CN109067529A - A kind of production method of block chain private key for user - Google Patents

A kind of production method of block chain private key for user Download PDF

Info

Publication number
CN109067529A
CN109067529A CN201811038478.8A CN201811038478A CN109067529A CN 109067529 A CN109067529 A CN 109067529A CN 201811038478 A CN201811038478 A CN 201811038478A CN 109067529 A CN109067529 A CN 109067529A
Authority
CN
China
Prior art keywords
private key
hash value
user
block chain
feature set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811038478.8A
Other languages
Chinese (zh)
Inventor
陈晖�
郑海燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Liangan Block Chain Technology Co Ltd
Original Assignee
Chengdu Liangan Block Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Liangan Block Chain Technology Co Ltd filed Critical Chengdu Liangan Block Chain Technology Co Ltd
Priority to CN201811038478.8A priority Critical patent/CN109067529A/en
Publication of CN109067529A publication Critical patent/CN109067529A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of production methods of block chain private key for user, for solving private key safety problem.The method of the present invention includes the following steps: that (1) selects at least two feature set, calculate separately the hash value of each feature set, (2) hash value of at least two feature set is carried out XOR operation, the hash value for calculating the XOR operation result again, using the hash value of the XOR operation result as private key for user.The present invention utilizes the randomness diffusion of hash algorithm and irreversible feature, the hash value for the parameter that can control using user is as private key, can help the ownership proof for solving the problems, such as private key and private key gives problem for change, helps to solve the problems, such as that private key is anti-lost and antitheft.The present invention can be widely applied to especially have a good application prospect in block chain network using application system of the random number as asymmetric cryptographic algorithm private key.

Description

A kind of production method of block chain private key for user
Technical field
The invention belongs to block chain and its private key security technology area more particularly to a kind of generations of block chain private key for user Method.
Background technique
Block chain is a kind of a kind of chain type number for being sequentially in time combined into data block in such a way that sequence is connected According to structure, and the distributed account book that guarantees to distort in a manner of cryptography and can not forge.In block catenary system, private key is Each user oneself generates and oneself is responsible for the random number of keeping, theoretically without third-party participation, so private key is once It loses, just loses the control to account assets.With current calculation power and technology, from wallet address or public key retrodict private key be can not Capable.Therefore, for block chain user, private key is exactly all.Due to also lacking effective solution, institute at present It is faced with the risk for causing digital asset to lose due to private key is lost or is stolen with the user of block chain especially bit coin, is solved Private key for user safety problem has very important practical significance to the safety for promoting block chain network.
Summary of the invention
For the urgent need and the deficiencies in the prior art of block chain private key for user safety, in order to solve the institute of private key for user It has the right to belong to proof problem and safety problem, the present invention provides a kind of production method of block chain private key for user, feature exists In, include the following steps: (1) select at least two feature set, calculate separately the hash value of each feature set, (2) it is described extremely The hash value of few 2 feature sets carries out XOR operation, then calculates the hash value of the XOR operation result, the XOR operation As a result hash value is as private key for user.
Further, the hash value in above-mentioned steps (1) and step (2) includes being generated using identical hash algorithm Hash value and the hash value generated using different hash algorithm.
Further, the method for each feature set hash value of above-mentioned calculating includes but is not limited to: calculating the feature set In at least two elements hash value, then calculate the exclusive or value of the hash value of at least two element, the exclusive or value made It is characterized the hash value of collection, alternatively, the hash value of the exclusive or value is calculated again, using the hash value of the exclusive or value as feature set Hash value.
Further, the above method further includes output prompt information corresponding with feature set, wherein the prompt information Inside includes but is not limited to the classification and range of individual features collection.
Further, above-mentioned private key includes the private key of the public key algorithm of anti-quantum calculation and the private key of ECC algorithm, wherein The private key of ECC algorithm includes but is not limited to the private key of 256 bits, 384 bits and 512 bits.
Further, the classification of features described above collection includes but is not limited to user biological feature set, the individual privacy of user letter Breath collection, user password collection.
Further, the element of above-mentioned user biological feature set includes but is not limited to fingerprint characteristic, lines of the hand feature, face spy It seeks peace phonetic feature.
Further, the element of the individual privacy information collection of above-mentioned user includes but is not limited to certain names related to user Word, title and Serial No..
Further, above-mentioned hash value includes using national standard and international standard hash algorithm and anti-quantum calculation The output result that hash algorithm obtains.
Compared with prior art, the method for the present invention has following significant novelty: the present invention is random using hash algorithm Property diffusion and irreversible feature, the hash value that can control parameter using user wants as private key meeting private key randomness Customer parameter is rationally introduced under the premise of asking, and can effectively solve the problems, such as that the ownership proof of private key and private key give problem for change, from And realize the safeguard protection of private key for user, i.e., it is anti-lost also to prevent being stolen.The present invention can be widely applied to make using random number For the application system of private key, especially have a good application prospect in block chain network.
Detailed description of the invention
Fig. 1 is the schematic diagram of private key for user production method embodiment one of the invention,
Fig. 2 is the schematic diagram of private key for user production method embodiment two of the invention,
Fig. 3 is the schematic diagram of private key for user production method embodiment three of the invention.
Specific embodiment
To keep technical solution of the present invention and advantage clearer, as a part of the invention, below in conjunction with attached drawing and Specific embodiment, the present invention is described in further detail.
The present invention is suitable for all private keys using random number as asymmetric cryptographic algorithm and generates, and the present invention does not limit specifically The method (for example, public key production method secp256k1 that bit coin can be used) that fixed corresponding public key generates.
Hash value used in the present invention includes using standard hash algorithm (such as MD5, SHA_256 etc.) and anti-quantum The output result that the hash algorithm (such as anti-quantum standard algorithm) of calculating obtains.Multiple Hash used in the method for the present invention Value can be generated using the same hash algorithm, can also be generated using the combination of multiple hash algorithms.
Under normal conditions, a random number is randomly generated as private key in block chain user node, and still, which does not have User characteristics.After private key is stolen, user does not have effective means to control risk;After private key is lost, user also has no idea to give for change. The present invention using the randomness diffusion of hash algorithm and irreversible feature, made by the hash value for the parameter that can control using user For private key, can help the ownership proof for solving the problems, such as private key and private key gives problem for change, help to solve private key it is anti-lost and Antitheft problem.
As a preferred embodiment, private key for user production method embodiment one of the invention is as shown in Figure 1, its step Are as follows: (1) embodiment selects " name of most unforgettable classmate " and " name of most unforgettable teacher " to believe as the individual privacy of user Two elements for ceasing collection, calculate separately the hash value of two elements, then calculate the exclusive or value of the hash value of the two elements, then count The hash value for calculating the exclusive or value, using the hash value of the exclusive or value as the hash value (being denoted as H1) of individual privacy information collection;The reality It applies example and selects element of two different passwords as password set, the hash value of password set is calculated using above-mentioned same method (being denoted as H2);(2) it calculates the hash value of (H1 ⊕ H2) and obtains the private key of user.In order to help user to remember this private key, it is System generates one group of mnemonic word or user using the elemental characteristic of above-mentioned each feature set as mnemonic word.
As another preferred embodiment, private key for user production method embodiment two of the invention as shown in Figure 2 is adopted With multiple hash algorithms promoted private key randomness, the steps include: (1) embodiment selection " name of most unforgettable classmate " and Two elements of " name of most unforgettable teacher " as the individual privacy information collection of user are respectively adopted Hash1 and calculate two members The hash value of element, then the exclusive or value of the hash value of the two elements is calculated, then the hash value of the exclusive or value is calculated using Hash2, Using the hash value of the exclusive or value as the hash value (being denoted as H1) of individual privacy information collection;The embodiment selects two different mouths The element as password set is enabled, Hash2 is respectively adopted and calculates the hash value of two elements, then calculates the hash value of the two elements Exclusive or value, then the hash value of the exclusive or value is calculated using Hash1, using the hash value of the exclusive or value as individual privacy information collection Hash value (being denoted as H2);(2) Hash of (H1 ⊕ H2) is calculated using Hash3 and obtains the private key of user.In order to help user Remember this private key, system generates one group of mnemonic word or user using the elemental characteristic of above-mentioned each feature set as mnemonic word.
Fig. 3 is the private key for user production method embodiment of the invention with lower complexity, the steps include: (1) The embodiment selects " name of most unforgettable classmate " and " name of most unforgettable teacher " as the individual privacy information collection of user Two elements are respectively adopted Hash1 and calculate the hash value of two elements, then calculate the exclusive or value of the hash value of the two elements, Using the exclusive or value as the hash value (being denoted as H1) of individual privacy information collection;The embodiment selects two different passwords as mouth The element for enabling collection is respectively adopted Hash2 and calculates the hash value of two elements, then calculates the exclusive or of the hash value of the two elements Value, using the exclusive or value as the hash value (being denoted as H2) of individual privacy information collection;(2) (H1 ⊕ H2) is calculated using Hash3 Hash and the private key for obtaining user.In order to help user to remember this private key, system generates one group of mnemonic word or user above-mentioned The elemental characteristic of each feature set is as mnemonic word.
For the method in above-described embodiment, by the feature set, the selection feature set that select different number (at least two) Different elements, selection different hash algorithm combination etc., can produce the various embodiments of the method for the present invention.
It should be noted that the method for the present invention can be widely applied to the generation of private key, it is not limited solely to use for block chain The generation of family private key.
Embodiments described above is only a part of the embodiments of the present invention, instead of all the embodiments.This field Those of ordinary skill's obtained other under the premise of not making creative work directly adopt the embodiment of the method for the present invention, all Belong to the scope of protection of the invention.

Claims (9)

1. a kind of production method of block chain private key for user, which comprises the steps of: (1) select at least two feature Collection, calculates separately the hash value of each feature set, and the hash value of at least two feature set is carried out XOR operation by (2), then The hash value for calculating the XOR operation result, using the hash value of the XOR operation result as private key for user.
2. a kind of production method of block chain private key for user according to claim 1, which is characterized in that the step (1) Include the hash value generated using identical hash algorithm with the hash value in step (2) and is produced using different hash algorithm Raw hash value.
3. a kind of production method of block chain private key for user according to claim 1, which is characterized in that the calculating is each The method of a feature set hash value includes: the hash value for calculating at least two elements in the feature set, then calculate it is described at least The exclusive or value of the hash value of two elements, using the exclusive or value as the hash value of feature set, alternatively, calculating the exclusive or value again Hash value, using the hash value of the exclusive or value as the hash value of feature set.
4. a kind of production method of block chain private key for user according to claim 1, which is characterized in that further include output with The corresponding prompt information of feature set, wherein the inside of the prompt information includes the classification and range of individual features collection.
5. a kind of production method of block chain private key for user according to claim 1, which is characterized in that the private key includes The private key of anti-quantum calculation public key algorithm and the private key of ECC algorithm, wherein the private key of ECC algorithm includes 256 bits, 384 bits With the private key of 512 bits.
6. a kind of production method of block chain private key for user according to claim 1, which is characterized in that the feature set Classification includes the individual privacy information collection and user password collection of user biological feature set, user.
7. a kind of production method of block chain private key for user according to claim 6, which is characterized in that the user biological The element of feature set includes fingerprint characteristic, lines of the hand feature, facial characteristics and phonetic feature.
8. a kind of production method of block chain private key for user according to claim 6, which is characterized in that of the user The element of people's privacy information collection includes certain nouns, title and Serial No. related to user.
9. a kind of production method of block chain private key for user according to claim 1, which is characterized in that the hash value packet Include the output result obtained using national standard and international standard hash algorithm and the hash algorithm of anti-quantum calculation.
CN201811038478.8A 2018-09-09 2018-09-09 A kind of production method of block chain private key for user Withdrawn CN109067529A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811038478.8A CN109067529A (en) 2018-09-09 2018-09-09 A kind of production method of block chain private key for user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811038478.8A CN109067529A (en) 2018-09-09 2018-09-09 A kind of production method of block chain private key for user

Publications (1)

Publication Number Publication Date
CN109067529A true CN109067529A (en) 2018-12-21

Family

ID=64760080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811038478.8A Withdrawn CN109067529A (en) 2018-09-09 2018-09-09 A kind of production method of block chain private key for user

Country Status (1)

Country Link
CN (1) CN109067529A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109754242A (en) * 2019-01-11 2019-05-14 北京阿尔山区块链联盟科技有限公司 Memonic symbol generation method, device and electronic equipment
CN110955713A (en) * 2019-11-26 2020-04-03 上海中信信息发展股份有限公司 Mnemonic word generating method and device and storage medium
CN112054907A (en) * 2020-08-25 2020-12-08 武汉大学 Block chain general certificate retrieving method and system when private key is forgotten
CN112671542A (en) * 2020-12-16 2021-04-16 深圳市大中华区块链科技有限公司 Block chain biological voice recognition method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160321654A1 (en) * 2011-04-29 2016-11-03 Stephen Lesavich Method and system for storage and retrieval of blockchain blocks using galois fields
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106302354A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of identity identifying method and device
US20180205558A1 (en) * 2015-01-23 2018-07-19 Daniel Robert Ferrin Method and apparatus for the limitation of the mining of blocks on a block chain
CN108512661A (en) * 2018-04-02 2018-09-07 成都零光量子科技有限公司 A kind of safety protecting method of block chain private key for user

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160321654A1 (en) * 2011-04-29 2016-11-03 Stephen Lesavich Method and system for storage and retrieval of blockchain blocks using galois fields
US20180205558A1 (en) * 2015-01-23 2018-07-19 Daniel Robert Ferrin Method and apparatus for the limitation of the mining of blocks on a block chain
CN106302354A (en) * 2015-06-05 2017-01-04 北京壹人壹本信息科技有限公司 A kind of identity identifying method and device
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN108512661A (en) * 2018-04-02 2018-09-07 成都零光量子科技有限公司 A kind of safety protecting method of block chain private key for user

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109754242A (en) * 2019-01-11 2019-05-14 北京阿尔山区块链联盟科技有限公司 Memonic symbol generation method, device and electronic equipment
CN109754242B (en) * 2019-01-11 2020-07-17 北京阿尔山区块链联盟科技有限公司 Mnemonic generating method and device and electronic equipment
CN110955713A (en) * 2019-11-26 2020-04-03 上海中信信息发展股份有限公司 Mnemonic word generating method and device and storage medium
CN112054907A (en) * 2020-08-25 2020-12-08 武汉大学 Block chain general certificate retrieving method and system when private key is forgotten
CN112054907B (en) * 2020-08-25 2021-10-22 武汉大学 Block chain general certificate retrieving method and system when private key is forgotten
CN112671542A (en) * 2020-12-16 2021-04-16 深圳市大中华区块链科技有限公司 Block chain biological voice recognition method and system

Similar Documents

Publication Publication Date Title
CN105812126B (en) Lightweight backup and the efficient restoration methods of healthy block chain data encryption key
CN109067529A (en) A kind of production method of block chain private key for user
US7219368B2 (en) Robust visual passwords
US6925182B1 (en) Administration and utilization of private keys in a networked environment
Chanda Password security: an analysis of password strengths and vulnerabilities
ES2335642T3 (en) PROCEDURE FOR DATA PROTECTION.
CN107124268A (en) A kind of privacy set common factor computational methods for resisting malicious attack
CN108512661A (en) A kind of safety protecting method of block chain private key for user
WO2013117019A1 (en) Method and device for system login based on dynamic password generated autonomously by user
CN101777158B (en) Method and system for secure transaction
CN109274501A (en) License block chain method for secret protection based on Proxy Signature
CN103490889B (en) A kind of infinite length key internet communication encryption method
CN108959891B (en) Electroencephalogram identity authentication method based on secret sharing
CN114640444B (en) Privacy protection set intersection acquisition method and device based on domestic cryptographic algorithm
CN110505047A (en) A kind of double-encryption algorithm for iris feature protection
US20220014368A1 (en) Rolling biometric key exchange
CN109961276A (en) Digital cash wallet, method of commerce, transaction system and computer storage medium
CN106875325A (en) One kind can search for resume image
CN109903158A (en) The method that transaction amount is in some section is proved using zero knowledge probative agreement
Skariya et al. Enhanced double layer security using RSA over DNA based data encryption system
CN117478330A (en) Three-party privacy set intersection cardinality solving method based on bilinear mapping and bloom filter
CN106357410B (en) A method of subliminal channel is constructed on the lattice signature of not unidirectional trapdoor
CN117353912A (en) Three-party privacy set intersection base number calculation method and system based on bilinear mapping
Zhu et al. A Novel Biometrics-based One-Time Commitment Authenticated Key Agreement Scheme with Privacy Protection for Mobile Network.
Johnson et al. With vaulted voice verification my voice is my key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20181221

WW01 Invention patent application withdrawn after publication