CN107528688B - Block chain key keeping and recovering method and device based on encryption delegation technology - Google Patents

Block chain key keeping and recovering method and device based on encryption delegation technology Download PDF

Info

Publication number
CN107528688B
CN107528688B CN201710927345.5A CN201710927345A CN107528688B CN 107528688 B CN107528688 B CN 107528688B CN 201710927345 A CN201710927345 A CN 201710927345A CN 107528688 B CN107528688 B CN 107528688B
Authority
CN
China
Prior art keywords
user
private key
key
information
management counter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710927345.5A
Other languages
Chinese (zh)
Other versions
CN107528688A (en
Inventor
谢翔
李升林
何德彪
孙立林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Juzix Technology Shenzhen Co ltd
Wuhan University WHU
Original Assignee
Juzix Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Juzix Technology Shenzhen Co ltd filed Critical Juzix Technology Shenzhen Co ltd
Priority to CN201710927345.5A priority Critical patent/CN107528688B/en
Publication of CN107528688A publication Critical patent/CN107528688A/en
Application granted granted Critical
Publication of CN107528688B publication Critical patent/CN107528688B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

A block chain key keeping and recovering method and device based on encryption delegation technology. The method comprises the following steps: a registration stage: the user encrypts a user private key locally and submits a registration application to a management counter, the management counter encrypts user information including a user private key ciphertext and issues the encrypted user encrypted information and a corresponding user public key to a block chain; and a key recovery stage: in the key recovery stage, the management counter receives a key recovery request sent by a user, retrieves user encrypted information on the block chain through a user public key, decrypts the user encrypted information, sends the decrypted user information containing a user private key ciphertext to the user, and the user decrypts the user information locally to recover the key. The invention introduces the key encryption entrusting technology, so that the user can entrust the encrypted private key to the management counter for storage, and the management counter does not know the real content of the private key, so that the backup and the recovery of the private key are safer, and the rights and interests of the user are protected.

Description

Block chain key keeping and recovering method and device based on encryption delegation technology
Technical Field
The invention relates to a blockchain system, in particular to a blockchain key keeping and recovering method based on an encryption delegation technology for solving the problem of keeping and recovering the security of blockchain keys.
Background
The blockchain technique is a decentralized distributed ledger technique that originates from bitcoin. The nodes are used as participants of the blockchain system and respectively maintain a copy of data. And the nodes keep the consistency of the backup database data through a consensus algorithm. Each account in the blockchain system consists of an address (public key) and a private key. The user controls the assets in the account by using the private key, which is the only data for proving the user identity, and the core assets of the user can only be controlled by the private key, namely, the confirmation of the transaction can be realized only through the signature of the private key, so the protection of the private key of the block chain is particularly important. In a federation chain, a user's assets or other interests are permanently lost once the private key is lost. Therefore, the blockchain system needs to provide a key backup and recovery service to the user, or an asset transfer service after a password is lost or damaged. In the existing blockchain technology, only the private key of the user can be backed up at the core node. However, the method gives the core node excessive rights and cannot meet the requirements of customers. Therefore, a perfect blockchain system should design a mechanism: the private key is owned and controlled by the user, but when the risk occurs, the private key is recovered under the condition that the core node does not know the real private key of the user.
In the existing blockchain system, there are four main methods for storing and using the private key: platform hosting, local client, e-wallet, and offline cold storage. Of the four methods, only the platform hosting method can back up the private key of the user at the core node, thereby providing the key recovery service. However, the method gives the core node excessive rights and cannot meet the requirements of customers. For example, in an actual business model, such as a federation chain, there is a scenario where a user key is lost or dead, and a core node is required to be entrusted to retrieve the private key. The current solution to meet this requirement is to backup the user's private key at the core node in advance, or in a secret sharing manner, the user divides the private key into several shares and backups the shares at different core nodes. Although the method can solve the requirement of retrieving the private key, the core node has the backup of the private key of the user or a plurality of core nodes can recover the private key of the user, can completely control the user account and even can carry out operation against the will of the user account.
Disclosure of Invention
The invention aims to provide a block chain key keeping and recovering method based on an encryption delegation technology, which aims to solve the technical problems that the existing user key is not high in security or cannot be recovered after a user is lost.
A block chain key keeping and recovering method based on encryption entrusting technology comprises the following steps:
(I) registration phase
The user encrypts a private key of the user locally and provides a registration application to a management counter;
the management counter encrypts user information including a user private key ciphertext and issues the encrypted user encryption information and a corresponding user public key to the block chain;
(II) Key recovery phase
In the key recovery stage, the management counter receives a key recovery request sent by a user, retrieves and decrypts user encrypted information on the block chain through a user public key, and sends the decrypted user information containing a user private key ciphertext to the user;
the user decrypts locally and recovers the key.
The invention provides a block chain key keeping and recovering transmitting device based on encryption entrusting technology, wherein the transmitting device is a node on a block chain, and the transmitting device comprises:
a processing unit: the system is used for generating a user private key and a user public key in a registration stage, encrypting the user private key locally and decrypting the user private key from a received user private key ciphertext by using a secret parameter extracted by biological characteristics in a key recovery stage;
a transmitting and receiving unit: data transceiving between management counters on a building blockchain system: the registration stage sends user information including a user private key ciphertext and a user public key; user information including a user private key ciphertext is received at a key recovery stage.
The invention also provides a management counter for block chain key custody and recovery based on encryption entrusting technology, which comprises:
a processing unit: for generating a counter public key and a counter private key; the counter public key is used for encrypting the user information including the user private key ciphertext in the registration stage; the device is also used for receiving a key recovery request sent by a user in a key recovery stage, retrieving user encryption information on the block chain through a user public key and decrypting the user encryption information;
a transmitting and receiving unit: for establishing data transceiving with other nodes on the blockchain system: the system comprises a register module, a register module and a register module, wherein the register module is used for receiving a register request of a user; the system is also used for issuing the encrypted user encryption information and the corresponding user public key to the block chain; and the system is also used for sending the decrypted user information containing the user private key ciphertext to the user.
Compared with the prior art, the invention has the following advantages:
firstly, the introduction of the key encryption entrusting technology of the invention enables a user to entrust the encrypted private key to a management counter for storage, and the management counter does not know the real content of the private key, so that the backup and the recovery of the private key are safer, and the rights and interests of the user are protected. The method overcomes the defect that the user needs to back up the private key on the core node in the prior art, thereby preventing the core node from having overlarge authority. Meanwhile, the user does not need to divide the private key into a plurality of parts to be backed up on different core nodes, so that collusion of the core nodes can be prevented, and the private key of the user can be recovered.
Secondly, the management counter encrypts the encrypted user private key ciphertext through the counter private key of the management counter, so that the security of the user private key ciphertext is further improved. Moreover, the user can encrypt the user private key by using the self identity identification information and/or password, thereby further ensuring the security of the user private key.
In addition, the management counter synchronizes the encrypted user information to the block chain, so that the encrypted user information is prevented from being directly stored on the management counter, and further the management counter cannot directly know the user private key ciphertext, so that the private key of the user cannot be known or recovered by other parties except the user.
Drawings
FIG. 1 is a flow chart of a method for keeping and recovering a blockchain key based on an encryption delegation technique according to the present invention;
FIG. 2 is a flowchart illustrating a registration phase process according to the present invention;
fig. 3 is a flowchart illustrating a key recovery phase process according to the present invention.
Detailed Description
The following detailed description is made with reference to the accompanying drawings.
In the blockchain system, a core node generally refers to participating in a complete transaction process of a blockchain, the node participates in blockchain consensus after storing complete blockchain data and completing the transaction, and has an opportunity to complete an accounting function to generate a new block, and the node is generally born by a workstation, a server or a cloud service with better performance. In this example, the core node that can implement blockchain key retention and recovery is the management counter.
Please refer to fig. 1, which is a flowchart illustrating a method for keeping and recovering a blockchain key based on an encryption delegation technique according to the present invention. It includes:
s10: registration phase
S110: the user encrypts a private key of the user locally and provides a registration application to a management counter;
s120: the management counter encrypts user information including a user private key ciphertext and issues the encrypted user encryption information and a corresponding user public key to the block chain;
s20: key recovery phase
S210: in the key recovery stage, the management counter receives a key recovery request sent by a user, retrieves and decrypts user encrypted information on the block chain through a user public key, and sends the decrypted user information containing a user private key ciphertext to the user;
s220: the user decrypts locally and recovers the key.
The technical scheme of the invention provides a user key recovery mechanism in the block chain system by using a key encryption entrusting technology, and the key recovery allows an ordinary user to retrieve the private key through a management counter after the private key is lost. The most important thing of the invention is that the user key is only on the hand of the user, and any node does not know or recover the user key, thereby ensuring the safety of the user key.
The key recovery scheme is divided into a registration phase and a key recovery phase. Consider two types of identities in a system: the detailed process of the common user and the management counter is as follows:
in the registration stage, a user A applies for a management counter, if the audit is successful, the user locally uses own biological characteristics to generate two parameters, a secret parameter in the two parameters is used for encrypting a private key of the user A to obtain an encrypted private key ciphertext, then the private key ciphertext and another public parameter are sent to the management counter, the management counter uses a public key encryption algorithm, a counter public key is used for encrypting the ciphertext and the public parameter of the private key of the user A, and the encrypted ciphertext and the corresponding user public key are issued to a block chain. The specific flow chart is shown in fig. 2.
1. The user presents the identity information and the registration information and requests a registration key service from the management counter. The user registers the identity on the management counter in advance. The management counter may pre-agree which users are legitimate and may allow the users to register.
2. The management counter checks the user information, and if the information is legal, the user is allowed to register if the information is passed; the management counter firstly checks the validity of the user information, and only the allowed users can carry out the next registration action.
3. User generated blockchain public and private key pair (sk)1,pk1)。
The way for the user to generate the public and private key pair of the block chain is many, and the details are not repeated as long as the existing generation way falls into the scope of the invention.
4. The user derives the public parameter P and the secret parameter R using the biometric feature B (including fingerprint, iris, palmar veins, facial form, etc.) using the fuzzy extractor gen (B) → (P, R). Of course, the user may generate the public parameter P and the secret parameter R by using a conventional algorithm such as password information. Also, using the biometric features to obtain the public parameter P and the secret parameter R using the fuzzy extractor is an existing algorithm, and will not be described here.
5. The user uses a symmetric encryption algorithm and takes the Hash value of the secret parameter R as a key to pair sk1Encrypting to obtain ciphertext C (also called user key ciphertext) by an encryption method Eh(R)(sk1) → C, where h () represents a hash value function;
6. the user sends the user information comprising the ciphertext C and the public parameter P to the management counter;
7. counter public and private key pair (sk) of management counter2,pk2) Using a public key encryption algorithm to encrypt the user information including the ciphertext C and the public parameter P to obtain a ciphertext C' (i.e., user encryption information), wherein an encryption formula is as follows: epk2(C, P) → C'; this formula representsUse the public key pk of the management counter2C' is obtained by carrying out asymmetric encryption on C and P, and only the corresponding private key sk is used2The ciphertext can be decrypted;
8. management counter cryptograph C' (user encryption information) and user public key pk1Synchronizing to a block chain for storage;
9. the user registration is successful.
The above disclosure is only one implementation way, and the user has a plurality of encryption ways for the user private key, and uses the own identification information to encrypt, which is only one encryption way, and is not used to limit the present invention. Similarly, the management counter encrypts the information, and the disclosure is by way of example only and not by way of limitation.
In the key recovery phase, when the user a finds that its own private key is lost, it sends out a key recovery request, so as to verify and retrieve the private key, and the specific flow is as shown in fig. 3:
1. the node requests to recover the private key and sends a private key recovery request to the management counter;
2. the management counter checks the user identity, and if the verification is successful, the user public key pk is obtained1
3. Pass through pk for management counter1Searching and obtaining corresponding user encryption information (ciphertext C') on the block chain;
4. the management counter uses its private key sk2Decrypting C' to obtain a ciphertext C and a public parameter P;
5. the management counter sends user information including the ciphertext C and the public parameter P to the user;
6. the user restores Rep (P, B ') → R' by disclosing the parameter P and the biometric feature B 'using a fuzzy extractor, and by the concept of the fuzzy extractor, if the distance (B, B') < θ between the biometric feature B 'and the original biometric feature B, R' generated before and after is R; where distance () is a similarity distance function, and θ is a value defined in advance, the similarity distance representing two biometrics must be smaller than this value.
7. The user uses R' to decrypt the ciphertext C, and if decryption is successful, the private key sk is obtained1Secret keyThe recovery was successful.
A transmitting device for keeping and recovering a block chain key based on an encryption delegation technology, the transmitting device being a node on a block chain, the transmitting device comprising:
a processing unit: the system is used for generating a user private key and a user public key in a registration stage, encrypting the user private key locally and decrypting the user private key from a received user private key ciphertext by using a secret parameter extracted by biological characteristics in a key recovery stage;
a transmitting and receiving unit: data transceiving between management counters on a building blockchain system: the registration stage sends user information including a user private key ciphertext and a user public key; user information including a user private key ciphertext is received at a key recovery stage.
The transmitting device of the present invention refers to only a node on the blockchain, and may be a terminal on the blockchain network in general, including but not limited to a lightweight node.
A management counter for block chain key keeping and recovering based on encryption entrusting technology, comprising:
a processing unit: for generating a counter public key and a counter private key; the counter public key is used for encrypting the user information including the user private key ciphertext in the registration stage; the device is also used for receiving a key recovery request sent by a user in a key recovery stage, retrieving user encryption information on the block chain through a user public key and decrypting the user encryption information;
a transmitting and receiving unit: for establishing data transceiving with other nodes on the blockchain system: the system comprises a register module, a register module and a register module, wherein the register module is used for receiving a register request of a user; the system is also used for issuing the encrypted user encryption information and the corresponding user public key to the block chain; and the system is also used for sending the decrypted user information containing the user private key ciphertext to the user.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions of one or more of the flowcharts of the above-described flow diagrams.
Although the present invention has been described with reference to the preferred embodiments, it is not intended to limit the scope of the claims, and those skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention.

Claims (6)

1. A block chain key keeping and recovering method based on encryption entrusting technology is characterized by comprising the following steps:
in the registration stage, a user encrypts a private key of the user locally and provides a registration application to a management counter; the management counter encrypts user information including a user private key ciphertext, and issues the encrypted user encryption information and a user public key corresponding to the user private key to a block chain;
in the key recovery stage, the management counter receives a key recovery request sent by a user, retrieves and decrypts user encrypted information on the block chain through a user public key, and sends the decrypted user information containing a user private key ciphertext to the user; the user decrypts locally and recovers the secret key;
the encrypting method comprises the following steps that the user encrypts a private key of the user locally and provides a registration application to a management counter, wherein the registering application specifically comprises the following steps:
the user locally generates the public parameter P and the secret parameter R using own biometric information and/or password information,
the user encrypts the user private key by using the secret parameter R to obtain a user private key ciphertext C,
the user sends user information including a user private key ciphertext C and the public parameter P to a management counter;
the encrypting of the user information including the user private key ciphertext by the management counter specifically includes:
and the management counter encrypts the user information including the user private key ciphertext C and the public parameter P by using the counter public key.
2. The method of claim 1, wherein the key recovery phase further comprises:
the management counter searches and obtains corresponding user encryption information on the block chain through the user public key;
the management counter decrypts the encrypted user information by using the counter private key to obtain user information comprising a user private key ciphertext and a public parameter;
and the management counter sends the user information to the user.
3. The method of claim 2, wherein the key recovery phase further comprises:
the user restores Rep (P, B ') → R ' by disclosing the parameters P and the biometric features B ', using the fuzzy extractor,
and the user uses the R' to decrypt the user private key ciphertext, and if decryption is successful, the user private key is obtained.
4. The method of claim 1, further comprising:
the management counter stores user information in advance and establishes an auditing mechanism allowing user registration;
when a user submits a registration application to the management counter, the identity of the user is checked.
5. A transmitter apparatus for keeping and recovering a blockchain key based on an encryption delegation technique, the transmitter apparatus being a node on a blockchain, the transmitter apparatus comprising:
a processing unit: the device is used for generating a user private key and a user public key in a registration stage, encrypting the user private key locally and decrypting the user private key from a received user private key ciphertext by using a secret parameter extracted by biological characteristics in a key recovery stage;
the encrypting the user private key locally specifically includes:
locally using the own biometric information and/or password information to generate the public parameter P and the secret parameter R,
encrypting the user private key by using the secret parameter R to obtain a user private key ciphertext C;
a transmitting and receiving unit: data transceiving between management counters on a building blockchain system: the registration stage sends user information including a user private key ciphertext and a user public key; user information including a user private key ciphertext is received at a key recovery stage.
6. A management counter for block chain key keeping and recovering based on encryption entrusting technology, comprising:
a processing unit: for generating a counter public key and a counter private key; the counter public key is used for encrypting the user information including the user private key ciphertext in the registration stage; the device is also used for receiving a key recovery request sent by a user in a key recovery stage, retrieving user encryption information on the block chain through a user public key and decrypting the user encryption information;
a transmitting and receiving unit: for establishing data transceiving with other nodes on the blockchain system: the system comprises a register module, a register module and a register module, wherein the register module is used for receiving a register request of a user; the system is also used for issuing the encrypted user encryption information and the corresponding user public key to the block chain; the system is also used for sending the decrypted user information containing the user private key ciphertext to the user;
the encrypted user encryption information is generated by encrypting the user information including a user private key ciphertext C and a public parameter P through a counter public key; the user locally uses the self biological characteristic information and/or the password information to generate a public parameter P and a secret parameter R, and the secret parameter R is used for encrypting the user private key to obtain a user private key ciphertext C.
CN201710927345.5A 2017-09-30 2017-09-30 Block chain key keeping and recovering method and device based on encryption delegation technology Active CN107528688B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710927345.5A CN107528688B (en) 2017-09-30 2017-09-30 Block chain key keeping and recovering method and device based on encryption delegation technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710927345.5A CN107528688B (en) 2017-09-30 2017-09-30 Block chain key keeping and recovering method and device based on encryption delegation technology

Publications (2)

Publication Number Publication Date
CN107528688A CN107528688A (en) 2017-12-29
CN107528688B true CN107528688B (en) 2020-04-21

Family

ID=60684512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710927345.5A Active CN107528688B (en) 2017-09-30 2017-09-30 Block chain key keeping and recovering method and device based on encryption delegation technology

Country Status (1)

Country Link
CN (1) CN107528688B (en)

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084688A (en) * 2018-01-25 2019-08-02 西南交通大学 A kind of block chain loses coin method for retrieving and system
CN108280647A (en) * 2018-02-12 2018-07-13 北京金山安全软件有限公司 Private key protection method and device for digital wallet, electronic equipment and storage medium
CN108377187B (en) * 2018-03-21 2022-03-04 超越科技股份有限公司 Block chain private key using method and device based on biological characteristics
JP6907144B2 (en) * 2018-03-27 2021-07-21 Kddi株式会社 Access control system, access control method and access control program
CN108600182B (en) * 2018-03-29 2021-03-19 深圳前海微众银行股份有限公司 Block chain key management method, system, key management device and storage medium
CN108629027B (en) * 2018-05-09 2023-08-01 深圳壹账通智能科技有限公司 User database reconstruction method, device, equipment and medium based on block chain
CN108805538A (en) * 2018-06-14 2018-11-13 清华大学 A kind of digital cash method of commerce and device
CN110661610B (en) * 2018-06-29 2020-11-03 创新先进技术有限公司 Input acquisition method and device of secure multi-party computing protocol
US11212093B2 (en) * 2018-09-14 2021-12-28 Htc Corporation Method of social key recovery and related device
CN109598489A (en) * 2018-11-09 2019-04-09 海南新软软件有限公司 A kind of method, apparatus and system of the storage of digital wallet mnemonic word
CN109462588B (en) * 2018-11-13 2021-04-16 上海物融智能科技有限公司 Decentralized data transaction method and system based on block chain
CN109495478B (en) * 2018-11-20 2021-05-04 桂林电子科技大学 Block chain-based distributed secure communication method and system
CN109615373B (en) * 2018-11-29 2021-07-27 中国电子科技集团公司第三十研究所 Entrustable supervision anonymous privacy protection method in block chain system
CN109474424B (en) * 2018-12-17 2020-08-18 江苏恒宝智能***技术有限公司 Block chain account key backup and recovery method and system
CN109379189B (en) * 2018-12-17 2022-05-20 江苏恒宝智能***技术有限公司 Block chain account key backup and recovery method, device, terminal and system
CN110020857A (en) 2019-02-27 2019-07-16 阿里巴巴集团控股有限公司 A kind of method and device for storing, calling block chain account private key
CN113077254A (en) * 2019-03-29 2021-07-06 创新先进技术有限公司 Method and apparatus for resetting blockchain account key based on biometrics
CN109995781B (en) * 2019-03-29 2021-06-22 腾讯科技(深圳)有限公司 Data transmission method, device, medium and equipment
CN110119309A (en) * 2019-04-04 2019-08-13 中国平安人寿保险股份有限公司 Data processing method, device and storage medium
CN109922084B (en) * 2019-04-10 2021-08-03 北京阿尔山区块链联盟科技有限公司 Key management method and device and electronic equipment
CN110086612B (en) * 2019-04-26 2022-03-04 山大地纬软件股份有限公司 Block chain public and private key backup and lost recovery method and system
CN110163604B (en) * 2019-04-29 2021-02-09 华中科技大学 Block chain asset transfer method based on multi-party verification
CN110516435B (en) * 2019-09-02 2021-01-22 国网电子商务有限公司 Private key management method and device based on biological characteristics
CN110740130A (en) * 2019-09-29 2020-01-31 南京金宁汇科技有限公司 block chain key management method, system and storage medium
CN111008837B (en) * 2019-11-21 2023-06-30 深圳前海环融联易信息科技服务有限公司 Block chain account private key recovery method and device, computer equipment and storage medium
CN111030807B (en) * 2019-11-21 2023-09-22 上海禾一网络科技有限公司 Message transmission method based on block chain
CN110889128A (en) * 2019-11-27 2020-03-17 上海禾一网络科技有限公司 Input method and device based on block chain storage and encryption key exchange
CN110929290B (en) * 2019-12-04 2022-03-18 南京如般量子科技有限公司 Private key threshold backup, loss reporting and recovery system and method based on alliance chain
CN111339199B (en) * 2020-02-28 2023-08-29 中国工商银行股份有限公司 Block chain key recovery method and device
CN112751841A (en) * 2020-12-25 2021-05-04 江苏通付盾科技有限公司 Encryption communication method and system based on block chain technology
CN116527261A (en) * 2023-07-03 2023-08-01 浙江大华技术股份有限公司 Key recovery method, electronic device and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359991A (en) * 2008-09-12 2009-02-04 湖北电力信息通信中心 Public key cipher system private key escrowing system based on identification
CN103916372B (en) * 2013-01-07 2017-07-21 ***股份有限公司 A kind of third party's log-on message trustship method and system
CN105469510B (en) * 2014-10-12 2018-01-09 吴思进 The encryption currency wallet that delay pays or given for change can be predicted
CN107113315B (en) * 2016-04-15 2020-11-13 深圳前海达闼云端智能科技有限公司 Identity authentication method, terminal and server
CN106100847B (en) * 2016-06-14 2021-10-26 惠众商务顾问(北京)有限公司 Method and device for verifying identity information of asymmetric encryption block chain

Also Published As

Publication number Publication date
CN107528688A (en) 2017-12-29

Similar Documents

Publication Publication Date Title
CN107528688B (en) Block chain key keeping and recovering method and device based on encryption delegation technology
CN108418680B (en) Block chain key recovery method and medium based on secure multi-party computing technology
EP3673435B1 (en) Improving integrity of communications between blockchain networks and external data sources
CN111062716B (en) Method and device for generating block chain signature data and block chain transaction initiating system
US10785035B1 (en) Anti-replay attack authentication protocol
CN106548345B (en) Method and system for realizing block chain private key protection based on key partitioning
JP6547079B1 (en) Registration / authorization method, device and system
CN111242617B (en) Method and apparatus for performing transaction correctness verification
CN110932870B (en) Quantum communication service station key negotiation system and method
US11943350B2 (en) Systems and methods for re-using cold storage keys
WO2020119258A1 (en) Data processing method and device
KR20190075771A (en) Authentication System Using Block Chain Through Distributed Storage after Separating Personal Information
CN109981255B (en) Method and system for updating key pool
US20200412554A1 (en) Id as service based on blockchain
CN110888933B (en) Information providing method, device and system and information acquisition method and device
CN110690957A (en) Anti-quantum-computation private key backup, loss reporting and recovery method and system based on alliance chain and implicit certificate
JP2010231404A (en) System, method, and program for managing secret information
CN116566705A (en) Authentication method, system, client and server based on key derivation function
AU2018100503A4 (en) Split data/split storage
CN110839067B (en) Information providing method and device
CN113722749A (en) Data processing method and device for block chain BAAS service based on encryption algorithm
CN115913677A (en) Block chain-based collaboration edge storage data privacy protection system and method
TWI430643B (en) Secure key recovery system and method
CN115412236A (en) Method for key management and password calculation, encryption method and device
CN110880969B (en) Method and system for generating QKD network authentication key based on alliance chain and implicit certificate

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230411

Address after: 518066 Room 201, Building A, No.1 Qianwan 1st Road, Haishen Hong Kong Cooperation Zone, Shenzhen, Guangdong Province (settled in Shenzhen Qianhai Business Secretary Co., Ltd.)

Patentee after: JUZIX TECHNOLOGY (SHENZHEN) Co.,Ltd.

Patentee after: WUHAN University

Address before: 518052 Room 201, building a, No. 1, Qianwan 1st Road, Haishen Hong Kong cooperation zone, Shenzhen, Guangdong (settled in Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: JUZIX TECHNOLOGY (SHENZHEN) Co.,Ltd.

TR01 Transfer of patent right