CN114710514A - Block chain consensus system based on post-quantum threshold signature - Google Patents
Block chain consensus system based on post-quantum threshold signature Download PDFInfo
- Publication number
- CN114710514A CN114710514A CN202210485565.8A CN202210485565A CN114710514A CN 114710514 A CN114710514 A CN 114710514A CN 202210485565 A CN202210485565 A CN 202210485565A CN 114710514 A CN114710514 A CN 114710514A
- Authority
- CN
- China
- Prior art keywords
- user
- block
- node
- signature
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 claims abstract description 61
- 238000000034 method Methods 0.000 claims abstract description 32
- 238000007726 management method Methods 0.000 description 54
- 238000011156 evaluation Methods 0.000 description 19
- 230000009466 transformation Effects 0.000 description 17
- 238000004364 calculation method Methods 0.000 description 4
- 230000008030 elimination Effects 0.000 description 2
- 238000003379 elimination reaction Methods 0.000 description 2
- 239000011159 matrix material Substances 0.000 description 2
- 235000021419 vinegar Nutrition 0.000 description 2
- 239000000052 vinegar Substances 0.000 description 2
- 238000013523 data management Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The invention discloses a block chain consensus system based on post-quantum threshold signature, which comprises the following steps: the block chain consensus method comprises a block generator election module, a block generation module, a block verification module and a block chain updating module, wherein the block generator election module, the block generation module, the block verification module and the block chain updating module are sequentially connected.
Description
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a block chain consensus system based on post-quantum threshold signatures.
Background
A blockchain is a trusted, traceable, non-tamperable, de-centralized distributed database. The blockchain is managed by a P2P network user node. The most successful application of blockchains is bitcoin, which was born in 2008. Since then, blockchain technology has been widely used in cryptocurrency, finance, banking, supply chain and logistics.
The blockchain is a data management system which can only be added, and is operated and maintained by a P2P network. Each node of the P2P network maintains a complete blockchain. The blocks of the blockchain store information, such as transaction data. When a new transaction occurs, all nodes must agree on the transaction to be able to store in the blockchain's blocks.
The consensus algorithm is one of the most important algorithms for the blockchain. The block chain consensus algorithm is mainly based on computational power, mainly comprises algorithms such as PoW and PBFT, and needs long operation time. For example, a bitcoin takes 60 minutes to confirm a transaction. Therefore, it is very important to improve the blockchain consensus algorithm.
Disclosure of Invention
The invention aims to provide a block chain consensus system based on post-quantum threshold signatures, so as to solve the problems in the prior art.
In order to achieve the above object, the present invention provides a block chain consensus system based on post-quantum threshold signature, comprising: the system comprises a block generator election module, a block generation module, a block verification module and a block chain updating module, wherein the block generator election module, the block generation module, the block verification module and the block chain updating module are sequentially connected;
the block generator election module is used for acquiring a user group, wherein the user group comprises a management node and a user node, and an initial user node is selected based on the user group;
the block generation module generates a new block based on the initial user node;
the block verification module is used for verifying the authenticity of the new block through a management node and a user node based on a post-quantum threshold signature method;
and the block chain updating module is used for adding the verified new blocks to the block chain so as to realize block chain consensus.
Preferably, the process of selecting the initial user node in the block generator election module includes: exchanging user nodes in different user groups to obtain a new user group; randomly selecting a user group from the new user groups; and using one user node in one selected user group as an initial user node.
Preferably, the process of generating a new tile in the tile generating module comprises: generating a new block based on the initial user node, wherein the new block stores transaction information and a hash value.
Preferably, the process of verifying the authenticity of the new tile in the tile verification module comprises:
based on the new block, the management node uses a private key to calculate to obtain a management node signature;
the management node sequentially sends the new block and the management section signature to different user nodes under the same user group, and the user node verification is performed on the new block and the management section signature sequentially through the user nodes;
if the user node verifies that the new block passes through the private key, calculating a user node signature based on the management node signature, transmitting the user node signature to the management node, verifying the public key of the user node signature by the management node through obtaining the public key of the user node, storing the user node signature if the public key verification passes, sending the new block and the management node signature to the next user node, and if the public key verification fails, determining that the user node verification fails;
if the user node fails to pass the verification, the user node does not send a user signature to the management node, the management node updates the management node signature, the updated management node signature is transmitted to the next user node for verification until the verification of the user node which does not use under the same user group is completed, a complete signature of the user group is obtained, the complete signature of the user group is judged, if the judgment result is that the user group passes the verification, the authenticity verification is passed, the complete signature and the public key of the user group are output, and if the judgment result is that the user group does not pass the verification, the authenticity verification is not passed.
Preferably, the user node authentication process includes: if the transaction data in the new block is consistent with the original transaction data and the hash value of the transaction data is consistent with the value obtained after the hash operation of the original transaction data, the user node passes the verification; otherwise, the user node fails the verification.
Preferably, the process of public key verification: and the management node calculates public key verification data based on the public key of the user node and the signature of the user node, if the public key verification data is equal to the signature of the management node, the public key verification is passed, otherwise, the public key verification is not passed.
Preferably, the process of determining the complete signature of the user group includes: if the number of the complete signatures of the user group is less than 50%, the signatures are not established; otherwise, the complete signature of the user group is judged to be passed.
Preferably, the process of adding the verified new block to the blockchain in the blockchain update module includes: broadcasting the new block and the user node signature to other user groups, verifying the complete signature of the user group by the other user groups based on a public key output by a block verification module, and adding the new block to a block chain to realize block chain consensus based on a verification result.
The invention has the technical effects that: the invention provides a block chain consensus system based on post-quantum threshold signature, which selects user nodes through a block generator election module, generates new blocks through a block generation module based on the user nodes, verifies the generated new blocks through a block verification module based on the post-quantum threshold signature, and adds the generated new blocks to a block chain through a block chain updating module.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
fig. 1 is a schematic diagram of a system structure in an embodiment of the present invention.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
As shown in fig. 1, the present embodiment provides a block chain consensus system based on post-quantum threshold signature, including: and the block generator election module is used for electing the node responsible for generating the block.
And the block generating module is used for generating a new block.
And the block verification module is used for verifying the authenticity of the block.
And the block chain updating module is used for adding a new block to the block chain.
The block generator election module elects the node responsible for generating the block from all the nodes of the block chain network. The blockchain network consists of m management nodes and a plurality of user nodes. Each management node manages a user group, and each user group comprises a plurality of users. All blockchain nodes are divided into m groups. When a new user joins the blockchain network, it is randomly assigned to a group of users. Each user node belongs to only one user group.
The block generator election module elects the following node responsible for generating the block chain:
1. each management node exchanges each user node in the user group with any user node in any other group. Eventually forming m new user groups.
2. And randomly selecting one user group from the m new user groups to be responsible for generating the new block. Assume that the t-th user group is selected.
3. Assuming that the t-th user group has n user nodes, the management node of the user group randomly generates a new block in one of the n user nodes.
4. All processes are carried out in the t user group, and are anonymous in the whole process.
The block generation module is a process of selecting a node in charge of generating a block, packaging all transaction information submitted to the blockchain network at present, and generating a new block.
The block generation module generates a new block as follows:
1. the node selected to be responsible for generating the tile starts generating a new tile.
2. All transaction information currently submitted to the blockchain network is packaged into the blockbodies of the blocks.
3. The node selected to be responsible for generating the block generates a hash value for the block body of the block and writes the hash value into the block hash of the block.
4. And the selected node responsible for generating the block sends the new block to the management node of the t-th user group.
The block verification module is a process for verifying a new block by all user nodes and management nodes in the t-th user group, and is also a core of a block chain consensus system based on a post-quantum threshold signature.
The block verification module verifies the new block m as follows:
1. the management node of the t-th user group calculates m ' ═ t (m), and then calculates a hash value of m ', i.e., H (m '). T is the message transformation module.
2. Private key computation by a management node using itF is a multivariate equation evaluation module, L is a linear transformation module, krIs the private key of the management node.
3. The management node combines m and sr1And sending to the first user node.
4. If the first user agrees to accept the verification and verifies that m passes, i.e. the transaction data in m is consistent with the original transaction data and the hash value of the transaction data is consistent with the value obtained by the hash operation of the original transaction data, it uses its private key k1ComputingF1Is a multivariate equation evaluation module, L1Is a linear transformation module, k1Is the private key of the first user node.
5. The first user will s1And sending the information to the management node.
6. The management node uses the first onePublic key p of user1Verification of a signature s1CalculatingIf the result equals sr1Then sign s1Is received, otherwise the signature is rejected.Is a multivariate polynomial evaluation module.
7. If the first user does not send a signature back to the management node, the management node will sum m and sr1Sent to the next user node and waits for reception s1. Otherwise, the management node calculates m ″ ═ T (m'), and then calculates a hash value of m ″, i.e., H (m ″). T is a message transformation module.
8. Private key computation by a management node using itF is a multivariate equation evaluation module, L is a linear transformation module, krIs the private key of the management node.
9. The management node combines m and sr2Sent to the next user node and waits for reception s2。
10.s3,s4,...,slThe calculation process of (2) is similar to the previous flow until the query of the last user node is completed.
11. Management node Collection s1,s2,...,slAs a complete signature. If l.ltoreq.n/2, the signature does not hold, since the number of people participating is less than 50%. Otherwise, the signature(s)1,s2,...,sl) Is a valid signature of m.
12. The management node outputs a signature(s)1,s2,...,sl) And a public key pr,p1,p2,...,pl。
And the block chain updating module is a process of adding a new block to the block chain by the node which is selected to be responsible for generating the block.
The block chain updating module updates the block chain by the following process:
1. selected responsible for generating blocks adds the new block to the chain of blocks.
2. New patch and signature(s)1,s2,...,sl) Is broadcast to other nodes of the blockchain network.
3. Other nodes obtain new blocks and signatures(s)1,s2,...,sl) And use the public key pr,p1,p2,...,plThe signature is verified.
4. If the verification passes, the new tile is added to the chain of tiles.
Node verification signature(s)1,s2,...,sl) The process of (2) is as follows:
1. using the public key p1ComputingIf the result equals sr1Then it continues, otherwise the signature is rejected,is a multivariate polynomial evaluation module.
2. Continue to calculate m ' ═ t (m), and then calculate the hash value for m ', i.e., H (m '). T is a message transformation module.
3. Using the public key prCalculating outIf the result is equal to H (m'), continue, otherwise reject the signature,is a multivariate polynomial evaluation module.
4.(sr2,sr3,...,srl,s2,s3,...,sl) Using the public key pr,p2,p3,...,plThe method is similar.
5. If(s)r1,sr2,...,srl,s1,s2,...,sl) If verified, the signature is true, otherwise the signature is rejected.
Multivariate equation evaluation module, by function F, F1,F2,...,FnAnd (5) calling.
The input to the multivariate equation evaluation module is x.
The output of the multivariate equation evaluation module is y.
The multivariate polynomial of the multivariate equation evaluation module is as follows:
∑αijOiVj+∑βiOi+∑χijViVj+∑δiVi+ε.
the operation process of the multivariate equation evaluation module is as follows:
1. the vinegar variables were randomly generated and substituted into a multivariate system of equations.
2.α, β, χ, δ, ε are private keys that are substituted into a multivariate equation set.
3. The multivariate equation set is converted to a linear equation set with respect to only the oil variables.
4. The system of linear equations is solved using gaussian elimination or gaussian approximation elimination.
5. The vinegar variable and the solved oil variable are outputs.
Linear transformation module, by function L, L1,L2,...,LnAnd (5) calling.
The input to the linear transformation module is x.
The output of the linear transformation module is y.
The operation process of the linear transformation module is as follows:
1. the input x is substituted into y ═ ax + b.
A is the private key matrix substituted to compute the matrix vector multiplication ax.
B is the private key vector, substituted into the calculation vector addition ax + b.
Y is the output.
The input to the multivariate polynomial evaluation module is x.
The output of the multivariate polynomial evaluation module is y.
The operation of the multivariate polynomial evaluation module is as follows:
1. the input x is substituted into a set of multivariate polynomial calculations.
2. The public key is substituted into the set of multivariate polynomials as coefficients of the polynomials.
3. The multivariate polynomial is evaluated and the result is y.
And the message transformation module is called by the function T.
The operation process of the message transformation module is as follows:
1. the input m is represented in binary form and then circularly right shifted by one bit to be transformed into m'.
M' is the output.
The working process of the block chain consensus system based on the post-quantum threshold signature in this embodiment is as follows:
1. each management node exchanges each user node in the user group with any user node in any other group. Eventually forming m new user groups.
2. And randomly selecting one user group from the m new user groups to be responsible for generating the new block. Assume that the t-th user group is selected.
3. Assuming that the t-th user group has n user nodes, the management node of the user group randomly generates a new block in one of the n user nodes.
4. All processes are carried out in the t user group, and are anonymous in the whole process.
5. The node selected to be responsible for generating the tile starts generating a new tile.
6. All transaction information currently submitted to the blockchain network is packaged into the blockbodies of the blocks.
7. The node selected to be responsible for generating the block generates a hash value for the block body of the block and writes the hash value into the block hash of the block.
8. And the selected node responsible for generating the block sends the new block to the management node of the t-th user group.
9. The management node of the t-th user group calculates m ' ═ t (m), and then calculates a hash value of m ', i.e., H (m '). T is a message transformation module.
10. Private key computation by a management node using itF is a multivariate equation evaluation module, L is a linear transformation module, krIs the private key of the management node.
11. The management node combines m and sr1And sending to the first user node.
12. If the first user agrees to accept the verification and verifies that m passes, i.e. the transaction data in m is consistent with the original transaction data and the hash value of the transaction data is consistent with the value obtained by the hash operation of the original transaction data, it uses its private key k1ComputingF1Is a multivariate equation evaluation module, L1Is a linear transformation module, k1Is the private key of the first user node.
13. The first user will s1And sending the information to the management node.
14. The management node uses the public key p of the first user1Verification of a signature s1CalculatingIf the result equals sr1Then sign s1Is received, otherwise the signature is rejected.Is a multivariate polynomial evaluation module.
15. If the first user does not send a signature back to the management node, the management node will sum m and sr1Sent to the next user node and waits for reception s1. Otherwise, the management nodeCalculate m ″ -T (m'), and then calculate the hash value of m ″, i.e., H (m ″). T is a message transformation module.
16. Private key computation by a management node using itF is a multivariate equation evaluation module, L is a linear transformation module, krIs the private key of the management node.
17. The management node combines m and sr2Sent to the next user node and waits for reception s2。
18.s3,s4,...,slThe calculation process of (2) is similar to the previous flow until the query of the last user node is completed.
19. Management node Collection s1,s2,...,slAs a complete signature. If l.ltoreq.n/2, the signature does not hold, since the number of people participating is less than 50%. Otherwise, the signature(s)1,s2,...,sl) Is a valid signature of m.
20. Management node outputs a signature(s)1,s2,...,sl) And a public key pr,p1,p2,...,pl。
21. Selected responsible for generating blocks adds the new block to the chain of blocks.
22. New patch and signature(s)1,s2,...,sl) Is broadcast to other nodes of the blockchain network.
23. Other nodes obtain new blocks and signatures(s)1,s2,...,sl) And use the public key pr,p1,p2,...,plThe signature is verified.
24. If the verification passes, the new tile is added to the chain of tiles.
The above description is only for the preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (8)
1. A block chain consensus system based on post-quantum threshold signatures, comprising: the system comprises a block generator election module, a block generation module, a block verification module and a block chain updating module, wherein the block generator election module, the block generation module, the block verification module and the block chain updating module are sequentially connected;
the block generator election module is used for acquiring a user group, wherein the user group comprises a management node and a user node, and an initial user node is selected based on the user group;
the block generation module generates a new block based on the initial user node;
the block verification module is used for verifying the authenticity of the new block through a management node and a user node based on a post-quantum threshold signature method;
and the block chain updating module is used for adding the verified new block to the block chain so as to realize block chain consensus.
2. The block chain consensus system based on post-quantum-threshold signatures of claim 1,
the process of selecting the initial user node in the block generator election module comprises the following steps: exchanging user nodes in different user groups to obtain a new user group; randomly selecting a user group from the new user groups; and using one user node in one selected user group as an initial user node.
3. The block chain consensus system based on post-quantum-threshold signatures of claim 1,
the process of generating a new block in the block generating module comprises the following steps: generating a new block based on the initial user node, wherein the new block stores transaction information and a hash value.
4. The block chain consensus system based on post-quantum-threshold signatures of claim 1,
the process of verifying the authenticity of the new block in the block verification module comprises the following steps:
based on the new block, the management node uses a private key to calculate to obtain a management node signature;
the management node sequentially sends the new block and the management section signature to different user nodes under the same user group, and the user node verification is performed on the new block and the management section signature sequentially through the user nodes;
if the user node verifies that the new block passes through the private key, calculating a user node signature based on the management node signature, transmitting the user node signature to the management node, verifying the public key of the user node signature by the management node through obtaining the public key of the user node, storing the user node signature if the public key verification passes, sending the new block and the management node signature to the next user node, and if the public key verification fails, determining that the user node verification fails;
if the user node fails to pass the verification, the user node does not send a user signature to the management node, the management node updates the management node signature, the updated management node signature is transmitted to the next user node for verification until the verification of the user node which does not use under the same user group is completed, a complete signature of the user group is obtained, the complete signature of the user group is judged, if the judgment result is that the user group passes the verification, the authenticity verification is passed, the complete signature and the public key of the user group are output, and if the judgment result is that the user group does not pass the verification, the authenticity verification is not passed.
5. The block chain consensus system based on post-quantum-threshold signatures according to claim 4,
the user node authentication process comprises the following steps: if the transaction data in the new block is consistent with the original transaction data and the hash value of the transaction data is consistent with the value obtained after the hash operation of the original transaction data, the user node passes the verification; otherwise, the user node fails the verification.
6. The block chain consensus system based on post-quantum-threshold signatures according to claim 4,
and (3) public key verification: and the management node calculates public key verification data based on the public key of the user node and the signature of the user node, if the public key verification data is equal to the signature of the management node, the public key verification is passed, otherwise, the public key verification is not passed.
7. The block chain consensus system based on post-quantum-threshold signatures according to claim 4,
the process of judging the complete signature of the user group comprises the following steps: if the number of the complete signatures of the user group is less than 50%, the signatures are not established; otherwise, the complete signature of the user group is judged to be passed.
8. The block chain consensus system based on post-quantum-threshold signatures of claim 1,
the process of adding the verified new block to the blockchain in the blockchain update module comprises the following steps: broadcasting the new block and the user node signature to other user groups, verifying the complete signature of the user group by the other user groups based on a public key output by a block verification module, and adding the new block to a block chain to realize block chain consensus based on a verification result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210485565.8A CN114710514A (en) | 2022-05-06 | 2022-05-06 | Block chain consensus system based on post-quantum threshold signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210485565.8A CN114710514A (en) | 2022-05-06 | 2022-05-06 | Block chain consensus system based on post-quantum threshold signature |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114710514A true CN114710514A (en) | 2022-07-05 |
Family
ID=82177330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210485565.8A Pending CN114710514A (en) | 2022-05-06 | 2022-05-06 | Block chain consensus system based on post-quantum threshold signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114710514A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116996237A (en) * | 2023-09-29 | 2023-11-03 | 山东高速建设管理集团有限公司 | Distributed management method and system based on quantum threshold signature |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109104286A (en) * | 2018-07-26 | 2018-12-28 | 杭州安恒信息技术股份有限公司 | A kind of new block generation method of the common recognition based on threshold digital signature |
WO2019093574A1 (en) * | 2017-11-10 | 2019-05-16 | 부산대학교 산학협력단 | Block chain system and method employing hash-based signature scheme |
CN112994891A (en) * | 2019-12-18 | 2021-06-18 | 中国移动通信集团浙江有限公司 | Transaction request consensus method and system based on threshold signature |
CN114117549A (en) * | 2021-11-22 | 2022-03-01 | 上海金仕达软件科技有限公司 | Post-quantum multi-node threshold signature method and system |
-
2022
- 2022-05-06 CN CN202210485565.8A patent/CN114710514A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019093574A1 (en) * | 2017-11-10 | 2019-05-16 | 부산대학교 산학협력단 | Block chain system and method employing hash-based signature scheme |
CN109104286A (en) * | 2018-07-26 | 2018-12-28 | 杭州安恒信息技术股份有限公司 | A kind of new block generation method of the common recognition based on threshold digital signature |
CN112994891A (en) * | 2019-12-18 | 2021-06-18 | 中国移动通信集团浙江有限公司 | Transaction request consensus method and system based on threshold signature |
CN114117549A (en) * | 2021-11-22 | 2022-03-01 | 上海金仕达软件科技有限公司 | Post-quantum multi-node threshold signature method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116996237A (en) * | 2023-09-29 | 2023-11-03 | 山东高速建设管理集团有限公司 | Distributed management method and system based on quantum threshold signature |
CN116996237B (en) * | 2023-09-29 | 2023-12-08 | 山东高速建设管理集团有限公司 | Distributed management method and system based on quantum threshold signature |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8713329B2 (en) | Authenticated secret sharing | |
CN101547099B (en) | Elliptical curve-based method and elliptical curve-based device for self-authenticating signature | |
Chenaghlu et al. | A novel keyed parallel hashing scheme based on a new chaotic system | |
Jeong et al. | Neural cryptography based on generalized tree parity machine for real-life systems | |
Zhu et al. | A round-optimal lattice-based blind signature scheme for cloud services | |
CN112468302A (en) | Editable blockchain based on verifiable multiparty secret sharing | |
Huang et al. | Efficient secure computation with garbled circuits | |
CN111614679B (en) | Federal learning qualification recovery method, device and readable storage medium | |
US20230006836A1 (en) | Multi-party and multi-use quantum resistant signatures and key establishment | |
Wu et al. | Distributed Timestamp Mechanism Based on Verifiable Delay Functions. | |
Ramkumar | Executing large-scale processes in a blockchain | |
CN114710514A (en) | Block chain consensus system based on post-quantum threshold signature | |
Shahid et al. | WOTS-S: a quantum secure compact signature scheme for distributed ledger | |
CN113939821A (en) | System and method for non-parallel mining on a workload justification blockchain network | |
Wang et al. | A novel blockchain identity authentication scheme implemented in fog computing | |
WO2023016729A1 (en) | Generating digital signature shares | |
CN117917041A (en) | Generating a shared encryption key | |
WO2021147283A1 (en) | Transaction sender supervision method and system | |
Jiang et al. | Lattice-based proxy signature scheme with reject sampling method | |
Xiao et al. | New digital signature algorithm based on ECC and its application in bitcoin and IoT | |
Qiao et al. | Implementation of one-time editable blockchain chameleon hash function construction scheme | |
CN115632791B (en) | Dynamic cross-chain data consistency decentration verification method | |
Wu et al. | A distributed cross-chain mechanism based on notary schemes and group signatures | |
Zou et al. | A new digital signature primitive and its application in blockchain | |
Khan et al. | A Scalable Blockchain Consensus Model |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220705 |
|
RJ01 | Rejection of invention patent application after publication |