US 12,463,837 B2
Secret smart operations in blockchain
Lei Yu, Sleepy Hollow, NY (US); Qi Zhang, West Harrison, NY (US); Petr Novotny, Mount Kisco, NY (US); and Nitin Gaur, Round Rock, TX (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Jun. 16, 2022, as Appl. No. 17/807,173.
Prior Publication US 2023/0412403 A1, Dec. 21, 2023
Int. Cl. H04L 9/00 (2022.01); H04L 9/08 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/50 (2022.05) [H04L 9/0825 (2013.01); H04L 9/0833 (2013.01); H04L 9/085 (2013.01); H04L 9/0894 (2013.01); H04L 63/065 (2013.01); H04L 63/0442 (2013.01); H04L 2209/42 (2013.01); H04L 2463/062 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A system comprising:
a memory; and
a processor in communication with the memory, the processor being configured to perform processes comprising:
initiating an operation to transfer a secret;
establishing groups of nodes in at least one blockchain network, wherein the groups are peer nodes configured to share secrets between each other;
dividing the secret into n secret parts, wherein each part of the n secret parts overlaps one or more other parts of the n secret parts;
creating group keys;
encrypting each group key of the group keys with a public key from a peer from a respective group;
encrypting each secret part of the secret with a corresponding group key;
recording encrypted secret parts on the at least one blockchain networks;
validating, by one or more of the groups, a transaction from a recipient;
decrypting each secret part of the secret with the corresponding group key;
re-encrypting each secret part of the secret with a public key of the recipient to form re-encrypted secret parts; collecting, by the recipient, the encrypted secret parts;
decrypting, by the recipient using a private key of the recipient, the re-encrypted secret parts;
identifying, by the recipient a corrupted part of the decrypted secret parts, and reconstructing the corrupted part from one or more other secret parts that overlap the corrupted part; and
forming, by the recipient, the secret from the decrypted secret parts.