Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Knowledge proof

A knowledge proof and transaction technology, applied in the field of knowledge proof, can solve problems such as inability to change

Pending Publication Date: 2022-01-11
NCHAIN HLDG LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The problem with traditional hashing puzzles alone is that unscrupulous miners or other nodes can 2 d is observed in the unlocking script, and then the Tx 2 Create and mine (or publish) your own version, in pays itself in the output of Tx instead of paying 2 The intended recipient (eg, Bob) in
The signature part usually includes the outputs of the transaction, so these outputs cannot be changed without verifying that the signature is invalid and therefore the transaction is invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Knowledge proof
  • Knowledge proof
  • Knowledge proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In some encryption schemes, the verifier may need to be convinced that someone (called the prover or the challenged) has some information in what is called a proof of knowledge. This can be achieved simply by providing this information directly to the verifier. Alternatively, the prover may be required to perform computations that depend on this information. Preferably, the calculations involved are such that the verifier does not need to know the information himself to set up the challenge, nor does it need to reveal the information to the verifier to verify that the prover knows the information. For calculation methods, validation calculations must be performed on the input data. Since cryptographic hash functions have anti-image and anti-collision properties, a straightforward way to prove knowledge of a secret value is to use a cryptographic hash function. This hashing method can be easily integrated into many blockchain applications, as hash functions form a fund...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

At a node of a blockchain network: obtaining a first transaction which including runnable code, including reference data for evaluating a challenge defined based on a joint r-value r joint; receiving one or more second transactions including information comprising an r-part r i and s-part s i of each of a pair of ECDSA signatures (i = 1, 2), each signing part of one of the one or more second transactions based on a respective first private key V i corresponding to a respective first public key P i; and running the code. The code verifies whether the challenge is met based on the reference data and the r- parts r i . The challenge comprises a criterion that: R 1 + R 2 = (Lambda 2 - r joint ) mod p, where r joint = [R joint ]x, R joint = R 1 + R 2 , p is a prime modulus, (Formula (I)) mod p, R i = k i . G, x i = [R i ]x, Y i = [R i ]y, k i is an ephemeral key, and G is an elliptic curve generator point.

Description

technical field [0001] The present disclosure relates to a proof of knowledge implemented via a set of transactions for recording in a blockchain. Background technique [0002] Blockchain refers to a form of distributed data structure in which a copy of the blockchain is maintained at each of multiple nodes in a peer-to-peer (P2P) network. A blockchain consists of a series of data blocks, where each block includes one or more transactions. Each transaction can refer back to previous transactions in the sequence. Transactions can be included in new blocks by committing to the network. The process of creating a new block is called "mining," and it involves each of multiple mining nodes competing to perform "proof-of-work," solving a cryptographic puzzle based on the pool of pending transactions waiting to be included in a block. [0003] Transactions in the blockchain are often used to transfer digital assets, that is, data used as a store of value. But it is also possible...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06Q40/04
CPCH04L9/3271H04L9/3239H04L9/3252H04L67/104G06Q40/04H04L2209/56H04L9/50H04L9/3218H04L9/3066
Inventor 杰德·瓦哈伯张伟布洛克·多伊龙克雷格·赖特
Owner NCHAIN HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products