CN114710514A - Block chain consensus system based on post-quantum threshold signature - Google Patents

Block chain consensus system based on post-quantum threshold signature Download PDF

Info

Publication number
CN114710514A
CN114710514A CN202210485565.8A CN202210485565A CN114710514A CN 114710514 A CN114710514 A CN 114710514A CN 202210485565 A CN202210485565 A CN 202210485565A CN 114710514 A CN114710514 A CN 114710514A
Authority
CN
China
Prior art keywords
user
block
node
signature
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210485565.8A
Other languages
Chinese (zh)
Inventor
易海博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Polytechnic
Original Assignee
Shenzhen Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Polytechnic filed Critical Shenzhen Polytechnic
Priority to CN202210485565.8A priority Critical patent/CN114710514A/en
Publication of CN114710514A publication Critical patent/CN114710514A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention discloses a block chain consensus system based on post-quantum threshold signature, which comprises the following steps: the block chain consensus method comprises a block generator election module, a block generation module, a block verification module and a block chain updating module, wherein the block generator election module, the block generation module, the block verification module and the block chain updating module are sequentially connected.

Description

Block chain consensus system based on post-quantum threshold signature
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a block chain consensus system based on post-quantum threshold signatures.
Background
A blockchain is a trusted, traceable, non-tamperable, de-centralized distributed database. The blockchain is managed by a P2P network user node. The most successful application of blockchains is bitcoin, which was born in 2008. Since then, blockchain technology has been widely used in cryptocurrency, finance, banking, supply chain and logistics.
The blockchain is a data management system which can only be added, and is operated and maintained by a P2P network. Each node of the P2P network maintains a complete blockchain. The blocks of the blockchain store information, such as transaction data. When a new transaction occurs, all nodes must agree on the transaction to be able to store in the blockchain's blocks.
The consensus algorithm is one of the most important algorithms for the blockchain. The block chain consensus algorithm is mainly based on computational power, mainly comprises algorithms such as PoW and PBFT, and needs long operation time. For example, a bitcoin takes 60 minutes to confirm a transaction. Therefore, it is very important to improve the blockchain consensus algorithm.
Disclosure of Invention
The invention aims to provide a block chain consensus system based on post-quantum threshold signatures, so as to solve the problems in the prior art.
In order to achieve the above object, the present invention provides a block chain consensus system based on post-quantum threshold signature, comprising: the system comprises a block generator election module, a block generation module, a block verification module and a block chain updating module, wherein the block generator election module, the block generation module, the block verification module and the block chain updating module are sequentially connected;
the block generator election module is used for acquiring a user group, wherein the user group comprises a management node and a user node, and an initial user node is selected based on the user group;
the block generation module generates a new block based on the initial user node;
the block verification module is used for verifying the authenticity of the new block through a management node and a user node based on a post-quantum threshold signature method;
and the block chain updating module is used for adding the verified new blocks to the block chain so as to realize block chain consensus.
Preferably, the process of selecting the initial user node in the block generator election module includes: exchanging user nodes in different user groups to obtain a new user group; randomly selecting a user group from the new user groups; and using one user node in one selected user group as an initial user node.
Preferably, the process of generating a new tile in the tile generating module comprises: generating a new block based on the initial user node, wherein the new block stores transaction information and a hash value.
Preferably, the process of verifying the authenticity of the new tile in the tile verification module comprises:
based on the new block, the management node uses a private key to calculate to obtain a management node signature;
the management node sequentially sends the new block and the management section signature to different user nodes under the same user group, and the user node verification is performed on the new block and the management section signature sequentially through the user nodes;
if the user node verifies that the new block passes through the private key, calculating a user node signature based on the management node signature, transmitting the user node signature to the management node, verifying the public key of the user node signature by the management node through obtaining the public key of the user node, storing the user node signature if the public key verification passes, sending the new block and the management node signature to the next user node, and if the public key verification fails, determining that the user node verification fails;
if the user node fails to pass the verification, the user node does not send a user signature to the management node, the management node updates the management node signature, the updated management node signature is transmitted to the next user node for verification until the verification of the user node which does not use under the same user group is completed, a complete signature of the user group is obtained, the complete signature of the user group is judged, if the judgment result is that the user group passes the verification, the authenticity verification is passed, the complete signature and the public key of the user group are output, and if the judgment result is that the user group does not pass the verification, the authenticity verification is not passed.
Preferably, the user node authentication process includes: if the transaction data in the new block is consistent with the original transaction data and the hash value of the transaction data is consistent with the value obtained after the hash operation of the original transaction data, the user node passes the verification; otherwise, the user node fails the verification.
Preferably, the process of public key verification: and the management node calculates public key verification data based on the public key of the user node and the signature of the user node, if the public key verification data is equal to the signature of the management node, the public key verification is passed, otherwise, the public key verification is not passed.
Preferably, the process of determining the complete signature of the user group includes: if the number of the complete signatures of the user group is less than 50%, the signatures are not established; otherwise, the complete signature of the user group is judged to be passed.
Preferably, the process of adding the verified new block to the blockchain in the blockchain update module includes: broadcasting the new block and the user node signature to other user groups, verifying the complete signature of the user group by the other user groups based on a public key output by a block verification module, and adding the new block to a block chain to realize block chain consensus based on a verification result.
The invention has the technical effects that: the invention provides a block chain consensus system based on post-quantum threshold signature, which selects user nodes through a block generator election module, generates new blocks through a block generation module based on the user nodes, verifies the generated new blocks through a block verification module based on the post-quantum threshold signature, and adds the generated new blocks to a block chain through a block chain updating module.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
fig. 1 is a schematic diagram of a system structure in an embodiment of the present invention.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
As shown in fig. 1, the present embodiment provides a block chain consensus system based on post-quantum threshold signature, including: and the block generator election module is used for electing the node responsible for generating the block.
And the block generating module is used for generating a new block.
And the block verification module is used for verifying the authenticity of the block.
And the block chain updating module is used for adding a new block to the block chain.
The block generator election module elects the node responsible for generating the block from all the nodes of the block chain network. The blockchain network consists of m management nodes and a plurality of user nodes. Each management node manages a user group, and each user group comprises a plurality of users. All blockchain nodes are divided into m groups. When a new user joins the blockchain network, it is randomly assigned to a group of users. Each user node belongs to only one user group.
The block generator election module elects the following node responsible for generating the block chain:
1. each management node exchanges each user node in the user group with any user node in any other group. Eventually forming m new user groups.
2. And randomly selecting one user group from the m new user groups to be responsible for generating the new block. Assume that the t-th user group is selected.
3. Assuming that the t-th user group has n user nodes, the management node of the user group randomly generates a new block in one of the n user nodes.
4. All processes are carried out in the t user group, and are anonymous in the whole process.
The block generation module is a process of selecting a node in charge of generating a block, packaging all transaction information submitted to the blockchain network at present, and generating a new block.
The block generation module generates a new block as follows:
1. the node selected to be responsible for generating the tile starts generating a new tile.
2. All transaction information currently submitted to the blockchain network is packaged into the blockbodies of the blocks.
3. The node selected to be responsible for generating the block generates a hash value for the block body of the block and writes the hash value into the block hash of the block.
4. And the selected node responsible for generating the block sends the new block to the management node of the t-th user group.
The block verification module is a process for verifying a new block by all user nodes and management nodes in the t-th user group, and is also a core of a block chain consensus system based on a post-quantum threshold signature.
The block verification module verifies the new block m as follows:
1. the management node of the t-th user group calculates m ' ═ t (m), and then calculates a hash value of m ', i.e., H (m '). T is the message transformation module.
2. Private key computation by a management node using it
Figure BDA0003629753380000061
F is a multivariate equation evaluation module, L is a linear transformation module, krIs the private key of the management node.
3. The management node combines m and sr1And sending to the first user node.
4. If the first user agrees to accept the verification and verifies that m passes, i.e. the transaction data in m is consistent with the original transaction data and the hash value of the transaction data is consistent with the value obtained by the hash operation of the original transaction data, it uses its private key k1Computing
Figure BDA0003629753380000062
F1Is a multivariate equation evaluation module, L1Is a linear transformation module, k1Is the private key of the first user node.
5. The first user will s1And sending the information to the management node.
6. The management node uses the first onePublic key p of user1Verification of a signature s1Calculating
Figure BDA0003629753380000063
If the result equals sr1Then sign s1Is received, otherwise the signature is rejected.
Figure BDA0003629753380000064
Is a multivariate polynomial evaluation module.
7. If the first user does not send a signature back to the management node, the management node will sum m and sr1Sent to the next user node and waits for reception s1. Otherwise, the management node calculates m ″ ═ T (m'), and then calculates a hash value of m ″, i.e., H (m ″). T is a message transformation module.
8. Private key computation by a management node using it
Figure BDA0003629753380000065
F is a multivariate equation evaluation module, L is a linear transformation module, krIs the private key of the management node.
9. The management node combines m and sr2Sent to the next user node and waits for reception s2
10.s3,s4,...,slThe calculation process of (2) is similar to the previous flow until the query of the last user node is completed.
11. Management node Collection s1,s2,...,slAs a complete signature. If l.ltoreq.n/2, the signature does not hold, since the number of people participating is less than 50%. Otherwise, the signature(s)1,s2,...,sl) Is a valid signature of m.
12. The management node outputs a signature(s)1,s2,...,sl) And a public key pr,p1,p2,...,pl
And the block chain updating module is a process of adding a new block to the block chain by the node which is selected to be responsible for generating the block.
The block chain updating module updates the block chain by the following process:
1. selected responsible for generating blocks adds the new block to the chain of blocks.
2. New patch and signature(s)1,s2,...,sl) Is broadcast to other nodes of the blockchain network.
3. Other nodes obtain new blocks and signatures(s)1,s2,...,sl) And use the public key pr,p1,p2,...,plThe signature is verified.
4. If the verification passes, the new tile is added to the chain of tiles.
Node verification signature(s)1,s2,...,sl) The process of (2) is as follows:
1. using the public key p1Computing
Figure BDA0003629753380000071
If the result equals sr1Then it continues, otherwise the signature is rejected,
Figure BDA0003629753380000072
is a multivariate polynomial evaluation module.
2. Continue to calculate m ' ═ t (m), and then calculate the hash value for m ', i.e., H (m '). T is a message transformation module.
3. Using the public key prCalculating out
Figure BDA0003629753380000073
If the result is equal to H (m'), continue, otherwise reject the signature,
Figure BDA0003629753380000074
is a multivariate polynomial evaluation module.
4.(sr2,sr3,...,srl,s2,s3,...,sl) Using the public key pr,p2,p3,...,plThe method is similar.
5. If(s)r1,sr2,...,srl,s1,s2,...,sl) If verified, the signature is true, otherwise the signature is rejected.
Multivariate equation evaluation module, by function F, F1,F2,...,FnAnd (5) calling.
The input to the multivariate equation evaluation module is x.
The output of the multivariate equation evaluation module is y.
The multivariate polynomial of the multivariate equation evaluation module is as follows:
∑αijOiVj+∑βiOi+∑χijViVj+∑δiVi+ε.
the operation process of the multivariate equation evaluation module is as follows:
1. the vinegar variables were randomly generated and substituted into a multivariate system of equations.
2.α, β, χ, δ, ε are private keys that are substituted into a multivariate equation set.
3. The multivariate equation set is converted to a linear equation set with respect to only the oil variables.
4. The system of linear equations is solved using gaussian elimination or gaussian approximation elimination.
5. The vinegar variable and the solved oil variable are outputs.
Linear transformation module, by function L, L1,L2,...,LnAnd (5) calling.
The input to the linear transformation module is x.
The output of the linear transformation module is y.
The operation process of the linear transformation module is as follows:
1. the input x is substituted into y ═ ax + b.
A is the private key matrix substituted to compute the matrix vector multiplication ax.
B is the private key vector, substituted into the calculation vector addition ax + b.
Y is the output.
Multivariate polynomial evaluation module, function
Figure BDA0003629753380000081
And (5) calling.
The input to the multivariate polynomial evaluation module is x.
The output of the multivariate polynomial evaluation module is y.
The operation of the multivariate polynomial evaluation module is as follows:
1. the input x is substituted into a set of multivariate polynomial calculations.
2. The public key is substituted into the set of multivariate polynomials as coefficients of the polynomials.
3. The multivariate polynomial is evaluated and the result is y.
And the message transformation module is called by the function T.
The operation process of the message transformation module is as follows:
1. the input m is represented in binary form and then circularly right shifted by one bit to be transformed into m'.
M' is the output.
The working process of the block chain consensus system based on the post-quantum threshold signature in this embodiment is as follows:
1. each management node exchanges each user node in the user group with any user node in any other group. Eventually forming m new user groups.
2. And randomly selecting one user group from the m new user groups to be responsible for generating the new block. Assume that the t-th user group is selected.
3. Assuming that the t-th user group has n user nodes, the management node of the user group randomly generates a new block in one of the n user nodes.
4. All processes are carried out in the t user group, and are anonymous in the whole process.
5. The node selected to be responsible for generating the tile starts generating a new tile.
6. All transaction information currently submitted to the blockchain network is packaged into the blockbodies of the blocks.
7. The node selected to be responsible for generating the block generates a hash value for the block body of the block and writes the hash value into the block hash of the block.
8. And the selected node responsible for generating the block sends the new block to the management node of the t-th user group.
9. The management node of the t-th user group calculates m ' ═ t (m), and then calculates a hash value of m ', i.e., H (m '). T is a message transformation module.
10. Private key computation by a management node using it
Figure BDA0003629753380000091
F is a multivariate equation evaluation module, L is a linear transformation module, krIs the private key of the management node.
11. The management node combines m and sr1And sending to the first user node.
12. If the first user agrees to accept the verification and verifies that m passes, i.e. the transaction data in m is consistent with the original transaction data and the hash value of the transaction data is consistent with the value obtained by the hash operation of the original transaction data, it uses its private key k1Computing
Figure BDA0003629753380000101
F1Is a multivariate equation evaluation module, L1Is a linear transformation module, k1Is the private key of the first user node.
13. The first user will s1And sending the information to the management node.
14. The management node uses the public key p of the first user1Verification of a signature s1Calculating
Figure BDA0003629753380000102
If the result equals sr1Then sign s1Is received, otherwise the signature is rejected.
Figure BDA0003629753380000103
Is a multivariate polynomial evaluation module.
15. If the first user does not send a signature back to the management node, the management node will sum m and sr1Sent to the next user node and waits for reception s1. Otherwise, the management nodeCalculate m ″ -T (m'), and then calculate the hash value of m ″, i.e., H (m ″). T is a message transformation module.
16. Private key computation by a management node using it
Figure BDA0003629753380000104
F is a multivariate equation evaluation module, L is a linear transformation module, krIs the private key of the management node.
17. The management node combines m and sr2Sent to the next user node and waits for reception s2
18.s3,s4,...,slThe calculation process of (2) is similar to the previous flow until the query of the last user node is completed.
19. Management node Collection s1,s2,...,slAs a complete signature. If l.ltoreq.n/2, the signature does not hold, since the number of people participating is less than 50%. Otherwise, the signature(s)1,s2,...,sl) Is a valid signature of m.
20. Management node outputs a signature(s)1,s2,...,sl) And a public key pr,p1,p2,...,pl
21. Selected responsible for generating blocks adds the new block to the chain of blocks.
22. New patch and signature(s)1,s2,...,sl) Is broadcast to other nodes of the blockchain network.
23. Other nodes obtain new blocks and signatures(s)1,s2,...,sl) And use the public key pr,p1,p2,...,plThe signature is verified.
24. If the verification passes, the new tile is added to the chain of tiles.
The above description is only for the preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. A block chain consensus system based on post-quantum threshold signatures, comprising: the system comprises a block generator election module, a block generation module, a block verification module and a block chain updating module, wherein the block generator election module, the block generation module, the block verification module and the block chain updating module are sequentially connected;
the block generator election module is used for acquiring a user group, wherein the user group comprises a management node and a user node, and an initial user node is selected based on the user group;
the block generation module generates a new block based on the initial user node;
the block verification module is used for verifying the authenticity of the new block through a management node and a user node based on a post-quantum threshold signature method;
and the block chain updating module is used for adding the verified new block to the block chain so as to realize block chain consensus.
2. The block chain consensus system based on post-quantum-threshold signatures of claim 1,
the process of selecting the initial user node in the block generator election module comprises the following steps: exchanging user nodes in different user groups to obtain a new user group; randomly selecting a user group from the new user groups; and using one user node in one selected user group as an initial user node.
3. The block chain consensus system based on post-quantum-threshold signatures of claim 1,
the process of generating a new block in the block generating module comprises the following steps: generating a new block based on the initial user node, wherein the new block stores transaction information and a hash value.
4. The block chain consensus system based on post-quantum-threshold signatures of claim 1,
the process of verifying the authenticity of the new block in the block verification module comprises the following steps:
based on the new block, the management node uses a private key to calculate to obtain a management node signature;
the management node sequentially sends the new block and the management section signature to different user nodes under the same user group, and the user node verification is performed on the new block and the management section signature sequentially through the user nodes;
if the user node verifies that the new block passes through the private key, calculating a user node signature based on the management node signature, transmitting the user node signature to the management node, verifying the public key of the user node signature by the management node through obtaining the public key of the user node, storing the user node signature if the public key verification passes, sending the new block and the management node signature to the next user node, and if the public key verification fails, determining that the user node verification fails;
if the user node fails to pass the verification, the user node does not send a user signature to the management node, the management node updates the management node signature, the updated management node signature is transmitted to the next user node for verification until the verification of the user node which does not use under the same user group is completed, a complete signature of the user group is obtained, the complete signature of the user group is judged, if the judgment result is that the user group passes the verification, the authenticity verification is passed, the complete signature and the public key of the user group are output, and if the judgment result is that the user group does not pass the verification, the authenticity verification is not passed.
5. The block chain consensus system based on post-quantum-threshold signatures according to claim 4,
the user node authentication process comprises the following steps: if the transaction data in the new block is consistent with the original transaction data and the hash value of the transaction data is consistent with the value obtained after the hash operation of the original transaction data, the user node passes the verification; otherwise, the user node fails the verification.
6. The block chain consensus system based on post-quantum-threshold signatures according to claim 4,
and (3) public key verification: and the management node calculates public key verification data based on the public key of the user node and the signature of the user node, if the public key verification data is equal to the signature of the management node, the public key verification is passed, otherwise, the public key verification is not passed.
7. The block chain consensus system based on post-quantum-threshold signatures according to claim 4,
the process of judging the complete signature of the user group comprises the following steps: if the number of the complete signatures of the user group is less than 50%, the signatures are not established; otherwise, the complete signature of the user group is judged to be passed.
8. The block chain consensus system based on post-quantum-threshold signatures of claim 1,
the process of adding the verified new block to the blockchain in the blockchain update module comprises the following steps: broadcasting the new block and the user node signature to other user groups, verifying the complete signature of the user group by the other user groups based on a public key output by a block verification module, and adding the new block to a block chain to realize block chain consensus based on a verification result.
CN202210485565.8A 2022-05-06 2022-05-06 Block chain consensus system based on post-quantum threshold signature Pending CN114710514A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210485565.8A CN114710514A (en) 2022-05-06 2022-05-06 Block chain consensus system based on post-quantum threshold signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210485565.8A CN114710514A (en) 2022-05-06 2022-05-06 Block chain consensus system based on post-quantum threshold signature

Publications (1)

Publication Number Publication Date
CN114710514A true CN114710514A (en) 2022-07-05

Family

ID=82177330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210485565.8A Pending CN114710514A (en) 2022-05-06 2022-05-06 Block chain consensus system based on post-quantum threshold signature

Country Status (1)

Country Link
CN (1) CN114710514A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116996237A (en) * 2023-09-29 2023-11-03 山东高速建设管理集团有限公司 Distributed management method and system based on quantum threshold signature

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109104286A (en) * 2018-07-26 2018-12-28 杭州安恒信息技术股份有限公司 A kind of new block generation method of the common recognition based on threshold digital signature
WO2019093574A1 (en) * 2017-11-10 2019-05-16 부산대학교 산학협력단 Block chain system and method employing hash-based signature scheme
CN112994891A (en) * 2019-12-18 2021-06-18 中国移动通信集团浙江有限公司 Transaction request consensus method and system based on threshold signature
CN114117549A (en) * 2021-11-22 2022-03-01 上海金仕达软件科技有限公司 Post-quantum multi-node threshold signature method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019093574A1 (en) * 2017-11-10 2019-05-16 부산대학교 산학협력단 Block chain system and method employing hash-based signature scheme
CN109104286A (en) * 2018-07-26 2018-12-28 杭州安恒信息技术股份有限公司 A kind of new block generation method of the common recognition based on threshold digital signature
CN112994891A (en) * 2019-12-18 2021-06-18 中国移动通信集团浙江有限公司 Transaction request consensus method and system based on threshold signature
CN114117549A (en) * 2021-11-22 2022-03-01 上海金仕达软件科技有限公司 Post-quantum multi-node threshold signature method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116996237A (en) * 2023-09-29 2023-11-03 山东高速建设管理集团有限公司 Distributed management method and system based on quantum threshold signature
CN116996237B (en) * 2023-09-29 2023-12-08 山东高速建设管理集团有限公司 Distributed management method and system based on quantum threshold signature

Similar Documents

Publication Publication Date Title
US8713329B2 (en) Authenticated secret sharing
CN101547099B (en) Elliptical curve-based method and elliptical curve-based device for self-authenticating signature
Chenaghlu et al. A novel keyed parallel hashing scheme based on a new chaotic system
Jeong et al. Neural cryptography based on generalized tree parity machine for real-life systems
Zhu et al. A round-optimal lattice-based blind signature scheme for cloud services
CN112468302A (en) Editable blockchain based on verifiable multiparty secret sharing
Huang et al. Efficient secure computation with garbled circuits
CN111614679B (en) Federal learning qualification recovery method, device and readable storage medium
US20230006836A1 (en) Multi-party and multi-use quantum resistant signatures and key establishment
Wu et al. Distributed Timestamp Mechanism Based on Verifiable Delay Functions.
Ramkumar Executing large-scale processes in a blockchain
CN114710514A (en) Block chain consensus system based on post-quantum threshold signature
Shahid et al. WOTS-S: a quantum secure compact signature scheme for distributed ledger
CN113939821A (en) System and method for non-parallel mining on a workload justification blockchain network
Wang et al. A novel blockchain identity authentication scheme implemented in fog computing
WO2023016729A1 (en) Generating digital signature shares
CN117917041A (en) Generating a shared encryption key
WO2021147283A1 (en) Transaction sender supervision method and system
Jiang et al. Lattice-based proxy signature scheme with reject sampling method
Xiao et al. New digital signature algorithm based on ECC and its application in bitcoin and IoT
Qiao et al. Implementation of one-time editable blockchain chameleon hash function construction scheme
CN115632791B (en) Dynamic cross-chain data consistency decentration verification method
Wu et al. A distributed cross-chain mechanism based on notary schemes and group signatures
Zou et al. A new digital signature primitive and its application in blockchain
Khan et al. A Scalable Blockchain Consensus Model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220705

RJ01 Rejection of invention patent application after publication