检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Encrypt the private keys in the downloaded certificates for storage. A peer certificate is used for performing management operations within a channel. Encrypt the private keys in the downloaded certificates for storage.
They are owned by the data owner and are used to encrypt data and generate a user (data applicant) key. User key: A data applicant applies to data owners for a user key after submitting a set of attributes to the data user.
If sensitive data needs to be transmitted or stored, encrypt data before transmission or storage. Figure 1 Procedure for using BCS Register an account. Register an account. Manage permissions. Create a user and grant BCS permissions. Deploy an instance.
Encrypt the private keys in the downloaded certificates for storage. Prerequisites An ECS has been created. For more information on how to create ECSs, see Elastic Cloud Server User Guide.
Balance string Initial balance Yes Processing Invoking the ValidateInitBalance API to verify the validity of the balance range for endorsement PubKey := string(args[0]) BalanceInfo := string(args[1]) //PubKey := string(args[2]) hashPubkey, err := t.calcAddr(PubKey) logger.Debug("encrypt
During the money transfer transaction, the public key of the payer is used to encrypt the transaction data to protect privacy.
GenerateKey API prototype func GenerateKey(pwd string) (privKeyStr string, pubKeyStr string, err error) Function description Generating a key pair for homomorphic encryption Input Parameter Type Description Mandatory pwd string Used to encrypt the generated private keychain used for
compression is enabled. 0: disabled; 1: enabled. x-bcs-signature-sign: To ensure that only authorized invocation entities can invoke chaincodes, the user private key (downloaded by following instructions in Downloading the User Certificate) and the ECDSA encryption method must be used to encrypt
Figure 2 Transaction records Transferring Private Keys in Memory Encrypt the private key file, decrypt it in the demo, and transfer it to Fabric SDK.
root/gosdkdemo/src is used as an example. replace github.com/hyperledger/fabric-sdk-go => /root/gosdkdemo/src/github.com/hyperledger/fabric-sdk-go Find the main.go file in the gosdkdemo/src directory and run the following command: go run main.go Transferring Private Keys in Memory Encrypt