ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. シンポジウム
  2. シンポジウムシリーズ
  3. コンピュータセキュリティシンポジウム
  4. 2022

zkRecovery: Backing up and recovering secret key by decomposing scalar and using zero-knowledge proof

https://ipsj.ixsq.nii.ac.jp/records/223224
https://ipsj.ixsq.nii.ac.jp/records/223224
bc609cdb-a783-4d0d-9752-9c87b58ca365
名前 / ファイル ライセンス アクション
IPSJ-CSS2022169.pdf IPSJ-CSS2022169.pdf (1.0 MB)
Copyright (c) 2022 by the Information Processing Society of Japan
オープンアクセス
Item type Symposium(1)
公開日 2022-10-17
タイトル
タイトル zkRecovery: Backing up and recovering secret key by decomposing scalar and using zero-knowledge proof
タイトル
言語 en
タイトル zkRecovery: Backing up and recovering secret key by decomposing scalar and using zero-knowledge proof
言語
言語 eng
キーワード
主題Scheme Other
主題 Blockchain, Secret key, Private key, Backup and recovery method, Social recovery, Zero-knowledge proof, Schnorr protocol
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
著者所属
BOOSTRY Co., Ltd.
著者所属(英)
en
BOOSTRY Co., Ltd.
著者名 Kazune, Takahashi

× Kazune, Takahashi

Kazune, Takahashi

Search repository
著者名(英) Kazune, Takahashi

× Kazune, Takahashi

en Kazune, Takahashi

Search repository
論文抄録
内容記述タイプ Other
内容記述 We propose zkRecovery, a way to back up a private key of a blockchain on an asset exchange platform. For backup, the user generates a random number to decompose their private key into a product of two scalars. One of them is stored in their cloud storage and the other is stored by the company of the platform. For recovery, email address verification and zero-knowledge proof on Schnorr protocol are used for authentication. One of the merits of zkRecovery is that no one except the user can induce the private key because they never obtain both of the two scalar.
論文抄録(英)
内容記述タイプ Other
内容記述 We propose zkRecovery, a way to back up a private key of a blockchain on an asset exchange platform. For backup, the user generates a random number to decompose their private key into a product of two scalars. One of them is stored in their cloud storage and the other is stored by the company of the platform. For recovery, email address verification and zero-knowledge proof on Schnorr protocol are used for authentication. One of the merits of zkRecovery is that no one except the user can induce the private key because they never obtain both of the two scalar.
書誌情報 コンピュータセキュリティシンポジウム2022論文集

p. 1230-1234, 発行日 2022-10-17
出版者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-19 13:27:47.368800
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3