[go: up one dir, main page]

CN108320143B - Method for protecting cipher currency private key - Google Patents

Method for protecting cipher currency private key Download PDF

Info

Publication number
CN108320143B
CN108320143B CN201810110901.4A CN201810110901A CN108320143B CN 108320143 B CN108320143 B CN 108320143B CN 201810110901 A CN201810110901 A CN 201810110901A CN 108320143 B CN108320143 B CN 108320143B
Authority
CN
China
Prior art keywords
key
private key
data stream
storage media
key data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810110901.4A
Other languages
Chinese (zh)
Other versions
CN108320143A (en
Inventor
任伟
肖睿阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Geosciences
Original Assignee
China University of Geosciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Geosciences filed Critical China University of Geosciences
Priority to CN201810110901.4A priority Critical patent/CN108320143B/en
Publication of CN108320143A publication Critical patent/CN108320143A/en
Application granted granted Critical
Publication of CN108320143B publication Critical patent/CN108320143B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • G06Q20/0658Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed locally
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供一种密码货币私钥的保护方法,包括以下步骤:S1对密码货币私钥K预处理得到密钥数据流M;S2确定存储介质数量n,秘密选取一素数p和t个数aj,公开选取n个不同的数xi,通过函数

Figure DDA0001569196680000011
计算得到n个密钥单元yi,将n个密钥单元yi分别分发至n份不同的存储介质,并对密钥单元yi对应的存储介质标注序号i;S3获取任意t+1份存储介质,读取每一存储介质中的密钥单元yi,并根据存储介质标注序号i确定对应的xi,根据函数
Figure DDA0001569196680000012
构建方程组,求解方程组获得密钥数据流M;S4对密钥数据流M进行恢复处理得到密码货币私钥K。本发明的有益效果:提高了密码货币私钥存储的安全性,降低私钥丢失造成的风险,保护密码货币持有者的权利。

Figure 201810110901

The present invention provides a method for protecting a cryptographic currency private key, comprising the following steps: S1 preprocesses the cryptographic currency private key K to obtain a key data stream M; S2 determines the number n of storage media, and secretly selects a prime number p and t number a j , openly select n different numbers x i , through the function

Figure DDA0001569196680000011
Calculate n key units yi , distribute the n key units yi to n different storage media respectively, and label the storage media corresponding to the key unit yi with the serial number i; S3 obtains any t+1 shares storage medium, read the key unit yi in each storage medium, and determine the corresponding x i according to the labeling serial number i of the storage medium, and according to the function
Figure DDA0001569196680000012
Construct the equation system and solve the equation system to obtain the key data stream M; S4 recovers the key data stream M to obtain the cryptographic currency private key K. The beneficial effects of the invention are as follows: the security of the storage of the private key of the encrypted currency is improved, the risk caused by the loss of the private key is reduced, and the rights of the holder of the encrypted currency are protected.

Figure 201810110901

Description

Method for protecting cipher currency private key
Technical Field
The invention relates to the technical field of password and currency security protection, in particular to a method for protecting a private key of a password and currency.
Background
The cryptocurrency is a core technology in the field of internet finance at present, a core element of circulation of digital cryptocurrency such as bitcoin, ether house, super account book and IOTA currency is a user cryptocurrency private key, possession of the user private key means that the use right of the cryptocurrency can be obtained, at present, common cryptocurrency generally verifies transactions through the private key, loss of the private key directly causes loss of the cryptocurrency and influences contraction of currency, at present, an effective private key protection method and a loss emergency protection method are absent, and once the user private key is lost, the cryptocurrency is lost and cannot be found back. How to design a private key storage method by using a secret sharing mechanism to effectively protect a user private key is a technical problem which needs to be solved urgently.
Disclosure of Invention
In view of this, the embodiment of the present invention provides a method for protecting a private key of a cryptocurrency.
The embodiment of the invention provides a method for protecting a cipher currency private key, which comprises the following steps:
s1, preprocessing the cipher currency private key K to obtain a key data stream M;
s2 determining the number n of storage media, secretly selecting a prime number p and t number ajChoosing n different numbers x is disclosediWhere p is greater than n, j is greater than or equal to 1 and less than or equal to t, t is greater than or equal to 1 and less than n, and i is greater than or equal to 1 and less than or equal to n, through a function
Figure BDA0001569196660000021
N key units y are obtained through calculationiN key units yiRespectively distributed to n different storage media, and matched with key unit yiMarking a serial number i on a corresponding storage medium;
s3 obtains any t +1 storage media, reads the key unit y in each storage mediaiAnd determining corresponding x according to the label serial number i of the storage mediumiAccording to a function
Figure BDA0001569196660000022
Constructing an equation set, and solving the equation set to obtain a key data stream M;
s4, according to the preprocessing method in S1, the key data stream M is recovered to obtain the cryptocurrency private key K.
Further, S1 specifically includes selecting a sentence text as the personal information, converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the cipher currency private key K to obtain a key data stream M, and S4 specifically includes converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the key data stream M to obtain the cipher currency private key K.
Further, S1 specifically includes selecting personal identification information as the personal information, converting the personal identification information into a binary bit stream by using a fault-tolerant mechanism, and then performing xor processing on the binary bit stream and the cryptocurrency private key K to obtain a secret key data stream M, and S4 specifically includes converting the personal identification information into a binary bit stream by using a fault-tolerant mechanism, and then performing xor processing on the binary bit stream and the secret key data stream M to obtain the cryptocurrency private key K.
Further, the personal identity information is one of a fingerprint, a voiceprint, a handwritten signature, an iris image and a face image.
Further, the number of the storage media is at least 2, and the storage media comprise one or more of optical disks, hard disks, paper texts, memory cards, U disks and cloud storage.
Further, the cryptocurrency is one of bitcoin, etherhouse, super book and IOTA coin.
The technical scheme provided by the embodiment of the invention has the following beneficial effects: aiming at the problem of loss of the cipher currency private key, the method for protecting the cipher currency private key utilizes a secret sharing mechanism to convert and recover the cipher currency private key from the perspective of a distribution mechanism of the cipher currency private key, improves the storage safety of the cipher currency private key, reduces the risk caused by the loss of the private key, and protects the right of a cipher currency holder.
Drawings
FIG. 1 is a flow chart of a method of the present invention for protecting a cryptographic currency private key.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be further described with reference to the accompanying drawings.
Referring to fig. 1, an embodiment of the present invention provides a method for protecting a private key of a cryptocurrency, including the following steps:
s1, preprocessing the cipher currency private key K to obtain a key data stream M;
s2 determining the number n of storage media, secretly selecting a prime number p and t number ajChoosing n different numbers x is disclosediWherein p is more than n, j is more than or equal to 1 and is less than or equal to t, and 1 is less than or equal tot is less than n, i is more than or equal to 1 and less than or equal to n, passing through a function
Figure BDA0001569196660000031
N key units y are obtained through calculationiN key units yiRespectively distributed to n different storage media, and matched with key unit yiMarking a serial number i on a corresponding storage medium;
s3 obtains any t +1 storage media, reads the key unit y in each storage mediaiAnd determining corresponding x according to the label serial number i of the storage mediumiAccording to a function
Figure BDA0001569196660000032
Constructing an equation set, and solving the equation set to obtain a key data stream M;
s4, according to the preprocessing method in S1, the key data stream M is recovered to obtain the cryptocurrency private key K.
The cryptocurrency is one of bit currency, Ether Fang, super book and IOTA currency, the number of the storage media is at least 2, and the storage media comprise one or more of compact discs, hard disks, paper texts, memory cards, U disks and cloud storage. .
The S1 specifically includes selecting a sentence text as the personal information, converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the cipher currency private key K to obtain a key data stream M, and the corresponding S4 specifically includes converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the key data stream M to obtain the cipher currency private key K.
Or the S1 specifically includes selecting personal identity information as the personal information, converting the personal identity information into a binary bit stream by using a fault-tolerant mechanism, and then performing xor processing on the binary bit stream and a secret key data stream K to obtain a secret key data stream M, and the S4 specifically includes converting the personal identity information into a binary bit stream by using a fault-tolerant mechanism, and then performing xor processing on the binary bit stream and the secret key data stream M to obtain a secret key K of the secret key data, where the personal identity information is one of a fingerprint, a voiceprint, a handwritten signature, an iris image, and a face image.
The above process is illustrated by way of example:
a holder of a digital cryptocurrency has n different media, where n is 5 as an example, and each of the media is: the private key can be recovered only by key units in any 3 media as required by an optical disk, a hard disk, a paper text, a memory card and a U disk, and the processing method comprises the following steps:
(1) preprocessing a cipher currency private key K to obtain a secret key data stream M, selecting a sentence text as personal information by a user, converting the sentence text into a binary bit number FIN, and carrying out XOR operation on the binary bit number FIN and the private key K to obtain the secret key data stream M;
(2) key unit acquisition and storage, the number of storage media is 5, and 5 different numbers x are selected publiclyiSecretly selecting a prime number p greater than 5, where p is 7, secretly selecting 2 numbers a1And a2For each xiBy a function yi=(M+a1xi+a2xi 2) mod 7 calculates the corresponding yi,yiNamely the key unit, sequentially marking serial numbers 1-5 on the compact disc, the hard disk, the paper text, the memory card and the U disk, and respectively storing the key unit y in the medium ii
(3) The key unit reconstructs the key data stream M, supposing that a user takes the medium 1, the medium 3 and the medium 5 to recover the private key and provides a user personal information statement text, and according to the read key unit y in each mediumiAnd determining each key unit y according to the medium labeliCorresponding to xiTaking (x)1,y1),(x3,y3),(x5,y5) Substituting function yi=(M+a1xi+a2xi 2) mod 7 yields a set of equations
Figure BDA0001569196660000051
Solving the equation set to obtain a key data stream M;
(4) and recovering the cryptocurrency private key K, converting the statement text into a binary bit number FIN, and carrying out XOR operation on the binary bit number FIN and the key data stream M to obtain the cryptocurrency private key K.
The features of the embodiments and embodiments described herein above may be combined with each other without conflict.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (6)

1. A method for protecting a private key of a cryptocurrency, comprising the steps of:
s1, preprocessing the cipher currency private key K to obtain a key data stream M;
s2 determining the number n of storage media, secretly selecting a prime number p and t number ajChoosing n different numbers x is disclosediWhere p is greater than n, j is greater than or equal to 1 and less than or equal to t, t is greater than or equal to 1 and less than n, and i is greater than or equal to 1 and less than or equal to n, through a function
Figure FDA0003337766960000011
N key units y are obtained through calculationiN key units yiRespectively distributed to n different storage media, and matched with key unit yiMarking a serial number i on a corresponding storage medium;
s3 obtains any t +1 storage media, reads the key unit y in each storage mediaiAnd determining corresponding x according to the label serial number i of the storage mediumi(x) corresponding to each selected storage mediumi,yi) Respectively substituting into functions
Figure FDA0003337766960000012
Constructing an equation set, and solving the equation set to obtain a key data stream M;
s4, according to the preprocessing method in S1, the key data stream M is recovered to obtain the cryptocurrency private key K.
2. The method of claim 1, wherein the method further comprises: specifically, S1 includes selecting a sentence text as the personal information, converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the cipher currency private key K to obtain a key data stream M, and specifically, S4 includes converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the key data stream M to obtain the cipher currency private key K.
3. The method of claim 1, wherein the method further comprises: specifically, S1 selects personal identification information as the personal information, converts the personal identification information into a binary bit stream by using a fault-tolerant mechanism, and then performs xor processing on the binary bit stream and the secret key data stream K to obtain the secret key data stream M, and specifically, S4 converts the personal identification information into a binary bit stream by using a fault-tolerant mechanism, and then performs xor processing on the binary bit stream and the secret key data stream M to obtain the secret key K of the cryptocurrency.
4. A method of protecting a cryptographic currency private key as claimed in claim 3, characterized by: the personal identity information is one of fingerprints, voiceprints, handwritten signatures, iris images and face images.
5. The method of claim 1, wherein the method further comprises: the number of the storage media is at least 2, and the storage media comprise one or more of compact discs, hard disks, paper texts, memory cards, U disks and cloud storage.
6. The method of claim 1, wherein the method further comprises: the cryptocurrency is one of bitcoin, Ether Fang, super book and IOTA coin.
CN201810110901.4A 2018-02-05 2018-02-05 Method for protecting cipher currency private key Active CN108320143B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810110901.4A CN108320143B (en) 2018-02-05 2018-02-05 Method for protecting cipher currency private key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810110901.4A CN108320143B (en) 2018-02-05 2018-02-05 Method for protecting cipher currency private key

Publications (2)

Publication Number Publication Date
CN108320143A CN108320143A (en) 2018-07-24
CN108320143B true CN108320143B (en) 2022-03-11

Family

ID=62902545

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810110901.4A Active CN108320143B (en) 2018-02-05 2018-02-05 Method for protecting cipher currency private key

Country Status (1)

Country Link
CN (1) CN108320143B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571339A (en) * 2010-12-31 2012-07-11 上海格尔软件股份有限公司 Virtual asset protection method based on intelligent key and digital signature
CN106097073A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain gives the method for the numeral exclusive ID of account trading process
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN106533661A (en) * 2016-10-25 2017-03-22 北京大学 Online generation method for cryptographic currency address based on combined public key
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7391865B2 (en) * 1999-09-20 2008-06-24 Security First Corporation Secure data parser method and system
US10269012B2 (en) * 2015-11-06 2019-04-23 Swfl, Inc. Systems and methods for secure and private communications

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571339A (en) * 2010-12-31 2012-07-11 上海格尔软件股份有限公司 Virtual asset protection method based on intelligent key and digital signature
CN106097073A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain gives the method for the numeral exclusive ID of account trading process
CN106533661A (en) * 2016-10-25 2017-03-22 北京大学 Online generation method for cryptographic currency address based on combined public key
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology

Also Published As

Publication number Publication date
CN108320143A (en) 2018-07-24

Similar Documents

Publication Publication Date Title
CN101227269B (en) Method for binding and publishing digital information or cryptographic key based on fingerprint frequency domain
CN106330464B (en) A kind of identity identifying method, equipment and system
Jain et al. Fingerprint template protection: From theory to practice
JP2000200337A (en) Individual identification related document, system for reading the same, method for preparing the same and method for confirming authenticity thereof
US20200274714A1 (en) System for, method of, and server computer system for implementing transformation of an original entity into a verifiably authenticable entity in a heterogeneous communications network environment
ES2910352T3 (en) Strong authentication procedure of an individual
KR20090110026A (en) Polynomial Restoration Apparatus and Method in Fuzzy Bolt System
CN111931219B (en) Data storage method and device and data query method and device
CN105337742B (en) LFSR file encryption and decryption method based on face image features and GPS information
Uludag Secure biometric systems
Rathgeb et al. Preventing the cross-matching attack in Bloom filter-based cancelable biometrics
Asthana et al. A novel biometric crypto system based on cryptographic key binding with user biometrics
US20180253573A1 (en) Systems and Methods for Utilizing Magnetic Fingerprints Obtained Using Magnetic Stripe Card Readers to Derive Transaction Tokens
KR102255286B1 (en) Method for physical identity management in blockchain using a decentralized biometrics system
CN108320143B (en) Method for protecting cipher currency private key
US20100027785A1 (en) Device and method for security handshaking using mixed media
Alkhafaji et al. Tamper detection and localization for Quranic text watermarking scheme based on hybrid technique
JP5767003B2 (en) Holder authentication system, holder authentication terminal, authentication image disassembling apparatus, and recording medium used for authentication of holder
JP2001283167A (en) Individual identification method with two-dimensional code and hybrid type individual authentication system and off-line person himself or herself confirmation system
Dutta et al. A secure algorithm for biometric-based digital image watermarking in DCT domain
Joshi et al. Reversible watermarking technique to enhance security of a biometric authentication system
Takaoğlu et al. NBS: An NFT-Based Blockchain Steganography Method
Chauhan et al. Securing Fuzzy Commitment Scheme against decodability attack-based cross-matching
Nazari et al. A face template protection approach using chaos and GRP permutation
Argles et al. An improved approach to secure authentication and signing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant