US 11,930,110 B2
System and method for key recovery and verification in blockchain based networks
Tal Arieh Be'ery, Petach Tikva (IL); Ouriel Ohayon, Tel Aviv (IL); Omer Shlomovits, Petach Tikva (IL); and Gary Benattar, Netanya (IL)
Assigned to ZENGO LTD, Tel Aviv (IL)
Appl. No. 17/426,769
Filed by KZEN NETWORKS LTD, Tel Aviv (IL)
PCT Filed Jan. 29, 2020, PCT No. PCT/IL2020/050111
§ 371(c)(1), (2) Date Jul. 29, 2021,
PCT Pub. No. WO2020/157756, PCT Pub. Date Aug. 6, 2020.
Claims priority of provisional application 62/798,892, filed on Jan. 30, 2019.
Prior Publication US 2022/0103356 A1, Mar. 31, 2022
Int. Cl. H04L 29/06 (2006.01); H04L 9/00 (2022.01); H04L 9/08 (2006.01)
CPC H04L 9/0894 (2013.01) [H04L 9/008 (2013.01)] 13 Claims
OG exemplary drawing
 
1. A method of verifying that an encrypted cryptographic private key associated with a blockchain based computer network can be decrypted, the method comprising:
encrypting, by at least one first computing device, at least a portion of a cryptographic key of the computer network with a recovery public key, wherein the encryption is carried out using an homomorphically additive encryption scheme;
sending, by the at least one first computing device, the encrypted at least a portion of the cryptographic key to at least one second computing device;
retrieving, by the at least one second computing device, the recovery public key from the at least one first computing device;
verifying, by the at least one second computing device, that the encrypted at least a portion of the cryptographic key is compatible to be decrypted by a recovery private key, based on the retrieved recovery public key and the corresponding public key of the at least a portion of the cryptographic key;
sending, by the at least one first computing device, the recovery private key to a recovery escrow service;
periodically sending, by the at least one first computing device, an arbitrary message to the recovery escrow service, wherein the recovery message is signed by the recovery private key;
publishing the signed arbitrary message in a public repository;
retrieving, by the at least one second computing device, the signed arbitrary message from the public repository;
verifying, by the at least one second computing device, that the encryption of the signed arbitrary message is compatible with the recovery public key; and
verifying, by the at least one second computing device, that the recovery escrow service has the recovery private key.