首页>
外国专利>
SELECTING AND SECURING PROOF DELGATES FOR CRYPTOGRAPHIC FUNCTIONS
SELECTING AND SECURING PROOF DELGATES FOR CRYPTOGRAPHIC FUNCTIONS
展开▼
机译:密码功能的证明代表选择和处理
展开▼
页面导航
摘要
著录项
相似文献
摘要
The disclosed technology is generally directed to cryptographic functions for smart contracts. In one example of the technology, a request for cryptographic resources is received. The request for cryptographic resources includes a binding identity (ID). Cryptographic resources are fetched from at least one cryptographic resource pool of a plurality of cryptographic resource pools responsive to the request for cryptographic resources. Separate cryptographic resource pools of the plurality of cryptographic resource pools are pools of separate types of cryptographic resources. Which type of proof delegate code is suitable for each fetched cryptographic resource is determined. For each fetched cryptographic resource, the determined type of proof delegate code is injected into the fetched cryptographic resource.
展开▼