Litho
  • Lithosphere
  • Abstract
  • Design Concept
  • Design Objectives
  • Smart Contracts & Decentralized Finance (DeFi)
  • Positioning
  • Lithosphere Architecture and Technology
  • Myriad Distributed Key Management (MDKM)
  • Threshold signature
  • Litho Coin
  • LAX – Algorithmic Stablecoin
  • Consensus Mechanism
  • Cross-Chain Integration
  • Cross-Chain Transactions
  • Deep Neural Networks (DNN)
  • LEP100 Multi-chain Token Standard
  • Validators
  • Linear-communication BFT Consensus
  • Myriad Distributed Key Management
  • LEP100 Token Standard
  • Why should your DeFi project use the LEP100 Token Standard?
  • LEP100 Token Features
  • Verification Nodes
  • Locked Account Generation Scheme
    • Introduction
    • General Nodes
    • Design Description
    • Scheme Generation
    • Advantages
      • Easy Integration and Efficient Data Storage
      • Smart Contract Token Transaction Anonymity
      • Fully Decentralized without Third-Party Participation
      • Secure and stable
      • One-Time Account System
      • Ring Signature Scheme
      • Cryptography Based Security Guarantee
      • Smart Contracts
        • Contract multi-triggering mechanism Diversity of triggering conditions
        • Enhancements and compatibility
        • Contract enclosed call
        • Contract development
        • Timing and trigger conditions
        • Rapid development and interface
        • To use multiple triggers to realize complex financial functions
  • Community operation plan
  • Project promotion method
  • A movement to Promote Blockchain Technology
  • The Standardization of Blockchain Interfaces Movement
  • Lithosphere Applications
  • Current Lithosphere Features
    • Lithosphere Products
    • Lithosphere Project Governance
    • Funding for the project
  • Roadmap
  • Conclusion
  • Disclaimer
  • Glossary
Powered by GitBook
On this page
  1. Locked Account Generation Scheme

Design Description

Step 1: Choose a safe random number.

On Lithosphere, there are n validators known as P1……Pn. Each validator chooses a safe random integer di as well as a k-degree polynomial fi (x)=di+ai,1 x++ai,k-1xk-1. The technique delivers fi (j) to other validators through a secure channel and broadcasts di G to every network node, with G being the elliptic curve’s base point.

Step 2: Verify that the messages are proper.

Pj will examine the messages’ correctness after receiving messages from other validators: lag=Check(f1 (j),……,fn (j)) lag=Check(f1 (j),. ,fn (j)) lag=Check(f1 Pj accepts and stores it locally if flag=true. If flag=false, Pj rejects the message and needs other validators to resubmit it.

Step 3: You will be given a key to distribute.

When all messages have been delivered and checked out, each validator receives their key share as

follows: fj(k),k=1,……,n key sharek=(j=1) fj(k),k=1,…..,n

Step 4: Determine the Locked Account’s address.

Locked Account Address=GenerateAddress(d1 G,…..,dn G) n Any activity on the Locked Account will

necessitate the involvement of at least k of n validators.

PreviousGeneral NodesNextScheme Generation

Last updated 3 years ago