CN114065253A - Method for anonymous sharing and verification of certificate and result - Google Patents

Method for anonymous sharing and verification of certificate and result Download PDF

Info

Publication number
CN114065253A
CN114065253A CN202111382312.XA CN202111382312A CN114065253A CN 114065253 A CN114065253 A CN 114065253A CN 202111382312 A CN202111382312 A CN 202111382312A CN 114065253 A CN114065253 A CN 114065253A
Authority
CN
China
Prior art keywords
user
key
information
key pair
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111382312.XA
Other languages
Chinese (zh)
Other versions
CN114065253B (en
Inventor
于中阳
梅雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jimu Galaxy Digital Technology Co ltd
Original Assignee
Shanghai Wangchain Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wangchain Information Technology Co ltd filed Critical Shanghai Wangchain Information Technology Co ltd
Priority to CN202111382312.XA priority Critical patent/CN114065253B/en
Publication of CN114065253A publication Critical patent/CN114065253A/en
Application granted granted Critical
Publication of CN114065253B publication Critical patent/CN114065253B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education

Abstract

The embodiment of the invention discloses a method for sharing and verifying certificates and achievements anonymously, which comprises the following steps of obtaining a user registration request, obtaining a unique seed and storing the unique seed in a wallet of a user when receiving the registration request of the user; deriving two key pairs by using the unique seed, wherein the two key pairs are a user signature key pair and a user encryption key pair respectively; generating a symmetric key by using the user signature key pair, the user encryption key pair and the signature key of the organization; encrypting the electronic certificate of the user by using a symmetric key to generate first verifiable information and second verifiable information; and signing the first verifiable information and the second verifiable information by using a private key in a signature key pair of an organization and a signature private key in a signature key pair of a user, and uploading the electronic certificate of the user, the signed first verifiable information and the signed second verifiable information.

Description

Method for anonymous sharing and verification of certificate and result
Technical Field
The embodiment of the invention relates to the field of anonymous sharing and verification of certificates and achievements, in particular to a method for anonymous sharing and verification of certificates and achievements.
Background
Except for universities and educational institutions certified by the ministry of education, students or users of lifelong educational products may be reluctant to give their own identity-sensitive information (particularly identification numbers) to third-party educational institutions, whereas personal identity information is essential information to prove that a certificate belongs to. There is a need for issuing an end-of-business certificate without disclosing the privacy of the user's identity, and others or organizations, businesses can verify the authenticity of the certificate and its integrity by the user. In addition, no matter the study or resume information or the subsequent lifelong education information evidence also belongs to personal privacy sensitive information, the system also has an anonymous protection function that the information on the chain evidence is not judged and tracked to a specific life track of a person by a third-party observer through some data analysis means. On the basis of ensuring the source information is truly and completely, the user can choose to disclose or not disclose certain academic, learning or resume information of the user to a third party (such as a school and a company).
At present, the patent application of certificate storage and anti-counterfeiting on the academic calendar chain is less. Some schemes realize a personal academic record information management method and system based on a block chain intelligent contract, and the technical points are that whether an academic record owner (student user) discloses own academic record information to a third-party organization in an agreeable way is received and checked through the intelligent contract, and inquiry information is returned to the third-party organization. The student user's academic information is bound with the personal identity information, and the organization proves its identity through its organization name, organization unique identification, etc. The mode of chain storage of the academic records through the blockchain technology for the third-party institution to check and verify is realized, the whole process is transparent and traceable and cannot be tampered, the authority of the institution user is limited through the intelligent contract, and only checking, editing, copying and the like can not be realized. However, the disadvantage is that, firstly, these solutions are in the relatively first-level exploration in the "blockchain + X" application, i.e. the public key is used as a certified address, the private key is used as a signature tool, and the query request is managed and authorized by the intelligent contract. Although this uplink mode can achieve the purpose of data anonymous uplink to some extent, the uplink address is the public key of the user, that is, the uplink addresses are unique, therefore, it can also be regarded as the unique id of the user on the blockchain system, and the third party observer (for example, other members not participating in transaction on the chain) can easily determine the basic information of the owner of the address by means of big data analysis such as cluster analysis, and if there are a lot of living and user data links in the future, after the links are interconnected, the address owner can be subjected to detailed data drawing, the identity of the address owner can be even judged in an extreme case, and the academic world and the industry have relatively uniform knowledge that the mode of using the unique address uplink mode transaction information is called pseudo-anonymous as well as public link items such as 'bitcoin'. Secondly, the calendars defined by the schemes are mainly used for higher education, student users enter universities for study through college entrance and obtain the calendars, research institutes and doctor calendars after graduation. The authentication and the authentication of the academic records can be inquired through a learning communication network, and meanwhile, a plurality of verification methods exist, although the possibility of counterfeiting exists, the narrow application scene can cause that the technology cannot be applied in reality.
Disclosure of Invention
Therefore, the embodiment of the invention provides a method for anonymously sharing and verifying certificates and results, so as to solve the problems that in the prior art, the user certificate cannot be distinguished from authenticity and the user does not want to disclose certificate information.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
according to a first aspect of the embodiments of the present invention, a method for anonymously sharing certificates and results is characterized in that: comprises the following steps
Acquiring a user registration request, and acquiring a unique seed and storing the unique seed in a wallet of the user when the user registration request is received;
deriving two key pairs by using the unique seed, wherein the two key pairs are a user signature key pair and a user encryption key pair respectively;
generating a symmetric key using the user signing key pair, the user encryption key pair, and a signing key of an organization;
encrypting the electronic certificate of the user by using the symmetric key to generate first verifiable information and second verifiable information;
and signing the first verifiable information and the second verifiable information by using a private key in a signature key pair of the organization and a signature private key in a signature key pair of the user, and uploading the electronic certificate of the user, the signed first verifiable information and the signed second verifiable information.
Further, before generating the symmetric key by using the signature key pair of the user, the encryption key pair of the user, and the signature key pair of the organization, an acquiring authorization is required, where the acquiring authorization specifically includes:
acquiring an application request of an organization, and sending an authorization request to the user after receiving the application request of the organization;
obtaining the authorization confirmation information after the user confirms authorization;
and after receiving the authorization confirmation information, sending the public key of the user signature key pair and the public key of the user encryption key pair to the client of the organization.
Further, the generating a symmetric key by using the signature key pair of the user, the user encryption key pair and the signature key of the organization specifically includes:
generating C _ enc by a private key of a signature key pair of the organization, a public key of the user encryption key pair and an elliptic curve algorithm;
c _ enc generates a symmetric key through a key derivation function;
encrypting the electronic certificate and the random number by using the symmetric key to obtain encrypted first verifiable information;
and calculating the hash value of the public key and the electronic certificate in the user signature key pair to obtain encrypted second verifiable information.
Further, the signing the first verifiable information and the second verifiable information with a private key of a signing key pair of the organization and a private signing key of a signing key pair of the user, and uploading the electronic certificate of the user, the signed first verifiable information, and the signed second verifiable information specifically includes:
generating a random seed and computing a first hash value of the random seed, first verifiable information, and a public key of the authority signature key pair:
calculating a hash value of a private key and a first hash value in the user signature key pair to obtain a second hash value, and attaching the second hash value to an electronic certificate information column of the transaction;
packaging the public key in the electronic certificate information column and the agency signature key pair and the information needing to be linked up into signature information to be constructed;
signing the information to be signed by using a private key in the user signature key pair, and attaching the signed information to a transaction;
and generating uplink transaction information according to the signed information, calculating a third hash value of the uplink transaction information, and taking the third hash value as an address uplink.
According to a second aspect of the embodiments of the present invention, a method for verifying an electronic certificate, a method for sharing a certificate and a result anonymously, when an electronic certificate and second verifiable information sent by the user are acquired, verification information is returned to the organization.
Further, when the electronic certificate and the second verifiable information sent by the user are obtained, returning verification information to the organization specifically includes:
obtaining a certificate of authenticity request of the organization;
acquiring a private key in the user encryption key pair and a public key in the signature key pair of the organization and generating C _ enc by an elliptic curve algorithm;
the C _ enc generates a symmetric key through a key derivation function;
decrypting the encrypted electronic certificate by using the symmetric key and the first verifiable information to obtain decrypted electronic certificate information;
and calculating a public key in the user signature key pair and the hash value of the electronic certificate, comparing the public key with the second verifiable information, and sending a certificate document or certificate information to the organization when the public key in the user signature key pair and the hash value of the electronic certificate are equal to the second verifiable information.
According to a third aspect of the embodiments of the present invention, an apparatus for anonymously sharing certificates and results, includes:
the registration device: acquiring a user registration request, acquiring a unique seed and storing the unique seed in a wallet of the user when the user registration request is received, and deriving two key pairs by using the unique seed, wherein the two key pairs are a user signature key pair and a user encryption key pair respectively;
an electronic certificate generation device: generating a symmetric key by using the user signature key pair, the user encryption key pair and a signature key of an organization, and encrypting an electronic certificate of the user by using the symmetric key to generate first verifiable information and second verifiable information;
an electronic certificate issuing apparatus: and signing the first verifiable information and the second verifiable information by using a private key in a signature key pair of the organization and a signature private key in a signature key pair of the user, and uploading the electronic certificate of the user, the signed first verifiable information and the signed second verifiable information.
According to a fourth aspect of the embodiments of the present invention, an electronic device of a method for anonymously sharing certificates and results includes:
the processor and the memory are communicated with each other through a bus; the memory stores program instructions executable by the processor to invoke the program instructions to perform a method as any one of a certificate and a method by which a result can be shared anonymously.
According to a fifth aspect of embodiments of the present invention, a computer-readable storage medium of a method by which certificates and achievements can be shared anonymously, has stored thereon a computer program which, when executed by a processor, implements the steps of any of the methods as a method by which certificates and achievements can be shared anonymously.
The embodiment of the invention has the following advantages:
1. the use of a random key pair instead of a key pair for an educational institution can achieve the same effect as the process of issuing certificates and certificates in which an educational institution participates.
2. By verifying the verifiable information, the third party organization can confirm the ownership of the address of the uplink Transaction information HW3 (Transaction HW3) and map the uplink Transaction information HW3 to the work HW3 stored in the chain, so that the work HW3 in the plaintext uplink can be desensitized and does not contain any author's identity information. The work can be plaintext uplink shared, and the attribution of the work can be proved under the condition that the personal identity information of the student user is not disclosed, so that the personal information safety of the author is protected to the greatest extent.
3. Because the evidence storing mode of content addressing is used, the works of others can be identified and pasted as the works of the system to be stored in the uplink particularly by simple copying, and along with the increase of the evidence storing contents, the system can reject the evidence storing of some works which are obviously plagiarism or carried by identifying the attribution of the contents.
4. The student users can associate a plurality of versions of the works for uplink storage through submitting the object, new uplink transaction information does not need to be submitted for many times, and the method has the advantages that the works of the same course can be associated, storage space is saved, and platform carrying capacity is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions that the present invention can be implemented, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the effects and the achievable by the present invention, should still fall within the range that the technical contents disclosed in the present invention can cover.
Fig. 1 is a flowchart of a certificate issuing method of a method for anonymously sharing and verifying certificates and results according to embodiment 1 of the present invention;
fig. 2 is a schematic diagram of key derivation of a method for anonymously sharing and verifying certificates and results according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a relationship between generating encryption and authentication information associated with an electronic certificate according to a method for anonymously sharing and authenticating a certificate and a result according to an embodiment of the present invention;
fig. 4 is a schematic diagram of the method for anonymously sharing and verifying certificates and results according to an embodiment of the present invention to generate uplink transaction information;
fig. 5 is a flowchart of verifying an electronic certificate according to a method for anonymously sharing and verifying a certificate and an outcome according to an embodiment of the present invention.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example (b): a method for sharing certificates and achievements anonymously, as shown in fig. 1-5, comprising the following steps:
acquiring a user registration request, and acquiring and storing a unique seed in a wallet of a user when the user registration request is received;
deriving two key pairs by using the unique seed, wherein the two key pairs are a user signature key pair and a user encryption key pair respectively;
generating a symmetric key by using the user signing key pair, the user encryption key pair and the signing key of the organization;
encrypting the electronic certificate of the user by using a symmetric key to generate first verifiable information and second verifiable information;
and signing the first verifiable information and the second verifiable information by using a private key in a signature key pair of an organization and a signature private key in a signature key pair of a user, and uploading the electronic certificate of the user, the signed first verifiable information and the signed second verifiable information.
Specifically, user registration: student users register to join the alliance chain through the member management system, obtain a unique seed (signature private key: SK _ sign), and store the unique seed in the user wallet. Two key pairs, namely a signature key pair { SK _ sign, PK _ sign } and an encryption key pair { SK _ enc, PK _ enc } are derived from the wallet and the seed, the derivation process is shown in FIG. 2, the key derivation is derived by an encryption algorithm, including SHA256, RSA algorithm, elliptic Curve encryption algorithm and the like, and in the embodiment, the elliptic Curve encryption algorithm based on the elliptic Curve Curve25519 is preferred.
Generating an electronic certificate: an organization user sends an application for issuing an electronic certificate and uploading a certificate to a student user, and after the student user authorizes the application, a symmetric key K _ enc is generated by using two key pairs of the student user and an organization signature key pair { rsk, rpk } to encrypt the learning record and the certificate of the student, so that anonymous and verifiable information Inf _ enc and Inf _ vf are generated.
Issuing an electronic certificate: signature is carried out on Inf _ enc and Inf _ vf by using a signature private key of an education institution and a signature private key of a student, and a chain-up deposit certificate of a chain-up address is calculated through a hash function together with desensitized certificate records.
More specifically, the student user registers: the student users register to join the online education and evidence-storing system through the member management system, and after the member management system confirms the identity information of the students, seeds are generated for the student users, namely the signature private key SK _ sigh is stored in the user wallet. The signature private key is the only identification of the user on the chain and can not be lost and revealed. The wallet automatically derives a signature key pair { SK _ sign, PK _ sign } and an encryption key pair { SK _ enc, PK _ enc } for the student user. The signature public key PK _ sign and the encryption public key PK _ enc are public information.
The authority user obtains the authority signature key pair rsk, rpk after verifying the identity of the entity through the membership management system.
An organization user sends an application for issuing an electronic certificate and uploading a certificate to a student user, and after the student user authorizes the application, a symmetric key K _ enc is generated by using two key pairs of the student user and an organization signature key pair { rsk, rpk } to encrypt the learning record and the certificate of the student, so that anonymous and verifiable information Inf _ enc and Inf _ vf are generated.
Generating encryption and authentication information associated with the electronic certificate: signature is carried out on Inf _ enc and Inf _ vf by using a signature private key of an education institution and a signature private key of a student, and a chain-up deposit certificate of a chain-up address is calculated through a hash function together with desensitized certificate records.
The student user sends the electronic certificate and the information Inf _ vf for verification to the third-party organization as required, the third-party organization plans the system to provide verification application, and the system returns verification information to the third-party organization through verification.
The education institution sends an application for issuing an electronic certificate and chaining the deposit certificate to the student user, the student user receives the application through the wallet, the student agrees to the application, and the client of the education institution receives the public key pair { PK _ sign, PK _ enc } of the student user shared by the system.
The signature private key esk of the education institution and the encrypted public key PK _ enc of the student user are combined with the elliptic curve algorithm to generate C _ enc. C _ enc generates a symmetric encryption key K _ enc by means of a key derivation function KDF.
C_enc=Curve(esk,PK_enc)=esk*PK_enc=esk*SK_enc*G;
K_enc=KDF(C_enc);
And encrypting the electronic certificate and the random number by using the K _ enc to obtain encrypted information Inf _ enc.
Inf_enc=K_enc(Digital Credential,Nonce);
And calculating a hash value of the signature public key PK _ sign and the electronic certificate of the student user to obtain Inf _ vf.
Inf_vf=SHA265(Digital Credential,PK_sign);
Generating uplink transaction information:
(1) the student user uses the signature private key SK _ sign to sign the electronic certificate, and the technology is realized as follows:
a. the system generates a random seed and calculates the Hash value Hash _ sign of the random seed, Inf _ enc and the agency signature public key epk:
hash sign ═ Hash (random seed, Inf enc, epk);
b. the system calculates the Hash values of a signature private key SK _ sign and Hash _ sign of a student user, and attaches the Hash _ sign to an electronic certificate Information column (Credential Information in the figure) of transaction;
the student signature is SHA256(Hash _ sign, SK _ sign);
(2) the education institution signs the issued electronic certificate, and the technology is realized as follows:
a. the system packages the electronic certificate information column and the signature public key epk of the organization and other necessary uplink information into signature information to be constructed:
pending mechanism signature Information (confidential Information, epk, other necessary uplink Information);
b. and the institution user signs the information to be signed by using the signature private key esk, and the signature information is attached to the transaction.
The agency signature (information to be signed, esk);
(3) generate uplink Transaction (Transaction) information:
transmission (confidential Information, epk, other necessary uplink Information, agency signature);
(4) calculating hash value of uplink transaction information and using the hash value as address uplink
content address=Hash(Transaction);
A method for verifying an electronic certificate is based on a method that a certificate and a result can be shared anonymously, and comprises the following steps: and when the electronic certificate and the second verifiable information sent by the user are acquired, returning verification information to the organization.
Specifically, verifying the electronic certificate: the student user sends the electronic certificate and the information Inf _ vf for verification to the third-party organization as required, the third-party organization plans the system to provide verification application, and the system returns verification information to the third-party organization through verification.
More specifically, verifying the electronic certificate:
(1) receiving certificate verification request of the organization user, and returning request content (including organization name, certificate purpose and the like) to corresponding student user
(2) The student user authorizes the viewing request: the wallet generates C _ enc using the student user's encrypted private key SK _ sign together with the institution signature public key epk with an elliptic curve algorithm. C _ enc generates a symmetric key K _ enc through a key derivation function KDF:
C_enc=Curve(epk,SK_enc)=epk*SK_enc=esk*SK_enc*G
K_enc=KDF(C_enc)
(3) decrypting Inf _ enc by using K _ enc to obtain decrypted electronic certificate information:
K_enc(Inf_enc)=(Digital Credential,Nonce)
(4) calculating the hash values of a signature public key PK _ sign and an electronic certificate (Digital credit) of a student user, and comparing the hash values with Inf _ vf, wherein the technology is realized as follows:
SHA256(Digital Credential,PK_sign)==Inf_vf
(5) sending certificate documents (PDF documents stored in the conventional form of wallets, etc.) or certificate information to the educational institution, returning a comparison result to the institution user,
the embodiment of the invention has the following advantages:
1. the use of a random key pair instead of a key pair for an educational institution can achieve the same effect as the process of issuing certificates and certificates in which an educational institution participates.
2. By verifying the verifiable information, the third party organization can confirm the ownership of the address of the uplink Transaction information HW3 (Transaction HW3) and map the uplink Transaction information HW3 to the work HW3 stored in the chain, so that the work HW3 in the plaintext uplink can be desensitized and does not contain any author's identity information. The work can be plaintext uplink shared, and the attribution of the work can be proved under the condition that the personal identity information of the student user is not disclosed, so that the personal information safety of the author is protected to the greatest extent.
3. Because the evidence storing mode of content addressing is used, the works of others can be identified and pasted as the works of the system to be stored in the uplink particularly by simple copying, and along with the increase of the evidence storing contents, the system can reject the evidence storing of some works which are obviously plagiarism or carried by identifying the attribution of the contents.
4. The student users can associate a plurality of versions of the works for uplink storage through submitting the object, new uplink transaction information does not need to be submitted for many times, and the method has the advantages that the works of the same course can be associated, storage space is saved, and platform carrying capacity is improved.
Although the invention has been described in detail above with reference to a general description and specific examples, it will be apparent to one skilled in the art that modifications or improvements may be made thereto based on the invention. Accordingly, such modifications and improvements are intended to be within the scope of the invention as claimed.

Claims (9)

1. A method for anonymously sharing certificates and achievements is characterized in that: comprises the following steps
Acquiring a user registration request, and acquiring a unique seed and storing the unique seed in a wallet of the user when the user registration request is received;
deriving two key pairs by using the unique seed, wherein the two key pairs are a user signature key pair and a user encryption key pair respectively;
generating a symmetric key using the user signing key pair, the user encryption key pair, and a signing key of an organization;
encrypting the electronic certificate of the user by using the symmetric key to generate first verifiable information and second verifiable information;
and signing the first verifiable information and the second verifiable information by using a private key in a signature key pair of the organization and a signature private key in a signature key pair of the user, and uploading the electronic certificate of the user, the signed first verifiable information and the signed second verifiable information.
2. The method of claim 1, wherein the certificate and the result are shared anonymously, and wherein: before generating the symmetric key by using the signature key pair of the user, the encryption key pair of the user and the signature key pair of the organization, acquiring authorization is further required, where the acquiring authorization specifically includes:
acquiring an application request of an organization, and sending an authorization request to the user after receiving the application request of the organization;
obtaining the authorization confirmation information after the user confirms authorization;
and after receiving the authorization confirmation information, sending the public key of the user signature key pair and the public key of the user encryption key pair to the client of the organization.
3. The method of claim 1, wherein the certificate and the result are shared anonymously, and wherein: the generating a symmetric key by using the signature key pair of the user, the user encryption key pair and the signature key of the organization specifically comprises:
generating C _ enc by a private key of a signature key pair of the organization, a public key of the user encryption key pair and an elliptic curve algorithm;
c _ enc generates a symmetric key through a key derivation function KDF;
encrypting the electronic certificate and the random number by using the symmetric key to obtain encrypted first verifiable information;
and calculating the hash value of the public key and the electronic certificate in the user signature key pair to obtain encrypted second verifiable information.
4. The method of claim 1, wherein the certificate and the result are shared anonymously, and wherein: the signing the first verifiable information and the second verifiable information with a private key of a signing key pair of the organization and a signing private key of a signing key pair of the user, and performing chain storage on the electronic certificate of the user, the signed first verifiable information and the signed second verifiable information specifically comprises:
generating a random seed and computing a first hash value of the random seed, first verifiable information, and a public key of the authority signature key pair:
calculating a hash value of a private key and a first hash value in the user signature key pair to obtain a second hash value, and attaching the second hash value to an electronic certificate information column of the transaction;
packaging the public key in the electronic certificate information column and the agency signature key pair and the information needing to be linked up into signature information to be constructed;
signing the information to be signed by using a private key in the user signature key pair, and attaching the signed information to a transaction;
and generating uplink transaction information according to the signed information, calculating a third hash value of the uplink transaction information, and taking the third hash value as an address uplink.
5. A method for verifying an electronic certificate, based on the method for anonymously sharing a certificate and a result as claimed in claim 1, wherein: and when the electronic certificate and the second verifiable information sent by the user are acquired, returning verification information to the organization.
6. A method of electronic certificate authentication as claimed in claim 1, characterised by: when the electronic certificate and the second verifiable information sent by the user are obtained, verification information is returned to the institution, and the method specifically comprises the following steps:
obtaining a certificate of authenticity request of the organization;
acquiring a private key in the user encryption key pair and a public key in the signature key pair of the organization and generating C _ enc by an elliptic curve algorithm;
the C _ enc generates a symmetric key through a key derivation function KDF;
decrypting the encrypted electronic certificate by using the symmetric key and the first verifiable information to obtain decrypted electronic certificate information;
and calculating a public key in the user signature key pair and the hash value of the electronic certificate, comparing the public key with the second verifiable information, and sending a certificate document or certificate information to the organization when the public key in the user signature key pair and the hash value of the electronic certificate are equal to the second verifiable information.
7. An apparatus for anonymous sharing of certificates and results, comprising: the method comprises the following steps:
the registration device: acquiring a user registration request, acquiring a unique seed and storing the unique seed in a wallet of the user when the user registration request is received, and deriving two key pairs by using the unique seed, wherein the two key pairs are a user signature key pair and a user encryption key pair respectively;
an electronic certificate generation device: generating a symmetric key by using the user signature key pair, the user encryption key pair and a signature key of an organization, and encrypting an electronic certificate of the user by using the symmetric key to generate first verifiable information and second verifiable information;
an electronic certificate issuing apparatus: and signing the first verifiable information and the second verifiable information by using a private key in a signature key pair of the organization and a signature private key in a signature key pair of the user, and uploading the electronic certificate of the user, the signed first verifiable information and the signed second verifiable information.
8. An electronic device of a method for anonymous sharing of certificates and results, comprising:
the processor and the memory are communicated with each other through a bus; the memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any of claims 1 to 4.
9. A computer-readable storage medium of a method for anonymous sharing of certificates and results, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the method according to one of claims 1 to 4.
CN202111382312.XA 2021-11-22 2021-11-22 Method for anonymous sharing and verification of certificate and result Active CN114065253B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111382312.XA CN114065253B (en) 2021-11-22 2021-11-22 Method for anonymous sharing and verification of certificate and result

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111382312.XA CN114065253B (en) 2021-11-22 2021-11-22 Method for anonymous sharing and verification of certificate and result

Publications (2)

Publication Number Publication Date
CN114065253A true CN114065253A (en) 2022-02-18
CN114065253B CN114065253B (en) 2023-03-24

Family

ID=80278716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111382312.XA Active CN114065253B (en) 2021-11-22 2021-11-22 Method for anonymous sharing and verification of certificate and result

Country Status (1)

Country Link
CN (1) CN114065253B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215225A (en) * 2010-04-06 2011-10-12 英特尔公司 Techniques for monetizing anonymized context
CN102624530A (en) * 2012-03-14 2012-08-01 西安电子科技大学 Certificate-free remote anonymous authentication method for wireless body area network
CN106656503A (en) * 2016-10-13 2017-05-10 上海众人网络安全技术有限公司 Key storage method, data encryption and decryption method, electronic signature method and devices thereof
CN108270571A (en) * 2017-12-08 2018-07-10 西安电子科技大学 Internet of Things identity authorization system and its method based on block chain
CN108833385A (en) * 2018-06-01 2018-11-16 深圳崀途科技有限公司 User data anonymity sharing method based on the encryption of alliance's chain
US20180349894A1 (en) * 2017-05-30 2018-12-06 Christos Patrinos System of hardware and software to prevent disclosure of personally identifiable information, preserve anonymity and perform settlement of transactions between parties using created and stored secure credentials
CN109087100A (en) * 2018-08-02 2018-12-25 中国联合网络通信集团有限公司 Cryptographic key distribution method, device, equipment and storage medium
CN109615373A (en) * 2018-11-29 2019-04-12 中国电子科技集团公司第三十研究所 The anonymous method for secret protection of supervision can be entrusted in a kind of block catenary system
CN110545169A (en) * 2019-07-16 2019-12-06 如般量子科技有限公司 Block chain method and system based on asymmetric key pool and implicit certificate
CN110830244A (en) * 2019-10-22 2020-02-21 如般量子科技有限公司 Anti-quantum computing vehicle networking method and system based on identity secret sharing and alliance chain
CN112035806A (en) * 2020-07-21 2020-12-04 杜晓楠 Method and computer readable medium for generating distributed identities based on fingerprinting in blockchains
CN112435020A (en) * 2020-06-05 2021-03-02 成都链向科技有限公司 Block chain based supervised anonymous transaction system
CN112487778A (en) * 2020-11-16 2021-03-12 中信银行股份有限公司 Multi-user online signing system and method
CN112685717A (en) * 2020-12-29 2021-04-20 山东钢铁集团日照有限公司 Metering electronic certificate verification management system based on block chain
CN113343201A (en) * 2021-06-01 2021-09-03 联想(北京)有限公司 Registration request processing method, user identity information management method and device
CN113392162A (en) * 2021-07-14 2021-09-14 上海旺链信息科技有限公司 Information sharing method, device, equipment and storage medium
CN113507452A (en) * 2021-06-18 2021-10-15 北方工业大学 Vehicle networking privacy protection data sharing system based on block chain

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215225A (en) * 2010-04-06 2011-10-12 英特尔公司 Techniques for monetizing anonymized context
CN102624530A (en) * 2012-03-14 2012-08-01 西安电子科技大学 Certificate-free remote anonymous authentication method for wireless body area network
CN106656503A (en) * 2016-10-13 2017-05-10 上海众人网络安全技术有限公司 Key storage method, data encryption and decryption method, electronic signature method and devices thereof
US20180349894A1 (en) * 2017-05-30 2018-12-06 Christos Patrinos System of hardware and software to prevent disclosure of personally identifiable information, preserve anonymity and perform settlement of transactions between parties using created and stored secure credentials
CN108270571A (en) * 2017-12-08 2018-07-10 西安电子科技大学 Internet of Things identity authorization system and its method based on block chain
CN108833385A (en) * 2018-06-01 2018-11-16 深圳崀途科技有限公司 User data anonymity sharing method based on the encryption of alliance's chain
CN109087100A (en) * 2018-08-02 2018-12-25 中国联合网络通信集团有限公司 Cryptographic key distribution method, device, equipment and storage medium
CN109615373A (en) * 2018-11-29 2019-04-12 中国电子科技集团公司第三十研究所 The anonymous method for secret protection of supervision can be entrusted in a kind of block catenary system
CN110545169A (en) * 2019-07-16 2019-12-06 如般量子科技有限公司 Block chain method and system based on asymmetric key pool and implicit certificate
CN110830244A (en) * 2019-10-22 2020-02-21 如般量子科技有限公司 Anti-quantum computing vehicle networking method and system based on identity secret sharing and alliance chain
CN112435020A (en) * 2020-06-05 2021-03-02 成都链向科技有限公司 Block chain based supervised anonymous transaction system
CN112035806A (en) * 2020-07-21 2020-12-04 杜晓楠 Method and computer readable medium for generating distributed identities based on fingerprinting in blockchains
CN112487778A (en) * 2020-11-16 2021-03-12 中信银行股份有限公司 Multi-user online signing system and method
CN112685717A (en) * 2020-12-29 2021-04-20 山东钢铁集团日照有限公司 Metering electronic certificate verification management system based on block chain
CN113343201A (en) * 2021-06-01 2021-09-03 联想(北京)有限公司 Registration request processing method, user identity information management method and device
CN113507452A (en) * 2021-06-18 2021-10-15 北方工业大学 Vehicle networking privacy protection data sharing system based on block chain
CN113392162A (en) * 2021-07-14 2021-09-14 上海旺链信息科技有限公司 Information sharing method, device, equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NAN GUO等: "Random oracle-based anonymous credential system for efficient attributes proof on smart devices", 《SOFT COMPUTING》 *
迟令: "基于无线传感器网络的身份认证体系的研究", 《中国优秀博硕士学位论文全文数据库(博士)信息科技辑》 *

Also Published As

Publication number Publication date
CN114065253B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
US10673632B2 (en) Method for managing a trusted identity
US10924264B2 (en) Data validation and storage
CN108292401B (en) Secure digital data manipulation
US20160162897A1 (en) System and method for user authentication using crypto-currency transactions as access tokens
CN109845220A (en) For providing the method and apparatus of block chain participant's identity binding
CN112950220B (en) Enterprise digital identity management system and method based on blockchain
CN112106324A (en) Methods, computer program products and devices for creating, registering and verifying digitally stamped assets
CN106992988B (en) Cross-domain anonymous resource sharing platform and implementation method thereof
EP3556069A1 (en) System and method for securely processing an electronic identity
US10992683B2 (en) System and method for authenticating, storing, retrieving, and verifying documents
WO2021174927A1 (en) Blockchain-based identity verification method and apparatus, device, and storage medium
WO2021134900A1 (en) Blockchain supply chain transaction hidden static supervision system and method
CN109858911A (en) Qualification verification method, device, system, equipment and readable storage medium storing program for executing
WO2021134897A1 (en) Blockchain supply chain transaction hidden dynamic supervision system and method
WO2021114495A1 (en) Supply chain transaction privacy protection system and method based on blockchain, and related device
Chowdhary et al. Blockchain based framework for student identity and educational certificate verification
CN114389810A (en) Certificate generation method and device, electronic device and storage medium
EP4035305A1 (en) Partitioning a request into transactions for a blockchain
CN114065253B (en) Method for anonymous sharing and verification of certificate and result
CN117280346A (en) Method and apparatus for generating, providing and forwarding trusted electronic data sets or certificates based on electronic files associated with a user
Senthilkumar Data confidentiality, integrity, and authentication
KR102569582B1 (en) Method for Selective Disclosure of Attribute Information and Zero-Knowledge Proof Using Attribute-Based Encryption
MONDAL et al. AN EFFICIENT E-CERTIFICATE MANAGEMENT SYSTEM IN E-LEARNING USING BLOCKCHAIN
Careja et al. Digital Identity Using Blockchain Technology
Take et al. Customized ecertification generation using blockchain technology for distributed framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231007

Address after: Room 330, 3rd Floor, Building 1, No. 100 Hulan West Road, Baoshan District, Shanghai, 2019

Patentee after: Shanghai Jimu Galaxy Digital Technology Co.,Ltd.

Address before: 7b1-1, No. 588, Ji'an Road, Baoshan District, Shanghai, 201900

Patentee before: Shanghai wangchain Information Technology Co.,Ltd.

TR01 Transfer of patent right