Movatterモバイル変換


[0]ホーム

URL:


CN108418680B - Block chain key recovery method and medium based on secure multi-party computing technology - Google Patents

Block chain key recovery method and medium based on secure multi-party computing technology
Download PDF

Info

Publication number
CN108418680B
CN108418680BCN201710791783.3ACN201710791783ACN108418680BCN 108418680 BCN108418680 BCN 108418680BCN 201710791783 ACN201710791783 ACN 201710791783ACN 108418680 BCN108418680 BCN 108418680B
Authority
CN
China
Prior art keywords
user
key
service provider
management service
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710791783.3A
Other languages
Chinese (zh)
Other versions
CN108418680A (en
Inventor
谢翔
李升林
何德彪
张江
孙立林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Juzix Technology Shenzhen Co ltd
Wuhan University WHU
Original Assignee
Juzix Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Juzix Technology Shenzhen Co ltdfiledCriticalJuzix Technology Shenzhen Co ltd
Priority to CN201710791783.3ApriorityCriticalpatent/CN108418680B/en
Publication of CN108418680ApublicationCriticalpatent/CN108418680A/en
Application grantedgrantedCritical
Publication of CN108418680BpublicationCriticalpatent/CN108418680B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本发明公开了一种基于安全多方计算技术的区块链密钥恢复方法、介质,防止核心节点权限过大,并且使得私钥的备份和恢复更加安全,保护了用户权益。其技术方案为:本发明通过使用安全多方计算技术,进行区块链密钥托管和恢复。通过引入能够和具有法律效力的政府机构联网验证用户身份有效性的第三方代理商,对用户身份进行有效验证及背书。在有效背书的基础上,用户可连同密钥管理服务商对其私钥进行安全协同计算,从而实现用户私钥的加密备份和恢复。本发明能够实现用户身份管理,最小化特权节点的权限,并通过第三方代理的引入,对用户身份进行有效性验证,从而满足节点用户密钥托管的需求。

Figure 201710791783

The invention discloses a block chain key recovery method and medium based on a secure multi-party computing technology, which prevents the core node from being too large, and makes the backup and recovery of the private key more secure, and protects the rights and interests of users. The technical scheme is as follows: the present invention performs blockchain key custody and recovery by using the secure multi-party computing technology. By introducing a third-party agent who can verify the validity of the user's identity online with a legally effective government agency, the user's identity can be effectively verified and endorsed. On the basis of valid endorsement, the user and the key management service provider can perform secure collaborative calculation of their private key, so as to realize the encrypted backup and recovery of the user's private key. The invention can realize user identity management, minimize the authority of privileged nodes, and through the introduction of a third-party agent, can verify the validity of user identity, so as to meet the requirements of node user key custody.

Figure 201710791783

Description

Block chain key recovery method and medium based on secure multi-party computing technology
Technical Field
The present invention relates to a blockchain technology, and in particular, to a method for recovering a blockchain key.
Background
The block chain technology is a bottom layer technology of decentralized distributed account book technology originated from bitcoin, is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, and is cryptographically guaranteed to be non-falsifiable and non-counterfeitable to realize decentralized distributed account book. Nodes are basic units forming a blockchain network, generally, one node corresponds to one computer, and as participants of a blockchain system, the nodes respectively maintain one copy of data, and can play different roles, such as transaction sending, transaction verification, accounting and the like. And the nodes keep the consistency of the backup database data through a consensus algorithm. Each account in the blockchain system consists of an address (public key) and a private key. The user controls the assets in the account by using the private key, which is the data for uniquely proving the identity of the user, and the ownership of the user to the assets of the account is completely determined by the secret key of the account, namely, the core assets of the user can be controlled only by the private key, and the confirmation of the transaction can be realized only through the signature of the private key, so the protection of the private key of the block chain is particularly important. Once the private key is lost, the user's assets or other interests will permanently disappear. Therefore, the blockchain system needs to provide a key backup and recovery service to the user, or an asset transfer service after a password is lost.
In the existing blockchain system, there are four main methods for storing and using the key: platform hosting, local client, e-wallet, and offline cold storage. Of the four methods, only the platform hosting method can back up the private key of the user at the core node, thereby providing the key recovery service. However, the method endows the core node with overlarge rights, cannot meet customer requirements, and the authorized party can actually control the account completely and even can carry out operation against the intention of the authorized party.
Therefore, a perfect blockchain system should design a mechanism: the private key is owned and controlled by the user, but when the risk occurs, the private key can be recovered together with the core node in a way of offline real name or in a way of participation of a national authority.
Disclosure of Invention
The following presents a simplified summary of one or more aspects in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements of all aspects nor delineate the scope of any or all aspects. Its sole purpose is to present some concepts of one or more aspects in a simplified form as a prelude to the more detailed description that is presented later.
The invention aims to solve the problems and provides a block chain key recovery method and a block chain key recovery medium based on a secure multi-party computing technology, which can prevent the core node from having overlarge authority, make the backup and recovery of a private key safer and protect the user rights and interests.
The technical scheme of the invention is as follows: the invention discloses a block chain key recovery method based on a safe multiparty computing technology, which is divided into a key recovery service registration stage and a key recovery service request stage by participation of a user, a third party agent and a key management service provider, wherein:
in the key recovery service registration stage, a user puts forward an authentication application to a third-party agent, the third-party agent verifies the identity of the user through identity verification, and a successful token and a hash value of user biological information are returned after the authentication is passed; the user provides a key backup service application to the key management service provider through the token to request for backing up the private key, the key management service provider inquires the validity of the user token from the third-party agent, and if the validity passes, the private key is backed up;
in the key recovery service request stage, when a user finds that own private key is lost, firstly, the user submits an authentication application to a third-party agent, the third-party agent verifies the identity of the user through identity verification, and a successful token and a hash value of user biological information are returned after the authentication is passed; the user provides a key recovery service application to the key management service provider through the token to request for recovering the private key, the key management service provider inquires the validity of the user token for the third-party agent, if the validity of the user token passes the validity, the random number of the user is found, the random number and the hash value of the user biological information are subjected to cooperative calculation to decrypt the ciphertext, and the user private key obtained after decryption is returned to the user.
According to an embodiment of the block chain key recovery method based on the secure multi-party computing technology, the step of backing up the private key at the key recovery service registration stage includes: and the key management service provider generates a random number for the user, performs cooperative calculation on the random number and the hash value of the user biological information to encrypt a user private key to generate a ciphertext, and issues the ciphertext subjected to the cooperative calculation to the block chain.
According to an embodiment of the block chain key recovery method based on the secure multi-party computing technology, the step of backing up the private key at the key recovery service registration stage includes: the user generates a random number, the private key is encrypted locally by using the random number and the hash value of the biological information of the user to form a ciphertext, the ciphertext is issued to a block chain, the user encrypts the random number by using a public key of a key management service provider and then sends the encrypted random number to the key management service provider, and the key management service provider decrypts the encrypted random number and then stores the decrypted random number.
According to one embodiment of the block chain key recovery method based on the secure multi-party computing technology, the third-party agent verifies the identity of the user through authentication by networking with an authentication mechanism and calling an interface to verify the identity of the user.
According to an embodiment of the blockchain key recovery method based on secure multiparty computing technology of the present invention, the authentication authority is a legally effective government authority.
The invention also discloses a computer readable medium, comprising a computer program stored on the medium, wherein the computer program is used for executing the following block chain key recovery method based on the secure multiparty computing technology, and the method is participated by a user, a third party agent and a key management service provider and comprises a key recovery service registration stage and a key recovery service request stage, wherein:
in the key recovery service registration stage, a user puts forward an authentication application to a third-party agent, the third-party agent verifies the identity of the user through identity verification, and a successful token and a hash value of user biological information are returned after the authentication is passed; the user provides a key backup service application to the key management service provider through the token to request for backing up the private key, the key management service provider inquires the validity of the user token from the third-party agent, and if the validity passes, the private key is backed up;
in the key recovery service request stage, when a user finds that own private key is lost, firstly, the user submits an authentication application to a third-party agent, the third-party agent verifies the identity of the user through identity verification, and a successful token and a hash value of user biological information are returned after the authentication is passed; the user provides a key recovery service application to the key management service provider through the token to request for recovering the private key, the key management service provider inquires the validity of the user token for the third-party agent, if the validity of the user token passes the validity, the random number of the user is found, the random number and the hash value of the user biological information are subjected to cooperative calculation to decrypt the ciphertext, and the user private key obtained after decryption is returned to the user.
According to an embodiment of the computer readable medium of the present invention, the step of backing up the private key during the key recovery service registration phase when the method is performed comprises: and the key management service provider generates a random number for the user, performs cooperative calculation on the random number and the hash value of the user biological information to encrypt a user private key to generate a ciphertext, and issues the ciphertext subjected to the cooperative calculation to the block chain.
According to an embodiment of the computer readable medium of the present invention, the step of backing up the private key during the key recovery service registration phase when the method is performed comprises: the user generates a random number, the private key is encrypted locally by using the random number and the hash value of the biological information of the user to form a ciphertext, the ciphertext is issued to a block chain, the user encrypts the random number by using a public key of a key management service provider and then sends the encrypted random number to the key management service provider, and the key management service provider decrypts the encrypted random number and then stores the decrypted random number.
According to one embodiment of the computer-readable medium of the present invention, the third party agent verifies the identity of the user by authenticating the third party agent by networking with an authentication mechanism that invokes an interface to verify the identity of the user.
According to one embodiment of the computer-readable medium of the present invention, the authentication authority is a legally effective governmental agency.
Compared with the prior art, the invention has the following beneficial effects: the present invention performs blockchain key escrow and recovery by using secure multi-party computing (multi-party computing) techniques. The user identity is effectively verified and endorsed by introducing a third party agent capable of verifying the validity of the user identity in a networked manner with a legally effective government agency. On the basis of effective endorsement, the user and the key management service provider can perform safe collaborative calculation on the private key of the user, so that the encrypted backup and recovery of the private key of the user are realized. The invention can realize user identity management, minimize the authority of privileged nodes, and carry out validity verification on the user identity through the introduction of a third-party agent, thereby meeting the requirement of node user key escrow.
Compared with the existing privacy protection method, the method can realize that:
1) the user does not need to completely backup the private key to the key management service provider, so that the user can be prevented from recovering the key with too large authority.
2) And introducing qualified third-party agents, and verifying and endorseing the validity of the user identity through networking with an authority.
3) The introduction of the secure multi-party computing technology enables a user not to need to completely backup the private key to a key management service provider, minimizes the authority of the service provider, enables the backup and recovery of the private key to be safer, and protects the rights and interests of the user.
Drawings
The above features and advantages of the present disclosure will be better understood upon reading the detailed description of embodiments of the disclosure in conjunction with the following drawings. In the drawings, components are not necessarily drawn to scale, and components having similar relative characteristics or features may have the same or similar reference numerals.
Fig. 1 shows a flow chart of a registration phase of a first embodiment of the blockchain key recovery method based on secure multi-party computing technology of the present invention.
Fig. 2 shows a flow chart of a registration phase of a second embodiment of the blockchain key recovery method based on secure multi-party computing technology of the present invention.
Fig. 3 shows a recovery phase flow diagram of an embodiment of the block chain key recovery method based on the secure multi-party computing technology of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and specific embodiments. It is noted that the aspects described below in connection with the figures and the specific embodiments are only exemplary and should not be construed as imposing any limitation on the scope of the present invention.
Traditional centralized mechanisms, such as banks, can use means such as real-name authentication, and if a U shield representing the identity of a user is lost or a password is forgotten, a new U shield (private key) can be bound by the system through account verification. The freezing and recovery of the related account assets are realized, and the digital assets can be recovered to a certain extent. And presenting a logical binding relationship between the account and the private key, and operating by a centralized bank under the condition of meeting the wind control requirement.
In order to solve the technical problem provided by the invention, the invention refers to the idea of real-name authentication of the traditional centralized organization, and the block chain key recovery needs to be realized based on safe multi-party calculation. The secure multi-party computation (multi-party computation) is the core field of the cryptology research, can provide multi-party collaborative computing capability of original data without being collected for a data demand party, and provides an integral data portrait after data computation of each party for the demand party, so that the analysis, processing and result release of the data can be completed on the premise that the data does not leave respective nodes, and the consistency guarantee of data access authority control and data exchange is provided, thereby realizing the effective supervision of a block chain system.
On the basis of carrying out key recovery service on a user of a block chain system by utilizing a safe multiparty computing technology, a qualified third-party agent is introduced, the third-party agent is networked with a government organization with legal effectiveness to realize the authentication of the user identity, the user and the transaction can be effectively supervised, after the user passes the authentication of the agent, the user carries out safe cooperative computing encryption and decryption on the user private key together with a key management service provider, and the encrypted ciphertext is stored in a chain, so that the encrypted backup and recovery of the user private key are realized.
The block chain key recovery method based on the safe multi-party computing technology comprises two stages: the key recovery service registration phase shown in fig. 1 or fig. 2 corresponds to two optional key recovery service registration modes, respectively, and the key recovery service request phase shown in fig. 3. While the system participates in key recovery: a (generic) user, a third party agent, a key management facilitator. Preferably, there may be an authentication authority, representing a legally effective government agency, such as the public security bureau, as a fourth party.
In the key recovery service registration phase, a user puts forward an authentication application to a third-party agent, the third-party agent verifies the identity of the user through authentication (wherein the third-party agent verifies the identity of the user through authentication, the third-party agent is networked with an authentication mechanism such as a public security bureau, and an interface is called to verify the identity of the user), and a successful token (token) and a hash value of the biological information of the user are returned after the authentication is passed; the user provides a key backup service application to the key management service provider through the token (token) to request for backing up the private key, the key management service provider inquires the validity of the user token (token) to the third-party agent, if the key backup service application passes through the token (token), two optional methods are provided for backing up the key: the first optional method is that the service provider generates a random number for the user, performs cooperative calculation on the random number and the hash value of the user biological information to encrypt a user private key to generate a ciphertext, and issues the ciphertext after the cooperative calculation to a block chain; the second alternative method is that the random number is generated by the user, then the private key of the user is encrypted locally by using the random number and the hash value of the biological information of the user to generate a ciphertext, and the ciphertext is issued to the block chain. And finally, the user encrypts the random number by using the public key of the key management service provider and then sends the random number to the key management service provider, and the key management service provider decrypts the random number and then stores the decrypted random number.
Referring to fig. 1, a more detailed flow of the key recovery service registration phase corresponding to the first mode of key backup is shown, and a process of the key recovery service registration phase is described below with respect to fig. 1 in steps. The reference numerals in the following description correspond to those in fig. 1.
1. The user presents the identity ID and user biometric information (including face, fingerprint, iris, etc.), requesting authentication services from the (third party) agent.
2. The agent invokes a biometric interface networked with the legally effective government agency to transmit the user ID and the biometric information to the government agency.
3. And the government agency verifies whether the user identity ID information is matched with the biological information, if so, returns the agent 'yes', and otherwise, returns the agent 'no'.
4. The agent generates a user token (token) pair: (token: yes/no).
5. The agent recalls an interface networked with the legally effective government agency and sends the user ID and biometric information to the government agency.
6. And the government agency reviews the matching information and returns the user biological information feature (ID) associated with the agent and the identity ID.
7. The agent sends the hash values of token and feature obtained from the legal authority to the user: (token: yes/no, h (feature)), where h (feature) represents the hash value of feature.
8. The user generates a public-private key pair (sk1, pk 1).
9. And the user sends the generated token and the identity ID to a key management service provider to request the key management service provider to perform key backup service.
10. The key management service provider sends the user token to the agent to request to verify the validity of the token.
11. The agent inquires the local user token library, and sends the information whether the user token is valid to the key management service provider: (yes/no).
12. If the returned information is yes, the key management service provider generates a user random number, and the user random number is recorded as (ID: r).
13. The user and the key management service provider use an MPC cooperative calculation method to symmetrically encrypt the user private key sk1 by using the hash value of the user biological information feature and the random number r to obtain a ciphertext C, and the calculation formula is as follows:
Figure GDA0003154285150000071
14. and the key management service provider synchronizes the ciphertext C to the block chain, and the user is successfully registered.
For a more detailed flow of the key recovery service registration phase corresponding to the second way of key backup, please refer to fig. 2, and the following describes the process of the key recovery service registration phase with respect to fig. 2 in steps. The reference numerals in the following description correspond to those in fig. 2.
1. The user presents the identity ID and user biometric information (including face, fingerprint, iris, etc.), requesting authentication services from the (third party) agent.
2. The agent invokes a biometric interface networked with the legally effective government agency to transmit the user ID and the biometric information to the government agency.
3. And the government agency verifies whether the user identity ID information is matched with the biological information, if so, returns the agent 'yes', and otherwise, returns the agent 'no'.
4. The agent generates a user token (token) pair: (token: yes/no).
5. The agent recalls an interface networked with the legally effective government agency and sends the user ID and biometric information to the government agency.
6. And the government agency reviews the matching information and returns the user biological information feature (ID) associated with the agent and the identity ID.
7. The agent sends the hash values of token and feature obtained from the legal authority to the user: (token: yes/no, h (feature)), where h (feature) represents the hash value of feature.
8. The user generates a public-private key pair (sk1, pk 1).
9. The user generates a random number r, then encrypts a private key sk1 by using the random number r and the hash value of the user biological information feature to obtain a ciphertext C, and issues the ciphertext to a block chain, wherein the calculation formula is as follows:
Figure GDA0003154285150000081
10. the user encrypts the random number r by using the public key of the key management service provider to obtain a ciphertext Cr of r.
11. And the user sends the generated token and the identity ID to a key management service provider to request the key management service provider to perform random number backup service.
12. The key management service provider sends the user token to the agent to request to verify the validity of the token.
13. The agent inquires the local user token library, and sends the information whether the user token is valid to the key management service provider: (yes/no).
14. If the returned information is yes, the key management service provider allows receiving the ciphertext Cr of the user random number.
15. The user transmits a random number cipher text Cr.
16. And the key management service provider decrypts the ciphertext Cr by using the private key of the ciphertext Cr to obtain r, and stores the r, so that the user is successfully registered.
In a key recovery service request phase, when a user finds that own private key is lost, firstly, the user puts forward an authentication application to a third-party agent, the third-party agent verifies the identity of the user through authentication (wherein the third-party agent verifies the identity of the user through authentication, the third-party agent is networked with an authentication mechanism such as a public security bureau, and an interface is called to verify the identity of the user), and a successful token (token) and a hash value of user biological information are returned after the authentication is passed; the user provides a key recovery service application to the key management service provider through the token (token) to request for recovering the private key, the key management service provider inquires the validity of the user token (token) to the third-party agent, if the user token (token) passes the validity, the random number of the user is found, the random number and the hash value of the user biological information are subjected to cooperative calculation to decrypt the ciphertext, and the user private key obtained after decryption is returned to the user.
Referring to fig. 3, a more specific flow chart is shown, and a process of the key recovery service request phase is described below with respect to fig. 3. The reference numerals in the following description correspond to those in fig. 3.
1. The user presents the identity ID and biometric information and requests an authentication service from the agent.
2. The agent invokes a biometric interface networked with the legally effective government agency to transmit the user ID and the biometric information to the government agency.
3. And the government agency verifies whether the user identity ID information is matched with the biological information, if so, returns the agent 'yes', and otherwise, returns the agent 'no'.
4. The agent generates a user token (token) pair: (token: yes/no).
5. The agent recalls and legally enforces a government agency networking interface to send the user ID and biometric information to the government agency.
6. And (3) the government organization audits the matching information and returns the user biological information feature associated with the agent and the identity ID: (ID: feature), corresponding to the same ID, the user feature returned by the government agency is consistent with the registration stage.
7. The agent sends the hash values of token and feature obtained from the government agency to the user: (token: yes/no, h (feature)), where h (feature) represents the hash value of feature.
8. And the user sends the generated token and the identity ID to a key management service provider to request the key management service provider to perform key recovery service.
9. The key management service provider sends the user token to the agent to request to verify the validity of the token.
10. The agent inquires the local user token library, and sends the information whether the user token is valid to the key management service provider: (yes/no).
11. If the returned information is yes, the key management service provider finds the user random number r through the user identity ID, and retrieves the private key ciphertext C from the chain.
12. The user and the key management service provider use an MPC cooperative calculation method to symmetrically decrypt the user private key ciphertext C by using the hash value of the user biological information feature and the random number r to obtain a user private key sk1, wherein the calculation formula is as follows:
Figure GDA0003154285150000101
13. the key management facilitator returns sk1 to the user, and the user successfully recovers the key.
Furthermore, another subject of the present invention is a computer readable medium comprising a computer program stored on the medium for executing the block chain key recovery method based on secure multi-party computing technique described in the foregoing embodiments. Since the method steps are the same as in the previous embodiment, they are not described again here.
While, for purposes of simplicity of explanation, the methodologies are shown and described as a series of acts, it is to be understood and appreciated that the methodologies are not limited by the order of acts, as some acts may, in accordance with one or more embodiments, occur in different orders and/or concurrently with other acts from that shown and described herein or not shown and described herein, as would be understood by one skilled in the art.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary embodiments, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software as a computer program product, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a web site, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk (disk) and disc (disc), as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks (disks) usually reproduce data magnetically, while discs (discs) reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the spirit or scope of the disclosure. Thus, the disclosure is not intended to be limited to the examples and designs described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (6)

Translated fromChinese
1.一种基于安全多方计算技术的区块链密钥恢复方法,其特征在于,由用户、第三方代理商、密钥管理服务商参与,分为密钥恢复服务注册阶段和密钥恢复服务请求阶段,其中:1. a block chain key recovery method based on secure multi-party computing technology, is characterized in that, by user, third-party agent, key management service provider to participate, be divided into key recovery service registration stage and key recovery service The request phase, where:在密钥恢复服务注册阶段,用户向第三方代理商提出认证申请,第三方代理商通过身份验证以核实用户身份,认证通过后返回成功的令牌以及用户生物信息的哈希值;用户通过令牌向密钥管理服务商提出密钥备份服务申请,请求备份私钥,密钥管理服务商向第三方代理商查询用户令牌的有效性,如通过则备份私钥;In the key recovery service registration stage, the user submits an authentication application to the third-party agent, the third-party agent verifies the user's identity through identity verification, and returns a successful token and the hash value of the user's biometric information after the authentication is passed; The card applies to the key management service provider for key backup service, requesting to back up the private key, and the key management service provider queries the third-party agent for the validity of the user token, and if it passes, the private key is backed up;在密钥恢复服务请求阶段,当用户发现自己的私钥丢失时,首先用户向第三方代理商提出认证申请,第三方代理商通过身份验证以核实用户身份,认证通过后返回成功的令牌以及用户生物信息的哈希值;用户通过令牌向密钥管理服务商提出密钥恢复服务申请以请求恢复私钥,密钥管理服务商向第三方代理商查询用户令牌的有效性,如通过则找到用户随机数,用户和密钥管理服务商利用MPC协同计算方法,使用用户生物信息的哈希值和随机数对用户私钥密文进行对称解密得到用户私钥,密钥管理服务商将解密后得到的用户私钥返回给用户,用户恢复密钥成功;In the key recovery service request stage, when the user finds that his private key is lost, the user first submits an authentication application to the third-party agent, and the third-party agent verifies the user's identity through authentication, and returns a successful token and The hash value of the user's biometric information; the user submits a key recovery service application to the key management service provider through the token to request the recovery of the private key, and the key management service provider queries the third-party agent for the validity of the user's token, such as by Then find the random number of the user, the user and the key management service provider use the MPC collaborative calculation method, use the hash value and random number of the user's biometric information to symmetrically decrypt the ciphertext of the user's private key to obtain the user's private key, and the key management service provider will The user private key obtained after decryption is returned to the user, and the user recovers the key successfully;其中,在密钥恢复服务注册阶段备份私钥的步骤包括:Wherein, the steps of backing up the private key in the key recovery service registration stage include:密钥管理服务商为用户生成随机数,用户和密钥管理服务商利用MPC协同计算方法,使用用户生物信息的哈希值和随机数对用户私钥进行对称加密生成密文,并将协同计算后的密文发布到区块链上;或者,The key management service provider generates a random number for the user. The user and the key management service provider use the MPC collaborative calculation method to encrypt the user's private key symmetrically using the hash value and random number of the user's biometric information to generate a ciphertext, which will be calculated collaboratively. The ciphertext is published on the blockchain; or,用户自己生成随机数,本地使用随机数和用户生物信息的哈希值对私钥进行加密形成密文,把密文发布到区块链上,用户用密钥管理服务商的公钥将随机数加密后发送给密钥管理服务商,密钥管理服务商将其解密后保存。The user generates a random number by himself, encrypts the private key locally with the random number and the hash value of the user's biometric information to form a ciphertext, publishes the ciphertext on the blockchain, and the user uses the public key of the key management service provider to encrypt the random number. After encryption, it is sent to the key management service provider, and the key management service provider decrypts it and saves it.2.根据权利要求1所述的基于安全多方计算技术的区块链密钥恢复方法,其特征在于,第三方代理商通过身份验证以核实用户身份是通过和身份验证机构联网,调用接口来核实用户身份。2. the block chain key recovery method based on secure multi-party computing technology according to claim 1, is characterized in that, the third-party agent is through identity verification to verify the user identity by networking with the identity verification agency, and calling the interface to verify user ID.3.根据权利要求2所述的基于安全多方计算技术的区块链密钥恢复方法,其特征在于,身份验证机构为具有法律效力的政府机构。3. The blockchain key recovery method based on secure multi-party computing technology according to claim 2, wherein the identity verification agency is a legally effective government agency.4.一种计算机可读介质,其特征在于,包括介质上存储的计算机程序,所述计算机程序被处理器执行以用于执行以下的基于安全多方计算技术的区块链密钥恢复方法,由用户、第三方代理商、密钥管理服务商参与,分为密钥恢复服务注册阶段和密钥恢复服务请求阶段,其中:4. A computer-readable medium, characterized in that it comprises a computer program stored on the medium, the computer program being executed by a processor for executing the following block chain key recovery method based on secure multi-party computing technology, consisting of: The participation of users, third-party agents, and key management service providers is divided into the key recovery service registration stage and the key recovery service request stage, in which:在密钥恢复服务注册阶段,用户向第三方代理商提出认证申请,第三方代理商通过身份验证以核实用户身份,认证通过后返回成功的令牌以及用户生物信息的哈希值;用户通过令牌向密钥管理服务商提出密钥备份服务申请,请求备份私钥,密钥管理服务商向第三方代理商查询用户令牌的有效性,如通过则备份私钥;In the key recovery service registration stage, the user submits an authentication application to the third-party agent, the third-party agent verifies the user's identity through identity verification, and returns a successful token and the hash value of the user's biometric information after the authentication is passed; The card applies to the key management service provider for key backup service, requesting to back up the private key, and the key management service provider queries the third-party agent for the validity of the user token, and if it passes, the private key is backed up;在密钥恢复服务请求阶段,当用户发现自己的私钥丢失时,首先用户向第三方代理商提出认证申请,第三方代理商通过身份验证以核实用户身份,认证通过后返回成功的令牌以及用户生物信息的哈希值;用户通过令牌向密钥管理服务商提出密钥恢复服务申请以请求恢复私钥,密钥管理服务商向第三方代理商查询用户令牌的有效性,如通过则找到用户随机数,用户和密钥管理服务商利用MPC协同计算方法,使用用户生物信息的哈希值和随机数对用户私钥密文进行对称解密得到用户私钥,密钥管理服务商将解密后得到的用户私钥返回给用户,用户恢复密钥成功;In the key recovery service request stage, when the user finds that his private key is lost, the user first submits an authentication application to the third-party agent, and the third-party agent verifies the user's identity through authentication, and returns a successful token and The hash value of the user's biometric information; the user submits a key recovery service application to the key management service provider through the token to request the recovery of the private key, and the key management service provider queries the third-party agent for the validity of the user's token, such as by Then find the random number of the user, the user and the key management service provider use the MPC collaborative calculation method, use the hash value and random number of the user's biometric information to symmetrically decrypt the ciphertext of the user's private key to obtain the user's private key, and the key management service provider will The user private key obtained after decryption is returned to the user, and the user recovers the key successfully;其中,在方法被执行的在密钥恢复服务注册阶段备份私钥的步骤包括:Wherein, the step of backing up the private key in the key recovery service registration stage performed in the method includes:密钥管理服务商为用户生成随机数,用户和密钥管理服务商利用MPC协同计算方法,使用用户生物信息的哈希值和随机数对用户私钥进行对称加密生成密文,并将协同计算后的密文发布到区块链上;或者,The key management service provider generates a random number for the user. The user and the key management service provider use the MPC collaborative calculation method to encrypt the user's private key symmetrically using the hash value and random number of the user's biometric information to generate a ciphertext, which will be calculated collaboratively. The ciphertext is published on the blockchain; or,用户自己生成随机数,本地使用随机数和用户生物信息的哈希值对私钥进行加密形成密文,把密文发布到区块链上,用户用密钥管理服务商的公钥将随机数加密后发送给密钥管理服务商,密钥管理服务商将其解密后保存。The user generates a random number by himself, encrypts the private key locally with the random number and the hash value of the user's biometric information to form a ciphertext, publishes the ciphertext on the blockchain, and the user uses the public key of the key management service provider to encrypt the random number. After encryption, it is sent to the key management service provider, and the key management service provider decrypts it and saves it.5.根据权利要求4所述的计算机可读介质,其特征在于,第三方代理商通过身份验证以核实用户身份是通过和身份验证机构联网,调用接口来核实用户身份。5 . The computer-readable medium of claim 4 , wherein the third-party agent verifies the user's identity through identity verification by connecting to the identity verification agency and invoking an interface to verify the user's identity. 6 .6.根据权利要求5所述的计算机可读介质,其特征在于,身份验证机构是具有法律效力的政府机构。6. The computer-readable medium of claim 5, wherein the identity verification agency is a legally binding government agency.
CN201710791783.3A2017-09-052017-09-05Block chain key recovery method and medium based on secure multi-party computing technologyActiveCN108418680B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201710791783.3ACN108418680B (en)2017-09-052017-09-05Block chain key recovery method and medium based on secure multi-party computing technology

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201710791783.3ACN108418680B (en)2017-09-052017-09-05Block chain key recovery method and medium based on secure multi-party computing technology

Publications (2)

Publication NumberPublication Date
CN108418680A CN108418680A (en)2018-08-17
CN108418680Btrue CN108418680B (en)2021-12-07

Family

ID=63125135

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201710791783.3AActiveCN108418680B (en)2017-09-052017-09-05Block chain key recovery method and medium based on secure multi-party computing technology

Country Status (1)

CountryLink
CN (1)CN108418680B (en)

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109068322B (en)*2018-08-222022-03-04航天信息股份有限公司Decryption method, system, mobile terminal, server and storage medium
CN109246208B (en)*2018-08-292020-12-29杭州秘猿科技有限公司Decentralized application account recovery method, device and system
US11212093B2 (en)*2018-09-142021-12-28Htc CorporationMethod of social key recovery and related device
CN109559803A (en)*2018-09-172019-04-02深圳市天达国际商业咨询有限公司A kind of medical platform based on block chain
US10250394B1 (en)*2018-09-202019-04-02Accenture Global Solutions LimitedCryptologic self-executing blockchain export commitment
CN109272317A (en)*2018-09-272019-01-25北京金山安全软件有限公司Block chain private key obtaining method and device and electronic equipment
CN109639632B (en)*2018-11-022021-06-22远光软件股份有限公司User information management method based on block chain, electronic equipment and storage medium
CN109617677A (en)*2018-11-202019-04-12深圳壹账通智能科技有限公司Code key based on symmetric cryptography loses method for retrieving and relevant device
CN109582737A (en)*2018-11-302019-04-05北京八分量信息科技有限公司A kind of battery data management system and method based on multi-party computations
CN109474424B (en)*2018-12-172020-08-18江苏恒宝智能系统技术有限公司Block chain account key backup and recovery method and system
CN109379189B (en)*2018-12-172022-05-20江苏恒宝智能系统技术有限公司Block chain account key backup and recovery method, device, terminal and system
CN109547203A (en)*2018-12-252019-03-29深圳市安信认证系统有限公司A kind of backup method of private key, back-up device and terminal device
CN111385084A (en)*2018-12-272020-07-07中国电信股份有限公司Key management method and device for digital assets and computer readable storage medium
CN111435394B (en)2019-01-152021-05-14创新先进技术有限公司Safety calculation method and device based on FPGA hardware
CN109660346B (en)*2019-01-162021-09-17中钞信用卡产业发展有限公司杭州区块链技术研究院Information hosting method, device, equipment and computer storage medium
CN109714165B (en)*2019-02-282021-12-07矩阵元技术(深圳)有限公司Key management method for client to generate key components respectively and electronic equipment
CN110009352B (en)*2019-03-292021-02-05创新先进技术有限公司Method and apparatus for resetting blockchain account key based on biometrics
WO2020211075A1 (en)*2019-04-192020-10-22云图有限公司Decentralized secure multi-party data processing method and device, and storage medium
CN110163604B (en)*2019-04-292021-02-09华中科技大学 A blockchain asset transfer method based on multi-party verification
CN110278078B (en)*2019-06-172022-03-22矩阵元技术(深圳)有限公司Data processing method, device and system
CN110363528B (en)*2019-06-272022-06-24矩阵元技术(深圳)有限公司Collaborative address generation method, collaborative address generation device, transaction signature method, transaction signature device and storage medium
CN110414272A (en)*2019-08-082019-11-05北京芯际科技有限公司A kind of block chain method for secret protection calculated based on Secure
CN110493007B (en)*2019-09-062021-07-13腾讯科技(深圳)有限公司Block chain based information verification method, device, equipment and storage medium
CN110781140B (en)*2019-09-062023-08-18平安科技(深圳)有限公司Method, device, computer equipment and storage medium for signing data in blockchain
CN110851857B (en)2019-10-142022-07-01上海唯链信息科技有限公司 A method and device for realizing identity endorsement on blockchain
CN110912702B (en)*2019-10-252022-05-10趣派(海南)信息科技有限公司Block chain asset management method based on hidden social relationship
CN111311465A (en)*2020-01-212020-06-19山东爱城市网信息技术有限公司 Incentive methods, equipment and media for citizen participation in urban governance based on blockchain
CN111294205A (en)*2020-02-242020-06-16联想(北京)有限公司Key management method and device, computer system and readable storage medium
CN111311413B (en)*2020-02-252023-08-29百度在线网络技术(北京)有限公司Method, device, equipment and medium for monitoring resource circulation of block chain
CN111538781B (en)*2020-04-132023-01-13深圳创客区块链技术有限公司Block chain cross-chain key secure access method, device and storage medium
CN111639361B (en)*2020-05-152023-06-20中国科学院信息工程研究所 A block chain key management method, multi-person co-signature method and electronic device
CN112054907B (en)*2020-08-252021-10-22武汉大学 A method and system for retrieving blockchain certificate when private key is forgotten
CN112463454B (en)*2020-12-042021-11-05北京深思数盾科技股份有限公司Data recovery method, server, terminal device and storage medium
CN114827175B (en)*2021-01-182023-08-22成都质数斯达克科技有限公司Registration method, electronic device, and readable storage medium
CN114006741A (en)*2021-10-272022-02-01杭州弦冰科技有限公司Method and system for realizing cluster security deployment of Intel SGX trusted service
CN114221762A (en)*2021-12-132022-03-22深圳壹账通智能科技有限公司Private key storage method, private key reading method, private key management device, private key management equipment and private key storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101567780A (en)*2009-03-202009-10-28武汉理工大学Key management and recovery method for encrypted digital certificate
CN103095452A (en)*2011-11-012013-05-08刘海云Random encryption method needing to adopt exhaustion method for deciphering
CN105681301A (en)*2016-01-162016-06-15杭州复杂美科技有限公司Settlement method on block chain
CN105978855A (en)*2016-04-182016-09-28南开大学System and method for protecting personal information security in real-name system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN100490372C (en)*2005-03-152009-05-20联想(北京)有限公司A method for backup and recovery of encryption key
CN102523086B (en)*2011-12-072014-12-24上海交通大学Key recovery method in privacy protection cloud storage system
US11210663B2 (en)*2015-11-302021-12-28Shapeshift AgDigital asset zero-custody switch
US9954684B2 (en)*2016-02-292018-04-24PreVeil LLCSecure sharing
CN106548345B (en)*2016-12-072020-08-21北京信任度科技有限公司Method and system for realizing block chain private key protection based on key partitioning

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101567780A (en)*2009-03-202009-10-28武汉理工大学Key management and recovery method for encrypted digital certificate
CN103095452A (en)*2011-11-012013-05-08刘海云Random encryption method needing to adopt exhaustion method for deciphering
CN105681301A (en)*2016-01-162016-06-15杭州复杂美科技有限公司Settlement method on block chain
CN105978855A (en)*2016-04-182016-09-28南开大学System and method for protecting personal information security in real-name system

Also Published As

Publication numberPublication date
CN108418680A (en)2018-08-17

Similar Documents

PublicationPublication DateTitle
CN108418680B (en)Block chain key recovery method and medium based on secure multi-party computing technology
US11025435B2 (en)System and method for blockchain-based cross-entity authentication
CN114600419B (en) Crypto asset custody system with proof-of-stake blockchain support
US10673626B2 (en)Threshold secret share authentication proof and secure blockchain voting with hardware security modules
US12088568B2 (en)Systems and methods for secure key service
CN109377198B (en)Signing system based on multi-party consensus of alliance chain
KR102801145B1 (en) How to implement blockchain to control and distribute digital content
CN107528688B (en) A blockchain key storage and recovery method and device based on encryption entrustment technology
US20210075589A1 (en)System and method for blockchain-based cross-entity authentication
CN114172735A (en) Dual-chain hybrid blockchain data sharing method and system based on smart contract
JP2021512569A (en) Blockchain data processing method, management side, client side, converter and medium
US12014361B2 (en)Systems and methods for improved hot wallet security
CN109450843B (en) A blockchain-based SSL certificate management method and system
US20100275015A1 (en)Anonymous register system and method thereof
JP7543549B2 (en) Method for secure, traceable, and privacy-preserving digital currency transfers with anonymity revocation on a distributed ledger
CN115913513B (en) Distributed trusted data transaction method, system and device supporting privacy protection
WO2018088475A1 (en)Electronic authentication method and program
US20240348592A1 (en)Apparatus and method for managing credentials
CN111541731B (en)Electronic file access control method based on block chain and knowledge range encryption
CN115396096B (en) Encryption and decryption method and protection system for secret files based on national secret algorithm
CN116089968A (en) A scientific data sharing method and system based on blockchain technology
KR102475434B1 (en)Security method and system for crypto currency
CN113656829A (en)Medical data security sharing method based on lattice code and alliance chain
TWI766171B (en) Account data processing method and account data processing system
CN115361147A (en)Device registration method and device, computer device and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
TR01Transfer of patent right

Effective date of registration:20230420

Address after:518054 201, building a, No.1 Qianwan 1st Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen City, Guangdong Province

Patentee after:JUZIX TECHNOLOGY (SHENZHEN) Co.,Ltd.

Patentee after:WUHAN University

Address before:Building 201, Building A, No.1 Qianwan 1st Road, Qianhai Shenzhen Hong Kong Cooperation Zone, Shenzhen City, Guangdong Province, 518054

Patentee before:JUZIX TECHNOLOGY (SHENZHEN) Co.,Ltd.

TR01Transfer of patent right

[8]ページ先頭

©2009-2025 Movatter.jp