Verification Key
Each registered user has an independent private storage space, which is embodied in the form of a private contract; the user must perform signature verification every time the user reads and writes th
Get the vault-name and password entered by the user;
Perform SHA512&KECCAK256 hash operations on vault-name and password respectively to get H1, H2;
Use H1 and H2 as verifiable random parameters to obtain a 32-byte verifiable random string, denoted as salt;
Use salt and H1+H2 as the entry parameters of the scrypt algorithm [RFC 7914], perform slow hash processing, and finally get the string S;
Obtain the SHA512 value of S, which is the initialization entropy of the final generated verification key pair;
Last updated