CN106850190A - It is a kind of to the destroying method based on block chain digital certificate - Google Patents

It is a kind of to the destroying method based on block chain digital certificate Download PDF

Info

Publication number
CN106850190A
CN106850190A CN201710077951.2A CN201710077951A CN106850190A CN 106850190 A CN106850190 A CN 106850190A CN 201710077951 A CN201710077951 A CN 201710077951A CN 106850190 A CN106850190 A CN 106850190A
Authority
CN
China
Prior art keywords
block chain
address
public key
assets
digital certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710077951.2A
Other languages
Chinese (zh)
Inventor
徐明星
陈泽生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Music Network Technology Co Ltd
Original Assignee
Beijing Music Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Music Network Technology Co Ltd filed Critical Beijing Music Network Technology Co Ltd
Priority to CN201710077951.2A priority Critical patent/CN106850190A/en
Publication of CN106850190A publication Critical patent/CN106850190A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Abstract

The invention discloses a kind of to the destroying method based on block chain digital certificate, comprise the following steps:(1)A constant numeral of 160bits is directly specified as the Hash result of the SHA256 and RIPEMD60 of public key;(2)The block chain address version number of one byte is connected to public key Hash head, SHA256 computings twice then are carried out to it, using 4 bytes before result as the check value of public key Hash, be connected to its afterbody;(3)The result that will be obtained is encoded using BASE58, has just obtained the destruction address of block chain assets;(4)Digital asset is transferred to the block chain assets for obtaining to destroy on address.The present invention solves freezing or disposal problems for the digital certificate/assets on block chain on the premise of existing block chain data structure and book keeping operation mode is not changed;Operating method is simple, computing reliability.

Description

It is a kind of to the destroying method based on block chain digital certificate
Technical field
The present invention relates to block chain technology, and in particular to a kind of to the destroying method based on block chain digital certificate.
Background technology
Block chain technology, be it is a kind of by cryptography as ensure by data with the time be order be connected combination a kind of chain Formula data structure.Associated by summary info between each block in block chain, each block head includes one The summary info of individual block, it is ensured that all blocks for linking together can in order be arranged by summary info.Block chain Concept this acute hearing in calling oneself first(Satoshi Nakamoto)Paper《Bit coin:A kind of point-to-point electronic cash system (Bitcoin: A Peer-to-Peer Electronic Cash System)》Middle proposition, therefore bit coin can be regarded as The digital cash that first utilization block chain technology is realized.Bit coin is the electronic cash of similar Email, and both parties need " the bit coin wallet " of similar E-mail address and " the bit coin address " of similar Email addresses, with sending and receiving e-mail, converges Other side is directly paid by beneficiary address by bit coin in money side by computer or smart mobile phone.
Public key and private key are the keys pair obtained by a kind of algorithm, and public key is part disclosed in cipher key pair, private Key is then private part.The transaction payment of digital certificate or assets using the private key corresponding to its address, it is necessary to be signed Name, in general private key is a number of 256bits, and having this string numeral just can be to the numeral money in corresponding wallet address Product is operated, so must be kept securely.Private key can process generation public key by SECP256K1 algorithms, and When known to public key but cannot backwards calculation go out private key, this be ensure digital asset safety algorithm basis.
The all book keeping operation of digital certificate based on the distribution of block chain is all based on the string number signature of cryptography:Each institute The person of having signs a digital signature for random hash by the public key to preceding once book keeping operation and next bit owner, and this is signed Name is attached to the end of current record, and such digital certificate is just shifted and gives the next bit private key owner.And recipient is by right Signature is tested, it becomes possible to verify the owner of the assets.Its transaction verification is as shown in Figure 1.
Just because of being that recorded public key corresponding to private key to carry out Hash based on the digital certificate that block chain is issued or shifts In the digital coding of hash, hereinafter referred to as voucher address.It is only corresponding by its when digital certificate is remembered in this address Private key could be decrypted employs this part assets.And distribution digital certificate out or assets are in computer block chain network It is physically present.For example after now largest block chain digital asset bit coin is extracted, it is similar on the earth The same cannot being sent out of gold metal element arbitrarily destroyed.Actually bit coin is this kind of based on proof of work (POW) decentralization distribution digital asset need not also should not be destroyed, but for issued by centralization numeral with Card is a need for destroyed, thus there is freezing or disposal problems for the digital certificate/assets on block chain.
The content of the invention
In order to solve the weak point existing for above-mentioned technology, the invention provides one kind to based on block chain digital certificate Destroying method.
In order to solve the above technical problems, the technical solution adopted by the present invention is:One kind is to based on block chain digital certificate Destroying method, comprise the following steps:
(1)A constant numeral of 160bits is directly specified as the Hash result of the SHA256 and RIPEMD60 of public key;
(2)The address version number of one byte is connected to public key Hash head(Version number can select 0- by block chain formulation side Any Digit between 255), SHA256 computings twice then are carried out to it, using verification of 4 bytes as public key Hash before result Value, is connected to its afterbody;(3)By step(2)The result for obtaining is encoded using BASE58, has just obtained block chain assets Destroy address;
(4)Digital asset is transferred to the block chain assets for obtaining to destroy on address, due to the address for consuming digital asset Not with known private key, public-key cryptographic keys to deriving, because without private key, this part assets cannot be employed, Equivalent to destroyed.
Step(1)The constant of use can be constituted by rule by 160 0,160 1 or by 0,1.
The present invention solves the number on block chain on the premise of existing block chain data structure and book keeping operation mode is not changed Word voucher/assets are freezed or disposal problems;Operating method is simple, computing reliability, after assets are transferred into this without private key address, Even if all supercomputers in the whole world being added up and being also required to tens thousand of years, nobody can be further continued for using.
Brief description of the drawings
The present invention is further detailed explanation with reference to the accompanying drawings and detailed description.
Fig. 1 is the flow chart based on block chain transaction verification.
Fig. 2 is implementing procedure figure of the invention.
Fig. 3 is the implementing procedure figure of prior art.
Specific embodiment
As shown in Fig. 2 the present invention is comprised the following steps:
(1)A constant of 160bits is directly specified as public key;Constant can have 160 0,160 1 or by 0,1 by rule Rule composition.Four high of such as each byte be 1 low four for 0 20 numerals of byte:
1111000011110000111100001111000011110000111100001111000011110000111100001 11100001111000011110000111100001111000011110000111100001111000011110000111100 0011110000;
It is in turn then unworkable by public key Hash calculation public key due to the only unidirectional computing of SHA256 and RIPEMD160 algorithms 's;(2)The address version number of one byte is connected to public key Hash head(Version number can select 0- by block chain formulation side Any Digit between 255), SHA256 computings twice then are carried out to it, using verification of 4 bytes as public key Hash before result Value, is connected to its afterbody;(3)By step(2)The result for obtaining is encoded using BASE58, has just obtained block chain assets Destroy address(An address without known private key and public key is calculated as shown in Figure 2, and this address institute correspondence that may be present is private Key is the one of 2 160 powers point);
(4)Digital asset is transferred in the block chain asset addresses for obtaining(Destroy address), due to for consuming digital money Not with known private key, public-key cryptographic keys to deriving, because without private key, this part assets is cannot be by for the address of product Employ, equivalent to destroyed.
After this transaction address without private key is arrived in transaction in assets book keeping operation, because without private key, wanting to reuse or moving Can not possibly occur with this side transaction.Even if wanting to calculate private key by Brute Force, wherein also need to by SHA256 and RIPEMD160 Hash calculations twice.Therefore in the case where existing block chain data structure and book keeping operation mode is not changed, can be by After assets are transferred to this without private key address, even if all supercomputers in the whole world are added up being also required to tens thousand of years, quilt The assets voucher for being transferred to this address is equivalent to destroy, and nobody can be continuing with.
As shown in figure 1, the block chain that the present invention can be used with destroyed digital asset is one kind being made by cryptography For ensure by data with the time be order be connected combination a kind of linked data structure.Pass through between each block in block chain Summary info is associated, and each block head includes a summary info for block, it is ensured that what is linked together is all Block can in order be arranged by summary info.All book keeping operation is all based on the string number signature of cryptography:Each institute The person of having signs a digital signature for random hash by the public key to preceding once book keeping operation and next bit owner, and this is signed Name is attached to the end of current record, and such digital certificate has been transmitted to the next bit owner, and recipient is by signature Test, it becomes possible to verify the owner of the assets.
Additionally, digital certificate is based on cryptography asymmetric cryptosystem signature technology, by private/public key key to transaction data The accounting records with signature are encrypted, assets digital certificate cannot rollback and revocation and deletion once distribution.Issued Or the digital certificate of transfer is to recorded public key corresponding to private key to carry out in the digital coding of Hash hash, hereinafter referred to as voucher Address.When digital certificate is remembered in this address, could only be decrypted by its corresponding private key and employ this part assets.
As shown in figure 3, in the block chain assets of routine, private key, public key, the triangular derivation in address and difference of the invention It is that the present invention is directly to specify a constant as public key, and conventional promotes the step also to include:A, use randomizer One number of 256bits of generation generates the process of public key by SECP256K1 algorithm process as private key, and b, private key.This Invention is to skip foregoing step a, b, directly specifies the constant of a 160bits to calculate one without known private key and public key Address, this address corresponding private key that may be present be 2 160 powers point one.Because asset acceptance address is by public key Derive, and public key is derived by private key, public/private keys are that occur in pairs, can be derived by private key unique true Fixed public key, but private key counter cannot be pushed away by public key.The signature that private key is carried out, is verified by public key;The encryption that public key is carried out, by Private key is decrypted.Because the present invention is without private key, this part assets cannot be employed, equivalent to destroyed.
With the ECDSA elliptic curve SECP256K1 AESs that the conventional cipher key calculation of block chain book keeping operation is used, can use It is individual about more than 2 160 powers in the asset addresses derived.The 70 powers grain of the upper sand about 2 of the earth, and the milky way galaxy In star be probably 35 powers that 5000*1000000 is about no more than 2, by tellurian sand and the milky way galaxy Star is multiplied, also just 2 105 powers.It can be said that the usable asset addresses of ECDSA elliptic curve encryption algorithms and universe It is a magnitude.
Above-mentioned implementation method is not limitation of the present invention, and the present invention is also not limited to the example above, this technology neck Change, remodeling, addition or replacement that the technical staff in domain is made in the range of technical scheme, also belong to this hair Bright protection domain.

Claims (2)

1. a kind of to the destroying method based on block chain digital certificate, it is characterised in that:Comprise the following steps:
(1)A constant numeral of 160bits is directly specified as the Hash result of the SHA256 and RIPEMD60 of public key;
(2)The block chain address version number of one byte is connected to public key Hash head, SHA256 twice then is carried out to it Computing, using 4 bytes before result as the check value of public key Hash, is connected to its afterbody;(3)By step(2)The result for obtaining Encoded using BASE58, just obtained block chain assets and destroyed address;
(4)Digital asset is transferred to the block chain assets for obtaining to destroy on address, due to the address for consuming digital asset Not with known private key, public-key cryptographic keys to deriving, because without private key, this part assets cannot be employed, Equivalent to destroyed.
2. according to claim 1 to the destroying method based on block chain digital certificate, it is characterised in that:The step (1)The constant of use is by 160 0,160 1 or by 0,1 numeral constituted by rule.
CN201710077951.2A 2017-02-14 2017-02-14 It is a kind of to the destroying method based on block chain digital certificate Pending CN106850190A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710077951.2A CN106850190A (en) 2017-02-14 2017-02-14 It is a kind of to the destroying method based on block chain digital certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710077951.2A CN106850190A (en) 2017-02-14 2017-02-14 It is a kind of to the destroying method based on block chain digital certificate

Publications (1)

Publication Number Publication Date
CN106850190A true CN106850190A (en) 2017-06-13

Family

ID=59128771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710077951.2A Pending CN106850190A (en) 2017-02-14 2017-02-14 It is a kind of to the destroying method based on block chain digital certificate

Country Status (1)

Country Link
CN (1) CN106850190A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194613A (en) * 2017-06-20 2017-09-22 无锡井通网络科技有限公司 Digital asset coding method
CN107222312A (en) * 2017-06-20 2017-09-29 无锡井通网络科技有限公司 Assets digitizing solution based on block chain technology
CN107633400A (en) * 2017-08-09 2018-01-26 北京云知科技有限公司 A kind of method of payment and device of the machine wallet based on block chain
CN108876382A (en) * 2018-08-09 2018-11-23 上海点融信息科技有限责任公司 The method, apparatus and readable storage medium storing program for executing of digital certificate are handled on block chain
CN109324997A (en) * 2018-09-14 2019-02-12 佛山科学技术学院 A kind of digital right guard method and device based on block chain
CN109636602A (en) * 2018-12-04 2019-04-16 武汉东湖大数据交易中心股份有限公司 A kind of safety certification management system based on block chain big data
TWI714100B (en) * 2019-05-24 2020-12-21 魏文科 Method for establishing and verifying input value by using asymmetric encryption algorithm and its application method
CN112258192A (en) * 2020-09-15 2021-01-22 山东鲁能软件技术有限公司 Mail confirmation method and device based on block chain wallet address
TWI732247B (en) * 2019-07-16 2021-07-01 中華電信股份有限公司 Method to display the validation of certificate at signing time
CN113421094A (en) * 2021-04-28 2021-09-21 中国电子科技网络信息安全有限公司 Intelligent inseparable asset contract implementation method based on block chain
CN114679261A (en) * 2021-12-22 2022-06-28 北京邮电大学 Chain anonymous communication method and system based on key derivation algorithm

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology
KR101680260B1 (en) * 2015-12-14 2016-11-29 주식회사 코인플러그 Certificate issuance system and method based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101680260B1 (en) * 2015-12-14 2016-11-29 주식회사 코인플러그 Certificate issuance system and method based on block chain
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
西西: ""精通比特币 - 第4章 密钥、地址、钱包"", 《巴比特社区》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222312A (en) * 2017-06-20 2017-09-29 无锡井通网络科技有限公司 Assets digitizing solution based on block chain technology
CN107194613A (en) * 2017-06-20 2017-09-22 无锡井通网络科技有限公司 Digital asset coding method
CN107633400A (en) * 2017-08-09 2018-01-26 北京云知科技有限公司 A kind of method of payment and device of the machine wallet based on block chain
CN108876382A (en) * 2018-08-09 2018-11-23 上海点融信息科技有限责任公司 The method, apparatus and readable storage medium storing program for executing of digital certificate are handled on block chain
CN109324997B (en) * 2018-09-14 2022-05-10 佛山科学技术学院 Block chain-based digital right protection method and device
CN109324997A (en) * 2018-09-14 2019-02-12 佛山科学技术学院 A kind of digital right guard method and device based on block chain
CN109636602A (en) * 2018-12-04 2019-04-16 武汉东湖大数据交易中心股份有限公司 A kind of safety certification management system based on block chain big data
TWI714100B (en) * 2019-05-24 2020-12-21 魏文科 Method for establishing and verifying input value by using asymmetric encryption algorithm and its application method
TWI732247B (en) * 2019-07-16 2021-07-01 中華電信股份有限公司 Method to display the validation of certificate at signing time
CN112258192A (en) * 2020-09-15 2021-01-22 山东鲁能软件技术有限公司 Mail confirmation method and device based on block chain wallet address
CN112258192B (en) * 2020-09-15 2023-07-28 山东鲁能软件技术有限公司 Mail confirmation method and device based on blockchain wallet address
CN113421094A (en) * 2021-04-28 2021-09-21 中国电子科技网络信息安全有限公司 Intelligent inseparable asset contract implementation method based on block chain
CN113421094B (en) * 2021-04-28 2023-05-09 中国电子科技网络信息安全有限公司 Block chain-based indivisible asset intelligent contract implementation method
CN114679261A (en) * 2021-12-22 2022-06-28 北京邮电大学 Chain anonymous communication method and system based on key derivation algorithm

Similar Documents

Publication Publication Date Title
CN106850190A (en) It is a kind of to the destroying method based on block chain digital certificate
US11356280B2 (en) Personal device security using cryptocurrency wallets
US11936774B2 (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
CN106779636B (en) Block chain digital currency wallet based on mobile phone earphone interface
WO2018168723A1 (en) Technology for authenticating device on network
CN111476573B (en) Account data processing method, device, equipment and storage medium
CN111125781B (en) File signature method and device and file signature verification method and device
CN111147245A (en) Algorithm for encrypting by using national password in block chain
CN109818741A (en) A kind of decryption calculation method and device based on elliptic curve
CN107528689B (en) Password modification method based on Ukey
CN107070896B (en) Safe and efficient block chain network customized login method and safe reinforcement system
Vyakaranal et al. Performance analysis of symmetric key cryptographic algorithms
CN113343255A (en) Data interaction method based on privacy protection
CN111159774B (en) Decentralized intelligent contract escrow wallet method and system
Manz Digital Signature
Navale et al. M-Banking Security-a futuristic improved security approach
CN112311534A (en) Method for generating asymmetric algorithm key pair
CN110572256B (en) Anti-quantum computing asymmetric key management method and system based on asymmetric key pool and implicit certificate
Li The Advance of Ethereum Digital Signature
CN117221002A (en) Target port determining method and device
CN116188009A (en) National cipher soft encryption mode key acquisition method, system, terminal and readable storage medium
CN112258169A (en) Parallel signature system and method based on key generation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613