CN109067529A - A kind of production method of block chain private key for user - Google Patents
A kind of production method of block chain private key for user Download PDFInfo
- Publication number
- CN109067529A CN109067529A CN201811038478.8A CN201811038478A CN109067529A CN 109067529 A CN109067529 A CN 109067529A CN 201811038478 A CN201811038478 A CN 201811038478A CN 109067529 A CN109067529 A CN 109067529A
- Authority
- CN
- China
- Prior art keywords
- private key
- hash value
- user
- block chain
- feature set
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of production methods of block chain private key for user, for solving private key safety problem.The method of the present invention includes the following steps: that (1) selects at least two feature set, calculate separately the hash value of each feature set, (2) hash value of at least two feature set is carried out XOR operation, the hash value for calculating the XOR operation result again, using the hash value of the XOR operation result as private key for user.The present invention utilizes the randomness diffusion of hash algorithm and irreversible feature, the hash value for the parameter that can control using user is as private key, can help the ownership proof for solving the problems, such as private key and private key gives problem for change, helps to solve the problems, such as that private key is anti-lost and antitheft.The present invention can be widely applied to especially have a good application prospect in block chain network using application system of the random number as asymmetric cryptographic algorithm private key.
Description
Technical field
The invention belongs to block chain and its private key security technology area more particularly to a kind of generations of block chain private key for user
Method.
Background technique
Block chain is a kind of a kind of chain type number for being sequentially in time combined into data block in such a way that sequence is connected
According to structure, and the distributed account book that guarantees to distort in a manner of cryptography and can not forge.In block catenary system, private key is
Each user oneself generates and oneself is responsible for the random number of keeping, theoretically without third-party participation, so private key is once
It loses, just loses the control to account assets.With current calculation power and technology, from wallet address or public key retrodict private key be can not
Capable.Therefore, for block chain user, private key is exactly all.Due to also lacking effective solution, institute at present
It is faced with the risk for causing digital asset to lose due to private key is lost or is stolen with the user of block chain especially bit coin, is solved
Private key for user safety problem has very important practical significance to the safety for promoting block chain network.
Summary of the invention
For the urgent need and the deficiencies in the prior art of block chain private key for user safety, in order to solve the institute of private key for user
It has the right to belong to proof problem and safety problem, the present invention provides a kind of production method of block chain private key for user, feature exists
In, include the following steps: (1) select at least two feature set, calculate separately the hash value of each feature set, (2) it is described extremely
The hash value of few 2 feature sets carries out XOR operation, then calculates the hash value of the XOR operation result, the XOR operation
As a result hash value is as private key for user.
Further, the hash value in above-mentioned steps (1) and step (2) includes being generated using identical hash algorithm
Hash value and the hash value generated using different hash algorithm.
Further, the method for each feature set hash value of above-mentioned calculating includes but is not limited to: calculating the feature set
In at least two elements hash value, then calculate the exclusive or value of the hash value of at least two element, the exclusive or value made
It is characterized the hash value of collection, alternatively, the hash value of the exclusive or value is calculated again, using the hash value of the exclusive or value as feature set
Hash value.
Further, the above method further includes output prompt information corresponding with feature set, wherein the prompt information
Inside includes but is not limited to the classification and range of individual features collection.
Further, above-mentioned private key includes the private key of the public key algorithm of anti-quantum calculation and the private key of ECC algorithm, wherein
The private key of ECC algorithm includes but is not limited to the private key of 256 bits, 384 bits and 512 bits.
Further, the classification of features described above collection includes but is not limited to user biological feature set, the individual privacy of user letter
Breath collection, user password collection.
Further, the element of above-mentioned user biological feature set includes but is not limited to fingerprint characteristic, lines of the hand feature, face spy
It seeks peace phonetic feature.
Further, the element of the individual privacy information collection of above-mentioned user includes but is not limited to certain names related to user
Word, title and Serial No..
Further, above-mentioned hash value includes using national standard and international standard hash algorithm and anti-quantum calculation
The output result that hash algorithm obtains.
Compared with prior art, the method for the present invention has following significant novelty: the present invention is random using hash algorithm
Property diffusion and irreversible feature, the hash value that can control parameter using user wants as private key meeting private key randomness
Customer parameter is rationally introduced under the premise of asking, and can effectively solve the problems, such as that the ownership proof of private key and private key give problem for change, from
And realize the safeguard protection of private key for user, i.e., it is anti-lost also to prevent being stolen.The present invention can be widely applied to make using random number
For the application system of private key, especially have a good application prospect in block chain network.
Detailed description of the invention
Fig. 1 is the schematic diagram of private key for user production method embodiment one of the invention,
Fig. 2 is the schematic diagram of private key for user production method embodiment two of the invention,
Fig. 3 is the schematic diagram of private key for user production method embodiment three of the invention.
Specific embodiment
To keep technical solution of the present invention and advantage clearer, as a part of the invention, below in conjunction with attached drawing and
Specific embodiment, the present invention is described in further detail.
The present invention is suitable for all private keys using random number as asymmetric cryptographic algorithm and generates, and the present invention does not limit specifically
The method (for example, public key production method secp256k1 that bit coin can be used) that fixed corresponding public key generates.
Hash value used in the present invention includes using standard hash algorithm (such as MD5, SHA_256 etc.) and anti-quantum
The output result that the hash algorithm (such as anti-quantum standard algorithm) of calculating obtains.Multiple Hash used in the method for the present invention
Value can be generated using the same hash algorithm, can also be generated using the combination of multiple hash algorithms.
Under normal conditions, a random number is randomly generated as private key in block chain user node, and still, which does not have
User characteristics.After private key is stolen, user does not have effective means to control risk;After private key is lost, user also has no idea to give for change.
The present invention using the randomness diffusion of hash algorithm and irreversible feature, made by the hash value for the parameter that can control using user
For private key, can help the ownership proof for solving the problems, such as private key and private key gives problem for change, help to solve private key it is anti-lost and
Antitheft problem.
As a preferred embodiment, private key for user production method embodiment one of the invention is as shown in Figure 1, its step
Are as follows: (1) embodiment selects " name of most unforgettable classmate " and " name of most unforgettable teacher " to believe as the individual privacy of user
Two elements for ceasing collection, calculate separately the hash value of two elements, then calculate the exclusive or value of the hash value of the two elements, then count
The hash value for calculating the exclusive or value, using the hash value of the exclusive or value as the hash value (being denoted as H1) of individual privacy information collection;The reality
It applies example and selects element of two different passwords as password set, the hash value of password set is calculated using above-mentioned same method
(being denoted as H2);(2) it calculates the hash value of (H1 ⊕ H2) and obtains the private key of user.In order to help user to remember this private key, it is
System generates one group of mnemonic word or user using the elemental characteristic of above-mentioned each feature set as mnemonic word.
As another preferred embodiment, private key for user production method embodiment two of the invention as shown in Figure 2 is adopted
With multiple hash algorithms promoted private key randomness, the steps include: (1) embodiment selection " name of most unforgettable classmate " and
Two elements of " name of most unforgettable teacher " as the individual privacy information collection of user are respectively adopted Hash1 and calculate two members
The hash value of element, then the exclusive or value of the hash value of the two elements is calculated, then the hash value of the exclusive or value is calculated using Hash2,
Using the hash value of the exclusive or value as the hash value (being denoted as H1) of individual privacy information collection;The embodiment selects two different mouths
The element as password set is enabled, Hash2 is respectively adopted and calculates the hash value of two elements, then calculates the hash value of the two elements
Exclusive or value, then the hash value of the exclusive or value is calculated using Hash1, using the hash value of the exclusive or value as individual privacy information collection
Hash value (being denoted as H2);(2) Hash of (H1 ⊕ H2) is calculated using Hash3 and obtains the private key of user.In order to help user
Remember this private key, system generates one group of mnemonic word or user using the elemental characteristic of above-mentioned each feature set as mnemonic word.
Fig. 3 is the private key for user production method embodiment of the invention with lower complexity, the steps include: (1)
The embodiment selects " name of most unforgettable classmate " and " name of most unforgettable teacher " as the individual privacy information collection of user
Two elements are respectively adopted Hash1 and calculate the hash value of two elements, then calculate the exclusive or value of the hash value of the two elements,
Using the exclusive or value as the hash value (being denoted as H1) of individual privacy information collection;The embodiment selects two different passwords as mouth
The element for enabling collection is respectively adopted Hash2 and calculates the hash value of two elements, then calculates the exclusive or of the hash value of the two elements
Value, using the exclusive or value as the hash value (being denoted as H2) of individual privacy information collection;(2) (H1 ⊕ H2) is calculated using Hash3
Hash and the private key for obtaining user.In order to help user to remember this private key, system generates one group of mnemonic word or user above-mentioned
The elemental characteristic of each feature set is as mnemonic word.
For the method in above-described embodiment, by the feature set, the selection feature set that select different number (at least two)
Different elements, selection different hash algorithm combination etc., can produce the various embodiments of the method for the present invention.
It should be noted that the method for the present invention can be widely applied to the generation of private key, it is not limited solely to use for block chain
The generation of family private key.
Embodiments described above is only a part of the embodiments of the present invention, instead of all the embodiments.This field
Those of ordinary skill's obtained other under the premise of not making creative work directly adopt the embodiment of the method for the present invention, all
Belong to the scope of protection of the invention.
Claims (9)
1. a kind of production method of block chain private key for user, which comprises the steps of: (1) select at least two feature
Collection, calculates separately the hash value of each feature set, and the hash value of at least two feature set is carried out XOR operation by (2), then
The hash value for calculating the XOR operation result, using the hash value of the XOR operation result as private key for user.
2. a kind of production method of block chain private key for user according to claim 1, which is characterized in that the step (1)
Include the hash value generated using identical hash algorithm with the hash value in step (2) and is produced using different hash algorithm
Raw hash value.
3. a kind of production method of block chain private key for user according to claim 1, which is characterized in that the calculating is each
The method of a feature set hash value includes: the hash value for calculating at least two elements in the feature set, then calculate it is described at least
The exclusive or value of the hash value of two elements, using the exclusive or value as the hash value of feature set, alternatively, calculating the exclusive or value again
Hash value, using the hash value of the exclusive or value as the hash value of feature set.
4. a kind of production method of block chain private key for user according to claim 1, which is characterized in that further include output with
The corresponding prompt information of feature set, wherein the inside of the prompt information includes the classification and range of individual features collection.
5. a kind of production method of block chain private key for user according to claim 1, which is characterized in that the private key includes
The private key of anti-quantum calculation public key algorithm and the private key of ECC algorithm, wherein the private key of ECC algorithm includes 256 bits, 384 bits
With the private key of 512 bits.
6. a kind of production method of block chain private key for user according to claim 1, which is characterized in that the feature set
Classification includes the individual privacy information collection and user password collection of user biological feature set, user.
7. a kind of production method of block chain private key for user according to claim 6, which is characterized in that the user biological
The element of feature set includes fingerprint characteristic, lines of the hand feature, facial characteristics and phonetic feature.
8. a kind of production method of block chain private key for user according to claim 6, which is characterized in that of the user
The element of people's privacy information collection includes certain nouns, title and Serial No. related to user.
9. a kind of production method of block chain private key for user according to claim 1, which is characterized in that the hash value packet
Include the output result obtained using national standard and international standard hash algorithm and the hash algorithm of anti-quantum calculation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811038478.8A CN109067529A (en) | 2018-09-09 | 2018-09-09 | A kind of production method of block chain private key for user |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811038478.8A CN109067529A (en) | 2018-09-09 | 2018-09-09 | A kind of production method of block chain private key for user |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109067529A true CN109067529A (en) | 2018-12-21 |
Family
ID=64760080
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811038478.8A Withdrawn CN109067529A (en) | 2018-09-09 | 2018-09-09 | A kind of production method of block chain private key for user |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109067529A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109754242A (en) * | 2019-01-11 | 2019-05-14 | 北京阿尔山区块链联盟科技有限公司 | Memonic symbol generation method, device and electronic equipment |
CN110955713A (en) * | 2019-11-26 | 2020-04-03 | 上海中信信息发展股份有限公司 | Mnemonic word generating method and device and storage medium |
CN112054907A (en) * | 2020-08-25 | 2020-12-08 | 武汉大学 | Block chain general certificate retrieving method and system when private key is forgotten |
CN112671542A (en) * | 2020-12-16 | 2021-04-16 | 深圳市大中华区块链科技有限公司 | Block chain biological voice recognition method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160321654A1 (en) * | 2011-04-29 | 2016-11-03 | Stephen Lesavich | Method and system for storage and retrieval of blockchain blocks using galois fields |
CN106100847A (en) * | 2016-06-14 | 2016-11-09 | 惠众商务顾问(北京)有限公司 | Asymmetric encryption block chain identity information verification method and device |
CN106302354A (en) * | 2015-06-05 | 2017-01-04 | 北京壹人壹本信息科技有限公司 | A kind of identity identifying method and device |
US20180205558A1 (en) * | 2015-01-23 | 2018-07-19 | Daniel Robert Ferrin | Method and apparatus for the limitation of the mining of blocks on a block chain |
CN108512661A (en) * | 2018-04-02 | 2018-09-07 | 成都零光量子科技有限公司 | A kind of safety protecting method of block chain private key for user |
-
2018
- 2018-09-09 CN CN201811038478.8A patent/CN109067529A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160321654A1 (en) * | 2011-04-29 | 2016-11-03 | Stephen Lesavich | Method and system for storage and retrieval of blockchain blocks using galois fields |
US20180205558A1 (en) * | 2015-01-23 | 2018-07-19 | Daniel Robert Ferrin | Method and apparatus for the limitation of the mining of blocks on a block chain |
CN106302354A (en) * | 2015-06-05 | 2017-01-04 | 北京壹人壹本信息科技有限公司 | A kind of identity identifying method and device |
CN106100847A (en) * | 2016-06-14 | 2016-11-09 | 惠众商务顾问(北京)有限公司 | Asymmetric encryption block chain identity information verification method and device |
CN108512661A (en) * | 2018-04-02 | 2018-09-07 | 成都零光量子科技有限公司 | A kind of safety protecting method of block chain private key for user |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109754242A (en) * | 2019-01-11 | 2019-05-14 | 北京阿尔山区块链联盟科技有限公司 | Memonic symbol generation method, device and electronic equipment |
CN109754242B (en) * | 2019-01-11 | 2020-07-17 | 北京阿尔山区块链联盟科技有限公司 | Mnemonic generating method and device and electronic equipment |
CN110955713A (en) * | 2019-11-26 | 2020-04-03 | 上海中信信息发展股份有限公司 | Mnemonic word generating method and device and storage medium |
CN112054907A (en) * | 2020-08-25 | 2020-12-08 | 武汉大学 | Block chain general certificate retrieving method and system when private key is forgotten |
CN112054907B (en) * | 2020-08-25 | 2021-10-22 | 武汉大学 | Block chain general certificate retrieving method and system when private key is forgotten |
CN112671542A (en) * | 2020-12-16 | 2021-04-16 | 深圳市大中华区块链科技有限公司 | Block chain biological voice recognition method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105812126B (en) | Lightweight backup and the efficient restoration methods of healthy block chain data encryption key | |
CN109067529A (en) | A kind of production method of block chain private key for user | |
Prasad et al. | Enhanced Security for the authentication of Digital Signature from the key generated by the CSTRNG method | |
Chanda | Password security: an analysis of password strengths and vulnerabilities | |
US20020029341A1 (en) | Robust visual passwords | |
Jiang et al. | Shake to communicate: Secure handshake acceleration-based pairing mechanism for wrist worn devices | |
WO2013117019A1 (en) | Method and device for system login based on dynamic password generated autonomously by user | |
CN108512661A (en) | A kind of safety protecting method of block chain private key for user | |
CN103490889B (en) | A kind of infinite length key internet communication encryption method | |
CN109995504A (en) | A kind of encryption and decryption approaches of character string | |
CN110505047A (en) | A kind of double-encryption algorithm for iris feature protection | |
US12052354B2 (en) | Rolling biometric key exchange | |
CN114640444A (en) | Privacy protection set intersection acquisition method and device based on domestic cryptographic algorithm | |
CN106875325A (en) | One kind can search for resume image | |
CN107070896B (en) | Safe and efficient block chain network customized login method and safe reinforcement system | |
CN113411328A (en) | Efficient transmission system based on data pre-identification sensitive data | |
CN110535630A (en) | Key generation method, device and storage medium | |
CN117478330A (en) | Three-party privacy set intersection cardinality solving method based on bilinear mapping and bloom filter | |
CN110795726A (en) | Password protection method and system based on artificial neural network | |
Zhu et al. | A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network. | |
Pise et al. | Utilizing Asymmetric Cryptography and Advanced Hashing Algorithms for Securing Communication Channels in IoT Networks Against Cyber Espionage. | |
Cui et al. | Research on Data Protection Scheme for Road Maintenance System Based on Hybrid Encryption | |
Song et al. | A novel multiserver authentication protocol with multifactors for cloud service | |
Alli et al. | Three Tier Framework Iris Authentication for Secure Image Storage and Communication | |
CN110941815A (en) | Novel password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181221 |
|
WW01 | Invention patent application withdrawn after publication |