CN116389002A - Method and device for generating random numbers on chain based on threshold eddsa - Google Patents
Method and device for generating random numbers on chain based on threshold eddsa Download PDFInfo
- Publication number
- CN116389002A CN116389002A CN202310337560.5A CN202310337560A CN116389002A CN 116389002 A CN116389002 A CN 116389002A CN 202310337560 A CN202310337560 A CN 202310337560A CN 116389002 A CN116389002 A CN 116389002A
- Authority
- CN
- China
- Prior art keywords
- block
- eddsa
- threshold
- signature
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 239000012634 fragment Substances 0.000 claims abstract description 20
- 238000004590 computer program Methods 0.000 claims description 10
- 238000004806 packaging method and process Methods 0.000 claims description 7
- 238000004891 communication Methods 0.000 description 11
- 238000012795 verification Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention relates to the technical field of blockchain, in particular to a method and a device for generating random numbers on a chain based on threshold eddsa, computer equipment and a storage medium. The method comprises the steps that a block outlet node collects transaction data and packages the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes; the consensus node verifies the validity of the signed block, and the second hash of the block is signed by using a threshold eddsa key fragment to obtain signature data; collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node; and generating a random number by utilizing the final signature when the user node transacts. The invention can recover the random number of the block after the block is firstly identified among the identified nodes, thereby effectively preventing the block-out nodes from selecting the transaction to be disliked by operating or predicting the random number.
Description
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a method and apparatus for generating an on-chain random number based on threshold eddsa, a computer device, and a storage medium.
Background
A blockchain is a chain of blocks one by one. Each block holds certain information which is linked in a chain according to the time sequence of their respective generation. This chain is kept in all servers, and the entire blockchain is secure as long as one server in the entire system can work. These servers, referred to as nodes in the blockchain system, provide storage space and computational support for the entire blockchain system. If the information in the blockchain is to be modified, it is necessary to sign consent of more than half of the nodes and modify the information in all the nodes, which are usually held in different subject hands, so it is an extremely difficult thing to tamper with the information in the blockchain. Compared with the traditional network, the blockchain has two main core characteristics: firstly, the data is difficult to tamper, and secondly, the data is decentralised. Based on the two characteristics, the information recorded by the blockchain is more real and reliable, and can help solve the problem that people are not trusted each other.
Random numbers (such as lottery drawing) are often needed in the blockchain, but the blockchain is a technology for achieving consensus among nodes, so that the generation of the random numbers is not easy, and a common random number scheme is difficult to avoid the manipulation of the block nodes or the prediction of the random numbers so as to be disliked.
Disclosure of Invention
In order to solve the technical problems in the prior art, the invention provides a method, a device, computer equipment and a storage medium for generating a random number on a chain based on a threshold eddsa.
In order to achieve the above object, the embodiment of the present invention provides the following technical solutions:
in a first aspect, in one embodiment provided by the present invention, a method for generating a random number on a chain based on a threshold eddsa is provided, and the method is applicable to a consensus algorithm; the method comprises the following steps:
collecting transaction data by a block outlet node, and packaging the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes;
the consensus node verifies the validity of the signed block, and the second hash of the block is signed by using a threshold eddsa key fragment to obtain signature data;
collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node;
and generating a random number by utilizing the final signature when the user node transacts.
As a further aspect of the present invention, verifying, at the consensus node, the validity of the signed block, signing the second hash of the block with a threshold eddsa key fragment, obtaining signature data, before the step, further comprising,
corresponding threshold eddsa key fragments are generated among the plurality of consensus joints through a digital signature system.
As a further aspect of the present invention, the digital signature system is ED25519.
As a further aspect of the invention, the user node generates a random number upon transaction using the final signature, including,
and generating a random number by using the final signature as a random number generation source in the transaction.
As a further aspect of the present invention, the threshold eddsa is an edwarz curve digital signature algorithm.
As a further aspect of the present invention, the consensus algorithm includes an authority proof algorithm, a practical bayer fault tolerance algorithm, and a rights and interests proof algorithm.
In a second aspect, in yet another embodiment provided by the present invention, there is provided an on-chain random number generation apparatus based on a threshold eddsa, the apparatus comprising: the system comprises a block outlet node, a plurality of consensus nodes and at least one user node;
the block outlet node is used for collecting transaction data and packaging the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes, collecting signature data, when the signature data exceeds a set threshold value, generating a final signature by utilizing the collected signature data, and broadcasting the block and the final signature to user nodes;
the consensus nodes are respectively used for verifying the validity of the block signed by the block nodes, and the second hash of the block is signed by using the threshold eddsa key fragments to obtain signature data;
the user node is used for generating random numbers by utilizing the final signature during transaction.
In a third aspect, in yet another embodiment provided by the present invention, a computer device is provided, comprising a memory storing a computer program and a processor implementing steps of a method for generating a random number on a chain based on a threshold eddsa when the computer program is loaded and executed by the processor.
In a fourth aspect, in a further embodiment of the present invention, a storage medium is provided, storing a computer program which, when loaded and executed by a processor, implements the steps of the threshold eddsa based on-chain random number generation method.
The technical scheme provided by the invention has the following beneficial effects:
the invention provides a method, a device, computer equipment and a storage medium for generating random numbers on a chain based on threshold eddsa, wherein a block outlet node collects transaction data and packages the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes; the consensus node verifies the validity of the signed block, and the second hash of the block is signed by using a threshold eddsa key fragment to obtain signature data; collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node; and generating a random number by utilizing the final signature when the user node transacts. The invention can recover the random number of the block after the block is firstly identified among the identified nodes, thereby effectively preventing the block-out nodes from selecting the transaction to be disliked by operating or predicting the random number.
These and other aspects of the invention will be more readily apparent from the following description of the embodiments. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are necessary for the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention and that other embodiments may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a method for generating a random number on a chain based on a threshold eddsa according to an embodiment of the present invention.
Fig. 2 is a block diagram of an on-chain random number generation device based on threshold eddsa according to an embodiment of the present invention.
FIG. 3 is a block diagram of a computer device according to one embodiment of the invention.
In the figure: the system comprises a block outlet node-100, a consensus node-200, a user node-300, a processor-401, a communication interface-402, a memory-403 and a communication bus-404.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
It is to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
In particular, embodiments of the present invention are further described below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a flowchart of a method for generating an on-chain random number based on a threshold eddsa according to an embodiment of the present invention, as shown in fig. 1, the method for generating an on-chain random number based on a threshold eddsa includes steps S10 to S40. The method is applicable to consensus algorithms including POA (authority verification algorithm), PBFT (practical bayer fault tolerance algorithm) and POS (rights verification algorithm).
S10, collecting transaction data by a block outlet node, and packaging the transaction data into blocks; the block is signed by a first hash and broadcast to a plurality of consensus nodes.
S20, verifying the validity of the signed block by the consensus node, and signing a second hash of the block by using a threshold eddsa key fragment to obtain signature data;
in an embodiment of the invention, the threshold eddsa is an edwardz curve digital signature algorithm, which is a digital signature scheme using a Schnorr signature variant based on a distorted edwardz curve. It is designed to be faster than existing digital signature schemes without sacrificing security.
In the embodiment of the invention, the hash signature is a signature verification by utilizing a hash algorithm. The hash algorithm maps binary values of arbitrary length to shorter fixed length binary values, this small binary value being called the hash value.
At S20, the consensus node verifies the validity of the signed block, signs the second hash of the block with a threshold eddsa key fragment to obtain signature data, and before the step, further includes,
corresponding threshold eddsa key fragments are generated among the plurality of consensus joints through a digital signature system. Such that each consensus joint has its own key fragment.
The digital signature system may be ED25519.
S30, collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node;
the set threshold is a preset parameter.
S40, generating a random number by utilizing the final signature during the transaction of the user node.
Specifically, S40, the final signature is utilized to generate random numbers during the transaction of the user node, which comprises,
and generating a random number by using the final signature as a random number generation source in the transaction.
The invention can recover the random number of the block after the block is firstly identified among the identified nodes, thereby effectively preventing the block-out nodes from selecting the transaction to be disliked by operating or predicting the random number.
It should be understood that although described in a certain order, the steps are not necessarily performed sequentially in the order described. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, some steps of the present embodiment may include a plurality of steps or stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily sequential, but may be performed alternately or alternately with at least a part of the steps or stages in other steps or other steps.
In one embodiment, referring to fig. 3, an apparatus for generating an on-chain random number based on a threshold eddsa is further provided in an embodiment of the present invention, where the apparatus includes a block-out node 100, a plurality of consensus nodes 200, and not less than one user node 300.
The block-out node 100 is configured to collect transaction data and package the transaction data into blocks; and after the block is subjected to the first hash signature, broadcasting the block to a plurality of consensus nodes 200, collecting signature data, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node 300.
And the consensus nodes 200 are respectively used for verifying the validity of the block signed by the block node 100, and signing the second hash of the block by using the threshold eddsa key fragment to obtain signature data.
In an embodiment of the invention, the threshold eddsa is an edwardz curve digital signature algorithm, which is a digital signature scheme using a Schnorr signature variant based on a distorted edwardz curve. It is designed to be faster than existing digital signature schemes without sacrificing security.
In the embodiment of the invention, the hash signature is a signature verification by utilizing a hash algorithm. The hash algorithm maps binary values of arbitrary length to shorter fixed length binary values, this small binary value being called the hash value.
At S20, the consensus node verifies the validity of the signed block, signs the second hash of the block with a threshold eddsa key fragment to obtain signature data, and before the step, further includes,
corresponding threshold eddsa key fragments are generated between the plurality of consensus points through a digital signature device. Such that each consensus joint has its own key fragment.
The digital signature device may be ED25519.
The user node 300 is configured to generate a random number using the final signature during a transaction.
The invention can recover the random number of the block after the block is firstly identified among the identified nodes, thereby effectively preventing the block-out nodes from selecting the transaction to be disliked by operating or predicting the random number.
In one embodiment, referring to fig. 3, a computer device is further provided in an embodiment of the present invention, including a processor 401, a communication interface 402, a memory 403, and a communication bus 404, where the processor 401, the communication interface 402, and the memory 403 complete communication with each other through the communication bus 404.
A memory 403 for storing a computer program;
the processor 401, when executing the computer program stored in the memory 403, performs the method for generating the random number on the chain based on the threshold eddsa, and when executing the instruction, the processor performs the steps in the method embodiment described above:
s10, collecting transaction data by a block outlet node, and packaging the transaction data into blocks; the block is signed by a first hash and broadcast to a plurality of consensus nodes.
S20, verifying the validity of the signed block by the consensus node, and signing a second hash of the block by using a threshold eddsa key fragment to obtain signature data;
s30, collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node;
s40, generating a random number by utilizing the final signature during the transaction of the user node.
The communication bus mentioned by the above terminal may be a peripheral component interconnect standard (Peripheral ComponentInterconnect, abbreviated as PCI) bus or an extended industry standard architecture (Extended Industry StandardArchitecture, abbreviated as EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the terminal and other devices.
The memory may include random access memory (Random Access Memory, RAM) or non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but also digital signal processors (Digital Signal Processing, DSP for short), application specific integrated circuits (Application SpecificIntegrated Circuit, ASIC for short), field-programmable gate arrays (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
The computer device includes a user device and a network device. Wherein the user equipment includes, but is not limited to, a computer, a smart phone, a PDA, etc.; the network device includes, but is not limited to, a single network server, a server group of multiple network servers, or a Cloud based Cloud Computing (Cloud Computing) consisting of a large number of computers or network servers, where Cloud Computing is one of distributed Computing, and is a super virtual computer consisting of a group of loosely coupled computer sets. The computer device can be used for realizing the invention by running alone, and can also be accessed into a network and realized by interaction with other computer devices in the network. Wherein the network where the computer device is located includes, but is not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, and the like.
It should also be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
In one embodiment of the present invention there is also provided a storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method embodiments described above:
s10, collecting transaction data by a block outlet node, and packaging the transaction data into blocks; the block is signed by a first hash and broadcast to a plurality of consensus nodes.
S20, verifying the validity of the signed block by the consensus node, and signing a second hash of the block by using a threshold eddsa key fragment to obtain signature data;
s30, collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node;
s40, generating a random number by utilizing the final signature during the transaction of the user node.
Those skilled in the art will appreciate that implementing all or part of the above described embodiment methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the above described embodiment methods. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory.
It should be understood that as used herein, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items. The foregoing embodiment of the present invention has been disclosed with reference to the number of embodiments for the purpose of description only, and does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that: the above discussion of any embodiment is merely exemplary and is not intended to imply that the scope of the disclosure of embodiments of the invention, including the claims, is limited to such examples; combinations of features of the above embodiments or in different embodiments are also possible within the idea of an embodiment of the invention, and many other variations of the different aspects of the embodiments of the invention as described above exist, which are not provided in detail for the sake of brevity. Therefore, any omission, modification, equivalent replacement, improvement, etc. of the embodiments should be included in the protection scope of the embodiments of the present invention.
Claims (9)
1. A method for generating random numbers on a chain based on a threshold eddsa is applicable to a consensus algorithm; characterized in that the method comprises the following steps:
collecting transaction data by a block outlet node, and packaging the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes;
the consensus node verifies the validity of the signed block, and the second hash of the block is signed by using a threshold eddsa key fragment to obtain signature data;
collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node;
and generating a random number by utilizing the final signature when the user node transacts.
2. The method for generating random numbers on a chain based on threshold eddsa as claimed in claim 1, wherein, before the step of verifying the validity of the signed block at the consensus node, the second hash of the block is signed with the threshold eddsa key fragment to obtain signature data, further comprising,
corresponding threshold eddsa key fragments are generated among the plurality of consensus joints through a digital signature system.
3. The method for generating random numbers on a chain based on threshold eddsa according to claim 2, wherein said digital signature system is ED25519.
4. The threshold eddsa-based on-chain random number generation method of claim 1, wherein generating a random number using the final signature at the time of a user node transaction comprises,
and generating a random number by using the final signature as a random number generation source in the transaction.
5. The method for generating random numbers on a chain based on a threshold eddsa as claimed in claim 1, wherein the threshold eddsa is an edwardz curve digital signature algorithm.
6. The method of on-chain random number generation based on threshold eddsa as claimed in claim 1, wherein said consensus algorithm comprises an authoritative attestation algorithm, a practical bayer fault-tolerance algorithm, and a equity attestation algorithm.
7. An on-chain random number generation device based on threshold eddsa, comprising: the system comprises a block outlet node, a plurality of consensus nodes and at least one user node;
the block outlet node is used for collecting transaction data and packaging the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes, collecting signature data, when the signature data exceeds a set threshold value, generating a final signature by utilizing the collected signature data, and broadcasting the block and the final signature to user nodes;
the consensus nodes are respectively used for verifying the validity of the block signed by the block nodes, and the second hash of the block is signed by using the threshold eddsa key fragments to obtain signature data;
the user node is used for generating random numbers by utilizing the final signature during transaction.
8. An apparatus comprising a memory storing a computer program, and a processor implementing the steps of the threshold eddsa-based on-chain random number generation method of any of claims 1-6 when the computer program is loaded and executed.
9. A storage medium storing a computer program which, when loaded and executed by a processor, implements the steps of the threshold eddsa based on-chain random number generation method as claimed in any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310337560.5A CN116389002A (en) | 2023-03-31 | 2023-03-31 | Method and device for generating random numbers on chain based on threshold eddsa |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310337560.5A CN116389002A (en) | 2023-03-31 | 2023-03-31 | Method and device for generating random numbers on chain based on threshold eddsa |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116389002A true CN116389002A (en) | 2023-07-04 |
Family
ID=86974548
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310337560.5A Pending CN116389002A (en) | 2023-03-31 | 2023-03-31 | Method and device for generating random numbers on chain based on threshold eddsa |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116389002A (en) |
-
2023
- 2023-03-31 CN CN202310337560.5A patent/CN116389002A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109347787B (en) | Identity information identification method and device | |
US10999060B2 (en) | Data processing method and apparatus | |
US11057217B2 (en) | Performing parallel execution of transactions in a distributed ledger system | |
KR20190070969A (en) | Block chain-based data processing method and device | |
US20200327545A1 (en) | Performing parallel execution of transactions in a distributed ledger system | |
CN109033475B (en) | File storage method, device, equipment and storage medium | |
WO2020133148A1 (en) | Data processing method and apparatus for blockchain, and blockchain system | |
US20210306137A1 (en) | Blockchain-based advertisement monitoring method and apparatus, and electronic device | |
CN110659905A (en) | Transaction verification method, device, terminal equipment and storage medium | |
CN112907369A (en) | Block chain-based data consensus method and device, electronic equipment and storage medium | |
CN110019205A (en) | A kind of data storage, restoring method, device and computer equipment | |
CN111585770A (en) | Method, device, medium and system for distributed acquisition of zero-knowledge proof | |
CN110209347B (en) | Traceable data storage method | |
CN116389002A (en) | Method and device for generating random numbers on chain based on threshold eddsa | |
US10050775B2 (en) | Element replication device, element replication method, and program | |
CN113411191B (en) | Data auditing method and device | |
CN113064899A (en) | Storage method and device for asset security type evidence of general certificate transaction and electronic equipment | |
CN111949738A (en) | Block chain-based data storage deduplication method, terminal device and storage medium | |
CN112751675A (en) | Information monitoring method, system, equipment and storage medium based on block chain | |
CN112291241A (en) | Firewall wall opening method, firewall wall opening device and terminal equipment | |
CN111030826A (en) | Certificate revocation method and device for block chain network and electronic equipment | |
CN112887097A (en) | Signature method based on SM2 elliptic curve, related device and storage medium | |
CN110766407A (en) | Transaction verification method, accounting node and medium based on block chain | |
CN117473020B (en) | Data access method, system, computer storage medium and terminal device | |
CN110209727B (en) | Data storage method, terminal equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |