CN108320143B - Method for protecting cipher currency private key - Google Patents
Method for protecting cipher currency private key Download PDFInfo
- Publication number
- CN108320143B CN108320143B CN201810110901.4A CN201810110901A CN108320143B CN 108320143 B CN108320143 B CN 108320143B CN 201810110901 A CN201810110901 A CN 201810110901A CN 108320143 B CN108320143 B CN 108320143B
- Authority
- CN
- China
- Prior art keywords
- key
- private key
- data stream
- storage media
- key data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
- G06Q20/0658—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed locally
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
本发明提供一种密码货币私钥的保护方法,包括以下步骤:S1对密码货币私钥K预处理得到密钥数据流M;S2确定存储介质数量n,秘密选取一素数p和t个数aj,公开选取n个不同的数xi,通过函数
计算得到n个密钥单元yi,将n个密钥单元yi分别分发至n份不同的存储介质,并对密钥单元yi对应的存储介质标注序号i;S3获取任意t+1份存储介质,读取每一存储介质中的密钥单元yi,并根据存储介质标注序号i确定对应的xi,根据函数构建方程组,求解方程组获得密钥数据流M;S4对密钥数据流M进行恢复处理得到密码货币私钥K。本发明的有益效果:提高了密码货币私钥存储的安全性,降低私钥丢失造成的风险,保护密码货币持有者的权利。The present invention provides a method for protecting a cryptographic currency private key, comprising the following steps: S1 preprocesses the cryptographic currency private key K to obtain a key data stream M; S2 determines the number n of storage media, and secretly selects a prime number p and t number a j , openly select n different numbers x i , through the function
Calculate n key units yi , distribute the n key units yi to n different storage media respectively, and label the storage media corresponding to the key unit yi with the serial number i; S3 obtains any t+1 shares storage medium, read the key unit yi in each storage medium, and determine the corresponding x i according to the labeling serial number i of the storage medium, and according to the function Construct the equation system and solve the equation system to obtain the key data stream M; S4 recovers the key data stream M to obtain the cryptographic currency private key K. The beneficial effects of the invention are as follows: the security of the storage of the private key of the encrypted currency is improved, the risk caused by the loss of the private key is reduced, and the rights of the holder of the encrypted currency are protected.Description
Technical Field
The invention relates to the technical field of password and currency security protection, in particular to a method for protecting a private key of a password and currency.
Background
The cryptocurrency is a core technology in the field of internet finance at present, a core element of circulation of digital cryptocurrency such as bitcoin, ether house, super account book and IOTA currency is a user cryptocurrency private key, possession of the user private key means that the use right of the cryptocurrency can be obtained, at present, common cryptocurrency generally verifies transactions through the private key, loss of the private key directly causes loss of the cryptocurrency and influences contraction of currency, at present, an effective private key protection method and a loss emergency protection method are absent, and once the user private key is lost, the cryptocurrency is lost and cannot be found back. How to design a private key storage method by using a secret sharing mechanism to effectively protect a user private key is a technical problem which needs to be solved urgently.
Disclosure of Invention
In view of this, the embodiment of the present invention provides a method for protecting a private key of a cryptocurrency.
The embodiment of the invention provides a method for protecting a cipher currency private key, which comprises the following steps:
s1, preprocessing the cipher currency private key K to obtain a key data stream M;
s2 determining the number n of storage media, secretly selecting a prime number p and t number ajChoosing n different numbers x is disclosediWhere p is greater than n, j is greater than or equal to 1 and less than or equal to t, t is greater than or equal to 1 and less than n, and i is greater than or equal to 1 and less than or equal to n, through a function
N key units y are obtained through calculationiN key units yiRespectively distributed to n different storage media, and matched with key unit yiMarking a serial number i on a corresponding storage medium;
s3 obtains any t +1 storage media, reads the key unit y in each storage mediaiAnd determining corresponding x according to the label serial number i of the storage mediumiAccording to a function
Constructing an equation set, and solving the equation set to obtain a key data stream M;
s4, according to the preprocessing method in S1, the key data stream M is recovered to obtain the cryptocurrency private key K.
Further, S1 specifically includes selecting a sentence text as the personal information, converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the cipher currency private key K to obtain a key data stream M, and S4 specifically includes converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the key data stream M to obtain the cipher currency private key K.
Further, S1 specifically includes selecting personal identification information as the personal information, converting the personal identification information into a binary bit stream by using a fault-tolerant mechanism, and then performing xor processing on the binary bit stream and the cryptocurrency private key K to obtain a secret key data stream M, and S4 specifically includes converting the personal identification information into a binary bit stream by using a fault-tolerant mechanism, and then performing xor processing on the binary bit stream and the secret key data stream M to obtain the cryptocurrency private key K.
Further, the personal identity information is one of a fingerprint, a voiceprint, a handwritten signature, an iris image and a face image.
Further, the number of the storage media is at least 2, and the storage media comprise one or more of optical disks, hard disks, paper texts, memory cards, U disks and cloud storage.
Further, the cryptocurrency is one of bitcoin, etherhouse, super book and IOTA coin.
The technical scheme provided by the embodiment of the invention has the following beneficial effects: aiming at the problem of loss of the cipher currency private key, the method for protecting the cipher currency private key utilizes a secret sharing mechanism to convert and recover the cipher currency private key from the perspective of a distribution mechanism of the cipher currency private key, improves the storage safety of the cipher currency private key, reduces the risk caused by the loss of the private key, and protects the right of a cipher currency holder.
Drawings
FIG. 1 is a flow chart of a method of the present invention for protecting a cryptographic currency private key.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be further described with reference to the accompanying drawings.
Referring to fig. 1, an embodiment of the present invention provides a method for protecting a private key of a cryptocurrency, including the following steps:
s1, preprocessing the cipher currency private key K to obtain a key data stream M;
s2 determining the number n of storage media, secretly selecting a prime number p and t number ajChoosing n different numbers x is disclosediWherein p is more than n, j is more than or equal to 1 and is less than or equal to t, and 1 is less than or equal tot is less than n, i is more than or equal to 1 and less than or equal to n, passing through a function
N key units y are obtained through calculationiN key units yiRespectively distributed to n different storage media, and matched with key unit yiMarking a serial number i on a corresponding storage medium;
s3 obtains any t +1 storage media, reads the key unit y in each storage mediaiAnd determining corresponding x according to the label serial number i of the storage mediumiAccording to a function
Constructing an equation set, and solving the equation set to obtain a key data stream M;
s4, according to the preprocessing method in S1, the key data stream M is recovered to obtain the cryptocurrency private key K.
The cryptocurrency is one of bit currency, Ether Fang, super book and IOTA currency, the number of the storage media is at least 2, and the storage media comprise one or more of compact discs, hard disks, paper texts, memory cards, U disks and cloud storage. .
The S1 specifically includes selecting a sentence text as the personal information, converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the cipher currency private key K to obtain a key data stream M, and the corresponding S4 specifically includes converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the key data stream M to obtain the cipher currency private key K.
Or the S1 specifically includes selecting personal identity information as the personal information, converting the personal identity information into a binary bit stream by using a fault-tolerant mechanism, and then performing xor processing on the binary bit stream and a secret key data stream K to obtain a secret key data stream M, and the S4 specifically includes converting the personal identity information into a binary bit stream by using a fault-tolerant mechanism, and then performing xor processing on the binary bit stream and the secret key data stream M to obtain a secret key K of the secret key data, where the personal identity information is one of a fingerprint, a voiceprint, a handwritten signature, an iris image, and a face image.
The above process is illustrated by way of example:
a holder of a digital cryptocurrency has n different media, where n is 5 as an example, and each of the media is: the private key can be recovered only by key units in any 3 media as required by an optical disk, a hard disk, a paper text, a memory card and a U disk, and the processing method comprises the following steps:
(1) preprocessing a cipher currency private key K to obtain a secret key data stream M, selecting a sentence text as personal information by a user, converting the sentence text into a binary bit number FIN, and carrying out XOR operation on the binary bit number FIN and the private key K to obtain the secret key data stream M;
(2) key unit acquisition and storage, the number of storage media is 5, and 5 different numbers x are selected publiclyiSecretly selecting a prime number p greater than 5, where p is 7, secretly selecting 2 numbers a1And a2For each xiBy a function yi=(M+a1xi+a2xi 2) mod 7 calculates the corresponding yi,yiNamely the key unit, sequentially marking serial numbers 1-5 on the compact disc, the hard disk, the paper text, the memory card and the U disk, and respectively storing the key unit y in the medium ii;
(3) The key unit reconstructs the key data stream M, supposing that a user takes the medium 1, the medium 3 and the medium 5 to recover the private key and provides a user personal information statement text, and according to the read key unit y in each mediumiAnd determining each key unit y according to the medium labeliCorresponding to xiTaking (x)1,y1),(x3,y3),(x5,y5) Substituting function yi=(M+a1xi+a2xi 2) mod 7 yields a set of equations
Solving the equation set to obtain a key data stream M;
(4) and recovering the cryptocurrency private key K, converting the statement text into a binary bit number FIN, and carrying out XOR operation on the binary bit number FIN and the key data stream M to obtain the cryptocurrency private key K.
The features of the embodiments and embodiments described herein above may be combined with each other without conflict.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (6)
1. A method for protecting a private key of a cryptocurrency, comprising the steps of:
s1, preprocessing the cipher currency private key K to obtain a key data stream M;
s2 determining the number n of storage media, secretly selecting a prime number p and t number ajChoosing n different numbers x is disclosediWhere p is greater than n, j is greater than or equal to 1 and less than or equal to t, t is greater than or equal to 1 and less than n, and i is greater than or equal to 1 and less than or equal to n, through a function
N key units y are obtained through calculationiN key units yiRespectively distributed to n different storage media, and matched with key unit yiMarking a serial number i on a corresponding storage medium;
s3 obtains any t +1 storage media, reads the key unit y in each storage mediaiAnd determining corresponding x according to the label serial number i of the storage mediumi(x) corresponding to each selected storage mediumi,yi) Respectively substituting into functions
Constructing an equation set, and solving the equation set to obtain a key data stream M;
s4, according to the preprocessing method in S1, the key data stream M is recovered to obtain the cryptocurrency private key K.
2. The method of claim 1, wherein the method further comprises: specifically, S1 includes selecting a sentence text as the personal information, converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the cipher currency private key K to obtain a key data stream M, and specifically, S4 includes converting the sentence text into a binary number of bits, and then performing xor processing on the binary number of bits and the key data stream M to obtain the cipher currency private key K.
3. The method of claim 1, wherein the method further comprises: specifically, S1 selects personal identification information as the personal information, converts the personal identification information into a binary bit stream by using a fault-tolerant mechanism, and then performs xor processing on the binary bit stream and the secret key data stream K to obtain the secret key data stream M, and specifically, S4 converts the personal identification information into a binary bit stream by using a fault-tolerant mechanism, and then performs xor processing on the binary bit stream and the secret key data stream M to obtain the secret key K of the cryptocurrency.
4. A method of protecting a cryptographic currency private key as claimed in claim 3, characterized by: the personal identity information is one of fingerprints, voiceprints, handwritten signatures, iris images and face images.
5. The method of claim 1, wherein the method further comprises: the number of the storage media is at least 2, and the storage media comprise one or more of compact discs, hard disks, paper texts, memory cards, U disks and cloud storage.
6. The method of claim 1, wherein the method further comprises: the cryptocurrency is one of bitcoin, Ether Fang, super book and IOTA coin.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810110901.4A CN108320143B (en) | 2018-02-05 | 2018-02-05 | Method for protecting cipher currency private key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810110901.4A CN108320143B (en) | 2018-02-05 | 2018-02-05 | Method for protecting cipher currency private key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108320143A CN108320143A (en) | 2018-07-24 |
CN108320143B true CN108320143B (en) | 2022-03-11 |
Family
ID=62902545
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810110901.4A Active CN108320143B (en) | 2018-02-05 | 2018-02-05 | Method for protecting cipher currency private key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108320143B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571339A (en) * | 2010-12-31 | 2012-07-11 | 上海格尔软件股份有限公司 | Virtual asset protection method based on intelligent key and digital signature |
CN106097073A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of block chain gives the method for the numeral exclusive ID of account trading process |
CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
CN106533661A (en) * | 2016-10-25 | 2017-03-22 | 北京大学 | Online generation method for cryptographic currency address based on combined public key |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7391865B2 (en) * | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
US10269012B2 (en) * | 2015-11-06 | 2019-04-23 | Swfl, Inc. | Systems and methods for secure and private communications |
-
2018
- 2018-02-05 CN CN201810110901.4A patent/CN108320143B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571339A (en) * | 2010-12-31 | 2012-07-11 | 上海格尔软件股份有限公司 | Virtual asset protection method based on intelligent key and digital signature |
CN106097073A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of block chain gives the method for the numeral exclusive ID of account trading process |
CN106533661A (en) * | 2016-10-25 | 2017-03-22 | 北京大学 | Online generation method for cryptographic currency address based on combined public key |
CN106503994A (en) * | 2016-11-02 | 2017-03-15 | 西安电子科技大学 | Block chain private data access control method based on encryption attribute |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
Also Published As
Publication number | Publication date |
---|---|
CN108320143A (en) | 2018-07-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101227269B (en) | Method for binding and publishing digital information or cryptographic key based on fingerprint frequency domain | |
CN106330464B (en) | A kind of identity identifying method, equipment and system | |
Jain et al. | Fingerprint template protection: From theory to practice | |
JP2000200337A (en) | Individual identification related document, system for reading the same, method for preparing the same and method for confirming authenticity thereof | |
US20200274714A1 (en) | System for, method of, and server computer system for implementing transformation of an original entity into a verifiably authenticable entity in a heterogeneous communications network environment | |
ES2910352T3 (en) | Strong authentication procedure of an individual | |
KR20090110026A (en) | Polynomial Restoration Apparatus and Method in Fuzzy Bolt System | |
CN111931219B (en) | Data storage method and device and data query method and device | |
CN105337742B (en) | LFSR file encryption and decryption method based on face image features and GPS information | |
Uludag | Secure biometric systems | |
Rathgeb et al. | Preventing the cross-matching attack in Bloom filter-based cancelable biometrics | |
Asthana et al. | A novel biometric crypto system based on cryptographic key binding with user biometrics | |
US20180253573A1 (en) | Systems and Methods for Utilizing Magnetic Fingerprints Obtained Using Magnetic Stripe Card Readers to Derive Transaction Tokens | |
KR102255286B1 (en) | Method for physical identity management in blockchain using a decentralized biometrics system | |
CN108320143B (en) | Method for protecting cipher currency private key | |
US20100027785A1 (en) | Device and method for security handshaking using mixed media | |
Alkhafaji et al. | Tamper detection and localization for Quranic text watermarking scheme based on hybrid technique | |
JP5767003B2 (en) | Holder authentication system, holder authentication terminal, authentication image disassembling apparatus, and recording medium used for authentication of holder | |
JP2001283167A (en) | Individual identification method with two-dimensional code and hybrid type individual authentication system and off-line person himself or herself confirmation system | |
Dutta et al. | A secure algorithm for biometric-based digital image watermarking in DCT domain | |
Joshi et al. | Reversible watermarking technique to enhance security of a biometric authentication system | |
Takaoğlu et al. | NBS: An NFT-Based Blockchain Steganography Method | |
Chauhan et al. | Securing Fuzzy Commitment Scheme against decodability attack-based cross-matching | |
Nazari et al. | A face template protection approach using chaos and GRP permutation | |
Argles et al. | An improved approach to secure authentication and signing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |