CN109039645A - A kind of system and method signed using digital signature to block chain affairs - Google Patents

A kind of system and method signed using digital signature to block chain affairs Download PDF

Info

Publication number
CN109039645A
CN109039645A CN201810763120.5A CN201810763120A CN109039645A CN 109039645 A CN109039645 A CN 109039645A CN 201810763120 A CN201810763120 A CN 201810763120A CN 109039645 A CN109039645 A CN 109039645A
Authority
CN
China
Prior art keywords
signature
processing server
block
hashed value
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810763120.5A
Other languages
Chinese (zh)
Inventor
刘祎
马克西姆·马修斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Ys Jusen Technology Co Ltd
Original Assignee
Foshan Ys Jusen Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Ys Jusen Technology Co Ltd filed Critical Foshan Ys Jusen Technology Co Ltd
Priority to CN201810763120.5A priority Critical patent/CN109039645A/en
Publication of CN109039645A publication Critical patent/CN109039645A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Abstract

The present invention provides a kind of system and methods signed using digital signature to block chain affairs, comprising: the signature blocks of processing server;The memory of processing server is configured as memory block chain, and wherein block chain includes multiple transaction blocks, and each transaction block includes at least multiple block chain trading values;The generation module of processing server, for generating the member keys couple comprising member's private key and member public key;The sending device of processing server is configured as electronically sending member public key generated to signature mechanism associated with block chain network;The receiving device of processing server is configured as receiving multiple block chain transaction values including new transaction block;The Hash module of processing server, specific piece for multiple transaction blocks by being applied in block chain include by one or more hashing algorithms, the first and second hashed values are generated, the second hashed value of new transaction block and signature is sent signature mechanism by the sending device of processing server.

Description

A kind of system and method signed using digital signature to block chain affairs
Technical field
The present invention relates to distributed computing field, in particular to it is a kind of using digital signature to block chain affairs into The system and method for row signature.
Background technique
Digital signature is related to the tools such as public key, private key and wallet, it there are two effect: first is that prove message be strictly by Information sender is signed and is issued, second is that determining the integrality of message.Digital signature technology is to send summary info The private key encryption of person, sends recipient to together with original text.It is encrypted that recipient only uses the public key of sender that could decrypt Then summary info generates a summary info to the original text received with HASH function, compare with the summary info of decryption.If It is identical, then illustrate that the information received is completely, not modified in transmission process, otherwise illustrate that information is modified, because This digital signature is able to verify that the integrality of information.
Carrying out signaling block chain to block chain affairs with digital signature is Distributed Storage, point-to-point transmission, common recognition machine The new application mode of the computer technologies such as system, Encryption Algorithm.So-called common recognition mechanism is that different nodes are realized in block catenary system Between establish trust, obtain equity mathematical algorithm.It is, in general, that block catenary system by data Layer, network layer, common recognition layer, swash Encourage layer, contract layer and application layer composition.Wherein, data Layer encapsulates bottom data block and relevant data encryption and time Basic datas and the rudimentary algorithms such as stamp;Network layer then includes distributed networking mechanism, data dissemination mechanism and data authentication mechanism Deng;All kinds of common recognition algorithms of common recognition layer predominant package network node;Economic factor is integrated into block chain technical system by excitation layer , main issuing mechanism and distribution mechanism etc. including economic incentives;All kinds of scripts of contract layer predominant package, algorithm and intelligence Contract is the basis of block chain programmable features;Application layer then encapsulates the various application scenarios and case of block chain.
Block chain as future generation computer system, the practical problem urgently handled in practical application there are also it is many not It is proposed specific solution.
Summary of the invention
The invention proposes a kind of systems signed using digital signature to block chain affairs, comprising: processing service The signature blocks of device;The memory of processing server is configured as memory block chain, and wherein block chain includes multiple transaction blocks, Each transaction block includes at least multiple block chain trading values;The generation module of processing server includes member's private key for generating With the member keys couple of member public key;The sending device of processing server is configured as member public key generated electronically It is sent to signature mechanism associated with block chain network;The receiving device of processing server, being configured as receiving includes new thing Multiple block chain transaction values of business block;The Hash module of processing server, for by by one or more hashing algorithm applications The specific piece for the multiple transaction blocks for including in block chain generates the first hashed value, wherein the generation module of processing server is also For: the second hashed value is generated, wherein the second hashed value corresponds to the first hashed value, the signature blocks of processing server are for using Member's private key of generation signs to the second hashed value of generation, and the sending device of processing server is to be configured as with electronics The second hashed value of new transaction block and signature is sent signature mechanism by mode.
Further, described to generate by the way that one or more of hashing algorithms are applied to the received new transaction block of institute Second hashed value.
Further, the sending device of processing server is additionally configured to electronically send authentication information in signature machine Structure.
Further, further includes: the authentication module of processing server, wherein the receiving device of processing server is also used to The transaction block and signature field public key that signature is received from signature mechanism, wherein the transaction block signed includes: new transaction block and signed Second hashed value, and use domain private key corresponding with signature field public key is signed, and the verifying mould of processing server Block is configured so that member public key and the transaction block key that the public verifying of signature field has been signed.
Further, the transaction block for verifying signature includes: that the domain public key of signature is applied to the transaction block of signature to generate Second hashed value of new transaction block and signature;Member public key is applied to the second hashed value of signature to generate the second hash Value;And generated second hashed value is verified as to correspond to the second hashed value generated.
Another aspect of the present invention provides a kind of method signed using digital signature to block chain affairs, and feature exists In, comprising: the memory block chain in the memory of processing server, wherein block chain includes multiple transaction blocks, each transaction block Including at least multiple block chain trading values;It includes member's private key and member public key that the generation module of the processing server, which generates, Member keys couple;Member public key's electron-transport generated is given block chain network and closed by the sending device of the processing server The signature mechanism of connection;The receiving device of processing server receives multiple block chain transaction values including new transaction block;Pass through processing The Hash module of server is hashed;Pass through the multiple affairs for being applied in block chain include by one or more hashing algorithms First hashed value of the specific piece of block;The generation module of the processing server generates the second hashed value, second hashed value Corresponding first hashed value;The signature blocks of the processing server are dissipated using second that the member's private key signature generated generates Train value;The sending device of the processing server is by the new transaction block and the second hashed value electron-transport of signature to signature Mechanism.
Further, described to generate by the way that one or more of hashing algorithms are applied to the received new transaction block of institute Second hashed value.
Further, further includes: electronically send signature mechanism for authentication information by the sending device of processing server.
Further, further includes: receive the transaction block and label of signature from signature mechanism by the receiving device of processing server The domain public key of name, wherein the transaction block signed includes the second hashed value of new transaction block and signature.Using with signature field public key Corresponding domain private key is signed;Also, it is tested by the authentication module of processing server using member public key and signature field public key The transaction block of signed certificate name.
Further, the transaction block for verifying signature includes: that the domain public key of signature is applied to the transaction block of signature to generate Second hashed value of new transaction block and signature;Member public key is applied to the second hashed value of signature to generate the second hash Value;And generated second hashed value is verified as to correspond to the second hashed value generated.
Detailed description of the invention
From following description with reference to the accompanying drawings it will be further appreciated that the present invention.Component in figure is not drawn necessarily to scale, But it focuses on and shows in the principle of embodiment.In the figure in different views, identical appended drawing reference is specified to be corresponded to Part.
Fig. 1 is general frame schematic diagram of the invention.
Specific embodiment
In order to enable the objectives, technical solutions, and advantages of the present invention are more clearly understood, below in conjunction with embodiment, to this Invention is further elaborated;It should be appreciated that described herein, the specific embodiments are only for explaining the present invention, and does not have to It is of the invention in limiting.To those skilled in the art, after access is described in detail below, other systems of the present embodiment System, method and/or feature will become obvious.All such additional systems, method, feature and advantage are intended to be included in It in this specification, is included within the scope of the invention, and by the protection of the appended claims.In description described in detail below The other feature of the disclosed embodiments, and these characteristic roots will be apparent according to described in detail below.
Embodiment one.
The present embodiment explains a kind of system signed using digital signature to block chain affairs, comprising: place Manage the signature blocks of server;The memory of processing server is configured as memory block chain, and wherein block chain includes multiple friendships Easy block, each transaction block include at least multiple block chain trading values;The generation module of processing server includes member for generating The member keys couple of private key and member public key;The sending device of processing server is configured as member public key's electricity generated It is sent to signature mechanism associated with block chain network subly;The receiving device of processing server, being configured as reception includes Multiple block chain transaction values of new transaction block;The Hash module of processing server, for by by one or more hashing algorithms Applied to the specific piece for the multiple transaction blocks for including in block chain, the first hashed value is generated, wherein the generation mould of processing server Block is also used to: generating the second hashed value, wherein the second hashed value corresponds to the first hashed value, the signature blocks of processing server are used for Signed using member's private key of generation to the second hashed value of generation, the sending device of processing server be configured as with Electronically signature mechanism is sent by the second hashed value of new transaction block and signature.
Further, described to generate by the way that one or more of hashing algorithms are applied to the received new transaction block of institute Second hashed value.Further, the sending device of processing server is additionally configured to electronically send authentication information to signature Mechanism.Further, further includes: the authentication module of processing server, wherein the receiving device of processing server is also used to from label The transaction block and signature field public key of name authorities signature, wherein the transaction block signed include: new transaction block and signed the Two hashed values, and use domain private key corresponding with signature field public key is signed, and the authentication module of processing server is matched It is set to the transaction block key signed using member public key and the public verifying of signature field.Further, the transaction block packet of signature is verified It includes: the domain public key of signature being applied to the transaction block of signature to generate the second hashed value of new transaction block and signature;By member Public key is applied to the second hashed value of signature to generate the second hashed value;And generated second hashed value is verified as corresponding to In the second hashed value generated.
Embodiment two.
Another aspect of the present invention provides a kind of method signed using digital signature to block chain affairs, and feature exists In, comprising: the memory block chain in the memory of processing server, wherein block chain includes multiple transaction blocks, each transaction block Including at least multiple block chain trading values;It includes member's private key and member public key that the generation module of the processing server, which generates, Member keys couple;Member public key's electron-transport generated is given block chain network and closed by the sending device of the processing server The signature mechanism of connection;The receiving device of processing server receives multiple block chain transaction values including new transaction block;Pass through processing The Hash module of server is hashed;Pass through the multiple affairs for being applied in block chain include by one or more hashing algorithms First hashed value of the specific piece of block;The generation module of the processing server generates the second hashed value, second hashed value Corresponding first hashed value;The signature blocks of the processing server are dissipated using second that the member's private key signature generated generates Train value;The sending device of the processing server is by the new transaction block and the second hashed value electron-transport of signature to signature Mechanism.
In the present embodiment, the public key to use symmetric encipherment algorithm, public key and private key to application asymmetric encryption calculate Method, wherein symmetric encipherment algorithm is selected from following algorithm: DES (Data Encryption Standard), 3DES (Triple DES),AES(Advanced Encryption Standard).And rivest, shamir, adelman selects ECC (Elliptic Curves Cryptography): elliptic curve cipher coding theory.Elliptic curve is because use binary cubic equation y^2=x^3+ax + b indicates, similar oval perimeters accounting equation and gain the name.Open Secret key arithmetic will be based on a difficult math question, and elliptic curve is calculated Method is namely based on discrete logarithm problem.Elliptic curve on finite field Fp equally has addition, but cannot give geometric meaning Explanation.Wherein the addition on elliptic curve is such as given a definition:
Infinite point O ∞ is null element, there is O ∞+O ∞=O ∞, O ∞+P=P
The negative member of P (x, y) is-P (x ,-y), there is P+ (- P)=O ∞
P (x1, y1), Q (x2, y2) and R (x3, y3) have following relationship:
x3≡k2-x1-x2(mod p)
y3≡k(x1-x3)-y1(mod p)
Wherein if P=Q k=(3x2+a) if/2y1 P ≠ Q, k=(y2-y1)/(x2-x1)
Consider following equation:
K=kG, wherein K, G are the point on Ep (a, b), and k is the integer less than n (rank that n is point G), it is not difficult to find that given K and G calculates K and is easy to according to Adding law;But given K and G, asks k with regard to relative difficulty.Here it is elliptic curve cryptography calculations The problem that method uses, we are commonly referred to as discrete logarithm problem.Point G is called basic point (base point) by we, and (k < n, n are k The rank of basic point G) it is known as private cipher key (privte key), K is known as public-key cryptography (public key).
Wherein ECC is compared with RSA, and have in many aspects to absolute advantage, be mainly reflected in: attack tolerant is strong;Meter Calculation amount is small, and processing speed is fast;Memory space occupies small;Bandwidth requirement is low.These features of ECC make it that will replace RSA, become General public key encryption algorithm, so block chain also uses ECC.
And the signature algorithm SECP256K1 used in block chain in the present embodiment is a kind of standard of elliptic curve Change expression way, wherein 256 indicate that the elliptic curve is 256, K represents Koblitz curve, corresponding elliptic curve Standard changes expression in addition, SECP192K1, SECP192R1, SECP224K1, SECP224R1, SECP256R1, SECP384R1, SECP521R1 etc..
SECP256K1 curve is defined by following functions, which can produce an elliptic curve:
Y^2=(x^3+7) } over (Fp)
The reason of so choosing, also for consistent with the output valve of hash algorithm SHA256, and solve it is discrete right Several difficulty.The process that coded communication is carried out using elliptic curve will now be described:
User A selectes an elliptic curve Ep (a, b), and takes on elliptic curve a bit, as basic point G.
User A selects a private cipher key k, and generates public-key cryptography K=kG.
Ep (a, b) and point K, G are transmitted to user B by user A.
After user B is connected to information, plaintext to be transmitted is encoded to the upper point M of Ep (a, b), and (there are many coding method, here It is not covered), and generate a random integers r (r < n).
User B calculates point C1=M+rK;C2=rG.
C1, C2 are transmitted to user A by user B.
After user A is connected to information, C1-kC2 is calculated, is as a result exactly point M.Because of C1-kC2=M+rK-k (rG)=M+rK-r (kG)=M
Being decoded again to point M can be obtained by plain text, this is signature algorithm SECP256K1 is used in block chain basic Principle.
In the present embodiment also by the way that one or more of hashing algorithms are applied to institute's received new transaction block next life At second hashed value.Signature mechanism is electronically sent by authentication information by the sending device of processing server, further includes: The transaction block of signature and the domain public key of signature are received from signature mechanism by the receiving device of processing server, wherein the affairs signed Block includes the second hashed value of new transaction block and signature.It is signed using domain corresponding with signature field public key private key;Also, The transaction block of signature is verified using member public key and signature field public key by the authentication module of processing server.Verify the thing of signature Business block includes: that the domain public key of signature is applied to the transaction block of signature to generate the second hashed value of new transaction block and signature; Member public key is applied to the second hashed value of signature to generate the second hashed value;And generated second hashed value is verified For corresponding to the second hashed value generated.
Embodiment three.
The present embodiment provides a kind of system signed using digital signature to block chain affairs, comprising: processing service The sending device of device;The generation module of processing server, for generating the domain key pair including domain private key and domain public key, wherein Domain public key is signed after generation;The receiving device of processing server is configured as receiving multiple member public keys, wherein each Member public key is received from the association member of block chain network;The signature blocks of processing server, for using domain private key pair Each member public key in multiple member public keys signs, wherein the receiving device of processing server be also used to from it is specific at Member receives transaction block;Wherein transaction block includes multiple block chain transaction values and use member's private key signature corresponding with special member Hash, the signature blocks of processing server are also used for domain private key and sign to the transaction block received;The processing The sending device of server is also used to the transaction block of electron-transport signature.The sending device of processing server be additionally configured to by The member public key of each signature is electronically sent to one or more members of block chain network.The domain public key is by Public Authority Authority signature.Domain public key is signed by the signature blocks of processing server.The authentication module of processing server, wherein processing service The receiving device of device is additionally configured to receive authentication information from each member of block chain network;And the certification of processing server Module be configured as before signing associated member public key using received authentication information authenticate the every of block chain network A member.
And the endorsement method using the system is given here, comprising: generated by the generation module of processing server Domain key pair including domain private key and domain public key, which is characterized in that domain public key is signed after generation;Processing server connects Receiving unit is also used to receive multiple member public keys, wherein each member public key is received from the association member of block chain network; The signature blocks of the processing server sign each member public key in the multiple member public key using the domain private key;Place The receiving device for managing server receives the transaction block of the special member from block chain network, wherein transaction block includes multiple areas Block chain trading value and the hash for using member's private key signature corresponding with special member;The signature blocks of processing server use domain Private key signs received transaction block;Also, the transaction block of signature is electronically sent by the sending device of processing server.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing from In the case where range, many changes and modifications can be carried out.Therefore, be intended to foregoing detailed description be considered as it is illustrative and It is unrestricted, and it is to be understood that following following claims (including all equivalents) is intended to limit spirit and model of the invention It encloses.The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.It is reading After the content of record of the invention, technical staff can be made various changes or modifications the present invention, these equivalence changes and Modification equally falls into the scope of the claims in the present invention.

Claims (10)

1. a kind of system signed using digital signature to block chain affairs characterized by comprising processing server Signature blocks;The memory of processing server is configured as memory block chain, and wherein block chain includes multiple transaction blocks, each Block of trading includes at least multiple block chain trading values;The generation module of processing server, for generate comprising member's private key and at The member keys couple of member's public key;The sending device of processing server is configured as electronically sending member public key generated To signature mechanism associated with block chain network;The receiving device of processing server, being configured as receiving includes new transaction block Multiple block chain transaction values;The Hash module of processing server, for by the way that one or more hashing algorithms are applied to area The specific piece for the multiple transaction blocks for including in block chain generates the first hashed value, wherein the generation module of processing server is also used In: the second hashed value is generated, wherein the second hashed value corresponds to the first hashed value, the signature blocks of processing server are used for using life At member's private key sign to the second hashed value of generation, the sending device of processing server is to be configured as with electronics side The second hashed value of new transaction block and signature is sent signature mechanism by formula.
2. the system as claimed in claim 1, which is characterized in that by being applied to be connect by one or more of hashing algorithms The new transaction block received generates second hashed value.
3. system as claimed in claim 2, which is characterized in that the sending device of processing server is additionally configured to that letter will be authenticated Breath is electronically sent to signature mechanism.
4. system as claimed in claim 3, which is characterized in that further include: the authentication module of processing server, wherein processing The receiving device of server is also used to receive the transaction block and signature field public key of signature from signature mechanism, wherein the transaction block signed It include: new transaction block and second hashed value signed, and use domain private key corresponding with signature field public key is signed, and And the authentication module of processing server is configured so that member public key and the transaction block key that the public verifying of signature field has been signed.
5. system as claimed in claim 4, which is characterized in that the transaction block for verifying signature includes: to answer the domain public key of signature The second hashed value of new transaction block and signature is generated for the transaction block of signature;Member public key is applied to the second of signature Hashed value is to generate the second hashed value;And generated second hashed value is verified as to correspond to the second hash generated Value.
6. a kind of method signed using digital signature to block chain affairs characterized by comprising in processing server Memory in memory block chain, wherein block chain includes multiple transaction blocks, and each transaction block includes that at least multiple block chains are handed over Easily value;The generation module of the processing server generates the member keys couple including member's private key and member public key;The processing Member public key's electron-transport generated is given the associated signature mechanism of block chain network by the sending device of server;Processing clothes The receiving device of business device receives multiple block chain transaction values including new transaction block;It is carried out by the Hash module of processing server Hash;Pass through the first hash of the specific piece for the multiple transaction blocks for being applied in block chain include by one or more hashing algorithms Value;The generation module of the processing server generates the second hashed value, and second hashed value corresponds to first hashed value;Institute State the second hashed value that the signature blocks of processing server are generated using the member's private key signature generated;The processing server Sending device is by the new transaction block and the second hashed value electron-transport of signature to signature mechanism.
7. method as claimed in claim 6, which is characterized in that by being applied to be connect by one or more of hashing algorithms The new transaction block received generates second hashed value.
8. the method for claim 7, which is characterized in that further include: certification is believed by the sending device of processing server Breath is electronically sent to signature mechanism.
9. method according to claim 8, which is characterized in that further include: by processing server receiving device from signature machine Structure receives the transaction block of signature and the domain public key of signature, wherein the transaction block signed includes that new transaction block is dissipated with the second of signature Train value.It is signed using domain corresponding with signature field public key private key;Also, member is used by the authentication module of processing server Public key and signature field public key verify the transaction block of signature.
10. method as claimed in claim 9, which is characterized in that the transaction block for verifying signature includes: to answer the domain public key of signature The second hashed value of new transaction block and signature is generated for the transaction block of signature;Member public key is applied to the second of signature Hashed value is to generate the second hashed value;And generated second hashed value is verified as to correspond to the second hash generated Value.
CN201810763120.5A 2018-07-12 2018-07-12 A kind of system and method signed using digital signature to block chain affairs Withdrawn CN109039645A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810763120.5A CN109039645A (en) 2018-07-12 2018-07-12 A kind of system and method signed using digital signature to block chain affairs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810763120.5A CN109039645A (en) 2018-07-12 2018-07-12 A kind of system and method signed using digital signature to block chain affairs

Publications (1)

Publication Number Publication Date
CN109039645A true CN109039645A (en) 2018-12-18

Family

ID=64642239

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810763120.5A Withdrawn CN109039645A (en) 2018-07-12 2018-07-12 A kind of system and method signed using digital signature to block chain affairs

Country Status (1)

Country Link
CN (1) CN109039645A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160191243A1 (en) * 2014-12-31 2016-06-30 William Manning Out-of-band validation of domain name system records
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
US20170180134A1 (en) * 2015-12-21 2017-06-22 Mastercard International Incorporated Method and system for blockchain variant using digital signatures
US20180013707A1 (en) * 2015-06-24 2018-01-11 Private Giant Method and system for sender-controlled messaging and content sharing
CN107851245A (en) * 2015-05-21 2018-03-27 万事达卡国际股份有限公司 For the method and system by the asset association based on block chain to legal tender account

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160191243A1 (en) * 2014-12-31 2016-06-30 William Manning Out-of-band validation of domain name system records
CN107851245A (en) * 2015-05-21 2018-03-27 万事达卡国际股份有限公司 For the method and system by the asset association based on block chain to legal tender account
US20180013707A1 (en) * 2015-06-24 2018-01-11 Private Giant Method and system for sender-controlled messaging and content sharing
US20170180134A1 (en) * 2015-12-21 2017-06-22 Mastercard International Incorporated Method and system for blockchain variant using digital signatures
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device

Similar Documents

Publication Publication Date Title
CN104270249B (en) It is a kind of from the label decryption method without certificate environment to identity-based environment
Moody et al. Report on pairing-based cryptography
EP2285040A1 (en) Two-factor combined public key generation and authentication method
US8589679B2 (en) Identifier-based signcryption with two trusted authorities
US9800418B2 (en) Signature protocol
EP1378821A2 (en) Authentication method and apparatus using pairing functions for the elliptic curves based cryptosystems
CN104301108B (en) It is a kind of from identity-based environment to the label decryption method without certificate environment
US20080063193A1 (en) Crypto-communication method, recipient-side device, key management center-side device and program
Liu et al. IBRS: an efficient identity-based batch verification scheme for VANETs based on ring signature
Dohare et al. Certificateless aggregated signcryption scheme (CLASS) for cloud-fog centric industry 4.0
EP2792098B1 (en) Group encryption methods and devices
KR20030008183A (en) Method of id-based ring signature by using bilinear parings
CN109462481A (en) It is a kind of that decryption method is signed based on hideing for asymmetric Bilinear map
CN108880803A (en) A kind of method and system signed using digital signature to block chain affairs
CN111769938A (en) Key management system and data verification system of block chain sensor
KR20030062401A (en) Apparatus and method for generating and verifying id-based blind signature by using bilinear parings
CN109698747A (en) A kind of identity base identity based on Bilinear map hides cryptographic key negotiation method
GB2421408A (en) Generating an Identifier-Based Public / Private Key Pair from a Multi-Component Signature
CN109474436A (en) A kind of deniable authentication method and system
Baee et al. On the efficiency of pairing-based authentication for connected vehicles: Time is not on our side!
US20150006900A1 (en) Signature protocol
Kuppuswamy et al. A new efficient digital signature scheme algorithm based on block cipher
CN109039645A (en) A kind of system and method signed using digital signature to block chain affairs
Elkamchouchi et al. A new proxy identity-based signcryption scheme for partial delegation of signing rights
CN109412815A (en) A kind of method and system for realizing cross-domain secure communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181218