Verification Key

Each registered user has an independent private storage space, which is embodied in the form of a private contract; the user must perform signature verification every time the user reads and writes th

  1. Get the vault-name and password entered by the user;

  2. Perform SHA512&KECCAK256 hash operations on vault-name and password respectively to get H1, H2;

  3. Use H1 and H2 as verifiable random parameters to obtain a 32-byte verifiable random string, denoted as salt;

  4. Use salt and H1+H2 as the entry parameters of the scrypt algorithm [RFC 7914], perform slow hash processing, and finally get the string S;

  5. Obtain the SHA512 value of S, which is the initialization entropy of the final generated verification key pair;

Last updated