win the block right and the block reward;
each miner performs modular exponentiationContinuous T on 8-bit superconducting integrated circuitzSub-serial operation modulo square a2mod M, then any miners run the modulo quadratic operation a once per time2mod M includes the following steps:
step 301, the large integer a participating in the multiplication operation is expressed into a corresponding polynomial form, which includes:
a=a0r0+a1r1+a2r2+…+aIrI (1)
in the formula (1), the unknown number of the r polynomial is the base number of the computer; the index of r is defined as the weight;
in step 302, if the factor a is a and the factor B is a, the following formulas (2) and (3) are provided:
A=A0r0+A1r1+A2r2+…+AIrI (2)
B=B0r0+B1r1+B2r2+…+BIrI (3)
coefficient A in formula (2)iAnd the coefficient B in the formula (3)jThe number of bits of (c) is d +2, d is 8, I belongs to [0, I ∈ [ ]],j∈[0,I];
Step 303, calculate the coefficient AiAnd coefficient BjMultiplying to obtain Tij=Ai·Bj,TijThe number of bits of (d) is 2d + 4;
step 304, adding TijIs divided into three blocks, which are expressed as (T)ij2,Tij1,Tij0) Wherein, Tij0And Tij1The number of bits of (1) is d, Tij2The number of bits of (a) is 4;
will (T)ij2,Tij1,Tij0) Is described as (T)k2,Tk1,Tk0),k∈[0,(I+1)2]Will have T of the same weightk2、Tk1、Tk0Add to obtain Dt,t∈[0,2(I+1)],DtHas a bit number of 3D, DtIs divided into three blocks which are represented as (Dt2,Dt1,Dt0),Dt2、Dt1、Dt0The number of bits is d;
step 305, D with the same weightt2、Dt1、Dt0Add to obtain CtMixing C withtObtaining a polynomial representing a multiplication result C obtained by multiplying the factor A by the factor B as a coefficient;
step 306, expressing the modulus M as a polynomial, and obtaining the highest weight M of the polynomial;
step 307, obtaining all weights greater than the highest weight M in the polynomial of the multiplication result C obtained in step 305, calculating a modulo operation result of a modulus M corresponding to each weight, then expressing the calculation result as the polynomial, and storing coefficients of the polynomial;
step 308, for each weight of which the multiplication result C obtained in step 305 is greater than the highest weight of the modulus M, inquiring the coefficients of the weight stored in step 307 in the modulus operation result of the corresponding weight, and for all the inquired coefficients, adding the coefficients of the same weight to obtain Dv,DvHas a bit number of 3d, v ∈ [0, m ]];
Step 309, compare DvIs divided into three blocks, denoted as Dv=(Dv2,Dv1,Dv0),Dv2、Dv1、Dv0The number of bits of (1) is D, and D with the same weightv2,Dv1,Dv0Add to give Resu,u∈[0,m+2];
Step 310, Res is addeduObtaining a polynomial as a coefficient, the polynomial representing a large integer as a next modular squaring operation a2Input a in mod M.
2. An application as in claim 1The method for improving the throughput of the block chain by the low-latency modular squaring algorithm is characterized in that in step 307, the weight of any polynomial of the multiplication result C which is larger than the highest weight m is defined asw, then:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011251780.9A CN112346708B (en) | 2020-11-11 | 2020-11-11 | Method for improving throughput of blockchain by using Sizt low-delay modulus squaring algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011251780.9A CN112346708B (en) | 2020-11-11 | 2020-11-11 | Method for improving throughput of blockchain by using Sizt low-delay modulus squaring algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112346708A true CN112346708A (en) | 2021-02-09 |
CN112346708B CN112346708B (en) | 2023-07-21 |
Family
ID=74363319
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011251780.9A Active CN112346708B (en) | 2020-11-11 | 2020-11-11 | Method for improving throughput of blockchain by using Sizt low-delay modulus squaring algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112346708B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7191333B1 (en) * | 2001-10-25 | 2007-03-13 | Cisco Technology, Inc. | Method and apparatus for calculating a multiplicative inverse of an element of a prime field |
CN110445778A (en) * | 2019-08-01 | 2019-11-12 | 中盾云链(广州)信息科技有限公司 | A kind of common recognition algorithm applied to alliance's chain |
WO2020022958A1 (en) * | 2018-07-27 | 2020-01-30 | Aioz Pte Ltd | Method and apparatus for transaction verification in a blockchain-based network |
CN111030993A (en) * | 2019-11-11 | 2020-04-17 | 重庆邮电大学 | Rayleigh consensus method based on extended credible authentication in alliance block chain |
WO2020082213A1 (en) * | 2018-10-22 | 2020-04-30 | 深圳市哈希树科技有限公司 | Network expandability blockchain implementation method |
-
2020
- 2020-11-11 CN CN202011251780.9A patent/CN112346708B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7191333B1 (en) * | 2001-10-25 | 2007-03-13 | Cisco Technology, Inc. | Method and apparatus for calculating a multiplicative inverse of an element of a prime field |
WO2020022958A1 (en) * | 2018-07-27 | 2020-01-30 | Aioz Pte Ltd | Method and apparatus for transaction verification in a blockchain-based network |
WO2020082213A1 (en) * | 2018-10-22 | 2020-04-30 | 深圳市哈希树科技有限公司 | Network expandability blockchain implementation method |
CN110445778A (en) * | 2019-08-01 | 2019-11-12 | 中盾云链(广州)信息科技有限公司 | A kind of common recognition algorithm applied to alliance's chain |
CN111030993A (en) * | 2019-11-11 | 2020-04-17 | 重庆邮电大学 | Rayleigh consensus method based on extended credible authentication in alliance block chain |
Also Published As
Publication number | Publication date |
---|---|
CN112346708B (en) | 2023-07-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106156159B (en) | A kind of table connection processing method, device and cloud computing system | |
KR101269737B1 (en) | Encryption processing apparatus, encryption processing method, and computer program medium | |
Patronik et al. | Design of Reverse Converters for General RNS Moduli Sets $\{2^{k}, 2^{n}-1, 2^{n}+ 1, 2^{n+ 1}-1\} $ and $\{2^{k}, 2^{n}-1, 2^{n}+ 1, 2^{n-1}-1\} $($ n $ even) | |
Nair et al. | Analysis of ECC for application specific WSN security | |
WO2020075797A1 (en) | Secret right shift calculation system, secret division system, method of same, secret calculation device, and program | |
Aasaraai et al. | Fpga acceleration of multi-scalar multiplication: Cyclonemsm | |
CN112346708A (en) | Method for improving block chain throughput by using zturk low-delay modular square algorithm | |
Lisa et al. | Design of a compact reversible carry look-ahead adder using dynamic programming | |
WO2023246063A1 (en) | Modular multiplier, security chip, electronic device and encryption method | |
CN110109913B (en) | Hardware implementation method and device of zerocase mining algorithm | |
Guo et al. | Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT | |
CN114594925A (en) | Efficient modular multiplication circuit suitable for SM2 encryption operation and operation method thereof | |
Wang et al. | A Variable-Length Chromosome Evolutionary Algorithm for Reversible Circuit Synthesis. | |
JP5816383B2 (en) | Interleaver index generation apparatus and method | |
Ma et al. | Fast implementation for modular inversion and scalar multiplication in the elliptic curve cryptography | |
Jagadeeshkumar et al. | A novel design of low power and high speed hybrid multiplier | |
JP2004271792A (en) | Device and program for scalar multiplying operation on elliptic curve | |
CN111563598A (en) | Method and system for predicting quantum computation simulation time | |
Harb et al. | High-performance Pipelined FPGA Implementation of the Elliptic Curve Cryptography over GF (2n). | |
CN114650135B (en) | Software and hardware cooperated SM2 elliptic curve cryptography algorithm implementation method | |
CN116405200B (en) | Distillable key estimation method, apparatus, device and storage medium | |
Planinic et al. | On the genotype compression and expansion for evolutionary algorithms in the continuous domain | |
Gashkov et al. | An application of the method of additive chains to inversion in finite fields. | |
CN115834086A (en) | Efficient implementation method and system for multiple exponential powers and multiple scalar multiplication in digital signature | |
Heng et al. | Fast Continuous Scalar Multiplication Algorithms on Twisted Edwards Elliptic Curve |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |