Protecting the privacy of DIGITAL - HI TECH (DHT)
Schorr multi-signature algorithm
An important part of the DIGITAL - HI TECH Chain (DHT) will be the application of the Schnorr Multi-Signature Algorithm to its PBFT mechanism. The traditional PBFT protocol requires the user to transmit signatures to the Leader, who then integrates them into the block header. However, with storing multiple signatures, this will lead to an increase in the block header size, thus affecting the network transmission efficiency. To avoid such situations, DIGITAL - HI TECH (DHT) Chain adopts the use of Schnoor Multi-Signature Algorithm, based on Secp256k1 elliptic curve, thus greatly improving blockchain transmission efficiency.
Exhibit Illustrating Performance Improvements from Implementing the Schnorr11 Multi-Signature Algorithm.
Compared to other signature algorithms, the Schorr Multi-Signature Algorithm generates only one signature. This significantly reduces signature length and block header size, thereby reducing storage and network transmission costs.
It also offers additional privacy benefits and is known to favor privacy protection.
Unified encryption and privacy protection.
During the implementation of the DIGITAL - HI TECH Chain (DHT), it is inevitable that information to third parties may be disseminated due to data sharing through the internal Smart Pipeline. To eliminate such incidents and to maximize user security and privacy, DIGITAL - HI TECH (DHT) Chain adopts homomorphic encryption to protect users' sensitive information.
Isomorphic encoding of the DIGITAL - HI TECH (DHT) sequence using the Paillier technique. It is calculated based on the nth residual classes of a group of quadratic integers.
Where m stands for encrypted message and m∈(0, n), then choose to pair a random key r∈(0, n): public key (n, g) and private key (λ , u), compute the ciphertext C as C = gmrn modn2.
Ciphertext C is both a mixed kernel plaintext and isomorphic 12, that is:
• Homogeneous addition of plaintexts
D (E (m1, r1) E (m2, r2) mod n2) = m1 + m2 mod n
D (E (m1, r1) gm2 mod n2) = m1 + m2 mod n
• Homogeneous mixed multiplication of plaintexts D (E(m1, r1) m2 mod n2) = m1m2 mod n
A variety of data processing can also be performed after encryption, with the results passed back to the user. With the use of a private key, users will be able to get the same set of results as when dealing with plain text, while minimizing the possibility of data leakage.
• Paillier, Pascal and David Pointcheval. "Effective public-key cryptosystems can stay secure against active adversaries." In the International Conference on Theory and Applications of Cryptography and Information Security, pp. 165-179. Springer, Berlin, Heidelberg, 1999.
In addition, homomorphic cryptographic signatures can be added to different assets, thus enabling the ability to verify mishandling, tampering, and other forms of misconduct during processing. data to ensure data accuracy.
High security multi-party algorithm 13.
In the process of distributed private key control and ring signatures involving many people sharing the private key, the principle of never completely revealing all sensitive information should be followed. Therefore, DIGITAL - HI TECH (DHT) chooses secure multi-party computation to protect data safety. Full information will only be available when it is used.
The highly secure multiparty algorithm of DIGITAL - HI TECH (DHT) Chain solves the following problem: n individuals respectively keep privacy x1, x2, ... xn, to compute a particular function y = f(x1, x2, ... xn), while these (n) individuals do not have access to the privacy of others. Given that there are malicious real-world nodes seeking to obtain other parties' private information, DIGITAL – HI TECH highly secure Multi-Party Algorithm (DHT) Chain denies participants any access to any information. any additional information beyond the calculation results regardless of whether they have bad intentions or not.
DIGITAL - HI TECH (DHT) considers the integration of holomorphic, bulletproof 14 encryption to implement Secure Multi-Party Algorithms, for example denial computation.
DIGITAL - HI TECH (DHT) Chain also implements a highly secure Multi-Party Algorithm to encrypt critical data in each DApp and DIGITAL - HI TECH (DHT) platform. Original user data is kept safe even if there is a leak during data transmission. The algorithm ensures that the parties involved in the data transmission can encrypt and decrypt the data in a much more secure way. Furthermore, the public keys, addresses, and user data found on each DApp in the DIGITAL - HI TECH Platform (DHT) are independent and concealed.
Last updated