CN106487801A - Information Authentication method and device based on block chain - Google Patents

Information Authentication method and device based on block chain Download PDF

Info

Publication number
CN106487801A
CN106487801A CN201610971223.1A CN201610971223A CN106487801A CN 106487801 A CN106487801 A CN 106487801A CN 201610971223 A CN201610971223 A CN 201610971223A CN 106487801 A CN106487801 A CN 106487801A
Authority
CN
China
Prior art keywords
information
signature
checking
block chain
invalid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610971223.1A
Other languages
Chinese (zh)
Other versions
CN106487801B (en
Inventor
汪德嘉
郭宇
王少凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Payegis Technology Co Ltd
Original Assignee
Jiangsu Payegis Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Payegis Technology Co Ltd filed Critical Jiangsu Payegis Technology Co Ltd
Priority to CN201610971223.1A priority Critical patent/CN106487801B/en
Publication of CN106487801A publication Critical patent/CN106487801A/en
Application granted granted Critical
Publication of CN106487801B publication Critical patent/CN106487801B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Abstract

The embodiment of the present application discloses a kind of Information Authentication method and device based on block chain, and it belongs to identity identification technical field.The method includes:Corresponding effective signing messages is generated according to information to be verified, effective signing messages is stored in block chain;Corresponding invalid signature information is generated according to information to be verified, by invalid signature information Store in block chain;Receive the checking request message that checking node generates according to effective signing messages of storage in block chain or invalid signature information;Checking request message is verified, according to the result to checking node return information efficient message or information invalid message.As can be seen here, the Information Authentication mode in the embodiment of the present application can take into account safety and the privacy of information.

Description

Information Authentication method and device based on block chain
Technical field
The invention relates to identity identification technical field, more particularly, to the Information Authentication method based on block chain and dress Put.
Background technology
With the arrival of information age, increasing information needs to be propagated by the Internet.In order to interconnection The bulk information propagated in net is verified, digital signature technology just arises at the historic moment.Digital signature is also referred to as digital signature, electricity Sub- stamped signature or electronic signature, it is one of core technology of information security, is mainly used in substituting traditional life in network activity In handwritten signature and traditional seal.Information Authentication function can preferably be realized using digital signature technology.But, due to number Word signature is easy to be accurately reproduced over time, therefore, when substituting the written signature of private data with digital signature, the four of signed copy Meaning propagates the leakage easilying lead to private data, and data safety is threatened.And, digital signature is once quilt malice is pseudo- Make, then signer can be brought with immeasurable loss.
In order to improve the safety of digital signature further, propose one kind in prior art and record letter using block chain Breath and its mode of signature.In this kind of mode, after information publisher is digitally signed to information, information and its signature are deposited Store up in block chain, thus being difficult to distort using block chain, safe advantage lifts the safety of information Store.
But, inventor finds during realizing the present invention, and mode of the prior art at least has following problems: Come into the open because block chain has, therefore, all network nodes accessing block chain can have access to information and issue Information and its signature that person issues, therefore, it is impossible to ensure the safety of private data, for example, once being disclosed in block chain Information and its signature are maliciously forged, then can bring massive losses to information publisher.As can be seen here, needing one kind at present badly can Take into account the safety of information and the Information Authentication mode of privacy.
Content of the invention
In view of the above problems it is proposed that the embodiment of the present application so as to provide a kind of solve the above problems based on block chain Information Authentication method and device.
A kind of one side according to the embodiment of the present application, there is provided Information Authentication method based on block chain, including:Root Generate corresponding effective signing messages according to information to be verified, effective signing messages is stored in block chain;According to letter to be verified Breath generates corresponding invalid signature information, by invalid signature information Store in block chain;Receive checking node according to block chain Effective signing messages of middle storage or the checking request message of invalid signature information generation;Checking request message is verified, According to the result to checking node return information efficient message or information invalid message.
A kind of other side according to the embodiment of the present application, there is provided Information Authentication device based on block chain, including: Effectively signature blocks, for generating corresponding effective signing messages according to information to be verified, effective signing messages are stored to area In block chain;Invalid signature module, for generating corresponding invalid signature information according to information to be verified, invalid signature information is deposited Store up in block chain;Message reception module, for receiving checking node according to effective signing messages of storage in block chain or nothing The checking request message that effect signing messages generates;Information authentication module, for verifying to checking request message, according to checking Result is to checking node return information efficient message or information invalid message.
The embodiment of the present application provide a kind of based in the Information Authentication method and device of block chain, can be directed to be tested Card information generates effective signing messages and invalid signature information respectively, thus effective signing messages and invalid signature information are mixed Miscellaneous store in block chain.Thus one, on the one hand, the purpose of fascination user can be reached, thus the private of effective protection data Close property;On the other hand, the information to be verified in the embodiment of the present application is stored by block chain, being capable of effectively utilizes block chain Be difficult to distort, the distinguishable conscientious puppet of authentication that the information in safe advantage, and, block chain needs through signer, Thus improving safety during Information Authentication further.As can be seen here, the Information Authentication mode in the embodiment of the present application can Take into account safety and the privacy of information.
Described above is only the general introduction of the embodiment of the present application technical scheme, in order to better understand the embodiment of the present application Technological means, and can be practiced according to the content of description, and in order to allow above and other mesh of the embodiment of the present application , feature and advantage can become apparent, below especially exemplified by the specific embodiment of the application.
Brief description
The picture that one or more embodiments are passed through in corresponding accompanying drawing is illustrative, these exemplary theorys Bright do not constitute the restriction to embodiment, the element in accompanying drawing with same reference numbers label is expressed as similar element, removes Non- have special statement, and composition does not limit the figure in accompanying drawing.
Fig. 1 is a kind of flow chart of Information Authentication method based on block chain that the embodiment of the present application one provides;
Fig. 2 is a kind of flow chart of Information Authentication method based on block chain that the embodiment of the present application two provides;
Fig. 3 is a kind of structural representation of Information Authentication device based on block chain that the embodiment of the present application three provides;
Fig. 4 is a kind of structural representation of Information Authentication device based on block chain that the embodiment of the present application four provides.
Specific embodiment
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here Limited.On the contrary, these embodiments are provided to be able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Embodiment one
Fig. 1 is a kind of flow chart of Information Authentication method based on block chain that the embodiment of the present application one provides.As Fig. 1 institute Show, the method includes:
Step S110:Corresponding effective signing messages is generated according to information to be verified, effective signing messages is stored to area In block chain.
Wherein, can flexibly be set according to the mode that information to be verified generates effective signing messages, for example, art technology Personnel can flexibly be signed to really information to be verified using various Digital Signature Algorithms, thus generating and really treating The corresponding effective signing messages of checking information.Specifically, can be signed using undeniable signature algorithm.Due to could not Recognize signature algorithm and must can verify that the true and false, therefore, it is possible to be obviously improved Information Security by signer participant.
In addition, storing in various manners it is also possible to flexibly adopt when effective signing messages is stored block chain, for example, can To be responsible for the packing storage of effective signing messages in block chain by the packing node in block chain;Can also be by effective A.L.S. Breath is broadcast in block chain network, is stored by broadcast mode.
Step S120:Corresponding invalid signature information is generated according to information to be verified, by invalid signature information Store to area In block chain.
Wherein, can also flexibly be set according to the mode that information to be verified generates invalid signature information, for example, a kind of real In existing mode, it is possible to use random algorithm generates a random number, and using this random number as invalid signature information.And for example, exist In another kind of implementation, using various Digital Signature Algorithms, the information to be verified forged can also be signed, thus raw The information to be verified corresponding invalid signature information becoming and forging.In addition, by invalid signature information Store to block chain when, also may be used Stored in various manners with flexibly adopting, for example, it is possible to be responsible for depositing invalid signature information package by the packing node in block chain Store up in block chain;Effective signing messages can also be broadcast in block chain network, be stored by broadcast mode.
In a word, do not limit the concrete generating mode of effective signing messages and invalid signature information in the present embodiment, as long as It is capable of true and false information doping storage, thus confusing the purpose of attacker.
Step S130:Receive checking node to be generated according to effective signing messages of storage in block chain or invalid signature information Checking request message.
Wherein, checking node can be the arbitrary network node being linked in block chain, for example, it may be complete node, Can also be incomplete node, in a word, as long as the network node that can get the storage information in block chain all can be made For verifying node.
After verifying that node gets the effective signing messages storing in block chain or invalid signature information, signed according to effective Name information or invalid signature information generate checking request message, and this checking request message can be generated by various modes, as long as It is capable of the purpose of the checking information true and false.For example, it is possible to by default algorithm to effective signing messages or invalid label Name information enters row operation, and operation result is included in above-mentioned checking request message.
Step S140:Checking request message is verified, is effectively disappeared to checking node return information according to the result Breath or information invalid message.
Specifically, specific implementation checking request message verified flexibly can be set by those skilled in the art Fixed, for example, when comprising by default algorithm, effective signing messages or invalid signature information to be transported in checking request message During the operation result obtaining after calculation, inverse operation can be carried out to this operation result, corresponding original to determine checking request message Signing messages, thus verifying that original signature information is effective signing messages or invalid signature information, and then returns corresponding message.
Wherein, directly the result can be comprised in information efficient message or information invalid message, so that checking node energy Enough directly, rapidly according to information efficient message or information invalid message determine the information true and false;Can also only comprise using about Determine algorithm generation feedback result so that checking node by after this feedback result is processed according to result confirmation letter The breath true and false, thus lift the safety of proof procedure further.
As can be seen here, the embodiment of the present application provide a kind of based in the Information Authentication method of block chain, can be directed to Information to be verified generates effective signing messages and invalid signature information respectively, thus effective signing messages and invalid signature are believed Breath doping storage is in block chain.Thus one, on the one hand, the purpose of fascination user can be reached, thus effective protection data Privacy;On the other hand, the information to be verified in the embodiment of the present application is stored by block chain, being capable of effectively utilizes area Block chain is difficult to distort, the information in safe advantage, and, block chain needs the authentication through signer distinguishable conscientious Puppet, thus improve safety during Information Authentication further.As can be seen here, the Information Authentication mode energy in the embodiment of the present application Enough take into account safety and the privacy of information.
Embodiment two
Fig. 2 is a kind of flow chart of Information Authentication method based on block chain that the embodiment of the present application two provides.As Fig. 2 institute Show, the method includes:
Step S210:Signature node generates corresponding effective signing messages according to information to be verified, by effective signing messages Store in block chain.
Wherein, signature node is one of block chain network node, usually information publisher.In the present embodiment, When signature node generates effective signing messages according to information to be verified, checking information is treated by undeniable signature algorithm and carries out Signature, correspondingly, comprise in effective signing messages the information content of information to be verified, the undeniable signature of information to be verified, And public signature key.Certainly, in addition to individually adopting undeniable signature algorithm, can also using undeniable signature algorithm and its The mode that his signature algorithm (such as Proxy Signature) combines is realized, thus better assuring that the safety of signing messages.
When effective signing messages is stored block chain, firstly generate the transaction in block chain, then will effectively sign Name information writes (for example, it is possible to writing the OP_RETURN part of this transaction) in this transaction, finally broadcasts this transaction To in block chain, so that each network node in block chain all can get the information comprising in this transaction.
Step S220:Signature node generates corresponding invalid signature information according to information to be verified, by invalid signature information Store in block chain.
In order to prevent the leakage of real information, in the present embodiment, signature node generates according to information to be verified further Corresponding invalid signature information, to reach the purpose of fascination attacker.When implementing, can comprise in invalid signature information to treat The information content of checking information, the pseudo- signature of information to be verified and public signature key.Wherein, comprise in invalid signature information The information content of information to be verified can be analog information content corresponding with real information content, that is,:Information content itself is simultaneously Non-genuine is effective, but closely similar with real information content.In addition, the pseudo- signature comprising in invalid signature information can lead to Cross all kinds of modes to realize, as long as can be different from really signing, for example, it is possible to realize by stochastic signature, that is,:By random Algorithm generates a random number, and this random number is signed as the puppet of information to be verified.
In addition, by invalid signature information Store to block chain when, firstly generate another transaction in block chain, then will Invalid signature information writes (for example, it is possible to writing the OP_RETURN part of this transaction) in this transaction, finally hands over this pen Easily it is broadcast in block chain, so that each network node in block chain all can get the information comprising in this transaction.
Step S230:Checking node obtains effective signing messages of storage or invalid signature information in block chain.
Wherein, checking node can be the arbitrary network node being linked in block chain, for example, it may be complete node, It can also be incomplete node.Checking node can get effective signature by way of obtaining the transaction record in block chain Information or invalid signature information.For the ease of description, hereafter effective signing messages and invalid signature information are referred to as to be verified Signing messages.
Step S240:Checking node generates and sends checking request message according to signing messages to be verified.
Specifically, because whether effectively checking node itself cannot judge the signing messages to be verified getting, therefore, need To be confirmed by way of interacting with signature node.In the present embodiment, checking request message is generated by following manner: First, checking node analyze signing messages to be verified information content, obtain wherein comprise the information content of information to be verified, The signature (this signature had both been probably true signature is also likely to be pseudo- signature) of information to be verified and public signature key.Then, by with Machine algorithm generates and preserves a random number, using the information content of information to be verified, the signature of information to be verified, public signature key And random number carries out default calculating as parameter, using result of calculation as checking information data, checking information packet is contained It is sent to signature node in checking request message.
Step S250:Signature node receives the checking request message that checking node sends, and wraps according in checking request message The identity information of the checking node containing judges to verify whether node is legitimate node.
Alternatively, in order to prevent the unrelated in a large number malicious behaviors of nodes in block chain from sending checking request message, to expend signature The system resource of node, and prevent the leakage of signing messages, in the present embodiment, signature node pre-set and store legal The identity information of node, legitimate node can be to there is business contact or other network nodes of associating with signature node.Accordingly Ground, in previous step, comprises in the checking request message that checking node sends to verify the identity information of node, at this further In step, according to identity information, signature node judges whether the network node sending checking request message is legitimate node first, If judged result is no, execution step S260;If the determination result is YES, then execution step S270.
Step S260:Return authentication failed message to checking node.
Specifically, when verifying node not legitimate node, signature node is refused as this checking node verification, thus to it Return authentication failed message, the method terminates.
Step S270:Signature node is verified to checking request message, and is returned to checking node according to the result Information efficient message or information invalid message.
Specifically, signature node obtains the checking information data comprising in above-mentioned checking request message, is believed according to this checking The breath corresponding the result of data genaration.For example, signature node obtains the data content comprising in checking information data (such as first The information content of information to be verified mentioned above, the signature of information to be verified, public signature key), then, by this data content with And the information such as information content, signature and public key carries out being verified result after default calculating as parameter.Correspondingly, return This result is comprised, so that checking node is according to this result and above-mentioned in information efficient message or information invalid message The random number preserving in step S240 judges whether information is effective.Accordingly it is also possible to disappear invalid to information efficient message and information Breath is referred to as the result message.Specifically, checking node can be right using information content, signature and random number as parameter The result judges the true and false of information to be verified according to result of calculation after carrying out default calculating.Wherein, checking node is judged When the random number that adopted identical with the random number preserving in step S240, if the random number preserving in step S240 is and information The corresponding random number of effective information, then the random number that checking node is adopted when being judged is also corresponding with information effective information Random number;If the random number preserving in step S240 is random number corresponding with information invalid information, checking node is carried out The random number being adopted during judgement is also random number corresponding with information invalid information.
The tool of the undeniable signature algorithm that in the present embodiment adopt in order to deepen the understanding to the present embodiment, is given below Body signature and verification mode:
1. generation system parameter
If p is a Big prime, and p=2q+1, wherein q are also prime number, and the discrete logarithm in Zp* is difficult to resolve.
Take the element g that the rank in Zp* is q at random, thus the q rank multiplicative subgroup G (i.e. g is the generation unit of G) of construction Zp*,
{ 1,2 ..., q-1 } randomly chooses as SK,
Make PK=gSKMod p,
By PK and p, g is open together as public key, and SK is as the privacy key of signature user.
2. signature process
Information publisher will sign to message m ∈ G, can use its key SK to calculate s=(m)SKMod p, using s as to m's Signature issues other side together with m.But this s in fact cannot be confirmed by other people.
3. indentification protocol:
After recipient receives s and m, select random number k 1, k2 ∈ Zp*, and calculate c=sk1PKk2Mod p, gives label c Name person.
Signer calculates d=c after receiving c(modq)/SKModp, and d is given the recipient of signature.
Recipient calculates t=mk1gk2Can determine that s is a legitimate signature to m when modp, and if only if t=d.
In summary, one aspect of the present invention carrys out storage information using block chain, takes full advantage of the distributed of block chain, no The characteristic easily distorted, on the other hand by way of undeniable signature and doping wrong data, makes the verifier of signature only have Just can determine that whether information is true and whether signature is legal, otherwise cannot determine the true and false of information, effectively with signer interaction Prevent the hidden danger forging a signature.In addition, the mode of doping wrong data makes in the case of not verifying, other users cannot Know which bar information is correct, thus conceal real information.Therefore, in substantial amounts of information data set, by mixing The method of miscellaneous wrong data can effectively disturb other people to know effective information, and using the mode of undeniable signature, signer exists It is selectively other users signature verification, hereby it is ensured that unrelated person cannot know that real information and signature are on block chain No effective.
Embodiment three
Fig. 3 is a kind of structural representation of Information Authentication device based on block chain that the embodiment of the present application three provides.As Described in Fig. 3, this device includes:Effectively signature blocks 310, invalid signature module 320, message reception module 330 and information authentication Module 340.
Effectively signature blocks 310, for generating corresponding effective signing messages according to information to be verified, by effective A.L.S. Breath storage is in block chain.
Wherein, effective signature blocks 310 can flexibly set according to the mode that information to be verified generates effective signing messages, For example, those skilled in the art flexibly can treat checking information using various Digital Signature Algorithms and be signed, thus generating Effective signing messages corresponding with information to be verified.Specifically, can be each using Proxy Signature algorithm, undeniable signature algorithm etc. Class signature algorithm is realized.
In addition, effective signature blocks 310 store during block chain effective signing messages it is also possible to flexibly adopt various sides Formula stores, for example, it is possible to be responsible for the packing storage of effective signing messages in block chain by the packing node in block chain;Also may be used To be broadcast to effective signing messages in block chain network, stored by broadcast mode.
Invalid signature module 320, for generating corresponding invalid signature information according to information to be verified, invalid signature is believed Breath storage is in block chain.
Wherein, invalid signature module 320 can also flexibly set according to the mode that information to be verified generates invalid signature information Fixed, for example, in one implementation, invalid signature module 320 can generate a random number using random algorithm, and should Random number is as invalid signature information.In addition, invalid signature module 320 by invalid signature information Store to block chain when, also may be used Stored in various manners with flexibly adopting, for example, it is possible to be responsible for depositing invalid signature information package by the packing node in block chain Store up in block chain;Effective signing messages can also be broadcast in block chain network, be stored by broadcast mode.
Message reception module 330, for receiving effective signing messages or invalid according to storage in block chain for the checking node The checking request message that signing messages generates.
Wherein, checking node can be the arbitrary network node being linked in block chain, for example, it may be complete node, Can also be incomplete node, in a word, as long as the network node that can get the storage information in block chain all can be made For verifying node.
After verifying that node gets the effective signing messages storing in block chain or invalid signature information, signed according to effective Name information or invalid signature information generate checking request message, and this checking request message can be generated by various modes, as long as It is capable of the purpose of the checking information true and false.For example, it is possible to by default algorithm to effective signing messages or invalid label Name information enters row operation, and operation result is included in above-mentioned checking request message.
Information authentication module 340, for verifying to checking request message, returns to checking node according to the result Information efficient message or information invalid message.
Specifically, specific implementation checking request message verified flexibly can be set by those skilled in the art Fixed, for example, when comprising by default algorithm, effective signing messages or invalid signature information to be transported in checking request message During the operation result obtaining after calculation, inverse operation can be carried out to this operation result, corresponding original to determine checking request message Signing messages, thus verifying that original signature information is effective signing messages or invalid signature information, and then returns corresponding message.
Wherein, directly the result can be comprised in information efficient message or information invalid message, so that checking node energy Enough directly, rapidly according to information efficient message or information invalid message determine the information true and false;Can also only comprise using about Determine algorithm generation feedback result so that checking node by after this feedback result is processed according to result confirmation letter The breath true and false, thus lift the safety of proof procedure further.
The concrete operating principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, no longer superfluous herein State.
As can be seen here, the embodiment of the present application provide a kind of based in the Information Authentication device of block chain, can be directed to Information to be verified generates effective signing messages and invalid signature information respectively, thus effective signing messages and invalid signature are believed Breath doping storage is in block chain.Thus one, on the one hand, the purpose of fascination user can be reached, thus effective protection data Privacy;On the other hand, the information to be verified in the embodiment of the present application is stored by block chain, being capable of effectively utilizes area Block chain is difficult to distort, the information in safe advantage, and, block chain needs the authentication through signer distinguishable conscientious Puppet, thus improve safety during Information Authentication further.As can be seen here, the Information Authentication device energy in the embodiment of the present application Enough take into account safety and the privacy of information.
Example IV
Fig. 4 is a kind of structural representation of Information Authentication device based on block chain that the embodiment of the present application four provides.As Shown in Fig. 4, this device includes:Effectively signature blocks 410, invalid signature module 420, message reception module 430 and information authentication Module 440.Wherein, information authentication module 440 further includes:Judging submodule 441 and checking submodule 442.
Effectively signature blocks 410, for generating corresponding effective signing messages according to information to be verified, by effective A.L.S. Breath storage is in block chain.
In the present embodiment, when effective signature blocks 410 generate effective signing messages according to information to be verified, by can not Denial of signature algorithm is treated checking information and is signed, and correspondingly, comprises in the information of information to be verified in effective signing messages Appearance, the undeniable signature of information to be verified and public signature key.Certainly, in addition to undeniable signature algorithm, can also adopt Other signature algorithms such as Proxy Signature are realized, thus better assuring that the safety of signing messages.
When effectively effective signing messages is stored block chain by signature blocks 410, firstly generate a friendship in block chain Easily, then effective signing messages is write (for example, it is possible to writing the OP_RETURN part of this transaction) in this transaction, Afterwards this transaction is broadcast in block chain, each network node in block chain all can get in this transaction to comprise Information.
Invalid signature module 420, for generating corresponding invalid signature information according to information to be verified, invalid signature is believed Breath storage is in block chain.
In order to prevent the leakage of real information, in the present embodiment, invalid signature module 420 generates according to information to be verified Corresponding invalid signature information, to reach the purpose of fascination attacker.When implementing, can comprise in invalid signature information to treat The information content of checking information, the pseudo- signature of information to be verified and public signature key.Wherein, comprise in invalid signature information The information content of information to be verified can be analog information content corresponding with real information content, that is,:Information content itself is simultaneously Non-genuine is effective, but closely similar with real information content.In addition, the pseudo- signature comprising in invalid signature information can lead to Cross all kinds of modes to realize, as long as can be different from really signing, for example, it is possible to realize by stochastic signature, that is,:By random Algorithm generates a random number, and this random number is signed as the puppet of information to be verified.
In addition, invalid signature module 420 by invalid signature information Store to block chain when, firstly generate another in block chain One transaction, then writes in this transaction invalid signature information (for example, it is possible to write the OP_RETURN portion of this transaction Point), finally this transaction is broadcast in block chain, so that each network node in block chain all can get this transaction In the information that comprises.
Message reception module 430, for receiving effective signing messages or invalid according to storage in block chain for the checking node The checking request message that signing messages generates.
Wherein, checking node can be the arbitrary network node being linked in block chain, for example, it may be complete node, It can also be incomplete node.Checking node can get effective signature by way of obtaining the transaction record in block chain Information or invalid signature information.For the ease of description, hereafter effective signing messages and invalid signature information are referred to as to be verified Signing messages.
Because whether effectively checking node itself cannot judge the signing messages to be verified getting, accordingly, it would be desirable to pass through The mode being interacted with signature node is confirmed.In the present embodiment, checking request message is generated by following manner:First, Checking node analyzes the information content of signing messages to be verified, obtains the information content of information to be verified, to be tested wherein comprising The signature (this signature had both been probably true signature is also likely to be pseudo- signature) of card information and public signature key.Then, calculated by random Method generates and preserves a random number, using the information content of information to be verified, the signature of information to be verified, public signature key and Random number carries out default calculating as parameter, using result of calculation as checking information data, checking information data is included in and tests It is sent to signature node in card request message.
Information authentication module 440, for verifying to checking request message, returns to checking node according to the result Information efficient message or information invalid message.
Specifically, when verifying the identity information comprising checking node in the checking request message that node sends further, Information authentication module 440 further includes:
Judging submodule 441, for judging to verify whether node is legitimate node according to the identity information of checking node.Its In, in order to prevent the unrelated in a large number malicious behaviors of nodes in block chain from sending checking request message, to expend the system money of signature node Source, and prevent the leakage of signing messages, in the present embodiment, judging submodule 441 pre-sets and stores legitimate node Identity information, legitimate node can be to there is business contact or other network nodes of associating with signature node.Judging submodule According to identity information, 441 can judge whether the network node sending checking request message is legitimate node.
Checking submodule 442, for when judged result is to be, verifying to checking request message, and according to checking Result is to checking node return information efficient message or information invalid message;When judged result for no when, to checking node return Authentication failed message.
Specifically, when verifying node not legitimate node, checking submodule 442 is refused as this checking node verification, from And returning authentication failed message to it, the method terminates.
When verifying that node is legitimate node, checking submodule 442 obtains the checking comprising in above-mentioned checking request message Information data, according to this corresponding the result of checking information data genaration.For example, checking submodule 442 obtains checking first Data content (the information content of information to be verified, the signature of information to be verified, the label as mentioned above comprising in information data Name public key), then, the information such as this data content and information content, signature and public key is carried out default calculating as parameter After be verified result.Correspondingly, comprise this result, for testing in the information efficient message of return or information invalid message According to the random number preserving in this result and message reception module 430, card node judges whether information is effective.Therefore, Information efficient message and information invalid message can be referred to as the result message.Specifically, checking node can be by information Content, signature and random number, as parameter, judge letter to be verified according to result of calculation after the result is carried out with default calculating The true and false of breath.Wherein, the random number preserving in the random number that checking node is adopted when being judged and message reception module 430 Identical, if the random number preserving in message reception module 430 is random number corresponding with information effective information, checking node enters The random number that row is adopted when judging is also random number corresponding with information effective information;If preserving in message reception module 430 Random number be random number corresponding with information invalid information, then the random number that checking node is adopted when being judged be also with The corresponding random number of information invalid information.
The concrete operating principle of above-mentioned modules can refer to the description of corresponding steps in embodiment of the method, no longer superfluous herein State.
In summary, one aspect of the present invention carrys out storage information using block chain, takes full advantage of the distributed of block chain, no The characteristic easily distorted, on the other hand by way of undeniable signature and doping wrong data, makes the verifier of signature only have Just can determine that whether information is true and whether signature is legal, otherwise cannot determine the true and false of information, effectively with signer interaction Prevent the hidden danger forging a signature.In addition, the mode of doping wrong data makes in the case of not verifying, other users cannot Know which bar information is correct, thus conceal real information.Therefore, in substantial amounts of information data set, by mixing The method of miscellaneous wrong data can effectively disturb other people to know effective information, and using the mode of undeniable signature, signer exists It is selectively other users signature verification, hereby it is ensured that unrelated person cannot know that real information and signature are on block chain No effective.
Although additionally, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments Including some features rather than further feature, but the combination of the feature of different embodiment means to be in the embodiment of the present application Within the scope of and form different embodiments.For example, in the following claims, embodiment required for protection One of arbitrarily can in any combination mode using.
The all parts embodiment of the embodiment of the present application can be realized with hardware, or with one or more processor The software module of upper operation is realized, or is realized with combinations thereof.It will be understood by those of skill in the art that can be in practice Middle realized according to some in the device of the embodiment of the present application using microprocessor or digital signal processor (DSP) or All some or all functions of part.The embodiment of the present application is also implemented as executing method as described herein Some or all equipment or program of device (for example, computer program and computer program).Such realization The program of the embodiment of the present application can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or with any other shape Formula provides.
It should be noted that above-described embodiment illustrates rather than to the embodiment of the present application carrying out to the embodiment of the present application Limit, and those skilled in the art can design alternative embodiment without departing from the scope of the appended claims. In the claims, any reference markss between bracket should not be configured to limitations on claims.Word " bag Contain " do not exclude the presence of element not listed in the claims or step.Word "a" or "an" before element is not arranged Remove and there are multiple such elements.The embodiment of the present application can by means of the hardware including some different elements and by means of Properly programmed computer is realizing.If in the unit claim listing equipment for drying, several in these devices can To be to be embodied by same hardware branch.The use of word first, second, and third does not indicate that any order. These words can be construed to title.
The invention discloses:A1, a kind of Information Authentication method based on block chain, wherein, including:
Corresponding effective signing messages is generated according to information to be verified, described effective signing messages is stored block chain In;
Corresponding invalid signature information is generated according to described information to be verified, by described invalid signature information Store to described In block chain;
Receive checking node according to testing that effective signing messages of storage in described block chain or invalid signature information generate Card request message;
Described checking request message is verified, according to the result to described checking node return information efficient message Or information invalid message.
A2, the method according to A1, wherein, described checking request message includes:The identity letter of described checking node Breath, then described described checking request message is verified, according to the result to described checking node return information effectively disappear The step of breath or information invalid message specifically includes:
Judge whether described checking node is legitimate node according to the identity information of described checking node;
When judged result is to be, described checking request message is verified, and according to the result to described checking Node return information efficient message or information invalid message.
A3, the method according to A2, wherein, when judged result for no when, to described checking node return authentication failed Message.
A4, according to the arbitrary described method of A1-A3, wherein, described effective signing messages includes:Described information to be verified Information content, the true signature of described information to be verified and public signature key;
Described invalid signature information includes:The information content of described information to be verified, the pseudo- signature of described information to be verified, And public signature key.
A5, the method according to A4, wherein, described true signature includes undeniable signature, described pseudo- sign include with Claim tag name.
A6, the method according to A4 or A5, wherein, comprise checking information data in described checking request message, and institute State checking information data combining or described invalid signature information and random number by described effective signing messages and random number Combination determines;
Then the described step that checking request message is verified specifically includes:Obtain in described checking request message and comprise Checking information data, corresponding the result is generated according to described checking information data and described effective signing messages;
And, comprise described the result in described information efficient message or information invalid message, for described checking section According to described the result and described random number, point judges whether information is effective.
A7, according to the arbitrary described method of A1-A6, wherein, described described effective signing messages is stored in block chain Step specifically include:Described effective signing messages is write the first transaction record, and described first transaction record is broadcast to In described block chain;
The described step by described invalid signature information Store in block chain specifically includes:By described invalid signature information Write the second transaction record, and described second transaction record is broadcast in described block chain.
The invention also discloses:B8, a kind of Information Authentication device based on block chain, wherein, including:
Effectively signature blocks, for generating corresponding effective signing messages according to information to be verified, by described effective signature Information Store is in block chain;
Invalid signature module, for corresponding invalid signature information is generated according to described information to be verified, will be described invalid Signing messages stores in described block chain;
Message reception module, for receiving effective signing messages or invalid according to storage in described block chain for the checking node The checking request message that signing messages generates;
Information authentication module, for verifying to described checking request message, according to the result to described checking section Point return information efficient message or information invalid message.
B9, the device according to B8, wherein, described checking request message includes:The identity letter of described checking node Breath, then described information authentication module specifically includes:
According to the identity information of described checking node, judging submodule, for judging whether described checking node is legal section Point;
Checking submodule, for when judged result is to be, verifying to described checking request message, and according to checking Result is to described checking node return information efficient message or information invalid message.
B10, the device according to B9, wherein, when the judged result of described judging submodule is no, described checking Module returns authentication failed message to described checking node.
B11, according to the arbitrary described device of B8-B10, wherein, described effective signing messages includes:Described information to be verified Information content, the true signature of described information to be verified and public signature key;
Described invalid signature information includes:The information content of described information to be verified, the pseudo- signature of described information to be verified, And public signature key.
B12, the device according to B11, wherein, described true signature includes undeniable signature, and described pseudo- signature includes Stochastic signature.
B13, the device according to B11 or B12, wherein, comprise checking information data in described checking request message, and Described checking information data is combined or described invalid signature information and random number by described effective signing messages and random number Combination determine;
Then described information authentication module specifically for:Obtain the checking information data comprising in described checking request message, Corresponding the result is generated according to described checking information data and described effective signing messages;
And, comprise described the result in described information efficient message or information invalid message, for described checking section According to described the result and described random number, point judges whether information is effective.
B14, according to the arbitrary described device of B8-B13, wherein, described effective signature blocks specifically for:Will be described effective Signing messages writes the first transaction record, and described first transaction record is broadcast in described block chain;
Described invalid signature module specifically for:Described invalid signature information is write the second transaction record, and will be described Second transaction record is broadcast in described block chain.

Claims (10)

1. a kind of Information Authentication method based on block chain is it is characterised in that include:
Corresponding effective signing messages is generated according to information to be verified, described effective signing messages is stored in block chain;
Corresponding invalid signature information is generated according to described information to be verified, by described invalid signature information Store to described block In chain;
Receiving checking node please according to the checking that effective signing messages of storage in described block chain or invalid signature information generate Seek message;
Described checking request message is verified, according to the result to described checking node return information efficient message or letter Breath invalid message.
2. method according to claim 1 is it is characterised in that described checking request message includes:Described checking node Identity information, then described described checking request message is verified, according to the result to described checking node return letter The step of breath efficient message or information invalid message specifically includes:
Judge whether described checking node is legitimate node according to the identity information of described checking node;
When judged result is to be, described checking request message is verified, and according to the result to described checking node Return information efficient message or information invalid message.
3. method according to claim 2 it is characterised in that when judged result for no when, to described checking node return Authentication failed message.
4. according to the arbitrary described method of claim 1-3 it is characterised in that described effective signing messages includes:Described to be tested The information content of card information, the true signature of described information to be verified and public signature key;
Described invalid signature information includes:The information content of described information to be verified, the pseudo- signature of described information to be verified and Public signature key.
5. method according to claim 4 it is characterised in that described true signature includes undeniable signature, sign by described puppet Name includes stochastic signature.
6. the method according to claim 4 or 5 is it is characterised in that comprise checking information number in described checking request message According to, and described checking information data by described effective signing messages and random number combine or described invalid signature information with The combination of machine number determines;
Then the described step that checking request message is verified specifically includes:Obtain testing of comprising in described checking request message Card information data, generates corresponding the result according to described checking information data and described effective signing messages;
And, comprise described the result in described information efficient message or information invalid message, for described checking node root Judge whether information is effective according to described the result and described random number.
7. according to the arbitrary described method of claim 1-6 it is characterised in that described store area by described effective signing messages Step in block chain specifically includes:Described effective signing messages is write the first transaction record, and by described first transaction record It is broadcast in described block chain;
The described step by described invalid signature information Store in block chain specifically includes:Described invalid signature information is write Second transaction record, and described second transaction record is broadcast in described block chain.
8. a kind of Information Authentication device based on block chain is it is characterised in that include:
Effectively signature blocks, for generating corresponding effective signing messages according to information to be verified, by described effective signing messages Store in block chain;
Invalid signature module, for generating corresponding invalid signature information according to described information to be verified, by described invalid signature Information Store is in described block chain;
Message reception module, for receiving checking node according to effective signing messages of storage or invalid signature in described block chain The checking request message that information generates;
Information authentication module, for verifying to described checking request message, returns to described checking node according to the result Write in reply and cease efficient message or information invalid message.
9. device according to claim 8 is it is characterised in that described checking request message includes:Described checking node Identity information, then described information authentication module specifically include:
According to the identity information of described checking node, judging submodule, for judging whether described checking node is legitimate node;
Checking submodule, for when judged result is to be, verifying to described checking request message, and according to the result To described checking node return information efficient message or information invalid message.
10. device according to claim 9 it is characterised in that when described judging submodule judged result be no when, institute State checking submodule and return authentication failed message to described checking node.
CN201610971223.1A 2016-11-03 2016-11-03 Information Authentication method and device based on block chain Active CN106487801B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610971223.1A CN106487801B (en) 2016-11-03 2016-11-03 Information Authentication method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610971223.1A CN106487801B (en) 2016-11-03 2016-11-03 Information Authentication method and device based on block chain

Publications (2)

Publication Number Publication Date
CN106487801A true CN106487801A (en) 2017-03-08
CN106487801B CN106487801B (en) 2019-10-11

Family

ID=58271491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610971223.1A Active CN106487801B (en) 2016-11-03 2016-11-03 Information Authentication method and device based on block chain

Country Status (1)

Country Link
CN (1) CN106487801B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789095A (en) * 2017-03-30 2017-05-31 腾讯科技(深圳)有限公司 Distributed system and message treatment method
CN107194008A (en) * 2017-06-19 2017-09-22 无锡井通网络科技有限公司 A kind of distributed system quickly updates verification method
CN108280358A (en) * 2018-02-12 2018-07-13 北京金山安全软件有限公司 Information reminding method and device and electronic equipment
CN108734018A (en) * 2018-05-21 2018-11-02 北京京东尚科信息技术有限公司 authentication method, device, system and computer readable storage medium
CN109194466A (en) * 2018-10-29 2019-01-11 南开大学 A kind of cloud data integrity detection method and system based on block chain
CN109428722A (en) * 2017-08-30 2019-03-05 上海策赢网络科技有限公司 A kind of content delivery method and device
WO2019061627A1 (en) * 2017-09-26 2019-04-04 武汉斗鱼网络科技有限公司 Data verification method, and server
CN109635595A (en) * 2018-12-29 2019-04-16 杭州趣链科技有限公司 A kind of data tamper resistant method based on block chain
CN109685027A (en) * 2018-12-28 2019-04-26 福建工程学院 A kind of new added road recognition methods and system based on block chain technology
WO2019100864A1 (en) * 2017-11-23 2019-05-31 阿里巴巴集团控股有限公司 Data processing method and apparatus
CN110020513A (en) * 2018-11-07 2019-07-16 阿里巴巴集团控股有限公司 Signature recording method, verification method, device and storage medium
CN110223089A (en) * 2019-06-14 2019-09-10 厦门历思科技服务有限公司 A kind of credit identity authentication approach and system and equipment
CN110232764A (en) * 2019-05-16 2019-09-13 暨南大学 Anonymous Electronic Voting method and system based on block chain
CN110622490A (en) * 2017-03-09 2019-12-27 M·S·古尔布兰德森 Core network access provider
CN110971413A (en) * 2019-06-20 2020-04-07 腾讯科技(深圳)有限公司 Random number generation method, random number generation device and storage medium
CN112243008A (en) * 2020-10-16 2021-01-19 中国联合网络通信集团有限公司 Data management method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678182A (en) * 2015-12-29 2016-06-15 布比(北京)网络技术有限公司 Method and apparatus for data operation controlling
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN106022775A (en) * 2016-05-13 2016-10-12 邓迪 File signature method and system based on block chains

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678182A (en) * 2015-12-29 2016-06-15 布比(北京)网络技术有限公司 Method and apparatus for data operation controlling
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN106022775A (en) * 2016-05-13 2016-10-12 邓迪 File signature method and system based on block chains

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110622490A (en) * 2017-03-09 2019-12-27 M·S·古尔布兰德森 Core network access provider
CN106789095A (en) * 2017-03-30 2017-05-31 腾讯科技(深圳)有限公司 Distributed system and message treatment method
CN106789095B (en) * 2017-03-30 2020-12-08 腾讯科技(深圳)有限公司 Distributed system and message processing method
CN107194008B (en) * 2017-06-19 2019-07-16 无锡井通网络科技有限公司 A kind of distributed system quickly updates verification method
CN107194008A (en) * 2017-06-19 2017-09-22 无锡井通网络科技有限公司 A kind of distributed system quickly updates verification method
CN109428722A (en) * 2017-08-30 2019-03-05 上海策赢网络科技有限公司 A kind of content delivery method and device
WO2019061627A1 (en) * 2017-09-26 2019-04-04 武汉斗鱼网络科技有限公司 Data verification method, and server
US10931684B2 (en) 2017-11-23 2021-02-23 Advanced New Technologies Co., Ltd. Data processing method and apparatus
WO2019100864A1 (en) * 2017-11-23 2019-05-31 阿里巴巴集团控股有限公司 Data processing method and apparatus
US11108786B2 (en) 2017-11-23 2021-08-31 Advanced New Technologies Co., Ltd. Data processing method and apparatus
CN108280358A (en) * 2018-02-12 2018-07-13 北京金山安全软件有限公司 Information reminding method and device and electronic equipment
CN108734018A (en) * 2018-05-21 2018-11-02 北京京东尚科信息技术有限公司 authentication method, device, system and computer readable storage medium
CN109194466A (en) * 2018-10-29 2019-01-11 南开大学 A kind of cloud data integrity detection method and system based on block chain
CN109194466B (en) * 2018-10-29 2021-07-06 南开大学 Block chain-based cloud data integrity detection method and system
CN110020513A (en) * 2018-11-07 2019-07-16 阿里巴巴集团控股有限公司 Signature recording method, verification method, device and storage medium
CN110020513B (en) * 2018-11-07 2023-08-22 创新先进技术有限公司 Signature recording method, signature verification device and storage medium
CN109685027A (en) * 2018-12-28 2019-04-26 福建工程学院 A kind of new added road recognition methods and system based on block chain technology
CN109635595A (en) * 2018-12-29 2019-04-16 杭州趣链科技有限公司 A kind of data tamper resistant method based on block chain
CN110232764A (en) * 2019-05-16 2019-09-13 暨南大学 Anonymous Electronic Voting method and system based on block chain
CN110232764B (en) * 2019-05-16 2021-09-21 暨南大学 Anonymous electronic voting method and system based on block chain
CN110223089A (en) * 2019-06-14 2019-09-10 厦门历思科技服务有限公司 A kind of credit identity authentication approach and system and equipment
CN110971413A (en) * 2019-06-20 2020-04-07 腾讯科技(深圳)有限公司 Random number generation method, random number generation device and storage medium
CN112243008A (en) * 2020-10-16 2021-01-19 中国联合网络通信集团有限公司 Data management method and device
CN112243008B (en) * 2020-10-16 2023-06-02 中国联合网络通信集团有限公司 Data management method and device

Also Published As

Publication number Publication date
CN106487801B (en) 2019-10-11

Similar Documents

Publication Publication Date Title
CN106487801A (en) Information Authentication method and device based on block chain
CN106533696B (en) Identity identifying method, certificate server and user terminal based on block chain
Stallings Cryptography and network security, 4/E
ES2308725T3 (en) QUESTION-ANSWER SIGNS AND SECURITY PROTOCOLS OF DIFFIE-HELLMAN.
William Cryptography and network security: For VTU
Ellison Ceremony design and analysis
CN106453407A (en) Identity authentication method based on block chain, authentication server and user terminal
CN106506146A (en) Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN106330838B (en) A kind of dynamic signature method and the client and server using this method
CN104199657B (en) The call method and device of open platform
CN106897761A (en) A kind of two-dimensional code generation method and device
CN107508681A (en) Block chain cryptographic key protection method and device
CN105610872B (en) Internet-of-things terminal encryption method and internet-of-things terminal encryption device
Alhaidary et al. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol
Armour et al. Substitution attacks against message authentication
CN110401540A (en) A kind of threshold group signatures method that verification can be disclosed based on block chain
CN109543458A (en) A kind of prescription data method of calibration, equipment and server based on block chain
Diaz et al. A formal methodology for integral security design and verification of network protocols
Bella Inductive verification of smart card protocols
CN101668009B (en) Method and system for safely processing routing address
CN111277414A (en) Distributed public key generation method and device based on RSA algorithm and intelligent contract
Older et al. Formal methods for assuring security of protocols
CN107026729B (en) Method and device for transmitting software
Rowe et al. Deception in cyber attacks
Tan et al. Securing password authentication for web-based applications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 3F301, C2 Building, Suzhou 2.5 Industrial Park, 88 Dongchang Road, Suzhou Industrial Park, Jiangsu Province

Applicant after: JIANGSU PAYEGIS TECHNOLOGY CO., LTD.

Address before: A street in Suzhou City, Jiangsu Province Industrial Park No. 388 innovation park off No. 6 Building 5 floor

Applicant before: JIANGSU PAYEGIS TECHNOLOGY CO., LTD.

GR01 Patent grant
GR01 Patent grant