Using hash functions and asymmetric cryptography for one-time keys on public ledgers

in #teikhos7 years ago (edited)

With one-time keys that authenticate each transaction, a proof-of-public-key could commit the next public-private key pair, and be recorded on-state with a one-way hash function, for example sha3(f(nextPublicKey)), signed with the public-private key pair that will be used for the next transaction. To authenticate that next one-time key, the signature f(nextPublicKey) is revealed to the miners, who verify it against the one-way hash, and a transactionSignature signed using the one-time public-private key pair then authenticates the transaction.

The hash sha3(f(nextPublicKey)) could then be signed with the current public-private key pair, and committed on-state as proof-of-public-key = f1(sha3(f2(nextPublicKey)), where f1() is a signature with the current key pair, and f2() with the next key pair. The transactions then include the signature f2(nextPublicKey) that is used to authenticate the public-private key pair, a transactionSignature with an asymmetric signature for the transaction that the public key can also be derived from, and a new proof-of-public-key = f1(sha3(f2(nextPublicKey)).

Sort:  

Great to see the in-depth derails on it thanks for sharing

nice post i like your post to much @johan-nygren thanks for sharing post.

Wonderful analysis. Your deep analysis of hash functions and asymmetric cryptography was really great. . Great post dear @johan-nygren

Great post,,,,
i liked..........thanks for sharing............/////////////
received_541684006162923.gif

wonderful post the proof of key is something very interesting concept

Well thanks for the update buddy !