WO2021115290A1 - Procédé et dispositif d'application de nombre aléatoire hors chaîne pour jeu de chaîne de blocs et support de stockage - Google Patents

Procédé et dispositif d'application de nombre aléatoire hors chaîne pour jeu de chaîne de blocs et support de stockage Download PDF

Info

Publication number
WO2021115290A1
WO2021115290A1 PCT/CN2020/134727 CN2020134727W WO2021115290A1 WO 2021115290 A1 WO2021115290 A1 WO 2021115290A1 CN 2020134727 W CN2020134727 W CN 2020134727W WO 2021115290 A1 WO2021115290 A1 WO 2021115290A1
Authority
WO
WIPO (PCT)
Prior art keywords
random number
user
generated
random
client
Prior art date
Application number
PCT/CN2020/134727
Other languages
English (en)
Chinese (zh)
Inventor
俞铠俊
王志文
吴思进
Original Assignee
杭州复杂美科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州复杂美科技有限公司 filed Critical 杭州复杂美科技有限公司
Publication of WO2021115290A1 publication Critical patent/WO2021115290A1/fr

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/75Enforcing rules, e.g. detecting foul play or generating lists of cheating players
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/131Protocols for games, networked simulations or virtual reality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • This application relates to the technical field of blockchain games, in particular to an off-chain random number application method, device and storage medium for blockchain games.
  • Blockchain game mechanisms that are not on the chain during the game's opening phase and settlement phase, and the middle game process stage is not on the chain, or the transaction mechanism of off-chain transactions based on channels registered on the blockchain (refer to CN201911073994.9)
  • the blockchain game mechanism when a random number is needed during the game, it is necessary to ensure that the random number is not predicted or manipulated by the user to avoid cheating.
  • One way to solve the above random number problem is to use random numbers generated on the blockchain (for example, the random number generation method provided by CN109558112A).
  • the problem with this method is that the generation of random numbers depends on the mining mechanism of the blockchain, and the mining and block generation speed of the blockchain is limited. Therefore, the number of random numbers that can be provided is limited. When you need to use more random numbers in the game, the number of random numbers on the chain cannot meet the needs of the game.
  • Another way to solve the above random number problem is to generate off-chain random numbers jointly by all users participating in the game. For example, if user A/B/C plays a game, the result of the game needs to be generated based on the random number r.
  • a problem with this method is that when the client of A/B broadcasts a/b and the client of C has not broadcast c, the client of C can already generate a random number r and learn the game result.
  • the user When C learns that the game result is unfavorable, he may choose to go offline or forcibly close the game client without broadcasting c.
  • the A/B client cannot generate the game result and can only save the evidence and report the user C, which greatly affects the game user Experience.
  • the present invention provides an off-chain random number application method for a blockchain game.
  • the number of participants in the game is n, and n is not less than 3.
  • the method is suitable for the user side, and the method includes:
  • n-2 third random numbers Generate n-2 third random numbers, and generate a fourth random number based on the first random number and n-2 third random numbers, and send n-2 third random numbers and fourth random numbers to n- One second client, so that each second client holds a third random number or a fourth random number;
  • the present invention also provides a device, including one or more processors and a memory, where the memory contains instructions executable by the one or more processors to make the one or more processors execute each of the instructions according to the present invention.
  • the embodiment provides an off-chain random number application method for blockchain games.
  • the present invention also provides a storage medium storing a computer program that enables the computer to execute the off-chain random number application method of the blockchain game according to the embodiments of the present invention.
  • the off-chain random number application method, device, and storage medium for blockchain games provided by many embodiments of the present invention divide the random number generated by each user into multiple copies and send them to participants in a multiplayer game. Other users of this game make that when any user does not announce the random number generated by itself over time, other users can restore the unannounced random number after the timeout according to the random number fragments stored in their own, so as to generate off-chain random numbers to ensure The generation of game results improves the game user experience;
  • the off-chain random number application method, device and storage medium for blockchain games provided by some embodiments of the present invention further ensure that random number fragments are generated and sent after all the game links related to off-chain random numbers in the game are over. Other users of this game colluded to get the random number under the chain in advance, and they cannot cheat or affect the result of the game;
  • the off-chain random number application method, device, and storage medium of blockchain games provided by some embodiments of the present invention further encrypt and broadcast the fragment encrypted information after receiving the random number fragment, so that each user terminal can Verify that the received random number fragments are correct, and further improve the off-chain random number mechanism;
  • the off-chain random number application method, device, and storage medium of blockchain games provided by some embodiments of the present invention further complete the off-chain random number storage certificate by signing random number encrypted information, fragmented encrypted information and random numbers. And proof mechanism.
  • FIG. 1 is a flowchart of an off-chain random number application method for blockchain games according to an embodiment of the present invention.
  • Fig. 2 is a flowchart of step S17 in a preferred embodiment of the method shown in Fig. 1.
  • FIG. 3 is a schematic structural diagram of a device provided by an embodiment of the present invention.
  • FIG. 1 is a flowchart of an off-chain random number application method for blockchain games according to an embodiment of the present invention.
  • the present invention provides an off-chain random number application method for a blockchain game.
  • the number of participants in the game is n, and n is not less than 3. This method is suitable for the user side. Methods include:
  • S11 Generate a first random number, and encrypt the first encrypted information generated by encrypting the first random number, and broadcast the first encrypted information to each second user terminal participating in the game;
  • S13 Receive and store the second encrypted information respectively broadcasted by each second client; where the second encrypted information is generated by encrypting the corresponding second random number by the second client;
  • S15 Generate n-2 third random numbers, generate a fourth random number according to the first random number and n-2 third random numbers, and send n-2 third random numbers and fourth random numbers to n-1 second client terminals, so that each second client terminal holds a third random number or a fourth random number respectively;
  • S17 Receive and store the fifth random number or the sixth random number respectively sent by each second user end; wherein, the fifth random number is generated by the second user end, and the sixth random number is generated by the second user end according to the second random number And n-2 fifth random number generation;
  • S191 Monitor whether the second random number broadcast by each second user terminal is received during the period of time when the off-chain random number is generated:
  • S194 Receive the fifth random number or the sixth random number generated by the first and second user terminals broadcast by each second user terminal except the first and second user terminals;
  • S195 Generate a second random number generated by the first and second user end according to the n-2 fifth random numbers and the sixth random number generated by the first and second user end;
  • S196 Generate an off-chain random number according to the first random number, the received n-2 second random numbers, and the generated 1 second random number.
  • step S11 the UE of user A generates a first random number r a, and the base point G r a multiplying elliptic curve algorithm to encrypt r a, generating a first encrypted information r a G, and B to the user user C's terminal broadcast r a G;
  • the user terminal of user B generates the second random number r b and the second encrypted information r b G, and broadcasts r b G to the user terminals of users A and C;
  • the user terminal of user C generates a second random number r c and second encrypted information r c G, and broadcasts r c G to the user terminals of users A and B;
  • step S13 the user terminal of user A receives and stores r b G and r c G respectively;
  • the user terminal of user B receives and stores r a G and r c G respectively;
  • the user terminal of user C receives and stores r a G and r b G respectively;
  • the user terminal of user C also can send ra2 to the user terminal of user B, and send ra1 to the user terminal of user C, that is, it can be randomly allocated, the same below);
  • user terminal
  • step S17 the user terminal of user A receives and stores r b1 and r c1 respectively ;
  • the user terminal of user B receives and stores r a1 and r c2 respectively ;
  • the user terminal of user C receives and stores ra2 and r b2 respectively ;
  • step S191 the user terminal of user A monitors whether it receives the second random numbers r b and r c broadcasted by the user terminals of users B and C during the period when the off-chain random number r 1 is generated:
  • the user terminal of user A receives r b and r c , and verifies r b and r respectively according to the stored r b G and r c G stored in step S13 c is correct:
  • the user terminal of user A does not receive r b and r c , by checking whether the network connection of the current user terminal is normal, sending the request again Processing methods commonly used in this field;
  • step S193 is executed: the client of user A Broadcast to the user terminal of user C the fifth random number r b1 generated by the user terminal of user B;
  • the user terminal of user C broadcasts the sixth random number r b2 generated by the user terminal of user B to the user terminal of user A;
  • step S194 the user terminal of user A receives r b2 broadcast by the user terminal of user C;
  • the user terminal of user C receives r b1 broadcast by the user terminal of user A;
  • the user terminal of user C generates r b according to r b1 and r b2 ;
  • the method shown in FIG. 1 is exemplarily explained by taking the way that the number of players is three and the encrypted random number is configured to multiply the random number by the base point G of the elliptic curve algorithm.
  • the method shown in Figure 1 is also applicable to multiplayer games with different numbers of people such as four-player games and five-player games, as long as the number of players is not less than 3; the method of encrypting random numbers can also be configured as other commonly used in the field
  • the encryption algorithm of the plaintext cannot be reversed based on the ciphertext, and the same technical effect can be achieved.
  • each client splits the random number generated by itself into multiple copies and sends them to other client terminals participating in the game, so that the random number generated by itself is not published on any client side over time.
  • other users can restore the random number that has not been announced after the timeout according to their stored random number fragments, thereby generating an off-chain random number, ensuring the generation of game results, and improving the game user experience.
  • step S15 includes:
  • n-2 third random numbers are generated, and the fourth random number is generated according to the first random number and n-2 third random numbers, and n -2 third random numbers and fourth random numbers are respectively sent to n-1 second client terminals, so that each second client terminal holds a third random number or a fourth random number respectively.
  • step S15 is configured to be executed after all game links related to off-chain random numbers in the game are over, so that even if the colluding users generate r 1 in advance, they cannot cheat and gain profit.
  • the result of the game can only be known in advance.
  • the above embodiment further generates and sends random number fragments after all the game links related to the off-chain random number of the game in this game are over, which ensures that other users of the game of this game collude to learn the off-chain random number in advance and cannot cheat or affect the game result. .
  • Fig. 2 is a flowchart of step S17 in a preferred embodiment of the method shown in Fig. 1.
  • step S17 includes:
  • S171 Receive the fifth random number or the sixth random number sent by the second user end;
  • S173 Encrypt the fifth random number or the sixth random number to generate third encrypted information, and broadcast the third encrypted information to each second user end except the second second user end;
  • S175 Receive the fourth encrypted information respectively broadcasted by each second user end except the second second user end; wherein the fourth encrypted information is encrypted by the second user end and the fifth random number sent by the second second user end or The sixth random number is generated;
  • S177 Verify the third encrypted information and each fourth encrypted information according to the second encrypted information broadcast by the second second client:
  • step S179 is executed: the fifth random number or the sixth random number sent by the second second user terminal is stored.
  • step S171 the user terminal of user A receives r b1 and r c1 (the same is true for the user terminals of users B and C, which will not be listed one by one, the same below);
  • step S173 the UE of user A to r b1 encrypted to generate r b1 G, the r b1 G broadcast to the UE user C; of r c1 encrypted to generate r c1 G, the r c1 G broadcast to User B's client;
  • step S175 the user terminal of user A respectively receives r b2 G broadcast by the user terminal of user C and r c2 G broadcast by the user terminal of user B;
  • step S177 the user terminal of user A respectively checks whether r b1 G+r b2 G is the same as r b G received and stored in step S13 , and whether r c1 G+r c2 G is the same as r c G:
  • step S179 is executed to store r b1 and r c1 ;
  • each user terminal after receiving the random number fragments, each user terminal encrypts the generated fragment encrypted information and broadcasts it, so that each user terminal can verify whether the received random number fragment is correct, and further improve the off-chain random number mechanism.
  • the first encrypted information, each third random number, and the fourth random number broadcast in the foregoing embodiment are signed by the current user, and the received second encrypted information, fifth random number or sixth random number The number is signed by the corresponding user.
  • the foregoing embodiment further improves the off-chain random number storage and proof mechanism by signing the random number encrypted information, fragmented encrypted information, and random number.
  • FIG. 3 is a schematic structural diagram of a device provided by an embodiment of the present invention.
  • the present application also provides a device 300, including one or more central processing units (CPU) 301, which can be based on a program stored in a read-only memory (ROM) 302 or The program loaded from the storage section 308 into the random access memory (RAM) 303 executes various appropriate actions and processing.
  • ROM read-only memory
  • RAM random access memory
  • various programs and data required for the operation of the device 300 are also stored.
  • the CPU301, the ROM302, and the RAM303 are connected to each other through a bus 304.
  • An input/output (I/O) interface 305 is also connected to the bus 304.
  • the following components are connected to the I/O interface 305: an input part 306 including a keyboard, a mouse, etc.; an output part 307 including a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and speakers, etc.; a storage part 308 including a hard disk, etc. ; And a communication section 309 including a network interface card such as a LAN card, a modem, and the like. The communication section 309 performs communication processing via a network such as the Internet.
  • the driver 310 is also connected to the I/O interface 305 as needed.
  • a removable medium 311, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 310 as needed, so that the computer program read from it is installed into the storage portion 308 as needed.
  • an embodiment of the present disclosure includes a computer program product, which includes a computer program tangibly embodied on a machine-readable medium, and the computer program includes program code for executing any of the foregoing methods.
  • the computer program may be downloaded and installed from the network through the communication part 309, and/or installed from the removable medium 311.
  • the present application also provides a computer-readable storage medium.
  • the computer-readable storage medium may be the computer-readable storage medium included in the device of the above-mentioned embodiment;
  • the computer-readable storage medium stores one or more programs, and the programs are used by one or more processors to execute the methods described in this application.
  • each block in the flowchart or block diagram may represent a module, program segment, or part of code, and the module, program segment, or part of code contains one or more for realizing the specified logical function Executable instructions.
  • the functions marked in the block may also occur in a different order from the order marked in the drawings. For example, two blocks shown one after the other may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagram and/or flowchart, and the combination of the blocks in the block diagram and/or flowchart can be implemented by a dedicated hardware-based system that performs the specified functions or operations Or it can be realized by a combination of dedicated hardware and computer instructions.
  • each unit may be a software program arranged in a computer or a mobile smart device, or may be a separately configured hardware device.
  • the names of these units or modules do not constitute a limitation on the units or modules themselves under certain circumstances.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Procédé et dispositif d'application de nombre aléatoire hors chaîne pour jeu de chaîne de blocs et support de stockage. Le procédé consiste : à générer un premier nombre aléatoire et des premières informations chiffrées et à diffuser les premières informations chiffrées à de seconds terminaux utilisateurs ; à recevoir et à stocker des secondes informations chiffrées diffusées respectivement par les seconds terminaux utilisateurs ; à générer n-2 troisièmes nombres aléatoires et quatrièmes nombres aléatoires, et à les envoyer à n-1 seconds terminaux utilisateurs, respectivement ; à recevoir et à stocker des cinquièmes nombres aléatoires ou des sixièmes nombres aléatoires envoyés respectivement par les seconds terminaux utilisateurs ; lorsque les deuxièmes nombres aléatoires diffusés par un premier second terminal utilisateur ne sont pas reçus rapidement, à diffuser les cinquièmes nombres aléatoires ou les sixièmes nombres aléatoires générés par le terminal utilisateur ; à recevoir les cinquièmes nombres aléatoires ou les sixièmes nombres aléatoires générés par le terminal utilisateur et diffusés par d'autres seconds terminaux utilisateurs ; à générer des deuxièmes nombres aléatoires générés par le terminal utilisateur en fonction des n-2 cinquièmes nombres aléatoires et sixièmes nombres aléatoires générés par le terminal utilisateur ; et à générer un nombre aléatoire hors chaîne.
PCT/CN2020/134727 2019-12-13 2020-12-09 Procédé et dispositif d'application de nombre aléatoire hors chaîne pour jeu de chaîne de blocs et support de stockage WO2021115290A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911284231.9A CN111185011B (zh) 2019-12-13 2019-12-13 区块链游戏的链下随机数应用方法、设备和存储介质
CN201911284231.9 2019-12-13

Publications (1)

Publication Number Publication Date
WO2021115290A1 true WO2021115290A1 (fr) 2021-06-17

Family

ID=70684433

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/134727 WO2021115290A1 (fr) 2019-12-13 2020-12-09 Procédé et dispositif d'application de nombre aléatoire hors chaîne pour jeu de chaîne de blocs et support de stockage

Country Status (2)

Country Link
CN (1) CN111185011B (fr)
WO (1) WO2021115290A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111185011B (zh) * 2019-12-13 2023-04-18 杭州复杂美科技有限公司 区块链游戏的链下随机数应用方法、设备和存储介质
WO2022166791A1 (fr) * 2021-02-07 2022-08-11 全馨资讯有限公司 Procédé relatif à une preuve de travail de minage de blocs et dispositif d'exploitation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160285629A1 (en) * 2015-03-24 2016-09-29 Kabushiki Kaisha Toshiba Quantum key distribution device, quantum key distribution system, and quantum key distribution method
CN109126139A (zh) * 2018-08-31 2019-01-04 杭州复杂美科技有限公司 一种竞猜游戏处理方法、设备和存储介质
CN109558112A (zh) * 2018-11-14 2019-04-02 杭州复杂美科技有限公司 随机数生成方法、防作弊区块链系统、设备和存储介质
CN110365479A (zh) * 2019-07-11 2019-10-22 湖南天河国云科技有限公司 基于区块链的随机数生成方法及装置
CN111185011A (zh) * 2019-12-13 2020-05-22 杭州复杂美科技有限公司 区块链游戏的链下随机数应用方法、设备和存储介质

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030054879A1 (en) * 1996-12-31 2003-03-20 Bruce Schneier System and method for securing electronic games
CN109345244A (zh) * 2018-09-25 2019-02-15 杭州复杂美科技有限公司 一种画图猜谜游戏方法、设备和存储介质
CN110180188B (zh) * 2019-05-22 2022-06-28 杭州复杂美科技有限公司 发牌方法、游戏方法、设备和存储介质
CN110430045B (zh) * 2019-07-17 2021-10-01 上海朝夕网络技术有限公司 一种基于分布式共识算法的随机数生成方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160285629A1 (en) * 2015-03-24 2016-09-29 Kabushiki Kaisha Toshiba Quantum key distribution device, quantum key distribution system, and quantum key distribution method
CN109126139A (zh) * 2018-08-31 2019-01-04 杭州复杂美科技有限公司 一种竞猜游戏处理方法、设备和存储介质
CN109558112A (zh) * 2018-11-14 2019-04-02 杭州复杂美科技有限公司 随机数生成方法、防作弊区块链系统、设备和存储介质
CN110365479A (zh) * 2019-07-11 2019-10-22 湖南天河国云科技有限公司 基于区块链的随机数生成方法及装置
CN111185011A (zh) * 2019-12-13 2020-05-22 杭州复杂美科技有限公司 区块链游戏的链下随机数应用方法、设备和存储介质

Also Published As

Publication number Publication date
CN111185011A (zh) 2020-05-22
CN111185011B (zh) 2023-04-18

Similar Documents

Publication Publication Date Title
CN113424185B (zh) 快速不经意传输
US10122710B2 (en) Binding a data transaction to a person's identity using biometrics
EP1372292B1 (fr) Echange de clé sécurisé avec authentification mutuelle
WO2022021992A1 (fr) Procédé et système de transmission de données basés sur une communication nb-iot, et support
WO2021115290A1 (fr) Procédé et dispositif d'application de nombre aléatoire hors chaîne pour jeu de chaîne de blocs et support de stockage
US20030093669A1 (en) Network architecture for secure communications between two console-based gaming systems
CN112968884B (zh) 一种防止黑客攻击的区块链异构共识方法及终端
US20140192981A1 (en) Information processing apparatus, signature generation apparatus, information processing method, signature generation method, and program
WO2017221723A1 (fr) Dispositif de terminal, dispositif de gestion de distribution de clé, système serveur-client, procédé de communication et programme
EP3779932A1 (fr) Réseau de chaînes de blocs, et procédé d'établissement associé
Alwen et al. Collusion-free multiparty computation in the mediated model
Liu et al. Provably secure three-party password-based authenticated key exchange from RLWE
CN114154196A (zh) 异构数据处理方法、装置及电子设备
WO2020233377A1 (fr) Procédé de distribution, méthode de jeu, dispositif, et support de stockage
US7827596B2 (en) Authenticating computed results in a public distributed computing environment
CN112600667A (zh) 一种密钥协商方法、装置、设备及存储介质
CN109120410B (zh) 一种漂流瓶游戏方法、设备和存储介质
Fitzi et al. Multi-party computation with hybrid security
Hu et al. Universally composable three‐party password‐authenticated key exchange with contributiveness
CN110572257B (zh) 基于身份的数据来源鉴别方法和系统
JP6893919B2 (ja) マルチttpが参与するエンティティアイデンティティ有効性検証方法及び装置
CN107113305A (zh) 用于发送和验证签名的装置和方法
Tang et al. Non-interactive and information-theoretic secure publicly verifiable secret sharing
US20230188356A1 (en) Apparatus and method for processing distributed consensus using multi-signature
US20240163115A1 (en) Communication devices for use in challenge-response rounds and corresponding operating methods

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20898473

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20898473

Country of ref document: EP

Kind code of ref document: A1