CN110190954A - A kind of encryption communication method of food block chain - Google Patents
A kind of encryption communication method of food block chain Download PDFInfo
- Publication number
- CN110190954A CN110190954A CN201910444539.9A CN201910444539A CN110190954A CN 110190954 A CN110190954 A CN 110190954A CN 201910444539 A CN201910444539 A CN 201910444539A CN 110190954 A CN110190954 A CN 110190954A
- Authority
- CN
- China
- Prior art keywords
- node
- management node
- consumer
- food
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of encryption communication methods of food block chain, this method comprises: consumer's management node or supplier management node send encryption information to food information processing node;Food information handles node receiving encryption key, and the encryption information sent to the node is decrypted, and random number A is obtained after decryption;Food information handles node to the consumer's management node or supplier management node transmission encryption information after determining node identities and public key;Consumer's management node or supplier management node receive information and are decrypted, and random number B is obtained after decryption;Food information handles node, consumer's management node and supplier management node and executes key schedule according to random number A and random number B, obtain key and initializing variable, coded communication is carried out using the CBC mode of SM4 algorithm further according to key and initializing variable, the present invention can guarantee the safety of point-to-point communication on food block chain, and then improve the safety of food information.
Description
Technical field
The invention belongs to food block chain technical fields, and in particular to a kind of encryption communication method of food block chain.
Background technique
It needs to store the food information of links in food production, and an agri-food supply chains are usual
It can be related to different multiple participants, but since the data on block catenary system are all shared, block catenary system mostly
Upper any user can obtain the Content of Communication of user on block catenary system, not can guarantee what user on block catenary system communicated
Safety, the present invention provide a kind of encryption communication method of food block chain, can guarantee point-to-point communication on food block chain
Safety, and then improve food information safety.
Summary of the invention
The purpose of the present invention is to provide the safety that one kind can guarantee point-to-point communication on food block chain, improve food
The encryption communication method of the food block chain of information security, to solve the problems mentioned in the above background technology.
To achieve the above object, the invention provides the following technical scheme: a kind of encryption communication method of food block chain, packet
Include food information processing node, consumer's management node and supplier management node, it is described method includes the following steps:
S1, it handles node to food information by consumer's management node or supplier management node first and sends to encrypt and believe
Breath;
S2, then food information handles node receiving encryption key, then according to the wound generation stored in local storage space
The node identities and public key that block includes are determined node identities and public key, and the encryption information sent to the node solves
It is close, random number A is obtained after decryption;
S3, then food information processing node are again to the consumer's management node or supply after determining node identities and public key
Quotient's management node sends encryption information;
S4, then consumer's management node or supplier management node receive information and are simultaneously decrypted, obtained after decryption with
Machine number B;
S5, final food information processing node and consumer's management node and supplier management node according to acquisition with
Machine number A and random number B executes key schedule, obtains key and initializing variable, then according to the key of acquisition and initially
Change variable and coded communication is carried out using the CBC mode of SM4 algorithm.
Preferably, the node that the food information processing node includes according to the wound generation block stored in local storage space
Identity and public key carry out authentication to the encryption information received from the block chain in cycle time, and obtain described add
The node identities verification result of confidential information.
Preferably, the food information processing node, consumer's management node and supplier management node are according to each other
Between public key, generate corresponding with public key private key, food information made to handle node, consumer's management node and supplier
Management node forms point-to-point coded communication on block chain.
Preferably, consumer's management node or supplier management node send encryption to food information processing node and believe
Breath, comprising:
Consumer's management node or supplier management node obtain public key from the user certificate of food information processing node;
Consumer's management node or supplier management node generate random number A, described in the public key encryption using the acquisition
Random number A, and obtain the encryption information;
Consumer's management node or supplier management node handle node to food information by block catenary system and send institute
State encryption information.
Preferably, the food information handles node and sends encryption letter to consumer's management node or supplier management node
Breath, comprising:
Food information processing node obtains public key from the user certificate of consumer's management node or supplier management node;
Food information handles node and generates random number B, and random number B described in the public key encryption using the acquisition obtains institute
State encryption information;
Food information handles node and institute occurs to consumer's management node or supplier management node by block catenary system
State encryption information.
Preferably, the food information processing node receives the encryption information, and is decrypted, and obtains after decryption random
Number A, comprising:
Food information handles node and receives consumer's management node or the generation of supplier management node by block catenary system
The encryption information;
Food information handles node and decrypts the encryption information using private key corresponding with the public key, obtain it is described with
Machine number A.
Preferably, consumer's management node or supplier management node receive information and are decrypted, and obtain after decryption
Obtain random number B, comprising:
Consumer's management node or supplier management node receive food information by block catenary system and handle node
The encryption information;
Consumer's management node or supplier management node are using private key corresponding with the public key decryption encryption
Information obtains the random number B.
Preferably, the food information processing node, consumer's management node and supplier management node regularly update
Respective public key, and new private key is generated according to updated public key, form new encryption key.
Compared with prior art, the beneficial effects of the present invention are:
(1) present invention carries out coded communication using the CBC mode of SM4 algorithm, can guarantee point-to-point on food block chain
The safety of communication, the Content of Communication of user on block catenary system, nothing can be obtained by avoiding any user on block catenary system
Method guarantees the problem of user's communications security on block catenary system, and then helps to improve the safety of food information.
(2) characteristic that method provided by the invention using food block chain there is information can not distort, further increases food
The safety of product information, to guarantee the reliability of each nodal information on block chain.
Detailed description of the invention
Fig. 1 is overall flow figure of the invention;
Fig. 2 is the specific flow chart of node identities of the present invention verifying;
Fig. 3 is the specific flow chart of node encrytion key updating of the present invention;
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
It please refers to shown in Fig. 1-Fig. 3, the present invention provides a kind of technical solution: a kind of coded communication side of food block chain
Method, including food information processing node, consumer's management node and supplier management node, method includes the following steps:
S1, it handles node to food information by consumer's management node or supplier management node first and sends to encrypt and believe
Breath;
S2, then food information handles node receiving encryption key, then according to the wound generation stored in local storage space
The node identities and public key that block includes are determined node identities and public key, and the encryption information sent to the node solves
It is close, random number A is obtained after decryption;
S3, then food information processing node are again to the consumer's management node or supply after determining node identities and public key
Quotient's management node sends encryption information;
S4, then consumer's management node or supplier management node receive information and are simultaneously decrypted, obtained after decryption with
Machine number B;
S5, final food information processing node and consumer's management node and supplier management node according to acquisition with
Machine number A and random number B executes key schedule, obtains key and initializing variable, then according to the key of acquisition and initially
Change variable and coded communication is carried out using the CBC mode of SM4 algorithm.
Wherein, key schedule in S5 are as follows:
C (0)=Hash (random1)
C (n)=HMAC C (n-1) (Hash (random2))
Key=HMAC Hash (random1 | | random2) (C0+C1)
IV=HMAC Hash (random1 | | random2) (C0+C2)
Wherein, random1 indicates that random number A, random2 indicate that random number B, n are the positive integer greater than 0, and Hash is indicated
Hash function, algorithm use SM3 algorithm, and HMAC refers to Hash operation relevant to key, and algorithm uses SM3 algorithm, | | it indicates
Attended operation.
Further, the node body that food information processing node includes according to the wound generation block stored in local storage space
Part and public key carry out authentication to the encryption information received from the block chain in cycle time, and obtain the encryption
The node identities verification result of information.
Specifically, food information processing node, consumer's management node and supplier management node are between
Public key, generate corresponding with public key private key, food information made to handle node, consumer's management node and supplier management
Node forms point-to-point coded communication on block chain.
Further, consumer's management node or supplier management node send encryption to food information processing node and believe
Breath, comprising:
Consumer's management node or supplier management node obtain public key from the user certificate of food information processing node;
Consumer's management node or supplier management node generate random number A, described in the public key encryption using the acquisition
Random number A, and obtain the encryption information;
Consumer's management node or supplier management node handle node to food information by block catenary system and send institute
State encryption information.
Specifically, food information handles node and sends encryption information to consumer's management node or supplier management node,
Include:
Food information processing node obtains public key from the user certificate of consumer's management node or supplier management node;
Food information handles node and generates random number B, and random number B described in the public key encryption using the acquisition obtains institute
State encryption information;
Food information handles node and institute occurs to consumer's management node or supplier management node by block catenary system
State encryption information.
It is worth noting that food information processing node receives the encryption information, and be decrypted, obtained after decryption with
Machine number A, comprising:
Food information handles node and receives consumer's management node or the generation of supplier management node by block catenary system
The encryption information;
Food information handles node and decrypts the encryption information using private key corresponding with the public key, obtain it is described with
Machine number A.
Further, consumer's management node or supplier management node receive information and are decrypted, and obtain after decryption
Random number B, comprising:
Consumer's management node or supplier management node receive food information by block catenary system and handle node
The encryption information;
Consumer's management node or supplier management node are using private key corresponding with the public key decryption encryption
Information obtains the random number B.
Specifically, food information processing node, consumer's management node and supplier management node regularly update respectively
Public key, and generate new private key according to updated public key, form new encryption key.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (8)
1. a kind of encryption communication method of food block chain, including food information processing node, consumer's management node and supply
Quotient's management node, it is characterised in that: it is described method includes the following steps:
S1, pass through consumer's management node or supplier management node first to food information processing node transmission encryption information;
S2, then food information handles node receiving encryption key, then according to the wound generation block stored in local storage space
The node identities and public key for including are determined node identities and public key, and the encryption information sent to the node is decrypted,
Random number A is obtained after decryption;
S3, then food information processing node are again to the consumer's management node or supplier's pipe after determining node identities and public key
It manages node and sends encryption information;
S4, then consumer's management node or supplier management node receive information and are decrypted, and random number is obtained after decryption
B;
S5, final food information processing node and consumer's management node and supplier management node are according to the random number of acquisition
A and random number B executes key schedule, obtains key and initializing variable, is then become according to the key of acquisition and initialization
Amount carries out coded communication using the CBC mode of SM4 algorithm.
2. a kind of encryption communication method of food block chain according to claim 1, it is characterised in that: the food information
The processing node node identities that include according to the wound generation block stored in local storage space and public key in cycle time from institute
It states the encryption information received on block chain and carries out authentication, and obtain the node identities verification result of the encryption information.
3. a kind of encryption communication method of food block chain according to claim 1, it is characterised in that: the food information
The public key of node, consumer's management node and supplier management node between is handled, is generated corresponding with public key
Private key, form food information processing node, consumer's management node and supplier management node on block chain a little pair
The coded communication of point.
4. a kind of encryption communication method of food block chain according to claim 1, it is characterised in that: the consumer pipe
It manages node or supplier management node and sends encryption information to food information processing node, comprising:
Consumer's management node or supplier management node obtain public key from the user certificate of food information processing node;
Consumer's management node or supplier management node generate random number A, random described in the public key encryption using the acquisition
Number A, and obtain the encryption information;
Consumer's management node or supplier management node handle node to food information by block catenary system and send described add
Confidential information.
5. a kind of encryption communication method of food block chain according to claim 1, it is characterised in that: the food information
It handles node and sends encryption information to consumer's management node or supplier management node, comprising:
Food information processing node obtains public key from the user certificate of consumer's management node or supplier management node;
Food information handles node and generates random number B, random number B described in the public key encryption using the acquisition, obtains described add
Confidential information;
Food information handles node and described add occurs to consumer's management node or supplier management node by block catenary system
Confidential information.
6. a kind of encryption communication method of food block chain according to claim 1, it is characterised in that: the food information
It handles node and receives the encryption information, and be decrypted, random number A is obtained after decryption, comprising:
Food information handles the institute that node receives consumer's management node by block catenary system or supplier management node occurs
State encryption information;
Food information handles node and decrypts the encryption information using private key corresponding with the public key, obtains the random number
A。
7. a kind of encryption communication method of food block chain according to claim 1, it is characterised in that: the consumer pipe
Reason node or supplier management node receive information and are decrypted, and random number B is obtained after decryption, comprising:
Consumer's management node or supplier management node receive food information by block catenary system and handle the institute that node occurs
State encryption information;
Consumer's management node or supplier management node use private key corresponding with the public key to decrypt the encryption information,
Obtain the random number B.
8. a kind of encryption communication method of food block chain according to claim 1, it is characterised in that: the food information
Processing node, consumer's management node and supplier management node regularly update respective public key, and according to updated public affairs
Key generates new private key, forms new encryption key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910444539.9A CN110190954A (en) | 2019-05-27 | 2019-05-27 | A kind of encryption communication method of food block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910444539.9A CN110190954A (en) | 2019-05-27 | 2019-05-27 | A kind of encryption communication method of food block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110190954A true CN110190954A (en) | 2019-08-30 |
Family
ID=67717858
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910444539.9A Pending CN110190954A (en) | 2019-05-27 | 2019-05-27 | A kind of encryption communication method of food block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110190954A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108377189A (en) * | 2018-05-09 | 2018-08-07 | 深圳壹账通智能科技有限公司 | User's communication encrypting method, device, terminal device and storage medium on block chain |
CN108696518A (en) * | 2018-05-09 | 2018-10-23 | 深圳壹账通智能科技有限公司 | User's communication encrypting method, device, terminal device and storage medium on block chain |
CN109191143A (en) * | 2018-08-02 | 2019-01-11 | 中国联合网络通信集团有限公司 | food information processing method, device and system |
-
2019
- 2019-05-27 CN CN201910444539.9A patent/CN110190954A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108377189A (en) * | 2018-05-09 | 2018-08-07 | 深圳壹账通智能科技有限公司 | User's communication encrypting method, device, terminal device and storage medium on block chain |
CN108696518A (en) * | 2018-05-09 | 2018-10-23 | 深圳壹账通智能科技有限公司 | User's communication encrypting method, device, terminal device and storage medium on block chain |
CN109191143A (en) * | 2018-08-02 | 2019-01-11 | 中国联合网络通信集团有限公司 | food information processing method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105515780B (en) | Identity authorization system based on quantum key and method | |
CN105245326B (en) | A kind of smart grid security communication means based on combination pin | |
EP4007983A1 (en) | Systems and methods for generating signatures | |
CN108234501A (en) | A kind of virtual plant safety communicating method based on quantum key fusion | |
CN106797314B (en) | Cryptographic system, network device, sharing method, and computer-readable storage medium | |
CN109165957A (en) | Invoice data method of charging out, system and relevant device based on block chain | |
CN105743646B (en) | A kind of Identity based encryption method and system | |
CN105049401B (en) | A kind of safety communicating method based on intelligent vehicle | |
CN105162599B (en) | A kind of data transmission system and its transmission method | |
CN104158880B (en) | User-end cloud data sharing solution | |
CN113037499B (en) | Block chain encryption communication method and system | |
CN110599163B (en) | Transaction record outsourcing method facing block chain transaction supervision | |
CN105071927B (en) | Method is locally stored in a kind of mobile device data | |
CN114219483B (en) | Method, equipment and storage medium for sharing block chain data based on LWE-CPBE | |
CN106533656B (en) | A kind of key multilayer mixing method for encryption/decryption based on WSN | |
CN110880972A (en) | Block chain key management system based on safe multiparty calculation | |
CN108809636B (en) | Communication system for realizing message authentication between members based on group type quantum key card | |
CN109768863A (en) | A kind of block chain key based on elliptic curve is shared and dynamic updating method | |
CN113328853B (en) | Coalition chain system for improving security by adopting quantum key | |
CN109756325A (en) | A method of mobile office system safety is promoted using quantum key | |
CN105915333B (en) | A kind of efficient key distribution method based on encryption attribute | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN108718237A (en) | A kind of modified AKA identity authorization systems and method based on pool of symmetric keys | |
CN111049649A (en) | Zero-interaction key negotiation security enhancement protocol based on identification password | |
CN107659405B (en) | The encrypting and decrypting method of data communication between a kind of substation boss station |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190830 |
|
RJ01 | Rejection of invention patent application after publication |