Secure re-use of private key for dynamic group of nodes
Assignee
NCHAIN LICENSING AG
Inventors
John Fletcher, Thomas Trevethan, Marco Bardoscia
Abstract
Provided herein are a process, an apparatus, and an article of manufacture for confiscating a digital asset due to malicious members or malicious attacks. A process in the form of a computer-implemented method includes: i) detecting malicious activity by a malicious party, wherein the malicious party is one of the other members of the a congress; and ii) confiscating at least a portion of digital assets previously transferred to the a public group address by the malicious party. Security mechanisms disclosed herein for confiscating a digital asset leverage the use of a congress that is secured, in part, through distributed generation of private key share. The security mechanisms further allow a self-governing, decentralized group to be formed, with the threshold signature scheme allowing the group to control digital assets encumbered by a public key associated with the group.
CPC Classifications
Filing Date
2024-03-19
Application No.
18610045
Claims
13