CPC H04L 63/062 (2013.01) [G06F 3/0619 (2013.01); G06F 3/0622 (2013.01); G06F 3/0659 (2013.01); G06F 3/0673 (2013.01); G06F 21/53 (2013.01); G06F 21/64 (2013.01); H04L 9/0618 (2013.01); H04L 9/0637 (2013.01); H04L 9/0643 (2013.01); H04L 9/0841 (2013.01); H04L 9/085 (2013.01); H04L 9/0894 (2013.01); H04L 9/14 (2013.01); H04L 9/30 (2013.01); H04L 9/3221 (2013.01); H04L 9/3226 (2013.01); H04L 9/3242 (2013.01); H04L 63/061 (2013.01); H04L 9/50 (2022.05); H04L 2209/46 (2013.01); H04L 2209/56 (2013.01)] | 12 Claims |
1. A method including:
at rewrite circuitry:
receiving a first portion of a key secret via a key secret exchange protocol;
combining the first portion with at least a second or a third portion of the key secret to obtain the key secret; and
using the key secret, performing at least a validity-preserving rewrite to a selected block of a data-tamper-protected blockchain, wherein the validity-preserving rewrite is implemented by substituting the selected block with a second block with different data content that produces the same or an equivalent integrity output.
|