CN109743171A - It is a kind of to solve multiple party digital signatures, timestamp and the key series connection method of encryption - Google Patents

It is a kind of to solve multiple party digital signatures, timestamp and the key series connection method of encryption Download PDF

Info

Publication number
CN109743171A
CN109743171A CN201811485865.6A CN201811485865A CN109743171A CN 109743171 A CN109743171 A CN 109743171A CN 201811485865 A CN201811485865 A CN 201811485865A CN 109743171 A CN109743171 A CN 109743171A
Authority
CN
China
Prior art keywords
encryption
file
key
paper sample
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811485865.6A
Other languages
Chinese (zh)
Other versions
CN109743171B (en
Inventor
殷建文
倪向东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Doctor Information Technology Research Institute Co Ltd
Original Assignee
Guangzhou Doctor Information Technology Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Doctor Information Technology Research Institute Co Ltd filed Critical Guangzhou Doctor Information Technology Research Institute Co Ltd
Priority to CN201811485865.6A priority Critical patent/CN109743171B/en
Publication of CN109743171A publication Critical patent/CN109743171A/en
Application granted granted Critical
Publication of CN109743171B publication Critical patent/CN109743171B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of solution multiple party digital signatures, timestamp and the key series connection method of encryption, the public key including private key and decrypted private key;Detailed process includes that a. calls function module to carry out operation to paper sample is executed, and generates an operation information;B. generation signature file is digitally signed to execution paper sample and its operation information using signature blocks;C. encryption is carried out to signature file with a private key and generates encryption file;D. transmission encryption file;E. receive encryption file, and use public key decryptions, call function module verifying operation information, the encryption file being proved to be successful is as new execution paper sample;F. above-mentioned a, b step are repeated to new execution paper sample, forms new signature file.The present invention solves the technical issues of cannot achieve multi-party common signature easily and effectively in the prior art.

Description

It is a kind of to solve multiple party digital signatures, timestamp and the key series connection method of encryption
Technical field
The present invention relates to a kind of secrecy and secure communications, in particular to a kind of solution multiple party digital signatures, timestamp And the key series connection method of encryption.
Background technique
Digital signature (also known as public key digital signature, Electronic Signature) is a kind of similar common physics label write on paper Name, but the technology in public key encryption field has been used to realize, the method for identifying digital information.A set of digital signature is usually fixed Adopted two kinds of complementary operations, one is used to sign, another is for verifying.Digital signature is exactly sender's ability of only information Others the number of segment word string that can not forge that can be generated, this number of segment word string is also to send information truth to the sender of information simultaneously One valid certificates of property.
Briefly, so-called digital signature is just attached to some data in data cell, or to data cell institute The cryptographic transformation of work.This data or transformation allow source and data sheet of the recipient of data cell to confirm data cell The integrality of member simultaneously protects data, prevents from being forged by people (such as recipient).It is signed to the message of electronic form A kind of method of name, a signature information can be transmitted in a communication network.Based on public-key cryptosystem and private key cryptographic body System can obtain digital signature, be mainly based upon the digital signature of public-key cryptosystem.It signs including ordinary numbers and special Digital signature.Ordinary numbers signature algorithm have RSA, ElGamal, Fiat-Shamir, Guillou-Quisquarter, Schnorr, Ong-Schnorr-Shamir Digital Signature Algorithm, Des/DSA, elliptic curve digital signature algorithm and finite automaton Machine digital signature algorithm etc..Special number signature has Proxy Signature, allograph, group ranking, undeniable signature, Fair Blind label Name, Threshold Signature, signature with Message Recovery etc., it is closely related with specific application environment.
Specifically, digital signature technology is the private key encryption by summary info with sender, sent to together with original text Recipient.Recipient only uses the public key of sender that could decrypt encrypted summary info, then with HASH function to receiving Original text generate a summary info, compared with the summary info of decryption.If identical, illustrate that the information received is complete , it is not modified in transmission process, otherwise illustrates that information is modified, therefore digital signature is able to verify that the complete of information Property.Digital signature is a process for encryption, and digital signature authentication is a process for decryption.
Digital signature has non-repudiation, is the core technology in electronic contract field, by using number in different links Word signature realize electronic contract data encryption, with ensure its can not distort, it is legal credible.Effect that there are two digital signature, one Can determine that message be strictly signed and issued by sender, second is that digital signature can determine that electronic message content whether by It distorts, guarantees the integrality of message.Digital signature can guarantee information transmission integrality, sender authentication, prevent from handing over Denial in easily occurs.
So-called group ranking (group signature) is exactly to meet the signature required in this way: in a group signature scheme, Any one member in one group can represent entire group in a manner of anonymous and sign to message.With other numbers Signature is the same, and group ranking can be disclosed and be verified, and can only be verified with single group's public key.It can also be used as group mark To show the main application of group, type etc..Either single signature or group ranking at present, are substantially through a pair of secret keys, Public key decryptions, private key signature.Multi-party common signature easily and effectively is not can solve.
Therefore, it is necessary to be improved to solve the above technical problems to the prior art.
Summary of the invention
In view of this, the purpose of the present invention is to provide a kind of solution multiple party digital signatures, timestamp and the keys of encryption Series connection method solves the technical issues of cannot achieve multi-party common signature easily and effectively in the prior art.In particular by Following technical solution is realized:
A kind of solution multiple party digital signatures, timestamp and the key series connection method of encryption of design, including private key and decryption The public key of private key;Detailed process includes the following steps,
A. it calls function module to carry out operation to paper sample is executed, generates an operation information, function module can be used Function of time module or other function modules etc. generate the operation information that can be verified for step e;
B. a user is digitally signed generation signature to execution paper sample and its operation information using signature blocks File;
C. encryption is carried out to signature file with a private key and generates encryption file;
D. transmission encryption file can upload the ciphertext part that progressively increases in internet or other networks, and encryption file is passed to Another needs the user being digitally signed, and encryption file directive sending can be needed the use of digital signature by user to another Family can also be mass-sended to other multiple users for needing digital signature;
D. second user receives encryption file, and uses public key decryptions, and function module is called to verify operation information, verify at The encryption file of function is as new execution paper sample;
F. above-mentioned a, b step are repeated to new execution paper sample, forms new signature file.
Further, solution multiple party digital signatures, timestamp and the key of the encryption series connection method further include further including The step of repeating c, d, e, f, a, b to the new signature file in step f, the public key of the private key and decrypted private key include more A, private key when encrypting every time to execution paper sample and its operation information is not identical, and multi-user uses the private key of oneself respectively It is transmitted after being encrypted to execution paper sample and operation information, the user for each receiving encryption file can pass through public key Decryption encryption file, and be capable of calling function module and operation information is verified, determine that file is the specific use for possessing private key Family transmitting.
Further, the function module is function of time module, and the operation information is to transport to execution paper sample The mode of the timestamp generated after calculation, the verifying operation information is whether verification time stamp generates in specific time interval It is interior, when needing to be sequentially transmitted file to multi-party users, can be stabbed with the verification time whether generate in specific time section and The time sequencing of generation time stamp meets specific sequence, and function of time module, which adopts to use, indicates timestamp in Python Time module can indicate that tick unit (is till now by the offset that the second calculates since 00:00:00 on January 1st, 1970 The relative time of system is spaced floating number in seconds) it is most suitable for doing date operation.
Further, the step b further include execute paper sample carry out operation generate summary info and to summary info into The process of row encryption, the step e further include the process that summary info verifying is carried out after decryption, can be using hash function to holding Row paper sample carries out operation and generates summary info, and generating and verifying summary info may further ensure that file is not usurped Change.
Further, the process for generating summary info and verifying abstract carries out operation with HASH function, due to non- The arithmetic speed of symmetry algorithm is slower, so in digital signature protocol, it can be in file data quilt using one-way hash function Under the premise of mapping generates summary info, guarantee the speed of operation.
Beneficial effects of the present invention: in group ranking, multi-party can be realized without meeting is signed respectively;Group ranking be with The digital signature of timestamp, it is ensured that its is legal effectively, can not change;Other beneficial effects of the invention will be in conjunction with real in detail below It applies in example and is further detailed.
Detailed description of the invention
The invention will be further described with reference to the accompanying drawings and examples:
Fig. 1 is procedure chart of the invention.
Specific embodiment
Embodiment: as shown in Figure 1, a kind of solution multiple party digital signatures, timestamp and the key series connection method of encryption, including The public key of private key and decrypted private key;Detailed process includes the following steps,
A. it calls function module to carry out operation to paper sample is executed, generates an operation information, function module can be used Function of time module or other function modules etc. generate the operation information that can be verified for step e;
B. a user is digitally signed generation signature to execution paper sample and its operation information using signature blocks File;
C. encryption is carried out to signature file with a private key and generates encryption file;
D. transmission encryption file can upload the ciphertext part that progressively increases in internet or other networks, and encryption file is passed to Another needs the user being digitally signed, and user can give encryption file directive sending to another user, can also mass-send To other multiple users;
D. second user receives encryption file, and uses public key decryptions, and function module is called to verify operation information, verify at The encryption file of function is as new execution paper sample;
F. above-mentioned a, b step are repeated to new execution paper sample, forms new signature file.
In the present embodiment, solution multiple party digital signatures, timestamp and the key series connection method of encryption further include Include the steps that repeating c, d, e, f, a, b, the public key packet of the private key and decrypted private key to the new signature file in step f Include multiple, not identical to the private key executed when paper sample and its operation information encrypt every time, multi-user uses oneself respectively Private key transmits after encrypting to execution paper sample and operation information, and the user for each receiving encryption file can pass through Public key decryptions encrypt file, and are capable of calling function module and verify to operation information, determine that file is possess private key specific User transmitting.
In the present embodiment, the function module be function of time module, the operation information be to execute paper sample into The mode of the timestamp generated after row operation, the verifying operation information is whether verification time stamp generates in specific time zone In, when needing to be sequentially transmitted file to multi-party users, it can be stabbed and whether be generated in specific time section simultaneously with the verification time And the time sequencing of generation time stamp meets specific sequence, function of time module, which adopts to use in Python, indicates timestamp Time module, can indicate since 00:00:00 on January 1st, 1970 the offset calculated till now by the second, tick unit (relative time of system is spaced floating number in seconds) is most suitable for doing date operation.
In the present embodiment, the step b further includes executing paper sample to carry out operation generation summary info and believe abstract The process encrypted is ceased, the step e further includes the process of progress summary info verifying after decryption, can use hash function To execute paper sample carry out operation generate summary info, generate and verify summary info may further ensure that file not by It distorts.
In the present embodiment, the process for generating summary info and verifying abstract carries out operation with HASH function, by It is slower in the arithmetic speed of asymmetric arithmetic, so in digital signature protocol, it can be in number of files using one-way hash function Under the premise of being mapped generation summary info, guarantee the speed of operation.
Specific implementation process: the present invention is mainly made of four modules, respectively function of time module, for generating and adding Upper timestamp;Signature blocks are used for digital signature;Deciphering module, for decrypting;Key laminating module is used for multiple party signatures;Example Such as, a electronic document D needs A, B, and C tripartite completes in specific time interval [t1, t2];It initiates to sign by A, A passes through Function of time module calculates the time, determines in time interval [t1, t2], generation time stamp, in addition the content of D, calls signature Module generates D` with the private key encryption of A, issues B or C, for sake of convenience, be transmitted narration by the sequence with A, B, C;B exists After receiving D`, deciphering module is called, with the public key decryptions of A, allocating time function module, the signature for verifying A is effective, then, leads to It crosses time function module and calculates the time, determine in time interval [t1, t2], join raw timestamp, in addition the content of D`, calls label Name module generates D`` with the private key encryption of B, issues C;It steps be repeated alternatively until that A, B, C complete to sign;It can also be straight by D` Mass-sending is connect to B and C, then B and C call deciphering module respectively, with the public key decryptions of A, recall function of time module verification A's Signature effectively, then, calculates the time by function of time module, determines in time interval [t1, t2], join raw timestamp, add The content of upper D` calls signature blocks, generates D`` (B) with the private key encryption of B, generates D`` (C) with the private key of C, B is again by file D`` (B) is transmitted to C, and file D`` (C) is transmitted to B by C, completes multiple party signatures;When electronic document D needs three or more user's signatures When, it can repeatedly decrypt, sign by above-mentioned steps, signing timestamp, encryption, transmission or mass-sending multi-party users.
Finally, it is stated that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although referring to compared with Good embodiment describes the invention in detail, those skilled in the art should understand that, it can be to skill of the invention Art scheme is modified or replaced equivalently, and without departing from the objective and range of technical solution of the present invention, should all be covered at this In the scope of the claims of invention.

Claims (5)

1. a kind of solve multiple party digital signatures, timestamp and the key series connection method of encryption, it is characterised in that: conciliate including private key The public key of close private key;Detailed process includes the following steps,
A. it calls function module to carry out operation to paper sample is executed, generates an operation information;
B. generation signature file is digitally signed to execution paper sample and its operation information using signature blocks;
C. encryption is carried out to signature file with a private key and generates encryption file;
D. transmission encryption file;
E. receive encryption file, and use public key decryptions, call function module verify operation information, be proved to be successful encryption file work For new execution paper sample;
F. above-mentioned a, b step are repeated to new execution paper sample, forms new signature file.
2. solving multiple party digital signatures, timestamp and the key series connection method of encryption, feature as described in claim 1 to exist In: further include the steps that repeating the new signature file in step f c, d, e, f, a, b, the private key and decrypted private key Public key include it is multiple, it is not identical to the private key executed when paper sample and its operation information encrypt every time.
3. solving multiple party digital signatures, timestamp and the key series connection method of encryption, feature as claimed in claim 2 to exist In: the function module be function of time module, the operation information be to execute that paper sample generate after operation when Between stab, it is described verifying operation information mode be the verification time stamp whether generate in specific time interval.
4. solving multiple party digital signatures, timestamp and the key series connection method of encryption, feature as described in claim 1 to exist In: the step b further includes carrying out the mistake that operation generates summary info and encrypted to summary info to execution paper sample Journey, the step e further include the process of progress summary info verifying after decryption.
5. solving multiple party digital signatures, timestamp and the key series connection method of encryption, feature as claimed in claim 4 to exist In: the process for generating summary info and verifying abstract carries out operation with HASH function.
CN201811485865.6A 2018-12-06 2018-12-06 Key series method for solving multi-party digital signature, timestamp and encryption Active CN109743171B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811485865.6A CN109743171B (en) 2018-12-06 2018-12-06 Key series method for solving multi-party digital signature, timestamp and encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811485865.6A CN109743171B (en) 2018-12-06 2018-12-06 Key series method for solving multi-party digital signature, timestamp and encryption

Publications (2)

Publication Number Publication Date
CN109743171A true CN109743171A (en) 2019-05-10
CN109743171B CN109743171B (en) 2022-04-12

Family

ID=66358501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811485865.6A Active CN109743171B (en) 2018-12-06 2018-12-06 Key series method for solving multi-party digital signature, timestamp and encryption

Country Status (1)

Country Link
CN (1) CN109743171B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110233736A (en) * 2019-06-19 2019-09-13 核芯互联(北京)科技有限公司 A kind of digital signature generation method, verification method, device, equipment, medium
CN110620780A (en) * 2019-09-26 2019-12-27 如般量子科技有限公司 Anti-quantum computation two-dimensional code authentication method and system based on asymmetric key pool and timestamp
CN110955918A (en) * 2019-10-29 2020-04-03 浙江工业大学 Contract text protection method based on RSA encrypted sha-256 digital signature
CN112052435A (en) * 2020-09-30 2020-12-08 杭州尚尚签网络科技有限公司 Method for multi-user electronic signature of CAD (computer-aided design) drawing
TWI716274B (en) * 2019-06-26 2021-01-11 開曼群島商創新先進技術有限公司 Method and device for realizing confidential blockchain transaction using ring signature
CN112507328A (en) * 2021-01-29 2021-03-16 统信软件技术有限公司 File signature method, computing device and storage medium
CN112580110A (en) * 2020-12-23 2021-03-30 国家电网有限公司大数据中心 Data resource sharing safety method based on watermark technology
US11025434B2 (en) 2019-06-26 2021-06-01 Advanced New Technologies Co., Ltd. Ring signature-based anonymous transaction
CN112926974A (en) * 2019-12-06 2021-06-08 环球雅途集团有限公司 Offline ticket anti-counterfeiting method based on distributed account book principle
TWI731569B (en) * 2019-06-26 2021-06-21 開曼群島商創新先進技術有限公司 Anonymous transaction method and device based on ring signature
US11238447B2 (en) 2019-06-26 2022-02-01 Advanced New Technologies Co., Ltd. Blockchain transactions with ring signatures

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1672358A (en) * 2002-07-29 2005-09-21 国际商业机器公司 Groups signature scheme
US20140040611A1 (en) * 2012-07-31 2014-02-06 Isak Tenenboym Distributed Validation of Digitally Signed Electronic Documents
CN106533698A (en) * 2016-12-15 2017-03-22 北京三未信安科技发展有限公司 RSA-based distributed threshold signature method and system
US20170220999A1 (en) * 2016-02-02 2017-08-03 Adobe Systems Incorporated Techniques for document management workflows
CN107017993A (en) * 2017-04-01 2017-08-04 北京江南天安科技有限公司 A kind of multi-party joint key is produced and digital signature method and system
CN108199835A (en) * 2018-01-19 2018-06-22 北京江南天安科技有限公司 A kind of multi-party joint private key decryption method and system
CN108833115A (en) * 2018-06-15 2018-11-16 中山大学 A kind of multi-party Fair PDF contract signature method based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1672358A (en) * 2002-07-29 2005-09-21 国际商业机器公司 Groups signature scheme
US20140040611A1 (en) * 2012-07-31 2014-02-06 Isak Tenenboym Distributed Validation of Digitally Signed Electronic Documents
US20170220999A1 (en) * 2016-02-02 2017-08-03 Adobe Systems Incorporated Techniques for document management workflows
CN106533698A (en) * 2016-12-15 2017-03-22 北京三未信安科技发展有限公司 RSA-based distributed threshold signature method and system
CN107017993A (en) * 2017-04-01 2017-08-04 北京江南天安科技有限公司 A kind of multi-party joint key is produced and digital signature method and system
CN108199835A (en) * 2018-01-19 2018-06-22 北京江南天安科技有限公司 A kind of multi-party joint private key decryption method and system
CN108833115A (en) * 2018-06-15 2018-11-16 中山大学 A kind of multi-party Fair PDF contract signature method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张永强: "《满足便携文档格式的公平多方合同签署协议》", 《西安电子科技大学学报》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110233736A (en) * 2019-06-19 2019-09-13 核芯互联(北京)科技有限公司 A kind of digital signature generation method, verification method, device, equipment, medium
US11238447B2 (en) 2019-06-26 2022-02-01 Advanced New Technologies Co., Ltd. Blockchain transactions with ring signatures
TWI716274B (en) * 2019-06-26 2021-01-11 開曼群島商創新先進技術有限公司 Method and device for realizing confidential blockchain transaction using ring signature
US11258614B2 (en) 2019-06-26 2022-02-22 Advanced New Technologies Co., Ltd. Ring signature-based anonymous transaction
US11025434B2 (en) 2019-06-26 2021-06-01 Advanced New Technologies Co., Ltd. Ring signature-based anonymous transaction
TWI731569B (en) * 2019-06-26 2021-06-21 開曼群島商創新先進技術有限公司 Anonymous transaction method and device based on ring signature
CN110620780A (en) * 2019-09-26 2019-12-27 如般量子科技有限公司 Anti-quantum computation two-dimensional code authentication method and system based on asymmetric key pool and timestamp
CN110620780B (en) * 2019-09-26 2021-10-22 如般量子科技有限公司 Anti-quantum computation two-dimensional code authentication method and system based on asymmetric key pool and timestamp
CN110955918A (en) * 2019-10-29 2020-04-03 浙江工业大学 Contract text protection method based on RSA encrypted sha-256 digital signature
CN112926974B (en) * 2019-12-06 2024-02-13 环球数科集团有限公司 Off-line ticket anti-counterfeiting method based on distributed account book principle
CN112926974A (en) * 2019-12-06 2021-06-08 环球雅途集团有限公司 Offline ticket anti-counterfeiting method based on distributed account book principle
CN112052435A (en) * 2020-09-30 2020-12-08 杭州尚尚签网络科技有限公司 Method for multi-user electronic signature of CAD (computer-aided design) drawing
CN112052435B (en) * 2020-09-30 2023-11-28 杭州尚尚签网络科技有限公司 CAD drawing multiuser electronic signature method
CN112580110A (en) * 2020-12-23 2021-03-30 国家电网有限公司大数据中心 Data resource sharing safety method based on watermark technology
CN112507328A (en) * 2021-01-29 2021-03-16 统信软件技术有限公司 File signature method, computing device and storage medium

Also Published As

Publication number Publication date
CN109743171B (en) 2022-04-12

Similar Documents

Publication Publication Date Title
CN109743171A (en) It is a kind of to solve multiple party digital signatures, timestamp and the key series connection method of encryption
Krawczyk et al. The OPTLS protocol and TLS 1.3
US8892890B2 (en) Key agreement and transport protocol
US9008312B2 (en) System and method of creating and sending broadcast and multicast data
CN105162599B (en) A kind of data transmission system and its transmission method
EP1642437B1 (en) Key agreement and transport protocol
CN108667626A (en) The two sides cooperation SM2 endorsement methods of safety
US20190207757A1 (en) Method for exchanging keys authenticated by blockchain
EP1063813A2 (en) Public key encryption with digital signature scheme
CN108650227A (en) Handshake method based on datagram secure transfer protocol and system
CN110113150B (en) Encryption method and system based on non-certificate environment and capable of repudiation authentication
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN107682151A (en) A kind of GOST digital signature generation method and system
CN103297230B (en) Information encipher-decipher method, Apparatus and system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
US20240097894A1 (en) Threshold key exchange
CN106533656A (en) Key multilayer mixed encryption/decryption method based on WSN
Shim Cryptanalysis of mutual authentication and key exchange for low power wireless communications
CN106453253B (en) A kind of hideing for efficient identity-based signs decryption method
JP2001211154A (en) Secret key generating method, ciphering method, and cipher communication method
CN107682158A (en) It is a kind of can trustship authentication encryption method
CN111526131B (en) Anti-quantum-computation electronic official document transmission method and system based on secret sharing and quantum communication service station
CN112019553B (en) Data sharing method based on IBE/IBBE
CN113347153A (en) File encryption transmission method combining identity authentication and dynamic key
JP3864656B2 (en) Data transmission method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Yin Jianwen

Inventor after: Ni Xiangdong

Inventor after: Xu Xufeng

Inventor after: Hu Jianmin

Inventor before: Yin Jianwen

Inventor before: Ni Xiangdong

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant