Who has the process of finding password for blockchain private k
the private key is everything and must not be told to anyone
as long as there is a private key, you can re import the wallet and reset the wallet security password
a BTC account can have many addresses, so the least important one is the address. No matter how unimportant, you can't just tell others.
Many small white just admission, was the private key, public key, address, and other relations confused. Some of them even lost their private key. They had money on the address, but they just couldn't get it out. Today, Xiao will try to figure out the relationship between the private key, the public key and the address
The relationship among < H2 > private key, public key and address is as follows:the private key is converted into (generated) public key, and then converted into address. If there is bitcoin or integrity coin on an address, the private key converted into the address can be used to spend the above integrity coin. The generation of public key and address depends on private key, so private key is the most important
mobile wallet is the same, but the file management method of mobile phone is not as convenient as computer. Therefore, the general mobile wallet will provide a function called or similar to "export private key". Through this function, the private key can be exported in various forms
for example, bitcoin mobile wallet can be exported as a two-dimensional code, which can be printed or scanned on paper. When replacing a mobile phone, install a bitcoin wallet and scan the QR code to migrate bitcoin. Bitcoin mobile wallet and trustcoin mobile wallet can be exported as a clear text string and printed on paper - this is paper wallet
paper wallet allows users to spend your bitcoin or trustcoin at any terminal with bitcoin or trustcoin wallet
because the wallet is lost or damaged, the private key will be lost, and the transfer right of the digital currency will be lost completely. To prevent such tragedies, you should always back up the data in your wallet. In addition to the address, all the private keys are saved ring the backup
< H2 > summary-
the private key should be protected to prevent loss and forgetting. When the mobile phone clears the information, it is best to it by hand, but do not disclose it
-
you should prevent your wallet from being lost or damaged, resulting in the loss of your private key and the loss of the transfer right of digital currency. Otherwise, you will not be able to withdraw more money, which is not useless
in the embryonic stage
before 2006, social work in our province had not been included in the scope of work of Party committees and governments at all levels
with the increasingly frequent exchanges in the field of social services between Guangdong, Hong Kong and Macao, some social service institutions in Guangzhou began to explore social work practice since the 1990s. For example, Fengyuan street in Liwan District of Guangzhou cooperated with neighborhood counseling association to provide social work services to meet the needs of residents for community services; Guangzhou old people's home cooperated with Hong Kong Sheng Kung Hui to introce professional social workers to implement social work services for the elderly in homes; Some social organizations such as Guangzhou YMCA also try to introce social workers to accumulate practical experience< On the other hand, social work ecation started. Since 1999, South China Agricultural University, Guangdong Business University, Sun Yat sen University, Guangzhou University, Guangdong University of technology and other universities have set up social work programs
the social work service practice explored by social forces and the development of social work professional ecation have laid a certain foundation for the start of social work in our province< In 2006, after the Ministry of Civil Affairs held the national civil affairs system social work talent team construction promotion meeting in our province, our province quickly launched the pilot exploration, graally built social work demonstration areas in all parts of the province, strengthened the decision-making and coordination on major issues of social work, and steadily promoted the pilot work. Comprehensive promotion stage (2011 to present)
in 2011, the ninth meeting of the 10th CPC Guangdong Provincial Committee focused on strengthening social construction. The general office of the CPC Guangdong Provincial Committee and the general office of the provincial government issued the implementation opinions on strengthening the construction of social work talent team, and included "the number of social workers with certificates per 10000 people" into the evaluation index system of "happy Guangdong", The social work of our province has entered the stage of comprehensive promotion
the practice of social work has been graally deepened, and the service field has graally expanded from social welfare and social assistance to disability rehabilitation, drug control and ecation, community correction, employment assistance, employee assistance, dispute mediation, emergency response and other fields. The service area has expanded from urban areas to rural areas, and the service object has extended from children and adolescents, the elderly, the disabled to the floating population, the elderly and the disabled Disaster victims, women with special needs and other groups
social work professionals and social work service institutions are the main bodies that directly provide social work services. All parts of our province take the cultivation and expansion of social work talents and social work service institutions as the core of the development of social work, promote social work talents to take root in the front line to do service, and social work service institutions to build brand based on the long-term
judging from the government's emphasis on social work, Xiaobian thinks that social workers will graally appear as a profession, which is not only to distinguish them from the enthusiastic aunts of the neighborhood committee, but also to distinguish a mode of helping others and solve the existing problems in depth
social workers may be needed by more people in the future. If you have a social worker card at this time, it will be even better.
wallet. In fact, mnemonics are another form of expression of the private key, which has the same function as the private key, mainly to protect your blockchain money
has completed payment in the early days of mobile payment, it has been through the input of payment password or fingerprint. But now Ma Yun's Alipay has opened a quicker and more convenient way, that is, brush face payment. P>
Alipay has already done the payment method of face recognition through camera. We have to wonder that the progress of high technology brings people convenience and quick, which is really very attractive, so that people do not need to take out the mobile phone operation.
there is no need to worry about this. In fact, it's just like using a mobile phone to brush your face and open your mobile phone. You can't and can't unlock your mobile phone just by using people's photos. Of course, people who are curious about this will take photos to do experiments, but this photo is not their own
someone took out a picture of Ma Yun's face and scanned it. They thought that he would brush his face successfully or that some of Ma Yun's eggs would happen. However, no matter how many times he did it, it didn't work. It just showed that he failed to brush his face. In fact, the payment wire has been very stable, and the payment security we are worried about has been taken into consideration by the technical personnel and is now in use, so we can use it safely
As an emerging technology, blockchain has attracted more and more attention. It is a new application of traditional technology in the Internet era, including distributed data storage technology, consensus mechanism and cryptography. With the establishment of various blockchain research alliances, more and more funds and personnel support related research. Hash algorithm, zero knowledge proof, ring signature and other cryptographic algorithms used in blockchain:
hash algorithm
as the basic technology of blockchain, the essence of hash function is to map a set of data of any length (limited) to a set of defined length data stream. If this function satisfies the following conditions:
(1) the calculation of hash value for any group of data is very simple
(2) it is difficult to find two different data with the same hash value
hash functions satisfying the above two properties are also called encrypted hash functions. In case of no contradiction, hash functions usually refer to encrypted hash functions. For the hash function, finding such that is called a collision. The current popular hash functions are MD5, SHA1, Sha2, Sha3
bitcoin uses sha256, and most blockchain systems use sha256 algorithm. So here's sha256< Step 1: additional filling bits. The length of the message is congruent with that of 448 mod512 (length = 448 mod512). The number of bits to be filled ranges from 1 to 512. The highest bit of the filled bit string is 1, and the rest bits are 0
Step2: additional length value. The bit length of the initial message (before filling) represented by 64 bit is appended to the result of step 1 (the low byte takes precedence)
Step3: initialize cache. A 256 bit cache is used to store the intermediate and final results of the hash function
Step 4: process 512 bit (16 word) packet sequence. The algorithm uses six basic logic functions and consists of 64 steps of iterative operation. Each step takes the 256 bit cache value as the input, and then updates the cache content. Each step uses a 32-bit constant KT and a 32-bit wt. Where WT is the packet after the packet, t = 1,2,..., 16
step5: after all 512 bit packets are processed, the output of the last packet of sha256 algorithm is 256 bit packet< In 2001, Rivest, Shamir and TauMan proposed ring signature for the first time. It is a simplified group signature, only ring members have no manager, and it does not need the cooperation between ring members. In the ring signature scheme, the signer first selects a temporary signer set, which includes signers. Then the signer can generate the signature independently by using his private key and the public key of others in the signature set without the help of others. Members of the signer collection may not know that they are included in it
ring signature scheme consists of the following parts:
(1) key generation. A key pair (public key PKI, private key ski) is generated for each member of the ring
(2) signature. The signer uses his private key and the public keys of any n ring members (including himself) to generate the signature a for the message M
(3) signature verification. According to the ring signature and message M, the verifier verifies whether the signature is signed by the member in the ring. If it is valid, it will be received, otherwise it will be discarded
ring signature satisfies the following properties:
(1) unconditional anonymity: the attacker can not determine which member of the ring generated the signature, even if the private key of the ring member is obtained, the probability is not more than 1 / n
(2) Correctness: the signature must be verifiable by all others
(3) unforgeability: other members of the ring can't forge the real signer's signature, and even if an external attacker obtains a valid ring signature, he can't forge a signature for message M
(1) anonymity. The verifier can verify that the signature is signed by a member of the group, but can't know which member it is, so that the signer can be anonymous< (2) traceability. In group signature, the existence of group administrator ensures the traceability of signature. The group administrator can revoke the signature and expose the real signer. The ring signature itself cannot reveal the signer unless the signer wants to expose or add additional information to the signature. A verifiable ring signature scheme is proposed. In this scheme, the real signer wants the verifier to know his identity. At this time, the real signer can confirm his identity by disclosing his secret information< (3) management system. Group signature is managed by group administrator, ring signature does not need to be managed, signer can only select a set of possible signers, obtain its public key, and then publish the set, all members are equalthe Xueshuo innovation blockchain Technology Workstation of Lianqiao ecation online is the only approved "blockchain Technology Specialty" pilot workstation of "smart learning workshop 2020 Xueshuo innovation workstation" launched by the school planning, construction and development center of the Ministry of ecation of China. Based on providing diversified growth paths for students, the professional station promotes the reform of the training mode of the combination of professional degree research, proction, learning and research, and constructs the applied and compound talent training system< br />
in order to ensure the data security of users, the blockchain system is implemented through a cryptographic algorithm. Specifically, it is implemented through a public cryptographic algorithm mechanism. We all know how a cryptographic algorithm can have a secret key, and the public secret key algorithm is a pair of (that is, two) secret keys, just like tiger amulet, which are used together. One is called public key, which can be disclosed to others. The private key should be kept by itself. In the blockchain system, the public key is used to identify the identity, and the private key is equivalent to the key to decrypt. But the difference is that a public key is only for a unique private key, that is to say, if you forget the private key, it will not be retrieved for you, In the blockchain system, it will not help you retrieve the private key, so you should keep the private key properly
in the blockchain system structure, the data encrypted with public key must be decrypted with the corresponding private key, while the data encrypted with private key
must be decrypted with the corresponding public key, so the data encrypted with private key (usually called "signature") must be decrypted with the corresponding public key, which can play a great role
for a simple example, if Zhang San wants to send a check to Li Si, how can it be sent? In the past, it would be taken by the bookkeeper, so Zhang San thought of a way. He encrypted the check with Li Si's public key, and then signed his name (signed with his private key). At this time, other people would not use it even if they got the check, because only Li Si had his private key, That is, only Li Si can use this check. This function design is called "script system" in the blockchain system
therefore, the private key encrypted by the blockchain digital signature cannot be decrypted by the original encrypted private key, but must be decrypted by the corresponding public key.