CN108512661A - A kind of safety protecting method of block chain private key for user - Google Patents

A kind of safety protecting method of block chain private key for user Download PDF

Info

Publication number
CN108512661A
CN108512661A CN201810284907.3A CN201810284907A CN108512661A CN 108512661 A CN108512661 A CN 108512661A CN 201810284907 A CN201810284907 A CN 201810284907A CN 108512661 A CN108512661 A CN 108512661A
Authority
CN
China
Prior art keywords
private key
user
hash value
block chain
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810284907.3A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU LINGGUANG QUANTUM TECHNOLOGY Co Ltd
Original Assignee
CHENGDU LINGGUANG QUANTUM TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU LINGGUANG QUANTUM TECHNOLOGY Co Ltd filed Critical CHENGDU LINGGUANG QUANTUM TECHNOLOGY Co Ltd
Priority to CN201810284907.3A priority Critical patent/CN108512661A/en
Publication of CN108512661A publication Critical patent/CN108512661A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of safety protecting methods of block chain private key for user, for solving the problems, such as the security protection given for change with private key after stolen after private key is lost.The present invention utilizes the randomness diffusion of hash algorithm and irreversible feature, the hash value for the security parameter that can be controlled using user is as private key, customer parameter is introduced under the premise of meeting private key randomness and requiring, effectively solves the problems, such as that the ownership proof of private key and private key give problem for change.The present invention can be widely applied to use application system of the random number as asymmetric cryptographic algorithm private key, especially have a good application prospect in block chain network.

Description

A kind of safety protecting method of block chain private key for user
Technical field
The invention belongs to block chain and its private key security technology area more particularly to a kind of safety of block chain private key for user Means of defence.
Background technology
Block chain is a kind of a kind of chain type number for being sequentially in time combined into data block in such a way that sequence is connected According to structure, and the distributed account book that ensures to distort in a manner of cryptography and can not forge.In block catenary system, private key is Each user oneself generates and oneself is responsible for the random number of keeping, theoretically without third-party participation, so private key is once It loses, just loses the management and control to account assets.With current calculation power and technology, from wallet address or public key retrodict private key be can not Capable.Therefore, for block chain user, private key is exactly all.Due to also lacking effective solution, institute at present It is faced with the risk for causing digital asset to lose due to private key is lost or is stolen with the user of block chain especially bit coin, is solved Private key for user problem out of control has very important practical significance to the safety for promoting block chain network.
Invention content
Active demand for the protection of block chain private key for user and the deficiencies in the prior art, in order to solve the institute of private key for user It has the right to belong to proof problem and security protection problem, the present invention provides a kind of safety protecting methods of block chain private key for user. One-way and randomness diffusion property of the method for the present invention based on Hash functions, utilize the hash value and use of the biological characteristic of user The hash value for the hash value XOR operation value that the registered permanent residence enables is as private key.For not knowing that the hacker of biological characteristic and user password comes It says, even if which give private key, a biological characteristic and password can not be found and obtain same private key, thus can be life The proof that object feature and password belong to as private key, that is, in the case where private key is stolen, the biology for generating private key can be utilized special The proof that password of seeking peace belongs to as private key can utilize biological characteristic and password to restore again in the case where private key is lost Private key, it is to realize the safeguard protection of private key for user, i.e., anti-lost also to prevent being stolen.
A kind of safety protecting method of block chain private key for user of the present invention, including private key production method and security protection side Method, wherein private key production method includes but not limited to:Using the hash value of a security parameter as private key for user;Safety is anti- Maintaining method includes but not limited to:(1)When user account logs in and initiates transaction, communication terminal that system is registered to user in real time Reminder message is sent, when user has found account by illegal operation, it is out of control that user broadcasts its private key in block chain network in time Alert message(Broadcast private key and public key out of control)And initiate all transaction unconfirmed for freezing to be signed by the private key, institute It is all illegal transaction corresponding trading processing unconfirmed to have node;(2)When there is dispute in the right of attribution of some private key, if One user can show a parameter within the time of restriction and be striven by the hash value of other node verification parameters and presence The private key of view is completely the same, then the user is considered as the lawful owner of the private key;(3)Lawful owner's weight of the private key New private key is newly generated, submission is transferred to whole digital assets in account corresponding to dispute private key in new private key account Transaction, and show the hash value of the hash value and user password for generating the biological characteristic that there is dispute private key, if The hash value of the XOR operation value of the hash value of the biological characteristic and the hash value of user password and the private key that there is dispute are complete Complete consistent, then account private key change is recognized.
Further, hash value used by the method for the present invention includes using standard hash algorithm and anti-quantum calculation The output result that hash algorithm obtains.
Further, security parameter used by the method for the present invention include but not limited to user biological feature hash value with The XOR operation value of the hash value of user password.
Further, user biological feature used by the method for the present invention includes but not limited to fingerprint characteristic, facial characteristics And iris feature.
Further, the private key in the method for the present invention includes but not limited to the ECC of 256 bits, 384 bits and 512 bits Algorithm(Including signature algorithm and Encryption Algorithm)Private key.
Compared with prior art, a kind of safety protecting method of block chain private key for user of the invention has following notable wound New property:The present invention is using the randomness diffusion of hash algorithm and irreversible feature, the security parameter that can be controlled using user Hash value as private key, rationally introduce customer parameter under the premise of meeting private key randomness and requiring, can effectively solve private The ownership proof problem of key and private key give problem for change, to realize the safeguard protection of private key for user, i.e., it is anti-lost also prevent it is stolen It takes.The present invention can be widely applied to use application system of the random number as private key, especially have in block chain network Good application prospect.
Description of the drawings
Fig. 1 is the private key production method schematic diagram of the present invention.
Specific implementation mode
To keep technical scheme of the present invention and advantage clearer, as the part of the present invention, below in conjunction with attached drawing and Specific embodiment, the present invention is described in further detail.
The present invention is suitable for the situation of all private keys using random number as asymmetric cryptographic algorithm, and the present invention is not specific Limit the method that corresponding public key generates(For example, the public key production method spec256k1 of bit coin may be used).
Hash value used in the present invention includes using standard hash algorithm(Such as MD5, SHA_1, SHA_256 etc.)With The hash algorithm of anti-quantum calculation(Such as anti-quantum standard algorithm)Obtained output result.It is multiple used in the present invention Hash value may be used the same hash algorithm and generate, and multiple hash algorithms can also be used to generate.
Under normal conditions, block chain user node randomly generates a random number as private key, and still, which does not have User characteristics.After private key is stolen, user does not have effective means to control risk;After private key is lost, user also has no idea to give for change. The present invention utilizes the Hash for the security parameter that user can control using the randomness diffusion of hash algorithm and irreversible feature Be worth the ownership proof and private key that private key can be effectively solved the problems, such as private key gives problem for change, to realize private key for user Safeguard protection, i.e., it is anti-lost also to prevent being stolen.
As a preferred embodiment, private key production method of the invention is as shown in Figure 1, the embodiment is used to generate The private key of the ECC algorithm of 256 bits, wherein using fingerprint characteristic and password as customer parameter, using user fingerprints feature The hash value of the XOR operation value of the hash value of hash value and user password is as private key, that is, note user fingerprints are characterized as C, mouth Enable is P, then, private key SK=SHA_256 (SHA_256 (C) ⊕ SHA_256 (P)), wherein ⊕ indicates XOR operation.User adopts Block chain account is logged in private key SK to be stolen by hacker to reduce fingerprint characteristic and password without the use of fingerprint characteristic and password Risk.
It when practical application, needs to increase corresponding security mechanism in block catenary system, that is, user account is logged in and initiated When transaction, communication equipment that system is registered to user in real time(Such as mobile phone)Reminder message is sent, when user has found account quilt When illegal operation, user may be used account out of control or other accounts and broadcast the police out of control of its private key in block chain network in time Report message(Wherein, alert message includes the public key and private key of user)And it is all unconfirmed to initiate to freeze to be signed by the private key Transaction, all nodes are all illegal transaction corresponding trading processing unconfirmed(That is, not handling the illegal transaction, accounting nodes All illegal transactions are rejected from trading pit);It is possible thereby to be lost caused by reducing the stolen possibility of private key for user;Then, area Block catenary system starts the arbitration of the private key right of attribution, that is, if a user can show a parameter and quilt within the time of restriction The hash value of other node verification parameters is completely the same with the private key that there is dispute, then the user is considered as the conjunction of the private key Method owner;Obviously, the user for stealing SK can not show the security parameter for generating SK, and the lawful owner of the private key can be suitable Profit shows SHA_256 (C) ⊕ SHA_256 (P) and SK, to solve the problems, such as that the right of attribution of private key proves;Finally, the private key Lawful owner regenerate new private key, submission is transferred to whole digital assets in account corresponding to dispute private key newly Private key account in transaction, and show for generate it is described exist dispute private key fingerprint characteristic hash value SHA_256 (C) with the hash value SHA_256 of user password (P), if the hash value SHA_256 (C) of the fingerprint characteristic and using the registered permanent residence The hash value of the XOR operation value of the hash value SHA_256 (P) of order and the private key that there is dispute are completely the same, then account private key Change and corresponding money transfer transactions are recognized.To realize the security protection to private key for user account.
When private key for user is lost, user can utilize the hash value SHA_256 (C) and user password of fingerprint characteristic Hash value SHA_256 (P) restores private key.Certainly, in order to realize that better safeguard protection, user password and private key should be isolated Storage protection.
In order to realize higher algorithm security, the private key of the ECC algorithm of 384 bits and 512 bits can also be used.
It should be noted that the method for the present invention can be widely applied to the generation of private key, it is not limited solely to use for block chain The generation of family private key.
Embodiments described above is only a part of the embodiment of the present invention, instead of all the embodiments.This field Other direct embodiments for using the method for the present invention that those of ordinary skill is obtained under the premise of not making creative work, all Belong to the scope of protection of the invention.

Claims (5)

1. a kind of safety protecting method of block chain private key for user, which is characterized in that including private key production method and security protection Method, wherein
Private key production method includes:Using the hash value of a security parameter as private key for user;
Safety protecting method includes:
(1)When user's logon account and initiation transaction, system sends reminder message to the communication terminal that user is registered in real time, when When user has found account by illegal operation, user broadcasts its private key alert message out of control and initiation in block chain network in time Freeze the request for all transaction unconfirmed signed by the private key, all nodes are illegal trading processing unconfirmed accordingly Transaction;
(2)When the right of attribution of some private key has dispute, if a user can show a ginseng within the time of restriction Number is simultaneously completely the same by the hash value of other node verification parameters and the private key in the presence of dispute, then the user is considered as the private The lawful owner of key;
(3)The lawful owner of the private key regenerates new private key, submits the whole in account corresponding to dispute private key Digital asset is transferred to the transaction in new private key account, and shows for generating the biological characteristic that there is dispute private key The hash value of hash value and user password, if the XOR operation of the hash value of the hash value and user password of the biological characteristic The hash value of value and the private key that there is dispute are completely the same, then account private key change is recognized.
2. according to the method described in claim 1, it is characterized in that, the hash value includes using standard hash algorithm and anti-amount The output result that the hash algorithm that son calculates obtains.
3. according to the method described in claim 1, it is characterized in that, the security parameter includes the hash value of user biological feature With the XOR operation value of the hash value of user password.
4. according to the method described in claim 3, it is characterized in that, user biological feature include fingerprint characteristic, facial characteristics and Iris feature.
5. according to the method described in claim 1, it is characterized in that, the private key includes 256 bits, 384 bits and 512 bits ECC algorithm private key.
CN201810284907.3A 2018-04-02 2018-04-02 A kind of safety protecting method of block chain private key for user Withdrawn CN108512661A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810284907.3A CN108512661A (en) 2018-04-02 2018-04-02 A kind of safety protecting method of block chain private key for user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810284907.3A CN108512661A (en) 2018-04-02 2018-04-02 A kind of safety protecting method of block chain private key for user

Publications (1)

Publication Number Publication Date
CN108512661A true CN108512661A (en) 2018-09-07

Family

ID=63380102

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810284907.3A Withdrawn CN108512661A (en) 2018-04-02 2018-04-02 A kind of safety protecting method of block chain private key for user

Country Status (1)

Country Link
CN (1) CN108512661A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067529A (en) * 2018-09-09 2018-12-21 成都量安区块链科技有限公司 A kind of production method of block chain private key for user
CN109359464A (en) * 2018-10-29 2019-02-19 南通大学 A kind of wireless security authentication method based on block chain technology
CN109639421A (en) * 2019-01-09 2019-04-16 山东浪潮质量链科技有限公司 A kind of method that private key is given for change and server
CN110009352A (en) * 2019-03-29 2019-07-12 阿里巴巴集团控股有限公司 Method and apparatus based on biological characteristic resetting block chain account key
CN110070363A (en) * 2019-03-13 2019-07-30 咪咕文化科技有限公司 Account management method, verification method and terminal device in block chain network
CN110417546A (en) * 2019-07-03 2019-11-05 山东大学 The method and apparatus that the end B based on multi-way encryption uses private key
CN111159774A (en) * 2019-12-11 2020-05-15 马上游科技股份有限公司 Decentralized intelligent contract escrow wallet method and system
CN111210224A (en) * 2019-12-23 2020-05-29 中思博安科技(北京)有限公司 Access control method and device in block chain network
CN115098850A (en) * 2022-05-14 2022-09-23 陈勇 Account management method, device and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1336597A (en) * 2000-08-02 2002-02-20 邵通 Ciphered matter and right transferring method and system
CN101626295A (en) * 2008-07-08 2010-01-13 ***通信集团公司 Method, device and system for guaranteeing security of network logon
CN101635743A (en) * 2009-04-02 2010-01-27 浙江亚斯特科技有限公司 System and method using biologic characteristic certification result to validate identity of mobile terminal holder
CN106059764A (en) * 2016-08-02 2016-10-26 西安电子科技大学 Password and fingerprint third-party authentication method based on halting key derivation function
US20160330027A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1336597A (en) * 2000-08-02 2002-02-20 邵通 Ciphered matter and right transferring method and system
CN101626295A (en) * 2008-07-08 2010-01-13 ***通信集团公司 Method, device and system for guaranteeing security of network logon
CN101635743A (en) * 2009-04-02 2010-01-27 浙江亚斯特科技有限公司 System and method using biologic characteristic certification result to validate identity of mobile terminal holder
US20160330027A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
CN106059764A (en) * 2016-08-02 2016-10-26 西安电子科技大学 Password and fingerprint third-party authentication method based on halting key derivation function
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
T2噬菌体: "《哈希(Hash)与加密(Encrypt)的基本原理、区别及工程应用》", 《HTTPS://WWW.CNBLOGS.COM/LEOO2SK/ARCHIVE/2010/10/01/HASH-AND-ENCRYPT.HTML》 *
巴比特: "《聊聊脑钱包的那些事儿,brainwallet.org永久关闭》", 《HTTPS://WWW.LIANSHIJIE.COM/COIN/25124》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067529A (en) * 2018-09-09 2018-12-21 成都量安区块链科技有限公司 A kind of production method of block chain private key for user
CN109359464A (en) * 2018-10-29 2019-02-19 南通大学 A kind of wireless security authentication method based on block chain technology
CN109359464B (en) * 2018-10-29 2021-10-15 南通大学 Wireless security authentication method based on block chain technology
CN109639421B (en) * 2019-01-09 2021-09-21 山东浪潮质量链科技有限公司 Method for retrieving private key and server
CN109639421A (en) * 2019-01-09 2019-04-16 山东浪潮质量链科技有限公司 A kind of method that private key is given for change and server
CN110070363A (en) * 2019-03-13 2019-07-30 咪咕文化科技有限公司 Account management method, verification method and terminal device in block chain network
CN110009352A (en) * 2019-03-29 2019-07-12 阿里巴巴集团控股有限公司 Method and apparatus based on biological characteristic resetting block chain account key
CN110009352B (en) * 2019-03-29 2021-02-05 创新先进技术有限公司 Method and apparatus for resetting blockchain account key based on biometrics
CN110417546A (en) * 2019-07-03 2019-11-05 山东大学 The method and apparatus that the end B based on multi-way encryption uses private key
CN111159774A (en) * 2019-12-11 2020-05-15 马上游科技股份有限公司 Decentralized intelligent contract escrow wallet method and system
CN111159774B (en) * 2019-12-11 2022-07-15 马上游科技股份有限公司 Decentralized intelligent contract escrow wallet method and system
CN111210224A (en) * 2019-12-23 2020-05-29 中思博安科技(北京)有限公司 Access control method and device in block chain network
CN115098850A (en) * 2022-05-14 2022-09-23 陈勇 Account management method, device and system

Similar Documents

Publication Publication Date Title
CN108512661A (en) A kind of safety protecting method of block chain private key for user
CN110741600B (en) Computer-implemented system and method for providing a decentralised protocol for retrieving encrypted assets
CN110958110B (en) Block chain private data management method and system based on zero knowledge proof
CN107124268A (en) A kind of privacy set common factor computational methods for resisting malicious attack
CN112953727A (en) Internet of things-oriented equipment anonymous identity authentication method and system
CN103490889B (en) A kind of infinite length key internet communication encryption method
CN111404664B (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
CN109146524A (en) A kind of agricultural product using block chain technology are traced to the source information security solution
Giri et al. Efficient biometric and password based mutual authentication for consumer USB mass storage devices
CN109379176B (en) Password leakage resistant authentication and key agreement method
CN108881960A (en) The method of intelligent video camera head security control and data confidentiality based on id password
CN110505055A (en) Based on unsymmetrical key pond to and key card outer net access identity authentication method and system
CN111416715A (en) Quantum secret communication identity authentication system and method based on secret sharing
CN107612680A (en) A kind of national secret algorithm in mobile network's payment
CN110224816A (en) Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN115442050A (en) Privacy protection federal learning method based on SM9 algorithm
CN109067529A (en) A kind of production method of block chain private key for user
CN104618113A (en) Method for authenticating identity of mobile terminal and constructing safety channel
CN106230840A (en) A kind of command identifying method of high security
CN110912702B (en) Block chain asset management method based on hidden social relationship
CN110430047B (en) Anti-quantum computing energy-saving equipment key negotiation method and system based on asymmetric key and MQV
Li et al. An improved two-factor user authentication protocol for wireless sensor networks using elliptic curve cryptography
Zhu et al. A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network.
JP2002539489A (en) Voice and data encryption method using encryption key split combiner

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20180907

WW01 Invention patent application withdrawn after publication