CN109547461A - Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys - Google Patents

Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys Download PDF

Info

Publication number
CN109547461A
CN109547461A CN201811524778.7A CN201811524778A CN109547461A CN 109547461 A CN109547461 A CN 109547461A CN 201811524778 A CN201811524778 A CN 201811524778A CN 109547461 A CN109547461 A CN 109547461A
Authority
CN
China
Prior art keywords
key
user terminal
pool
symmetric keys
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811524778.7A
Other languages
Chinese (zh)
Inventor
富尧
钟民
钟一民
杨羽成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruban Quantum Technology Co Ltd
Original Assignee
Ruban Quantum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruban Quantum Technology Co Ltd filed Critical Ruban Quantum Technology Co Ltd
Priority to CN201811524778.7A priority Critical patent/CN109547461A/en
Publication of CN109547461A publication Critical patent/CN109547461A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The present invention relates to a kind of anti-quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys, network is stored including a plurality of clients and with P2P, each user terminal configures quantum key card, P2P stores network configuration pool of symmetric keys, it initiates user terminal to generate specific function value and generate trading signature in conjunction with party B private key, initiates user terminal and trading signature encryption is sent on block chain;The verifying user terminal generates specific function value, the specific function value combination party B key card and the ID of pool of symmetric keys combine generation key, after key decryption acquisition trading signature compared with specific function value, realize transaction verification, pool of symmetric keys is stored in P2P storage network, because P2P stores network non-stop layer node, it improves security of system and also mitigates user terminal burden, the setting of key card substantially reduces a possibility that stealing key by Malware, since quantum computer is unable to get client public key, it is then also unable to get corresponding private key.

Description

Anti- quantum calculation block chain secure transactions system based on P2P pool of symmetric keys and Method
Technical field
The present invention relates to block chain fields, more particularly to the secrecy of the anti-quantum calculation block chain based on P2P pool of symmetric keys Transaction system and method.
Background technique
Block chain is a kind of completely new distributed basis framework and calculation paradigm, is stored using orderly linked data structure Data ensure data safety using cryptological technique using common recognition algorithm more new data.In the transaction based on block chain, really The privacy of the data safety and client of protecting transaction is the necessary condition that block chain can further develop.For this purpose, cryptological technique Especially public-key cryptographic keys are widely used in block chain.
P2P storage is a kind of network storage realized based on P2P (Peer-to-Peer) technology, by many machine equities Mode organize and common provide the data storage service of vast capacity for user.This technology is computer network and distribution The product that formula system combines, core concept is to eliminate the concept of central server, and the base in equity interconnection is established in internet On plinth, maximum resource-sharing is realized.
As most people is understood, quantum computer has great potential in password cracking.Mainstream is non-now Symmetrically (public key) Encryption Algorithm, such as RSA cryptographic algorithms, it is most of to be all based in factorization or the finite field of big integer The two difficult math questions of the calculating of discrete logarithm.Their difficulty that cracks also is dependent on the efficiency solved these problems.Tradition On computer, it is desirable that solve the two difficult math questions, the cost time is the exponential time (to crack the time with the growth of public key length Increased with exponential), this is unacceptable in practical applications.It and is that your elegant algorithm for making to measure of quantum computer can be with In polynomial time (time is cracked as the growth of public key length is increased with the speed of k power, wherein k is long with public key Spend unrelated constant) carry out integer factorization or discrete logarithm and calculate, thus for RSA, discrete logarithm Encryption Algorithm it is broken Solution provides may.
Problem of the existing technology:
(1) pool of symmetric keys is stored in key card by each user terminal, occupies larger space.
(2) in the prior art, the equal unencryption of the transimission and storage of block chain.
(3) corresponding private key, existing block chain counterparty are obtained quickly through public key due to quantum calculation function Method is easy to be cracked by quantum computer.
(4) in the prior art, the outputting and inputting for digital signature based on public and private key can be known to enemy, in quantum meter In the presence of calculation machine, it may be derived private key, block catenary system is caused to be cracked by quantum computer.
(5) in the prior art, the disclosure for being transferred to wallet address and being transferred to the amount of money in the transaction of block chain may expose use Family privacy information.
Summary of the invention
Based on this, it is necessary in view of the above-mentioned problems, providing a kind of anti-quantum calculation block chain based on P2P pool of symmetric keys Secure transactions system and method.
A kind of anti-quantum calculation block chain secure transactions method based on P2P pool of symmetric keys, including a plurality of clients with And network is stored by the P2P of network connection with each user terminal, it is stored in the quantum key card of each user terminal configuration User terminal public key and private key, P2P storage network configuration pool of symmetric keys in be stored with the symmetrical of each user terminal public key encryption Key when transaction is initiated, initiates user terminal and generates specific function value, the letter to generated transaction progress certain operations of unsigning Number numerical value generates trading signature in conjunction with party B private key, initiates user terminal and by trading signature and is used to decrypt the trading signature Public key encryption is sent to each user terminal of block chain.
Block chain is a kind of data structure for sequentially in time forming data block with the mode of similar chained list, and with Cryptography mode guarantees to distort and the distributed decentralization account book that can not forge, can secure storage is simple, has elder generation Afterwards relationship, the data that can be verified in system.Wherein, cryptography mainly uses public key cryptography.
In the present embodiment, each of block chain node has matched key card, and the side of issuing of key card is key The supervisor side of card, the generally administrative department of certain enterprise or public institution, the side of being awarded of key card are the supervisor side of key card The employees at different levels of the member managed, generally certain enterprise or public institution.There are client public key and private key in key card.
The method for initiating user terminal generation specific function value includes: the friendship that will unsign in one of the embodiments, Easy internal data adjusts laggard particular row functional operation and obtains the specific function value.
The functional operation is Hash operation in one of the embodiments, and the specific function value is cryptographic Hash.
The encryption method of the trading signature and the public key for decrypting the trading signature in one of the embodiments, It include: by the initiation user terminal random number generated in conjunction with the ID of the specified pool of symmetric keys, according to specific finger Needle function obtains pointer, and stores the key that pool of symmetric keys assigned in the network extracts encryption from the P2P using the pointer, After the key for decrypting the encryption using user terminal private key, key obtained is in conjunction with the specific function value and utilizes functional operation Obtain the key of the public key for encrypting the trading signature and for decrypting the trading signature.
A kind of anti-quantum calculation block chain secure transactions method based on P2P pool of symmetric keys, including a plurality of clients with And network is stored by the P2P of network connection with each user terminal, it is stored in the quantum key card of each user terminal configuration User terminal public key and private key, P2P are stored in the pool of symmetric keys of network configuration and are stored by the symmetrical of each user terminal public key encryption Key initiates user terminal for trading signature and is used to decrypt the public key encryption of the trading signature and is sent to each described of block chain User terminal when transaction verification, is unsigned using verifying user terminal generation and transaction and is carried out to the transaction of unsigning specific Operation generates specific function value, and the ID phase of the specific function value and party B key card random number generated and pool of symmetric keys is tied At key, which is used to decrypt the public affairs for being used to decrypt the trading signature of the encryption trading signature and encryption for symphysis Key realizes transaction verification after the trading signature of the encryption described in the public key decryptions compared with the specific function value.
The method that the verifying user terminal generates the specific function value in one of the embodiments, includes: not sign Name transaction internal data adjusts laggard line function operation and obtains the specific function value.
The function value and party B key card random number generated and pool of symmetric keys in one of the embodiments, ID combine generate key method include: by random number generated in the verifying user terminal key card and it is described symmetrically The ID of pool of keys is combined, and obtains pointer according to particular pointer function, and and specify from P2P storage network using the pointer Pool of symmetric keys extract the key of encryption, after the key that the encryption is decrypted using user terminal private key, the key is in conjunction with the spy Determine functional value and obtains the key using functional operation.
In one of the embodiments, verify after signature transaction it is encrypted after, carry out internal data adjustment is stored in area In block chain.
A kind of anti-quantum calculation block chain secure transactions system based on P2P pool of symmetric keys, including a plurality of clients with And network is stored by the P2P of network connection with each user terminal, it is stored in the quantum key card of each user terminal configuration User terminal public key and private key, P2P are stored in the pool of symmetric keys of network configuration and are stored by the symmetrical of each user terminal public key encryption Key when transaction is initiated, initiates user terminal and generates specific function value, the letter to generated transaction progress certain operations of unsigning Number numerical value generates trading signature in conjunction with party B private key, initiates user terminal and by trading signature and is used to decrypt the trading signature Public key encryption is sent to each user terminal of block chain;When transaction verification, friendship of unsigning is generated using the verifying user terminal Easily and certain operations are carried out to the transaction of unsigning and generate specific function value, which is generated with party B key card Random number and the ID of pool of symmetric keys combine generation key, which is used to decrypt the encryption trading signature and encryption It is described for decrypting the public key of the trading signature, after the trading signature of the encryption described in the public key decryptions with the specific letter Numerical value compares, and realizes transaction verification.
The above-mentioned anti-quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys, including multiple use Family end and network is stored by the P2P of network connection with each user terminal, in the quantum key card of each user terminal configuration It is stored with user terminal public key and private key, P2P is stored in the pool of symmetric keys of network configuration and stored by each user terminal public key encryption Symmetric key, transaction initiate when, initiate user terminal to it is generated unsign transaction carry out certain operations generate specific function Value, the function value generate trading signature in conjunction with party B private key, initiate user terminal and by trading signature and are used to decrypt the friendship The public key encryption easily signed is sent to each user terminal of block chain;When transaction verification, generated using the verifying user terminal It unsigns to trade and carry out certain operations to the transaction of unsigning and generates specific function value, the specific function value and party B key The ID for blocking random number and pool of symmetric keys generated combines generation key, and the key is for decrypting the encryption trading signature And encryption is described for decrypting the public key of the trading signature, after the trading signature of the encryption described in the public key decryptions with institute It states specific function value to compare, realizes transaction verification, store pool of symmetric keys in P2P storage network, since P2P storage network does not have There is central node, it is not vulnerable, the safety of system is further improved, the burden of user terminal is also mitigated, uses simultaneously The public key of encryption is simultaneously stored in key card, and key card is independent hardware isolated equipment, is substantially reduced by Malware or evil A possibility that key is stolen in meaning operation, since quantum computer is unable to get client public key, is then also unable to get corresponding private Key.In addition, the trading signature based on public and private key is also further encrypted by key, even if in the presence of quantum computer, Also it is difficult to be derived private key, therefore the program is not easy to be cracked by quantum computer.
Detailed description of the invention
Fig. 1 is communication system architecture figure provided in an embodiment of the present invention;
Fig. 2 is that P2P stores network structure;
Fig. 3 is the structural schematic diagram of transaction of unsigning;
Fig. 4 is structure of deal schematic diagram in the m times signature process;
Fig. 5 is the structural schematic diagram of the transaction of having signed of encryption;
Fig. 6 is the product process figure for ciphering signature and the key of public key;
Fig. 7 is the product process figure for encrypting the key of wallet address and amount of the fund;
Fig. 8 is the relation schematic diagram of block and transaction;
Fig. 9 is the structure of deal schematic diagram for being stored into block
Figure 10 is original digging mine transaction schematic diagram;
Figure 11 is digging mine transaction schematic diagram after encryption.
Specific embodiment
Process of exchange in the present embodiment in block chain, general thought be to block chain transaction in digital signature, public key, It is transferred to wallet address and is transferred to the amount of money and encrypted, while pool of symmetric keys being stored in P2P storage network.
A kind of anti-quantum calculation block chain secure transactions system based on P2P pool of symmetric keys, including a plurality of clients with And network is stored by the P2P of network connection with each user terminal, it is stored in the quantum key card of each user terminal configuration User terminal public key and private key, P2P are stored in the pool of symmetric keys of network configuration and are stored by the symmetrical of each user terminal public key encryption Key when transaction is initiated, initiates user terminal and generates specific function value, the letter to generated transaction progress certain operations of unsigning Number numerical value generates trading signature in conjunction with party B private key, initiates user terminal and by trading signature and is used to decrypt the trading signature Public key encryption is sent to each user terminal of block chain;When transaction verification, friendship of unsigning is generated using the verifying user terminal Easily and certain operations are carried out to the transaction of unsigning and generate specific function value, which is generated with party B key card Random number and the ID of pool of symmetric keys combine generation key, which is used to decrypt the encryption trading signature and encryption It is described for decrypting the public key of the trading signature, after the trading signature of the encryption described in the public key decryptions with the specific letter Numerical value compares, and realizes transaction verification.
Embodiment
This system structure has corresponding block chain to answer as shown in Figure 1, a node of each user as block chain With, and it is furnished with key card.U key card is shared, has client public key PK, private key SK in each key card;Key card is by block Chain application is called, and key does not go out key card.
For P2P storage network structure as shown in Fig. 2, there being z pool of symmetric keys, ID is KID=Ki (i=1~z).It is right Claim pool of keys to use z symmetric key KKi (i=1~z) encryption respectively, be true random number, preferably quantum random number.Often A KKi (i=1~z) is all encrypted by u PKi (i=1~u).P2P stores all data in network by user or key Card issuer uploads, and P2P storage network can not be decrypted.
Specific step is as follows for transaction:
Step 1.1 generates the RTx that trades that unsigns:;
Before initiating transaction, trade initiator, which initiates user terminal A, need to generate the RTx that trades that unsigns, structure such as Fig. 3 institute Show.In Fig. 3, InN indicates serial number of certain the input fund in this Tx;TxID indicates certain input fund where its source The ID of Tx.Generally desirable TxID=Hash (Tx);N indicates certain input fund in the Tx where its source as finance of export Serial number;OutN indicates serial number of certain finance of export in this Tx;Dest indicates the address that is transferred to of certain finance of export, generally It is the form of wallet;Value indicates the number of certain finance of export.
Step 1.2 generates trading signature Txs;
By taking the m times signature as an example, change as shown in Figure 4 is made to RTx and obtains RTxm.When the m times signature, acquisition m is defeated Enter the amount of money corresponding Dest value in the Tx where its source.Acquisition modes are shown in step 7:
RTx is added as PreDestm in the Dest value and obtains RTxm.Hash is carried out to RTxm, obtains hash value Txhm; It is signed using private key SKm to Txhm, obtains m-th of signature Txsm.All Txs are obtained with identical method.Certain basis Design needs, and initiates user terminal and generates specific function value, the function value to generated transaction progress certain operations of unsigning Trading signature is generated in conjunction with party B private key, wherein it is described initiate the user terminal method that generates the specific function value include: by Progress specific function operation after trading internal data adjustment of unsigning obtains the specific function value, and the certain operations are not limited to Hash operation, as long as the trading signature can be generated.
Step 1.3 carries out the digital signature Txs for taking certain input fund and the public key PK for taking certain input fund Encryption.
For every input fund, Txs and PK are encrypted with respective sk respectively, and encrypted Tx is as shown in Figure 5.It obtains The step of sk, is as shown in fig. 6, verbal description is as follows:
Random number rs, rs and the symmetric key used are generated by the randomizer in the matched key card of the user terminal ID, that is, the KID in pond obtains pointer ps in conjunction with specific pointer function fps together and is specified from P2P storage network by KID close The ks of encryption is extracted in key pond.It decrypts to obtain using the KK corresponding with the specified pool of keys of KID decrypted by private key ks.The cryptographic Hash Txh associative function fsk of ks and RTx obtains the key sk for encrypting Txs and PK.
Step 1.4 sends Tx;
It will sign and broadcasted the transaction Tx of encrypted signature to all nodes of block chain network.
Step 1.5 verifies Tx:;
Each node in block chain network verifies the transaction.
When transaction verification, is unsigned using verifying user terminal generation and trade and the transaction of unsigning is carried out specific Operation generates specific function value, and the ID phase of the specific function value and party B key card random number generated and pool of symmetric keys is tied At key, which is used to decrypt the public affairs for being used to decrypt the trading signature of the encryption trading signature and encryption for symphysis Key realizes transaction verification after the trading signature of the encryption described in the public key decryptions compared with the specific function value.
During transaction verification, each node in block chain network can be used as verifying node.Verify node with it is upper The identical mode of text forms the RTx of an authentication, carries out Hash to RTx and obtains hash value Txh.It is counted according to rs, KID and Txh Sk is calculated, detailed process is as shown in fig. 6, verbal description is same as above.Reuse sk decryption Txs and PK.Use public key decryptions Signature compares obtained Txh ' and Txh, completes verifying.Different the amount of money is produced if producing amount information and including more Source then produces the corresponding encryption of the amount of money to more using same procedure and produces signature and verifies.
After verifying to each signature, verifying node is according to the TxID of each input amount of money in the historical record of block chain It finds and produces the amount of money, to prove the existence of this each input amount of money of trading.It is obtained after the verifying node taking-up input amount of money defeated Enter amount of money total value, compares, check whether equal with this output amount of money total value;It is verified if equal;If no Equal then authentication failed.
Block is added in the transaction by step 1.6: block and the relationship of transaction are as shown in Figure 8.
Step 1.6.1 first encrypts wallet address D est and amount of the fund Value with tk before block is added in Tx.? The step of to tk, is as shown in fig. 7, verbal description is as follows:
Random number rt, rt and the symmetric key used are generated by the randomizer in the matched key card of the user terminal ID, that is, the KID in pond obtains pointer pt and extracts the kt of encryption from pool of keys in conjunction with specific pointer function fpt together.It uses It decrypts to obtain kt by the KKi that private key is decrypted.Kt associative function ftk together with the cryptographic Hash Th of this importation Tx is obtained To the key tk for encrypting Dest and Value.
Tx ' is obtained after encrypting Dest and Value using respective tk, Tx ', which is added, in KID and each rt becomes entirety Tx ", Block is added as the final form of transaction in Tx ", sees Fig. 9.And obtain the TxID=Hash (Tx ") of this transaction.
Step 1.6.2 miner forms digging mine and trades and encrypt;
Miner forms a digging mine transaction as shown in Figure 10, importation fill the affiliated mine pond of some miners or other Necessary information, output par, c is identical as general transaction, and output amount of money total amount is identical as the amount of money award of block is generated.It generates and digs mine After transaction, Dest and Value is encrypted using each tk obtained by each rt generated at random and obtains as shown in figure 11 add Digging mine transaction after close, while being additionally added each rt.
Step 1.6.3 miner, which calculates, digs mine random number;
Miner calculates the random number for meeting rule, that is, obtains this book keeping operation power, the digging that oneself is generated and is encrypted Mine transaction is added in block.
Step 1.6.4 miner broadcasts successfully digging mining area block;
After miner obtains successfully digging mining area block, which is broadcasted, remaining node verifies block.Mainly verify Dig whether mine random number meets rule.It is such as proved to be successful, then receiving the block is new block.
Step 1.7 decrypts Dest and Value;
Tx " is found according to TxID, Dest and Value is decrypted by each rt.Wherein Dest is used to construct new Tx, and Verifying of the Dest and Value for Txs in step 1.5.
Pool of symmetric keys used in the present embodiment is stored in P2P storage network, and P2P storage network does not have centromere Point, it is not vulnerable, also possess good scalability and self-organization, pool of symmetric keys is stored encrypted in P2P storage net The safety of system is further improved in network, also mitigates the burden of user terminal.This patent is used to add using the public key of encryption The key storage of Migong key is in key card.Key card is independent hardware isolated equipment, is stolen by Malware or malicious operation A possibility that taking key substantially reduces.Since quantum computer is unable to get client public key, it is then also unable to get corresponding private Key.In addition, the digital signature based on public and private key is also further encrypted by key in the present invention.Even if existing in quantum computer In the case where, it is also difficult to it is derived private key.Therefore the program is not easy to be cracked by quantum computer.To block chain in the present invention Being transferred to wallet address and being transferred to the amount of money in transaction is also encrypted, and prevents its disclosure from causing to expose user privacy information.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (9)

1. a kind of anti-quantum calculation block chain secure transactions method based on P2P pool of symmetric keys, which is characterized in that including multiple User terminal and the P2P for passing through network connection with each user terminal store network, the quantum key card of each user terminal configuration In be stored with user terminal public key and private key, be stored with each user terminal public key in the pool of symmetric keys of P2P storage network configuration and add Close symmetric key when transaction is initiated, initiates user terminal and generates specific letter to generated transaction progress certain operations of unsigning Numerical value, the function value generate trading signature in conjunction with party B private key, initiate user terminal for trading signature and are used to decrypt described The public key encryption of trading signature is sent to each user terminal of block chain.
2. the anti-quantum calculation block chain secure transactions method according to claim 1 based on P2P pool of symmetric keys, special Sign is that the method for initiating user terminal generation specific function value includes: that will unsign to trade after internal data adjusts to carry out Specific function operation obtains the specific function value.
3. the anti-quantum calculation block chain secure transactions method according to claim 2 based on P2P pool of symmetric keys, special Sign is that the functional operation is Hash operation, and the specific function value is cryptographic Hash.
4. the anti-quantum calculation block chain secure transactions method according to claim 2 based on P2P pool of symmetric keys, special Sign is that the encryption method of the trading signature and the public key for decrypting the trading signature includes: by the initiation user It holds random number generated in conjunction with the ID of the specified pool of symmetric keys, pointer, and benefit is obtained according to particular pointer function The key that pool of symmetric keys assigned in the network extracts encryption is stored from the P2P with the pointer, is decrypted using user terminal private key After the key of the encryption, key obtained is obtained for encrypt the friendship in conjunction with the specific function value and using functional operation The easily key of signature and the public key for decrypting the trading signature.
5. a kind of anti-quantum calculation block chain secure transactions method based on P2P pool of symmetric keys, including a plurality of clients and Network is stored by the P2P of network connection with each user terminal, is stored in the quantum key card of each user terminal configuration useful Family end public key and private key, P2P are stored in the pool of symmetric keys of network configuration and are stored by the symmetrical close of each user terminal public key encryption Key initiates user terminal for trading signature and is used to decrypt the public key encryption of the trading signature and is sent to each use of block chain Family end, which is characterized in that when transaction verification, unsigned and traded and to the transaction of unsigning using verifying user terminal generation It carries out certain operations and generates specific function value, the specific function value and party B key card random number generated and pool of symmetric keys ID combine generation key, which is used to decrypt the described for decrypting the transaction of the encryption trading signature and encryption The public key of signature realizes transaction after the trading signature of the encryption described in the public key decryptions compared with the specific function value Verifying.
6. the anti-quantum calculation block chain secure transactions method according to claim 5 based on P2P pool of symmetric keys, special Sign is, the method that the verifying user terminal generates the specific function value includes: after unsigning and trading internal data adjustment It carries out functional operation and obtains the specific function value.
7. the anti-quantum calculation block chain secure transactions method according to claim 6 based on P2P pool of symmetric keys, special Sign is that the function value is combined with the ID of party B key card random number generated and pool of symmetric keys generates key Method include: by random number generated in the verifying user terminal key card in conjunction with the ID of the pool of symmetric keys, according to Particular pointer function obtains pointer, and and is added using the pointer from P2P storage pool of symmetric keys extraction assigned in the network Close key, after the key that the encryption is decrypted using user terminal private key, the key is in conjunction with the specific function value and utilizes function Operation obtains the key.
8. the anti-quantum calculation block chain secure transactions method according to claim 5 based on P2P pool of symmetric keys, special Sign is, after the signature transaction after verifying is encrypted, carries out internal data adjustment and is stored in block chain.
9. a kind of anti-quantum calculation block chain secure transactions system based on P2P pool of symmetric keys, including a plurality of clients and Network is stored by the P2P of network connection with each user terminal, is stored in the quantum key card of each user terminal configuration useful Family end public key and private key, P2P are stored in the pool of symmetric keys of network configuration and are stored by the symmetrical close of each user terminal public key encryption Key, which is characterized in that
When transaction is initiated, initiates user terminal and specific function value, the letter are generated to generated transaction progress certain operations of unsigning Number numerical value generates trading signature in conjunction with party B private key, initiates user terminal and by trading signature and is used to decrypt the trading signature Public key encryption is sent to each user terminal of block chain;
When transaction verification, is unsigned using verifying user terminal generation and trade and certain operations are carried out to the transaction of unsigning Specific function value is generated, which combines life with the ID of party B key card random number generated and pool of symmetric keys At key, which is used to decrypt the public key for being used to decrypt the trading signature of the encryption trading signature and encryption, After the trading signature of the encryption described in the public key decryptions compared with the specific function value, transaction verification is realized.
CN201811524778.7A 2018-12-13 2018-12-13 Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys Pending CN109547461A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811524778.7A CN109547461A (en) 2018-12-13 2018-12-13 Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811524778.7A CN109547461A (en) 2018-12-13 2018-12-13 Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys

Publications (1)

Publication Number Publication Date
CN109547461A true CN109547461A (en) 2019-03-29

Family

ID=65854969

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811524778.7A Pending CN109547461A (en) 2018-12-13 2018-12-13 Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys

Country Status (1)

Country Link
CN (1) CN109547461A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111464544A (en) * 2020-04-01 2020-07-28 中国联合网络通信集团有限公司 Block chain account book generation method and device
CN113079000A (en) * 2021-03-04 2021-07-06 深圳大学 Consensus method based on verifiable quantum random number
CN113765665A (en) * 2021-11-10 2021-12-07 济南量子技术研究院 Block chain network based on quantum key and data secure transmission method
CN114520716A (en) * 2020-11-19 2022-05-20 如般量子科技有限公司 Chargeable quantum key and quantum key distribution network charging method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080097924A1 (en) * 2006-10-20 2008-04-24 Electronic Plastics, Llc Decentralized secure transaction system
US20110320359A1 (en) * 2008-12-12 2011-12-29 Dake Li secure communication method and device based on application layer for mobile financial service
CN106330452A (en) * 2016-08-13 2017-01-11 深圳市樊溪电子有限公司 Security network attachment device and method for block chain
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
CN108369697A (en) * 2015-10-16 2018-08-03 科因普拉格株式会社 Recognized certificate based on block chain signs and issues system and method and recognized certificate Verification System and method based on block chain
US20180308098A1 (en) * 2015-05-05 2018-10-25 ShoCard, Inc. Identity Management Service Using A Block Chain Providing Identity Transactions Between Devices
CN108737114A (en) * 2018-06-19 2018-11-02 天津中兴云链技术有限公司 A kind of endorsement method and device of the block catenary system based on quantum key distribution
CN108989033A (en) * 2018-07-31 2018-12-11 如般量子科技有限公司 A kind of cloud storage method of controlling security and system based on public keys pond

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080097924A1 (en) * 2006-10-20 2008-04-24 Electronic Plastics, Llc Decentralized secure transaction system
US20110320359A1 (en) * 2008-12-12 2011-12-29 Dake Li secure communication method and device based on application layer for mobile financial service
US20180308098A1 (en) * 2015-05-05 2018-10-25 ShoCard, Inc. Identity Management Service Using A Block Chain Providing Identity Transactions Between Devices
CN108369697A (en) * 2015-10-16 2018-08-03 科因普拉格株式会社 Recognized certificate based on block chain signs and issues system and method and recognized certificate Verification System and method based on block chain
CN106330452A (en) * 2016-08-13 2017-01-11 深圳市樊溪电子有限公司 Security network attachment device and method for block chain
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
CN108737114A (en) * 2018-06-19 2018-11-02 天津中兴云链技术有限公司 A kind of endorsement method and device of the block catenary system based on quantum key distribution
CN108989033A (en) * 2018-07-31 2018-12-11 如般量子科技有限公司 A kind of cloud storage method of controlling security and system based on public keys pond

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
葛利洁: "基于区块链技术的交易信息存储与查询系统的设计与实现", 《中国优秀硕士学位论文全文数据库(电子期刊 信息科技辑)》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111464544A (en) * 2020-04-01 2020-07-28 中国联合网络通信集团有限公司 Block chain account book generation method and device
CN114520716A (en) * 2020-11-19 2022-05-20 如般量子科技有限公司 Chargeable quantum key and quantum key distribution network charging method and system
CN114520716B (en) * 2020-11-19 2024-02-13 如般量子科技有限公司 Chargeable quantum key and method and system for charging quantum key distribution network
CN113079000A (en) * 2021-03-04 2021-07-06 深圳大学 Consensus method based on verifiable quantum random number
CN113079000B (en) * 2021-03-04 2023-01-10 深圳大学 Consensus method based on verifiable quantum random number
CN113765665A (en) * 2021-11-10 2021-12-07 济南量子技术研究院 Block chain network based on quantum key and data secure transmission method

Similar Documents

Publication Publication Date Title
US20230208627A1 (en) Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
ES2687182T3 (en) Determine a common secret for the secure exchange of information and hierarchical and deterministic cryptographic keys
CN109547461A (en) Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys
CN109150519A (en) Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond
CN111010280B (en) Group signature-based construction method for monitorable block chain
TWI813616B (en) Computer implemented method and system for obtaining digitally signed data
CN109919611A (en) Anti- quantum calculation block chain method of commerce and system based on symmetric key pool server
CN109660345A (en) Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pool server
CN109919609A (en) Anti- quantum calculation block chain secure transactions method and system based on public key pond
CN109919610A (en) Anti- quantum calculation block chain secure transactions method and system based on P2P public key pond
CN109687961B (en) Quantum computation resistant blockchain transaction method and system based on symmetric key pool routing device
CN110517040A (en) Anti- quantum calculation block chain secure transactions method, system and equipment based on group's unsymmetrical key pond
CN109670827A (en) Anti- quantum calculation block chain method of commerce based on pool of symmetric keys
CN109784917A (en) Anti- quantum calculation block chain secure transactions system and method based on pool of symmetric keys
KR102546762B1 (en) Multi-signature wallet system in blockchain using the bloom filter
Hudic et al. A generation method of cryptographic keys for enterprise communication systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190329

RJ01 Rejection of invention patent application after publication