CN109547461A - Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys - Google Patents
Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys Download PDFInfo
- Publication number
- CN109547461A CN109547461A CN201811524778.7A CN201811524778A CN109547461A CN 109547461 A CN109547461 A CN 109547461A CN 201811524778 A CN201811524778 A CN 201811524778A CN 109547461 A CN109547461 A CN 109547461A
- Authority
- CN
- China
- Prior art keywords
- key
- user terminal
- pool
- symmetric keys
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The present invention relates to a kind of anti-quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys, network is stored including a plurality of clients and with P2P, each user terminal configures quantum key card, P2P stores network configuration pool of symmetric keys, it initiates user terminal to generate specific function value and generate trading signature in conjunction with party B private key, initiates user terminal and trading signature encryption is sent on block chain;The verifying user terminal generates specific function value, the specific function value combination party B key card and the ID of pool of symmetric keys combine generation key, after key decryption acquisition trading signature compared with specific function value, realize transaction verification, pool of symmetric keys is stored in P2P storage network, because P2P stores network non-stop layer node, it improves security of system and also mitigates user terminal burden, the setting of key card substantially reduces a possibility that stealing key by Malware, since quantum computer is unable to get client public key, it is then also unable to get corresponding private key.
Description
Technical field
The present invention relates to block chain fields, more particularly to the secrecy of the anti-quantum calculation block chain based on P2P pool of symmetric keys
Transaction system and method.
Background technique
Block chain is a kind of completely new distributed basis framework and calculation paradigm, is stored using orderly linked data structure
Data ensure data safety using cryptological technique using common recognition algorithm more new data.In the transaction based on block chain, really
The privacy of the data safety and client of protecting transaction is the necessary condition that block chain can further develop.For this purpose, cryptological technique
Especially public-key cryptographic keys are widely used in block chain.
P2P storage is a kind of network storage realized based on P2P (Peer-to-Peer) technology, by many machine equities
Mode organize and common provide the data storage service of vast capacity for user.This technology is computer network and distribution
The product that formula system combines, core concept is to eliminate the concept of central server, and the base in equity interconnection is established in internet
On plinth, maximum resource-sharing is realized.
As most people is understood, quantum computer has great potential in password cracking.Mainstream is non-now
Symmetrically (public key) Encryption Algorithm, such as RSA cryptographic algorithms, it is most of to be all based in factorization or the finite field of big integer
The two difficult math questions of the calculating of discrete logarithm.Their difficulty that cracks also is dependent on the efficiency solved these problems.Tradition
On computer, it is desirable that solve the two difficult math questions, the cost time is the exponential time (to crack the time with the growth of public key length
Increased with exponential), this is unacceptable in practical applications.It and is that your elegant algorithm for making to measure of quantum computer can be with
In polynomial time (time is cracked as the growth of public key length is increased with the speed of k power, wherein k is long with public key
Spend unrelated constant) carry out integer factorization or discrete logarithm and calculate, thus for RSA, discrete logarithm Encryption Algorithm it is broken
Solution provides may.
Problem of the existing technology:
(1) pool of symmetric keys is stored in key card by each user terminal, occupies larger space.
(2) in the prior art, the equal unencryption of the transimission and storage of block chain.
(3) corresponding private key, existing block chain counterparty are obtained quickly through public key due to quantum calculation function
Method is easy to be cracked by quantum computer.
(4) in the prior art, the outputting and inputting for digital signature based on public and private key can be known to enemy, in quantum meter
In the presence of calculation machine, it may be derived private key, block catenary system is caused to be cracked by quantum computer.
(5) in the prior art, the disclosure for being transferred to wallet address and being transferred to the amount of money in the transaction of block chain may expose use
Family privacy information.
Summary of the invention
Based on this, it is necessary in view of the above-mentioned problems, providing a kind of anti-quantum calculation block chain based on P2P pool of symmetric keys
Secure transactions system and method.
A kind of anti-quantum calculation block chain secure transactions method based on P2P pool of symmetric keys, including a plurality of clients with
And network is stored by the P2P of network connection with each user terminal, it is stored in the quantum key card of each user terminal configuration
User terminal public key and private key, P2P storage network configuration pool of symmetric keys in be stored with the symmetrical of each user terminal public key encryption
Key when transaction is initiated, initiates user terminal and generates specific function value, the letter to generated transaction progress certain operations of unsigning
Number numerical value generates trading signature in conjunction with party B private key, initiates user terminal and by trading signature and is used to decrypt the trading signature
Public key encryption is sent to each user terminal of block chain.
Block chain is a kind of data structure for sequentially in time forming data block with the mode of similar chained list, and with
Cryptography mode guarantees to distort and the distributed decentralization account book that can not forge, can secure storage is simple, has elder generation
Afterwards relationship, the data that can be verified in system.Wherein, cryptography mainly uses public key cryptography.
In the present embodiment, each of block chain node has matched key card, and the side of issuing of key card is key
The supervisor side of card, the generally administrative department of certain enterprise or public institution, the side of being awarded of key card are the supervisor side of key card
The employees at different levels of the member managed, generally certain enterprise or public institution.There are client public key and private key in key card.
The method for initiating user terminal generation specific function value includes: the friendship that will unsign in one of the embodiments,
Easy internal data adjusts laggard particular row functional operation and obtains the specific function value.
The functional operation is Hash operation in one of the embodiments, and the specific function value is cryptographic Hash.
The encryption method of the trading signature and the public key for decrypting the trading signature in one of the embodiments,
It include: by the initiation user terminal random number generated in conjunction with the ID of the specified pool of symmetric keys, according to specific finger
Needle function obtains pointer, and stores the key that pool of symmetric keys assigned in the network extracts encryption from the P2P using the pointer,
After the key for decrypting the encryption using user terminal private key, key obtained is in conjunction with the specific function value and utilizes functional operation
Obtain the key of the public key for encrypting the trading signature and for decrypting the trading signature.
A kind of anti-quantum calculation block chain secure transactions method based on P2P pool of symmetric keys, including a plurality of clients with
And network is stored by the P2P of network connection with each user terminal, it is stored in the quantum key card of each user terminal configuration
User terminal public key and private key, P2P are stored in the pool of symmetric keys of network configuration and are stored by the symmetrical of each user terminal public key encryption
Key initiates user terminal for trading signature and is used to decrypt the public key encryption of the trading signature and is sent to each described of block chain
User terminal when transaction verification, is unsigned using verifying user terminal generation and transaction and is carried out to the transaction of unsigning specific
Operation generates specific function value, and the ID phase of the specific function value and party B key card random number generated and pool of symmetric keys is tied
At key, which is used to decrypt the public affairs for being used to decrypt the trading signature of the encryption trading signature and encryption for symphysis
Key realizes transaction verification after the trading signature of the encryption described in the public key decryptions compared with the specific function value.
The method that the verifying user terminal generates the specific function value in one of the embodiments, includes: not sign
Name transaction internal data adjusts laggard line function operation and obtains the specific function value.
The function value and party B key card random number generated and pool of symmetric keys in one of the embodiments,
ID combine generate key method include: by random number generated in the verifying user terminal key card and it is described symmetrically
The ID of pool of keys is combined, and obtains pointer according to particular pointer function, and and specify from P2P storage network using the pointer
Pool of symmetric keys extract the key of encryption, after the key that the encryption is decrypted using user terminal private key, the key is in conjunction with the spy
Determine functional value and obtains the key using functional operation.
In one of the embodiments, verify after signature transaction it is encrypted after, carry out internal data adjustment is stored in area
In block chain.
A kind of anti-quantum calculation block chain secure transactions system based on P2P pool of symmetric keys, including a plurality of clients with
And network is stored by the P2P of network connection with each user terminal, it is stored in the quantum key card of each user terminal configuration
User terminal public key and private key, P2P are stored in the pool of symmetric keys of network configuration and are stored by the symmetrical of each user terminal public key encryption
Key when transaction is initiated, initiates user terminal and generates specific function value, the letter to generated transaction progress certain operations of unsigning
Number numerical value generates trading signature in conjunction with party B private key, initiates user terminal and by trading signature and is used to decrypt the trading signature
Public key encryption is sent to each user terminal of block chain;When transaction verification, friendship of unsigning is generated using the verifying user terminal
Easily and certain operations are carried out to the transaction of unsigning and generate specific function value, which is generated with party B key card
Random number and the ID of pool of symmetric keys combine generation key, which is used to decrypt the encryption trading signature and encryption
It is described for decrypting the public key of the trading signature, after the trading signature of the encryption described in the public key decryptions with the specific letter
Numerical value compares, and realizes transaction verification.
The above-mentioned anti-quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys, including multiple use
Family end and network is stored by the P2P of network connection with each user terminal, in the quantum key card of each user terminal configuration
It is stored with user terminal public key and private key, P2P is stored in the pool of symmetric keys of network configuration and stored by each user terminal public key encryption
Symmetric key, transaction initiate when, initiate user terminal to it is generated unsign transaction carry out certain operations generate specific function
Value, the function value generate trading signature in conjunction with party B private key, initiate user terminal and by trading signature and are used to decrypt the friendship
The public key encryption easily signed is sent to each user terminal of block chain;When transaction verification, generated using the verifying user terminal
It unsigns to trade and carry out certain operations to the transaction of unsigning and generates specific function value, the specific function value and party B key
The ID for blocking random number and pool of symmetric keys generated combines generation key, and the key is for decrypting the encryption trading signature
And encryption is described for decrypting the public key of the trading signature, after the trading signature of the encryption described in the public key decryptions with institute
It states specific function value to compare, realizes transaction verification, store pool of symmetric keys in P2P storage network, since P2P storage network does not have
There is central node, it is not vulnerable, the safety of system is further improved, the burden of user terminal is also mitigated, uses simultaneously
The public key of encryption is simultaneously stored in key card, and key card is independent hardware isolated equipment, is substantially reduced by Malware or evil
A possibility that key is stolen in meaning operation, since quantum computer is unable to get client public key, is then also unable to get corresponding private
Key.In addition, the trading signature based on public and private key is also further encrypted by key, even if in the presence of quantum computer,
Also it is difficult to be derived private key, therefore the program is not easy to be cracked by quantum computer.
Detailed description of the invention
Fig. 1 is communication system architecture figure provided in an embodiment of the present invention;
Fig. 2 is that P2P stores network structure;
Fig. 3 is the structural schematic diagram of transaction of unsigning;
Fig. 4 is structure of deal schematic diagram in the m times signature process;
Fig. 5 is the structural schematic diagram of the transaction of having signed of encryption;
Fig. 6 is the product process figure for ciphering signature and the key of public key;
Fig. 7 is the product process figure for encrypting the key of wallet address and amount of the fund;
Fig. 8 is the relation schematic diagram of block and transaction;
Fig. 9 is the structure of deal schematic diagram for being stored into block
Figure 10 is original digging mine transaction schematic diagram;
Figure 11 is digging mine transaction schematic diagram after encryption.
Specific embodiment
Process of exchange in the present embodiment in block chain, general thought be to block chain transaction in digital signature, public key,
It is transferred to wallet address and is transferred to the amount of money and encrypted, while pool of symmetric keys being stored in P2P storage network.
A kind of anti-quantum calculation block chain secure transactions system based on P2P pool of symmetric keys, including a plurality of clients with
And network is stored by the P2P of network connection with each user terminal, it is stored in the quantum key card of each user terminal configuration
User terminal public key and private key, P2P are stored in the pool of symmetric keys of network configuration and are stored by the symmetrical of each user terminal public key encryption
Key when transaction is initiated, initiates user terminal and generates specific function value, the letter to generated transaction progress certain operations of unsigning
Number numerical value generates trading signature in conjunction with party B private key, initiates user terminal and by trading signature and is used to decrypt the trading signature
Public key encryption is sent to each user terminal of block chain;When transaction verification, friendship of unsigning is generated using the verifying user terminal
Easily and certain operations are carried out to the transaction of unsigning and generate specific function value, which is generated with party B key card
Random number and the ID of pool of symmetric keys combine generation key, which is used to decrypt the encryption trading signature and encryption
It is described for decrypting the public key of the trading signature, after the trading signature of the encryption described in the public key decryptions with the specific letter
Numerical value compares, and realizes transaction verification.
Embodiment
This system structure has corresponding block chain to answer as shown in Figure 1, a node of each user as block chain
With, and it is furnished with key card.U key card is shared, has client public key PK, private key SK in each key card;Key card is by block
Chain application is called, and key does not go out key card.
For P2P storage network structure as shown in Fig. 2, there being z pool of symmetric keys, ID is KID=Ki (i=1~z).It is right
Claim pool of keys to use z symmetric key KKi (i=1~z) encryption respectively, be true random number, preferably quantum random number.Often
A KKi (i=1~z) is all encrypted by u PKi (i=1~u).P2P stores all data in network by user or key
Card issuer uploads, and P2P storage network can not be decrypted.
Specific step is as follows for transaction:
Step 1.1 generates the RTx that trades that unsigns:;
Before initiating transaction, trade initiator, which initiates user terminal A, need to generate the RTx that trades that unsigns, structure such as Fig. 3 institute
Show.In Fig. 3, InN indicates serial number of certain the input fund in this Tx;TxID indicates certain input fund where its source
The ID of Tx.Generally desirable TxID=Hash (Tx);N indicates certain input fund in the Tx where its source as finance of export
Serial number;OutN indicates serial number of certain finance of export in this Tx;Dest indicates the address that is transferred to of certain finance of export, generally
It is the form of wallet;Value indicates the number of certain finance of export.
Step 1.2 generates trading signature Txs;
By taking the m times signature as an example, change as shown in Figure 4 is made to RTx and obtains RTxm.When the m times signature, acquisition m is defeated
Enter the amount of money corresponding Dest value in the Tx where its source.Acquisition modes are shown in step 7:
RTx is added as PreDestm in the Dest value and obtains RTxm.Hash is carried out to RTxm, obtains hash value Txhm;
It is signed using private key SKm to Txhm, obtains m-th of signature Txsm.All Txs are obtained with identical method.Certain basis
Design needs, and initiates user terminal and generates specific function value, the function value to generated transaction progress certain operations of unsigning
Trading signature is generated in conjunction with party B private key, wherein it is described initiate the user terminal method that generates the specific function value include: by
Progress specific function operation after trading internal data adjustment of unsigning obtains the specific function value, and the certain operations are not limited to
Hash operation, as long as the trading signature can be generated.
Step 1.3 carries out the digital signature Txs for taking certain input fund and the public key PK for taking certain input fund
Encryption.
For every input fund, Txs and PK are encrypted with respective sk respectively, and encrypted Tx is as shown in Figure 5.It obtains
The step of sk, is as shown in fig. 6, verbal description is as follows:
Random number rs, rs and the symmetric key used are generated by the randomizer in the matched key card of the user terminal
ID, that is, the KID in pond obtains pointer ps in conjunction with specific pointer function fps together and is specified from P2P storage network by KID close
The ks of encryption is extracted in key pond.It decrypts to obtain using the KK corresponding with the specified pool of keys of KID decrypted by private key
ks.The cryptographic Hash Txh associative function fsk of ks and RTx obtains the key sk for encrypting Txs and PK.
Step 1.4 sends Tx;
It will sign and broadcasted the transaction Tx of encrypted signature to all nodes of block chain network.
Step 1.5 verifies Tx:;
Each node in block chain network verifies the transaction.
When transaction verification, is unsigned using verifying user terminal generation and trade and the transaction of unsigning is carried out specific
Operation generates specific function value, and the ID phase of the specific function value and party B key card random number generated and pool of symmetric keys is tied
At key, which is used to decrypt the public affairs for being used to decrypt the trading signature of the encryption trading signature and encryption for symphysis
Key realizes transaction verification after the trading signature of the encryption described in the public key decryptions compared with the specific function value.
During transaction verification, each node in block chain network can be used as verifying node.Verify node with it is upper
The identical mode of text forms the RTx of an authentication, carries out Hash to RTx and obtains hash value Txh.It is counted according to rs, KID and Txh
Sk is calculated, detailed process is as shown in fig. 6, verbal description is same as above.Reuse sk decryption Txs and PK.Use public key decryptions
Signature compares obtained Txh ' and Txh, completes verifying.Different the amount of money is produced if producing amount information and including more
Source then produces the corresponding encryption of the amount of money to more using same procedure and produces signature and verifies.
After verifying to each signature, verifying node is according to the TxID of each input amount of money in the historical record of block chain
It finds and produces the amount of money, to prove the existence of this each input amount of money of trading.It is obtained after the verifying node taking-up input amount of money defeated
Enter amount of money total value, compares, check whether equal with this output amount of money total value;It is verified if equal;If no
Equal then authentication failed.
Block is added in the transaction by step 1.6: block and the relationship of transaction are as shown in Figure 8.
Step 1.6.1 first encrypts wallet address D est and amount of the fund Value with tk before block is added in Tx.?
The step of to tk, is as shown in fig. 7, verbal description is as follows:
Random number rt, rt and the symmetric key used are generated by the randomizer in the matched key card of the user terminal
ID, that is, the KID in pond obtains pointer pt and extracts the kt of encryption from pool of keys in conjunction with specific pointer function fpt together.It uses
It decrypts to obtain kt by the KKi that private key is decrypted.Kt associative function ftk together with the cryptographic Hash Th of this importation Tx is obtained
To the key tk for encrypting Dest and Value.
Tx ' is obtained after encrypting Dest and Value using respective tk, Tx ', which is added, in KID and each rt becomes entirety Tx ",
Block is added as the final form of transaction in Tx ", sees Fig. 9.And obtain the TxID=Hash (Tx ") of this transaction.
Step 1.6.2 miner forms digging mine and trades and encrypt;
Miner forms a digging mine transaction as shown in Figure 10, importation fill the affiliated mine pond of some miners or other
Necessary information, output par, c is identical as general transaction, and output amount of money total amount is identical as the amount of money award of block is generated.It generates and digs mine
After transaction, Dest and Value is encrypted using each tk obtained by each rt generated at random and obtains as shown in figure 11 add
Digging mine transaction after close, while being additionally added each rt.
Step 1.6.3 miner, which calculates, digs mine random number;
Miner calculates the random number for meeting rule, that is, obtains this book keeping operation power, the digging that oneself is generated and is encrypted
Mine transaction is added in block.
Step 1.6.4 miner broadcasts successfully digging mining area block;
After miner obtains successfully digging mining area block, which is broadcasted, remaining node verifies block.Mainly verify
Dig whether mine random number meets rule.It is such as proved to be successful, then receiving the block is new block.
Step 1.7 decrypts Dest and Value;
Tx " is found according to TxID, Dest and Value is decrypted by each rt.Wherein Dest is used to construct new Tx, and
Verifying of the Dest and Value for Txs in step 1.5.
Pool of symmetric keys used in the present embodiment is stored in P2P storage network, and P2P storage network does not have centromere
Point, it is not vulnerable, also possess good scalability and self-organization, pool of symmetric keys is stored encrypted in P2P storage net
The safety of system is further improved in network, also mitigates the burden of user terminal.This patent is used to add using the public key of encryption
The key storage of Migong key is in key card.Key card is independent hardware isolated equipment, is stolen by Malware or malicious operation
A possibility that taking key substantially reduces.Since quantum computer is unable to get client public key, it is then also unable to get corresponding private
Key.In addition, the digital signature based on public and private key is also further encrypted by key in the present invention.Even if existing in quantum computer
In the case where, it is also difficult to it is derived private key.Therefore the program is not easy to be cracked by quantum computer.To block chain in the present invention
Being transferred to wallet address and being transferred to the amount of money in transaction is also encrypted, and prevents its disclosure from causing to expose user privacy information.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention
Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (9)
1. a kind of anti-quantum calculation block chain secure transactions method based on P2P pool of symmetric keys, which is characterized in that including multiple
User terminal and the P2P for passing through network connection with each user terminal store network, the quantum key card of each user terminal configuration
In be stored with user terminal public key and private key, be stored with each user terminal public key in the pool of symmetric keys of P2P storage network configuration and add
Close symmetric key when transaction is initiated, initiates user terminal and generates specific letter to generated transaction progress certain operations of unsigning
Numerical value, the function value generate trading signature in conjunction with party B private key, initiate user terminal for trading signature and are used to decrypt described
The public key encryption of trading signature is sent to each user terminal of block chain.
2. the anti-quantum calculation block chain secure transactions method according to claim 1 based on P2P pool of symmetric keys, special
Sign is that the method for initiating user terminal generation specific function value includes: that will unsign to trade after internal data adjusts to carry out
Specific function operation obtains the specific function value.
3. the anti-quantum calculation block chain secure transactions method according to claim 2 based on P2P pool of symmetric keys, special
Sign is that the functional operation is Hash operation, and the specific function value is cryptographic Hash.
4. the anti-quantum calculation block chain secure transactions method according to claim 2 based on P2P pool of symmetric keys, special
Sign is that the encryption method of the trading signature and the public key for decrypting the trading signature includes: by the initiation user
It holds random number generated in conjunction with the ID of the specified pool of symmetric keys, pointer, and benefit is obtained according to particular pointer function
The key that pool of symmetric keys assigned in the network extracts encryption is stored from the P2P with the pointer, is decrypted using user terminal private key
After the key of the encryption, key obtained is obtained for encrypt the friendship in conjunction with the specific function value and using functional operation
The easily key of signature and the public key for decrypting the trading signature.
5. a kind of anti-quantum calculation block chain secure transactions method based on P2P pool of symmetric keys, including a plurality of clients and
Network is stored by the P2P of network connection with each user terminal, is stored in the quantum key card of each user terminal configuration useful
Family end public key and private key, P2P are stored in the pool of symmetric keys of network configuration and are stored by the symmetrical close of each user terminal public key encryption
Key initiates user terminal for trading signature and is used to decrypt the public key encryption of the trading signature and is sent to each use of block chain
Family end, which is characterized in that when transaction verification, unsigned and traded and to the transaction of unsigning using verifying user terminal generation
It carries out certain operations and generates specific function value, the specific function value and party B key card random number generated and pool of symmetric keys
ID combine generation key, which is used to decrypt the described for decrypting the transaction of the encryption trading signature and encryption
The public key of signature realizes transaction after the trading signature of the encryption described in the public key decryptions compared with the specific function value
Verifying.
6. the anti-quantum calculation block chain secure transactions method according to claim 5 based on P2P pool of symmetric keys, special
Sign is, the method that the verifying user terminal generates the specific function value includes: after unsigning and trading internal data adjustment
It carries out functional operation and obtains the specific function value.
7. the anti-quantum calculation block chain secure transactions method according to claim 6 based on P2P pool of symmetric keys, special
Sign is that the function value is combined with the ID of party B key card random number generated and pool of symmetric keys generates key
Method include: by random number generated in the verifying user terminal key card in conjunction with the ID of the pool of symmetric keys, according to
Particular pointer function obtains pointer, and and is added using the pointer from P2P storage pool of symmetric keys extraction assigned in the network
Close key, after the key that the encryption is decrypted using user terminal private key, the key is in conjunction with the specific function value and utilizes function
Operation obtains the key.
8. the anti-quantum calculation block chain secure transactions method according to claim 5 based on P2P pool of symmetric keys, special
Sign is, after the signature transaction after verifying is encrypted, carries out internal data adjustment and is stored in block chain.
9. a kind of anti-quantum calculation block chain secure transactions system based on P2P pool of symmetric keys, including a plurality of clients and
Network is stored by the P2P of network connection with each user terminal, is stored in the quantum key card of each user terminal configuration useful
Family end public key and private key, P2P are stored in the pool of symmetric keys of network configuration and are stored by the symmetrical close of each user terminal public key encryption
Key, which is characterized in that
When transaction is initiated, initiates user terminal and specific function value, the letter are generated to generated transaction progress certain operations of unsigning
Number numerical value generates trading signature in conjunction with party B private key, initiates user terminal and by trading signature and is used to decrypt the trading signature
Public key encryption is sent to each user terminal of block chain;
When transaction verification, is unsigned using verifying user terminal generation and trade and certain operations are carried out to the transaction of unsigning
Specific function value is generated, which combines life with the ID of party B key card random number generated and pool of symmetric keys
At key, which is used to decrypt the public key for being used to decrypt the trading signature of the encryption trading signature and encryption,
After the trading signature of the encryption described in the public key decryptions compared with the specific function value, transaction verification is realized.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811524778.7A CN109547461A (en) | 2018-12-13 | 2018-12-13 | Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811524778.7A CN109547461A (en) | 2018-12-13 | 2018-12-13 | Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109547461A true CN109547461A (en) | 2019-03-29 |
Family
ID=65854969
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811524778.7A Pending CN109547461A (en) | 2018-12-13 | 2018-12-13 | Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109547461A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111464544A (en) * | 2020-04-01 | 2020-07-28 | 中国联合网络通信集团有限公司 | Block chain account book generation method and device |
CN113079000A (en) * | 2021-03-04 | 2021-07-06 | 深圳大学 | Consensus method based on verifiable quantum random number |
CN113765665A (en) * | 2021-11-10 | 2021-12-07 | 济南量子技术研究院 | Block chain network based on quantum key and data secure transmission method |
CN114520716A (en) * | 2020-11-19 | 2022-05-20 | 如般量子科技有限公司 | Chargeable quantum key and quantum key distribution network charging method and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080097924A1 (en) * | 2006-10-20 | 2008-04-24 | Electronic Plastics, Llc | Decentralized secure transaction system |
US20110320359A1 (en) * | 2008-12-12 | 2011-12-29 | Dake Li | secure communication method and device based on application layer for mobile financial service |
CN106330452A (en) * | 2016-08-13 | 2017-01-11 | 深圳市樊溪电子有限公司 | Security network attachment device and method for block chain |
CN106503589A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | The method of calibration of block chain Transaction Information correctness, apparatus and system |
CN106790253A (en) * | 2017-01-25 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Authentication method and device based on block chain |
CN108369697A (en) * | 2015-10-16 | 2018-08-03 | 科因普拉格株式会社 | Recognized certificate based on block chain signs and issues system and method and recognized certificate Verification System and method based on block chain |
US20180308098A1 (en) * | 2015-05-05 | 2018-10-25 | ShoCard, Inc. | Identity Management Service Using A Block Chain Providing Identity Transactions Between Devices |
CN108737114A (en) * | 2018-06-19 | 2018-11-02 | 天津中兴云链技术有限公司 | A kind of endorsement method and device of the block catenary system based on quantum key distribution |
CN108989033A (en) * | 2018-07-31 | 2018-12-11 | 如般量子科技有限公司 | A kind of cloud storage method of controlling security and system based on public keys pond |
-
2018
- 2018-12-13 CN CN201811524778.7A patent/CN109547461A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080097924A1 (en) * | 2006-10-20 | 2008-04-24 | Electronic Plastics, Llc | Decentralized secure transaction system |
US20110320359A1 (en) * | 2008-12-12 | 2011-12-29 | Dake Li | secure communication method and device based on application layer for mobile financial service |
US20180308098A1 (en) * | 2015-05-05 | 2018-10-25 | ShoCard, Inc. | Identity Management Service Using A Block Chain Providing Identity Transactions Between Devices |
CN108369697A (en) * | 2015-10-16 | 2018-08-03 | 科因普拉格株式会社 | Recognized certificate based on block chain signs and issues system and method and recognized certificate Verification System and method based on block chain |
CN106330452A (en) * | 2016-08-13 | 2017-01-11 | 深圳市樊溪电子有限公司 | Security network attachment device and method for block chain |
CN106503589A (en) * | 2016-10-26 | 2017-03-15 | 北京瑞卓喜投科技发展有限公司 | The method of calibration of block chain Transaction Information correctness, apparatus and system |
CN106790253A (en) * | 2017-01-25 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Authentication method and device based on block chain |
CN108737114A (en) * | 2018-06-19 | 2018-11-02 | 天津中兴云链技术有限公司 | A kind of endorsement method and device of the block catenary system based on quantum key distribution |
CN108989033A (en) * | 2018-07-31 | 2018-12-11 | 如般量子科技有限公司 | A kind of cloud storage method of controlling security and system based on public keys pond |
Non-Patent Citations (1)
Title |
---|
葛利洁: "基于区块链技术的交易信息存储与查询系统的设计与实现", 《中国优秀硕士学位论文全文数据库(电子期刊 信息科技辑)》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111464544A (en) * | 2020-04-01 | 2020-07-28 | 中国联合网络通信集团有限公司 | Block chain account book generation method and device |
CN114520716A (en) * | 2020-11-19 | 2022-05-20 | 如般量子科技有限公司 | Chargeable quantum key and quantum key distribution network charging method and system |
CN114520716B (en) * | 2020-11-19 | 2024-02-13 | 如般量子科技有限公司 | Chargeable quantum key and method and system for charging quantum key distribution network |
CN113079000A (en) * | 2021-03-04 | 2021-07-06 | 深圳大学 | Consensus method based on verifiable quantum random number |
CN113079000B (en) * | 2021-03-04 | 2023-01-10 | 深圳大学 | Consensus method based on verifiable quantum random number |
CN113765665A (en) * | 2021-11-10 | 2021-12-07 | 济南量子技术研究院 | Block chain network based on quantum key and data secure transmission method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230208627A1 (en) | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system | |
ES2687182T3 (en) | Determine a common secret for the secure exchange of information and hierarchical and deterministic cryptographic keys | |
CN109547461A (en) | Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys | |
CN109150519A (en) | Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond | |
CN111010280B (en) | Group signature-based construction method for monitorable block chain | |
TWI813616B (en) | Computer implemented method and system for obtaining digitally signed data | |
CN109919611A (en) | Anti- quantum calculation block chain method of commerce and system based on symmetric key pool server | |
CN109660345A (en) | Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pool server | |
CN109919609A (en) | Anti- quantum calculation block chain secure transactions method and system based on public key pond | |
CN109919610A (en) | Anti- quantum calculation block chain secure transactions method and system based on P2P public key pond | |
CN109687961B (en) | Quantum computation resistant blockchain transaction method and system based on symmetric key pool routing device | |
CN110517040A (en) | Anti- quantum calculation block chain secure transactions method, system and equipment based on group's unsymmetrical key pond | |
CN109670827A (en) | Anti- quantum calculation block chain method of commerce based on pool of symmetric keys | |
CN109784917A (en) | Anti- quantum calculation block chain secure transactions system and method based on pool of symmetric keys | |
KR102546762B1 (en) | Multi-signature wallet system in blockchain using the bloom filter | |
Hudic et al. | A generation method of cryptographic keys for enterprise communication systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190329 |
|
RJ01 | Rejection of invention patent application after publication |