CPC H04L 9/085 (2013.01) [H04L 9/0637 (2013.01); H04L 9/0643 (2013.01); H04L 9/30 (2013.01)] | 16 Claims |
1. A computer-implemented method for secure management of cryptographic ledgers, the method comprising:
identifying, by a computing system, a current iteration of a quorum for a cryptographic ledger, wherein the current iteration of the quorum comprises a first set of computing nodes that respectively store respective shares of a secret associated with the cryptographic ledger according to a threshold secret sharing scheme;
accessing, by the computing system, data descriptive of a plurality of candidate computing nodes that are available for selection for inclusion in a subsequent iteration of the quorum for the cryptographic ledger, wherein the subsequent iteration of the quorum comprises a second set of computing nodes;
selecting, by the computing system, one or more of the plurality of candidate computing nodes for inclusion in the second set of computing nodes that form the subsequent iteration of the quorum for the cryptographic ledger; and
establishing, by the computing system, the second set of computing nodes as the subsequent iteration of the quorum for the cryptographic ledger.
|