CN116389002A - Method and device for generating random numbers on chain based on threshold eddsa - Google Patents

Method and device for generating random numbers on chain based on threshold eddsa Download PDF

Info

Publication number
CN116389002A
CN116389002A CN202310337560.5A CN202310337560A CN116389002A CN 116389002 A CN116389002 A CN 116389002A CN 202310337560 A CN202310337560 A CN 202310337560A CN 116389002 A CN116389002 A CN 116389002A
Authority
CN
China
Prior art keywords
block
eddsa
threshold
signature
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310337560.5A
Other languages
Chinese (zh)
Inventor
刘岭峰
王超博
肖苗苗
曾佑诚
刘群华
麦佩雨
陈意斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Strait Chain Technology Co ltd
Original Assignee
Xiamen Strait Chain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Strait Chain Technology Co ltd filed Critical Xiamen Strait Chain Technology Co ltd
Priority to CN202310337560.5A priority Critical patent/CN116389002A/en
Publication of CN116389002A publication Critical patent/CN116389002A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of blockchain, in particular to a method and a device for generating random numbers on a chain based on threshold eddsa, computer equipment and a storage medium. The method comprises the steps that a block outlet node collects transaction data and packages the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes; the consensus node verifies the validity of the signed block, and the second hash of the block is signed by using a threshold eddsa key fragment to obtain signature data; collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node; and generating a random number by utilizing the final signature when the user node transacts. The invention can recover the random number of the block after the block is firstly identified among the identified nodes, thereby effectively preventing the block-out nodes from selecting the transaction to be disliked by operating or predicting the random number.

Description

Method and device for generating random numbers on chain based on threshold eddsa
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a method and apparatus for generating an on-chain random number based on threshold eddsa, a computer device, and a storage medium.
Background
A blockchain is a chain of blocks one by one. Each block holds certain information which is linked in a chain according to the time sequence of their respective generation. This chain is kept in all servers, and the entire blockchain is secure as long as one server in the entire system can work. These servers, referred to as nodes in the blockchain system, provide storage space and computational support for the entire blockchain system. If the information in the blockchain is to be modified, it is necessary to sign consent of more than half of the nodes and modify the information in all the nodes, which are usually held in different subject hands, so it is an extremely difficult thing to tamper with the information in the blockchain. Compared with the traditional network, the blockchain has two main core characteristics: firstly, the data is difficult to tamper, and secondly, the data is decentralised. Based on the two characteristics, the information recorded by the blockchain is more real and reliable, and can help solve the problem that people are not trusted each other.
Random numbers (such as lottery drawing) are often needed in the blockchain, but the blockchain is a technology for achieving consensus among nodes, so that the generation of the random numbers is not easy, and a common random number scheme is difficult to avoid the manipulation of the block nodes or the prediction of the random numbers so as to be disliked.
Disclosure of Invention
In order to solve the technical problems in the prior art, the invention provides a method, a device, computer equipment and a storage medium for generating a random number on a chain based on a threshold eddsa.
In order to achieve the above object, the embodiment of the present invention provides the following technical solutions:
in a first aspect, in one embodiment provided by the present invention, a method for generating a random number on a chain based on a threshold eddsa is provided, and the method is applicable to a consensus algorithm; the method comprises the following steps:
collecting transaction data by a block outlet node, and packaging the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes;
the consensus node verifies the validity of the signed block, and the second hash of the block is signed by using a threshold eddsa key fragment to obtain signature data;
collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node;
and generating a random number by utilizing the final signature when the user node transacts.
As a further aspect of the present invention, verifying, at the consensus node, the validity of the signed block, signing the second hash of the block with a threshold eddsa key fragment, obtaining signature data, before the step, further comprising,
corresponding threshold eddsa key fragments are generated among the plurality of consensus joints through a digital signature system.
As a further aspect of the present invention, the digital signature system is ED25519.
As a further aspect of the invention, the user node generates a random number upon transaction using the final signature, including,
and generating a random number by using the final signature as a random number generation source in the transaction.
As a further aspect of the present invention, the threshold eddsa is an edwarz curve digital signature algorithm.
As a further aspect of the present invention, the consensus algorithm includes an authority proof algorithm, a practical bayer fault tolerance algorithm, and a rights and interests proof algorithm.
In a second aspect, in yet another embodiment provided by the present invention, there is provided an on-chain random number generation apparatus based on a threshold eddsa, the apparatus comprising: the system comprises a block outlet node, a plurality of consensus nodes and at least one user node;
the block outlet node is used for collecting transaction data and packaging the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes, collecting signature data, when the signature data exceeds a set threshold value, generating a final signature by utilizing the collected signature data, and broadcasting the block and the final signature to user nodes;
the consensus nodes are respectively used for verifying the validity of the block signed by the block nodes, and the second hash of the block is signed by using the threshold eddsa key fragments to obtain signature data;
the user node is used for generating random numbers by utilizing the final signature during transaction.
In a third aspect, in yet another embodiment provided by the present invention, a computer device is provided, comprising a memory storing a computer program and a processor implementing steps of a method for generating a random number on a chain based on a threshold eddsa when the computer program is loaded and executed by the processor.
In a fourth aspect, in a further embodiment of the present invention, a storage medium is provided, storing a computer program which, when loaded and executed by a processor, implements the steps of the threshold eddsa based on-chain random number generation method.
The technical scheme provided by the invention has the following beneficial effects:
the invention provides a method, a device, computer equipment and a storage medium for generating random numbers on a chain based on threshold eddsa, wherein a block outlet node collects transaction data and packages the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes; the consensus node verifies the validity of the signed block, and the second hash of the block is signed by using a threshold eddsa key fragment to obtain signature data; collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node; and generating a random number by utilizing the final signature when the user node transacts. The invention can recover the random number of the block after the block is firstly identified among the identified nodes, thereby effectively preventing the block-out nodes from selecting the transaction to be disliked by operating or predicting the random number.
These and other aspects of the invention will be more readily apparent from the following description of the embodiments. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are necessary for the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention and that other embodiments may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a method for generating a random number on a chain based on a threshold eddsa according to an embodiment of the present invention.
Fig. 2 is a block diagram of an on-chain random number generation device based on threshold eddsa according to an embodiment of the present invention.
FIG. 3 is a block diagram of a computer device according to one embodiment of the invention.
In the figure: the system comprises a block outlet node-100, a consensus node-200, a user node-300, a processor-401, a communication interface-402, a memory-403 and a communication bus-404.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
It is to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
In particular, embodiments of the present invention are further described below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a flowchart of a method for generating an on-chain random number based on a threshold eddsa according to an embodiment of the present invention, as shown in fig. 1, the method for generating an on-chain random number based on a threshold eddsa includes steps S10 to S40. The method is applicable to consensus algorithms including POA (authority verification algorithm), PBFT (practical bayer fault tolerance algorithm) and POS (rights verification algorithm).
S10, collecting transaction data by a block outlet node, and packaging the transaction data into blocks; the block is signed by a first hash and broadcast to a plurality of consensus nodes.
S20, verifying the validity of the signed block by the consensus node, and signing a second hash of the block by using a threshold eddsa key fragment to obtain signature data;
in an embodiment of the invention, the threshold eddsa is an edwardz curve digital signature algorithm, which is a digital signature scheme using a Schnorr signature variant based on a distorted edwardz curve. It is designed to be faster than existing digital signature schemes without sacrificing security.
In the embodiment of the invention, the hash signature is a signature verification by utilizing a hash algorithm. The hash algorithm maps binary values of arbitrary length to shorter fixed length binary values, this small binary value being called the hash value.
At S20, the consensus node verifies the validity of the signed block, signs the second hash of the block with a threshold eddsa key fragment to obtain signature data, and before the step, further includes,
corresponding threshold eddsa key fragments are generated among the plurality of consensus joints through a digital signature system. Such that each consensus joint has its own key fragment.
The digital signature system may be ED25519.
S30, collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node;
the set threshold is a preset parameter.
S40, generating a random number by utilizing the final signature during the transaction of the user node.
Specifically, S40, the final signature is utilized to generate random numbers during the transaction of the user node, which comprises,
and generating a random number by using the final signature as a random number generation source in the transaction.
The invention can recover the random number of the block after the block is firstly identified among the identified nodes, thereby effectively preventing the block-out nodes from selecting the transaction to be disliked by operating or predicting the random number.
It should be understood that although described in a certain order, the steps are not necessarily performed sequentially in the order described. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, some steps of the present embodiment may include a plurality of steps or stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily sequential, but may be performed alternately or alternately with at least a part of the steps or stages in other steps or other steps.
In one embodiment, referring to fig. 3, an apparatus for generating an on-chain random number based on a threshold eddsa is further provided in an embodiment of the present invention, where the apparatus includes a block-out node 100, a plurality of consensus nodes 200, and not less than one user node 300.
The block-out node 100 is configured to collect transaction data and package the transaction data into blocks; and after the block is subjected to the first hash signature, broadcasting the block to a plurality of consensus nodes 200, collecting signature data, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node 300.
And the consensus nodes 200 are respectively used for verifying the validity of the block signed by the block node 100, and signing the second hash of the block by using the threshold eddsa key fragment to obtain signature data.
In an embodiment of the invention, the threshold eddsa is an edwardz curve digital signature algorithm, which is a digital signature scheme using a Schnorr signature variant based on a distorted edwardz curve. It is designed to be faster than existing digital signature schemes without sacrificing security.
In the embodiment of the invention, the hash signature is a signature verification by utilizing a hash algorithm. The hash algorithm maps binary values of arbitrary length to shorter fixed length binary values, this small binary value being called the hash value.
At S20, the consensus node verifies the validity of the signed block, signs the second hash of the block with a threshold eddsa key fragment to obtain signature data, and before the step, further includes,
corresponding threshold eddsa key fragments are generated between the plurality of consensus points through a digital signature device. Such that each consensus joint has its own key fragment.
The digital signature device may be ED25519.
The user node 300 is configured to generate a random number using the final signature during a transaction.
The invention can recover the random number of the block after the block is firstly identified among the identified nodes, thereby effectively preventing the block-out nodes from selecting the transaction to be disliked by operating or predicting the random number.
In one embodiment, referring to fig. 3, a computer device is further provided in an embodiment of the present invention, including a processor 401, a communication interface 402, a memory 403, and a communication bus 404, where the processor 401, the communication interface 402, and the memory 403 complete communication with each other through the communication bus 404.
A memory 403 for storing a computer program;
the processor 401, when executing the computer program stored in the memory 403, performs the method for generating the random number on the chain based on the threshold eddsa, and when executing the instruction, the processor performs the steps in the method embodiment described above:
s10, collecting transaction data by a block outlet node, and packaging the transaction data into blocks; the block is signed by a first hash and broadcast to a plurality of consensus nodes.
S20, verifying the validity of the signed block by the consensus node, and signing a second hash of the block by using a threshold eddsa key fragment to obtain signature data;
s30, collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node;
s40, generating a random number by utilizing the final signature during the transaction of the user node.
The communication bus mentioned by the above terminal may be a peripheral component interconnect standard (Peripheral ComponentInterconnect, abbreviated as PCI) bus or an extended industry standard architecture (Extended Industry StandardArchitecture, abbreviated as EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the terminal and other devices.
The memory may include random access memory (Random Access Memory, RAM) or non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but also digital signal processors (Digital Signal Processing, DSP for short), application specific integrated circuits (Application SpecificIntegrated Circuit, ASIC for short), field-programmable gate arrays (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
The computer device includes a user device and a network device. Wherein the user equipment includes, but is not limited to, a computer, a smart phone, a PDA, etc.; the network device includes, but is not limited to, a single network server, a server group of multiple network servers, or a Cloud based Cloud Computing (Cloud Computing) consisting of a large number of computers or network servers, where Cloud Computing is one of distributed Computing, and is a super virtual computer consisting of a group of loosely coupled computer sets. The computer device can be used for realizing the invention by running alone, and can also be accessed into a network and realized by interaction with other computer devices in the network. Wherein the network where the computer device is located includes, but is not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, and the like.
It should also be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
In one embodiment of the present invention there is also provided a storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method embodiments described above:
s10, collecting transaction data by a block outlet node, and packaging the transaction data into blocks; the block is signed by a first hash and broadcast to a plurality of consensus nodes.
S20, verifying the validity of the signed block by the consensus node, and signing a second hash of the block by using a threshold eddsa key fragment to obtain signature data;
s30, collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node;
s40, generating a random number by utilizing the final signature during the transaction of the user node.
Those skilled in the art will appreciate that implementing all or part of the above described embodiment methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the above described embodiment methods. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory.
It should be understood that as used herein, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items. The foregoing embodiment of the present invention has been disclosed with reference to the number of embodiments for the purpose of description only, and does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that: the above discussion of any embodiment is merely exemplary and is not intended to imply that the scope of the disclosure of embodiments of the invention, including the claims, is limited to such examples; combinations of features of the above embodiments or in different embodiments are also possible within the idea of an embodiment of the invention, and many other variations of the different aspects of the embodiments of the invention as described above exist, which are not provided in detail for the sake of brevity. Therefore, any omission, modification, equivalent replacement, improvement, etc. of the embodiments should be included in the protection scope of the embodiments of the present invention.

Claims (9)

1. A method for generating random numbers on a chain based on a threshold eddsa is applicable to a consensus algorithm; characterized in that the method comprises the following steps:
collecting transaction data by a block outlet node, and packaging the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes;
the consensus node verifies the validity of the signed block, and the second hash of the block is signed by using a threshold eddsa key fragment to obtain signature data;
collecting signature data by a block outlet node, generating a final signature by using the collected signature data when the signature data exceeds a set threshold value, and broadcasting the block and the final signature to a user node;
and generating a random number by utilizing the final signature when the user node transacts.
2. The method for generating random numbers on a chain based on threshold eddsa as claimed in claim 1, wherein, before the step of verifying the validity of the signed block at the consensus node, the second hash of the block is signed with the threshold eddsa key fragment to obtain signature data, further comprising,
corresponding threshold eddsa key fragments are generated among the plurality of consensus joints through a digital signature system.
3. The method for generating random numbers on a chain based on threshold eddsa according to claim 2, wherein said digital signature system is ED25519.
4. The threshold eddsa-based on-chain random number generation method of claim 1, wherein generating a random number using the final signature at the time of a user node transaction comprises,
and generating a random number by using the final signature as a random number generation source in the transaction.
5. The method for generating random numbers on a chain based on a threshold eddsa as claimed in claim 1, wherein the threshold eddsa is an edwardz curve digital signature algorithm.
6. The method of on-chain random number generation based on threshold eddsa as claimed in claim 1, wherein said consensus algorithm comprises an authoritative attestation algorithm, a practical bayer fault-tolerance algorithm, and a equity attestation algorithm.
7. An on-chain random number generation device based on threshold eddsa, comprising: the system comprises a block outlet node, a plurality of consensus nodes and at least one user node;
the block outlet node is used for collecting transaction data and packaging the transaction data into blocks; after carrying out first hash signing on the block, broadcasting the block to a plurality of consensus nodes, collecting signature data, when the signature data exceeds a set threshold value, generating a final signature by utilizing the collected signature data, and broadcasting the block and the final signature to user nodes;
the consensus nodes are respectively used for verifying the validity of the block signed by the block nodes, and the second hash of the block is signed by using the threshold eddsa key fragments to obtain signature data;
the user node is used for generating random numbers by utilizing the final signature during transaction.
8. An apparatus comprising a memory storing a computer program, and a processor implementing the steps of the threshold eddsa-based on-chain random number generation method of any of claims 1-6 when the computer program is loaded and executed.
9. A storage medium storing a computer program which, when loaded and executed by a processor, implements the steps of the threshold eddsa based on-chain random number generation method as claimed in any of claims 1-6.
CN202310337560.5A 2023-03-31 2023-03-31 Method and device for generating random numbers on chain based on threshold eddsa Pending CN116389002A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310337560.5A CN116389002A (en) 2023-03-31 2023-03-31 Method and device for generating random numbers on chain based on threshold eddsa

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310337560.5A CN116389002A (en) 2023-03-31 2023-03-31 Method and device for generating random numbers on chain based on threshold eddsa

Publications (1)

Publication Number Publication Date
CN116389002A true CN116389002A (en) 2023-07-04

Family

ID=86974548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310337560.5A Pending CN116389002A (en) 2023-03-31 2023-03-31 Method and device for generating random numbers on chain based on threshold eddsa

Country Status (1)

Country Link
CN (1) CN116389002A (en)

Similar Documents

Publication Publication Date Title
CN109347787B (en) Identity information identification method and device
US10999060B2 (en) Data processing method and apparatus
US11057217B2 (en) Performing parallel execution of transactions in a distributed ledger system
KR20190070969A (en) Block chain-based data processing method and device
US20200327545A1 (en) Performing parallel execution of transactions in a distributed ledger system
CN109033475B (en) File storage method, device, equipment and storage medium
WO2020133148A1 (en) Data processing method and apparatus for blockchain, and blockchain system
US20210306137A1 (en) Blockchain-based advertisement monitoring method and apparatus, and electronic device
CN110659905A (en) Transaction verification method, device, terminal equipment and storage medium
CN112907369A (en) Block chain-based data consensus method and device, electronic equipment and storage medium
CN110019205A (en) A kind of data storage, restoring method, device and computer equipment
CN111585770A (en) Method, device, medium and system for distributed acquisition of zero-knowledge proof
CN110209347B (en) Traceable data storage method
CN116389002A (en) Method and device for generating random numbers on chain based on threshold eddsa
US10050775B2 (en) Element replication device, element replication method, and program
CN113411191B (en) Data auditing method and device
CN113064899A (en) Storage method and device for asset security type evidence of general certificate transaction and electronic equipment
CN111949738A (en) Block chain-based data storage deduplication method, terminal device and storage medium
CN112751675A (en) Information monitoring method, system, equipment and storage medium based on block chain
CN112291241A (en) Firewall wall opening method, firewall wall opening device and terminal equipment
CN111030826A (en) Certificate revocation method and device for block chain network and electronic equipment
CN112887097A (en) Signature method based on SM2 elliptic curve, related device and storage medium
CN110766407A (en) Transaction verification method, accounting node and medium based on block chain
CN117473020B (en) Data access method, system, computer storage medium and terminal device
CN110209727B (en) Data storage method, terminal equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination