Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A method for protecting the private key of encrypted currency

A technology of currency and encryption, applied in the field of protection of private keys of cryptocurrency, can solve the problems of lack of private key protection methods and loss emergency protection methods, affecting deflation, and cannot be retrieved, so as to reduce risks, improve security, and protect effect of rights

Active Publication Date: 2022-03-11
CHINA UNIV OF GEOSCIENCES (WUHAN)
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Cryptocurrency is the core technology in the current Internet financial field. The core element of digital cryptocurrency circulation such as Bitcoin, Ethereum, Hyperledger and IOTA coin is the user's password private key. Owning the user's private key means that you can obtain the use of the cryptocurrency At present, common cryptocurrencies generally verify transactions through private keys. The loss of private keys directly causes the loss of cryptocurrencies and affects deflation. At present, there is still a lack of effective private key protection methods and emergency protection methods for loss. If the key is lost, the password is lost and cannot be retrieved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for protecting the private key of encrypted currency
  • A method for protecting the private key of encrypted currency
  • A method for protecting the private key of encrypted currency

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0021] Please refer to figure 1 , the embodiment of the present invention provides a kind of protection method of cryptocurrency private key, it is characterized in that, comprises the following steps:

[0022] S1 preprocesses the encrypted currency private key K to obtain the key data stream M;

[0023] S2 Determine the number n of storage media, secretly select a prime number p and t number a j , openly choose n different numbers x i , where p>n, 1≤j≤t, 1≤t

[0024]

[0025] Calculate n key units y i , the n key units y i respectively distributed to n different storage media, and the key unit y i The corresponding storage medium is marked with a serial number i;

[0026] S3 obtains any t+1 storage medium, and re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for protecting a private key of encrypted currency, comprising the following steps: S1 preprocessing the private key K of encrypted currency to obtain a key data stream M; S2 determining the number n of storage media, secretly selecting a prime number p and t number a j , openly choose n different numbers x i , get n key units y through function calculation i , the n key units y i respectively distributed to n different storage media, and the key unit y i The corresponding storage medium is marked with serial number i; S3 obtains any t+1 storage medium, and reads the key unit y in each storage medium i , and determine the corresponding x according to the serial number i marked on the storage medium i , construct a system of equations according to the function, and solve the system of equations to obtain the key data stream M; S4 restores the key data stream M to obtain the encrypted currency private key K. The beneficial effects of the present invention are as follows: the security of storing the private key of the encrypted currency is improved, the risk caused by the loss of the private key is reduced, and the rights of the holder of the encrypted currency are protected.

Description

technical field [0001] The invention relates to the technical field of cryptographic currency security protection, in particular to a method for protecting a cryptographic currency private key. Background technique [0002] Cryptocurrency is the core technology in the current Internet financial field. The core element of the circulation of digital cryptocurrency such as Bitcoin, Ethereum, Hyperledger and IOTA currency is the user's password private key. Owning the user's private key means that you can obtain the use of the cryptocurrency At present, the common cryptocurrencies usually verify the transaction through the private key. The loss of the private key will directly cause the loss of the cryptocurrencies and affect the deflation. If the key is lost, the encrypted currency is lost and cannot be retrieved. How to use the secret sharing mechanism to design a private key storage method to effectively protect the user's private key is a technical problem that needs to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/06G06Q20/38
CPCG06Q20/0658G06Q20/3829
Inventor 任伟肖睿阳
Owner CHINA UNIV OF GEOSCIENCES (WUHAN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products