×

Threshold secret share authentication proof and secure blockchain voting with hardware security modules

  • US 10,673,626 B2
  • Filed: 12/31/2018
  • Issued: 06/02/2020
  • Est. Priority Date: 03/30/2018
  • Status: Active Grant
First Claim
Patent Images

1. A method for secure voting among M peers in a channel on an action proposal, comprising:

  • a) selecting a secret custom character;

    b) dividing the secret custom character into M unique shares by using a threshold secret sharing scheme;

    c) providing M hardware security modules with secure storage and firmware;

    d) provisioning each of said M hardware security modules with a distinct one of the M unique shares, and the secret custom character, and storing said distinct unique share and secret custom character in the hardware security module'"'"'s secure storage;

    e) controlling login to each said provisioned hardware security module as a function of that hardware security module'"'"'s provisioned distinct unique share;

    enabling calculation of a trial secret custom character

    as a function of that hardware security module'"'"'s provisioned distinct unique share;

    g) further enabling each of the M hardware security modules to compare the trial secret custom character

    with the stored provisioned secret custom character and if identical, to compute a credential by concatenation of a nonce with the provisioned secret custom character and one or more identity factors to create a concatenation value, and thereafter computing a one-way hash of the concatenation value, resulting in a KNAP credential;

    h) assigning each of the provisioned and enabled hardware security modules to a distinct one of the M peers;

    i) facilitating the transmission of the action proposal from one of the M peers, together with that peer'"'"'s KNAP credential, identity factors, and the nonce used to compute said KNAP credential to all other peers in the channel;

    j) still further enabling each of the M peers to authenticate the received action proposal using the sender'"'"'s KNAP credential, and transmitted identity factors and nonce;

    k) receiving a vote on the action proposal from one of the M peers; and

    l) recording said vote in a distributed ledger.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×